Abstract
The traditional uniform distribution algorithm does not filter the image data when extracting the approximate features of text-image data under the event, so the similarity between the image data and the text is low, which leads to low accuracy of the algorithm. This paper proposes a text-image feature mapping algorithm based on transfer learning. The existing data is filtered by ‘clustering technology’ to obtain similar data with the target data. The significant text features are calculated through the latent Dirichlet allocation (LDA) model and information gain based on Gibbs sampling. Bag of visual word (BOVW) model and Naive Bayesian method are used to model image data. With the help of the text-image co-occurrence data in the same event, the text feature distribution is mapped to the image feature space, and the feature distribution of image data under the same event is approximated. Experimental results show that the proposed algorithm can obtain the feature distribution of image data under different events, and the average cosine similarity is as high as 92%, the average dispersion is as low as 0.06%, and the accuracy of the algorithm is high.
1 Introduction
With the development of online information dissemination technology, the amount of event information accompanied by text-image is increasing. Traditional text mining technology can no longer satisfy people’s learning needs of multimedia information. However, it is still difficult to develop knowledge models directly in the feature space of multimedia data, especially in the image feature space. Whether the mature text mining technology alongside sufficient text information on the Internet can be used to assist the knowledge learning of image data is a hotspot of current research.
Reference [1] proposes an adaptive control scale-invariant feature transform (SIFT) feature uniform distribution algorithm (called uniform distribution algorithm) based on the characteristics of stop and reverse (SAR) image data. By using local texture features and combining them with optimization screening strategy, the SIFT feature points can be reasonably distributed in image space and scale space by adaptively controlling the distribution of features in different spaces while ensuring the stability and accuracy of feature points. But without considering the timeliness of image data, the accuracy of this algorithm is not high. In Reference [2], a fast connected component labeling algorithm implemented on an field-programmable gate array (FPGA) is proposed. Run-length encoding is used to optimize image annotation, which can reduce the number and length of tags and extract the features of components during the run-length encoding. Due to the complexity of the algorithm, the efficiency of the algorithm is low. In Reference [3], by calculating image features and delays, enhanced scanning (DE-MRI) is used to analyze heterogeneous machine learning, and an uncertainty assessment framework with potential ablation target recognition is constructed. However, due to the relationship between image features and delay, in the analysis of heterogeneous machine learning situation, data is not sufficient, and data analysis efficiency is low, which has certain limitations.
Transfer learning method develops a compact and effective representation from the annotated data of a source domain and a few annotated or unannotated data of the target domain, and then applies the learning feature representation method to the learning task of the target domain. In this method, not only self-annotated data but also unannotated data are used, so it is neither supervised learning [4], nor unsupervised learning and semi-supervised learning, but a new machine learning method. During feature migration, even if the data in the source data space and the target data space do not intersect at the instance level, they may be related at the feature level [5]. Data with two feature perspectives can be used to establish a link between two different feature spaces. These data are not necessarily used as training data for knowledge learning, but they can act as a role of dictionary. Taking a subject event as the background, the sufficient text-image information about the event on the Internet is used as a basis for knowledge migration.
Aiming at these problems, in this paper a text-image feature mapping algorithm based on transfer learning is proposed, which uses clustering technology to filter the existing data to find the data very similar to the target data [6]. The significant text features are calculated by LDA model based on Gibbs sampling and information gain. The BOVW model and naive Bayesian method are used to model the subject of image data. With the help of the text-image co-occurrence data [7] in same event, the text feature distribution is mapped to the image feature space, and the feature distribution of image data under the same event is approximated.
2 A text-image feature mapping algorithm based on transfer learning
2.1 Transfer learning algorithm for clustering text
Although the existing auxiliary data is out of date, there should be some data in the existing data that is very similar to the test data and can be used to help target tasks learning [8]. Therefore, clustering technology is used to find data that is very similar to test data from existing data.
2.1.1 Introduction to clustering
Clustering is an important form of data mining. The purpose of text clustering is to group large-scale text datasets into multiple classes, and make the text in the same class have a high degree of similarity, while the text between different classes is quite different [9]. As a function of data mining, clustering can be used as an independent tool to obtain data distribution, observe the characteristics of each cluster, and focus on some specific clusters for further analysis. At the same time, clustering technology can also be used as a pre-treatment step of other algorithms to effectively improve the performance of other algorithms [10].
2.1.2 Text representation and text similarity formula
According to the traditional vector space model (VSM) representation, the text content can be expressed as a weighted feature vector. Let D be a text set, di is a text in the set, t is a feature word, ti is the i-th feature word, and wi is a weight of the i-th feature word.
Where, the weight wi can be represented by the tf-idf weight of each feature. The tf-idf formula is as follows:
Where, tf (d, t) is the word frequency of word t in text d, df (t) is the number of text containing word t in text set D, and |D| represents the number of text contained in text set D.
The similarity between two texts can be calculated by the cosine of the angle α between two vectors. Assuming that two texts are
The greater the value of ∼ (d1d2) is, the more similar the two texts are, of which w is the weight of the feature and σ is the approximate text weight.
2.1.3 Algorithm principle
Firstly, the auxiliary training data are clustered together with the target training data [11]. The result of clustering is that the intra-cluster similarity is high, and that of the data inter-cluster is different. Therefore, after clustering, no auxiliary data clustered in the same cluster with the target training data is filtered out. All that is left is data with high similarity to the target data, and training them with the target data will greatly improve the performance of the classifier [12]. The definitions of some basic symbols used in the paper are given below.
Definition 2.1.1 * set Xb as the target sample space and Xa as the auxiliary sample space. * set Y = {0, 1} as a class space.
Definition 2.1.2 (test data set)
Definition 2.1.3 (training data set) The training dataset consists of two parts:
2.1.4 Algorithm steps
Input: two training datasets Ta and Tb, a test data set S.
Output: classification result ht (Xt).
Read the training data Ta and Tb.
The training data are classified into N classes according to class labels: Ti (i = 1, . . . , N), of which Ti is the instances set of classes labeled i;
a. call a basic clustering algorithm to cluster Ti and return clustering results.
b. scan Ti, delete auxiliary data from instances that are not clustered with target data.
End for;
Call a basic classification algorithm and get a classification model according to the filtered training data and test data S.
Test the performance of the classification model on S and output it [13].
2.2 A text-image feature mapping algorithm based on transfer learning
Based on the previous section, the existing data is filtered by clustering technique [14], and the data which is very similar to the target data is obtained. Data with two feature perspectives are used to establish a link, and two different feature spaces are connected. These data are not necessarily used as training data for knowledge learning, but they can act as a dictionary. Taking a subject event as the background, sufficient text-image information about the event on the internet is used as a basis for knowledge migration.
2.2.1 Text-image co-occurrence data constrained by events
In the heterogeneous spatial learning model, the difficulty of the whole learning process will be greatly reduced if a data with two feature spatial perspectives is used as an aid [15]. The heterogeneous spatial learning model under event constraint provides the possibility. The text-image co-occurrence data under event constraints are given here. E is an event set, event e ∈ E;V is the whole image data set, and the relevant image {v} ∈ V under event e. D is the whole text data set, and the text set under event e is {d} ∈ D; Uv is the image feature space, and UD is the text feature space. Text-image co-occurrence data instances vd ∈ S and S are co-occurrence data set, s are operation coefficients, and uv ∈ Uv and ud ∈ UD are corresponding features of image data instances and text data instances, respectively. Under the constraint of events, the text-image co-occurrence data vd is formally described at the feature level as follows:
where, P (ud |d ) and P (uv |v ) are feature extraction processes.
2.2.2 Text subject modeling
The LDA model based on Gibbs sampling is used to extract subject information from text sets for modeling [16], and the probability model is:
In order to deal with the new text outside the event training text and facilitate parameter reasoning, the symmetric dir (α) and dir (β) prior probability assumptions are made for θ(d) and ϕ(z). In order to obtain the probability distribution of text subjects, the posterior probability P (w |z ) of lexicon w for text subjects is calculated instead of ϕ and , and then ϕ and θ are calculated indirectly by Gibbs sampling. By calculating the most discriminant feature in each subject feature space, the feature which has the more information gain can be as the significant text feature.
2.2.3 Image data modeling
A Naive Bayesian model is used to model the image. Firstly, the speeded up robust features (SURF) are computed and the bag of visual words (BOVW) model is established. Image v is considered as a set of visual words. Each visual word f comes from the visual vocabulary F, v = {f |f ∈ F }, and F represents the whole image feature space. According to the feature independence hypothesis, the image classification model is defined as: an event category c determines an image feature distribution P (f ∈ F |c ). Through this model, the maximum posteriori is used to infer the image’s classification objective function hNB : V → C, and the image subject category modeling is completed. For target image v, the subject categories are:
2.2.4 Text-image feature mapping
Both text subject modeling and image subject modeling belong to discrete object models. The feature independence hypothesis [17] can be applied to their features, that is, each feature independently affects the posterior probability of an instance under a given event category. In the process of text-image feature migration, the problem of feature migration can be greatly simplified by separating text features and image features for mapping [18]. Figure 1 is a schematic diagram of text-image feature migration:

Text image feature migration under event constraint
The category label of each text in D under event constraint is the same as that of the image target category c. Text d is represented by a subject feature word bag as d = {t |t ∈ T }. Thematic feature dictionary T is the subject vocabulary in a text feature space. At the same time, there is a S = {(v, d)} set of text- image co-occurrence data under corresponding event. To infer the image feature distribution P (f |c ) under event category c, the most significant text features in text set D are first computed, and then the most significant text features are mapped to the image feature space by means of text-image co-occurrence data set S. Distribution of image features under the target category is inferred from text significant features and text-image co-occurrence data in event text sets.
Where, W (c) is the most prominent text feature set in the text set D under event category c, Nc is normalization coefficient, P (w |c, D) is text feature distribution under event category c, and P (f |w, c, S ) is image’s feature conditional distribution probability on text-image co-occurrence data.
Eq. (9) shows that the probability of a particular image feature appearing is proportional to the probability of it appearing in the text-image co-occurrence data associated with each significant text feature if the event category c is given [19]. At the same time, the probability of specific image features is related to the importance of each significant text feature for the target concept [20]. Next, the calculations of P (f |w, c, S ) and P (w |c, D) are elaborated.
Firstly, the text feature distribution P (w |c, D) is computed for each event category concept c ∈ C, and the most significant event text feature set W (c) is calculated, and n is the operation coefficient. The LDA model is used to model the event text set, and Laplace smoothing is used to solve the sparse problem of text subject features.
Then, the image feature conditional distribution P (f |w, c, S ) in the text-image co-occurrence dataset is computed, and Laplacian smoothing is still used.
2.2.5 Evaluation Criteria
The goal of the text-to-image feature mapping algorithm is to estimate the feature distribution of image information under event categories [21]. According to the feature independence hypothesis of the BOVW model, image features are regarded as random variables which appear independently. Image feature distribution can be represented as a vector with the same size as the bag of character words.
Cosine similarity and K-L (Kullback-Leibler) divergence dispersion is used as the performance evaluation scale [22], it is assumed that p probability distribution is the datum distribution, and the other probability distribution q is the approximation of distribution p. The greater the cosine similarity of the two approximations is, the closer the two feature distributions are and the higher the approximation degree is. The formula for cosine similarity is as follows:
K-L dispersion is an asymmetric measure to evaluate the difference between two probability distributions. Its value reflects the approximation of distribution q to distribution p. In the determination of the characteristic distribution of the reference image data, the K-L dispersion is defined as:
Based on the above methods, 15 categories of video security incidents on the Internet are analyzed as data sets [23], corresponding categories are: E1: Sanlu milk powder incidents; E2: red-cored duck egg incidents; E3: Turbot incidents; E4: Jinhao tea oil incidents; E5: Maile chicken incidents; E6: Plasticizer incidents; E7: Clenbuterol incidents; E8: paraffin wax in hot pot incidents; E9: Gutter oil event; E10: Crayfish event; E11: Fushou snail incidents; E12: Poisonous steamed bread incidents; E13: Maggot citrus incidents; E14: Bursting watermelon incidents; E15: Poisonous bird’s nest incidents. Depending on the duration of the incidents [24], the number of related text downloads ranged from 800 to 2000, with text-image accompanying text accounting for about one-third to one-second. A text-image accompanying sample is regarded as a co-occurrence data instance, but in the case of multiple images in a sample, it is considered that one image corresponds to the same accompanying text, and the number of co-occurrence data instances is calculated according to the number of images. Based on artificially collecting, the image data of each food safety event from the Internet search engine and related web pages are searched. For each event, 200~400 images are collected separately. The BOVW model is used to represent each image in a bag of visual word, and the histogram vector expression of each image is obtained.
Firstly, the feature distribution of the reference image is constructed. Using all the images under each event category c, an image feature distribution is obtained as the base feature distribution by the Naive Bayesian classifier. Theoretically, the Naive Bayesian classifier can calculate the real image feature distribution under the target category when the training data is sufficient. The two intuitive methods are compared with the text-image feature mapping algorithm. The first method is the uniform distribution algorithm, assuming that each image feature appears randomly under the concept of each event target with the same probability. The second method is the tagged query algorithm, which uses the name of category c as the query keyword, searches in the Internet search engine [25], and uses the returned K image to train the Naive Bayesian model to get the image feature distribution. The K value of the experiment is 50 based on experience [26–31].
3 Results
The K value of this experiment is 50 according to experience. The comparison between the three algorithms under cosine similarity is shown in Figure 2, 3, and 4.

The effect of uniform distribution algorithm on estimation of distribution under cosine similarity

Estimation of distribution effect under tag cosine similarity algorithm

Algorithm for estimating distribution effect under cosine similarity
Analyzing the results of the three algorithms in the cosine similarity, we can see that the maximum value of the uniform distribution algorithm is 0.94%, the minimum value is 0.74%, the maximum value of the label query algorithm is 0.97%, the minimum value is 0.76%, and the maximum value of the proposed algorithm is 0.99% and the minimum value is 0.76%.
Through data comparison, the cosine similarity of the proposed algorithm is always higher than that of the uniform distribution algorithm and the label query algorithm.
The larger the similarity value is, the more accurate the approximate feature extraction is. Therefore, the accuracy of the proposed algorithm is higher than the other two algorithms.
As shown in Figure 5, 6, and 7, the prediction results of the three algorithms under K-L dispersion are compared:

Uniform distribution algorithm under K-L discrete value to estimate distribution effect diagram

K-L discrete valued mark-up query algorithm to estimate the distribution effect map

The algorithm is used to estimate the distribution effect under K-L discrete values
Analysis of Figure 5, 6, and 7 shows that the results of the three algorithms are comparable under K-L discrete values. The maximum value of the uniform distribution algorithm is 0.27%, the minimum value is 0.05%, the maximum value of the tagged query algorithm is 0.30%, the minimum value is 0.04%, and the maximum value of the proposed algorithm is 0.17% and the minimum value is 0.03%.
Through data comparison, the K-L dispersion of the proposed algorithm is always lower than that of the uniform distribution algorithm and the label query algorithm. Discreteness is an asymmetric metric measure to evaluate the difference of two probability distributions. Its value reflects the approximations. The smaller the dispersion is, the smaller the difference is. Therefore, the difference of the algorithm in this paper is lower than that of the other two algorithms.
From the comparison of the effects of different algorithms on estimating the distribution under the above different metrics, it can be seen that the image feature distribution generated by the text-image feature mapping algorithm is the closest to its benchmark distribution under most event categories, while the uniform distribution algorithm is only close to the results of other algorithms under one category (E6). By checking the data under this category, it is found that this is due to the large differences in the image data between them. The label query algorithm under three categories (E1, E9, E11) is equivalent to the text-image feature mapping algorithm proposed by the author. By checking the data, for these event categories, the event category name is directly input from the search engine as the query keyword, and the resulting images are closely related to the event category, so the similar distribution effect of the label query algorithm is better.
In addition to the above direct method, the approximation degree of a similar image feature distribution to the benchmark distribution can be measured from different training data scales. Each time, from each category of the collected event image data set, N images are randomly selected, and the Naive Bayesian model is trained for 100 times. The feature distribution and reference distribution of each image are compared. Finally, the results of all repeated rounds are arithmetically averaged. The number of images randomly selected for each event category is 20, 40, 60, 80, 100, 120, 140, 160 in turn. The approximate results of uniform distribution algorithm, label query algorithm and feature mapping algorithm under each category are averaged, and then compared with the above method. Figures 8 and 9 show the average difference between the image feature distribution and the reference distribution obtained by these approximate methods under the two measurement scales.

Comparison of different algorithms for estimating distribution under cosine similarity

Comparison of different algorithms for estimating distribution under K-L discrete values
As can be seen from Figures 8 and 9, the approximate results of the uniform distribution algorithm, the label query algorithm and the feature mapping algorithm under each category are averaged, and then compared with the above method. The text-image feature mapping algorithm is similar to the feature distribution obtained by training 100 labeled images, and the cosine similarity of the proposed algorithm is 92%; that of the uniform distribution algorithm is 76%; and the label query algorithm is 84%. The average value of cosine similarity of the proposed algorithm is the largest in every category. The discrete degree of the proposed algorithm is 0.06%; that of the uniform distribution algorithm is 0.17%; the label query algorithm is 0.09%; the average value of the discrete results of the proposed algorithm is the smallest in each category. The above data show that the proposed text-image feature mapping algorithm based on transfer learning can effectively learn the image feature distribution under the target event category from the text data of related events and text-image co-occurrence data.
Under the 100 events, the similarity distribution of text- image data is simulated. The proposed algorithm is simulated with the uniform distribution algorithm and label query algorithm. The average optimal fitness and average operation time of the two algorithms are obtained. The detailed results are described in Table 1. From the analysis of Table 1, we can see that the optimal fitness of the proposed algorithm is 9.85%, the uniform distribution algorithm is 7.51%, the label query algorithm is 8.22%, and the fitness of the proposed algorithm is the highest. In the comparison of the average operation time, the proposed algorithm takes 34.72 seconds, the uniform distribution algorithm takes 54.09s, and the label query algorithm takes 53.69s, indicating that the proposed algorithm takes the shortest time and has the highest efficiency. This algorithm can quickly and effectively extract the approximate feature distribution of text-image data under 100 events. This algorithm not only extracts the approximate feature distribution of text-image data effectively, but also consumes less time and has high efficiency.
Simulation results of approximate distribution of image data distribution under 100 events
| Type of algorithm | Average optimum fitness /% | Mean operation time / s |
|---|---|---|
| Uniform distribution algorithm | 7.51 | 54.09 |
| Tagged query algorithm | 8.22 | 53.69 |
| Algorithm in this paper | 9.85 | 34.72 |
4 Discussion
In the traditional machine learning framework, the task of learning is to learn a classification model based on given sufficient training data, and then use this learning model to classify and predict test documents. However, we see that machine learning algorithms have a key problem in the current Internet mining research: a large amount of training data in some emerging areas is difficult to obtain. It can be seen that the development of internet applications is very fast. A large number of new areas are emerging, from traditional news, to web pages, pictures, blogs, podcasts and so on. Traditional machine learning needs to calibrate a large amount of training data in each field, which will consume manpower and material resources. Without a large amount of annotated data, a lot of learning related researches and applicationscan’t be carried out. Secondly, traditional machine learning assumes that training data and test data obey the same data distribution. However, in many cases, the same distribution hypothesis is not satisfied. In addition, training data is often out of date. This often requires re-labelling a large volume of training data to meet our training needs, but labeling new data is expensive and requires manpower and material resources. On the other hand, if we have a lot of training data with different distributions, it would be wasteful to discard them completely. How to make rational use of this data is the aim of transfer learning.
Main problems are solved. Transfer learning can transfer knowledge from existing data to help future learning. The goal of transfer learning is to use the knowledge learned from one environment to assist learning tasks in the new environment. Therefore, transfer learning will not assume the same distribution assumption as traditional machine learning. At present, the work on transfer learning can be divided into two parts: case-based transfer learning in isomorphic space and feature-based transfer learning in isomorphic space. It is pointed out that case-based transfer learning has stronger knowledge transfer ability, while feature-based transfer learning has wider knowledge transfer ability. These two methods have their own merits. Transfer learning is a relatively new research direction in machine learning. The current research mainly focuses on data mining, natural language processing, information retrieval and image classification. Machine learning has provided extensive research findings and results, but research into transfer learning is minimal. Features and samples are two important aspects of text categorization. It is important to consider these two factors comprehensively. Sample based transfer learning is another method to solve the problem of transfer learning. Traditional methods also use feature-based or sample-based transfer learning methods, but there is a lack of comprehensive use of these two methods. The algorithm proposed in this paper can find the data very similar to the test data from the existing data and improve the accuracy of the model.
5 Conclusions
In this paper, a text-image feature mapping algorithm based on transfer learning is proposed. Firstly, clustering technology is used to filter the existing data and find the data which is similar to the target data to help the learning of the target task and improve the performance of the classifier. Then, the event text data is modeled by the potential Dirichlet assignment method, and the most prominent text features are selected by calculating the information gain of the topic features; the event images are modeled using the visual word bag model and the naive Bayesian method; The approximate extraction of the image feature distribution is realized by the text data feature distribution and the text-image co-occurrence data feature distribution under the same event. Compared with the traditional uniform distribution algorithm and labeled query algorithm, the average cosine similarity of the proposed algorithm is 92%, that of the uniform distribution algorithm is 76%, and the labeled query algorithm is 84%. The average dispersion of the proposed algorithm is 0.06%, that of the uniform distribution algorithm is 0.17%, and the labeled query algorithm is 0.09%. The experimental data shows that the proposed algorithm has the advantage of high cosine similarity and low dispersion.
References
[1] Wang F., Youh J., Fux Y., Auto-Adaptive Well-Distributed Scale-Invariant Feature for SAR Images Registration, Geomat. Inform. Sci. Wuhan Univ., 2015, 40(2), 159-163.Search in Google Scholar
[2] Wang K., Shil Z., Design and Implementation of Fast Connected Component Labeling Algorithm based on FPGA, Comp. Eng. Appl., 2016, 52(18), 192-198.Search in Google Scholar
[3] Lozoya R.C., Berte B., Cochet H., Model-based Feature Augmentation for Cardiac Ablation Target Learning from Images, IEEE Trans. Biomed. Eng. PP, 2018, (99), 1-1.10.1109/TBME.2018.2818300Search in Google Scholar PubMed
[4] Cazade P.A., Zheng W., Pradagracia D., A Comparative Analysis of Clustering Algorithms: O2 Migration in Truncated Hemoglobin I from Transition Networks, J. Chem. Phys., 2015, 142(2), 025-103.10.1063/1.4904431Search in Google Scholar PubMed
[5] Wan S., Niu Z., A Learner Oriented Learning Recommendation Approach based on Mixed Concept Mapping and Immune Algorithm, Knowledge-Based Syst., 2016, 103(C), 28-40.10.1016/j.knosys.2016.03.022Search in Google Scholar
[6] Han X.H., Xiong X., Duan F., A New Method for Image Segmentation based on BP Neural Network and Gravitational Search Algorithm Enhanced by Cat Chaotic Mapping, Appl. Intel., 2015, 43(4), 855-873.10.1007/s10489-015-0679-5Search in Google Scholar
[7] Zhou T., Hu W., Ning J., An Eflcient Local Operator-based Qcompensated Reverse Time Migration Algorithm with Multistage Optimization, Geophys., 2018, 83(3), S249-S259.10.1190/geo2017-0026.1Search in Google Scholar
[8] Gorodnitskiy E., Perel M., Geng Y., Depth Migration with Gaussian Wave Packets based on Poincaré Wavelets, Geophys. J. Int., 2016, 205(1), 301-318.10.1093/gji/ggv562Search in Google Scholar
[9] Rastogi R., Srivastava A., Khonde K., An Efficient Parallel Algorithm: Poststack and Prestack Kirchhoff 3D Depth Migration Using Flexi-depth Iterations, Comp. Geosci., 2015, 80, 1-8.10.1016/j.cageo.2015.03.008Search in Google Scholar
[10] Tosun S., Ozturk O., Ozkan E., Application Mapping Algorithms for Mesh-based Network-on-chip Architectures, J. Supercomp., 2015, 71(3), 995-1017.10.1007/s11227-014-1348-xSearch in Google Scholar
[11] Kalantar B.,Mansor S.B., Sameen M.I., Drone-based Land-cover Mapping Using a Fuzzy Unordered Rule Induction Algorithm Integrated into Object-based Image Analysis, Int. J. Remote Sens., 2017, 38(8-10), 2535-2556.10.1080/01431161.2016.1277043Search in Google Scholar
[12] Mackenzie C., Pichara K., Protopapas P., Clustering Based Feature Learning on Variable Stars, Astrophys. J., 2016, 820(2), 138.10.3847/0004-637X/820/2/138Search in Google Scholar
[13] Li H., Zhu G., Cui C., Energy-eflcient Migration and Consolidation Algorithm of Virtual Machines in Data Centers for Cloud Computing, Comput., 2016, 98(3), 303-317.10.1007/s00607-015-0467-4Search in Google Scholar
[14] Xiang T., Yan L., Gao R., A Fusion Algorithm for Infrared and Visible Images based on Adaptive Dual-channel Unit-linking PCNN in NSCT Domain, Infrared Phys. Technol., 2015, 69, 53-61.10.1016/j.infrared.2015.01.002Search in Google Scholar
[15] Dong J., Xiao X., Menarguez M.A., Mapping Paddy Rice Planting Area in Northeastern Asia with Landsat 8 Images, Phenology based Algorithm and Google Earth Engine, Remote Sens. Envir., 2016, 185, 142-154.10.1016/j.rse.2016.02.016Search in Google Scholar PubMed PubMed Central
[16] Li Q., Zhou H., Zhang Q., Eflcient Reverse Time Migration based on Fractional Laplacian Viscoacoustic Wave Equation, Geophys. J. Int., 2016, 204(1), 488-504.10.1093/gji/ggv456Search in Google Scholar
[17] Medrano E.A., Wiel B.J.H.V.D., Uittenbogaard R.E., Simulations of the Diurnal Migration of Microcystis Aeruginosa, based on a Scaling Model for Physical-biological Interactions, Ecolog. Mod., 2016, 337, 200-210.10.1016/j.ecolmodel.2016.06.019Search in Google Scholar
[18] Matsubayashi A., Asymptotically Optimal Online Page Migration on Three Points, Algorithmica, 2015, 71(4), 1035-1064.10.1007/s00453-013-9841-9Search in Google Scholar
[19] Yap W. S., Phan C.W., Yau W.C., Cryptanalysis of a New Image Alternate Encryption Algorithm based on Chaotic map, Nonlin. Dyn., 2015, 80(3), 1483-1491.10.1007/s11071-015-1956-xSearch in Google Scholar
[20] Rastogi R., Londhe A., Srivastava A., 3D Kirchhoff Depth Migration Algorithm, Comp. Geosci., 2017, 100(C), 67-75.10.1016/j.cageo.2016.12.006Search in Google Scholar
[21] Thierry P., Lambaré G., Podvin P., 3-D Preserved Amplitude Prestack Depth Migration on a Workstation, Geophys., 2015, 64(1), 222-229.10.1190/1.1444518Search in Google Scholar
[22] Zheng X.W., Lu D.J., Wang X.G.A., Cooperative Coevolutionary Biogeography-based optimizer, Appl. Intel., 2015, 43(1), 1-17.10.1007/s10489-014-0627-9Search in Google Scholar
[23] Wang M., Study on Operation Reliability of Transfer System of Urban Transportation Hub based on Reliability Theory, Automat. Instrument., 2016, (1), 418-534.Search in Google Scholar
[24] Cong S., Gao M.Y., Cao G., Ultrafast Manipulation of a Double Quantum-Dot Charge Qubit Using Lyapunov-Based Control Method. IEEE J. Quant. Electr., 2015, 51(8), 1-8.10.1109/JQE.2015.2440783Search in Google Scholar
[25] Yan X., Yang S., Hong H.E., Load Adaptive Control Based on Frequency Bifurcation Boundary for Wireless Power Transfer System, J. Pow. Supp., 2017, 43(4), 1025-1084.Search in Google Scholar
[26] Lokesha V., Deepika T., Ranjini P.S., Cangul I.N. Operations of Nanostructures Via Sdd, Abc4 and Ga5 Indices. Applied Mathematics and Nonlinear Sciences, 2017, 2(1), 173-180.10.21042/AMNS.2017.1.00014Search in Google Scholar
[27] Molinos-Senante M., Guzman C., Benchmarking Energy Efficiency in Drinking Water Treatment Plants: Quantification of Potential Savings, J. Clean. Prod., 2018, 176, 417-425.10.1016/j.jclepro.2017.12.178Search in Google Scholar
[28] Gao W., Farahani M.R., Aslam A., Hosamani S. Distance Learning Techniques for Ontology Similarity Measuring and Ontology Mapping, Cluster Computing - The J. Net. Soft. Tools Appl., 2017, 20(2SI), 959-968.10.1007/s10586-017-0887-3Search in Google Scholar
[29] Ge S.B., Ma J.J., Jiang S.C., Liu Z., Peng W.X., Potential Use of Different Kinds of Carbon in Production of Decayed Wood Plastic Composite, Arabian J. Chem., 2018, 11(6), 838-843.10.1016/j.arabjc.2017.12.026Search in Google Scholar
[30] Singh K., Gupta N., Dhingra M., Effect of Temperature Regimes, Seed Priming and Priming Duration On Germination and Seedling Growth On American Cotton, J. Envir. Biol., 2018, 39(1), 83-91.10.22438/jeb/39/1/MRN-446Search in Google Scholar
[31] Hosamani S.M., Correlation of Domination Parameters with Physicochemical Properties of Octane Isomers, Appl. Math. Nonlin. Sci., 2016, 1(2), 345-352.10.21042/AMNS.2016.2.00029Search in Google Scholar
© 2018 D. Pan and H. Yang, published by De Gruyter
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.
Articles in the same Issue
- Regular Articles
- A modified Fermi-Walker derivative for inextensible flows of binormal spherical image
- Algebraic aspects of evolution partial differential equation arising in the study of constant elasticity of variance model from financial mathematics
- Three-dimensional atom localization via probe absorption in a cascade four-level atomic system
- Determination of the energy transitions and half-lives of Rubidium nuclei
- Three phase heat and mass transfer model for unsaturated soil freezing process: Part 1 - model development
- Three phase heat and mass transfer model for unsaturated soil freezing process: Part 2 - model validation
- Mathematical model for thermal and entropy analysis of thermal solar collectors by using Maxwell nanofluids with slip conditions, thermal radiation and variable thermal conductivity
- Constructing analytic solutions on the Tricomi equation
- Feynman diagrams and rooted maps
- New type of chaos synchronization in discrete-time systems: the F-M synchronization
- Unsteady flow of fractional Oldroyd-B fluids through rotating annulus
- A note on the uniqueness of 2D elastostatic problems formulated by different types of potential functions
- On the conservation laws and solutions of a (2+1) dimensional KdV-mKdV equation of mathematical physics
- Computational methods and traveling wave solutions for the fourth-order nonlinear Ablowitz-Kaup-Newell-Segur water wave dynamical equation via two methods and its applications
- Siewert solutions of transcendental equations, generalized Lambert functions and physical applications
- Numerical solution of mixed convection flow of an MHD Jeffery fluid over an exponentially stretching sheet in the presence of thermal radiation and chemical reaction
- A new three-dimensional chaotic flow with one stable equilibrium: dynamical properties and complexity analysis
- Dynamics of a dry-rebounding drop: observations, simulations, and modeling
- Modeling the initial mechanical response and yielding behavior of gelled crude oil
- Lie symmetry analysis and conservation laws for the time fractional simplified modified Kawahara equation
- Solitary wave solutions of two KdV-type equations
- Applying industrial tomography to control and optimization flow systems
- Reconstructing time series into a complex network to assess the evolution dynamics of the correlations among energy prices
- An optimal solution for software testing case generation based on particle swarm optimization
- Optimal system, nonlinear self-adjointness and conservation laws for generalized shallow water wave equation
- Alternative methods for solving nonlinear two-point boundary value problems
- Global model simulation of OH production in pulsed-DC atmospheric pressure helium-air plasma jets
- Experimental investigation on optical vortex tweezers for microbubble trapping
- Joint measurements of optical parameters by irradiance scintillation and angle-of-arrival fluctuations
- M-polynomials and topological indices of hex-derived networks
- Generalized convergence analysis of the fractional order systems
- Porous flow characteristics of solution-gas drive in tight oil reservoirs
- Complementary wave solutions for the long-short wave resonance model via the extended trial equation method and the generalized Kudryashov method
- A Note on Koide’s Doubly Special Parametrization of Quark Masses
- On right-angled spherical Artin monoid of type Dn
- Gas flow regimes judgement in nanoporous media by digital core analysis
- 4 + n-dimensional water and waves on four and eleven-dimensional manifolds
- Stabilization and Analytic Approximate Solutions of an Optimal Control Problem
- On the equations of electrodynamics in a flat or curved spacetime and a possible interaction energy
- New prediction method for transient productivity of fractured five-spot patterns in low permeability reservoirs at high water cut stages
- The collinear equilibrium points in the restricted three body problem with triaxial primaries
- Detection of the damage threshold of fused silica components and morphologies of repaired damage sites based on the beam deflection method
- On the bivariate spectral quasi-linearization method for solving the two-dimensional Bratu problem
- Ion acoustic quasi-soliton in an electron-positron-ion plasma with superthermal electrons and positrons
- Analysis of projectile motion in view of conformable derivative
- Computing multiple ABC index and multiple GA index of some grid graphs
- Terahertz pulse imaging: A novel denoising method by combing the ant colony algorithm with the compressive sensing
- Characteristics of microscopic pore-throat structure of tight oil reservoirs in Sichuan Basin measured by rate-controlled mercury injection
- An activity window model for social interaction structure on Twitter
- Transient thermal regime trough the constitutive matrix applied to asynchronous electrical machine using the cell method
- On the zagreb polynomials of benzenoid systems
- Integrability analysis of the partial differential equation describing the classical bond-pricing model of mathematical finance
- The Greek parameters of a continuous arithmetic Asian option pricing model via Laplace Adomian decomposition method
- Quantifying the global solar radiation received in Pietermaritzburg, KwaZulu-Natal to motivate the consumption of solar technologies
- Sturm-Liouville difference equations having Bessel and hydrogen atom potential type
- Study on the response characteristics of oil wells after deep profile control in low permeability fractured reservoirs
- Depiction and analysis of a modified theta shaped double negative metamaterial for satellite application
- An attempt to geometrize electromagnetism
- Structure of traveling wave solutions for some nonlinear models via modified mathematical method
- Thermo-convective instability in a rotating ferromagnetic fluid layer with temperature modulation
- Construction of new solitary wave solutions of generalized Zakharov-Kuznetsov-Benjamin-Bona-Mahony and simplified modified form of Camassa-Holm equations
- Effect of magnetic field and heat source on Upper-convected-maxwell fluid in a porous channel
- Physical cues of biomaterials guide stem cell fate of differentiation: The effect of elasticity of cell culture biomaterials
- Shooting method analysis in wire coating withdrawing from a bath of Oldroyd 8-constant fluid with temperature dependent viscosity
- Rank correlation between centrality metrics in complex networks: an empirical study
- Special Issue: The 18th International Symposium on Electromagnetic Fields in Mechatronics, Electrical and Electronic Engineering
- Modeling of electric and heat processes in spot resistance welding of cross-wire steel bars
- Dynamic characteristics of triaxial active control magnetic bearing with asymmetric structure
- Design optimization of an axial-field eddy-current magnetic coupling based on magneto-thermal analytical model
- Thermal constitutive matrix applied to asynchronous electrical machine using the cell method
- Temperature distribution around thin electroconductive layers created on composite textile substrates
- Model of the multipolar engine with decreased cogging torque by asymmetrical distribution of the magnets
- Analysis of spatial thermal field in a magnetic bearing
- Use of the mathematical model of the ignition system to analyze the spark discharge, including the destruction of spark plug electrodes
- Assessment of short/long term electric field strength measurements for a pilot district
- Simulation study and experimental results for detection and classification of the transient capacitor inrush current using discrete wavelet transform and artificial intelligence
- Magnetic transmission gear finite element simulation with iron pole hysteresis
- Pulsed excitation terahertz tomography – multiparametric approach
- Low and high frequency model of three phase transformer by frequency response analysis measurement
- Multivariable polynomial fitting of controlled single-phase nonlinear load of input current total harmonic distortion
- Optimal design of a for middle-low-speed maglev trains
- Eddy current modeling in linear and nonlinear multifilamentary composite materials
- The visual attention saliency map for movie retrospection
- AC/DC current ratio in a current superimposition variable flux reluctance machine
- Influence of material uncertainties on the RLC parameters of wound inductors modeled using the finite element method
- Cogging force reduction in linear tubular flux switching permanent-magnet machines
- Modeling hysteresis curves of La(FeCoSi)13 compound near the transition point with the GRUCAD model
- Electro-magneto-hydrodynamic lubrication
- 3-D Electromagnetic field analysis of wireless power transfer system using K computer
- Simplified simulation technique of rotating, induction heated, calender rolls for study of temperature field control
- Design, fabrication and testing of electroadhesive interdigital electrodes
- A method to reduce partial discharges in motor windings fed by PWM inverter
- Reluctance network lumped mechanical & thermal models for the modeling and predesign of concentrated flux synchronous machine
- Special Issue Applications of Nonlinear Dynamics
- Study on dynamic characteristics of silo-stock-foundation interaction system under seismic load
- Microblog topic evolution computing based on LDA algorithm
- Modeling the creep damage effect on the creep crack growth behavior of rotor steel
- Neighborhood condition for all fractional (g, f, n′, m)-critical deleted graphs
- Chinese open information extraction based on DBMCSS in the field of national information resources
- 10.1515/phys-2018-0079
- CPW-fed circularly-polarized antenna array with high front-to-back ratio and low-profile
- Intelligent Monitoring Network Construction based on the utilization of the Internet of things (IoT) in the Metallurgical Coking Process
- Temperature detection technology of power equipment based on Fiber Bragg Grating
- Research on a rotational speed control strategy of the mandrel in a rotary steering system
- Dynamic load balancing algorithm for large data flow in distributed complex networks
- Super-structured photonic crystal fiber Bragg grating biosensor image model based on sparse matrix
- Fractal-based techniques for physiological time series: An updated approach
- Analysis of the Imaging Characteristics of the KB and KBA X-ray Microscopes at Non-coaxial Grazing Incidence
- Application of modified culture Kalman filter in bearing fault diagnosis
- Exact solutions and conservation laws for the modified equal width-Burgers equation
- On topological properties of block shift and hierarchical hypercube networks
- Elastic properties and plane acoustic velocity of cubic Sr2CaMoO6 and Sr2CaWO6 from first-principles calculations
- A note on the transmission feasibility problem in networks
- Ontology learning algorithm using weak functions
- Diagnosis of the power frequency vacuum arc shape based on 2D-PIV
- Parametric simulation analysis and reliability of escalator truss
- A new algorithm for real economy benefit evaluation based on big data analysis
- Synergy analysis of agricultural economic cycle fluctuation based on ant colony algorithm
- Multi-level encryption algorithm for user-related information across social networks
- Multi-target tracking algorithm in intelligent transportation based on wireless sensor network
- Fast recognition method of moving video images based on BP neural networks
- Compressed sensing image restoration algorithm based on improved SURF operator
- Design of load optimal control algorithm for smart grid based on demand response in different scenarios
- Face recognition method based on GA-BP neural network algorithm
- Optimal path selection algorithm for mobile beacons in sensor network under non-dense distribution
- Localization and recognition algorithm for fuzzy anomaly data in big data networks
- Urban road traffic flow control under incidental congestion as a function of accident duration
- Optimization design of reconfiguration algorithm for high voltage power distribution network based on ant colony algorithm
- Feasibility simulation of aseismic structure design for long-span bridges
- Construction of renewable energy supply chain model based on LCA
- The tribological properties study of carbon fabric/ epoxy composites reinforced by nano-TiO2 and MWNTs
- A text-Image feature mapping algorithm based on transfer learning
- Fast recognition algorithm for static traffic sign information
- Topical Issue: Clean Energy: Materials, Processes and Energy Generation
- An investigation of the melting process of RT-35 filled circular thermal energy storage system
- Numerical analysis on the dynamic response of a plate-and-frame membrane humidifier for PEMFC vehicles under various operating conditions
- Energy converting layers for thin-film flexible photovoltaic structures
- Effect of convection heat transfer on thermal energy storage unit
Articles in the same Issue
- Regular Articles
- A modified Fermi-Walker derivative for inextensible flows of binormal spherical image
- Algebraic aspects of evolution partial differential equation arising in the study of constant elasticity of variance model from financial mathematics
- Three-dimensional atom localization via probe absorption in a cascade four-level atomic system
- Determination of the energy transitions and half-lives of Rubidium nuclei
- Three phase heat and mass transfer model for unsaturated soil freezing process: Part 1 - model development
- Three phase heat and mass transfer model for unsaturated soil freezing process: Part 2 - model validation
- Mathematical model for thermal and entropy analysis of thermal solar collectors by using Maxwell nanofluids with slip conditions, thermal radiation and variable thermal conductivity
- Constructing analytic solutions on the Tricomi equation
- Feynman diagrams and rooted maps
- New type of chaos synchronization in discrete-time systems: the F-M synchronization
- Unsteady flow of fractional Oldroyd-B fluids through rotating annulus
- A note on the uniqueness of 2D elastostatic problems formulated by different types of potential functions
- On the conservation laws and solutions of a (2+1) dimensional KdV-mKdV equation of mathematical physics
- Computational methods and traveling wave solutions for the fourth-order nonlinear Ablowitz-Kaup-Newell-Segur water wave dynamical equation via two methods and its applications
- Siewert solutions of transcendental equations, generalized Lambert functions and physical applications
- Numerical solution of mixed convection flow of an MHD Jeffery fluid over an exponentially stretching sheet in the presence of thermal radiation and chemical reaction
- A new three-dimensional chaotic flow with one stable equilibrium: dynamical properties and complexity analysis
- Dynamics of a dry-rebounding drop: observations, simulations, and modeling
- Modeling the initial mechanical response and yielding behavior of gelled crude oil
- Lie symmetry analysis and conservation laws for the time fractional simplified modified Kawahara equation
- Solitary wave solutions of two KdV-type equations
- Applying industrial tomography to control and optimization flow systems
- Reconstructing time series into a complex network to assess the evolution dynamics of the correlations among energy prices
- An optimal solution for software testing case generation based on particle swarm optimization
- Optimal system, nonlinear self-adjointness and conservation laws for generalized shallow water wave equation
- Alternative methods for solving nonlinear two-point boundary value problems
- Global model simulation of OH production in pulsed-DC atmospheric pressure helium-air plasma jets
- Experimental investigation on optical vortex tweezers for microbubble trapping
- Joint measurements of optical parameters by irradiance scintillation and angle-of-arrival fluctuations
- M-polynomials and topological indices of hex-derived networks
- Generalized convergence analysis of the fractional order systems
- Porous flow characteristics of solution-gas drive in tight oil reservoirs
- Complementary wave solutions for the long-short wave resonance model via the extended trial equation method and the generalized Kudryashov method
- A Note on Koide’s Doubly Special Parametrization of Quark Masses
- On right-angled spherical Artin monoid of type Dn
- Gas flow regimes judgement in nanoporous media by digital core analysis
- 4 + n-dimensional water and waves on four and eleven-dimensional manifolds
- Stabilization and Analytic Approximate Solutions of an Optimal Control Problem
- On the equations of electrodynamics in a flat or curved spacetime and a possible interaction energy
- New prediction method for transient productivity of fractured five-spot patterns in low permeability reservoirs at high water cut stages
- The collinear equilibrium points in the restricted three body problem with triaxial primaries
- Detection of the damage threshold of fused silica components and morphologies of repaired damage sites based on the beam deflection method
- On the bivariate spectral quasi-linearization method for solving the two-dimensional Bratu problem
- Ion acoustic quasi-soliton in an electron-positron-ion plasma with superthermal electrons and positrons
- Analysis of projectile motion in view of conformable derivative
- Computing multiple ABC index and multiple GA index of some grid graphs
- Terahertz pulse imaging: A novel denoising method by combing the ant colony algorithm with the compressive sensing
- Characteristics of microscopic pore-throat structure of tight oil reservoirs in Sichuan Basin measured by rate-controlled mercury injection
- An activity window model for social interaction structure on Twitter
- Transient thermal regime trough the constitutive matrix applied to asynchronous electrical machine using the cell method
- On the zagreb polynomials of benzenoid systems
- Integrability analysis of the partial differential equation describing the classical bond-pricing model of mathematical finance
- The Greek parameters of a continuous arithmetic Asian option pricing model via Laplace Adomian decomposition method
- Quantifying the global solar radiation received in Pietermaritzburg, KwaZulu-Natal to motivate the consumption of solar technologies
- Sturm-Liouville difference equations having Bessel and hydrogen atom potential type
- Study on the response characteristics of oil wells after deep profile control in low permeability fractured reservoirs
- Depiction and analysis of a modified theta shaped double negative metamaterial for satellite application
- An attempt to geometrize electromagnetism
- Structure of traveling wave solutions for some nonlinear models via modified mathematical method
- Thermo-convective instability in a rotating ferromagnetic fluid layer with temperature modulation
- Construction of new solitary wave solutions of generalized Zakharov-Kuznetsov-Benjamin-Bona-Mahony and simplified modified form of Camassa-Holm equations
- Effect of magnetic field and heat source on Upper-convected-maxwell fluid in a porous channel
- Physical cues of biomaterials guide stem cell fate of differentiation: The effect of elasticity of cell culture biomaterials
- Shooting method analysis in wire coating withdrawing from a bath of Oldroyd 8-constant fluid with temperature dependent viscosity
- Rank correlation between centrality metrics in complex networks: an empirical study
- Special Issue: The 18th International Symposium on Electromagnetic Fields in Mechatronics, Electrical and Electronic Engineering
- Modeling of electric and heat processes in spot resistance welding of cross-wire steel bars
- Dynamic characteristics of triaxial active control magnetic bearing with asymmetric structure
- Design optimization of an axial-field eddy-current magnetic coupling based on magneto-thermal analytical model
- Thermal constitutive matrix applied to asynchronous electrical machine using the cell method
- Temperature distribution around thin electroconductive layers created on composite textile substrates
- Model of the multipolar engine with decreased cogging torque by asymmetrical distribution of the magnets
- Analysis of spatial thermal field in a magnetic bearing
- Use of the mathematical model of the ignition system to analyze the spark discharge, including the destruction of spark plug electrodes
- Assessment of short/long term electric field strength measurements for a pilot district
- Simulation study and experimental results for detection and classification of the transient capacitor inrush current using discrete wavelet transform and artificial intelligence
- Magnetic transmission gear finite element simulation with iron pole hysteresis
- Pulsed excitation terahertz tomography – multiparametric approach
- Low and high frequency model of three phase transformer by frequency response analysis measurement
- Multivariable polynomial fitting of controlled single-phase nonlinear load of input current total harmonic distortion
- Optimal design of a for middle-low-speed maglev trains
- Eddy current modeling in linear and nonlinear multifilamentary composite materials
- The visual attention saliency map for movie retrospection
- AC/DC current ratio in a current superimposition variable flux reluctance machine
- Influence of material uncertainties on the RLC parameters of wound inductors modeled using the finite element method
- Cogging force reduction in linear tubular flux switching permanent-magnet machines
- Modeling hysteresis curves of La(FeCoSi)13 compound near the transition point with the GRUCAD model
- Electro-magneto-hydrodynamic lubrication
- 3-D Electromagnetic field analysis of wireless power transfer system using K computer
- Simplified simulation technique of rotating, induction heated, calender rolls for study of temperature field control
- Design, fabrication and testing of electroadhesive interdigital electrodes
- A method to reduce partial discharges in motor windings fed by PWM inverter
- Reluctance network lumped mechanical & thermal models for the modeling and predesign of concentrated flux synchronous machine
- Special Issue Applications of Nonlinear Dynamics
- Study on dynamic characteristics of silo-stock-foundation interaction system under seismic load
- Microblog topic evolution computing based on LDA algorithm
- Modeling the creep damage effect on the creep crack growth behavior of rotor steel
- Neighborhood condition for all fractional (g, f, n′, m)-critical deleted graphs
- Chinese open information extraction based on DBMCSS in the field of national information resources
- 10.1515/phys-2018-0079
- CPW-fed circularly-polarized antenna array with high front-to-back ratio and low-profile
- Intelligent Monitoring Network Construction based on the utilization of the Internet of things (IoT) in the Metallurgical Coking Process
- Temperature detection technology of power equipment based on Fiber Bragg Grating
- Research on a rotational speed control strategy of the mandrel in a rotary steering system
- Dynamic load balancing algorithm for large data flow in distributed complex networks
- Super-structured photonic crystal fiber Bragg grating biosensor image model based on sparse matrix
- Fractal-based techniques for physiological time series: An updated approach
- Analysis of the Imaging Characteristics of the KB and KBA X-ray Microscopes at Non-coaxial Grazing Incidence
- Application of modified culture Kalman filter in bearing fault diagnosis
- Exact solutions and conservation laws for the modified equal width-Burgers equation
- On topological properties of block shift and hierarchical hypercube networks
- Elastic properties and plane acoustic velocity of cubic Sr2CaMoO6 and Sr2CaWO6 from first-principles calculations
- A note on the transmission feasibility problem in networks
- Ontology learning algorithm using weak functions
- Diagnosis of the power frequency vacuum arc shape based on 2D-PIV
- Parametric simulation analysis and reliability of escalator truss
- A new algorithm for real economy benefit evaluation based on big data analysis
- Synergy analysis of agricultural economic cycle fluctuation based on ant colony algorithm
- Multi-level encryption algorithm for user-related information across social networks
- Multi-target tracking algorithm in intelligent transportation based on wireless sensor network
- Fast recognition method of moving video images based on BP neural networks
- Compressed sensing image restoration algorithm based on improved SURF operator
- Design of load optimal control algorithm for smart grid based on demand response in different scenarios
- Face recognition method based on GA-BP neural network algorithm
- Optimal path selection algorithm for mobile beacons in sensor network under non-dense distribution
- Localization and recognition algorithm for fuzzy anomaly data in big data networks
- Urban road traffic flow control under incidental congestion as a function of accident duration
- Optimization design of reconfiguration algorithm for high voltage power distribution network based on ant colony algorithm
- Feasibility simulation of aseismic structure design for long-span bridges
- Construction of renewable energy supply chain model based on LCA
- The tribological properties study of carbon fabric/ epoxy composites reinforced by nano-TiO2 and MWNTs
- A text-Image feature mapping algorithm based on transfer learning
- Fast recognition algorithm for static traffic sign information
- Topical Issue: Clean Energy: Materials, Processes and Energy Generation
- An investigation of the melting process of RT-35 filled circular thermal energy storage system
- Numerical analysis on the dynamic response of a plate-and-frame membrane humidifier for PEMFC vehicles under various operating conditions
- Energy converting layers for thin-film flexible photovoltaic structures
- Effect of convection heat transfer on thermal energy storage unit