Skip to main content

previous disabled Page of 2
and
  1. No Access

    Article

    EL-DenseNet: a novel method for identifying the flame state of converter steelmaking based on dense convolutional neural networks

    The identification of flame status in converter steelmaking is of great significance for steel smelting and molten steel quality. It can monitor the converter smelting process, strictly control the smooth prog...

    Yan Hu, Jia Tang, Yangyang Xu, Runying Xu in Signal, Image and Video Processing (2024)

  2. No Access

    Chapter and Conference Paper

    Task Offloading and Resource Allocation for Edge-Cloud Collaborative Computing

    Current research mainly focuses on two-tier cloud networks with edge clouds and users. The computational power relocation and resource allocation problem is relatively under-researched in three-tier networks c...

    Yaxing Wang, Jia Hao, Gang Xu, Baoqi Huang in Algorithms and Architectures for Parallel … (2024)

  3. No Access

    Chapter and Conference Paper

    YOLO-D: Dual-Branch Infrared Distant Target Detection Based on Multi-level Weighted Feature Fusion

    Infrared distant target detection is crucial in border patrol, traffic management, and maritime search and rescue operations due to its adaptability to environmental factors. However, in order to implement inf...

    Jianqiang **g, Bing Jia, Baoqi Huang, Lei Liu, **ao Yang in Neural Information Processing (2024)

  4. No Access

    Chapter and Conference Paper

    PM \(_{2.5}\) Concentration Measurement Based on Natural Scene Statistics and Progressive Learning

    To ensure the well-being of residents and ecological balance, it is essential to conduct continuous and precise PM \(_{2.5}\) ...

    Guangcheng Wang, Bao** Huang, Kezheng Sun in Digital Multimedia Communications (2024)

  5. No Access

    Article

    Deep Constraints Space of Medium Modality for RGB-Infrared Person Re-identification

    Reducing the gap between modalities is key to RGB-Infrared cross-modality person re-identification. In this paper, we propose an architecture based on the Deep Constrains Space of Medium Modality (DCSMM) for R...

    Bao** Huang, Hao Chen, Wencheng Qin in Neural Processing Letters (2023)

  6. No Access

    Chapter and Conference Paper

    Detecting the Sensing Area of a Laparoscopic Probe in Minimally Invasive Cancer Surgery

    In surgical oncology, it is challenging for surgeons to identify lymph nodes and completely resect cancer even with pre-operative imaging systems like PET and CT, because of the lack of reliable intraoperative...

    Baoru Huang, Yicheng Hu, Anh Nguyen in Medical Image Computing and Computer Assis… (2023)

  7. No Access

    Chapter and Conference Paper

    A Spatio-Temporal Identity Verification Method for Person-Action Instance Search in Movies

    As one of the challenging problems in video search, Person-Action Instance Search (P-A INS) aims to retrieve shots with a specific person carrying out a specific action from massive amounts of video shots. Mos...

    Yanrui Niu, **gyao Yang, Chao Liang, Bao** Huang, Zhongyuan Wang in MultiMedia Modeling (2023)

  8. No Access

    Chapter and Conference Paper

    P-TECS: An Energy Balance Algorithm for Opportunistic Networks Integrating Multiple Node Attributes

    This paper proposes an energy balance opportunistic networks routing algorithm P-TECS. The P-TECS solves the problems of energy consumption of key nodes in existing opportunistic routing algorithms. This paper...

    Gang Xu, **aoying Yang, **gjian Chen in Security and Privacy in New Computing Envi… (2023)

  9. No Access

    Chapter and Conference Paper

    When CNN Meet with ViT: Towards Semi-supervised Learning for Multi-class Medical Image Semantic Segmentation

    Due to the lack of quality annotation in medical imaging community, semi-supervised learning methods are highly valued in image semantic segmentation tasks. In this paper, an advanced consistency-aware pseudo-...

    Ziyang Wang, Tianze Li, Jian-Qing Zheng in Computer Vision – ECCV 2022 Workshops (2023)

  10. No Access

    Article

    CTSLoc: an indoor localization method based on CNN by using time-series RSSI

    Due to the complexities of indoor WiFi signal propagations, it is challenging to improve the performance of indoor fingerprint-based positioning techniques which is the main hot research in Internet of Things....

    **gbin Liu, Bing Jia, Lei Guo, Baoqi Huang, Lei Wang, Thar Baker in Cluster Computing (2022)

  11. No Access

    Chapter and Conference Paper

    Self-supervised Depth Estimation in Laparoscopic Image Using 3D Geometric Consistency

    Depth estimation is a crucial step for image-guided intervention in robotic surgery and laparoscopic imaging system. Since per-pixel depth ground truth is difficult to acquire for laparoscopic image data, it i...

    Baoru Huang, Jian-Qing Zheng, Anh Nguyen in Medical Image Computing and Computer Assis… (2022)

  12. No Access

    Chapter and Conference Paper

    Spatio-Temporal Topology Routing Algorithm for Opportunistic Network Based on Self-attention Mechanism

    In opportunistic networks, it is difficult to find the best relay node, which not only makes the message transmission inefficient but also wastes resources in the network. Most of the existing routing algorith...

    **aorui Wu, Gang Xu, **nyu Hao, Baoqi Huang in Algorithms and Architectures for Parallel … (2022)

  13. No Access

    Chapter and Conference Paper

    Recursive Deformable Image Registration Network with Mutual Attention

    Deformable image registration, estimating the spatial transformation between different images, is an important task in medical imaging. Many previous studies have used learning-based methods for multi-stage re...

    Jian-Qing Zheng, Ziyang Wang, Baoru Huang in Medical Image Understanding and Analysis (2022)

  14. No Access

    Chapter and Conference Paper

    Attention-Based Cross-Domain Gesture Recognition Using WiFi Channel State Information

    Gesture recognition is an important step to realize ubiquitous WiFi-based human-computer interaction. However, most current WiFi-based gesture recognition systems rely on domain-specific training. To address t...

    Hao Hong, Baoqi Huang, Yu Gu, Bing Jia in Algorithms and Architectures for Parallel … (2022)

  15. No Access

    Article

    Numerical study on Moore-Penrose inverse of tensors via Einstein product

    The notation of Moore-Penrose inverse of matrices has been extended from matrix space to even-order tensor space with Einstein product. In this paper, we give the numerical study on the Moore-Penrose inverse o...

    Baohua Huang in Numerical Algorithms (2021)

  16. No Access

    Chapter and Conference Paper

    Self-supervised Generative Adversarial Network for Depth Estimation in Laparoscopic Images

    Dense depth estimation and 3D reconstruction of a surgical scene are crucial steps in computer assisted surgery. Recent work has shown that depth estimation from a stereo image pair could be solved with convol...

    Baoru Huang, Jian-Qing Zheng, Anh Nguyen in Medical Image Computing and Computer Assis… (2021)

  17. No Access

    Chapter and Conference Paper

    A DNN-based WiFi-RSSI Indoor Localization Method in IoT

    Indoor automatic localization technology is very important for the Internet of Things. With the development of wireless technology and the diversification of location service requirements, especially in comple...

    Bing Jia, Zhaopeng Zong, Baoqi Huang, Thar Baker in Communications and Networking (2021)

  18. No Access

    Article

    Finite iterative algorithm for the symmetric periodic least squares solutions of a class of periodic Sylvester matrix equations

    The present work proposes a finite iterative algorithm to find the least squares solutions of periodic matrix equations over symmetric ξ-periodic matrices. By this algorithm, for any initial symmetric ξ-periodic ...

    Baohua Huang, Changfeng Ma in Numerical Algorithms (2019)

  19. No Access

    Chapter and Conference Paper

    Wide and Recurrent Neural Networks for Detection of False Data Injection in Smart Grids

    A smart grid is a complex system using power transmission and distribution networks to connect electric power generators to consumers across a large geographical area. Due to their heavy dependencies on inform...

    Yawei Wang, Donghui Chen, Cheng Zhang in Wireless Algorithms, Systems, and Applicat… (2019)

  20. No Access

    Chapter and Conference Paper

    Solving the Signal Relay Problem of UAV in Disaster Relief via Group Role Assignment

    When an earthquake occurs, disaster relief is an urgent, complex and critical mission. Decision makers must possess critical role awareness to prioritize the numerous interrelated tasks arising from such an ev...

    Qian Jiang, Haibin Zhu, Ming Liao in Computer Supported Cooperative Work and So… (2019)

previous disabled Page of 2