Skip to main content

Page of 5
and
  1. No Access

    Article

    Image fuzzy enhancement algorithm based on contourlet transform domain

    In order to solve the problems of low contrast, global darkness and noise amplification in some hyperspectral and remote-sensing images, a new image fuzzy enhancement method based on contourlet transform (CT) ...

    Yun-hu Huang, De-wang Chen in Multimedia Tools and Applications (2020)

  2. Chapter and Conference Paper

    Research on Cross-cultural Participatory Design by Design Teams Based on Chinese Cultural Background

    With the acceleration of globalization, the acculturation issue of design is becoming an emerging challenge. At the same time, as one of the several design patterns in service design, which is becoming a mains...

    Rui **, **n-Li Wei, De-Chuan Wang in HCI in Business, Government and Organizati… (2020)

  3. Chapter and Conference Paper

    Quality-Aware Streaming Network Embedding with Memory Refreshing

    Static network embedding has been widely studied to convert sparse structure information into a dense latent space. However, the majority of real networks are continuously evolving, and deriving the whole embe...

    Hsi-Wen Chen, Hong-Han Shuai, Sheng-De Wang in Advances in Knowledge Discovery and Data M… (2020)

  4. No Access

    Article

    Energy-efficient power amplifiers and linearization techniques for massive MIMO transmitters: a review

    Highly efficient power amplifiers (PAs) and associated linearization techniques have been developed to accommodate the explosive growth in the data transmission rate and application of massive multiple input m...

    **n Liu, Guan-sheng Lv, De-han Wang in Frontiers of Information Technology & Elec… (2020)

  5. No Access

    Article

    Defocus Hyperspectral Image Deblurring with Adaptive Reference Image and Scale Map

    Defocus blur is one of the primary problems among hyperspectral imaging systems equipped with simple lenses. Most of the previous deblurring methods focus on how to utilize structure information of a single ch...

    De-Wang Li, Lin-**g Lai, Hua Huang in Journal of Computer Science and Technology (2019)

  6. No Access

    Article

    A security-based steganographic scheme in vector quantization coding between correlated neighboring blocks

    With the growth of the Internet and the advancements in modern communication systems, sending data over the Internet or other media is now a commonplace practice. Consequently, it has become an important issue...

    Cheng-Ta Huang, Li-Chiun Lin, De-En Sun in Multimedia Tools and Applications (2019)

  7. No Access

    Chapter and Conference Paper

    Top-N Collaborative Filtering Recommendation Algorithm Based on Knowledge Graph Embedding

    The traditional collaborative filtering recommendation algorithm only uses the item-user rating matrix without considering the semantic information of the item itself, resulting in a problem that the recommend...

    Ming Zhu, De-sheng Zhen, Ran Tao, You-qun Shi in Knowledge Management in Organizations (2019)

  8. No Access

    Article

    Use of a coded voltage signal for cable switching and fault isolation in cabled seafloor observatories

    Cabled seafloor observatories play an important role in ocean exploration for its long-term, real-time, and in-situ observation characteristics. In establishing a permanent, reliable, and robust seafloor obser...

    Zhi-feng Zhang, Yan-hu Chen, De-jun Li in Frontiers of Information Technology & Elec… (2018)

  9. No Access

    Article

    Underwater video transceiver designs based on channel state information and video content

    Underwater hostile channel conditions challenge video transmission designs. The current designs often treat video coding and transmission schemes as individual modules. In this study, we develop an adaptive tr...

    Rong-xin Zhang, **ao-li Ma, De-qing Wang in Frontiers of Information Technology & Elec… (2018)

  10. No Access

    Article

    Solving IIR system identification by a variant of particle swarm optimization

    A variant of particle swarm optimization (PSO) is represented to solve the infinitive impulse response (IIR) system identification problem. Called improved PSO (IPSO), it makes significant enhancement over PSO...

    De-Xuan Zou, Suash Deb, Gai-Ge Wang in Neural Computing and Applications (2018)

  11. No Access

    Article

    Cross-lingual implicit discourse relation recognition with co-training

    A lack of labeled corpora obstructs the research progress on implicit discourse relation recognition (DRR) for Chinese, while there are some available discourse corpora in other languages, such as English. In ...

    Yao-jie Lu, Mu Xu, Chang-xing Wu in Frontiers of Information Technology & Elec… (2018)

  12. No Access

    Article

    An effective data fusion-based routing algorithm with time synchronization support for vehicular wireless sensor networks

    In the field of vehicular wireless sensor networks-based structural health monitoring, the structural damage identification is achieved by two structural features, namely natural frequencies and mode shapes. T...

    Chang Tan, Sai Ji, Ziyuan Gui, Jian Shen, De-Sheng Fu in The Journal of Supercomputing (2018)

  13. No Access

    Chapter and Conference Paper

    A Tool Integration Language to Formalize Co-simulation Tool-Chains for Cyber-Physical System (CPS)

    Co-simulation has grown from point-to-point between simulation tools for specific purposes to complex tool-chains which often require additional functionalities, e.g., process management, data management and t...

    **zhi Lu, Martin Törngren, De-Jiu Chen in Software Engineering and Formal Methods (2018)

  14. No Access

    Article

    Cryptanalysis of an identity-based public auditing protocol for cloud storage

    Public verification of data integrity is crucial for promoting the serviceability of cloud storage systems. Recently, Tan and Jia (2014) proposed an identity-based public verification (NaEPASC) protocol for cl...

    Li-bing Wu, **g Wang, De-biao He in Frontiers of Information Technology & Elec… (2017)

  15. No Access

    Article

    FIMI: A Constant Frugal Incentive Mechanism for Time Window Coverage in Mobile Crowdsensing

    Mobile crowdsensing has become an efficient paradigm for performing large-scale sensing tasks. An incentive mechanism is important for a mobile crowdsensing system to stimulate participants and to achieve good...

    Jia Xu, Jian-Ren Fu, De-Jun Yang, Li-Jie Xu in Journal of Computer Science and Technology (2017)

  16. No Access

    Chapter and Conference Paper

    VQ Coding in Data Hiding Using Correlated Neighboring Blocks in Security Performance

    With the continued expansion of the Internet and increased means of communication, it is inevitable that we send data via the Internet or other such media. The important issue of maintaining the confidentialit...

    Cheng-Ta Huang, De-En Sun, Yen-Lin Chen in Intelligence and Security Informatics (2017)

  17. No Access

    Article

    A modified simulated annealing algorithm and an excessive area model for floorplanning using fixed-outline constraints

    Outline-free floorplanning focuses on area and wirelength reductions, which are usually meaningless, since they can hardly satisfy modern design requirements. We concentrate on a more difficult and useful issu...

    De-xuan Zou, Gai-ge Wang, Gai Pan in Frontiers of Information Technology & Elec… (2016)

  18. No Access

    Article

    Intelligent computing budget allocation for on-road trajectory planning based on candidate curves

    In this paper, on-road trajectory planning is solved by introducing intelligent computing budget allocation (ICBA) into a candidate-curve-based planning algorithm, namely, ordinal-optimization-based differenti...

    **ao-xin Fu, Yong-heng Jiang, De-xian Huang in Frontiers of Information Technology & Elec… (2016)

  19. No Access

    Article

    A new method to estimate ages of facial image for large database

    As a common consensus that the appearances of different persons with the same age diverge widely, we have an opinion that the estimated result of a facial image should be a dynamic range or discrete candidate ...

    Ye-Wang Chen, De-He Lai, Han Qi, Jiong-Liang Wang in Multimedia Tools and Applications (2016)

  20. No Access

    Chapter and Conference Paper

    Simulation for Harmonic Analysis of an Integrated Power System

    Modeling and Simulation is an effective way to predict the behaviors of Shipboard Integrated Power System (IPS). This paper presents the methods applying simulink blockset to building the models of twelve-pha...

    De-jia Zhou, Ru-quan Mao, Ya-** Zhuang in Theory, Methodology, Tools and Application… (2016)

Page of 5