Skip to main content

previous disabled Page of 3
and
  1. No Access

    Chapter and Conference Paper

    Research and Practice on the Technology of Ultra-Thick Bed Sintering of Iron Ore in Shougang **gtang Sintering Plant

    This paper analyzes the formation law of liquid phase in the process and emphatically expounds the key technology and production practice effect of two 500 m2 sintering machines of Shougang **gtang. Through th...

    Yapeng Zhang, Wen Pan, Shaoguo Chen, **gjun Zhao in Materials Processing Fundamentals 2024 (2024)

  2. No Access

    Chapter and Conference Paper

    MEC Data Offloading Strategy for UPF Sinking in 5G Core Network

    The explosive growth of Internet data traffic, driven by various resource-intensive and delay-sensitive smart applications supported by 5G communication networks, has posed higher requirements on latency and Q...

    Hanwei Jia, Fengjun Zhao, Zhong Li in Signal and Information Processing, Network… (2024)

  3. No Access

    Chapter and Conference Paper

    Determine the Camera Eigenmatrix from Large Parallax Images

    Recovering camera parameters from a group of image pairs is an important problem in computer vision. The traditional 4-point solution is vulnerable to insufficient or too concentrated number of corresponding p...

    Zhenlong Du, Yu Feng, **aoli Li, Dong Chen, **angjun Zhao in Advances in Computer Graphics (2024)

  4. No Access

    Chapter and Conference Paper

    Edge-Oriented Resource Scheduling Algorithm Based on Deep Reinforcement Learning

    In the past few decades, the rapid development of information technology and the continuous innovation of computing paradigm have ushered people into a new era of edge computing. Compared to traditional cloud ...

    Longjun Zhao, Dandan Cui, Haipo Li in Proceedings of the 13th International Conf… (2024)

  5. No Access

    Chapter and Conference Paper

    Lattice-Based Threshold, Accountable, and Private Signature

    Recently, Boneh and Komlo (CRYPTO 2022) initiated the study of threshold, accountable, and private signature (TAPS) schemes. Classical threshold signature schemes are either fully private or fully accountable....

    Yingfei Yan, Yongjun Zhao, Wen Gao, Baocang Wang in Topics in Cryptology – CT-RSA 2024 (2024)

  6. No Access

    Chapter and Conference Paper

    Privacy Preserving CSI Fingerprint Device-Free Localization

    Device-Free Localization (DFL) method based on wireless signal fingerprint is a mainstream indoor location method at present. The main concerns in this field are location accuracy and complexity of computing, ...

    Tianxin Huang, Lingjun Zhao, Zeyang Dai, Liang Lin in Machine Learning for Cyber Security (2023)

  7. No Access

    Chapter and Conference Paper

    Low Carbon Economy Optimal Dispatching Strategy for a Power System Based on GCN Classification

    In the context of the “dual carbon” goal, the optimization strategy based on carbon transaction costs is considered in power system operation. Firstly, the equipment modeling is carried out and different gener...

    Changjun Li, **n Yin, Hongjun Zhao in Proceedings of 2022 7th International Conf… (2023)

  8. No Access

    Chapter and Conference Paper

    Research Progress of Semantic Image Synthesis

    Semantic image synthesis is a cutting-edge technique that employs semantic labels to generate realistic images. This technique has gained widespread popularity in the field of image synthesis, and has become a...

    Binyao Yan, **angjun Zhao, Hao Zheng in 7th International Conference on Computing,… (2023)

  9. No Access

    Chapter and Conference Paper

    Online Volume Optimization for Notifications via Long Short-Term Value Modeling

    App push notifications are an essential tool for app developers to engage with their users actively and provide them with timely and relevant information about the app. However, determining the proper volume o...

    Yuchen Zhang, Mingjun Zhao, Chenglin Li in Advances in Knowledge Discovery and Data M… (2023)

  10. No Access

    Chapter and Conference Paper

    Hybrid RRT*-Gauss Pseudospectral Trajectory Planning Method for eVTOL Application

    The complexity of trajectory design for electric vertical takeoff and landing aircraft (eVTOL) originates the nonlinear aircraft dynamics, path constraints, and coupling characteristics between translational a...

    Mingjun Zhao, Mingkai Wang, Shuguang Zhang in Advances in Guidance, Navigation and Control (2023)

  11. No Access

    Chapter and Conference Paper

    Cryptography-Inspired Federated Learning for Generative Adversarial Networks and Meta Learning

    Federated learning (FL) aims to derive a “better” global model without direct access to individuals’ training data. It is traditionally done by aggregation over individual gradients with differentially privat...

    Yu Zheng, Wei Song, Minxin Du, Sherman S. M. Chow in Advanced Data Mining and Applications (2023)

  12. No Access

    Chapter and Conference Paper

    Unbalanced Data Oversampling Method for Traffic Multi-classification in Convergence Network

    At present, classification models are widely used in network traffic anomaly detection. Researchers have found that the imbalance of network traffic data sets affects the result of anomaly detection in converg...

    Qian Zhao, Yang Yang, Longjun Zhao in Proceedings of the 11th International Conf… (2022)

  13. No Access

    Chapter and Conference Paper

    Changes of SO2, NOx Emission, and Production of Iron Ore Sintering with Steam Injection at the Surface of Sintering Bed

    The effect on emission reduction and the quality index of sintering were studied. The sintering cup test showed on the sintering bed surface has the effect of . It was also beneficial to reduce fuel consu...

    Yapeng Zhang, Wen Pan, Shaoguo Chen in 12th International Symposium on High-Tempe… (2022)

  14. No Access

    Chapter and Conference Paper

    Medical CT Image Enhancement System Based on Swarm Intelligence Optimization Algorithm

    With the development of electronic technology and computer technology, the application field of medical images will continue to expand, and medical image processing technology will also attract more and more a...

    Li Xu, Yuqing Hou, Fengjun Zhao, **niu Bai in Cyber Security Intelligence and Analytics (2022)

  15. No Access

    Chapter and Conference Paper

    Research on the Active Safety Monitoring Evaluation System of Key Operating Vehicles

    With the substantial increase in passenger and freight volume and the increasing complexity of road conditions, transportation safety issues have become increasingly prominent. Traditional safety supervision u...

    **g Deng, Feng Wang, **aobo Wu in Wireless Technology, Intelligent Network T… (2022)

  16. No Access

    Chapter and Conference Paper

    Adversarial Unsupervised Domain Adaptation for Traffic Anomaly Detection in Convergence Network

    With the increasing scale of the network, network security problems are becoming more and more complex. Network traffic anomaly detection can be used as an effective method to provide technical support for net...

    Zhuo Tao, Yang Yang, Longjun Zhao, Zhen Wang in Proceedings of the 11th International Conf… (2022)

  17. No Access

    Chapter and Conference Paper

    LA3: Efficient Label-Aware AutoAugment

    Automated augmentation is an emerging and effective technique to search for data augmentation policies to improve generalizability of deep neural network training. Most existing work focuses on constructing a ...

    Mingjun Zhao, Shan Lu, Zixuan Wang, **aoli Wang, Di Niu in Computer Vision – ECCV 2022 (2022)

  18. No Access

    Chapter and Conference Paper

    Energy Efficient Deployment and Task Offloading for UAV-Assisted Mobile Edge Computing

    With the popularization of mobile wireless networks and Internet of Things (IoT) technologies, energy-hungry and delay-intensive applications continue to surge. Due to the limited computing power and battery c...

    Yangguang Lu, **n Chen, Fengjun Zhao in Algorithms and Architectures for Parallel … (2022)

  19. No Access

    Chapter and Conference Paper

    Construction Project Cost Management System Based on Computer Technology

    In recent years, with the rapid development of China’s economy, more and more engineering construction, project cost management is directly related to the benefits of engineering construction, but there are st...

    **ngjun Zhao in Application of Intelligent Systems in Multi-modal Information Analytics (2021)

  20. No Access

    Chapter and Conference Paper

    SAR Target Recognition Based on Model Transfer and Hinge Loss with Limited Data

    Convolutional neural networks have made great achievements in field of optical image classification during recent years. However, for Synthetic Aperture Radar automatic target recognition (SAR-ATR) tasks, the ...

    Qishan He, Lingjun Zhao, Gangyao Kuang, Li Liu in Artificial Intelligence (2021)

previous disabled Page of 3