Skip to main content

previous disabled Page of 2
and
  1. No Access

    Chapter and Conference Paper

    CCLane: Concise Curve Anchor-Based Lane Detection Model with MLP-Mixer

    Lane detection needs to meet the real-time requirements and efficiently utilize both local and global information on the feature map. In this paper, we propose a new lane detection model called CCLane, which u...

    Fan Yang, Yanan Zhao, Li Gao, Huachun Tan in Pattern Recognition and Computer Vision (2024)

  2. No Access

    Chapter and Conference Paper

    Security Risk Management of the Internet of Things Based on 5G Technology

    The Internet of Things brings security issues as well as high connectivity. This paper proposes a security risk decision based on the bounded rationality of users, aiming at the security problems of power Inte...

    Wei Cao, Yang Hu, Shuang Yang, Xue-yang Zhu, Jia Yu in Big Data and Security (2023)

  3. No Access

    Chapter and Conference Paper

    Network Defense Resource Allocation Scheme with Multi-armed Bandits

    The problem of limited defense resources owned by the network platform needs to be solved by designing a reasonable defense resource allocation scheme in Industrial Internet of Things (IIoT). However, most of ...

    Ning Huang, Xue-cai Feng, Rui Zhang in Wireless Algorithms, Systems, and Applicat… (2022)

  4. No Access

    Chapter and Conference Paper

    Production Line Balance Optimization Based on Improved Imperial Competition Algorithm

    In order to solve the common manufacturing enterprises, line balancing rate optimization to maximize production and minimize production line balancing rate smoothness index as the optimization goal, a new impr...

    Xue-Hua Yang, Chih-Hung Hsu in Advances in Intelligent Systems and Computing (2022)

  5. No Access

    Chapter and Conference Paper

    Ankle Variable Impedance Control for Humanoid Robot Upright Balance Control

    Upright balance control is the most fundamental, yet essential, function of a humanoid robot to enable the performance of various tasks that are traditionally performed by human being in various unstructured e...

    Kaiyang Yin, Yaxu Xue, Yifei Wang in Advances in Computational Intelligence Sys… (2022)

  6. No Access

    Chapter and Conference Paper

    A Secret Sharing Scheme of Dynamic Threshold with Cheaters Detection and Identification

    There are many schemes to detect and identify cheaters when the number of participants is exactly equal to \( t \) ...

    Yong-Zhong He, Xue-Jiao Xu, Dao-Shun Wang in Security with Intelligent Computing and Bi… (2020)

  7. No Access

    Chapter and Conference Paper

    Multi-party Semi-quantum Secret Sharing Scheme Based on Bell States

    Based on the semi-quantum theory, we propose an easy-to-implement multi-party semi-quantum secret sharing scheme using Bell states, which reduces the construction cost of quantum secret sharing network and com...

    Xue-Yang Li, Yan Chang, Shi-Bin Zhang in Artificial Intelligence and Security (2020)

  8. No Access

    Chapter and Conference Paper

    Dynamic Analysis of Regional Scientific and Technological Innovation Capacity—A Case Study in Sichuan Province

    Aiming at the problem of regional scientific and technological innovation, this paper, first, adopted a dynamic model of regional scientific and technological innovation capacity, based on three aspects, envir...

    Xue-dong Liang, Dong-yang Si, Zhi Li in Proceeding of the 24th International Confe… (2019)

  9. No Access

    Chapter and Conference Paper

    An Iteration Method for X-Ray CT Reconstruction from Variable-Truncation Projection Data

    Limei Huo, Shousheng Luo, Yiqiu Dong in Scale Space and Variational Methods in Com… (2019)

  10. No Access

    Chapter and Conference Paper

    A Variational Convex Hull Algorithm

    Finding the convex hull of a given object or a point set is a very important problem. In this paper, we propose a variational convex hull model and numerical algorithms to solve it. Our model is based on level...

    Lingfeng Li, Shousheng Luo, Xue-Cheng Tai in Scale Space and Variational Methods in Com… (2019)

  11. No Access

    Chapter and Conference Paper

    Research on Comprehensive Benefits of Urban Rail Transit System Based on the Joint Evaluation Methods

    In this paper, based on qualitative and quantitative analysis method and the use of theoretical deduction, model building, empirical research and statistical analysis, the comprehensive benefits of urban rail ...

    Hongjiao Xue, ** Yang, Hong Zhang in Geo-Spatial Knowledge and Intelligence (2018)

  12. No Access

    Chapter and Conference Paper

    An Efficient Black-Box Vulnerability Scanning Method for Web Application

    To discover web vulnerabilities before they are exploited by malicious attackers, black-box vulnerability scanners scan all the web pages of a web application. However, a web application implemented by several...

    Haoxia **, Ming Xu, Xue Yang, Ting Wu in Collaborative Computing: Networking, Appli… (2018)

  13. No Access

    Chapter and Conference Paper

    Properties of Fuzzy Relation Inequalities with Addition-Min Composition

    Fuzzy relation inequalities with addition-min composition could be used to describe the Peer-to-Peer (P2P) file sharing system. In this paper we study some properties of a system of addition-min fuzzy relation...

    Bing-Yuan Cao, **ao-Peng Yang, Xue-Gang Zhou in Fuzzy Information and Engineering and Deci… (2018)

  14. No Access

    Chapter and Conference Paper

    Geometric Programming with Intuitionistic Fuzzy Coefficient

    An geometric programming model is presented with the intuitionistic fuzzy coefficient, and then the model is turned into a crisp geometric programming based on centain accuracy degree of intuitionistic fuzzy s...

    Ji-hui Yang, Xue-gang Zhou, Pei-hua Wang in Fuzzy Information and Engineering and Decision (2018)

  15. No Access

    Chapter and Conference Paper

    Note on Max-Łukasiewicz Bipolar Fuzzy Relation Equation

    System of max-Łukasiewicz bipolar fuzzy relation equations is considered in this paper. A modified concept of characteristic matrix and the corresponding necessary and sufficient condition is given to check a ...

    **ao-Peng Yang, Khizar Hayat, Pei-hua Wang in Fuzzy Information and Engineering and Deci… (2018)

  16. No Access

    Chapter and Conference Paper

    A Biogeography-Based Memetic Algorithm for Job-Shop Scheduling

    Job shop scheduling problem (JSP) is a well-known combinatorial optimization problem of practical importance, but existing evolutionary algorithms for JSP often face problems of low convergence speed and/or pr...

    Xue-Qin Lu, Yi-Chen Du, Xu-Hua Yang in Bio-inspired Computing: Theories and Appli… (2018)

  17. No Access

    Chapter and Conference Paper

    Quadratic Programming with Max-product Fuzzy Relation Inequality Constraints

    In this paper, a new method for quadratic programming with max-product fuzzy relation inequality constraints is proposed. First, the properties of the optimal solution are analyzed in several special cases of ...

    Xue-Gang Zhou, **ao-Peng Yang, Pei-Hua Wang in Fuzzy Information and Engineering and Deci… (2018)

  18. No Access

    Chapter and Conference Paper

    C̆ech Closure Molecular Lattices

    Some results on connected fuzzy topological spaces are extend to the setting of C̆ech closure molecular lattices, a natural generalization of Mashhour and Ghanim’s fuzzy closure spaces, Liu and Luo’s quasi-sub...

    Xue-Mei Dai, Hong-**a Li, Sheng-Gang Li in Quantitative Logic and Soft Computing 2016 (2017)

  19. No Access

    Chapter and Conference Paper

    Weighted Min-Max Programming Subject to Max-Product Fuzzy Relation Equations

    Weighted min-max programming subject to max-product fuzzy relation equations is investigated in this paper. For solving the proposed problem, we introduce concepts of discrimination matrix and solution matrix ...

    **ao-Peng Yang, Ying-Han Hong, Xue-Gang Zhou in International Conference on Oriental Think… (2016)

  20. No Access

    Chapter and Conference Paper

    An Algorithm of Semi-structured Data Scheme Extraction Based on OEM Model

    In order to get the target model of semi-structured data rapidly, effectively and accurately, by combining the related nature of label path in the paper, this paper proposes an algorithm that can extract targe...

    An Gong, Xue-wei Yang in Advanced Research on Electronic Commerce, … (2011)

previous disabled Page of 2