Skip to main content

previous disabled Page of 4
and
  1. No Access

    Chapter and Conference Paper

    Real-Time Visual Detection of Anomalies in Densely Placed Objects

    In the industrial production line, the operation of packing small packages that are densely arranged in vertical rows and move quickly is still mainly done manually. In this situation, it is a typical and diff...

    Chunfang Liu, Jiali Fang, Pan Yu in Cognitive Computation and Systems (2024)

  2. No Access

    Chapter and Conference Paper

    Feature Alignment Method for Cross-View Image Geo-localization

    Cross-view image geo-localization aims to estimate the geo-location of a ground-view image, via finding the matching geo-tagged satellite images in a reference satellite database. We observe that the spatial r...

    **gqian Xu, Baojun Qi, Ma Zhu, Jiangshan Li in Computational and Experimental Simulations… (2024)

  3. No Access

    Chapter and Conference Paper

    6-DoF Grasp Planning on Point Cloud for Human-to-Robot Handover Task

    Human-to-robot handover is a key task in the human-robot collaboration. However, the diversity in object shapes and poses makes it extremely challenging for robots to ensure safe and successful gras**. To ov...

    Chunfang Liu, Weifan Wang, Ruitian Pang in Cognitive Systems and Information Processi… (2024)

  4. No Access

    Chapter and Conference Paper

    Privacy-Preserving Image Scaling Using Bicubic Interpolation and Homomorphic Encryption

    With the advancement of cloud computing, outsourced image processing has become an attractive business model, but it also poses serious privacy risks. Existing privacy-preserving image scaling techniques often...

    Donger Mo, Peijia Zheng, Yufei Zhou, **gyi Chen in Digital Forensics and Watermarking (2024)

  5. No Access

    Chapter and Conference Paper

    Motion Languages for Robot Manipulation

    In the cooperation between humans and robots, it is essential for robots to translate natural human language into continuous action sequences to complete complex collaborative tasks. In this article, a hierarc...

    Chunfang Liu, **aoyue Cao, Ailin Xue, **aoli Li in Cognitive Computation and Systems (2023)

  6. No Access

    Chapter and Conference Paper

    Joint Trajectory Generation of Obstacle Avoidance in Tight Space for Robot Manipulator

    It is a difficult thing for robot working in a tight and narrow space with obstacles because of collision occurrence. For solving this problem, the paper proposes a joint trajectory generation method for obsta...

    Chunfang Liu, **biao Zhang, Pan Yu in Cognitive Systems and Information Processi… (2023)

  7. No Access

    Chapter and Conference Paper

    Automatic Packaging System Based on Machine Vision

    In the industrial production line, putting several small packages into large packages with the required arrangement rules still requires a lot of manual work to complete. In order to solve this problem, we bui...

    Chunfang Liu, Jiali Fang, Pan Yu in Cognitive Systems and Information Processing (2023)

  8. No Access

    Chapter and Conference Paper

    Human Intention Understanding and Trajectory Planning Based on Multi-modal Data

    In the task of Human-Robot Interaction, human beings are at the center of the whole cooperation process. Robots always pay attention to the cooperator’s operation behavior through multi-modal information, cons...

    Chunfang Liu, **aoyue Cao, **aoli Li in Cognitive Systems and Information Processing (2023)

  9. No Access

    Chapter and Conference Paper

    Experimental Study on Physical Simulation of Sand Transportation and Flowback During Fracturing

    In order to study the transportation and backflow law of proppant in fracture during fracturing, an integrated simulation experiment device of sand transportation and backflow during fracturing was developed

    Zhiying Wu, Yafei Hu, Tingxue Jiang in Proceedings of the International Field Exp… (2022)

  10. No Access

    Chapter and Conference Paper

    Functional Primitive Library and Movement Sequence Reasoning Algorithm

    Trajectory planning of manipulator is a popular research area. To allow the manipulator to have the knowledge of demonstrated skills and the intelligence to infer trajectories for new tasks, a new kind of imit...

    Ailin Xue, **aoli Li, Chunfang Liu in Cognitive Systems and Information Processing (2022)

  11. No Access

    Chapter and Conference Paper

    Construction of Winter Olympic Games Emergency Medical Security Ontology

    The Winter Olympic Games proposes to establish an emergency medical security system for the scientific and technological Winter Olympic Games, and puts forward new requirements for emergency medical security k...

    Zhenxia Zhao, Chunfang Guo, Xuedong Chen in LISS 2021 (2022)

  12. No Access

    Chapter and Conference Paper

    On the Sharing-Based Model of Steganography

    Steganography has long been considered as a way of hiding the fact of secret communication. However, the fact that a message sender and a receiver communicated with each other is seldom protected. It can be da...

    **anfeng Zhao, Chunfang Yang, Fenlin Liu in Digital Forensics and Watermarking (2021)

  13. No Access

    Chapter and Conference Paper

    Micro-video Learning Resource Portrait and Its Application

    The emergence of a large number of online learning platforms changes the learners' demands and learning styles, thus the society puts forward higher requirements for the personalization, intelligentization and...

    **jiao Lin, Yanze Zhao, Tianqi Gao, Chunfang Liu, Haitao Pu in Human Centered Computing (2021)

  14. No Access

    Chapter and Conference Paper

    Movement Primitive Libraries Learning for Industrial Manipulation Tasks

    Task Primitive Library (TPLib) consists of task primitives which places dynamic or probabilistic movement primitives in chronological order. A teaching and learning system is formed with TPLib, from which task...

    Ailin Xue, **aoli Li, Chunfang Liu, **aoyue Cao in Cognitive Systems and Signal Processing (2021)

  15. No Access

    Chapter and Conference Paper

    Entity Coreference Resolution for Syllabus via Graph Neural Network

    Automatic identification of coreference and the establishment of corresponding model is an essential part in course syllabus construction especially for the comprehensive Universities. In this type of tasks, t...

    **Jiao Lin, Yanze Zhao, Chunfang Liu, Tianqi Gao in Intelligent Computing and Block Chain (2021)

  16. No Access

    Chapter and Conference Paper

    The New Theory of Learning in the Era of Educational Information 2.0—Connected Constructivism

    Constructivism and Connectivism are two important schools of learning theory. The development of these two theories reflects the characteristics of the educational information era. This paper reviews the origi...

    Yazi Wang, Chunfang Liu, Yanze Zhao, Weiyuan Huang in Intelligent Computing and Block Chain (2021)

  17. No Access

    Chapter and Conference Paper

    RACCROCHE: Ancestral Flowering Plant Chromosomes and Gene Orders Based on Generalized Adjacencies and Chromosomal Gene Co-occurrences

    Given the phylogenetic relationships of several extant species, the reconstruction of their ancestral genomes at the gene and chromosome level is made difficult by the cycles of whole genome doubling followed ...

    Qiaoji Xu, Lingling **, Chunfang Zheng in Computational Advances in Bio and Medical … (2021)

  18. No Access

    Chapter and Conference Paper

    ACGVD: Vulnerability Detection Based on Comprehensive Graph via Graph Neural Network with Attention

    Vulnerability is one of the main causes of network intrusion. An effective way to mitigate security threats is to find and repair vulnerabilities as soon as possible. Traditional vulnerability detection method...

    Min Li, Chunfang Li, Shuailou Li, Yanna Wu in Information and Communications Security (2021)

  19. No Access

    Chapter and Conference Paper

    Mining Defects of Result-Sensitive Function Based on Information Entropy

    Result-sensitive function is a typical type of security-sensitive function. The misuse of result-sensitive functions often leads to a lot kinds of software defects. Existing defect detection methods based on c...

    Lin Chen, Chunfang Yang, Fenlin Liu, Daofu Gong in Artificial Intelligence and Security (2020)

  20. Chapter and Conference Paper

    Gaps and Runs in Syntenic Alignments

    Gene loss is the obverse of novel gene acquisition by a genome through a variety of evolutionary processes. It serves a number of functional and structural roles, compensating for the energy and material costs...

    Zhe Yu, Chunfang Zheng, David Sankoff in Algorithms for Computational Biology (2020)

previous disabled Page of 4