Skip to main content

and
Your search also matched 334 preview-only Content is preview-only when you or your institution have not yet subscribed to it.

By making our abstracts and previews universally accessible we help you purchase only the content that is relevant to you.
results, e.g.

An enhanced object detection network for ship target detection in SAR images

Include preview-only content
  1. Article

    Open Access

    Classification of barely visible impact damage in composite laminates using deep learning and pulsed thermographic inspection

    With the increasingly comprehensive utilisation of Carbon Fibre-Reinforced Polymers (CFRP) in modern industry, defects detection and characterisation of these materials have become very important and draw sign...

    Kailun Deng, Haochen Liu, Lichao Yang, Sri Addepalli in Neural Computing and Applications (2023)

  2. Article

    Open Access

    A semi-supervised short text sentiment classification method based on improved Bert model from unlabelled data

    Short text information has considerable commercial value and immeasurable social value. Natural language processing and short text sentiment analysis technology can organize and analyze short text information ...

    Haochen Zou, Zitao Wang in Journal of Big Data (2023)

  3. Article

    Open Access

    A machine learning-based clustering approach to diagnose multi-component degradation of aircraft fuel systems

    Accurate fault diagnosis and prognosis can significantly reduce maintenance costs, increase the safety and availability of engineering systems that have become increasingly complex. It has been observed that v...

    Haochen Liu, Yifan Zhao, Anna Zaporowska, Zakwan Skaf in Neural Computing and Applications (2023)

  4. Article

    Open Access

    Automatic reconstruction of irregular shape defects in pulsed thermography using deep learning neural network

    Quantitative defect and damage reconstruction play a critical role in industrial quality management. Accurate defect characterisation in Infrared Thermography (IRT), as one of the widely used Non-Destructive T...

    Haochen Liu, Wenhan Li, Lichao Yang, Kailun Deng in Neural Computing and Applications (2022)

  5. Article

    Open Access

    CrowdMed-II: a blockchain-based framework for efficient consent management in health data sharing

    The healthcare industry faces serious problems with health data. Firstly, health data is fragmented and its quality needs to be improved. Data fragmentation means that it is difficult to integrate the patient ...

    Chaochen Hu, Chao Li, Guigang Zhang, Zhiwei Lei, Mira Shah, Yong Zhang in World Wide Web (2022)

  6. Article

    Open Access

    Suffix-based double reader tag movement RFID anti-collision method

    At present, some existing tag anti-collision algorithms are used mostly in scenarios of fixed number of tags and they perform poorly in tag moving scenarios. Therefore, this paper proposes a double reader tag ...

    Haochen Lv, **aowu Li, Lianyin Jia, Runxin Li, Jiaman Ding in Journal of Cloud Computing (2021)

  7. Article

    Deep cross-platform product matching in e-commerce

    Online shop** has become more and more popular in recent years, which leads to a prosperity on online platforms. Generally, the identical products are provided by many sellers on multiple platforms. Thus the...

    Juan Li, Zhicheng Dou, Yutao Zhu, **aochen Zuo in Information Retrieval Journal (2020)

  8. Chapter and Conference Paper

    Neural Multi-task Learning for Teacher Question Detection in Online Classrooms

    Asking questions is one of the most crucial pedagogical techniques used by teachers in class. It not only offers open-ended discussions between teachers and students to exchange ideas but also provokes deeper ...

    Gale Yan Huang, Jiahao Chen, Haochen Liu in Artificial Intelligence in Education (2020)

  9. Chapter and Conference Paper

    Philosophical Principles of Data Discovery

    Data discovery is a basis in science and technology research because of nothing to do in case of no data. So, it is very important to find data. Where is the data? Data exists in the research objects which inc...

    Quan Wu, Min Liu, Juanying Sun, Weijie Jiao in Computer and Computing Technologies in Agr… (2019)

  10. Chapter and Conference Paper

    Parallel Search by Reinforcement Learning for Object Detection

    Object detection algorithms generally search through extensive potential areas without considering spatial correlations. To fully utilize rich information contained in high-level image features, a hierarchical...

    Ye Huang, Chaochen Gu, Kaijie Wu, ** Guan in Pattern Recognition and Computer Vision (2018)

  11. Chapter and Conference Paper

    A Security-Enhanced vTPM 2.0 for Cloud Computing

    Virtual Trusted Platform Module is required in cloud due to the scalability and migration of virtual machine. Through allocating a vTPM (Virtual Trusted Platform Module) to a VM (Virtual Machine), users of VM...

    Juan Wang, Feng **ao, Jianwei Huang, Daochen Zha in Information and Communications Security (2018)

  12. Chapter and Conference Paper

    Three Dimensional Stress Wave Imaging Method of Wood Internal Defects Based on TKriging

    In order to detect the size, shape and degree of decay inside wood, a three dimensional stress wave imaging method based on TKriging is proposed. The method uses sensors to obtain the stress wave velocity data...

    **aochen Du, Hailin Feng, Mingyue Hu, Yiming Fang, Jiajie Li in Computer Vision (2017)

  13. Chapter and Conference Paper

    Deep CORAL: Correlation Alignment for Deep Domain Adaptation

    Deep neural networks are able to learn powerful representations from large quantities of labeled input data, however they cannot always generalize well across changes in input distributions. Domain adaptation ...

    Baochen Sun, Kate Saenko in Computer Vision – ECCV 2016 Workshops (2016)

  14. Chapter and Conference Paper

    MB-DDIVR: A Map-Based Dynamic Data Integrity Verification and Recovery Scheme in Cloud Storage

    Outsourcing data to are remote cloud service provider allows organizations or individual users to store more data on the cloud storage than on private computer systems. However, a specific problem encountered ...

    Zizhou Sun, Yahui Yang, Qingni Shen, Zhonghai Wu in Information and Communications Security (2016)

  15. Chapter and Conference Paper

    Small-Scale Evaluation of Tobacco Planting Suitability Based on Spatial Information Technology

    Crop planting suitability evaluation is important for agricultural production. In this study, a comprehensive evaluation framework which combined geographical information system, remote sensing, global positio...

    Fengrui Chen, Guangxiong Peng, Wei Su in Computer and Computing Technologies in Agr… (2012)

  16. Chapter and Conference Paper

    Information Service System For Small Forestowners

    Individual owned forests have boomed in the last decade in China. Hundreds of millions of private forest owners have emerged since years of afforestation practice and collective forest ownership reform. Most o...

    Shaochen Zhang, Yun Li in Computer and Computing Technologies in Agriculture II, Volume 3 (2009)

  17. Chapter

    Program Verification by Using DISCOVERER

    Recent advances in program verification indicate that various verification problems can be reduced to semi-algebraic system (SAS for short) solving. An SAS consists of polynomial equations and polynomial inequ...

    Lu Yang, Naijun Zhan, Bican **a in Verified Software: Theories, Tools, Experi… (2008)