Skip to main content

previous disabled Page of 7
and
  1. No Access

    Chapter and Conference Paper

    Research and Application of Integrated Fracturing Fluid for Tight Sandstone Gas in Ordos Basin

    The characteristics of Ordos basin is large vertical span, poor connectivity, small effective reservoir thickness, poor reservoir physical properties, low clay mineral content, small pore throat radius and low...

    Huai-zhu Liu, Kang-ning Zhao, Ji-qing Guo in Proceedings of the International Field Exp… (2024)

  2. No Access

    Chapter and Conference Paper

    3D Scene Modeling and Real-Time Infrared Simulation Technology Based on Artificial Intelligence Algorithm

    With the continuous advancement of information technology and the increasing demand for real-time infrared simulation, establishing a high-performance real-time infrared simulation system is the primary task o...

    Huayan Zhu in Proceedings of International Conference on… (2024)

  3. No Access

    Chapter and Conference Paper

    CSEC: A Chinese Semantic Error Correction Dataset for Written Correction

    Existing research primarily focuses on spelling and grammatical errors in English, such as missing or wrongly adding characters. This kind of shallow error has been well-studied. Instead, there are many unsolv...

    Wenxin Huang, **ao Dong, Meng-xiang Wang, Guangya Liu in Neural Information Processing (2024)

  4. No Access

    Chapter and Conference Paper

    Control and Active and Safety Path Planning of Land-Air Amphibious Unmanned Platform

    With the rapid development of unmanned aerial and ground vehicle technology, human beings are no longer satisfied with their single function of flying in the air or traveling on the ground. The use of more fle...

    Longlong Liu, Hua Zhu, Rui Zhang, Tao Xu in Proceedings of 2023 7th Chinese Conference… (2024)

  5. No Access

    Chapter and Conference Paper

    Research and Application of CO2 Stimulation Technology in Horizontal Well of Heavy Oil Reservoir of Complex Fault Block

    Nanpu land reservoir is a typical heavy oil reservoir with complex fault blocks. The horizontal well-directional well pattern is used to develop it. In order to improve the productivity of horizontal wells and...

    Huai-zhu Liu in Proceedings of the International Field Exp… (2023)

  6. No Access

    Chapter and Conference Paper

    A Cooperative Interception Allocation Method Faced on 3D Reachable Area Prediction Based on Deep Neural Network

    This paper studies the problem of multi-intercept missile cooperative interception allocation faced on three-dimensional reachable area prediction. The key points of this paper are using neural network to pred...

    Pengyu Sun, Huaguang Zhu, **n Ning in Proceedings of 2022 International Conferen… (2023)

  7. No Access

    Chapter and Conference Paper

    A Subcell Limiting Based on High-Order Compact Nonuniform Nonlinear Weighted Schemes for High-Order CPR Method

    This paper further investigates the subcell limiting approach based on compact nonuniform nonlinear weighted (CNNW) schemes for high-order correction procedure via reconstruction (CPR) method. A special subcel...

    Huajun Zhu, Zhen-Guo Yan, Feiran Jia in Spectral and High Order Methods for Partia… (2023)

  8. No Access

    Chapter and Conference Paper

    An Air Combat UCAV Autonomous Maneuver Decision Method Based on LSTM Network and MCDTS

    This paper studies the integrated process of air combat UCAV action recognition and autonomous maneuver decision-making in combination with the aerial battlefield situation. The key points of this paper are re...

    Fangyuan Dang, Huaguang Zhu, **n Ning in Proceedings of 2022 International Conferen… (2023)

  9. No Access

    Chapter and Conference Paper

    Revisiting Positive and Negative Samples in Variational Autoencoders for Top-N Recommendation

    Top-N recommendation is a common tool to discover interesting items, which ranks the items based on user preference using their interaction history. Implicit feedback is often used by recommender systems due t...

    Wei Liu, Leong Hou U, Shangsong Liang in Database Systems for Advanced Applications (2023)

  10. No Access

    Chapter and Conference Paper

    You Need to Look Globally: Discovering Representative Topology Structures to Enhance Graph Neural Network

    Graph Neural Networks (GNNs) have shown great ability in modeling graph-structured data. However, most current models aggregate information from the local neighborhoods of a node. They may fail to explicitly e...

    Huaisheng Zhu, **anfeng Tang, Tian**ang Zhao in Advances in Knowledge Discovery and Data M… (2023)

  11. No Access

    Chapter and Conference Paper

    Efficiently Answering Why-Not Questions on Radius-Bounded k-Core Searches

    The problem of searching radius-bounded k-cores (RB-k-cores) for a given query vertex is to find cohesive subgraphs satisfying both social and spatial constraints on geo-social networks. However, the search resul...

    Chuanyu Zong, Zefang Dong, **aochun Yang in Database Systems for Advanced Applications (2023)

  12. No Access

    Chapter and Conference Paper

    Study on Air Foam Flooding Technology to Enhance Oil Recovery of Mid Deep Complex Fault Block Reservoir by Water Injection

    In order to solve the problem of rapid increase in water content and decrease in production after water flooding in fault block reservoirs, the air foam flooding experiments of static low temperature oxidation...

    Huai-zhu Liu in Proceedings of the International Field Exp… (2022)

  13. No Access

    Chapter and Conference Paper

    Joint Pixel-Level and Feature-Level Unsupervised Domain Adaptation for Surveillance Face Recognition

    Face recognition (FR) is one of the most successful image analysis and understanding applications, which has recently received significant attentions. However, despite the remarkable progress in face recogniti...

    Huangkai Zhu, Huayi Yin, Du **a, Da-Han Wang in Pattern Recognition and Computer Vision (2022)

  14. No Access

    Chapter and Conference Paper

    A Lightweight Encrypted Network Traffic Classification Method Based on Protocol Field and K-Nearest Neighbor

    Encrypted traffic classification is a crucial issue to be addressed with popularization and application of encryption protocols in the network. How to identify and classify encrypted traffic with high efficien...

    Jiayuan Hu, Huahong Zhu, Rui Zhang in Proceedings of the 12th International Conf… (2022)

  15. No Access

    Chapter and Conference Paper

    Refined Weighted Fusion Recognition Method for High Conflict Information

    In synergy recognition, the fusion of multiple sources has to be considered to increase the reliability of target recognition. In classification fusion problem, it is considered that the classifiers have diffe...

    Xuxia Zhang, **angyu Pan, Huanna Zhu in Proceedings of 2021 International Conferen… (2022)

  16. No Access

    Chapter and Conference Paper

    Coal Mine Rescue Robots: Development, Applications and Lessons Learned

    This article describes the research on key technologies and lessons learned by Coal Mine Robotics Research Institute of China University of Mining and Technology in the design, development and applications of ...

    Menggang Li, Hua Zhu, Chaoquan Tang in Proceedings of 2021 International Conferen… (2022)

  17. No Access

    Chapter and Conference Paper

    Modeling and Analysis of Combat System Confrontation Based on Large-Scale Knowledge Graph Network

    Focusing on the confrontation analysis requirements of joint operation system of systems, this paper proposes an intelligent matching method of operational elements based on semantic features for typical large...

    Rupeng Liang, Lizhi Ying, Kebo Deng, Huawei Zhu, Wei Ma in Data Mining and Big Data (2022)

  18. No Access

    Chapter and Conference Paper

    Image Enhancement Effects on the Forensic Facial Recognition System

    In the field of forensic identification of human images, face recognition technology has become an important quantitative examination method for face similarity examination. Nevertheless, face image quality ha...

    **hua Zeng, **ulian Qiu, Qimeng Lu in Advances in Intelligent Automation and Sof… (2022)

  19. No Access

    Chapter and Conference Paper

    Beaver Triple Generator from Multiplicatively Homomorphic Key Management Protocol

    SPDZ, the nickname of secure multi-party computation (MPC) protocol of Damgård et al. from Crypto 2012, is an elegant secret value splitting technique which enjoys highly scalable and efficient multiplication...

    Huafei Zhu, Wee Keong Ng in Advanced Information Networking and Applications (2022)

  20. No Access

    Chapter and Conference Paper

    Design of Cold Chain Logistics Information Real Time Tracking System Based on Wireless RFID Technology

    In order to improve the proportion of cold chain distribution, effectively control transportation links and information, and ensure the quality of cold chain food, it is necessary to establish an effective mon...

    Wang Li-feng, Huang Fei, Guo-hua Zhu in Advanced Hybrid Information Processing (2022)

previous disabled Page of 7