Skip to main content

previous disabled Page of 3
and
  1. No Access

    Chapter and Conference Paper

    Power Transmission and Transformation Risk Management System Based on EWM Calculation and AHP

    Aiming at the evaluation and management of transmission project investment risk under the new power market environment, a scheme combining the analytical hierarchy process (AHP) and the entropy weight method (...

    Shengjie Wang, Weijun Wang, **aobo He in Proceedings of Innovative Computing 2024 V… (2024)

  2. No Access

    Chapter and Conference Paper

    System Development of Operation Ecological Chain of E-commerce Service Outsourcing Enterprises Under Data Mining Technology

    At present, with the continuous expansion of the number and scale of enterprises, e-commerce service outsourcing, as an emerging product, has encountered some challenges in its development process. With the ac...

    Zhihan Zhang, **aohu Ma, Bo Yang in Proceedings of Innovative Computing 2024, Vol. 4 (2024)

  3. No Access

    Chapter and Conference Paper

    Research on the Application of Computer Graphics Image Processing Technology

    The application of image processing technology is critical in intelligent computer graphics images; however, it has an issue with erroneous performance positioning. The typical Grid algorithm is unable to addr...

    Qiuxian Ma in Proceedings of Innovative Computing 2024, Vol. 3 (2024)

  4. No Access

    Chapter and Conference Paper

    Development and Application of BP Neural Network in the Modern Economic Management System

    The requirement of modern economic management is getting higher and higher, which makes the traditional management mode not applicable, so it needs to be improved. Under this background, this paper will study ...

    **aoli Liu, Yuan Ma in Proceedings of Innovative Computing 2024, Vol. 3 (2024)

  5. No Access

    Chapter and Conference Paper

    Research on Facial Expression Animation Technology Based on K-means Algorithm

    Animation technology plays an important role in intelligent face expressions, but there is a problem of inaccurate capture and positioning.

    Jiangting Yan, Pengju Pu, Dingding Ma in Proceedings of Innovative Computing 2024, Vol. 3 (2024)

  6. No Access

    Chapter and Conference Paper

    Multivariate Time Series Anomaly Detection Method Based on mTranAD

    Multivariate time series anomaly detection is a crucial area of research in several domains, including finance, logistics, and manufacturing. Successfully identifying abnormal behaviors or events can help prev...

    Chuanlei Zhang, Yicong Li, Jie Li, Guixi Li in Advanced Intelligent Computing Technology … (2023)

  7. No Access

    Chapter and Conference Paper

    Automatic Text Extractive Summarization Based on Text Graph Representation and Attention Matrix

    Automatic text summarization via representing a text as a graph has been investigated for over ten years. With the developments of attention mechanism and Transformer on natural language processing (NLP), it i...

    Yuan-Ching Lin, **wen Ma in Advanced Intelligent Computing Technology and Applications (2023)

  8. No Access

    Chapter and Conference Paper

    Time Series Prediction of 5G Network Data Based on Improved EEMD-BiLSTM Prediction Model

    5G networks are designed to support various emerging applications, such as the Internet of Things (IoT), autonomous vehicles, and smart cities, which require low latency, high throughput, and reliable connecti...

    Jianrong Li, Zheng Li, Jie Li, Gongcheng Shi in Advanced Intelligent Computing Technology … (2023)

  9. No Access

    Chapter and Conference Paper

    Credit Risk Assessment Model of Supply Chain Finance Under the Background of Big Data

    Financial institutions must clarify the logical relationship of supply chain finance operations, objectively evaluate the qualifications of credit entities, and strengthen credit risk early warning and prevent...

    Jun Ma in Innovative Computing Vol 1 - Emerging Topics in Artificial Intelligence (2023)

  10. No Access

    Chapter and Conference Paper

    A Large-Scale Multi-objective Brain Storm Optimization Algorithm Based on Direction Vectors and Variance Analysis

    Large-scale multi-objective optimization problems (LSMOPs) can lead to the conventional reproduction operator being inefficient for searching. Therefore, we propose a large-scale multi-objective brain storm op...

    Yang Liu, Tiejun **ng, Yuee Zhou, Nan Li, Lianbo Ma in Advances in Swarm Intelligence (2023)

  11. No Access

    Chapter and Conference Paper

    Balancing Measurement Efficiency, Test Diversity and Security for Item Selection in On-the-Fly Assembled Multistage Adaptive Testing via a Multi-objective Evolutionary Algorithm

    On-the-fly assembled multistage adaptive testing (OMST) is a recently emerging computer-administered test form and has been employed in a variety of large-scale examinations. Item selection is a key challenge ...

    **aoshu **ang, Ling Wu, Hai** Ma, **ngyi Zhang in Advances in Swarm Intelligence (2023)

  12. No Access

    Chapter and Conference Paper

    Application of Ant Colony Algorithm in Chinese Language and Literature Education

    In this study, we apply ant colony algorithm to Chinese language and literature education. We believe that this is a good way to improve the quality of Chinese language and literature education. This method ca...

    Qianyu Ma in Innovative Computing Vol 1 - Emerging Topics in Artificial Intelligence (2023)

  13. No Access

    Chapter and Conference Paper

    College Students’ Learning Engagement Based on Engineering Thinking

    One of the cores of engineering thinking is system thinking, which solves problems systematically with scientific theory. Engineering thinking is problem-solving oriented. It conducts research and planning aro...

    Mingyuan Ma in Innovative Computing Vol 1 - Emerging Topics in Artificial Intelligence (2023)

  14. No Access

    Chapter and Conference Paper

    A Survey on Multimodal Named Entity Recognition

    Multimodal Named Entity Recognition (MNER) is a task of identifying entities with specific semantic types from natural language text and using image information to improve the accuracy and robustness of entity...

    Shenyi Qian, Wenduo **, Yonggang Chen in Advanced Intelligent Computing Technology … (2023)

  15. No Access

    Chapter and Conference Paper

    Neural Architecture Search Based on Improved Brain Storm Optimization Algorithm

    The performance of deep neural networks (DNNs) often depends on the design of their architectures. But designing a DNN with good performance is a difficult and knowledge-intensive process. In this paper, we pr...

    **aojie An, Lianbo Ma, Yuee Zhou, Nan Li, Tiejun **ng in Advances in Swarm Intelligence (2023)

  16. No Access

    Chapter and Conference Paper

    Modeling Portraits of Students and Exercises for Exercise Recommendation

    Exercise recommendation aims at providing personalized recommendation to assist students with explicit learning directions, which has become an important and popular component of online learning platforms. How...

    Weiwei Gao, Huifang Ma, Yan Zhao, **g Wang in Advanced Intelligent Computing Technology … (2023)

  17. No Access

    Chapter and Conference Paper

    One-Dimensional Feature Supervision Network for Object Detection

    Self-attention mechanisms have been widely used in object detection tasks to distinguish the importance of different channels and reinforce important information in features, and also leads to the exciting res...

    Longchao Shen, Yongsheng Dong, Yuanhua Pei in Advanced Intelligent Computing Technology … (2023)

  18. No Access

    Chapter and Conference Paper

    Knowledge Graph Completion for Power Grid Main Equipment Using Pretrained Language Models

    The safe and stable operation of power systems relies on the timely diagnosis of defects in power grid equipment. To achieve this, knowledge graph (KG) can be used to model power grid equipment defect knowledg...

    Chenxiang Lin, Zhou Zheng, Shitao Cai, Li Fu in Advanced Intelligent Computing Technology … (2023)

  19. No Access

    Chapter and Conference Paper

    UCLD-Net: Decoupling Network via Unsupervised Contrastive Learning for Image Dehazing

    From traditional algorithms based on handcrafted prior to learning algorithms based on neural networks, the image dehazing technique has gone through great development. The handcrafted prior-based methods need...

    Zhitao Liu, Tao Hong, **wen Ma in Advanced Intelligent Computing Technology … (2023)

  20. No Access

    Chapter and Conference Paper

    A Modified Gaining-Sharing Knowledge Algorithm Based on Dual-Population and Multi-operators for Unconstrained Optimization

    Evolutionary Algorithms (EAs) have a great power to solve complex optimization problems. In recent years, Gaining-Sharing Knowledge algorithm (GSK) is one of the novel nature-inspired algorithms to solve real ...

    Haoran Ma, Jiahao Zhang, Wenhong Wei, Wanyou Cheng in Advances in Swarm Intelligence (2023)

previous disabled Page of 3