Skip to main content

previous disabled Page of 237
and
  1. No Access

    Chapter and Conference Paper

    Visual Navigation and Shape Reconstruction for Asteroid Approaching Phase

    Visual navigation and shape reconstruction are of paramount importance for the safety and success of asteroid missions. This paper proposes a new method using silhouette and pixel area measurements to simultan...

    Ronghai Hu, Zhuang Jiao, Handong Hu in Proceedings of 3rd 2023 International Conf… (2024)

  2. No Access

    Chapter and Conference Paper

    Only Classification Head Is Sufficient for Medical Image Segmentation

    Medical image segmentation is a pivotal research domain that has garnered widespread attention in contemporary medical diagnostics. In pursuit of enhancing network efficacy, researchers have taken great effort...

    Hongbin Wei, Zhiwei Hu, Bo Chen, Zhilong Ji in Pattern Recognition and Computer Vision (2024)

  3. No Access

    Chapter and Conference Paper

    Autonomous Maneuver Strategy of UAV Wingman Air Combat Based on Hierarchical Reinforcement Learning

    Unmanned aerial vehicles (UAVs) play an vital role in modern air combats, where manned fighter (leader) can better perform air combat with the assisting of UAVs. The key technology for cooperative air warfare ...

    **wen Hu, Kun Guo, Zhao Xu, Gang Xu in Proceedings of 3rd 2023 International Conf… (2024)

  4. No Access

    Chapter and Conference Paper

    Fuzzy PID Control of Brushless DC Motor Based on the Improved Bat Algorithm

    This paper focuses on researching the control system of brushless direct current motor (BLDCM), and proposes a control strategy of fuzzy PID, which is based on the improved bat algorithm (IBA). The BA has some...

    Jie Li, Wentian Zhao, Jiahang Bai, Liu Yang in Multidimensional Signals, Augmented Realit… (2024)

  5. No Access

    Chapter and Conference Paper

    A Weighted Cross-Modal Feature Aggregation Network for Rumor Detection

    In this paper, we propose a Weighted Cross-modal Aggregation network (WCAN) for rumor detection in order to combine highly correlated features in different modalities and obtain a unified representation in the...

    Jia Li, Zihan Hu, Zhenguo Yang, Lap-Kei Lee in Advances in Knowledge Discovery and Data M… (2024)

  6. No Access

    Chapter and Conference Paper

    Feature Matching in the Changed Environments for Visual Localization

    Robust feature matching is a fundamental capability for visual SLAM. It remains, however, a challenging task, particularly for changed environments. Some researchers use semantic segmentation to remove potenti...

    Qian Hu, Xuelun Shen, Zijun Li, Weiquan Liu in Pattern Recognition and Computer Vision (2024)

  7. No Access

    Chapter and Conference Paper

    Billiards Hitting Assistance System

    Performing training sessions to enhance the precision of billiard ball scoring poses inherent challenges. In response, we designed a comprehensive billiard ball hitting assistance system predicated on the util...

    Hang Liu, Chaoyi Liu, Jian Zhang, Menghan Hu in Digital Multimedia Communications (2024)

  8. No Access

    Chapter and Conference Paper

    Massive Offline Signature Forgery Detection with Extreme Learning Machines

    In this work, we present the results of different machine learning models for detecting offline signature forgeries trained from the features obtained from a massive dataset of ten thousand users. Features for...

    Leonardo Espinosa-Leal, Zhen Li, Renjie Hu, Kaj-Mikael Björk in Proceedings of ELM 2022 (2024)

  9. No Access

    Chapter and Conference Paper

    Research on Tongue Muscle Strength Measurement and Recovery System

    Dysphagia is caused by movement disorders such as muscular systems or neurological diseases that participate in speech movement. Speech difficulty sufferers as the main victim of Dysphagia often have problems ...

    **aotian Pan, Ling Kang, Qia Zhang, Hang Liu, ** Ai in Artificial Intelligence (2024)

  10. No Access

    Chapter and Conference Paper

    Enhancing Adversarial Robustness via Stochastic Robust Framework

    Despite deep neural networks (DNNs) have attained remarkable success in image classification, the vulnerability of DNNs to adversarial attacks poses significant security risks to their reliability. The design ...

    Zhenjiang Sun, Yuanbo Li, Cong Hu in Pattern Recognition and Computer Vision (2024)

  11. No Access

    Chapter and Conference Paper

    Evaluation Method of Cognitive Level Based on Machine Learning and Wearable Device

    Dementia is an incurable syndrome, but early detection and treatment of dementia can help slow down the progress of dementia. Recent studies have highlighted the association between overall cognitive function,...

    Shuai Tao, Hongbin Hu, Jie Zhao, Liwen Kong in Proceedings of 3rd International Conferenc… (2024)

  12. No Access

    Chapter and Conference Paper

    Adaptive Channel Pruning for Trainability Protection

    Pruning is a widely used method for compressing neural networks, reducing their computational requirements by removing unimportant connections. However, many existing pruning methods prune pre-trained models b...

    Jiaxin Liu, Dazong Zhang, Wei Liu, Yongming Li in Pattern Recognition and Computer Vision (2024)

  13. No Access

    Chapter

    Preliminaries

    This chapter introduces some common operations in infrared image processing, mainly including the following four points: (1) Morphological Transformation: Morphological image processing refers to a series of i...

    Hu Zhu, Yushan Pan, Lizhen Deng, Guoxia Xu in Infrared Small Target Detection (2024)

  14. Chapter and Conference Paper

    Graph Constrained Multiple Schemes Generation for Campus Layout

    The campus layout is a major stage in the early stages of campus planning and design. When assessing the feasibility of a campus site in stage, we usually compare multiple campus layout schemes, which consumes...

    Yubo Liu, Zhilan Zhang, Kai Hu, Qiaoming Deng in Phygital Intelligence (2024)

  15. No Access

    Chapter and Conference Paper

    Ranking Variance Reduced Ensemble Attack with Dual Optimization Surrogate Search

    Deep neural networks have achieved remarkable success, but they are vulnerable to adversarial attacks. Previous studies have shown that combining transfer-based and query-based attacks in ensemble attacks can ...

    Zhichao He, Cong Hu in Pattern Recognition and Computer Vision (2024)

  16. No Access

    Chapter and Conference Paper

    An Improved Trajectory Planning Method for Unmanned Aerial Vehicles in Complex Environments

    Trajectory planning plays a crucial role in the execution of Unmanned aerial vehicle (UAV) missions. However, planning an optimal collision-free trajectory is a challenging task, especially in complex environm...

    Chen Zhang, Moduo Yu, Wentao Huang, Yi Hu in Bio-Inspired Computing: Theories and Appli… (2024)

  17. No Access

    Chapter and Conference Paper

    A Path Planning Method Based on Deep Reinforcement Learning with Improved Prioritized Experience Replay for Human-Robot Collaboration

    Owing to its ability to integrate human flexibility with robotic automation, human-robot collaboration possesses tremendous potential in intelligent manufacturing. A quintessential characteristic of this colla...

    Deyu Sun, **gqian Wen, **gfei Wang, **aonan Yang in Human-Computer Interaction (2024)

  18. Chapter and Conference Paper

    Diffusion Probabilistic Model Assisted 3D Form Finding and Design Latent Space Exploration: A Case Study for Taihu Stone Spacial Transformation

    Taihu stone is an important landscape element in Chinese Private Garden on Southern Yangtze river, which is known for its profound cultural and aesthetic significance. In this paper, we intend to introduce the...

    Yubo Liu, Han Li, Qiaoming Deng, Kai Hu in Phygital Intelligence (2024)

  19. No Access

    Chapter and Conference Paper

    CarbonApp: Blockchain Enabled Carbon Offset Project Management

    Carbon credits are permits to emit Green House Gases (GHGs) issued by standards bodies. They are generated from carbon offset projects, and purchased by companies that pollute. Due to the lack of transparency ...

    Yining Hu, Alistair McFarlane in Advanced Information Networking and Applic… (2024)

  20. No Access

    Chapter and Conference Paper

    Deep Learning Based Network Intrusion Detection

    With the advancement of the times, the network has become an important part of people’s daily life, and its connection with our daily life of clothing, food, housing, transportation, medical education has beco...

    Jun Yu, Jiwei Hu, Yong Zeng in Computer Science and Education. Computer S… (2024)

previous disabled Page of 237