Zobrazeno 1 - 9
of 9
pro vyhledávání: '"Jinshan Jiang"'
Autor:
Benbing Rong, Zhangbao Guo, Lijie Gao, Yuan Yang, Wenjie Zi, Zhongming Qiu, Fengli Li, Zhiyu Lv, Ying luo, Renliang Meng, Yang Xie, Ting Long, Shujiang Zhang, Jinshan Jiang, Jinfeng Tian, Jingling Zhao, Hongliang Zeng, Zhengzhou Yuan
Publikováno v:
European Journal of Medical Research, Vol 28, Iss 1, Pp 1-9 (2023)
Abstract Background and purpose The efficacy and safety of tirofiban in endovascular therapy for cardioembolic ischemic stroke patients remain controversial. This study aimed to evaluate the role of intravenous tirofiban before endovascular therapy i
Externí odkaz:
https://doaj.org/article/96242465e3ca4a99ac0e585e20b3508f
Publikováno v:
Image and Vision Computing. 29:142-154
To build a consistent image representation model which can process the non-Gaussian distribution data, a novel edge detection method (KPCA-SCF) based on the kernel method is proposed. KPCA-SCF combines kernel principal component analysis and kernel s
Autor:
Jinshan Jiang, Shirong Yin
Publikováno v:
2012 Third Global Congress on Intelligent Systems.
A new heuristic algorithm based on simple blocks is proposed in this paper to pack to solve three-dimensional packing problems(3DPP), and a self-adaptive genetic algorithm is used to optimize the packing sequence and direction of the constraint seque
Autor:
Jinshan Jiang, Lingzhi Cao
Publikováno v:
2012 International Conference on Systems and Informatics (ICSAI2012).
In this paper, we present a novel hybrid simulated annealing algorithm (HSAA) to efficiently solve three-dimensional multi-bin packing problems. Combined with the concept of the batch and the block, a kind of seven-tuple structure is proposed to opti
Publikováno v:
ICMLC
The good word attack is a common adversarial attack. The adversary defects spam filters by appending to spam some “good” words, which are words appearing frequently in legitimate emails but not in spam. The attacker expects add more “bad” wor
Autor:
Jinshan Jiang, Zhuoxin Liu
Publikováno v:
FSKD
Feature extraction is one of the most important issues for designing content-based image retrieval systems. In this paper, we present a method of extracting feature to retrieve images. In the first step of the proposed method, bound is introduced to
Autor:
Jinshan Jiang, Wenzhi Liao
Publikováno v:
2008 Congress on Image and Signal Processing.
A new feature extraction approach based on kernel independent component analysis (Kernel ICA) is proposed in this paper. The Kernel ICA is applied to learn basis vector for feature extraction, and then the basis vector is used as a template model to
Publikováno v:
2011 International Conference on Machine Learning & Cybernetics (ICMLC); 2011, p1088-1092, 5p
Autor:
Zhuoxin Liu, Jinshan Jiang
Publikováno v:
2010 Seventh International Conference on Fuzzy Systems & Knowledge Discovery (FSKD); 2010, p2579-2583, 5p