-
Chapter and Conference Paper
Self-paced Safe Co-training for Regression
In semi-supervised learning, co-training is successfully in augmenting the training data with predicted pseudo-labels. With two independently trained regressors, a co-trainer iteratively exchanges their select...
-
Article
Gravitational search algorithm based on multiple adaptive constraint strategy
In order to improve the convergence speed and optimization accuracy of gravitational search algorithm, the improved gravitational algorithm with dynamically adjusting inertia weight and trend factors of speed ...
-
Chapter and Conference Paper
Application of Polar Code-Based Scheme in Cloud Secure Storage
In view of the fact that the quantum computer attack is not considered in the cloud storage environment, this paper selects the code-based public key encryption scheme as the security protection measure in the...
-
Chapter and Conference Paper
Using Case Facts to Predict Penalty with Deep Learning
With the promotion of Wisdom Court construction and the increasing completeness of judicial big data, the combination of judicial and artificial intelligence attracted more and more attention. The Judicial doc...
-
Chapter and Conference Paper
Adaptive Flower Pollination Algorithm Based on Chaotic Map
Flower pollination algorithm (FPA) is one of the well-known evolutionary techniques used extensively to solve optimization problems. Despite its efficiency and wide use, the identical search behaviors may lead...
-
Chapter and Conference Paper
Vulnerability Assessment for Unmanned Systems Autonomy Services Architecture
Unmanned Systems Autonomy Services (UxAS) is a set of networked software modules that collaboratively automate mission-level decision making for unmanned systems. Proposed, developed, and publicized by United ...
-
Chapter and Conference Paper
Predicting Clinical Outcomes of Alzheimer’s Disease from Complex Brain Networks
Brain network modelling has been shown effective to study the brain connectivity in Alzheimer’s disease (AD). Although the topological features of AD affected brain networks have been widely investigated, com...
-
Chapter and Conference Paper
A Segmented Artificial Bee Colony Algorithm Based on Synchronous Learning Factors
In this paper, we propose a segmented ABC algorithm based on synchronous learning factors (SABC). For the problem of inferior local search ability and low convergence precision in the artificial bee colony (AB...
-
Chapter and Conference Paper
Fuzzy Association Rule Mining with Type-2 Membership Functions
In this paper, a fuzzy association rule mining approach with type-2 membership functions is proposed for dealing with data uncertainty. It first transfers quantitative values in transactions into type-2 fuzzy ...
-
Chapter and Conference Paper
Multi-Level Genetic-Fuzzy Mining with a Tuning Mechanism
In this paper, a two-stage multi-level genetic-fuzzy mining approach is proposed. In the first stage, the multi-level genetic-fuzzy mining (MLGFM) is utilized to derive membership functions of generalized item...
-
Chapter and Conference Paper
Scorpio: A Simple, Convenient, Microsoft Excel Macro Based Program for Privacy-Preserving Logrank Test
Survival analysis is frequently used for dealing with survival outcomes in biological organisms. However it is a tedious process to compare survival curves step by step. In this study, we designed and develope...
-
Chapter and Conference Paper
Research of Ecological Landscape Assessment Systems of Road Based on GIS and ES
With rapid development of China’s road construction, road construction and its surrounding ecological landscape is not harmonious. The evaluation of the analysis, recovery and development is increasingly impor...
-
Chapter and Conference Paper
Libraries in a Digital Frontier: Preserving Chinese Canadian Cultural Heritage
As a three-year community-based research project at the University of British Columbia, Chinese Canadian Stories: Uncommon Histories from a Common Past is government grant-funded project by the Community Historic...
-
Article
Flash-Optimized B+-Tree
With the rapid increasing capacity of flash memory, flash-aware indexing techniques are highly desirable for flash devices. The unique features of flash memory, such as the erase-before-write constraint and th...
-
Article
Fiducial Marker Based on Projective Invariant for Augmented Reality
Fiducial marker based Augmented Reality has many applications. So far the inner pattern of the fiducial marker is always used to encode the markers. Thus a large portion of the fiducial marker image is used fo...
-
Chapter and Conference Paper
Human Pacman: A Mobile Entertainment System with Ubiquitous Computing and Tangible Interaction over a Wide Outdoor Area
Human Pacman is an interactive role-playing game that envisions to bring the computer gaming experience to a new level of emotional and sensory gratification by setting the real world as a playground. This is ...