Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- ArticleOctober 2024
BIMCV-R: A Landmark Dataset for 3D CT Text-Image Retrieval
Medical Image Computing and Computer Assisted Intervention – MICCAI 2024Pages 124–134https://doi.org/10.1007/978-3-031-72120-5_12AbstractThe burgeoning integration of 3D medical imaging into healthcare has led to a substantial increase in the workload of medical professionals. To assist clinicians in their diagnostic processes and alleviate their workload, the development of a ...
- ArticleNovember 2024
PQ-SAM: Post-training Quantization for Segment Anything Model
AbstractSegment anything model (SAM) is a promising prompt-guided vision foundation model to segment objects of interest. However, the extensive computational requirements of SAM have limited its applicability in resource-constraint edge devices. Post-...
- research-articleSeptember 2024
A computational framework for making early design decisions in deep space habitats
- Amir Behjat,
- Xiaoyu Liu,
- Oscar Forero,
- Roman Ibrahimov,
- Shirley Dyke,
- Ilias Bilionis,
- Julio Ramirez,
- Dawn Whitaker
Advances in Engineering Software (ADES), Volume 195, Issue Chttps://doi.org/10.1016/j.advengsoft.2024.103690AbstractThe dynamics of systems of systems often involve complex interactions among the individual systems, making the implications of design choices challenging to predict. Design features in such systems may trigger unexpected behaviors or result in ...
Highlights- CDCM tool introduction to aid in informed design of system interactions.
- CDCM architecture separates code from models for flexible configurations.
- CDCM case studies on building degradation and lunar habitats.
- CDCM highlights ...
- ArticleAugust 2024
Link Prediction Based on Deep Global Information in Heterogeneous Graph
Knowledge Science, Engineering and ManagementPages 240–254https://doi.org/10.1007/978-981-97-5492-2_19AbstractLink prediction on heterogeneous graph is helpful to improve real network information, promote the development of recommendation system and explore potential correlation. Some existing models and methods have proved that mining the structure and ...
-
- research-articleOctober 2024
Identification of Chinese medicinal materials based on Support Vector Machine
ICCBD '24: Proceedings of the 2024 International Conference on Cloud Computing and Big DataPages 465–469https://doi.org/10.1145/3695080.3695161In the development and research process of traditional Chinese medicine, the identification and analysis of Chinese medicinal materials is an important link in quality control and inspection. The identification and quantitative analysis of effective ...
- research-articleJune 2024
Color Hint-guided Ink Wash Painting Colorization with Ink Style Prediction Mechanism
ACM Transactions on Applied Perception (TAP), Volume 21, Issue 3Article No.: 10, Pages 1–21https://doi.org/10.1145/3657637We propose an end-to-end generative adversarial network that allows for controllable ink wash painting generation from sketches by specifying the colors via color hints. To the best of our knowledge, this is the first study for interactive Chinese ink ...
- research-articleJune 2024
ViolinBot: A Framework for Imitation Learning of Violin Bowing Using Fuzzy Logic and PCA
IEEE Transactions on Fuzzy Systems (TOFS), Volume 32, Issue 9Pages 5005–5017https://doi.org/10.1109/TFUZZ.2024.3409146In this article, an imitation learning framework is innovatively developed for robot skills learning in violin bowing. The introduction of dynamic movement primitives (DMPs) to model motion addresses issues such as the uncertainty in changing string ...
- research-articleJuly 2024
MFC-DoH: DoH Tunnel Detection Based on the Fusion of MAML and F-CNN
CF '24: Proceedings of the 21st ACM International Conference on Computing FrontiersPages 267–275https://doi.org/10.1145/3649153.3649207Domain Name System (DNS) tunnels, used by attackers to transmit sensitive information through plaintext DNS protocols, have garnered significant attention. In addressing the security concerns of DNS, the Internet Engineering Task Force (IETF) introduced ...
- research-articleFebruary 2024
GTINet: Global Topology-Aware Interactions for Unsupervised Point Cloud Registration
IEEE Transactions on Circuits and Systems for Video Technology (IEEETCSVT), Volume 34, Issue 7Pages 6363–6375https://doi.org/10.1109/TCSVT.2024.3367529Point cloud registration is a critical task in various 3D applications. Supervised approaches are restricted by the difficulty and cost of acquiring ground-truth annotations. Thus, unsupervised point cloud registration has emerged as a promising ...
- research-articleApril 2024
An efficient manta ray foraging optimization algorithm with individual information interaction and fractional derivative mutation for solving complex function extremum and engineering design problems
AbstractThe manta ray foraging optimization algorithm (MRFO) is a recently proposed meta-heuristic algorithm that mimics the foraging process of manta rays. It has yielded good outcomes in solving some optimization problems because its mechanism is clear,...
Highlights- A novel manta ray foraging optimization NIFMRFO with three improved strategies is proposed.
- The execution efficiency of NIFMRFO is demonstrated by time complexity analysis.
- The performance of NIFMRFO is verified by the CEC2017 test ...
- research-articleMay 2024
C-Disentanglement: discovering causally-independent generative factors under an inductive bias of confounder
NIPS '23: Proceedings of the 37th International Conference on Neural Information Processing SystemsArticle No.: 1719, Pages 39566–39581Representation learning assumes that real-world data is generated by a few se-mantically meaningful generative factors (i.e., sources of variation) and aims to discover them in the latent space. These factors are expected to be causally disentangled, ...
- research-articleDecember 2023
Replicating and Digesting Anomalies in the Chinese A-Share Market
We replicate 469 anomaly variables similar to those studied by Hou et al. (2020) using Chinese A-share data and a reliable testing procedure with mainboard breakpoints and value-weighted returns. We find that 83.37% of the anomaly variables do not ...
- research-articleNovember 2023
AdaptivePaste: Intelligent Copy-Paste in IDE
ESEC/FSE 2023: Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software EngineeringPages 1844–1854https://doi.org/10.1145/3611643.3613895In software development, it is common for programmers to copy-paste or port code snippets and then adapt them to their use case. This scenario motivates the code adaptation task – a variant of program repair which aims to adapt variable identifiers in a ...
- research-articleNovember 2023
Real-Time Train Scheduling With Uncertain Passenger Flows: A Scenario-Based Distributed Model Predictive Control Approach
IEEE Transactions on Intelligent Transportation Systems (ITS-TRANSACTIONS), Volume 25, Issue 5Pages 4219–4232https://doi.org/10.1109/TITS.2023.3329445Real-time train scheduling is essential for passenger satisfaction in urban rail transit networks. This paper focuses on real-time train scheduling for urban rail transit networks considering uncertain time-dependent passenger origin-destination demands. ...
- research-articleNovember 2023
FGBC: Flexible graph-based balanced classifier for class-imbalanced semi-supervised learning
Highlights- We propose a graph-based auxiliary balanced classifier head that is attached to the existing SSL to construct an end-2-end learning framework for efficient label propagation in CISSL.
- We propose a simple yet effective flexible ...
Semi-supervised learning (SSL) has witnessed resounding success in many standard class-balanced benchmark datasets. However, real-world data often exhibit class-imbalanced distributions, which poses significant challenges for existing SSL ...
- research-articleOctober 2023
MIWA: Mixed-Initiative Web Automation for Better User Control and Confidence
UIST '23: Proceedings of the 36th Annual ACM Symposium on User Interface Software and TechnologyArticle No.: 75, Pages 1–15https://doi.org/10.1145/3586183.3606720In the era of Big Data, web automation is frequently used by data scientists, domain experts, and programmers to complete time-consuming data collection tasks. However, developing web automation scripts requires familiarity with a programming language ...
- research-articleAugust 2023
AIM-MEF: Multi-exposure image fusion based on adaptive information mining in both spatial and frequency domains
Expert Systems with Applications: An International Journal (EXWA), Volume 223, Issue Chttps://doi.org/10.1016/j.eswa.2023.119909AbstractMulti-Exposure Image Fusion (MEF) is a simple and effective solution to obtain high dynamic range images by integrating important information from a series of low dynamic range source images with different exposure levels. Despite promising ...
- ArticleJuly 2023
Micro-expression Recognition Based on Local Optical Flow Capsule Network
Advances and Trends in Artificial Intelligence. Theory and ApplicationsPages 397–406https://doi.org/10.1007/978-3-031-36819-6_35AbstractMicro-expression (ME) is a kind of facial muscle movement spontaneously, which can reflect people’s real emotions and be widely used in psychological treatment, suspect interrogation and other fields. However, the intensity and duration of ME pose ...