SCSE Journal Articles
Recent Submissions
-
Power allocation in cognitive radio networks over Rayleigh-fading channels with hybrid intelligent algorithms
(2017)In this paper, we introduce a hybrid strategy which combines pattern search (PS) optimization and genetic algorithm (GA) to address the problem of power allocation in cognitive radio networks. Considering the fluctuating ... -
Structured learning of tree potentials in CRF for image segmentation
(2017)We propose a new approach to image segmentation, which exploits the advantages of both conditional random fields (CRFs) and decision trees. In the literature, the potential functions of CRFs are mostly defined as a linear ... -
Semantics-aware visual object tracking
(2018)In this paper, we propose a semantics-aware visual object tracking method, which introduces semantics into the tracking procedure and extends the model of an object with explicit semantics prior to enhancing the robustness ... -
Evolutionary multi-objective optimization based ensemble autoencoders for image outlier detection
(2018)Image outlier detection has been an important research issue for many computer vision tasks. However, most existing outlier detection methods fail in the high-dimensional image datasets. In order to address this problem, ... -
破壊後の形状の制御を伴う破壊シミュレーション = A method to control the shape of destroyed objects in destruction simulation
(2009)映画やゲームなどにおいて,物理シミュレーションは,リアルなアニメーションを生成するためには欠かすことができない手法の一つとなっている.映画などでは,あらかじめ絵コンテによりシーンが設計され,通常ではありえない演出をしたいことがしばしば発生する.しかし,通常の物理シミュレーションでは,運動は決定論的に決まる.材質などの特性の調整によりある程度の運動の制御は可能であるが,望む結果が得られるように初期値やそれら特性を指定することは難しい.本研 ... -
Real-time line drawing of 3D models taking into account curvature-based importance
(2011)In recent years, many line drawing algorithms have been proposed for 3D shape depiction. One common drawback is that these algorithms draw only part of the necessary lines for fully depicting the shape. Cole et al.1) have ... -
Two-factor authentication for trusted third party free dispersed storage
(2018)We propose a trusted third party free protocol for secure (in terms of content access, manipulation, and confidentiality) data storage and multi-user collaboration over an infrastructure of untrusted storage servers. It ... -
Object detection in a maritime environment : performance evaluation of background subtraction methods
(2018)This paper provides a benchmark of the performance of 23 classical and state-of-the-art background subtraction (BS) algorithms on visible range and near infrared range videos in the Singapore Maritime dataset. Importantly, ... -
Flexible scheduling of microgrid with uncertainties considering expectation and robustness
(2017)With increasing renewable distributed energy resources integrated into a microgrid (MG), it is difficult to realize its optimal operation due to various uncertainties, e.g., power outputs of wind turbines and photovoltaic ... -
Modeling and detecting false data injection attacks against railway traction power systems
(2018)Modern urban railways extensively use computerized sensing and control technologies to achieve safe, reliable, and well-timed operations. However, the use of these technologies may provide a convenient leverage to ... -
Exploiting electrical grid for accurate and secure clock synchronization
(2018)Desynchronized clocks among network nodes in critical infrastructures can degrade system performance and even lead to safety incidents. Clock synchronization protocols based on network message exchanges, though widely used ... -
CLUST : simulating realistic crowd behaviour by mining pattern from crowd videos
(2017)In this paper, we present a data‐driven approach to simulate realistic locomotion of virtual pedestrians. We focus on simulating low‐level pedestrians' motion, where a pedestrian's motion is mainly affected by other ... -
Pair-linking for collective entity disambiguation : two could be better than all
(2018)Collective entity disambiguation, or collective entity linking aims to jointly resolve multiple mentions by linking them to their associated entities in a knowledge base. Previous works are primarily based on the underlying ... -
MCAEM : mixed-correlation analysis-based episodic memory for companion–user interactions
(2018)This paper considers episodic memory for companion–human interaction, aiming at improving user experience of interactions by endowing social companions with awareness of past experience. Due to noise and incomplete cues ... -
Differentially private mechanisms for budget limited mobile crowdsourcing
(2018)Recently, Mobile Crowdsourcing (MC) has aroused great interest on the part of both academic and industrial circles. One of the key problems in MC is designing the proper mechanisms to incentivize user participation, as ... -
Which channel to ask my question? : personalized customer service request stream routing using deep reinforcement learning
(2019)Customer services are critical to all companies, as they may directly connect to the brand reputation. Due to a great number of customers, e-commerce companies often employ multiple communication channels to answer customers' ... -
Threshold estimation models for linear threshold-based influential user mining in social networks
(2019)Influence Maximization (IM) is a popular social network mining mechanism that mines influential users for viral marketing in social networks. Most of the Influence Maximization techniques employ either the independent ... -
Darkness in the human gene and protein function space : widely modest or absent illumination by the life science literature and the trend for fewer protein function discoveries since 2000
(2018)The mentioning of gene names in the body of the scientific literature 1901–2017 and their fractional counting is used as a proxy to assess the level of biological function discovery. A literature score of one has been ... -
Interactive labelling of a multivariate dataset for supervised machine learning using linked visualisations, clustering, and active learning
(2019)Supervised machine learning techniques require labelled multivariate training datasets. Many approaches address the issue of unlabelled datasets by tightly coupling machine learning algorithms with interactive visualisations. ... -
MCtandem : an efficient tool for large-scale peptide identification on many integrated core (MIC) architecture
(2019)Background:Tandem mass spectrometry (MS/MS)-based database searching is a widely acknowledged and widely used method for peptide identification in shotgun proteomics. However, due to the rapid growth of spectra data produced ...