Skip to main content

previous disabled Page of 6
and
  1. No Access

    Chapter and Conference Paper

    Fault Detecting Technology Based on BP Neural Network Algorithm

    This paper describes an automatic online detecting system. In the system, digital image processing technology is used to preprocess X-ray images of the products, and neural network algorithm is applied to diag...

    Ran **, Kun Gao, Zhigang Chen, Chen Dong in Knowledge-Based Intelligent Information an… (2007)

  2. No Access

    Chapter and Conference Paper

    A Seed-Based Method for Predicting Common Secondary Structures in Unaligned RNA Sequences

    The prediction of RNA secondary structure can be facilitated by incorporating with comparative analysis of homologous sequences. However, most of existing comparative approaches are vulnerable to alignment err...

    **aoyong Fang, Zhigang Luo, Zhenghua Wang in Modeling Decisions for Artificial Intellig… (2007)

  3. No Access

    Chapter and Conference Paper

    Combining Multiple Sources of Evidence in XML Multimedia Documents: An Inference Network Incorporating Element Language Models

    This work makes use of the semantic structure and logical structure in XML documents, and their combination to represent and retrieve XML multimedia content. We develop a Bayesian network incorporating element...

    Zhigang Kong, Mounia Lalmas in Advances in Information Retrieval (2007)

  4. No Access

    Chapter and Conference Paper

    Combining Multi Wavelet and Multi NN for Power Systems Load Forecasting

    In the paper, two pre-processing methods for load forecast sampling data including multiwavelet transformation and chaotic time series are introduced. In addition, multi neural network for load forecast includ...

    Zhigang Liu, Qi Wang, Yajun Zhang in Advances in Neural Networks - ISNN 2008 (2008)

  5. No Access

    Chapter and Conference Paper

    Robust Stability of Switched Recurrent Neural Networks with Discrete and Distributed Delays under Uncertainty

    With the rapid development of intelligent control, switched systems have attracted great attention. In this letter, we try to introduce the idea of the switched systems into the field of recurrent neural netwo...

    Shi** Wen, Zhigang Zeng, Lingfa Zeng in Advances in Neural Networks - ISNN 2008 (2008)

  6. No Access

    Chapter and Conference Paper

    Enhancing Relevance Models with Adaptive Passage Retrieval

    Passage retrieval and pseudo relevance feedback/query expansion have been reported as two effective means for improving document retrieval in literature. Relevance models, while improving retrieval in most cas...

    **aoyan Li, Zhigang Zhu in Advances in Information Retrieval (2008)

  7. No Access

    Chapter and Conference Paper

    Agent Collaboration for Multiple Trading Strategy Integration

    The collaboration of agents can undertake complicated tasks that cannot be handled well by a single agent. This is even true for excecuting multiple goals at the same time. In this paper, we demonstrate the us...

    Longbing Cao, Dan Luo, Yanshan **ao in Agent and Multi-Agent Systems: Technologie… (2008)

  8. No Access

    Chapter and Conference Paper

    Three Global Exponential Convergence Results of the GPNN for Solving Generalized Linear Variational Inequalities

    The general projection neural network (GPNN) is a versatile recurrent neural network model capable of solving a variety of optimization problems and variational inequalities. In a recent article [IEEE Trans. N...

    **aolin Hu, Zhigang Zeng, Bo Zhang in Advances in Neural Networks - ISNN 2008 (2008)

  9. No Access

    Chapter and Conference Paper

    Global Exponential Stability of Recurrent Neural Networks with Time-Dependent Switching Dynamics

    In this paper, the switching dynamics of recurrent neural networks are studied. Sufficient conditions on global exponential stability with an arbitrary switching law or a dwell time switching law and the estim...

    Zhigang Zeng, Jun Wang, Tingwen Huang in Artificial Neural Networks – ICANN 2009 (2009)

  10. No Access

    Chapter and Conference Paper

    Retracted: Quantum Quasi-Cyclic Low-Density Parity-Check Codes

    In this paper, how to construct quantum quasi-cyclic (QC) low-density parity-check (LDPC) codes is proposed. Using the proposed approach, some new quantum codes with various lengths and rates of no cycles-leng...

    Dazu Huang, Zhigang Chen, **n Li, Ying Guo in Emerging Intelligent Computing Technology … (2009)

  11. No Access

    Chapter and Conference Paper

    Finding Intrinsic and Extrinsic Viewing Parameters from a Single Realist Painting

    In this paper we studied the geometry of a three-dimensional tableau from a single realist painting – Scott Fraser’s Three way vanitas (2006). The tableau contains a carefully chosen complex arrangement of object...

    Tadeusz Jordan, David G. Stork, Wai L. Khoo in Computer Analysis of Images and Patterns (2009)

  12. No Access

    Chapter and Conference Paper

    Erratum to: Quantum Quasi-Cyclic Low-Density Parity-Check Codes

    The paper entitled ”Quantum Quasi-Cyclic Low-Density Parity-Check Codes”, on pages 18-27 of this volume, has been retracted, because a large portion of the contents had been taken from the paper “Quantum Quasi...

    Dazu Huang, Zhigang Chen, **n Li, Ying Guo in Emerging Intelligent Computing Technology … (2009)

  13. No Access

    Article

    Editorial to special issue: computational intelligence for optimization, modeling and control

    Zeng-Guang Hou, Zhigang Zeng, Changyin Sun in Neural Computing and Applications (2009)

  14. No Access

    Chapter and Conference Paper

    An Efficient GA-Based Algorithm for Mining Negative Sequential Patterns

    Negative sequential pattern mining has attracted increasing concerns in recent data mining research because it considers negative relationships between itemsets, which are ignored by positive sequential patter...

    Zhigang Zheng, Yanchang Zhao, Ziye Zuo in Advances in Knowledge Discovery and Data M… (2010)

  15. No Access

    Chapter and Conference Paper

    An Improved UCONA-Based Authorization Policy Specification for Ubiquitous Systems

    Anywhere and anytime access to information within computing infrastructures is a purpose of ubiquitous computing. The new security challenges are posed while the information can be accessed at anywhere and any...

    **song Gui, Zhigang Chen, **aoheng Deng in Computer Science for Environmental Enginee… (2011)

  16. No Access

    Chapter and Conference Paper

    R&D on Oil Spill Emergency Decision Support System

    A system is described for the prediction of oil spills movement and the suggestion on response operations. It can provide the movement and fate of oil spills, optimized recommendations of arrangement and deliv...

    Shengfeng Zhu, Wei An, Guangru Li in Computer Science for Environmental Enginee… (2011)

  17. No Access

    Chapter and Conference Paper

    Energy Efficiency Evaluation for Iron and Steel High Energy Consumption Enterprise

    In order to optimize the allocation of energy resources, reduce enterprise’s energy consumption and achieve the goals of energy conservation and emission reduction, energy efficiency evaluation indicator struc...

    Gongfa Li, Jianyi Kong, Guozhang Jiang, Hua Zhang in Information and Automation (2011)

  18. No Access

    Article

    Editorial to special issue: Biomedical engineering: information processing, modeling, and control

    Zeng-Guang Hou, Long Cheng, Zhigang Zeng, Min Tan in Neural Computing and Applications (2011)

  19. No Access

    Book and Conference Proceedings

    Neural Information Processing

    19th International Conference, ICONIP 2012, Doha, Qatar, November 12-15, 2012, Proceedings, Part III

    Tingwen Huang, Zhigang Zeng, Chuandong Li in Lecture Notes in Computer Science (2012)

  20. No Access

    Book and Conference Proceedings

    Neural Information Processing

    19th International Conference, ICONIP 2012, Doha, Qatar, November 12-15, 2012, Proceedings, Part I

    Tingwen Huang, Zhigang Zeng, Chuandong Li in Lecture Notes in Computer Science (2012)

previous disabled Page of 6