Skip to main content

previous disabled Page of 24
and
  1. No Access

    Chapter and Conference Paper

    Enhanced Featurization of Queries with Interval Density Encoding

    Learning-based cardinality estimation methods outperform traditional methods by effectively overcoming strong assumptions(attribute value independence and uniform distribution). Existing learning-based methods...

    Jiangqing Wang, Dong Yang, Chong Sun, Jun Tie in Artificial Intelligence in China (2024)

  2. No Access

    Chapter and Conference Paper

    A Low-Latency Hardware Accelerator for YOLO Object Detection Algorithms

    Object detection is an important computer vision task with a wide range of applications, including autonomous driving, smart security, and other domains. However, the high computational requirements poses chal...

    Aibin Wang, Youshi Ye, Yu Peng, Dezheng Zhang in Advanced Parallel Processing Technologies (2024)

  3. No Access

    Chapter and Conference Paper

    A Multi-source Domain Adaption Approach to Minority Disk Failure Prediction

    Frequent happening of disk failures affects the reliability of the storage system, which can cause jittering of performance or even data loss of services and thus seriously threaten the quality of service. Alt...

    Wang Wang, Xuehai Tang, Biyu Zhou in Algorithms and Architectures for Parallel … (2024)

  4. No Access

    Chapter and Conference Paper

    Transformer-Based Video Deinterlacing Method

    Deinterlacing is a classical issue in video processing, aimed at generating progressive video from interlaced content. There are precious videos that are difficult to reshoot and still contain interlaced conte...

    Chao Song, Haidong Li, Dong Zheng, Jie Wang, Zhaoyi Jiang in Neural Information Processing (2024)

  5. No Access

    Chapter and Conference Paper

    Study on the Genetic Links Between Type 2 Diabetes Mellitus and Glioma by Bioinformatics

    Diabetes will increase the risk of most cancers, such as pancreatic, breast and prostate cancer. However, some studies showed patients with diabetes are less susceptible to glioma than the people with normal b...

    Yidan Sang, Mengyang Hu, Na Wang in Bio-Inspired Computing: Theories and Appli… (2024)

  6. No Access

    Chapter and Conference Paper

    Accelerated Lifetime Experiment of Maximum Current Ratio Based on Charge and Discharge Capacity Confinement

    Lithium-ion batteries will undergo continuous aging during the process of charging and discharging. Charging and discharging cycle conditions for lithium-ion batteries are usually an important method to detect...

    Baoji Wang, Boyan Li, Qixuan Wang, Lei Dong in Advanced Computational Intelligence and In… (2024)

  7. No Access

    Chapter and Conference Paper

    High-Resolution Feature Representation Driven Infrared Small-Dim Object Detection

    Infrared small-dim object detection is a challenging task due to the small size, weak features, lack of prominent structural information, and vulnerability to background interference. During the process of dee...

    Yuhang Dong, Yingying Wang, Linyu Fan in Pattern Recognition and Computer Vision (2024)

  8. No Access

    Chapter and Conference Paper

    Intelligent Cooperative Routing for Services in Computing Integration Networking

    With the widespread application of cloud computing and edge computing, achieving optimal allocation of computing resources in a heterogeneous network environment has become a key issue. The objective of this c...

    Guoqing Dong, Tianhao Peng, Qixuan Zhang, Huizhi Wang in Mobile Internet Security (2024)

  9. No Access

    Chapter and Conference Paper

    A Fine-Grained Domain Adaptation Method for Cross-Session Vigilance Estimation in SSVEP-Based BCI

    Brain-computer interface (BCI), a direct communication system between the human brain and external environment, can provide assistance for people with disabilities. Vigilance is an important cognitive state an...

    Kangning Wang, Shuang Qiu, Wei Wei, Ying Gao, Huiguang He in Neural Information Processing (2024)

  10. No Access

    Chapter and Conference Paper

    Blockchain Scam Detection: State-of-the-Art, Challenges, and Future Directions

    With the rapid development of blockchain platforms, such as Ethereum and Hyperledger Fabric, blockchain technology has been widely applied in various domains. However, various scams exist in the cryptocurrency...

    Shunhui Ji, Congxiong Huang, Hanting Chu, **ao Wang in Blockchain and Trustworthy Systems (2024)

  11. No Access

    Chapter and Conference Paper

    SFRSwin: A Shallow Significant Feature Retention Swin Transformer for Fine-Grained Image Classification of Wildlife Species

    Fine-grained image classification of wildlife species is a task of practical value and has an important role to play in the fields of endangered animal conservation, environmental protection and ecological con...

    Shuai Wang, Yubing Han, Shouliang Song in Pattern Recognition and Computer Vision (2024)

  12. No Access

    Chapter and Conference Paper

    Construction and Evaluation of the Five-in-One Practice Teaching Model

    In response to the economic and social development of Tibet Autonomous Region and the demand for information technology construction in the new engineering era, this paper analyzes the communication engineerin...

    Zhicheng Dong, Donghong Cai, Yonghao Shi in Computer Science and Education. Educationa… (2024)

  13. No Access

    Chapter and Conference Paper

    Efficient and Reliable Federated Recommendation System in Temporal Scenarios

    Addressing privacy concerns and the evolving nature of user preferences, it is crucial to explore collaborative training methods for federated recommendation models that match the performance of centralized mo...

    **gzhou Ye, Hui Lin, **aoding Wang, Chen Dong in Green, Pervasive, and Cloud Computing (2024)

  14. No Access

    Chapter and Conference Paper

    Intelligent Network Intrusion Detection and Situational Awareness for Cyber-Physical Systems in Smart Cities

    Smart cities are enabled by cyber-physical systems (CPS) which leverage the Internet of Things (IoT) to connect the physical world and information systems. Due to lack of security protection, IoT systems are v...

    Shouliang Song, Anming Dong, Honglei Zhu in PRICAI 2023: Trends in Artificial Intellig… (2024)

  15. No Access

    Chapter and Conference Paper

    Investigation and Analysis of Corneal Morphology in Young Divers

    To investigate the corneal morphology of adolescent diving athletes and analyze the related influencing factors. Corneal topographic maps were taken of 42 young athletes (19 males and 23 females, aged 9–17 yea...

    Chenyang Mao, **n Wang, Heng Li, Hao** Li, Dan Zhou, Jianwen Chen in Applied Intelligence (2024)

  16. No Access

    Chapter and Conference Paper

    Triple-Path RNN Network: A Time-and-Frequency Joint Domain Speech Separation Model

    Studies in speech separation have achieved significant success in recent years. To correctly separate the mixture signals, it is critical to encode the signals into an appropriate latent space. Existing speech...

    Yu-Huan Zhai, Qiang Hua, **ao-Wen Wang in Parallel and Distributed Computing, Applic… (2024)

  17. No Access

    Chapter and Conference Paper

    Analysis of Scientific Growth Patterns and Citation Distribution Driven by Educational Data Based on Ar**v Database

    Research on the number of scientific papers and citations in education data has yielded insights into potential patterns and general laws of scientific growth. We use the ar**v database, encompassing over 1.88...

    Yuancai Huang, Nannan Sun, Fan Wang in E-Business. New Challenges and Opportuniti… (2024)

  18. No Access

    Chapter and Conference Paper

    Decoupled 2S-AGCN Human Behavior Recognition Based on New Partition Strategy

    Human skeleton point data has better environmental adaptability and motion expression ability than RGB video data. Therefore, the action recognition algorithm based on skeletal point data has received more and...

    Liu Qiuming, Chen Long**, Wang Da, **ao He, Zhou Yang in Mobile Networks and Management (2024)

  19. No Access

    Chapter and Conference Paper

    CSEC: A Chinese Semantic Error Correction Dataset for Written Correction

    Existing research primarily focuses on spelling and grammatical errors in English, such as missing or wrongly adding characters. This kind of shallow error has been well-studied. Instead, there are many unsolv...

    Wenxin Huang, **ao Dong, Meng-xiang Wang, Guangya Liu in Neural Information Processing (2024)

  20. No Access

    Chapter and Conference Paper

    Flexible Sensor Array and Newton Interpolation Algorithm for Molded Dichromatic Sole by Operating Robot

    Based on the principle of system engineering and optimization method, the multi-color soles mold operation robot was constructed instead of manual operation, and the double-layer quality inspection standard of...

    Lizhi Gu, Shan** Gao, Dong Wang, **ling Song in Computer Networks and IoT (2024)

previous disabled Page of 24