Skip to main content

previous disabled Page of 2
and
  1. No Access

    Chapter and Conference Paper

    Semantics and completeness of Duration Calculus

    Duration Calculus was introduced in [1] as a notation to specify real-time systems, and as a calculus to verify theorems about such systems. Its distinctive feature is reasoning about durations of states within a...

    Michael R. Hansen, Zhou Chaochen in Real-Time: Theory in Practice (1992)

  2. Chapter and Conference Paper

    Information Service System For Small Forestowners

    Individual owned forests have boomed in the last decade in China. Hundreds of millions of private forest owners have emerged since years of afforestation practice and collective forest ownership reform. Most o...

    Shaochen Zhang, Yun Li in Computer and Computing Technologies in Agriculture II, Volume 3 (2009)

  3. Chapter and Conference Paper

    Small-Scale Evaluation of Tobacco Planting Suitability Based on Spatial Information Technology

    Crop planting suitability evaluation is important for agricultural production. In this study, a comprehensive evaluation framework which combined geographical information system, remote sensing, global positio...

    Fengrui Chen, Guangxiong Peng, Wei Su in Computer and Computing Technologies in Agr… (2012)

  4. No Access

    Chapter and Conference Paper

    The Study of Path Planning of Welding Manipulator Based on Improved Genetic Algorithm

    One of the key problems of welding manipulator design is Path planning. It is of great significance to Planning out a reasonable path for manipulator to increase the productivity of the manipulator. Using impr...

    Banglin Zhang, Bingyang Luo, **aoyue Zhu in Pervasive Computing and the Networked World (2014)

  5. No Access

    Article

    Predicting movie Box-office revenues by exploiting large-scale social media content

    Predicting the box-office revenue of a movie before its theatrical release is an important but challenging problem that requires a high level of Artificial Intelligence. Nowadays, social media has shown its pr...

    Ting Liu, **ao Ding, Yiheng Chen, Haochen Chen in Multimedia Tools and Applications (2016)

  6. No Access

    Article

    Weighted motion averaging for the registration of multi-view range scans

    Multi-view registration is a fundamental but challenging task in 3D reconstruction and robot vision. Although the original motion averaging algorithm has been introduced as an effective means to solve the mult...

    Rui Guo, Jihua Zhu, Yaochen Li, Dapeng Chen in Multimedia Tools and Applications (2018)

  7. No Access

    Chapter and Conference Paper

    Research on the Security of Personal Information in the Era of Big Data

    The advent of the era of big data has made people’s lives more intelligent and convenient, and has brought enormous value to human beings. At the same time, it has brought about a lot of challenges. Personal ...

    Cheng Chi, Tengyu Liu, **aochen Yu in Artificial Intelligence for Communications… (2019)

  8. Chapter and Conference Paper

    Philosophical Principles of Data Discovery

    Data discovery is a basis in science and technology research because of nothing to do in case of no data. So, it is very important to find data. Where is the data? Data exists in the research objects which inc...

    Quan Wu, Min Liu, Juanying Sun, Weijie Jiao in Computer and Computing Technologies in Agr… (2019)

  9. No Access

    Chapter and Conference Paper

    Adaptive Position and Force Tracking Control in Teleoperation System with Time-Varying Delays

    In this work, a novel position and force tracking control scheme are proposed in teleoperation system under time-varying delay and uncertain dynamics. First, two new auxiliary variables are designed for the ma...

    Haochen Zhang, Aiguo Song, Huijun Li in Intelligent Robotics and Applications (2019)

  10. No Access

    Article

    A near-end listening enhancement system by RNN-based noise cancellation and speech modification

    When people listen to the phone in noisy environments, near-end listening enhancement (NELE) is a technology to enhance speech intelligibility against environmental noise. The complex environments in mobile co...

    Gang Li, Ruimin Hu, **aochen Wang, Rui Zhang in Multimedia Tools and Applications (2019)

  11. No Access

    Article

    Audio object coding based on optimal parameter frequency resolution

    Object-based audio content is becoming the main form of audio content, because it is more interactive and flexible than traditional channel-based audio content. The Spatial Audio Object Coding (SAOC) method is...

    Tingzhao Wu, Ruimin Hu, **aochen Wang, Shanfa Ke in Multimedia Tools and Applications (2019)

  12. No Access

    Chapter and Conference Paper

    Resource Allocation Scheme Design in Power Wireless Heterogeneous Networks Considering Load Balance

    Recently, in heterogeneous smart grids, mobile network traffic and various power interconnection services grow in a high way. Caching the service at the edge of smart grid network is a common optimization meth...

    Shuiyao Chen, Di Zhai, Wei Bai, Haochen Guan, ** Ma in Mobile Networks and Management (2020)

  13. No Access

    Article

    Multi-view point cloud registration with adaptive convergence threshold and its application in 3D model retrieval

    Multi-view point cloud registration is a hot topic in the communities of artificial intelligence and multimedia technology. In this paper, we propose a novel framework to reconstruct 3D models with a multi-vie...

    Yaochen Li, Ying Liu, Rui Sun, Rui Guo, Li Zhu in Multimedia Tools and Applications (2020)

  14. No Access

    Article

    A map** model of spectral tilt in normal-to-Lombard speech conversion for intelligibility enhancement

    Environmental noise degrades the speech intelligibility when listening to the phone. Although the phone has a clean signal source, it is still difficult for the listener to get information. Intelligibility enh...

    Gang Li, Ruimin Hu, Rui Zhang, **aochen Wang in Multimedia Tools and Applications (2020)

  15. No Access

    Article

    Single Channel multi-speaker speech Separation based on quantized ratio mask and residual network

    The recently-proposed deep clustering-based algorithms represent a fundamental advance towards the single-channel multi-speaker speech sep- aration problem. These methods use an ideal binary mask to construct ...

    Shanfa Ke, Ruimin Hu, **aochen Wang, Tingzhao Wu in Multimedia Tools and Applications (2020)

  16. No Access

    Article

    Optimization of sound fields reproduction based Higher-Order Ambisonics (HOA) using the Generative Adversarial Network (GAN)

    Sound field reproduction using Higher-order Ambisonics (HOA) has many studies in recent years. However, in the HOA, sound fields are reproduced with the least square solution of spherical harmonics (SH) coeffi...

    Lingkun Zhang, **aochen Wang, Ruimin Hu, Dengshi Li in Multimedia Tools and Applications (2021)

  17. Article

    Open Access

    Suffix-based double reader tag movement RFID anti-collision method

    At present, some existing tag anti-collision algorithms are used mostly in scenarios of fixed number of tags and they perform poorly in tag moving scenarios. Therefore, this paper proposes a double reader tag ...

    Haochen Lv, **aowu Li, Lianyin Jia, Runxin Li, Jiaman Ding in Journal of Cloud Computing (2021)

  18. No Access

    Article

    Estimation of spherical harmonic coefficients in sound field recording using feed-forward neural networks

    Sound field recording using spherical harmonics (SH) has been widely used. However, too many microphones are needed when recording sound fields over large areas, due to the capture of the higher order of spher...

    Lingkun Zhang, **aochen Wang, Ruimin Hu, Dengshi Li in Multimedia Tools and Applications (2021)

  19. No Access

    Article

    Audio object coding based on N-step residual compensating

    Object-based audio techniques provide more flexibility and convenience for personalized rendering under various playback configurations. Many methods have been proposed to encode and transmit multiple audio ob...

    Chenhao Hu, **aochen Wang, Ruimin Hu, Yulin Wu in Multimedia Tools and Applications (2021)

  20. No Access

    Article

    A dual-tamper-detection method for digital image authentication and content self-recovery

    This paper proposes an approach to protect image content against malicious tampering based on watermarking technology. The watermark is composed of two kinds of check bits which are used for tampered region lo...

    Tong Liu, **aochen Yuan in Multimedia Tools and Applications (2021)

previous disabled Page of 2