Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleDecember 2024
Bidding Strategy Optimization for Generation Companies Based on Multi-agent Reinforcement Learning Considering the Impact of Long-term Market
DEBAI '24: Proceedings of the International Conference on Digital Economy, Blockchain and Artificial IntelligencePages 339–343https://doi.org/10.1145/3700058.3700111This paper introduces a method for optimizing bidding strategies of generation companies in long-term market and spot market, based on multi-agent reinforcement learning. This paper first proposes a mathematical model for generation companies' decision-...
- research-articleJuly 2024
Cross-modality interaction for few-shot multispectral object detection with semantic knowledge
AbstractMultispectral object detection (MOD), which incorporates additional information from thermal images into object detection (OD) to robustly cope with complex illumination conditions, has garnered significant attention. However, existing MOD ...
Highlights- A task involving the multispectral object detection within a few-shot setting.
- Cross-modality information effectively enhances the expression of backbone features.
- Semantic knowledge provides stable category representations.
- research-articleNovember 2022
Coarse-to-fine spatial-channel-boundary attention network for image copy-move forgery detection
Soft Computing - A Fusion of Foundations, Methodologies and Applications (SOFC), Volume 26, Issue 21Pages 11461–11478https://doi.org/10.1007/s00500-022-07432-xAbstractForensics still faces a serious challenge with image copy-move forgery, in which the copied source and pasted target regions exist in the same image, also known as a homogeneous forgery. In the past decade, numerous copy-move forgery detection (...
- research-articleOctober 2022
Few-shot object detection with dense-global feature interaction and dual-contrastive learning
Applied Intelligence (KLU-APIN), Volume 53, Issue 11Pages 14547–14564https://doi.org/10.1007/s10489-022-04243-3AbstractFew-shot object detection (FSOD) aims to detect novel objects quickly from extremely few annotated examples of previously unseen classes. Most existing methods follow the meta-learning paradigm and still encounter two typical challenges: how to ...
- research-articleSeptember 2022
Few-shot object detection with semantic enhancement and semantic prototype contrastive learning
AbstractFew-shot object detection (FSOD), which aims to teach machines to detect objects belonging to novel classes via extremely few annotated data, has attracted extensive research interest. However, the performance of FSOD is still limited ...
Highlights- Semantic knowledge strengthens the expression of visual information.
- Semantic ...
- research-articleJanuary 2022
Innovation and Development of Cultural and Creative Industries Based on Big Data for Industry 5.0
While art design is based on innovation and creativity, information technology is advancing by leaps and bounds for Industry 5.0. Big data technology has achieved breakthrough development, and the big data era that has followed has begun. Promoting the ...
- research-articleMarch 2020
Selective Sensor Placement for Cost-Effective Online Aging Monitoring and Resilience
ISPD '20: Proceedings of the 2020 International Symposium on Physical DesignPages 95–102https://doi.org/10.1145/3372780.3375556Aggressive technology scaling trends, such as thinner gate oxide without proportional downscaling of supply voltage, aggravate the aging impact and thus necessitate an aging-aware reliability verification and optimization framework during early design ...
- research-articleJune 2020
Audio Replay Spoof Attack Detection by Joint Segment-Based Linear Filter Bank Feature Extraction and Attention-Enhanced DenseNet-BiLSTM Network
IEEE/ACM Transactions on Audio, Speech and Language Processing (TASLP), Volume 28Pages 1813–1825https://doi.org/10.1109/TASLP.2020.2998870Most automatic speaker verification (ASV) systems are vulnerable to various spoofing attacks. In recent years, there have been many methods were proposed for detecting spoofing attacks in ASV, and significant progress has been made. However, current ...
- articleJuly 2017
A new block-based method for copy move forgery detection under image geometric transforms
Multimedia Tools and Applications (MTAA), Volume 76, Issue 13Pages 14887–14903https://doi.org/10.1007/s11042-016-4201-9Copy move forgery detection (CMFD) is one of the most active subtopic in forgery scheme. The methods of CMFD are divided into to block-based method and keypoint-based method in general. Compared with keypoint-based method, block-based method can detect ...
- ArticleApril 2012
Research CIM/XML Data Model Based on IEC61970 in Power System
In this paper, we studies the CIM / XML model file and analyzes the Integrated power system platform model structure, both of which meet the requirements of IEC61970 standard, and it provides a reference method of model data integration between ...
- ArticleMarch 2012
Issues and Challenges of Wireless Sensor Networks Localization in Emerging Applications
ICCSEE '12: Proceedings of the 2012 International Conference on Computer Science and Electronics Engineering - Volume 03Pages 447–451https://doi.org/10.1109/ICCSEE.2012.44Wireless sensor networks (WSNs) are widely being used in many environments (e.g., disaster relief and target tracking), and WSNs localization is still a crucial research area because of the new localization requirements for emerging application domains ...
- research-articleNovember 2010
Activity identification from GPS trajectories using spatial temporal POIs' attractiveness
LBSN '10: Proceedings of the 2nd ACM SIGSPATIAL International Workshop on Location Based Social NetworksPages 27–30https://doi.org/10.1145/1867699.1867704GPS (Globe Positioning System) trajectory data provide a new way for city travel analysis others than traditional travel diary data. But generally raw GPS traces do not include information on trip purposes or activities. Earlier studies addressed this ...