- Advanced Computational Techniques and Applications
- Service-Oriented Architecture and Web Services
- Cognitive Computing and Networks
- Mobile Agent-Based Network Management
- Distributed and Parallel Computing Systems
- Data Mining Algorithms and Applications
- Rough Sets and Fuzzy Logic
- Data Management and Algorithms
- Remote-Sensing Image Classification
- Advanced Decision-Making Techniques
- Energy Efficient Wireless Sensor Networks
- Neurological Disorders and Treatments
- Radiomics and Machine Learning in Medical Imaging
- Cloud Computing and Remote Desktop Technologies
- Advanced Database Systems and Queries
- E-commerce and Technology Innovations
- Retinal Imaging and Analysis
- Graph Theory and Algorithms
- Safety and Risk Management
- AI in cancer detection
- Modular Robots and Swarm Intelligence
- Technology and Data Analysis
- Remote Sensing and Land Use
- Advanced Sensor and Control Systems
- AI and HR Technologies
Guangdong Polytechnic Normal University
2009-2022
Ningxia University
2016
Shanghai University
2007
Shanghai University of Engineering Science
2005
In the domain of natural language processing, Transformers are recognized as state-of-the-art models, which opposing to typical convolutional neural networks (CNNs) do not rely on convolution layers. Instead, employ multi-head attention mechanisms main building block capture long-range contextual relations between image pixels. Recently, CNNs dominated deep learning solutions for diabetic retinopathy grade recognition. However, spurred by advantages Transformers, we propose a...
The CCM.G-K2.2017 comparison was organised for the purpose of determination degree equivalence national standards free-fall acceleration measurement. held in Changping Campus National Institute Metrology China (NIM), from October to November 2017. This is first time that such a organized outside Europe continent and establishes new global sites China. also largest ever with participation 13 instruments. We give list participants who actually performed measurements during comparison, data...
Today, new study has been made to the Abnormal Access Discovery (AAD). While label-based AAD have proven effective in discovering known abnormal access, can be able automatically detect previously unrecorded risks. Traditional cannot meet evolving network workflows real time. To resolve this limitation, intelligence agent techniques used create a type of that dynamically model flow access. In paper, we present two methods for The include diagram-based probe method and classifying-based...
Traditional Chinese medicine (TCM) relies on a combination of the four diagnostic methods inspection, listening and smelling, inquiry, palpation to diagnose sleep disorders. This method doctor's practice experience his mastery TCM theory is subjective in nature, it necessary make diagnosis objective. We propose using an Adaptive neuro-fuzzy inference system (ANFIS) disorders TCM, with adaptive reasoning capabilities objectivity. Sleep disorder symptoms are first compressed by genetic...
Hospitals have accumulated a large amount of medical image data which need to be analyzed and integrated so as able find the needed in time, is basis key technologies such intelligent diagnosis diseases. Meanwhile, through analysis processing images, potential value existing can fully explored. In this paper, knowledge discovery system characteristics are studied improved. comprehensively considered, RDM texture features selected feature representation images. An improved operator proposed...
Abstract There are many different types of nuclei in a tumor tissue. We can identify the specific and their distribution tissue to reflect current cancer state histopathological images. However, due existence cellular heterogeneity, recognition images has always been problem computer vision. In paper, we use transfer learning Deep Convolutional Neural Network classify nuclei, found that adjusting size nuclear image certain improve accuracy classification model, while not significantly...
Asthma is one of the most common childhood chronic diseases worldwide. Subcutaneous immunotherapy (SCIT) commonly used in treatment house dust mite (HDM)‑related asthma children. However, therapeutic mechanism SCIT remains unclear. The present study aimed to investigate molecular biomarkers associated with HDM‑related asthmatic children prior and subsequent compared those healthy via proteomic analysis. included a control group (30 children), ‑Treatment allergic asthma) +Treatment treated...
Objective: The purpose of the study is to evaluate relationships among nodes in network.Materials and Methods: internet things like mix-linker currently are one successful services just after large websites such as Baidu, Tencent trading website TaoBao.Internet widely accepted gradually.Results: Hence, main finding that various patterns exploited for big data evaluating, which best method was performed combine all possible conditions along with using intelligent feedback model.The results...
In order to solve the lack of knowledge information security vulnerability analysis expert system, dynamic cooperation mechanism that is based on data dictionary and base as well relevant innovative techniques are put forward. Furthermore, system (ESDCM) forward problems. As core ESDCM, VA (vulnerability analysis) made up VAD-S in data-dictionary) VAK-S base). The paper introduced process models with (DD-KB) mechanism; gave comprehensive frame discussed some subsystems ESDCM; finally proved...
Despite the successful applications of probabilistic collaborative representation classification (PCRC) in pattern classification, it still suffers from two challenges when being applied on hyperspectral images (HSIs) classification: 1) ineffective feature extraction HSIs under noisy situation; and 2) lack prior information for classification. To tackle first problem existed PCRC, we impose sparse to i.e., replace 2-norm with 1-norm effective condition. In order utilize HSIs, introduce...
Knowledge Discovery, the science and technology of exploring knowledge in order to discover previously unknown patterns, is a part overall process getting information databases. In today’s computer-driven world, these databases contain lot information. The significant value this makes discovery matter considerable importance necessity. A decision tree predictive model which can be used represent both classifiers regression models. When for classification tasks, it more appropriately referred...
In this paper, we present an intelligence analysis and processing system based on state classify for the Semantic Concept Network (SCN). We argue that due significant change in costs of computation resource distribution, our is particularly suitable SCN environment with important resources. One interesting natures it provides time-sharing distribution offline resource, which allows user to reuse pre-computed information assembly time, contrast one-time all previous Intelligence Analysis...
As the Internet develops faster and faster, resources are becoming more abundant. It is difficult for people to retrieve information they need from a large number of resources. The professional retrieval system came into being. However, current can not meet user's requirements. In this paper, I propose new TF-IDF improved algorithm, which makes retrieved by presents with accurate result. experimental results show that algorithm achieve higher precision P Recall R.
One of the major difficulties in community environments is to organize learning, because fields, such as event handling or users remote monitoring, dispatching data important and critical. Internet Things (ITs) consists large semantic nodes which can be used many new producing fields like community. In this paper, a Hierarchy based reasoning standard has been proposed for fields. So it first place avoid learning much possible cases when escaping not possible, control learning. The called...
in Guang Dong province.The purpose of the study is to present an optimization method that searches for optimal solution exploiting weakness problem.Materials and Methods: The proposed was performed determine minimum number best positions moving web applications.Hence, main finding applications are added after original distribution overcome problem.To achieve exploiting, a employed find extra applications.Results: results shows ratio increases as deployed non-moving increases.Conclusion:...
Sensor Network Composition is a new area involving important technological need. Some of the main difficulties are to correctly describe Interaction Framework and Complexity Systems. Abstract interaction logic can be seen as technique for representing fuzzy mechanism. In this paper, we have presented solution use Systems in analysis. We proposed methods analyzing based on an abstract definition. The user’s logics formalized concepts. DOI: http://dx.doi.org/10.11591/telkomnika.v11i3.2175