Skip to main content

previous disabled Page of 2
and
  1. No Access

    Chapter and Conference Paper

    Design Technology of Multi-AGV Warehouse Intelligent Scheduling Optimization Control System

    Different from the traditional warehousing system, in the multi-AGV warehouse scheduling control system, the constraints of poor connectivity of the conveying track have led to the emergence of urgent problems...

    YanPeng Pan, XueTing Zhang, FuQuan Zhang, LiLi Tan in Genetic and Evolutionary Computing (2024)

  2. No Access

    Chapter and Conference Paper

    Multi-pair Contrastive Learning Based on Same-Timestamp Data Augmentation for Sequential Recommendation

    The core of sequential recommendations is to model users’ dynamic preferences from their sequential historical behaviors. Bidirectional representation models can make better sequential recommendations because ...

    Shun Zheng, Shaoqing Wang, Lijie Zhang, Yao Zhang, Fuzhen Sun in Web and Big Data (2024)

  3. No Access

    Chapter and Conference Paper

    Bidirectional Delay Estimation of Motor Control Systems at Different Muscle Contraction Levels

    Reliable estimation of bidirectional delays in motor control systems is crucial for uncovering underlying physiological mechanisms. However, previous studies have largely overlooked the delay in information tr...

    **biao Liu, **nhang Li, Lijie Wang, Manli Luo in Intelligent Robotics and Applications (2023)

  4. No Access

    Chapter and Conference Paper

    Research on Visual Localization of Cutter Changing Robot in Unstructured Environments

    Due to the non-closed-loop control of the cutter head and the uncertain environments of the excavation chamber, it is impossible to obtain the precise positioning of the cutter. Therefore, a robot cutter chang...

    Qiankun Wu, Hang Yang, Zhengdao Li, Feihu Peng in Intelligent Robotics and Applications (2023)

  5. No Access

    Chapter and Conference Paper

    TBM Tunnel Surrounding Rock Debris Detection Based on Improved YOLO v8

    Real time detection of debris particle size is an important means to ensure the safe and efficient construction of TBM. In response to the problems of similar background, random and diverse contours, dense dis...

    Lianhui Jia, Heng Wang, Yongliang Wen, Lijie Jiang in Intelligent Robotics and Applications (2023)

  6. No Access

    Chapter and Conference Paper

    A Shield Machine Segment Position Recognition Algorithm Based on Improved Voxel and Seed Filling

    In response to the problems of low execution efficiency and poor real-time performance of traditional point cloud clustering algorithms when there is a large amount of point cloud data, which cannot meet the r...

    Pei Zhang, Lijie Jiang, Yongliang Wen, Heng Wang in Intelligent Robotics and Applications (2023)

  7. No Access

    Chapter and Conference Paper

    Design and Experiment of Muck Removal Robot for Tunneling Boring Machine

    Aiming at the problem of cleaning and transportation of muck at the bottom of the tunnel, a new muck cleaning, and transportation scheme is proposed, and the effectiveness of the scheme is verified. Firstly, a...

    Lianhui Jia, Lijie Jiang, Yanming Sun in Advances in Mechanism, Machine Science and… (2023)

  8. No Access

    Chapter and Conference Paper

    Path Planning for Muck Removal Robot of Tunnel Boring Machine

    The muck removal operation in tunnel boring machine (TBM) construction seriously restricts the safety and efficiency of tunnel engineering

    Lijie Jiang, Yanming Sun, Yixin Wang, **aowei Yuan in Intelligent Robotics and Applications (2023)

  9. No Access

    Chapter and Conference Paper

    Support Boot Mechanisms of Shaft Boring Machine for Underground Vertical Tunnel Construction

    Shaft boring machines are significant to the mechanized construction of underground vertical tunnels in water conservancy projects, underground mining, transport infrastructure, etc. As one of the main compone...

    Qizhi Meng, Lianhui Jia, Lijie Jiang in Intelligent Robotics and Applications (2023)

  10. No Access

    Chapter and Conference Paper

    SeSQL: A High-Quality Large-Scale Session-Level Chinese Text-to-SQL Dataset

    As the first session-level Chinese dataset, CHASE contains two separate parts, i.e., 2,003 sessions manually constructed from scratch (CHASE-C), and 3,456 sessions translated from English SParC (CHASE-T). We f...

    Saihao Huang, Lijie Wang, Zhenghua Li in Natural Language Processing and Chinese Co… (2023)

  11. No Access

    Chapter and Conference Paper

    A Flight Simulation Model Architecture for Reinforcement Learning

    For the reinforcement learning of agents in virtual environment, a flight simulation model architecture is designed by combining the integration method, flight algorithm, external force calculation, earth mode...

    KaiXuan Wang, YuTing Shen, FuQuan Zhang, Nan Zhao in Genetic and Evolutionary Computing (2022)

  12. No Access

    Chapter and Conference Paper

    Reconstructing Specific Neural Components for SSVEP Identification

    Brain-computer interfaces (BCIs) enable the brain to communicate directly with external devices. Steady-state visual evoked potential (SSVEP) is periodic response evoked by a continuous visual stimulus at a sp...

    Lijie Wang, **biao Liu, Tao Tang, Linqing Feng in Intelligent Robotics and Applications (2022)

  13. No Access

    Chapter and Conference Paper

    The Trade Effects of the US Tariffs on China (2018–2019): Evidence from Dual Margins Perspective

    Based on the reality that the US imposed additional tariffs on Chinese products in 2018–2019, this paper probes into the trade effects of the additional tariffs from dual margins perspective, using monthly imp...

    Lijie Jiang, Quanlin Lai, **aoqing Li in Proceedings of the 5th International Confe… (2022)

  14. No Access

    Chapter and Conference Paper

    Faster and Better Grammar-Based Text-to-SQL Parsing via Clause-Level Parallel Decoding and Alignment Loss

    As a mainstream approach, grammar-based models have achieved high performance in text-to-SQL parsing task, but suffer from low decoding efficiency since the number of actions for building SQL trees are much la...

    Kun Wu, Lijie Wang, Zhenghua Li, **nyan **ao in Natural Language Processing and Chinese Co… (2022)

  15. No Access

    Chapter and Conference Paper

    Radio Frequency Identification (RFID) Data Transmission Security

    With the rapid development of Internet of Things technology, the RFID products can be found at every corner of our lives and work. On one hand, they bring us efficiency and convenience. On the other hand, they...

    Lijie Wang in Frontier Computing (2021)

  16. No Access

    Chapter and Conference Paper

    Rotation-DPeak: Improving Density Peaks Selection for Imbalanced Data

    Density Peak (DPeak) is an effective clustering algorithm. It maps arbitrary dimensional data onto a 2-dimensional space, which yields cluster centers and outliers automatically distribute on upper right and u...

    **aoliang Hu, Ming Yan, Yewang Chen, Lijie Yang, Jixiang Du in Big Data (2021)

  17. No Access

    Chapter and Conference Paper

    Comparative Analysis of Rain Attenuation Prediction Models for Terrestrial Links in Different Climates

    In view of the difference of rain attenuation law between tropical climate and temperate climate, two rain attenuation prediction models based on inverse Gaussian distribution and Gamma distribution are propos...

    Lijie Wang, Hui Li in Communications, Signal Processing, and Systems (2021)

  18. No Access

    Chapter and Conference Paper

    Power Allocation Based on Complex Shape Method in NOMA System

    Power allocation is critical to non-orthogonal multiple access (NOMA) system. Aiming at the problem that the traditional fixed power allocation (FPA) algorithm and the fractional transmit power allocation (FTP...

    Jie Cheng, Hui Li, Lijie Wang, Chi Zhang in Communications, Signal Processing, and Sys… (2021)

  19. No Access

    Chapter and Conference Paper

    A Generative Steganography Method Based on WGAN-GP

    With the development of Generative Adversarial Networks (GAN), GAN-based steganography and steganalysis techniques have attracted much attention from researchers. In this paper, we propose a novel image stegan...

    Jun Li, Ke Niu, Liwei Liao, Lijie Wang, Jia Liu in Artificial Intelligence and Security (2020)

  20. No Access

    Chapter and Conference Paper

    Nanocellulose Prepared from Cassava Residues by Mechanochemical Method and Its Hydrophobic Modification

    This study prepared nanocellulose from cassava residues by the mechanochemical method which adopted phosphoric acid as aids and used high-speed dispersion to offer mechanical force, aiming to improve the prope...

    Yinghan Shi, Guangxue Chen, Qifeng Chen in Advances in Graphic Communication, Printin… (2019)

previous disabled Page of 2