Skip to main content

previous disabled Page of 47
and
  1. No Access

    Chapter and Conference Paper

    CRAFT: Common Router Architecture for Throughput Optimization

    Agile development is considered as an emerging trend in hardware design, and NoC-based multi-IP integrated system has become the mainstream solution. The most critical challenge of this solution is to design a...

    Jiahua Yan, Mingyu Wang, Yao Qin, Zhiyi Yu in Algorithms and Architectures for Parallel … (2024)

  2. No Access

    Chapter and Conference Paper

    Harvest Palm Tree Based on Detection Through 2D LiDAR Sensor Using Power Equation

    The palm oil industry in Malaysia is encountering challenges that need innovative and technology-driven solutions. This study focuses on palm tree detection where 2D LiDAR sensors are utilized to collect data ...

    Luqman Hakim Bin Yusof in Data Science and Emerging Technologies (2024)

  3. No Access

    Chapter and Conference Paper

    Multimodal Emotion Recognition Using Attention-Based Model with Language, Audio, and Video Modalities

    Multimodal emotion identification is becoming increasingly important in human–computer interaction due to the amount of emotional information in human communication. Multimodal emotion recognition is the techn...

    Disha Sharma, Manoj Jayabalan, Nailya Sultanova in Data Science and Emerging Technologies (2024)

  4. No Access

    Chapter and Conference Paper

    RDC-YOLOv5: Improved Safety Helmet Detection in Adverse Weather

    Outdoor construction sites are frequently affected by fog and various adverse weather conditions, resulting in a decline in the quality of the captured images. This deterioration ultimately leads to a signific...

    Dexu Yao, Aimin Li, Deqi Liu, Mengfan Cheng in MultiMedia Modeling (2024)

  5. No Access

    Chapter and Conference Paper

    A Novel Convolutional Neural Network Architecture with a Continuous Symmetry

    This paper introduces a new Convolutional Neural Network (ConvNet) architecture inspired by a class of partial differential equations (PDEs) called quasi-linear hyperbolic systems. With comparable performance ...

    Yao Liu, Hang Shao, Bing Bai in Artificial Intelligence (2024)

  6. No Access

    Chapter and Conference Paper

    Neuron Pruning-Based Federated Learning for Communication-Efficient Distributed Training

    Efficient and flexible cloud computing is widely used in distributed systems. However, in the Internet of Things (IoT) environment with heterogeneous capabilities, the performance of cloud computing may declin...

    Jianfeng Guan, Pengcheng Wang, Su Yao in Algorithms and Architectures for Parallel … (2024)

  7. No Access

    Chapter and Conference Paper

    Hybrid D-DEPSO for Multi-objective Task Assignment in Hospital Inspection

    Hospital inspection tasks include temperature measurement, disinfection, emergency treatment, etc. Inspection robots can assist people in carrying out autonomous inspections and reduce the pressure on hospital...

    Chun Mei Zhang, **n Yao Ma, Bin Zhai in Advanced Computational Intelligence and In… (2024)

  8. No Access

    Chapter and Conference Paper

    Deformable Medical Image Registration Under Distribution Shifts with Neural Instance Optimization

    Deep-learning deformable image registration methods often struggle if test-image characteristic shifts from the training domain, such as the large variations in anatomy and contrast changes with different imag...

    Tony C. W. Mok, Zi Li, Yingda **a, Jiawen Yao in Machine Learning in Medical Imaging (2024)

  9. No Access

    Chapter and Conference Paper

    MDCF: Multiple Dynamic Cuckoo Filters for LSM-Tree

    As a write-optimized data structure, the Log-Structured Merge-tree (LSM-tree) based storage engine, which maintains data in a leveled structure on disk, is widely used in Key-Value (KV) storage systems. Meanwh...

    **ngfei Yao, Taotao **e, **aowei Chen in Algorithms and Architectures for Parallel … (2024)

  10. No Access

    Chapter and Conference Paper

    Explore and Enhance the Generalization of Anomaly DeepFake Detection

    In recent years, Anomaly DeepFake Detection (ADFD) has made significant breakthroughs in terms of generalization when meeting various unknown tampers. These detection methods primarily enhance generalization b...

    Yiting Wang, Shen Chen, Tai** Yao, Lizhuang Ma in Computational Visual Media (2024)

  11. No Access

    Chapter and Conference Paper

    TBAF: A Two-Stage Biometric-Assisted Authentication Framework in Edge-Integrated UAV Delivery System

    Edge-Integrated Unmanned Aerial Vehicles (UAVs) delivery systems have demonstrated the advantage of higher efficiency and lower latency in comparison with traditional intelligent delivery systems. But with its...

    Zheng Zhang, Huabin Wang, Aiting Yao in Algorithms and Architectures for Parallel … (2024)

  12. No Access

    Chapter and Conference Paper

    Joint Optimization of System Bandwidth and Transmitting Power in Space-Air-Ground Integrated Mobile Edge Computing

    Thanks to the rapid development of wireless communication technology, i.e., B5G, 6G, mobile edge computing (MEC) has emerged as a promising paradigm to facilitate various mobile applications, such as intellige...

    Yuan Qiu, Jianwei Niu, Yiming Yao in Algorithms and Architectures for Parallel … (2024)

  13. No Access

    Chapter and Conference Paper

    Introducing the 3DCityDB-Tools Plug-In for QGIS

    This paper introduces a new plug-in for QGIS that allows to connect to the free and open-source 3D City Database to load CityGML data, structured as classic GIS layers, into QGIS. The user is therefore not req...

    Giorgio Agugiaro, Konstantinos Pantelios in Recent Advances in 3D Geoinformation Scien… (2024)

  14. No Access

    Chapter and Conference Paper

    VC-AUG: Voice Conversion Based Data Augmentation for Text-Dependent Speaker Verification

    In this paper, we focus on improving the performance of the text-dependent speaker verification system in the scenario of limited training data. The deep learning based text-dependent speaker verification syst...

    **aoyi Qin, Yaogen Yang, Yao Shi, Lin Yang, Xuyang Wang in Man-Machine Speech Communication (2023)

  15. No Access

    Chapter and Conference Paper

    A Fine-Grained Verification Method for Blockchain Data Based on Merkle Path Sharding

    Blockchain has been widely applied these years. As its volume of data is greatly increasing, it is necessary to shard the data to utilize hardward storage efficiently. After sharding, however, the validated da...

    Liang Wen, Zhiqiong Wang, Tingyu Cui, Caiyun Shi in Advanced Data Mining and Applications (2023)

  16. No Access

    Chapter and Conference Paper

    Modeling Foraging Behavior in GitHub

    We operationalized GitHub using Information Foraging Theory to built a semi-supervised learning model to aid developers in their pursuit for the relevant repository among its variants.

    Abim Sedhain, Yao Wang, Brett Mckinney in HCI International 2023 Posters (2023)

  17. No Access

    Chapter and Conference Paper

    Wetland Challenge—Using Service Design Research as an Approach to Establish an AR APP for Environmental Education

    Given the looming threat of catastrophic environmental disasters, there has never been a more urgent need for establishing awareness of the importance of sustainable environments through environmental educatio...

    Wen-Huei Chou, Jia-Yin Shih, Yao-Fei Huang in HCI International 2023 Posters (2023)

  18. No Access

    Chapter and Conference Paper

    Exploring Opportunities for Visualization-Based Information Translation in Environmental Education: Using Taiwan’s Chenglong Wetland as an Example

    Global climate change has caused environmental and ecological anomalies and alterations, including catastrophes caused by climatic variations in the greater environment, the severity of disasters being affecte...

    Wen-Huei Chou, Yao-Fei Huang, Jia-Yin Shih in HCI International 2023 Posters (2023)

  19. No Access

    Chapter and Conference Paper

    Local Fusion Synthetic CT Network for Improving the Quality of CBCT in Cervical Cancer Radiotherapy

    Cervical cancer is a prevalent gynecologic malignancy that poses a significant threat to women’s health. Radiotherapy is a primary treatment method for cervical cancer, and real-time cone-beam computed tomogra...

    Dong Huang, **aoShuo Hao, Hua Yang, Yao Zheng, YueFei Feng, Yang Liu in Image and Graphics (2023)

  20. No Access

    Chapter and Conference Paper

    U-PISRNet: A Unet-Shape Palmprint Image Super-Resolution Network

    Palmprint has gained significant attention in recent years due to its reliability and uniqueness for biometric recognition. However, most existing palmprint recognition methods focus only feature representatio...

    Yao Wang, Lunke Fei, Tingting Chai, Shu** Zhao, Peipei Kang in Biometric Recognition (2023)

previous disabled Page of 47