Skip to main content

previous disabled Page of 2
and
  1. No Access

    Chapter and Conference Paper

    Lightweight Traffic Sign Recognition Model Based on Dynamic Feature Extraction

    Accurate traffic sign data recognition is crucial for enhancing safety in autonomous driving system. However, recognizing traffic signs from natural scenes is challenging due to factors like dim lighting, occl...

    Yiyuan Ge, Ke Niu, Zhihao Chen, Qinhu Zhang in Applied Intelligence (2024)

  2. No Access

    Article

    CNN autoencoders and LSTM-based reduced order model for student dropout prediction

    In recent years, Massive Open Online Courses (MOOCs) have become the main online learning method for students all over the world, but their development has been affected by the high dropout rate for a long tim...

    Ke Niu, Guoqiang Lu, Xue** Peng, Yuhang Zhou in Neural Computing and Applications (2023)

  3. No Access

    Article

    Method for counting labeled neurons in mouse brain regions based on image representation and registration

    An important step in brain image analysis is to divide specific brain regions by matching brain slices to standard brain reference atlases, and perform statistical analysis on the labeled neurons in each brain...

    Songwei Wang, Ke Niu, Liwei Chen in Medical & Biological Engineering & Computi… (2022)

  4. No Access

    Chapter and Conference Paper

    Virtual Display and Interaction System Design of Bingxi Scroll Painting Based on Augmented Reality Technique

    The Bingxi scroll painting depicts the grand scene of royal ice activities in Qianlong period of Qing Dynasty. It adopts augment reality technique to synthesis the material background and three-dimensional dyn...

    Yihang Du, Yan Pei, Lijun Wang, Chenzong Bai, Ke Niu in Genetic and Evolutionary Computing (2022)

  5. No Access

    Chapter and Conference Paper

    Research on Adaptive Video Steganography Algorithm for Clustering and Dispersing DCT Coefficient Difference Histogram

    Histogram migration is a method of the information hiding, the advantage of traditional data hiding has large amount of data, but there are many problems, such as poor security and embedding rate changes. The ...

    Kun Han, Ke Niu, Shuai Yang, **aoYuan Yang in Theoretical Computer Science (2021)

  6. No Access

    Chapter and Conference Paper

    Readmission Prediction with Knowledge Graph Attention and RNN-Based Ordinary Differential Equations

    Predicting the readmission risk within 30 days on the Electronic Health Record (EHR) has been proven crucial for predictive analytics in healthcare domain. Deep-learning-based models are recently utilized to a...

    Su Pei, Ke Niu, Xue** Peng, **gni Zeng in Knowledge Science, Engineering and Management (2021)

  7. No Access

    Chapter and Conference Paper

    A Generative Steganography Method Based on WGAN-GP

    With the development of Generative Adversarial Networks (GAN), GAN-based steganography and steganalysis techniques have attracted much attention from researchers. In this paper, we propose a novel image stegan...

    Jun Li, Ke Niu, Liwei Liao, Lijie Wang, Jia Liu in Artificial Intelligence and Security (2020)

  8. No Access

    Chapter and Conference Paper

    Impact of Speedometer Forms on Integration Task Performance for Train Driving

    Accurate speed control can effectively improve the efficiency of train operation. The advantages and disadvantages of the speed display form directly impact the interaction efficiency and the driver’s correct ...

    Chenchen Gao, Weining Fang, Ke Niu in Advances in Human Aspects of Transportation (2020)

  9. No Access

    Article

    The SSRC and the founding movement of area studies in America, 1943–1953

    Area studies, as characterized by “complete world coverage” and “interdisciplinary integration”, constitutes a major branch of academic research. As an institutional framework embedded in the American social s...

    Ke Niu in China International Strategy Review (2019)

  10. No Access

    Article

    Video highlight extraction via content-aware deep transfer

    In this paper, we focus on detecting highlights in online videos. Given the explosive growth of online videos, it is becoming increasingly important to single out those highlights for audiences instead of requ...

    Ke Niu, Han Wang in Multimedia Tools and Applications (2019)

  11. No Access

    Article

    Two-dimensional histogram modification based reversible data hiding using motion vector for H.264

    Histogram modification (HM) is an efficient algorithm for reversible data hiding into H.264 video, motion vector based methods have been applied to HM. In this paper, we present a special strategy of reversibl...

    Dong Li, YingNan Zhang, **nChao Li, Ke Niu in Multimedia Tools and Applications (2019)

  12. No Access

    Chapter and Conference Paper

    FDT-MAC: A New Multi-channel MAC Protocol Based on Fuzzy Decision Tree for Wireless Sensor Network

    The current popular multi-channel Medium Access Control (MAC) layer protocol adopts a strategy of separating control and data channels, in order to improve channel utilization and packet forwarding success rat...

    Hui Yang, Linlin Ci, Fuquan Zhang in Proceedings of the Fifth Euro-China Confer… (2019)

  13. No Access

    Chapter and Conference Paper

    A Bidirectional Recommendation Method Research Based on Feature Transfer Learning

    In recommendation systems, data cold start is always an important problem to be solved. In this paper, aiming at problems such as few users, sparse evaluation data and difficulty of model start-up, a new bidir...

    Yu Mao, **aozhong Fan, Fuquan Zhang in Proceedings of the Fifth Euro-China Confer… (2019)

  14. No Access

    Chapter and Conference Paper

    MR-APG: An Improved Model for Swarm Intelligence Movement Coordination

    Swarm intelligence based on the bionics have become an emerging research field, and researchers have proposed some kinds of intelligent models, such as ant colony, free group wolves, fish flock, insects group,...

    Hui Yang, Linlin Ci, Fuquan Zhang in Advances in Smart Vehicular Technology, Tr… (2019)

  15. No Access

    Chapter and Conference Paper

    Prediction for Student Academic Performance Using SMNaive Bayes Model

    Predicting students academic performance is very important for students future development. There are a large number of students who can not graduate from colleges on time for various reasons every year. Nowa...

    Baoting Jia, Ke Niu, **a Hou, Ning Li in Advanced Data Mining and Applications (2019)

  16. No Access

    Chapter and Conference Paper

    ACO-RR: Ant Colony Optimization Ridge Regression in Reuse of Smart City System

    With the rapid development of artificial intelligence, governments of different countries have been focusing on building smart cities. To build a smart city is a system construction process which not only requ...

    Qiaoyun Yin, Ke Niu, Ning Li, Xue** Peng, Yijie Pan in Reuse in the Big Data Era (2019)

  17. No Access

    Chapter and Conference Paper

    Video Steganographic Algorithm Based on Intra Prediction Modification for H.264/AVC

    To analyze the technique of video steganography, which provides security guarantees for national security and confidential information of government agencies and enterprises, videos may be used to transform s...

    Yingnan Zhang, Minqing Zhang, Zhen Zhang in Lecture Notes in Real-Time Intelligent Sys… (2018)

  18. No Access

    Chapter and Conference Paper

    Reversible Data Hiding for Video

    Difference expansion (DE) and histogram modification (HM) are efficient ways for reversible data hiding (RDH) into digital video. In most occasions, the reversibility of an algorithm cannot be confirmed until ...

    Dong Li, YingNan Zhan, Ke Niu, **aoYuan Yang in Cloud Computing and Security (2018)

  19. No Access

    Article

    A hybrid approach of topic model and matrix factorization based on two-step recommendation framework

    Recommender systems become increasingly significant in solving the information explosion problem. Two typical kinds of techniques treat the recommendation problem as either a rating prediction or a ranking pre...

    **angyu Zhao, Zhendong Niu, Wei Chen in Journal of Intelligent Information Systems (2015)

  20. No Access

    Chapter and Conference Paper

    Learning Trend Analysis and Prediction Based on Knowledge Tracing and Regression Analysis

    Estimating students’ knowledge is a fundamental and important task for student modeling in intelligent tutoring systems. Since the concept of knowledge tracing was proposed, there have been many studies focusi...

    Yali Cai, Zhendong Niu, Yingwang Wang, Ke Niu in Database Systems for Advanced Applications (2015)

previous disabled Page of 2