-
Chapter and Conference Paper
Semantics and completeness of Duration Calculus
Duration Calculus was introduced in [1] as a notation to specify real-time systems, and as a calculus to verify theorems about such systems. Its distinctive feature is reasoning about durations of states within a...
-
Chapter and Conference Paper
Information Service System For Small Forestowners
Individual owned forests have boomed in the last decade in China. Hundreds of millions of private forest owners have emerged since years of afforestation practice and collective forest ownership reform. Most o...
-
Chapter and Conference Paper
Small-Scale Evaluation of Tobacco Planting Suitability Based on Spatial Information Technology
Crop planting suitability evaluation is important for agricultural production. In this study, a comprehensive evaluation framework which combined geographical information system, remote sensing, global positio...
-
Chapter and Conference Paper
The Study of Path Planning of Welding Manipulator Based on Improved Genetic Algorithm
One of the key problems of welding manipulator design is Path planning. It is of great significance to Planning out a reasonable path for manipulator to increase the productivity of the manipulator. Using impr...
-
Article
Predicting movie Box-office revenues by exploiting large-scale social media content
Predicting the box-office revenue of a movie before its theatrical release is an important but challenging problem that requires a high level of Artificial Intelligence. Nowadays, social media has shown its pr...
-
Article
Weighted motion averaging for the registration of multi-view range scans
Multi-view registration is a fundamental but challenging task in 3D reconstruction and robot vision. Although the original motion averaging algorithm has been introduced as an effective means to solve the mult...
-
Chapter and Conference Paper
Research on the Security of Personal Information in the Era of Big Data
The advent of the era of big data has made people’s lives more intelligent and convenient, and has brought enormous value to human beings. At the same time, it has brought about a lot of challenges. Personal ...
-
Chapter and Conference Paper
Philosophical Principles of Data Discovery
Data discovery is a basis in science and technology research because of nothing to do in case of no data. So, it is very important to find data. Where is the data? Data exists in the research objects which inc...
-
Chapter and Conference Paper
Adaptive Position and Force Tracking Control in Teleoperation System with Time-Varying Delays
In this work, a novel position and force tracking control scheme are proposed in teleoperation system under time-varying delay and uncertain dynamics. First, two new auxiliary variables are designed for the ma...
-
Article
A near-end listening enhancement system by RNN-based noise cancellation and speech modification
When people listen to the phone in noisy environments, near-end listening enhancement (NELE) is a technology to enhance speech intelligibility against environmental noise. The complex environments in mobile co...
-
Article
Audio object coding based on optimal parameter frequency resolution
Object-based audio content is becoming the main form of audio content, because it is more interactive and flexible than traditional channel-based audio content. The Spatial Audio Object Coding (SAOC) method is...
-
Chapter and Conference Paper
Resource Allocation Scheme Design in Power Wireless Heterogeneous Networks Considering Load Balance
Recently, in heterogeneous smart grids, mobile network traffic and various power interconnection services grow in a high way. Caching the service at the edge of smart grid network is a common optimization meth...
-
Article
Multi-view point cloud registration with adaptive convergence threshold and its application in 3D model retrieval
Multi-view point cloud registration is a hot topic in the communities of artificial intelligence and multimedia technology. In this paper, we propose a novel framework to reconstruct 3D models with a multi-vie...
-
Article
A map** model of spectral tilt in normal-to-Lombard speech conversion for intelligibility enhancement
Environmental noise degrades the speech intelligibility when listening to the phone. Although the phone has a clean signal source, it is still difficult for the listener to get information. Intelligibility enh...
-
Article
Single Channel multi-speaker speech Separation based on quantized ratio mask and residual network
The recently-proposed deep clustering-based algorithms represent a fundamental advance towards the single-channel multi-speaker speech sep- aration problem. These methods use an ideal binary mask to construct ...
-
Article
Optimization of sound fields reproduction based Higher-Order Ambisonics (HOA) using the Generative Adversarial Network (GAN)
Sound field reproduction using Higher-order Ambisonics (HOA) has many studies in recent years. However, in the HOA, sound fields are reproduced with the least square solution of spherical harmonics (SH) coeffi...
-
Article
Open AccessSuffix-based double reader tag movement RFID anti-collision method
At present, some existing tag anti-collision algorithms are used mostly in scenarios of fixed number of tags and they perform poorly in tag moving scenarios. Therefore, this paper proposes a double reader tag ...
-
Article
Estimation of spherical harmonic coefficients in sound field recording using feed-forward neural networks
Sound field recording using spherical harmonics (SH) has been widely used. However, too many microphones are needed when recording sound fields over large areas, due to the capture of the higher order of spher...
-
Article
Audio object coding based on N-step residual compensating
Object-based audio techniques provide more flexibility and convenience for personalized rendering under various playback configurations. Many methods have been proposed to encode and transmit multiple audio ob...
-
Article
A dual-tamper-detection method for digital image authentication and content self-recovery
This paper proposes an approach to protect image content against malicious tampering based on watermarking technology. The watermark is composed of two kinds of check bits which are used for tampered region lo...