Skip to main content

previous disabled Page of 2
and
  1. No Access

    Chapter and Conference Paper

    Multi-layer Cross-Scale Coupling Feature Pyramid Network for Food Logo Detection

    Food logos typically serve as a visual representation of a food brand or product by using unique and recognizable images or graphics that are related to the brand or product, such as food items, utensils, or c...

    Baisong Zhang, Sujuan Hou, Songhui Zhao in Advances in Haptics and Virtual Reality (2024)

  2. No Access

    Chapter and Conference Paper

    Fabric Smart Contract Read-After-Write Risk Detection Method Based on Key Methods and Call Chains

    Fabric is currently the most popular consortium chain platform with a modular architecture that provides high security, elasticity, flexibility and scalability. Smart contracts realize the automatic execution ...

    Feixiang Ren, Sujuan Qin in Smart Computing and Communication (2023)

  3. No Access

    Chapter and Conference Paper

    Investigation of Pumped Storage Power Station Construction Conditions in Guangdong Province

    With the determination of China’s “carbon peaking and carbon neutrality goals”, a large number of pumped storage power stations will be planned to be built in Guangdong Province in the next 10–15 years. This p...

    Youkun Luo, **ong **ao, Ying Yuan in Conference Proceedings of 2022 2nd Interna… (2023)

  4. No Access

    Chapter and Conference Paper

    Evolution of Building Information Modelling (BIM) Policy: The Case of Hong Kong

    Around the world many governments are increasingly pushing for wide-scale adoption of Building Information Modelling (BIM) in the architecture, engineering, and construction (AEC) industry. Central to this dri...

    Sujuan Zhang, Kwadwo Oti-Sarpong in Proceedings of the 26th International Symp… (2022)

  5. No Access

    Chapter and Conference Paper

    Research on Data Fault-Tolerance Method Based on Disk Bad Track Isolation

    Disk is not only an important carrier to save data, but also a key component of storage system. It is of great significance to improve the reliability and data availability of disk. In the big data environment...

    Xu Zhang, Li Zheng, Sujuan Zhang in Smart Computing and Communication (2022)

  6. No Access

    Chapter and Conference Paper

    Improved Efficient Dictionary Learning with Cross-Label and Group Regularization

    Existing works have revealed that dictionary learning can effectively preserve the label property when applied to signal reconstruction and face recognition. As time goes, the methods based on dictionary learn...

    Tian Zhou, Sujuan Yang, Jian **ong, Jie Yang in Communications, Signal Processing, and Sys… (2020)

  7. Chapter and Conference Paper

    DeLTR: A Deep Learning Based Approach to Traffic Light Recognition

    Traffic light recognition is crucial for the intelligent driving system. In the application scenarios, the environment of traffic lights is very complicated, due to different weather, distance and distortion ...

    Yiyang Cai, Chenghua Li, Sujuan Wang, Jian Cheng in Image and Graphics (2019)

  8. No Access

    Chapter and Conference Paper

    Research on the Relationship Between Sound and Speed of a DC Motor

    It is a common phenomenon that when a motor runs, there is a sound. In addition, when the motor accelerates or decelerates, the sound changes. The underlying reason is surmised to be that the speed is a comple...

    **liang Zhang, Sujuan Wang, Zhenyu Chen in Advanced Manufacturing and Automation VIII (2019)

  9. No Access

    Chapter and Conference Paper

    Design and Implementation of PCB Detection and Classification System Based on Machine Vision

    In this paper, an optimization method, which uses the combination of machine vision and automatic technology, is proposed and applied to the process of defect detection and classification of PCB. This study fo...

    Zhiwei Shen, Sujuan Wang, Jianfang Dou in Advanced Manufacturing and Automation VIII (2019)

  10. Chapter and Conference Paper

    VisDrone-DET2018: The Vision Meets Drone Object Detection in Image Challenge Results

    Object detection is a hot topic with various applications in computer vision, e.g., image understanding, autonomous driving, and video surveillance. Much of the progresses have been driven by the availability of ...

    Pengfei Zhu, Longyin Wen, Dawei Du, **ao Bian in Computer Vision – ECCV 2018 Workshops (2019)

  11. No Access

    Chapter and Conference Paper

    Numerical Instability Study of Supercritical Water Flowing Upward in Two Heated Parallel Channels

    A three-dimensional (3D) numerical simulation has been carried out using a RANS model in CFD ANSYS CFX v15.0 to investigate the out of phase oscillation instability between two heated parallel channels with su...

    Sujuan Li, Vijay Chatoorgoon, Scott Ormiston in Proceedings of The 20th Pacific Basin Nucl… (2017)

  12. No Access

    Chapter and Conference Paper

    SCVD: A New Semantics-Based Approach for Cloned Vulnerable Code Detection

    The behavior of copying existing code to reuse or modify its functionality is very common in the software development. However, when developers clone the existing code, they also clone any vulnerabilities in i...

    Deqing Zou, Hanchao Qi, Zhen Li, Song Wu in Detection of Intrusions and Malware, and V… (2017)

  13. No Access

    Chapter and Conference Paper

    Updatable Lossy Trapdoor Functions and Its Application in Continuous Leakage

    Lossy trapdoor functions (LTFs) were firstly introduced by Peikert and Waters [2]. Since their introduction, LTFs have found numerous applications. In this paper we focus on the LTFs in the continuous leakage. We...

    Sujuan Li, Yi Mu, Mingwu Zhang, Futai Zhang in Provable Security (2016)

  14. No Access

    Chapter and Conference Paper

    Image Retrieval of Poisonous Mushrooms Based on Relevance Feedback and Clustering Algorithm

    Poisonous mushrooms have no significant difference with the edible fungus. In this paper, image retrieval technology based on color, shape and texture characteristic are applied to identify poisonous mushrooms...

    Hongbo Luo, Sujuan Zhou in Proceedings of the Second International Co… (2015)

  15. No Access

    Chapter and Conference Paper

    Solution of the Glare Risk in Vehicle Inner Trim Designing

    With the trend of vehicle inner trim design develo**, quantities of highlight materials and auto amusement equipments are applied such as chrome-plate and DVD cruise system. The fashionable stuffs mentioned ...

    Mengdong Mi, Yongqing Liu, Congwen Yu in Proceedings of the FISITA 2012 World Autom… (2013)

  16. No Access

    Chapter and Conference Paper

    Research on College English Autonomous Learning Mode Based on Computer Networks

    College English autonomous learning mode based on computer networks is the development trend of college English teaching reform. In the paper, the college English autonomous learning mode based on computer net...

    Sujuan Wang in Proceedings of the 2nd International Confe… (2013)

  17. No Access

    Chapter and Conference Paper

    Analysis and Construction of Efficient RFID Authentication Protocol with Backward Privacy

    Privacy of RFID systems is receiving increasing attentions in the RFID community and an important issue required as to the security of RFID system. Backward privacy means the adversary can not trace the tag la...

    Shaohui Wang, Sujuan Liu, Danwei Chen in Advances in Wireless Sensor Networks (2013)

  18. No Access

    Chapter and Conference Paper

    Experiment Analysis on the Bubble Sort Algorithm and Its Improved Algorithms

    We present a robust framework for the estimation of surface curvature on conformal alpha shapes. We propose a data structure for conformal alpha shape based on alpha shape, present a method to compute conforma...

    Lin Li, SuJuan Rui in Information Engineering and Applications (2012)

  19. No Access

    Chapter and Conference Paper

    Digital and Analog Compatible TV Transmitter Power Measurement

    The transmission power of analog TV transmitter is always measured as visual peak power, that is, the power level reaches while the synchronizing pulses are being transmitted, and so ordinary power meter canno...

    Sujuan Zhang, Yanli Zhang, Yongchang Liu, Jun Ma in Information Computing and Applications (2012)

  20. No Access

    Chapter and Conference Paper

    Using Variable Precision Rough Set Model to Build FP-Tree of Association Rules

    The main mission of the variable precision rough set is to solve the problem of non-functional of properties or the classification in uncertain relationship data. FP-TREE of Association rule is one of the impo...

    SuJuan Qian, ZhiQiang Zhang in Advances in Computer Science and Information Engineering (2012)

previous disabled Page of 2