Skip to main content

previous disabled Page of 722
and
  1. Article

    Correction to: A heuristic hybrid instance reduction approach based on adaptive relative distance and k-means clustering

    Junnan Li, Qing Zhao, Shuang Liu in The Journal of Supercomputing (2024)

  2. No Access

    Article

    Cleaner fish optimization algorithm: a new bio-inspired meta-heuristic optimization algorithm

    This paper proposes a new meta-heuristic optimization algorithm called Cleaner Fish Optimization algorithm (CFO) inspired by cleaner fish. The CFO simulates the movement behavior of cleaner fish when performin...

    Wenya Zhang, Jian Zhao, Hao Liu, Liang** Tu in The Journal of Supercomputing (2024)

  3. No Access

    Article

    A multi-scale feature extraction and fusion method for bearing fault diagnosis based on hybrid attention mechanism

    Bearing failure is one of the most common failures in rotating mechanical. Therefore, rapid and accurate diagnosis of bearing faults is of great significance for ensuring the reliability of equipment. In recen...

    Huan Meng, Jiakai Zhang, **gbo Zhao, Daichao Wang in Signal, Image and Video Processing (2024)

  4. No Access

    Article

    Research on the algorithm of detecting insulators in high-voltage transmission lines using UAV images

    Insulator defect detection is an important task of power line inspection, but because the insulator defect target occupies a small area in the transmission line image, and the background is complex and changea...

    Yachao Si, Jiajie Gao, Mingzhan Zhao, **aojun Xu in Signal, Image and Video Processing (2024)

  5. No Access

    Article

    TS-Finder: privacy enhanced web crawler detection model using temporal–spatial access behaviors

    Web crawler detection is critical for preventing unauthorized extraction of valuable information from websites. Current methods rely on heuristics, leading to time-consuming processes and inability to detect n...

    **g Zhao, Rui Chen, Pengcheng Fan in The Journal of Supercomputing (2024)

  6. No Access

    Article

    Generalized sampling expansion for the quaternion linear canonical transform

    The theory of quaternions has gained firm ground in recent times and is being widely explored, with the field of signal and image processing being no exception. However, many important aspects of quaternionic ...

    Saima Siddiqui, Li Bing-Zhao, Muhammad Adnan Samad in Signal, Image and Video Processing (2024)

  7. No Access

    Article

    Multiscale attention feature fusion network for rolling bearing fault diagnosis under variable speed conditions

    The vibration signal of rolling bearing contains abundant fault information. However, due to the existence of variable speed, it is easy to conceal the fault characteristics in the vibration signal, which make...

    Jiayi Shen, Dongfang Zhao, Shulin Liu, Ze Cui in Signal, Image and Video Processing (2024)

  8. No Access

    Article

    An improved rolling bearing fault diagnosis method using DenseNet-BLSTM

    To solve the problems of the conventional rolling bearing fault diagnosis method requiring a large amount of prior knowledge and easy to introduce error artificially, this paper presents a DenseNet-BLSTM metho...

    Kaihui Zhao, Sicheng Wu in Signal, Image and Video Processing (2024)

  9. No Access

    Article

    LC-PBFT: Layered cross-chain consensus algorithm based on forest topology

    As the core of blockchain technology, the consensus mechanism ensures the safe and stable operation of the blockchain system. According to the more complex traceability of data when sharing cross-system and cr...

    **hui Li, Lifeng Cao, Shoucai Zhao, Jiling Wan in The Journal of Supercomputing (2024)

  10. No Access

    Article

    A new weighted ensemble model-based method for text implication recognition

    In the context of text entailment recognition, there exists a risk of getting stuck in local optima when using a single pretrained model. To address this issue and improve the accuracy of model recognition, th...

    Huimin Zhao, **yu Zhu, Wu Deng in Multimedia Tools and Applications (2024)

  11. No Access

    Article

    Multi-task scheduling in vehicular edge computing: a multi-agent reinforcement learning approach

    Vehicular Edge Computing (VEC) represents a computational paradigm designed to optimize vehicular performance and enhance vehicle services. It entails strategically deploying computational and storage resource...

    Yiming Zhao, Lei Mo, Ji Liu in CCF Transactions on Pervasive Computing and Interaction (2024)

  12. No Access

    Article

    A three-stage quality evaluation method for experience products: taking animation as an example

    The diversity and dynamics of quality index information bring challenges to quality assessment of experience products. This paper proposes a three-stage quality assessment method based on grounded theory, asso...

    Qianqian Chen, Zhongjun Tang, Duokui He, Dongyuan Zhao, **g Wang in Multimedia Systems (2024)

  13. No Access

    Article

    Exploration and Exploitation of Unlabeled Data for Open-Set Semi-supervised Learning

    In this paper, we address a complex but practical scenario in semi-supervised learning (SSL) named open-set SSL, where unlabeled data contain both in-distribution (ID) and out-of-distribution (OOD) samples. Un...

    Ganlong Zhao, Guanbin Li, Yipeng Qin in International Journal of Computer Vision (2024)

  14. No Access

    Article

    Accurate entropy modeling in learned image compression with joint enchanced SwinT and CNN

    Recently, learned image compression (LIC) has shown significant research potential. Most existing LIC methods are CNN-based or transformer-based or mixed. However, these LIC methods suffer from a certain degre...

    Dongjian Yang, **aopeng Fan, **andong Meng, Debin Zhao in Multimedia Systems (2024)

  15. Article

    Open Access

    Robot remote control using virtual reality headset: studying sense of agency with subjective distance estimates

    Mobile robots have many applications in the modern world. The autonomy of robots is increasing, but critical cases like search and rescue missions must involve the possibility of human intervention for ethical...

    Artem S. Yashin, Daniil S. Lavrov, Eugeny V. Melnichuk, Valery V. Karpov in Virtual Reality (2024)

  16. Article

    Open Access

    Non-invasively identifying candidates of active surveillance for prostate cancer using magnetic resonance imaging radiomics

    Active surveillance (AS) is the primary strategy for managing patients with low or favorable-intermediate risk prostate cancer (PCa). Identifying patients who may benefit from AS relies on unpleasant prostate ...

    Yuwei Liu, Litao Zhao, Jie Bao, Jian Hou in Visual Computing for Industry, Biomedicine… (2024)

  17. No Access

    Article

    Lightweight safety helmet detection algorithm using improved YOLOv5

    In response to the challenges faced by existing safety helmet detection algorithms when applied to complex construction site scenarios, such as poor accuracy, large number of parameters, large amount of comput...

    Hongge Ren, Anni Fan, Jian Zhao, Hairui Song in Journal of Real-Time Image Processing (2024)

  18. No Access

    Article

    DQN-PACG: load regulation method based on DQN and multivariate prediction model

    Demand response plays a pivotal role in modern smart grid systems, aiding in balancing energy consumption. However, the increasing energy demands of contemporary society have placed a significant burden on pow...

    Rongheng Lin, Shuo Chen, Zheyu He, Budan Wu, **n Zhao in Knowledge and Information Systems (2024)

  19. No Access

    Article

    Periodic and random incremental backup policies in reliability theory

    For a 24/7 database system, backups should be implemented right after a large volume of data has been updated, putting their backup windows in non-busy states with user’s convenience.From this viewpoint, this ...

    Xufeng Zhao, Yilei Bu, Wendi Pang, Jiajia Cai in Software Quality Journal (2024)

  20. No Access

    Article

    Young-gaze: an appearance-based gaze estimation solution for adolescents

    According to the World Health Organization survey, the global incidence of adolescent mental illness is 28%, while the disease detection rate is only 24.6%. Many existing works use complex eye-tracking devices...

    **aofeng Lu, Zichen Zhao, Weitao Ke, Qingsong Yan in Signal, Image and Video Processing (2024)

previous disabled Page of 722