Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Research on Digital Maturity Evaluation Model of Public Hospitals

    Building an evaluation model of digital maturity in public hospitals, combining the data management maturity model with the digital maturity model, evaluating the research progress of digital transformation in...

    Benhai Yu, Zishan Wang in E-Business. New Challenges and Opportuniti… (2024)

  2. No Access

    Chapter and Conference Paper

    Efficient and Accurate Quantized Image Super-Resolution on Mobile NPUs, Mobile AI & AIM 2022 Challenge: Report

    Image super-resolution is a common task on mobile and IoT devices, where one often needs to upscale and enhance low-resolution images and video frames. While numerous solutions have been proposed for this prob...

    Andrey Ignatov, Radu Timofte, Maurizio Denna in Computer Vision – ECCV 2022 Workshops (2023)

  3. No Access

    Chapter and Conference Paper

    Affinity-Aware Relation Network for Oriented Object Detection in Aerial Images

    Object detection in aerial images is a challenging task due to the oriented and densely packed objects. However, densely packed objects constitute a significant characteristic of aerial images: objects are not...

    Tingting Fang, Bin Liu, Zhiwei Zhao, Qi Chu, Nenghai Yu in Computer Vision – ACCV 2022 (2023)

  4. No Access

    Chapter and Conference Paper

    Eventually-Consistent Replicated Relations and Updatable Views

    Distributed systems have to live with weak consistency, such as eventual consistency, if high availability is the primary goal and network partitioning is unexceptional. Local-first applications are examples o...

    Joachim Thomassen, Weihai Yu in New Trends in Database and Information Systems (2023)

  5. No Access

    Chapter and Conference Paper

    X-FTPC: A Fine-Grained Trust Propagation Control Scheme for Cross-Certification Utilizing Certificate Transparency

    Cross-certification plays a fundamental role in facilitating the interconnection between different root stores in public key infrastructure (PKI). However, the existing trust management schemes (e.g., certificate...

    Shushang Wen, Bingyu Li, Ziqiang Ma in Applied Cryptography in Computer and Commu… (2022)

  6. No Access

    Chapter and Conference Paper

    Supporting Undo and Redo for Replicated Registers in Collaborative Applications

    A collaborative application supporting eventual consistency may temporarily violate global invariant. Users may make mistakes. Undo and redo are a generic tool to restore global invariant and correct mistakes....

    Eric Brattli, Weihai Yu in Cooperative Design, Visualization, and Engineering (2021)

  7. No Access

    Chapter and Conference Paper

    Bone Marrow Cell Segmentation Based on Improved U-Net

    Automatic segmentation of bone marrow cells plays an important role in the diagnosis of many blood diseases such as anemia and leukemia. Due to the complex morphology and wide variety of bone marrow cells, the...

    Lingmin **, Zhaochai Yu, Haoyi Fan, Shenghua Teng, Zuoyong Li in Data Mining and Big Data (2021)

  8. No Access

    Chapter and Conference Paper

    HTCN: Harmonious Text Colorization Network for Visual-Textual Presentation Design

    The selection of text color is a time-consuming and important aspect in the designing of visual-textual presentation layout. In this paper, we propose a novel deep neural network architecture for predicting te...

    Xuyong Yang, **aobin Xu, Yaohong Huang in Pattern Recognition and Computer Vision (2021)

  9. No Access

    Chapter and Conference Paper

    Augmenting SQLite for Local-First Software

    Local-first software aims at both the ability to work offline on local data and the ability to collaborate across multiple devices. CRDTs (conflict-free replicated data types) are abstractions for offline and ...

    Iver Toft Tomter, Weihai Yu in New Trends in Database and Information Systems (2021)

  10. No Access

    Chapter and Conference Paper

    A Novel Visual Cryptography Scheme Shared with Edge Information Embedded QR Code

    QR code has been widely used in our daily life due to its convenience, and the security of QR code becomes a rising problem. In this paper, we introduce a new algorithm that adds the edge of the gray image to ...

    Fei Hu, Yuanzhi Yao, Weihai Li, Nenghai Yu in Artificial Intelligence and Security (2020)

  11. Chapter and Conference Paper

    The Glare Evaluation Method Using Digital Camera for Civil Airplane Flight Deck

    Glare is a key factor influencing the visual performance in light conditions of civil airplane flight deck, but it is difficult to directly evaluate the complex glare sources in flight deck, such as non-unifor...

    Zhi Ma, Wei Zhang, Ye Zhou, **hai Yu in Engineering Psychology and Cognitive Ergon… (2013)

  12. Chapter and Conference Paper

    A Coherent Assessment of Visual Ergonomics in Flight Deck Impacted by Color and Luminance

    This research proposed a coherent assessment method for evaluating visual ergonomics in simulated flight deck via evaluating psychological indices and performance during a series of experiments. A simulated fl...

    Ye Zhou, Wei Zhang, Baofeng Li, **hai Yu in Engineering Psychology and Cognitive Ergon… (2013)

  13. Chapter and Conference Paper

    A Novel Visual Speech Representation and HMM Classification for Visual Speech Recognition

    This paper presents the development of a novel visual speech recognition (VSR) system based on a new representation that extends the standard viseme concept (that is referred in this paper to as Visual Speech ...

    Dahai Yu, Ovidiu Ghita, Alistair Sutherland in Advances in Image and Video Technology (2009)

  14. No Access

    Chapter and Conference Paper

    Accurate 3D Facial Synthesis for Plastic Surgery Simulation

    3D facial synthesis has been an intensive research topic in both image processing and computer graphics. So far common facial synthesizing methods were either statistic model based or laser range scanner (LRS)...

    Lei Wu, Houqiang Li, Nenghai Yu, Ming**g Li in Advances in Multimedia Modeling (2006)

  15. No Access

    Chapter and Conference Paper

    Face Recognition Using Neighborhood Preserving Projections

    Subspace learning is one of the main directions for face recognition. In this paper, a novel unsupervised subspace learning method, Neighborhood Preserving Projections (NPP), is proposed. In contrast to tradition...

    Yanwei Pang, Nenghai Yu, Houqiang Li in Advances in Multimedia Information Process… (2005)