Search scope:
排序: Display mode:
Latent discriminative representation learning for speaker recognition Research Articles
Duolin Huang, Qirong Mao, Zhongchen Ma, Zhishen Zheng, Sidheswar Routryar, Elias-Nii-Noi Ocquaye,2211708034@stmail.ujs.edu.cn,mao_qr@ujs.edu.cn,zhongchen_ma@ujs.edu.cn,1209103822@qq.com,sidheswar69@gmail.com,eocquaye@ujs.edu.cn
Frontiers of Information Technology & Electronic Engineering 2021, Volume 22, Issue 5, Pages 615-766 doi: 10.1631/FITEE.1900690
Keywords: 说话人识别;潜在可区分性表征学习;说话人嵌入查找表;线性映射矩阵
Study on Extension Engineering
Yang Chunyan, Cai Wen
Strategic Study of CAE 2000, Volume 2, Issue 12, Pages 90-96
Extension engineering is the application technology of extension theory and extension method. It has been applied to some engineering fields such as detection, control, management, information and computer, etc. . In this paper, its basic ideas, tools, methods and applications will be introduced.
Keywords: contradictory problem extension set extensibility extension engineering
Exploring financially constrained small- and medium-sized enterprises based on a multi-relation translational graph attention network Research Article
Qianqiao LIANG, Hua WEI, Yaxi WU, Feng WEI, Deng ZHAO, Jianshan HE, Xiaolin ZHENG, Guofang MA, Bing HAN
Frontiers of Information Technology & Electronic Engineering 2023, Volume 24, Issue 3, Pages 388-402 doi: 10.1631/FITEE.2200151
Keywords: Financing needs exploration Graph representation learning Transfer heterogeneity Behavior heterogeneity
Engineering Disease Resistance in Crop Plants: Callosic Papillae as Potential Targets
Geoffrey B. Fincher
Engineering 2020, Volume 6, Issue 5, Pages 505-508 doi: 10.1016/j.eng.2020.03.012
A Fault Location Approach for the Testable Realization of Logic Functions
Pan Zhongliang
Strategic Study of CAE 2002, Volume 4, Issue 1, Pages 69-74
An approach of design for testability(DFT) for logic functions is presented in the paper, which employs AND gates and XOR gates tree to realize the generalized Reed-Muller expression of arbitrary logic functions. The major features of the approach are: 1) The circuits adopting the DPT techniques in the paper are totally fault locatable. 2) The circuits have universal test sets for fault detection, the cardinality of the test sets is (n + 5), where n is equal to the number of input variables in the logic function. A fault location method for the circuits is presented, which can identify all fault equivalence classes in the AND gates, and the faults in XOR gate tree in the circuits.
Keywords: logic functions Reed-Muller expressions design for testability single stuck at fault faults location
Quantum security analysis of a lattice-basedoblivious transfer protocol Article
Mo-meng LIU, Juliane KRÄMER, Yu-pu HU, Johannes BUCHMANN
Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 9, Pages 1348-1369 doi: 10.1631/FITEE.1700039
Keywords: Oblivious transfer Post-quantum Lattice-based Learning with errors Universally composable
Representation learning via a semi-supervised stacked distance autoencoder for image classification Research Articles
Liang Hou, Xiao-yi Luo, Zi-yang Wang, Jun Liang,jliang@zju.edu.cn
Frontiers of Information Technology & Electronic Engineering 2020, Volume 21, Issue 7, Pages 963-1118 doi: 10.1631/FITEE.1900116
Keywords: 自动编码器;图像分类;半监督学习;神经网络
The provable security formal analysis of 802.11i authentication scheme
Song Yubo,Hu Aiqun,Yao Bingxin
Strategic Study of CAE 2010, Volume 12, Issue 1, Pages 67-73
802.11i standard is proposed by IEEE 802.11 Standard Group to improve the security of the WLAN. In 802.11i, 802.1x standard is used for the authentication and access controll. How to analyze the security of the new protocol to prove its validity is the most interesting problem we are concerned. In order to solve this problem, an expanded Bellare-Rogaway model is established to give a provable security formal analysis on this protocol. By utilizing the expanded Bellare-Rogaway model, a flaw has been found in 802.1X authentication protocols and the corresponding man-in-the-middle attack is given here.
Keywords: 802.11i Bellare-Rogaway model provable security formal analysis
Visual interpretability for deep learning: a survey Review
Quan-shi ZHANG, Song-chun ZHU
Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 1, Pages 27-39 doi: 10.1631/FITEE.1700808
Keywords: Artificial intelligence Deep learning Interpretable model
Chen Shouyu
Strategic Study of CAE 2001, Volume 3, Issue 2, Pages 33-38
Based on analysis of the relationship between sustainable development and bearing capacity of regional water resources, this paper presents a fuzzy pattern recognition model and a method for qualitative assessment of sustainable development of regional water resources, which are applied to assess the sustainable development of water resources of Hanzhong Basin. The case study proves that the model and method are reliable and that results are reasonable and practicable. They can also be applied to the assessment of the sustainable development of social economies.
Keywords: water resources sustainable development assessment pattern recognition fuzzy
Learning embeddings of a heterogeneous behavior network for potential behavior prediction Article
Yue-yang WANG, Wei-hao JIANG, Shi-liang PU, Yue-ting ZHUANG
Frontiers of Information Technology & Electronic Engineering 2020, Volume 21, Issue 3, Pages 422-435 doi: 10.1631/FITEE.1800493
Keywords: Network embedding Representation learning Human behavior Social networks Heterogeneous information network Attribute
Haizhou Wang, Lei Zhao, Yunhai Jia, Dongling Li, Lixia Yang, Yuhua Lu, Guang Feng, Weihao Wan
Engineering 2020, Volume 6, Issue 6, Pages 621-636 doi: 10.1016/j.eng.2020.05.005
Macroscopic materials are heterogeneous, multi-elementary, and complex. No material is homogeneous or isotropic at a certain small scale. Parts of the material that differ from one another can be termed ‘‘natural chips.” At different spots on the material, the composition, structure, and properties vary slightly, and the combination of these slight differences establishes the overall material performance. This article presents a state-of-the-art review of research and applications of high-throughput statistical spatialmapping characterization technology based on the intrinsic heterogeneity within materials. Highthroughput statistical spatial-mapping uses a series of rapid characterization techniques for analysis from the macroscopic to the microscopic scale. Datasets of composition, structure, and properties at each location are obtained rapidly for practical sample sizes. Accurate positional coordinate information and references to a point-to-point correspondence are used to set up a database that contains spatialmapping lattices. Based on material research and development design requirements, dataset spatialmapping within required target intervals is selected from the database. Statistical analysis can be used to select a suitable design that better meets the targeted requirements. After repeated verification, genetic units that reflect the material properties are determined. By optimizing process parameters, the assembly of these genetic unit(s) is verified at the mesoscale, and quantitative correlations are established between the microscale, mesoscale, macroscale, practical sample, across-the-scale span composition, structure, and properties. The high-throughput statistical spatial-mapping characterization technology has been applied to numerous material systems, such as steels, superalloys, galvanization, and ferrosilicon alloys. This approach has guided the composition and the process optimization of various materials.
Keywords: Material heterogeneity High-throughput characterization Statistical spatial-mapping Original-position statistical-distribution analysis
Reliability and Life Management on Aeroengine Used in Army
Xu Kejun,Jiang Longping
Strategic Study of CAE 2003, Volume 5, Issue 1, Pages 82-88
Based on the reliability and life management on aeroengines used in army in western countries, the basic elements of aeroengine reliability and life management are expatiated, and the differences and errors about reliability in China are discussed. The reason that the reliability and life management lag behind is pointed out, for example, outmoded management concept, inadequate management system, weak groundwoork, imperfect standard Finally, the paper points out the proper way to construct and improve the reliability and life managtment in China.
Keywords: aeroengine reliability life management
New directions for artificial intelligence: human, machine, biological, and quantum intelligence Comment
Li WEIGANG,Liriam Michi ENAMOTO,Denise Leyi LI,Geraldo Pereira ROCHA FILHO
Frontiers of Information Technology & Electronic Engineering 2022, Volume 23, Issue 6, Pages 984-990 doi: 10.1631/FITEE.2100227
This comment reviews the “once learning” mechanism (OLM) that was proposed byWeigang (1998), the subsequent success of “one-shot learning” in object categories (Li FF et al., 2003), and “you only look once” (YOLO) in objective detection (Redmon et al., 2016). Upon analyzing the current state of research in artificial intelligence (AI), we propose to divide AI into the following basic theory categories: artificial human intelligence (AHI), artificial machine intelligence (AMI), artificial biological intelligence (ABI), and artificial quantum intelligence (AQI). These can also be considered as the main directions of research and development (R&D) within AI, and distinguished by the following classification standards and methods: (1) human-, machine-, biological-, and quantum-oriented AI R&D; (2) information input processed by dimensionality increase or reduction; (3) the use of one/a few or a large number of samples for knowledge learning.
Keywords: 人工智能;机器学习;一次性学习;一瞥学习;量子计算
Personalizing a Service Robot by Learning Human Habits from Behavioral Footprints Article
Kun Li, Max Q.-H. Meng
Engineering 2015, Volume 1, Issue 1, Pages 79-84 doi: 10.15302/J-ENG-2015024
For a domestic personal robot, personalized services are as important as predesigned tasks, because the robot needs to adjust the home state based on the operator's habits. An operator's habits are composed of cues, behaviors, and rewards. This article introduces behavioral footprints to describe the operator's behaviors in a house, and applies the inverse reinforcement learning technique to extract the operator's habits, represented by a reward function. We implemented the proposed approach with a mobile robot on indoor temperature adjustment, and compared this approach with a baseline method that recorded all the cues and behaviors of the operator. The result shows that the proposed approach allows the robot to reveal the operator's habits accurately and adjust the environment state accordingly.
Keywords: personalized robot habit learning behavioral footprints
Title Author Date Type Operation
Latent discriminative representation learning for speaker recognition
Duolin Huang, Qirong Mao, Zhongchen Ma, Zhishen Zheng, Sidheswar Routryar, Elias-Nii-Noi Ocquaye,2211708034@stmail.ujs.edu.cn,mao_qr@ujs.edu.cn,zhongchen_ma@ujs.edu.cn,1209103822@qq.com,sidheswar69@gmail.com,eocquaye@ujs.edu.cn
Journal Article
Exploring financially constrained small- and medium-sized enterprises based on a multi-relation translational graph attention network
Qianqiao LIANG, Hua WEI, Yaxi WU, Feng WEI, Deng ZHAO, Jianshan HE, Xiaolin ZHENG, Guofang MA, Bing HAN
Journal Article
Engineering Disease Resistance in Crop Plants: Callosic Papillae as Potential Targets
Geoffrey B. Fincher
Journal Article
A Fault Location Approach for the Testable Realization of Logic Functions
Pan Zhongliang
Journal Article
Quantum security analysis of a lattice-basedoblivious transfer protocol
Mo-meng LIU, Juliane KRÄMER, Yu-pu HU, Johannes BUCHMANN
Journal Article
Representation learning via a semi-supervised stacked distance autoencoder for image classification
Liang Hou, Xiao-yi Luo, Zi-yang Wang, Jun Liang,jliang@zju.edu.cn
Journal Article
The provable security formal analysis of 802.11i authentication scheme
Song Yubo,Hu Aiqun,Yao Bingxin
Journal Article
Theory Model and a Method for Qualitative Assessment of Sustainable Development of Regional Water Resources
Chen Shouyu
Journal Article
Learning embeddings of a heterogeneous behavior network for potential behavior prediction
Yue-yang WANG, Wei-hao JIANG, Shi-liang PU, Yue-ting ZHUANG
Journal Article
State-of-the-Art Review of High-Throughput Statistical Spatial-Mapping Characterization Technology and Its Applications
Haizhou Wang, Lei Zhao, Yunhai Jia, Dongling Li, Lixia Yang, Yuhua Lu, Guang Feng, Weihao Wan
Journal Article
New directions for artificial intelligence: human, machine, biological, and quantum intelligence
Li WEIGANG,Liriam Michi ENAMOTO,Denise Leyi LI,Geraldo Pereira ROCHA FILHO
Journal Article