- Reinforcement Learning in Robotics
- Human Pose and Action Recognition
- Software Engineering Research
- Network Security and Intrusion Detection
- Domain Adaptation and Few-Shot Learning
- Security in Wireless Sensor Networks
- Speech and Audio Processing
- Software Testing and Debugging Techniques
- Medical Image Segmentation Techniques
- Brain Tumor Detection and Classification
- Adversarial Robustness in Machine Learning
- Advanced Malware Detection Techniques
- Robot Manipulation and Learning
- Insect and Pesticide Research
- Environmental Engineering and Cultural Studies
- Risk and Portfolio Optimization
- Physical Unclonable Functions (PUFs) and Hardware Security
- Privacy-Preserving Technologies in Data
- Social Robot Interaction and HRI
- Digital Marketing and Social Media
- Adaptive Dynamic Programming Control
- Neuroscience and Neuropharmacology Research
- Digital Media and Visual Art
- Innovation and Knowledge Management
- Data Stream Mining Techniques
NARI Group (China)
2020-2024
Beijing University of Posts and Telecommunications
2024
Tianjin University of Technology
2024
University of Technology Sydney
2023
Soochow University
2012-2023
Nanjing University
2022-2023
Jimei University
2022-2023
Xidian University
2023
Zhejiang University of Technology
2023
The Ohio State University
2022
Allocation strategy is a way to find problems inside the network, and it also put at edge of network. In central router scheme, each decides when transmit data packets which reject, same time notifies host generating network traffic send packet number. hosting final monitors status adjusts its behavior accordingly. Ice snow sports has gradually become entertainment for people, improving their knowledge physical exercise. Various forms activities have been taken, such as shooting, running,...
Uncertain time series analysis is a method to predict future values based on imprecisely observed values. As basic model of uncertain series, an autoregressive has been presented. However, the existing paper ignores temporal dependence information embedded in time-series data. In dealing with this issue, adds least absolute shrinkage and selection operator penalty traditional selects optimum order according Akaike’s final prediction error criterion. Finally, two numerical examples are given...
GUI testing has been prevailing in software testing. However, existing automated tools mostly rely on frameworks of a specific platform. Testers have to fully understand platform features before developing platform-dependent tools. Starting from the perspective tester's vision, we observe that GUIs different platforms share commonalities widget images and layout designs, which can be leveraged achieve platform-independent We propose UniRLTest, an framework, independence UniRLTest utilizes...
Cooperative Multi-agent Reinforcement Learning (CMARL) has shown to be promising for many real-world applications. Previous works mainly focus on improving coordination ability via solving MARL-specific challenges (e.g., non-stationarity, credit assignment, scalability), but ignore the policy perturbation issue when testing in a different environment. This hasn't been considered problem formulation or efficient algorithm design. To address this issue, we firstly model as Limited Policy...
Multi-agent Reinforcement Learning (MARL) has gained wide attention in recent years and made progress various fields. Specifically, cooperative MARL focuses on training a team of agents to cooperatively achieve tasks that are difficult for single agent handle. It shown great potential applications such as path planning, autonomous driving, active voltage control, dynamic algorithm configuration. One the research field is how improve coordination efficiency system, while work mainly been...
A hybrid neuro-fuzzy model for predicting crime in a wide area such as town or district presented. The is built using what we describe indicator events extracted from simulated surveillance network. framework principally involves two phases, namely video analysis and modeling phases. In concept based approach event detection used to detect events. Based on the indicators with other related variables, fuzzy inference system capable of learning constructed second phase. Violent scene (VSD)...
In cooperative multi-agent reinforcement learning (MARL), where an agent coordinates with teammate(s) for a shared goal, it may sustain non-stationary caused by the policy change of teammates. Prior works mainly concentrate on during training phase or teammates altering cross episodes, ignoring fact that suffer from suddenly within episode, which might lead to miscoordination and poor performance as result. We formulate problem open Dec-POMDP, we control some agents coordinate uncontrolled...
This paper is part of a special issue on Music Technology. Accurate estimation glottal wave an important method for singing voice analysis via voicing patterns. In this paper, optimising proposed automatic determination vocal tract linear prediction order that follows the specific situation different scenes based Iterative Adaptive Inverse Filtering (IAIF) aiming at getting more accurate from speech or signal in non-invasive way. comparison with existing methods use fixed experience order,...
Multi-scale morphological top-hat transformation has been widespread used in pattern recognition, but the selection of scale is still very subjective and empirical. To automate selection, an automatic approach based on mutual information proposed property criterion investigated extensively this paper. Experimental results indicated that algorithm was capable selecting proper to for extraction uneven background illumination.
Haze is a phenomenon caused by excessive PM2.5 (air-borne particulate matter having diameter of fewer than 2.5 μm) and other pollutants results from the interaction between specific climatic conditions human activities. It significantly impacts health, transportation, natural environment has aroused widespread concern. However, influence haze on mental being hidden indirect, often overlooked. When pollution occurs, people express their feelings concerns about events media such as Weibo. At...
Abstract The rapid development of the information Internet has promoted electronic contracts, but user identities have been stolen and contracts are easily tampered with. Seriously affected fairness security online transactions. For main body transaction, how to confirm that data identity transaction not misused contract is key problem which needs be solved first. This paper designs platform by combining authentication, encrypted transmission blockchain ledger storage. Ensure uniqueness,...
Marketing and consumer behavior are all about psychology understanding an individual's mind process of purchasing item.Marketing is appealing to what individual believes they need in their life selling that lifestyle them.Marketing shows off the best aspects product consumers hopes it will appeal masses sale bringing profits for a company.To be successful any market depends on where placed whom she targeting this sold.There lot great products however without proper marketing segmentation,...
Mass Entrepreneurship and Innovation" has been the development trend of era with strong impulsion Government China, which promotes innovation as selfawareness participated by all people.As foundation independent innovation, it is important to popularize approach improve capability innovation.This article conducts analysis on current status investigation results TRIZ theory, designs theory promotion application system "dominated government, joint participation multiple subjects".In addition,...
Abstract An adversary can easily capture a wireless sensor network (WSN) node and extract the security information stored in node, including keys, shared secrets so on. Due resources limitation, traditional encryption authentication protocols are impractical on WSN nodes. In this letter, we proposed lightweight energy-efficient anti-clone design for nodes, which physical unclonable function (PUF) is adopted to enhance of The new structure aims at achieving low cost energy method prevent be...
In response to the problem that previous pose detection systems are not effective under conditions such as severe occlusion or uneven illumination, this paper focuses on multimodal information fusion estimation problem. The main work is design a data algorithm for of in complex scenes low-texture targets and poor lighting conditions. network takes images point clouds input extracts local color spatial features target object using improved DenseNet PointNet++ networks, which combined with...