Skip to main content

and
  1. No Access

    Article

    End-to-End Entity Detection with Proposer and Regressor

    Named entity recognition is a traditional task in natural language processing. In particular, nested entity recognition receives extensive attention for the widespread existence of the nesting scenario. The la...

    Xueru Wen, Changjiang Zhou, Haotian Tang, Luguang Liang in Neural Processing Letters (2023)

  2. No Access

    Article

    DCTN: a dense parallel network combining CNN and transformer for identifying plant disease in field

    Crop diseases can have a detrimental impact on crop growth, resulting in a significant reduction in crop yield. Therefore, accurate detection of these diseases is crucial for enhancing crop productivity. Despi...

    Denghao Pang, Hong Wang, Jian Ma, Dong Liang in Soft Computing (2023)

  3. No Access

    Article

    Weibull statistical modeling for textured image retrieval using nonsubsampled contourlet transform

    In this paper, we proposed a new framework for textured image retrieval, which is based on Weibull statistical distribution and nonsubsampled contourlet transform. Firstly, the image is decomposed into one low...

    Hong-ying Yang, Lin-lin Liang, Can Zhang, Xue-bing Wang, Pan-pan Niu in Soft Computing (2019)

  4. No Access

    Article

    Projection-Based PROMETHEE Methods Based on Hesitant Fuzzy Linguistic Term Sets

    This paper proposes two extended projection-based preference ranking organization methods for enrichment evaluations for multi-criteria decision making with hesitant fuzzy linguistic term sets (HFLTSs). We fir...

    Ru-xia Liang, Jian-qiang Wang, Hong-yu Zhang in International Journal of Fuzzy Systems (2018)

  5. No Access

    Article

    Study on optimization of anti-collision algorithm for mixed query tree

    This paper studies the hybrid query tree algorithm, which uses the combined information of the largest and smallest collision bits to classify the markers. The labels are placed in four matrices to reduce coll...

    Hong-wei Deng, Lang Li, **ao-Man Liang in Journal of Ambient Intelligence and Humani… (2018)

  6. No Access

    Article

    \(k^{-}\) -anonymization of multiple shortest paths

    The preservation of privacy on information networks has been studied extensively in recent years. Although early work concentrated on preserving sensitive node information and link information to prevent re-id...

    Shyue-Liang Wang, Yu-Chuan Tsai, Tzung-Pei Hong, Hung-Yu Kao in Soft Computing (2017)

  7. Article

    Open Access

    Feature selection and replacement by clustering attributes

    Feature selection is to find useful and relevant features from an original feature space to effectively represent and index a given dataset. It is very important for classification and clustering problems, whi...

    Tzung-Pei Hong, Yan-Liang Liou, Shyue-Liang Wang in Vietnam Journal of Computer Science (2014)

  8. No Access

    Article

    Mining fuzzy sequential patterns from quantitative transactions

    Many researchers in database and machine learning fields are primarily interested in data mining because it offers opportunities to discover useful information and important relevant patterns in large database...

    Tzung-Pei Hong, Kuei-Ying Lin, Shyue-Liang Wang in Soft Computing (2006)