Search Results - "2020 International Conference on High Performance Big Data and Intelligent Systems (HPBD&IS)"

Refine Results
  1. 1

    Multi-angle Head Pose Classification when Wearing the Mask for Face Recognition under the COVID-19 Coronavirus Epidemic by Li, Shuang, Ning, Xin, Yu, Lina, Zhang, Liping, Dong, Xiaoli, Shi, Yuan, He, Wei

    “…Head pose classification is widely used for the preprocessing before face recognition and multi-angle problems, because algorithms such as face recognition…”
    Get full text
    Conference Proceeding
  2. 2

    FPGA-based High-performance CNN Accelerator Architecture with High DSP Utilization and Efficient Scheduling Mode by Yin, Qiao, Li, Yunfeng, Huang, Hanzi, Li, Hu, Zhang, Qianwu, Cao, Bingyao, Zhang, JunJie

    “…Due to the great increase of the on-chip block memory for the latest field programmable gate array (FPGA), the highly efficient utilization of the on-chip DSP…”
    Get full text
    Conference Proceeding
  3. 3

    Face Liveness Detection Algorithm based on Livenesslight Network by Zuo, Yinlong, Gao, Wenlong, Wang, Jintao

    “…Face liveness detection is the first stage of the whole face detection technology, and it is of great significance to the system security using face…”
    Get full text
    Conference Proceeding
  4. 4

    TrustCA: Achieving Certificate Transparency Through Smart Contract in Blockchain Platforms by Zhao, Jian, Lin, Zexuan, Huang, Xiaoxiao, Zhang, Yiwei, Xiang, Shaohua

    “…Certificate Authorities (CAs) are important components for digital certificate issuances in Public Key Infrastructure(PKI). However, current CAs have some…”
    Get full text
    Conference Proceeding
  5. 5

    TIGER Algorithm by Kermany, Saman Darvish

    “…TIGER Algorithm (TA) is a metaheuristic algorithm that has been designed for finding global and some noticeable local optimization points. TIGER algorithm is…”
    Get full text
    Conference Proceeding
  6. 6

    Understanding the Workload Characteristics in Alibaba: A View from Directed Acyclic Graph Analysis by Lu, Chengzhi, Chen, Wenyan, Ye, Kejiang, Xu, Cheng-Zhong

    “…Cloud computing technology is widely used in data centers due to the benefits such as high scalability, high availability, on-demand provision, and so on…”
    Get full text
    Conference Proceeding
  7. 7

    Research on Blockchain-Based Identity Verification Between IoV Entities by Zhou, Yuan, Liu, Qingyi, Liu, Mingshan, Wang, Ying, Ren, Caiqin

    “…As the outcome of the reform of the automobile industry driven by mobile communication, automotive electronics and new automotive bus, Internet of…”
    Get full text
    Conference Proceeding
  8. 8

    Improving the accuracy of SqueezeNet with negligible extra computational cost by Liu, Yi, Li, Zhiyuan, Chen, Xu, Gong, Guoliang, Lu, Huaxiang

    “…The deep neural network has a strong ability to solve problems in different fields such as computer vision and natural language processing. The development of…”
    Get full text
    Conference Proceeding
  9. 9
  10. 10

    Image Quality Assessment based on Dual Domains Fusion by Lu, Yaxuan, Li, Weijun, Ning, Xin, Dong, Xiaoli, Zhang, Yakun, Sun, Linjun

    “…Image quality assessment is an important and necessary task in the field of image processing. It can simulate human visual perception accurately and…”
    Get full text
    Conference Proceeding
  11. 11

    MDD-Net: A novel defect detection model of material microscope image by Zhou, Weiyu, Yan, Hairong, Zhang, Yuefei

    “…The defects in the microscopic image of the material have an important influence on the macroscopic properties of the material. Statistics of the number and…”
    Get full text
    Conference Proceeding
  12. 12

    PLS-VIO: Stereo Vision-inertial Odometry Based on Point and Line Features by Wen, Huanyu, Tian, Jindong, Li, Dong

    “…Traditional point feature-based vision SLAMs are difficult to find reliable point features to estimate camera pose in a weakly textured long corridor…”
    Get full text
    Conference Proceeding
  13. 13

    A Novel Unsupervised Dead-value Detection Method for Monitoring Indicators in Data Center by Wang, Chao, Huang, Jianwen, Zeng, Haitian, Wang, Zhaoguo, Xue, Yibo

    “…For equipment monitoring, monitoring data are continuously generated, and when the monitoring data remain constant abnormally, we believe that these are dead…”
    Get full text
    Conference Proceeding
  14. 14

    Knowledge Graph for Multi-source Data Fusion Topics Research by Wang, Juan, Lan, Yuexin, Zhang, Shuangshi, Xia, Yixue, Wu, Chunying, Chen, Lei

    “…Multi-source data fusion technology is an important cornerstone of research on big data and artificial intelligence. However, due to the limitations of…”
    Get full text
    Conference Proceeding
  15. 15

    On the Design of a Blockchain-based Student Quality Assessment System by Liang, Xiubo, Zhao, Qian

    “…Blockchain technology has been applied in different fields with the advantages of decentralization, anonymity, immutability and reliability. There are quite a…”
    Get full text
    Conference Proceeding
  16. 16

    Digital Core 3D Reconstruction Based on Micro-CT images via a Deep Learning Method by Bai, Yunfeng, Berezovsky, Vladimir, Popov, Vasily

    “…Digital core technology is the cutting-edge technology of petroleum engineering. Digital core 3D reconstruction is a key issue in digital core technology. At…”
    Get full text
    Conference Proceeding
  17. 17

    A Destination Prediction Model for Individual Passengers in Urban Rail Transit by Wang, Hao, Zhao, Juanjuan, Ye, Kejiang, Xu, Cheng-Zhong, Zhang, Liutao, Zhang, Jun, Sun, Jing

    “…Urban rail transit, as an important part of public transportation, plays an important role in solving the problems of large urban public traffic flow and road…”
    Get full text
    Conference Proceeding
  18. 18

    A Cordic-based Acceleration Method On FPGA For CNN Normalization layer by Cao, Yongxiang, Xiao, Wan'ang, Jia, Jingdun

    “…This paper studies the accelerated method used by FPGA to implement the Alexnet Normalization layer, a classic network of the classical network. This paper…”
    Get full text
    Conference Proceeding
  19. 19

    Erasure-Code Algorithm for Distributed Stream Processing by Lu, Minghui, Xiong, Chao, Fan, Xiaopeng

    “…With the production of more and more data, the requirements for stream computing in the era of big data are also increasing rapidly. The Internet of Everything…”
    Get full text
    Conference Proceeding
  20. 20

    Thangka image edge detection algorithm based on morphology and RCF by Liu, Qian, Shi, Wei, Liu, Jie

    “…Thangka image includes rich content and complex texture. Because the contour of Thangka image contains abundant image data information, edge detection is very…”
    Get full text
    Conference Proceeding