Skip to main content

previous disabled Page of 1,004
and
  1. No Access

    Chapter and Conference Paper

    Deployment and Comparison of Large Language Models Based on Virtual Cluster

    [Objective] Currently, large language model (LLM) is one of research highlights in the field of natural language processing. This paper selected some open-source LLMs for deployment and comparison from the perspe...

    Kai Li, Rongqiang Cao, Meng Wan, **aoguang Wang, Zongguo Wang in Artificial Intelligence (2024)

  2. No Access

    Chapter and Conference Paper

    Updates and Experiences of VenusAI Platform

    [Objective] This paper presents an overview introduction of the VenusAI platform, focusing on its technical updates and sharing the experiences gained since its deployment. The objective is to highlight the platf...

    Meng Wan, Rongqiang Cao, Kai Li, **aoguang Wang, Zongguo Wang in Artificial Intelligence (2024)

  3. No Access

    Chapter

    Conclusion and Future Directions

    In previous chapters, we have presented our observations and results on mobile data dynamics in heterogeneous wireless networks, from four aspects: the cause, description, governing rule, and impact, respectiv...

    Jie Wang, Wenye Wang, **aogang Wang in Encountering Mobile Data Dynamics in Heter… (2024)

  4. No Access

    Chapter and Conference Paper

    Prediction and Analysis of Multiple Causes of Mental Health Problems Based on Machine Learning

    To prevent other types of mental health problems from being misclassified as depression, as well as to remedy the problem of inadequate resources for mental health consultations. This study first analyzes the ...

    Shengli Deng, Fan Wang, Yunna Cai, Haowei Wang, Zhenyu Wang in Wisdom, Well-Being, Win-Win (2024)

  5. No Access

    Chapter and Conference Paper

    Strict Differentially Private Support Vector Machines with Dimensionality Reduction

    With the widespread data collection and processing, privacy-preserving machine learning has become increasingly important in addressing privacy risks related to individuals. Support vector machine (SVM) is one...

    Teng Wang, Shuanggen Liu, Jiangguo Liang in Artificial Intelligence Security and Priva… (2024)

  6. No Access

    Chapter and Conference Paper

    A Robust Detection and Correction Framework for GNN-Based Vertical Federated Learning

    Graph Neural Network based Vertical Federated Learning (GVFL) facilitates data collaboration while preserving data privacy by learning GNN-based node representations from participants holding different dimensi...

    Zhicheng Yang, **aoliang Fan, Zheng Wang in Pattern Recognition and Computer Vision (2024)

  7. No Access

    Chapter and Conference Paper

    A Novel Point Cloud Completion Method Based on Height Map and Dual-Mask Images

    The height information of flotation foam is crucial in the titanium flotation. Foam height is embedded within foam point clouds. We are the first to introduce point cloud data in flotation analysis. Addressing...

    Yifan Lu, **aoqi Chen, Jianfu Ma, Meixia Fu in Artificial Intelligence in China (2024)

  8. No Access

    Chapter and Conference Paper

    Design of a Rotating Inverted Pendulum Control System Based on Qube-Servo2

    In this paper, based on the Qube-Serco2 rotating inverted pendulum system, the mathematical model and state space expression are established, and a stable pendulum control algorithm based on BP neural network ...

    Haoran Wang, Qing Wang, Yujue Wang in Advanced Computational Intelligence and In… (2024)

  9. No Access

    Chapter

    Introduction

    Data, which refers to transmittable and storable computer information, has been an integral part of modern society ever since the invention of computers. Especially in the past decade, its indispensable role in v...

    Jie Wang, Wenye Wang, **aogang Wang in Encountering Mobile Data Dynamics in Heter… (2024)

  10. No Access

    Chapter

    Coverage Dynamics: Modeling and Analysis of Data Coverage in Heterogeneous Edge Networks

    Our study in the previous chapter revealed the lifetime of mobile data in large networks, to address the when question. In this chapter, we shift gear to another important aspect of mobile data, that is, the wher...

    Jie Wang, Wenye Wang, **aogang Wang in Encountering Mobile Data Dynamics in Heter… (2024)

  11. No Access

    Chapter and Conference Paper

    FRBBM-Scheme: A Flexible Ratio Virtual Primary Key Generation Approach Based on Binary Matching

    The protection of database watermarking techniques based on primary key (PK) is weakened by potential PK attacks and their huge impact. Using virtual primary key (VPK) schemes is an effective solution to enhan...

    Tiancai Liang, Yun Zhao, Haolin Wang, Ziwen Cai in Intelligent Information Processing XII (2024)

  12. No Access

    Chapter and Conference Paper

    Image Segmentation Algorithm Based on Improved U-Net for Mineral Froth Flotation Process

    The froth size distribution in mineral flotation production is closely tied to production indicators. Therefore, accurate segmentation of froth images is of great significance for optimizing and controlling th...

    Jiansheng Wu, **aoqi Chen, Jianfu Ma, Meixia Fu in Artificial Intelligence in China (2024)

  13. No Access

    Chapter

    Spectrum Dynamics: Modeling, Analysis, and Design of Spectrum Activity Surveillance in DSA-Enabled Systems

    In the previous chapter, we discussed the impact on network resource by data movements in the offloading process, but it is still not clear how to observe such impact. This is especially true for the spectrum res...

    Jie Wang, Wenye Wang, **aogang Wang in Encountering Mobile Data Dynamics in Heter… (2024)

  14. No Access

    Chapter and Conference Paper

    Research and Application of Offline Log Analysis Method for E-commerce Based on HHS

    Today, with the rapid development of Internet technology, the storage, analysis and mining of massive data have become an important technical topic in the era of information explosion. The big data technology ...

    Haoliang Wang, Kun Hu, Lili Wang in Intelligence Computation and Applications (2024)

  15. No Access

    Chapter and Conference Paper

    A Modified Two_Arch2 Based on Reference Points for Many-Objective Optimization

    Many-objective optimization problems (MaOPs) refer to those multi-objective problems (MOPs) having more than three objectives. For MaOPs, the performance of most multi-objective evolutionary algorithms (MOEAs)...

    Shuai Wang, Dong **ao, Futao Liao in Intelligence Computation and Applications (2024)

  16. No Access

    Chapter and Conference Paper

    Zero-Shot Medical Information Retrieval via Knowledge Graph Embedding

    In the era of the Internet of Things (IoT), the retrieval of relevant medical information has become essential for efficient clinical decision-making. This paper introduces MedFusionRank, a novel approach to z...

    Yuqi Wang, Zeqiang Wang, Wei Wang, Qi Chen in Internet of Things of Big Data for Healthc… (2024)

  17. No Access

    Chapter and Conference Paper

    FAI: A Fraudulent Account Identification System

    Fraudulent account detection is essential for businesses and online Internet enterprises, which can help to avoid financial loss and improve user experience. However, conventional solutions suffer from two mai...

    Yixin Tian, Yufei Zhang, Fangshu Chen, Bingkun Wang, Jiahui Wang in Artificial Intelligence (2024)

  18. No Access

    Chapter and Conference Paper

    Dual-Stream Context-Aware Neural Network for Survival Prediction from Whole Slide Images

    Whole slide images (WSI) encompass a wealth of information about the tumor micro-environment, which holds prognostic value for patients’ survival. While significant progress has been made in predicting patient...

    Junxiu Gao, Shan **, Ranran Wang, Mingkang Wang in Pattern Recognition and Computer Vision (2024)

  19. No Access

    Chapter and Conference Paper

    Classification Method for Ship-Radiated Noise Based on Joint Feature Extraction

    In order to address the problem of poor recognition performance from single signal features in ship identification and to enhance the accuracy of Convolutional Neural Networks (CNNs) in underwater acoustic tar...

    Libin Du, Mingyang Liu, Zhichao Lv in Intelligent Computers, Algorithms, and App… (2024)

  20. No Access

    Chapter and Conference Paper

    Optimization of Takagi-Sugeno-Kang Fuzzy Model Based on Differential Evolution with Lévy Flight

    In this article, a novel evolutionary algorithm called differential evolution with Lévy flight (DEFL) algorithm was proposed to optimize the Takagi-Sugeno-Kang fuzzy model (TSK fuzzy model) by finding the opti...

    **ao Feng, Yongbin Yu, **gye Cai, Hao Wang in PRICAI 2023: Trends in Artificial Intellig… (2024)

previous disabled Page of 1,004