|
|
|
Shaojian Qiu, Hao Xu, Jiehan Deng, Siyu Jiang and Lu Lu
Cross-project defect prediction (CPDP) is a practical solution that allows software defect prediction (SDP) to be used earlier in the software lifecycle. With the CPDP technique, the software defect predictor trained by labeled data of mature projects ca...
ver más
|
|
|
|
|
|
|
Shangchen Ma and Chunlin Song
Drivable road segmentation aims to sense the surrounding environment to keep vehicles within safe road boundaries, which is fundamental in Advance Driver-Assistance Systems (ADASs). Existing deep learning-based supervised methods are able to achieve good...
ver más
|
|
|
|
|
|
|
Suichao Wu, Chengjun Chen and Jinlei Wang
Semantic segmentation of assembly images is to recognize the assembled parts and find wrong assembly operations. However, the training of supervised semantic segmentation requires a large amount of labeled data, which is time-consuming and laborious. Mor...
ver más
|
|
|
|
|
|
|
Peipei He, Zheng Ma, Meiqi Fei, Wenkai Liu, Guihai Guo and Mingwei Wang
In point-cloud scenes, semantic segmentation is the basis for achieving an understanding of a 3D scene. The disorderly and irregular nature of 3D point clouds makes it impossible for traditional convolutional neural networks to be applied directly, and m...
ver más
|
|
|
|
|
|
|
Shuofeng Li, Bing Li, Jin Li, Bin Liu and Xin Li
At present, rice is generally in a state of dense adhesion and small granular volume during processing, resulting in no effective semantic segmentation method for rice to extract complete rice. Aiming at the above problems, this paper designs a small obj...
ver más
|
|
|
|
|
|
|
Florent Poux and Roland Billen
Automation in point cloud data processing is central in knowledge discovery within decision-making systems. The definition of relevant features is often key for segmentation and classification, with automated workflows presenting the main challenges. In ...
ver más
|
|
|
|
|
|
|
Lianlian He, Hao Li and Rui Zhang
Recent advances in knowledge graphs show great promise to link various data together to provide a semantic network. Place is an important part in the big picture of the knowledge graph since it serves as a powerful glue to link any data to its georeferen...
ver más
|
|
|
|
|
|
|
Jianyuan Li, Xiaochun Lu, Ping Zhang and Qingquan Li
The timely identification and detection of surface cracks in concrete dams, an important public safety infrastructure, is of great significance in predicting engineering hazards and ensuring dam safety. Due to their low efficiency and accuracy, manual de...
ver más
|
|
|
|
|
|
|
Zilin Zhao, Yuanying Chi, Zhiming Ding, Mengmeng Chang and Zhi Cai
Taxi travel time estimation based on real-time traffic flow collection in IoT has been well explored; however, it becomes a challenge to use the limited taxi data to estimate the travel time. Most of the existing methods in this scenario rely on shallow ...
ver más
|
|
|
|
|
|
|
Jose Aguilar, Camilo Salazar, Henry Velasco, Julian Monsalve-Pulido and Edwin Montoya
This paper analyses the capabilities of different techniques to build a semantic representation of educational digital resources. Educational digital resources are modeled using the Learning Object Metadata (LOM) standard, and these semantic representati...
ver más
|
|
|
|
|
|
|
Shanza Abbas, Muhammad Umair Khan, Scott Uk-Jin Lee and Asad Abbas
Natural language interfaces to databases (NLIDB) has been a research topic for a decade. Significant data collections are available in the form of databases. To utilize them for research purposes, a system that can translate a natural language query into...
ver más
|
|
|
|
|
|
|
Yongjian Li, He Li, Dazhao Fan, Zhixin Li and Song Ji
Sea ice extraction and segmentation of remote sensing images is the basis for sea ice monitoring. Traditional image segmentation methods rely on manual sampling and require complex feature extraction. Deep-learning-based semantic segmentation methods hav...
ver más
|
|
|
|
|
|
|
Shengyu Pei and Xiaoping Fan
Existing person re-recognition (Re-ID) methods usually suffer from poor generalization capability and over-fitting problems caused by insufficient training samples. We find that high-level attributes, semantic information, and part-based local informatio...
ver más
|
|
|
|
|
|
|
Tao Wang, Jingjing Chen, Li Liu and Lingling Guo
Recently, the deep learning technology has been adopted in the study of traditional village landscape. More precisely, it?s usually used to explore the representation of cultural heritage and the diversity of heritage information. In this study, we compr...
ver más
|
|
|
|
|
|
|
Suping Wang, Ligu Zhu, Lei Shi, Hao Mo and Songfu Tan
Cross-modal retrieval aims to elucidate information fusion, imitate human learning, and advance the field. Although previous reviews have primarily focused on binary and real-value coding methods, there is a scarcity of techniques grounded in deep repres...
ver más
|
|
|
|
|
|
|
Yaoqiang Pan, Xvlin Xiao, Kewei Hu, Hanwen Kang, Yangwen Jin, Yan Chen and Xiangjun Zou
In an unmanned orchard, various tasks such as seeding, irrigation, health monitoring, and harvesting of crops are carried out by unmanned vehicles. These vehicles need to be able to distinguish which objects are fruit trees and which are not, rather than...
ver más
|
|
|
|
|
|
|
Di Wang and Haizhong Qian
Existing research on automatic river network classification methods has difficulty scientifically quantifying and determining feature threshold settings and evaluating weights when calculating multi-indicator features of the local and overall structures ...
ver más
|
|
|
|
|
|
|
Yaxuan Wang, Zhixin Zeng, Qiushan Li and Yingrui Deng
Urban-safety perception is crucial for urban planning and pedestrian street preference studies. With the development of deep learning and the availability of high-resolution street images, the use of artificial intelligence methods to deal with urban-saf...
ver más
|
|
|
|
|
|
|
Hongwei Wei, Guanjun Lin, Lin Li and Heming Jia
Exploitable vulnerabilities in software systems are major security concerns. To date, machine learning (ML) based solutions have been proposed to automate and accelerate the detection of vulnerabilities. Most ML techniques aim to isolate a unit of source...
ver más
|
|
|
|
|
|
|
Yuhuan Wu and Yonghong Wu
Salient object detection (SOD) aims to identify the most visually striking objects in a scene, simulating the function of the biological visual attention system. The attention mechanism in deep learning is commonly used as an enhancement strategy which e...
ver más
|
|
|
|