Skip to main content

previous disabled Page of 3
and
  1. No Access

    Chapter and Conference Paper

    Are Graph Embeddings the Panacea?

    Graph representation learning has emerged as a machine learning go-to technique, outperforming traditional tabular view of data across many domains. Current surveys on graph representation learning predominant...

    Qiang Sun, Du Q. Huynh, Mark Reynolds in Advances in Knowledge Discovery and Data M… (2024)

  2. No Access

    Chapter and Conference Paper

    Data Quality Evaluation Method Based on Density Clustering Algorithm and Its Application

    Data quality assessment is mainly to analyze, evaluate and calculate the collected original information, and then to obtain the decision results. At present, there are many research methods for data quality. T...

    Limin Zhao, Guangcai Liu, Peng Wei in Frontier Computing on Industrial Applicati… (2024)

  3. No Access

    Chapter and Conference Paper

    A Study on the Integration of Worked Examples and Blended Learning in the Curriculum During the COVID-19 Epidemic

    Both blended learning and work examples are used to enhance student learning. Due to the temporary suspension of classes due to COVID-19, the face-to-face course was temporarily converted to a full-scale onlin...

    Hung Sun, Shu-Wei Chang in Frontier Computing on Industrial Applications Volume 4 (2024)

  4. No Access

    Chapter and Conference Paper

    Spatial-Temporal Transformer with Error-Restricted Variance Estimation for Time Series Anomaly Detection

    Due to the intricate dynamics of multivariate time series in cyber-physical system, unsupervised anomaly detection has always been a research hotspot. Common methods are mainly based on reducing reconstruction...

    Yuye Feng, Wei Zhang, Haiming Sun in Advances in Knowledge Discovery and Data M… (2024)

  5. No Access

    Chapter and Conference Paper

    Development of Rural Labor Resource Optimization Platform Based on Spring Boot Technology

    With the development of big data and cloud computing technology, the use of digital means to manage information resources has gradually become the mainstream of information processing. The outflow of rural lab...

    **gyu Ye, Wei Huang, Jian Sun, Bin Huang in Innovative Computing Vol 1 - Emerging Topi… (2023)

  6. No Access

    Chapter and Conference Paper

    Online Adaptive Strategy for Traffic-Light Timing Based on Congestion Pressure

    This paper devises a strategy for adjusting automatically the traffic light timing in real time by counting the number of vehicles with detecting devices at both ends of the road. By means of the strategy, bas...

    Qi-Wei Sun, Shi-Yuan Han, Ya Fang in Intelligent Equipment, Robots, and Vehicles (2021)

  7. No Access

    Chapter and Conference Paper

    Optimal-Performance-Supervised Vibration Control for Nonlinear Discrete-Time System with Delayed Input Under Sinusoidal Disturbance

    In this paper, an optimal-performance-supervised vibration control strategy is developed for a class of discrete-time nonlinear systems subject to delayed input and sinusoidal disturbance, which makes up the o...

    Shi-Yuan Han, Qi-Wei Sun, **ao-Fang Zhong in Intelligent Equipment, Robots, and Vehicles (2021)

  8. No Access

    Chapter and Conference Paper

    Generating Actuation Sensor Based on the First Positive and the Secondary Converse Piezoelectric Effect

    On the basis of classical piezoelectric theory, dielectric theory and anisotropic elasticity theory, a new design method designing generating actuation sensor based on the first positive and the secondary conv...

    Chunxiao Du, Kezhi Zhang, Dong Wang, Qingyin Sun, Guohua **ng in Frontier Computing (2021)

  9. No Access

    Chapter and Conference Paper

    XRR: Explainable Risk Ranking for Financial Reports

    We propose an eXplainable Risk Ranking (XRR) model that uses multilevel encoders and attention mechanisms to analyze financial risks among companies. In specific, the proposed method utilizes the textual infor...

    Ting-Wei Lin, Ruei-Yao Sun, Hsuan-Ling Chang in Machine Learning and Knowledge Discovery i… (2021)

  10. No Access

    Chapter and Conference Paper

    A Lightweight Neural Network Combining Dilated Convolution and Depthwise Separable Convolution

    Aimed to reduce the excessive cost of neural network, this paper proposes a lightweight neural network combining dilated convolution and depthwise separable convolution. Firstly, the dilated convolution is use...

    Wei Sun, **jie Zhou, **aorui Zhang in Cloud Computing, Smart Grid and Innovative… (2020)

  11. Chapter and Conference Paper

    VisDrone-DET2018: The Vision Meets Drone Object Detection in Image Challenge Results

    Object detection is a hot topic with various applications in computer vision, e.g., image understanding, autonomous driving, and video surveillance. Much of the progresses have been driven by the availability of ...

    Pengfei Zhu, Longyin Wen, Dawei Du, **ao Bian in Computer Vision – ECCV 2018 Workshops (2019)

  12. Chapter and Conference Paper

    S3D-UNet: Separable 3D U-Net for Brain Tumor Segmentation

    Brain tumor is one of the leading causes of cancer death. Accurate segmentation and quantitative analysis of brain tumor are critical for diagnosis and treatment planning. Since manual segmentation is time-con...

    Wei Chen, Boqiang Liu, Suting Peng in Brainlesion: Glioma, Multiple Sclerosis, S… (2019)

  13. No Access

    Chapter and Conference Paper

    Predicting Smartphone App Usage with Recurrent Neural Networks

    Nowadays millions of apps are available and most of users install a lot of apps on their smartphones. It will cause some troubles in finding the specific apps promptly. By predicting the next app to be used in...

    Shijian Xu, Wenzhong Li, **ao Zhang in Wireless Algorithms, Systems, and Applicat… (2018)

  14. Chapter and Conference Paper

    Modeling Longitudinal Voxelwise Feature Change in Normal Aging with Spatial-Anatomical Regularization

    Image voxel/vertex-wise feature in the brain is widely used for automatic classification or significant region detection of various dementia syndromes. In these studies, the non-imaging variables, such as age,...

    Zhuo Sun, Wei Xu, Shuhao Wang, Junhai Xu in Medical Image Computing and Computer Assis… (2018)

  15. Chapter and Conference Paper

    Liquid Pouring Monitoring via Rich Sensory Inputs

    Humans have the amazing ability to perform very subtle manipulation task using a closed-loop control system with imprecise mechanics (i.e., our body parts) but rich sensory information (e.g., vision, tactile, ...

    Tz-Ying Wu, Juan-Ting Lin, Tsun-Hsuang Wang, Chan-Wei Hu in Computer Vision – ECCV 2018 (2018)

  16. No Access

    Chapter and Conference Paper

    Long-Term User Location Prediction Using Deep Learning and Periodic Pattern Mining

    In recent years, with the advances in mobile communication and growing popularity of the fourth-generation mobile network along with the enhancement in location positioning techniques, mobile devices have gen...

    Mun Hou Wong, Vincent S. Tseng, Jerry C. C. Tseng in Advanced Data Mining and Applications (2017)

  17. No Access

    Chapter and Conference Paper

    A Collaborated IPv6-Packets Matching Mechanism Base on Flow Label in OpenFlow

    Software Defined Networks (SDN), the separation of a network device’s control and data planes, do not need to rely on the underlying network equipment (routers, switches, firewall).It is a new network which co...

    Weifeng Sun, Huang** Wei, Zhenxing Ji in Collaborative Computing: Networking, Appli… (2016)

  18. No Access

    Chapter and Conference Paper

    Improve Network Clustering via Diversified Ranking

    Clustering is one fundamental task in network analysis. A widely-used clustering method is k-means clustering, where clustering is iteratively refined by minimizing the distance between each data point and its...

    Bing-Jie Sun, Hua-Wei Shen, Xue-Qi Cheng in Computational Social Networks (2015)

  19. No Access

    Chapter and Conference Paper

    An Effective Hybrid Fraud Detection Method

    The rapid growth of data makes it possible for us to study human behavior patterns. Knowing the patterns of human behavior is of great use to help us detect the unusual fraud human behavior. Existing fraud det...

    Chenfei Sun, Qingzhong Li, Lizhen Cui in Knowledge Science, Engineering and Managem… (2015)

  20. No Access

    Chapter and Conference Paper

    Unsupervised Race Walking Recognition Using Smartphone Accelerometers

    In today’s race walking competition, the determination of whether an athlete fouls is mainly affected by a referee’s subjective judgment, leading to a high possibility of misjudgment. The purpose of this work ...

    Ye Wei, Li Liu, Jun Zhong, Yonggang Lu in Knowledge Science, Engineering and Managem… (2015)

previous disabled Page of 3