Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Data Enhancement Method Based on Generative Adversarial Network for Small Transmission Line Detection

    Unmanned aerial vehicle (UAV) patrol inspection is an important means of transmission line detection. However, during UAV patrol, due to the UAV or the bad weather, there may be droplets on the camera lens, wh...

    Wenkong Wang, Weijie Huang, Hongnan Zhao in Neural Computing for Advanced Applications (2022)

  2. No Access

    Chapter and Conference Paper

    Research on Association Rules Mining of Atmospheric Environment Monitoring Data

    Wireless sensor network technology and gird monitoring system have exerted positive effects on the treatment of air pollution by providing comprehensive information. Based on its data monitoring, multi-source...

    Ziling Li, Wei Zhou, **aoqian Liu in Technology-Inspired Smart Learning for Fut… (2020)

  3. No Access

    Chapter and Conference Paper

    OpenPTDS Dataset: Pedestrian Trajectories in Crowded Scenarios

    Pedestrian simulation is an important approach for engineers to evaluate the safety issues of metro buildings. Although there exist many works of pedestrian evacuation, it is still lacking of rich evacuation d...

    **ao Song, **ghan Sun, **g Liu, Kai Chen in Methods and Applications for Modeling and … (2018)

  4. No Access

    Chapter and Conference Paper

    A Novel Load Balance Algorithm for Cloud Computing

    A good scheduling algorithm is a key for load balance system, in which system’s load meets users’ requirement. Here, a new load balance algorithm based on swarm intelligence is proposed which can enhance the p...

    Linlin Tang, Jeng-Shyang Pan, Yuanyuan Hu in Genetic and Evolutionary Computing (2016)

  5. No Access

    Chapter and Conference Paper

    Interaction Artificial Bee Colony Based Load Balance Method in Cloud Computing

    Rapidly development of the cloud computing and Internet makes load balance technique become more and more significant to us than ever. A perfect scheduling algorithm is the key to solve the load balance proble...

    Jeng-Shyang Pan, Haibin Wang, Hongnan Zhao in Genetic and Evolutionary Computing (2015)

  6. No Access

    Chapter and Conference Paper

    A Feature Representation and Extraction Method for Malicious Code Detection Based on LZW Compression Algorithm

    Differing in traditional methods which extracted too much features or filtered valuable items, we proposed a feature representation and extraction method based on LZW compression algorithm to detect malicious ...

    Yingxu Lai, Hongnan Liu, Zhen Yang in Recent Progress in Data Engineering and In… (2013)

  7. Chapter and Conference Paper

    Classifying Stem Cell Differentiation Images by Information Distance

    The ability of stem cells holds great potential for drug discovery and cell replacement therapy. To realize this potential, effective high content screening for drug candidates is required. Analysis of images ...

    **anglilan Zhang, Hongnan Wang in Machine Learning and Knowledge Discovery i… (2012)

  8. No Access

    Chapter and Conference Paper

    Seismic Responses Prediction of Nonlinear Building Structures Based on Multi-Branch BP Neural Network

    In this paper, a multi-branch back propagation neural network (BPNN) is adopted to predict the nonlinear seismic responses of an eccentric three-story reinforced concrete building. First of all, the network is...

    Linsheng Huo, Hongnan Li, Bing Li in Advances in Neural Networks – ISNN 2009 (2009)

  9. No Access

    Chapter and Conference Paper

    Semi-active Control of Eccentric Structures Based on Neural Networks

    In this paper, the control approach to irregular structures excited by multi-dimensional ground motions is presented by using semi-active tuned liquid column damper (TLCD). A back propagation Artificial Neural...

    Hongnan Li, Linsheng Huo, Tinghua Yi in Advances in Neural Networks – ISNN 2007 (2007)