March 2025
·
2 Reads
Knowledge-Based Systems
This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.
March 2025
·
2 Reads
Knowledge-Based Systems
January 2024
·
3 Reads
August 2023
·
13 Reads
·
1 Citation
Chinese Journal of Aeronautics
June 2023
·
58 Reads
Discriminative dictionary learning (DDL) has attracted significant attention in the field of image classification. To enhance the classification performance, most existing discriminative dictionary learning methods introduce supervision information on the dictionary to project raw training samples into a coefficient subspace. However, the strict constraint on coefficient features may not conducive to the separation of the training samples from different classes for dictionary learning. In this paper, we propose Relaxed Support Vector based Dictionary Learning (RSVDL) for image recognition, which can efficiently learn coefficient features with powerful discrimination and representation capabilities. By constructing a relaxed coefficient subspace that is closely associated with label information, the discriminative of the learned dictionary is also improved. Experimental results on several benchmark datasets show that the proposed RSVDL method is very effective for various image classification tasks. Moreover, the experiments on more challenging datasets further reveal the state-of-art performance of our method by using with the CNN features.
June 2023
·
18 Reads
·
1 Citation
Applied Intelligence
Recently, Zero-Shot Learning (ZSL) has gained great attention due to its significant classification performance for novel unobserved classes. As seen and unseen classes are completely disjoint, the current ZSL methods inevitably suffer from the domain shift problem when transferring the knowledge between the observed and unseen classes. Additionally, most ZSL methods especially those targeting the semantic space may cause the hubness problem due to their use of nearest-neighbor classifiers in high-dimensional space. To tackle these issues, we propose a novel pathway termed Regularized Label Relaxation-based Stacked Autoencoder (RLRSA) to diminish the domain difference between seen and unseen classes by exploiting an effective label space, which has some notable advantages. First, the proposed method establishes the tight relations among the visual representation, semantic information and label space using via the stacked autoencoder, which is beneficial for avoiding the projection domain shift. Second, by incorporating a slack variable matrix into the label space, our RLRSA method has more freedom to fit the test samples whether they come from the observed or unseen classes, resulting in a very robust and discriminative projection. Third, we construct a manifold regularization based on a class compactness graph to further reduce the domain gap between the seen and unseen classes. Finally, the learned projection is utilized to predict the class label of the target sample, thus the hubness issue can be prevented. Extensive experiments conducted on benchmark datasets clearly show that our RLRSA method produces new state-of-the-art results under two standard ZSL settings. For example, the RLRSA obtains the highest average accuracy of 67.82% on five benchmark datasets under the pure ZSL setting. For the generalized ZSL task, the proposed RLRSA is still highly effective, e.g., it achieves the best H result of 58.9% on the AwA2 dataset.
September 2022
·
23 Reads
Abstract Zero‐shot learning (ZSL) is to identify target categories without labeled data, in which semantic information is used to transfer knowledge from some seen categories. In the existing Generalized Zero‐Shot Learning (GZSL) methods, domains shift problem always appeared during generating feature stage. In order to solve this problem, a new method to Auto‐Encode the Synthesis Pseudo Features for the GZSL task (AESPF‐GZSL) is proposed in this manuscript. Specifically, the AESPF‐GZSL method trains the generated features under the semantic auto‐encoder framework and exploits attention mechanism to train the generated features again. Then, the generated features are input to the classifier. The proposed method is performed on three benchmark data sets referred as to AWA, CUB and SUN. The experimental results show that the proposed method achieves the state‐of‐the art classifier accuracy both in ZSL and GZSL settings. In ZSL setting, the classification accuracy of our method is superior to the compared algorithms, improved by 0.40% in AWA and 0.30% in SUN, respectively. And in GZSL setting, the classification accuracy of the method is superior to the comparison algorithm 0.41% in Harmonic mean on AWA, and 1.01%, 0.62%, and 1.05% in training data set, testing data set, and harmonic average on SUN.
August 2022
·
258 Reads
·
3 Citations
Journal of Healthcare Engineering
This work is devoted to establishing a comparatively accurate classification model between symptoms, constitutions, and regimens for traditional Chinese medicine (TCM) constitution analysis to provide preliminary screening and decision support for clinical diagnosis. However, for the analysis of massive distributed medical data in a cloud platform, the traditional data mining methods have the problems of low mining efficiency and large memory consumption, and long tuning time, an association rules method for TCM constitution analysis (ARA-TCM) is proposed that based on FP-growth algorithm and the open-source distributed file system in Hadoop framework (HDFS) to make full use of its powerful parallel processing capability. Firstly, the proposed method was used to explore the association rules between the 9 kinds of TCM constitutions and symptoms, as well as the regimen treatment plans, so as to discover the rules of typical clinical symptoms and treatment rules of different constitutions and to conduct an evidence-based medical evaluation of TCM effects in constitution-related chronic disease health management. Secondly, experiments were applied on a self-built TCM clinical records database with a total of 30,071 entries and it is found that the top three constitutions are mid constitution (42.3%), hot and humid constitution (31.3%), and inherited special constitution (26.2%), respectively. What is more, there are obvious promotions in the precision and recall rate compared with the Apriori algorithm, which indicates that the proposed method is suitable for the classification of TCM constitutions. This work is mainly focused on uncovering the rules of “disease symptoms constitution regimen” in TCM medical records, but tongue image and pulse signal are also very important to TCM constitution analysis. Therefore, this additional information should be considered into further studies to be more in line with the actual clinical needs.
August 2022
·
69 Reads
·
2 Citations
The Journal of Supercomputing
In the edge computing, service placement refers to the process of installing service platforms, databases, and configuration files corresponding to computing tasks on edge service nodes. In order to meet the latency requirements of new types of applications, service placement in edge computing becomes critical. The service placement strategy must be carried out in accordance with the relevant tasks within the program. However, previous research has paid little attention to related tasks within the application. If the service placement strategy does not consider task relevance, the system will frequently switch services and cause serious system overhead. In this paper, we mainly study the problem of service placement in edge computing. At the same time, we considered the issue of network access point selection during data transmission and the dependencies of task execution. We propose a Dynamic Service Placement List Scheduling (DSPLS) algorithm based on dynamic remaining task service time prediction. We conducted relevant simulation experiments, and our algorithm took the least amount of time to complete the task.
October 2021
·
24 Reads
·
2 Citations
October 2021
·
29 Reads
·
4 Citations
... additionally, optimizing nutrition, improving sleep quality [49], and implementing fatigue-relief measures can further reduce inflammation and support postoperative rehabilitation [50]. For patients predisposed to inflammation, it is essential to enhance their physical condition through lifestyle modifications, regular exercise, a balanced diet, and, when necessary, pharmacological interventions during the recovery phase [51]. This multifaceted approach ensures comprehensive care and promotes optimal recovery outcomes. ...
August 2022
Journal of Healthcare Engineering
... Firstly, to reduce the computational effort of subsequent tongue image analysis, we use a tongue image detection algorithm based on the SSD network model [27] to detect the tongue images. We input the collected raw tongue data into the SSD network model, and after detecting the tongue body, we locate the tongue body region to generate a crop frame and crop the tongue image to obtain a picture including the tongue body region. ...
October 2021
... Gao et al. [24] studied the relationship between network access point selection problem and task execution during data transmission in MEC selection problem and task execution up relationship, thus minimizing the task completion time. Xu et al. [25] proposed an energy-efficient dynamic task migration algorithm (EDTM) that minimizes total system energy consumption while ensuring UAS load balancing, but its performance has not been tested in a real environment. Gong et al. [26] proposed a reinforcement learning-based service migration strategy approach, but the computational complexity is high and more complicated within the state space. ...
August 2022
The Journal of Supercomputing
... For example, when consumers find a product they like, they will show a happy expression, and when they do not like it, they will shake their heads or show a relatively calm expression. When facial expressions are recognized, details are the key to distinguish facial expressions, so it is necessary to be able to analyze the subtle deformation of facial expressions (Pereira et al., 2019;Yuan and Wu, 2020;Song et al., 2021). Therefore, the key feature points of the face image training set need to be calibrated, which can be expressed as follows: ...
August 2021
... Practitioners need to trust and understand AI outputs for them to be effectively used in treatment planning. The importance of developing user-friendly AI tools that can be seamlessly integrated into the daily practice of TCM should be emphasized 239,240 . Ethical Considerations and Patient Privacy: As with all applications of AI in healthcare, ethical considerations, particularly regarding patient privacy, are paramount. ...
August 2021
IEEE Access
... Xie, Weng, and Zhou [18] proposed a new construction for revocable identity-based fully homomorphic signature based on the assumption of short integer solution in the random oracle model. Liu et al. [19] introduced a new definition which was called distributed functional signatures, which satisfies the program privacy. ...
March 2021
... In recent years, zero-shot learning (ZSL) has emerged as a hot research topic in the field of computer vision [18][19][20][21]. Initially proposed by Lampert et al [22] in 2009, this technique primarily aims to address the challenge of recognizing unknown categories when available labeled training samples are insufficient to cover all target classes. ...
December 2020
Neurocomputing
... A typical branch is Transductive ZSL (TZSL), which introduces the prior information of unseen samples to model training additionally. Another commonly used method is the bi-mapping of visual and semantic features, such as AutoEncoder (AE) strategy [8,14] . The dual mapping mode strengthens the correspondence between visual and semantic features, thereby reducing the mapping bias. ...
September 2019
... The learned patch-based feature dictionary is then used to transform the input data into a global sparse feature representation. Song et al. [14] proposed multi-layer discriminative dictionary learning (MDDL) with local constraints for image classification. Through multi-layer dictionary learning, a robust dictionary is learned in the last layer, and the separability of encoded vectors belonging to different categories is improved compared to other methods, classification accuracy is also guaranteed. ...
February 2019
Pattern Recognition
... Thus the discriminative ability of the dictionary and the representative ability of the coding coefficients play the key roles in this kind of approach. According to the types of the dictionary, the supervised DL methods can be further divided into three categories: The class-shared DL methods, the class-specific DL methods and the hybrid DL methods [11]. ...
September 2018
Neurocomputing