Cheng Zhou

According to our database1, Cheng Zhou authored at least 65 papers between 2003 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.



In proceedings 
PhD thesis 




Secretory Structures of Pogostemon auricularius: Morphology, Development, and Histochemistry.
Symmetry, 2019

Combining association rules mining with complex networks to monitor coupled risks.
Rel. Eng. & Sys. Safety, 2019

A tail adaptive approach for change point detection.
J. Multivariate Analysis, 2019

An Action Recognition network for specific target based on rMC and RPN.
CoRR, 2019

Impoved RPN for Single Targets Detection based on the Anchor Mask Net.
CoRR, 2019

Consequent Pole Permanent Magnet Vernier Machine With Asymmetric Air-Gap Field Distribution.
IEEE Access, 2019

Analysis on Integrated Energy System Cascading Failures Considering Interaction of Coupled Heating and Power Networks.
IEEE Access, 2019

A Low-Complexity Channel Estimation Method Based on Subspace for Large-Scale MIMO Systems.
Proceedings of the Wireless and Satellite Systems, 2019

An Improved Gauss-Seidel Algorithm for Signal Detection in Massive MIMO Systems.
Proceedings of the Wireless and Satellite Systems, 2019

Improved RPN for Single Targets Detection Based on the Anchor Mask Net.
Proceedings of the Image and Graphics Technologies and Applications, 2019

DHER: Hindsight Experience Replay for Dynamic Goals.
Proceedings of the 7th International Conference on Learning Representations, 2019

A novel measurement method to investigate dynamics of single acoustic bubble near a rigid wall.
Proceedings of the IEEE International Instrumentation and Measurement Technology Conference, 2019

Next News Recommendation via Knowledge-Aware Sequential Model.
Proceedings of the Chinese Computational Linguistics - 18th China National Conference, 2019

Using Bayesian network for safety risk analysis of diaphragm wall deflection based on field data.
Rel. Eng. & Sys. Safety, 2018

Modelling behaviour of cyber-physical system and verifying its safety based on algebra of event.
IJIIDS, 2018

Topological mapping and assessment of multiple settlement time series in deep excavation: A complex network perspective.
Advanced Engineering Informatics, 2018

Low-Scattering Tri-Band Metasurface Using Combination of Diffusion, Absorption and Cancellation.
IEEE Access, 2018

Interactive Query Reformulation for Source-Code Search With Word Relations.
IEEE Access, 2018

What Makes a Good Developer? An Empirical Study of Developers' Technical and Social Competencies.
Proceedings of the 2018 IEEE Symposium on Visual Languages and Human-Centric Computing, 2018

Intelligent bug fixing with software bug knowledge graph.
Proceedings of the 2018 ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2018

LM Enhanced BiRNN-CRF for Joint Chinese Word Segmentation and POS Tagging.
Proceedings of the Natural Language Processing and Chinese Computing, 2018

Five-Stroke Based CNN-BiRNN-CRF Network for Chinese Named Entity Recognition.
Proceedings of the Natural Language Processing and Chinese Computing, 2018

Recognizing software bug-specific named entity in software bug repository.
Proceedings of the 26th Conference on Program Comprehension, 2018

Adult Image Classification by a Local-Context Aware Network.
Proceedings of the 2018 IEEE International Conference on Image Processing, 2018

Bluetooth Indoor Positioning Based on RSSI and Kalman Filter.
Wireless Personal Communications, 2017

Events Algebra of Triggers.
Comput. J., 2017

Optimal control of a space robot for base disturbance minimization.
Proceedings of the 2017 IEEE International Conference on Real-time Computing and Robotics, 2017

Research on Security and Interoperability in Middleware.
Proceedings of the Advances in Intelligent Networking and Collaborative Systems, 2017

Research on Behavior Modeling and Property Verification for Cyber-Physical Systems.
Proceedings of the Advances in Intelligent Networking and Collaborative Systems, 2017

Large-scale MIMO is capable of eliminating power-thirsty channel coding for wireless transmission of HEVC/H.265 video.
IEEE Wireless Commun., 2016

Pattern Based Sequence Classification.
IEEE Trans. Knowl. Data Eng., 2016

An Automatic Process Monitoring Method Using Recurrence Plot in Progressive Stamping Processes.
IEEE Trans. Automation Science and Engineering, 2016

Design and experiment of a universal space-saving end-effector for multi-task operations.
Industrial Robot, 2016

Large-Scale MIMOs are Capable of Eliminating Power-Thirsty Channel Coding for Wireless Transmission of HEVC/H.265 Video.
CoRR, 2016

Historical Information Aware Unequal Error Protection of Scalable HEVC/H.265 Streaming Over Free Space Optical Channels.
IEEE Access, 2016

Motion planning for redundant free-floating space robot with local optimization of reaction torque and joint torque simultaneously.
Proceedings of the 2016 IEEE International Conference on Robotics and Biomimetics, 2016

The electrical simulator for the space station manipulator under Linux/RTAI.
Proceedings of the 2016 IEEE International Conference on Robotics and Biomimetics, 2016

Adaptive combination forecasting model for China's logistics freight volume based on an improved PSO-BP neural network.
Kybernetes, 2015

A pattern based predictor for event streams.
Expert Syst. Appl., 2015

A New Process Monitoring Method Based on Waveform Signal by Using Recurrence Plot.
Entropy, 2015

Recurrence Plot Based Damage Detection Method by Integrating Control Chart.
Entropy, 2015

Mining the entire Protein DataBank for frequent spatially cohesive amino acid patterns.
BioData Mining, 2015

Adaptive time-slot and power allocation in MIMO systems for simultaneous wireless two-way information and one-way energy transfer.
Proceedings of the International Conference on Wireless Communications & Signal Processing, 2015

Self-Interference Cancellation with RF Impairments Suppression for Full-Duplex Systems.
Proceedings of the IEEE 82nd Vehicular Technology Conference, 2015

Optimization of Elliptic Curve Cryptography Resisting Power Attack Scalar Multiplication Algorithm in Security System on Chip.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015

Cohesion based co-location pattern mining.
Proceedings of the 2015 IEEE International Conference on Data Science and Advanced Analytics, 2015

Discovery of Spatially Cohesive Itemsets in Three-Dimensional Protein Structures.
IEEE/ACM Trans. Comput. Biology Bioinform., 2014

Road Geometric Features Extraction based on Self-Organizing Map (SOM) Neural Network.
JNW, 2014

A Process-aware Security Task Scheduling Algorithm.
JDIM, 2014

Adaptive Combination Forecasting Model Based on Area Correlation Degree with Application to China's Energy Consumption.
J. Applied Mathematics, 2014

A Multi-Instance Multi-Label Learning Approach for Protein Domain Annotation.
Proceedings of the Intelligent Computing in Bioinformatics - 10th International Conference, 2014

Throughput Optimization in MU-MIMO Systems via Coordinated Vertical Double-Beam Tilting.
Proceedings of the 14th IEEE International Conference on Computer and Information Technology, 2014

Image representation using block compressive sensing for compression applications.
J. Visual Communication and Image Representation, 2013

Macroblock Mode Pre-classification Algorithms based on Motion Vectors Filtering for H.264/AVC.
Journal of Multimedia, 2013

Itemset Based Sequence Classification.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2013

Mining spatially cohesive itemsets in protein molecular structures.
Proceedings of the 12th International Workshop on Data Mining in Bioinformatics, 2013

A higher-order prediction method of spatial cues based on Bayesian Gradient model.
Proceedings of the IEEE International Conference on Wireless Communications, 2010

A System Identification Using DRNN Based on Swarm Intelligence.
Proceedings of the Advances in Swarm Intelligence, First International Conference, 2010

Three ways to solve the Poisson equation on a sphere with Gaussian forcing.
J. Comput. Physics, 2009

A fuzzy clustering algorithm based on evolutionary programming.
Expert Syst. Appl., 2009

An objective and automatic feedback model for QoS evaluation.
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, 2009

A fast optimization method of using nondominated sorting genetic algorithm (NSGA-II) and 1-nearest neighbor (1NN) classifier for numerical model calibration.
Proceedings of the 2005 IEEE International Conference on Granular Computing, 2005

Graph Visualization for the Analysis of the Structure and Dynamics of Extreme-Scale Supercomputers.
Proceedings of the Proceedings ACM 2003 Symposium on Software Visualization, 2003

Á la carte: A Simulation Framework for Extreme-scale Hardware Architectures.
Proceedings of the IASTED International Conference on Modelling and Simulation (MS 2003), 2003

Picture archiving and communication system in China: the development, problem, and integrating strategy with IHE.
Proceedings of the CARS 2003. Computer Assisted Radiology and Surgery. Proceedings of the 17th International Congress and Exhibition, 2003