Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleNovember 2024
Mixing prisoner’s dilemma games on higher-order networks
AbstractThe prisoner’s dilemma game is a paradigmatic example of a plight situation in which different individuals vie for maximal payoffs. And it has been shown that interaction networks that host such individuals have an immense impact on individual ...
Highlights- We combine two and multi-person prisoner’s dilemma games.
- We explore the impact of 2-order simplicial complex network on cooperation.
- The fraction of multiplayer games is controlled by the fraction of 2-simplices.
- Cooperation ...
- research-articleNovember 2024
4D-QSAR, ADMET properties, and molecular dynamics simulations for designing N-substituted urea/thioureas as human glutaminyl cyclase inhibitors
Computational Biology and Chemistry (COBC), Volume 112, Issue Chttps://doi.org/10.1016/j.compbiolchem.2024.108131AbstractHuman glutaminyl cyclase (hQC) inhibitors have great potential to be used as anti- Alzheimer's disease (AD) agents by reducing the toxic pyroform of β-amyloid in the brains of AD patients. The four-dimensional quantitative structure activity ...
Graphical AbstractDisplay Omitted
Highlights- Established a 4D-QSAR model for N-substituted urea/thioureas with good predictive ability.
- Designed and evaluated new N-substituted urea/thioureas as potential hQC inhibitors.
- Confirmed stability and interaction patterns with hQC ...
- ArticleSeptember 2024
PromptIQA: Boosting the Performance and Generalization for No-Reference Image Quality Assessment via Prompts
AbstractDue to the diversity of assessment requirements in various application scenarios for the IQA task, existing IQA methods struggle to directly adapt to these varied requirements after training. Thus, when facing new requirements, a typical approach ...
- research-articleSeptember 2024
UR-YOLO: an urban road small object detection algorithm
Pattern Analysis & Applications (PAAS), Volume 27, Issue 4https://doi.org/10.1007/s10044-024-01324-6AbstractThe autonomous driving system heavily depends on perception algorithms to gather crucial information about the surrounding urban environment. However, detecting small objects on busy urban roads poses a significant challenge. To overcome this ...
- ArticleAugust 2024
Enhancing UAV Navigation Accuracy Through EKF Magnetic Interference Estimation Algorithm
Advanced Intelligent Computing Technology and ApplicationsPages 478–488https://doi.org/10.1007/978-981-97-5594-3_40AbstractThis thesis addresses a critical challenge in UAV navigation by investigating and mitigating the impact of magnetic interference on Inertial Navigation Systems (INS). It emphasizes the importance of accurate attitude determination for UAV flight ...
-
- ArticleAugust 2024
Automatic Seizure Recognition Based on Data Enhancement and 1DCNN-BiLSTM Network Using EEG Signal
Advanced Intelligent Computing in BioinformaticsPages 370–379https://doi.org/10.1007/978-981-97-5689-6_32AbstractEpilepsy is one of the most common life-threatening neurological disorders in the world. The uncertain nature of seizures poses a challenge in the detection and recognition of epilepsy. Aiming at the problem of imbalance between seizure and non-...
- research-articleJuly 2024
Penetralium: Privacy-preserving and memory-efficient neural network inference at the edge
Future Generation Computer Systems (FGCS), Volume 156, Issue CPages 30–41https://doi.org/10.1016/j.future.2024.03.008AbstractThe proliferation of artificial intelligence and edge computing has led to an increase in the deployment of proprietary deep learning models on third-party edge servers or devices to power mission-critical applications. However, this trend raises ...
Highlights- A system-algorithm jointly optimized model inference system at the edge.
- Building computational pipeline that can be adapted to underlying trusted components.
- Lightweight perturbation policy to protect against advanced privacy ...
- ArticleJune 2024
Calculation of the Proportion of Modernity in Dao Lang’s Lyrics from a Bie-Modernist Cultural Computing Perspective
AbstractThis paper analyzes the reasons for the significant influence of Dao Lang’s songs by calculating the proportion of modernity in the lyrics of “Rakshasa Sea City” in albums such as “Mountain Songs are Lonely” and “Red Classic”, especially in “...
- research-articleJuly 2024
A Cross-Chain Mechanism for Agricultural Engineering Document Management Blockchain in the Context of Big Data
AbstractCross-chain mechanism functions as typical approaches for information interaction between diverse blockchains tackling the problem of information silos in the big data era. Most of the existing cross-chain mechanisms are targeted at virtual ...
- research-articleJuly 2024
Early detection of rubber tree powdery mildew using UAV-based hyperspectral imagery and deep learning
- Tiwei Zeng,
- Yong Wang,
- Yuqi Yang,
- Qifu Liang,
- Jihua Fang,
- Yuan Li,
- Huiming Zhang,
- Wei Fu,
- Juan Wang,
- Xirui Zhang
Computers and Electronics in Agriculture (COEA), Volume 220, Issue Chttps://doi.org/10.1016/j.compag.2024.108909Highlights- Unmanned Aerial Vehicle (UAV) can detect rubber tree powdery mildew.
- The proposed MSA-CNN model improves the classification performance.
- Fused features perform better than single type of features.
Rubber tree powdery mildew(PM) is one of the most critical leaf diseases of rubber trees. The epidemic of this disease can seriously affect natural rubber yields and necessitates timely monitoring, especially in the early stages. In recent years, ...
- research-articleApril 2024
A full-scale hierarchical encoder-decoder network with cascading edge-prior for infrared and visible image fusion
Highlights- A novel full-scale hierarchical encoder-decoder network is proposed to unify the full-scale long-range semantic information and single-scale shallow details of multi-modal images.
- To comprehensively utilize the multilayer effective ...
Most existing deep learning-based infrared and visible image fusion methods always fail to consider the full-scale long-range correlation and the prior knowledge, resulting in the fused images with low-contrast salient objects and blurred edge ...
- research-articleJuly 2024
Deletion and insertion tampering detection for speech authentication based on fluctuating super vector of electrical network frequency
AbstractThe current digital speech deletion and insertion tampering detection methods mainly employes the extraction of phase and frequency features of the Electrical Network Frequency (ENF). However, there are some problems with the existing approaches, ...
Graphical abstractDisplay Omitted
Highlights- The ENF fluctuation super vector is extracted for audio tampering detection.
- An end-to-end DNN is designed for deletion and insertion tampering detection.
- Experiments have verified that the proposed method outperforms the SOTA ...
- research-articleFebruary 2024
A Clustering Method for Single-Cell RNA-Seq Data Based on Automatic Weighting Penalty and Low-Rank Representation
IEEE/ACM Transactions on Computational Biology and Bioinformatics (TCBB), Volume 21, Issue 3Pages 360–371https://doi.org/10.1109/TCBB.2024.3362472Advances in high-throughput single-cell RNA sequencing (scRNA-seq) technology have provided more comprehensive biological information on cell expression. Clustering analysis is a critical step in scRNA-seq research and provides clear knowledge of the cell ...
- research-articleApril 2024
Weakly supervised image segmentation beyond tight bounding box annotations
Computers in Biology and Medicine (CBIM), Volume 169, Issue Chttps://doi.org/10.1016/j.compbiomed.2023.107913AbstractWeakly supervised image segmentation approaches in the literature usually achieve high segmentation performance using tight bounding box supervision and decrease the performance greatly when supervised by loose bounding boxes. However, compared ...
Highlights- This work develops weakly supervised image segmentation beyond tight bounding boxes.
- It proposes a multiple instance learning strategy based on polar transformation.
- A weighted smooth maximum approximation is introduced for the bag ...
- research-articleSeptember 2024
Consistency and Complementarity Jointly Regularized Subspace Support Vector Data Description for Multimodal Data
International Journal of Intelligent Systems (IJIS), Volume 2024https://doi.org/10.1155/2024/1989706The one-class classification (OCC) problem has always been a popular topic because it is difficult or expensive to obtain abnormal data in many practical applications. Most of OCC methods focused on monomodal data, such as support vector data description (...
- research-articleSeptember 2024
Classification method of English micro-course resources on MOOC platform based on improved decision tree algorithm
International Journal of Computer Applications in Technology (IJCAT), Volume 74, Issue 1-2Pages 34–43https://doi.org/10.1504/ijcat.2024.141358To solve the problem of inaccurate classification results of current educational resource classification methods, a MOOC micro-class resource classification method based on improved decision tree algorithm is proposed. Firstly, adaptive reconstruction ...
- research-articleAugust 2024
CAT: A Consensus-Adaptive Trust Management Based on the Group Decision Making in IoVs
IEEE Transactions on Information Forensics and Security (TIFS), Volume 19Pages 7730–7743https://doi.org/10.1109/TIFS.2024.3442611Securing Internet of Vehicles (IoVs) systems against common threats such as false message injection remains challenging, and one typical approach is to deploy trust management solutions. In this work, we propose a Consensus-Adaptive Trust management (CAT) ...
- research-articleMay 2024
Research on power generation prediction of hydropower in river basin based on multi-head attention graph convolutional neural network
Journal of Computational Methods in Sciences and Engineering (JOCMSE), Volume 24, Issue 2Pages 797–811https://doi.org/10.3233/JCM237076For the power generation prediction of traditional hydropower stations, most of them only use time series prediction and neglect to study the spatial topological relationship of hydropower stations in the river basin, so that it is difficult to fully ...
- research-articleMay 2024
The spatial differentiation of human-environment relationship in mountain tourism destination, based on the image data of Landsat-8
Journal of Computational Methods in Sciences and Engineering (JOCMSE), Volume 24, Issue 2Pages 1131–1139https://doi.org/10.3233/JCM-247320Mountain is the most traditional tourism destination in China. On the basis of analyzing the particularity and its spatial differentiation of human-environment relationship in mountain tourism destination, this paper conducts empirical analysis in Yulong ...