Skip to main content

and
  1. No Access

    Article

    Deep learning for fine-grained classification of jujube fruit in the natural environment

    Jujube is a popular fruit with a long cultivation history and numerous varieties in China. It is necessary to develop an automatic visual identification system of jujube classification in the natural environme...

    ** Meng, Yingchun Yuan, Guifa Teng in Journal of Food Measurement and Characteri… (2021)

  2. No Access

    Article

    A Pre-Determined Nodes Deployment Strategy of Two-Tiered Wireless Sensor Networks Based on Minimizing Cost

    Nodes deployment is a fundamental factor in determining the connectivity, coverage, lifetime and cost of wireless sensor networks. In this paper, a two-tiered wireless sensor networks consisting of sensor clus...

    Tiegang Fan, Guifa Teng in International Journal of Wireless Information Networks (2014)

  3. No Access

    Chapter and Conference Paper

    Social Network Analysis Based on Authorship Identification for Cybercrime Investigation

    With the rapid development of Internet, cybercrime by means of Internet become serious. Mining their communication can be used to discover some latent criminal activities. Social network analysis is used for u...

    Jianbin Ma, Guifa Teng, Shuhui Chang, **aoru Zhang in Intelligence and Security Informatics (2011)

  4. Chapter and Conference Paper

    Research on Influenced Factors about Routing Selection Scheme in Agricultural Machinery Allocation

    Routing allocation scheme is a core issue in agricultural machinery allocation. It is related to the allocation cost, income and timeliness of crop harvest. How to select a farmland spot to harvest, which need...

    Fan Zhang, Guifa Teng, Jie Yao, Sufen Dong in Computer and Computing Technologies in Agr… (2011)

  5. No Access

    Chapter and Conference Paper

    A Cybercrime Forensic Method for Chinese Web Information Authorship Analysis

    With the increasing popularization of the Internet, Internet services used as illegal purposes have become a serious problem. How to prevent these phenomena from happening has become a major concern for societ...

    Jianbin Ma, Guifa Teng, Yuxin Zhang, Yueli Li in Intelligence and Security Informatics (2009)

  6. No Access

    Chapter and Conference Paper

    Identifying Chinese E-Mail Documents’ Authorship for the Purpose of Computer Forensic

    Nowadays, computer crimes involving e-mail increases rapidly. To prevent these phenomena from happening, the authorship identification methods for Chinese e-mail documents were described in this paper, which c...

    Jianbin Ma, Ying Li, Guifa Teng in Intelligence and Security Informatics (2008)

  7. Chapter and Conference Paper

    Research on the Transformation of Display Format for Web Information

    As so far, most of the information on the internet are designed for computer display, which can achieve the desired effect at 800*600 or higher resolution, but the normal TV’s resolution is much lower, so the ...

    Sufen Dong, Guifa Teng, Dan Wang, Yan Hu in Computer And Computing Technologies In Agr… (2008)