Skip to main content

previous disabled Page of 2
and
  1. No Access

    Article

    End-to-End Entity Detection with Proposer and Regressor

    Named entity recognition is a traditional task in natural language processing. In particular, nested entity recognition receives extensive attention for the widespread existence of the nesting scenario. The la...

    Xueru Wen, Changjiang Zhou, Haotian Tang, Luguang Liang in Neural Processing Letters (2023)

  2. No Access

    Article

    DCTN: a dense parallel network combining CNN and transformer for identifying plant disease in field

    Crop diseases can have a detrimental impact on crop growth, resulting in a significant reduction in crop yield. Therefore, accurate detection of these diseases is crucial for enhancing crop productivity. Despi...

    Denghao Pang, Hong Wang, Jian Ma, Dong Liang in Soft Computing (2023)

  3. No Access

    Chapter and Conference Paper

    Long-Range Delivery and High-Efficiency Actuation of Magnetic Freezing Compact Toroid for Failed Spacecraft Despinning

    With the increasing seriousness of the space debris environment, develo** debris de-orbiting and removal techniques is imperative. Space debris rotates rapidly, so despinning must be performed before removal...

    Ma Tian, Zhao Hong-Liang, Chen Peng-Lin in Proceedings of 2022 International Conferen… (2023)

  4. No Access

    Chapter and Conference Paper

    A Brief Overview of Recent Energy-Saving Researches in Smart Homes

    This paper gives a brief overview on the topic of energy saving in smart homes. It provides introduction of some recent researches and developments of energy-saving schemes for smart homes, so that helps reade...

    Tien-Wen Sung, Qiaoxin Liang, Zeming Huang in Advances in Intelligent Information Hiding… (2023)

  5. No Access

    Reference Work Entry In depth

    Privacy Preservation in Big Data Analytics

    Yu-Chuan Tsai, Shyue-Liang Wang, Tzung-Pei Hong in Granular, Fuzzy, and Soft Computing (2023)

  6. No Access

    Chapter and Conference Paper

    An Improved Lightweight Traffic Sign Detection Model for Embedded Devices

    The target detection algorithm based on the YOLO-v4 model can realize real-time traffic signs because of high detection accuracy and fast detection speed. Owing to the lack of sufficient computing resources an...

    Yu Wenze, Liang Quan, Zhang Zicheng in Proceedings of the International Conferenc… (2022)

  7. No Access

    Chapter and Conference Paper

    Research on Vehicle Detection Algorithm Based on Improved YOLO

    Object detection algorithm has high recognition accuracy and fast detection speed, but there are also obvious problems. The positioning is inaccurate because the network uses an end-to-end model that generates...

    ****g Hu, Quan Liang, Zicheng Zhang in Proceedings of the International Conferenc… (2022)

  8. No Access

    Chapter and Conference Paper

    Exceeding the Performance of Two-Tier Fat-Tree: Equality Network Topology

    A high-performance interconnect topology system named Equality is introduced in this paper for general purpose applications including supercomputing, data center, cloud service, and industrial cluster solution...

    Chane-Yuan Yang, Chi-Hsiu Liang, Hong-Lin Wu in Advances in Information and Communication (2020)

  9. No Access

    Article

    Weibull statistical modeling for textured image retrieval using nonsubsampled contourlet transform

    In this paper, we proposed a new framework for textured image retrieval, which is based on Weibull statistical distribution and nonsubsampled contourlet transform. Firstly, the image is decomposed into one low...

    Hong-ying Yang, Lin-lin Liang, Can Zhang, Xue-bing Wang, Pan-pan Niu in Soft Computing (2019)

  10. No Access

    Book and Conference Proceedings

  11. Chapter and Conference Paper

    Correction to: Proceedings of the Fifth Euro-China Conference on Intelligent Data Analysis and Applications

    In the original version of the book, the first affiliation “Princeton University, Princeton, NJ 08544, USA” has to be removed for chapter authors “Lu Sun” and “Yuan Tian” in chapters “A Minimum Spanning Tree A...

    Pavel Krömer, Hong Zhang, Yongquan Liang in Proceedings of the Fifth Euro-China Confer… (2019)

  12. No Access

    Chapter and Conference Paper

    Memristive Extreme Learning Machine: A Neuromorphic Implementation

    Neuromorphic computation has been a hot research area over the past few years. Memristor, as one of the neuromorphic computation materials memorizes the conductance value and is able to adapt it according to c...

    Lu Zhang, Hong Cheng, Huanghuang Liang, Yang Zhao, **nqiang Pan in Proceedings of ELM-2017 (2019)

  13. No Access

    Chapter and Conference Paper

    TDT_CC: A Hot Topic Detection and Tracking Algorithm Based on Chain of Causes

    With the development and application of Web3.0, it has become a common social phenomenon that users discuss hot topics on social networks, making them to aggregate into user groups based on the topics, rapidly...

    Zhen Hong Liu, Gong Liang Hu, Tie Hua Zhou in Recent Advances in Intelligent Information… (2019)

  14. No Access

    Article

    Projection-Based PROMETHEE Methods Based on Hesitant Fuzzy Linguistic Term Sets

    This paper proposes two extended projection-based preference ranking organization methods for enrichment evaluations for multi-criteria decision making with hesitant fuzzy linguistic term sets (HFLTSs). We fir...

    Ru-xia Liang, Jian-qiang Wang, Hong-yu Zhang in International Journal of Fuzzy Systems (2018)

  15. No Access

    Article

    Study on optimization of anti-collision algorithm for mixed query tree

    This paper studies the hybrid query tree algorithm, which uses the combined information of the largest and smallest collision bits to classify the markers. The labels are placed in four matrices to reduce coll...

    Hong-wei Deng, Lang Li, **ao-Man Liang in Journal of Ambient Intelligence and Humani… (2018)

  16. No Access

    Article

    \(k^{-}\) -anonymization of multiple shortest paths

    The preservation of privacy on information networks has been studied extensively in recent years. Although early work concentrated on preserving sensitive node information and link information to prevent re-id...

    Shyue-Liang Wang, Yu-Chuan Tsai, Tzung-Pei Hong, Hung-Yu Kao in Soft Computing (2017)

  17. No Access

    Book and Conference Proceedings

  18. No Access

    Chapter and Conference Paper

    Channel Estimation Based on Extreme Learning Machine for High Speed Environments

    Due to the complexity and extensive application of wireless systems, channel estimation has been a hot research issue, especially for high speed environments. High mobility challenges the speed of channel esti...

    Fang Dong, Junbiao Liu, Liang He, **aohui Hu, Hong Liu in Proceedings of ELM-2015 Volume 1 (2016)

  19. Article

    Open Access

    Feature selection and replacement by clustering attributes

    Feature selection is to find useful and relevant features from an original feature space to effectively represent and index a given dataset. It is very important for classification and clustering problems, whi...

    Tzung-Pei Hong, Yan-Liang Liou, Shyue-Liang Wang in Vietnam Journal of Computer Science (2014)

  20. No Access

    Chapter and Conference Paper

    Bayesian Regularization BP Neural Network Model for the Stock Price Prediction

    It is an important research issue to improve the generalization ability of the neural network in the research of artificial neural network. This paper proposes the Bayesian regularization method to optimize th...

    Qi Sun, Wen-Gang Che in Foundations and Applications of Intelligent Systems (2014)

previous disabled Page of 2