Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleNovember 2024
A memory interaction quadratic interpolation whale optimization algorithm based on reverse information correction for high-dimensional feature selection
AbstractFeature selection is a key technique for data dimensionality reduction, and there are many challenges in facing the exponential expansion phenomenon of high-dimensional decision space. In order to improve the quality of feature selection, we ...
Highlights- Proposed quadratic interpolation mechanism with memory information interaction.
- A reverse correction mechanism is proposed to resolve invalid probability flips.
- An improved discrete whale optimization algorithm is proposed.
- The ...
- research-articleOctober 2024
When to announce the queueing information for bounded rationality customers: a discrete-event–based simulation model
In queueing systems where queues are invisible, it is critical for companies to make decisions about the timing of announcing the anticipated delay to customers. In this paper, a simulation model is built to simulate an invisible queueing system, and ...
- research-articleOctober 2024
Analysis and Research on the Development of Sports Culture Based on Data Mining
EKI '24: Proceedings of the 2nd International Conference on Educational Knowledge and InformatizationPages 206–210https://doi.org/10.1145/3691720.3691754In order to understand the development of sports culture, a data mining based analysis study on the development of sports culture has been proposed. This paper first analyzes the significance of combining data mining with sports culture. Secondly, the ...
- research-articleJuly 2024
Managing partial outsourcing on information security in the presence of security externality
Expert Systems with Applications: An International Journal (EXWA), Volume 246, Issue Chttps://doi.org/10.1016/j.eswa.2023.123003AbstractTo efficiently manage information security, firms typically outsource the security of partial business (core and non-core) to a managed security service provider (MSSP). Four options can be adopted for a firm on security strategy, that is, all ...
- research-articleJune 2024
TTAGaze: Self-Supervised Test-Time Adaptation for Personalized Gaze Estimation
IEEE Transactions on Circuits and Systems for Video Technology (IEEETCSVT), Volume 34, Issue 11_Part_1Pages 10959–10971https://doi.org/10.1109/TCSVT.2024.3412243In this paper, we address the problem of personalized gaze estimation. Due to the anatomical differences between individuals, current personalized gaze models often rely on fine-tuning or fully-supervised methods with labeled calibration samples, which ...
-
- research-articleJuly 2024
Low-quality image object detection based on reinforcement learning adaptive enhancement
Pattern Recognition Letters (PTRL), Volume 182, Issue CPages 67–75https://doi.org/10.1016/j.patrec.2024.04.019Highlights- Performance of object detection tends to degrade on low-quality images.
- Choosing suitable enhancement algorithms can improve the detection performance.
- Reinforcement learning can autonomously select algorithms based on the ...
The task of object detection for low-quality images in multiple scenarios remains a challenging task. To alleviate this problem, a novel approach to improve the detection performance of the model on low-quality images using deep reinforcement ...
- ArticleJanuary 2024
Cross-Modal Semantic Alignment Learning for Text-Based Person Search
AbstractText-based person search aims to retrieve pedestrian images corresponding to a specific identity based on a textual description. Existing methods primarily focus on either the alignment of global features through well-designed loss functions or ...
- research-articleMarch 2024
Development and clinical empirical validation of the chronic critical illness prognosis prediction model
Technology and Health Care (TAHC), Volume 32, Issue 2Pages 977–987https://doi.org/10.3233/THC-230359BACKGROUND:The evolution of critical care medicine and nursing has aided and enabled the rescue of a large number of patients from numerous life-threatening diseases. However, in many cases, patient health may not be quickly restored, and the long-...
- research-articleDecember 2023
Learning the Error Features of Approximate Multipliers for Neural Network Applications
IEEE Transactions on Computers (ITCO), Volume 73, Issue 3Pages 842–856https://doi.org/10.1109/TC.2023.3345163Approximate multipliers (AMs) have widely been investigated to pursue high-performance and energy-efficient hardware designs for error-tolerant applications, such as neural networks (NNs). The computing accuracy of an AM has been evaluated by using ...
- research-articleNovember 2023
How to react to hacker types and asset types in security decision-making
Expert Systems with Applications: An International Journal (EXWA), Volume 231, Issue Chttps://doi.org/10.1016/j.eswa.2023.120654AbstractTo efficiently manage information security, firms typically allocate limited budgets to protect their information assets based on asset types and hacker types. This paper builds a game-theoretical model to discuss the strategic interaction ...
- research-articleJuly 2023
A Conformer-Based Hashing Method for Large-Scale Image Retrieval
CNIOT '23: Proceedings of the 2023 4th International Conference on Computing, Networks and Internet of ThingsPages 736–742https://doi.org/10.1145/3603781.3603912Image retrieval is an important task in computer vision. Among various image retrieval approaches, deep hashing methods map input images to binary codes for nearest neighbor search, achieving advantages in both search time and space. In recent years, ...
- research-articleMarch 2023
Signed directed attention network
AbstractNetwork embedding has facilitated lots of network analytical tasks by representing nodes as low-dimensional vectors. As an extension of convolutional neural networks from Euclidean data to irregular data, Graph Convolutional Networks (GCNs) ...
- research-articleJanuary 2023
A Trusted Remote Data Trading Scheme in Hybrid SDN for Intelligent Internet of Things
Intelligent internet of things (IIoTs) have these features: heterogeneous network patterns, significant differences in devices, dynamic variability of network topologies, etc. In the complex security situation, it is necessary to reject data from ...
- research-articleJanuary 2023
Exploring viewport features for semi-supervised saliency prediction in omnidirectional images
Highlights- We propose a VFNet for semi-supervised saliency prediction in omnidirectional images (ODIs).
Compared with the annotated data for the 2D image saliency prediction task, the annotated data for training omnidirectional image (or 360° image) saliency prediction models are not sufficient. Most existing fully-supervised saliency ...
- research-articleNovember 2022
Using Fully Convolutional Network to Locate Transcription Factor Binding Sites Based on DNA Sequence and Conservation Information
- Qinhu Zhang,
- Youhong Xu,
- Siguo Wang,
- Yong Wu,
- Yuannong Ye,
- Chang-An Yuan,
- Valeriya Gribova,
- Vladimir Fedorovich Filaretov,
- De-Shuang Huang
IEEE/ACM Transactions on Computational Biology and Bioinformatics (TCBB), Volume 20, Issue 5Pages 2690–2699https://doi.org/10.1109/TCBB.2022.3219831Transcription factors (TFs) play a part in gene expression. TFs can form complex gene expression regulation system by combining with DNA. Thereby, identifying the binding regions has become an indispensable step for understanding the regulatory mechanism ...
- research-articleAugust 2022
Gaze Estimation via Modulation-Based Adaptive Network With Auxiliary Self-Learning
IEEE Transactions on Circuits and Systems for Video Technology (IEEETCSVT), Volume 32, Issue 8Pages 5510–5520https://doi.org/10.1109/TCSVT.2022.3152800Given a face image, most of previous works in gaze estimation infer the gaze via a well-trained model with supervised training. However, the distribution of test data may be very different compared to that of training data since samples might be corrupted ...
- research-articleJune 2022
Coarse-to-Fine Lane Boundary Extraction for Large-Scale HD Mapping
2022 IEEE Intelligent Vehicles Symposium (IV)Pages 119–126https://doi.org/10.1109/IV51971.2022.9827420Lane boundaries, as the main component of high definition maps (HD maps), are difficult to auto-generate accurately in various scenarios. In this paper, a general lane boundary extraction method is proposed for HD mapping in both highway and urban ...
- research-articleJune 2022
Information Security Strategies for Information-Sharing Firms Considering a Strategic Hacker
Decision Analysis (INFORMS-DA), Volume 19, Issue 2Pages 99–122https://doi.org/10.1287/deca.2021.0442Information resources have been shared to promote the business operations of firms. However, the connection of business information sharing interfaces between firms has increased the attack surface and created opportunities for the hacker. We examine the ...
- research-articleJune 2022
Scene change detection: semantic and depth information
Multimedia Tools and Applications (MTAA), Volume 81, Issue 14Pages 19301–19319https://doi.org/10.1007/s11042-021-10793-4AbstractChange detection is widely used in city construction, remote image detection, autonomous driving and so on. The most important challenge in change detection is how to define the real change, that is to say, how to detect the real changes while ...