Lihua Wu

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2023
Multi-Task Hybrid Scheduling Scheme in FC-AE-1553 Multi-Level Switching Networks.
IEEE Access, 2023

Grand Challenge on Respiratory Sound Classification for SPRSound Dataset.
Proceedings of the IEEE Biomedical Circuits and Systems Conference, 2023

A Method of Pathing for Underwater Glider Cluster Based on Optimization Algorithm.
Proceedings of the Bio-Inspired Computing: Theories and Applications, 2023

UUV Fault Diagnosis Model Based on Support Vector Machine.
Proceedings of the Bio-Inspired Computing: Theories and Applications, 2023

UUV Dynamic Path Planning Algorithm Based on A-Star and Dynamic Window.
Proceedings of the Bio-Inspired Computing: Theories and Applications, 2023

2022
Joint Detection of Community and Structural Hole Spanner of Networks in Hyperbolic Space.
Entropy, 2022

UAV Trajectory Design on Completion Time Minimization of WPT Task in UAV-Enabled Multi-User Network.
Proceedings of the 2022 IEEE International Conference on Communications Workshops, 2022

Prediction of Hard Drive Failures for Data Center Based on LightGBM.
Proceedings of the 9th IEEE International Conference on Cyber Security and Cloud Computing, 2022

Radar Emitter Signal Recognition Method Based on EEMD and Ambiguity Function Contour with EfficientNet.
Proceedings of the 4th International Conference on Artificial Intelligence and Advanced Manufacturing, 2022

2021
An Adversarial Examples Identification Method for Time Series in Internet-of-Things System.
IEEE Internet Things J., 2021

Parametric multi-soliton solutions of a generalized Harry-Dym type equation.
Appl. Math. Lett., 2021

2020
A method of automatically generating initial parameters for large-scale belief rule base.
Knowl. Based Syst., 2020

2019
A self-adaptive correction method for perspective distortions of image.
Frontiers Comput. Sci., 2019

Soliton solutions to the Novikov equation and a negative flow of the Novikov hierarchy.
Appl. Math. Lett., 2019

Optimization path for total factor carbon productivity in Beijing-Tianjin-Hebei.
Proceedings of the 2019 IEEE International Conference on Systems, Man and Cybernetics, 2019

Fault Diagnosis Method of WSN Nodes Based on Wavelet Packet and Belief Rule Base.
Proceedings of the CAA Symposium on Fault Detection, 2019

2018
Data-Driven Cell Zooming for Large-Scale Mobile Networks.
IEEE Trans. Netw. Serv. Manag., 2018

2017
Darboux transformation and explicit solutions to the generalized TD equation.
Appl. Math. Lett., 2017

2016
SDN-Based Application Framework for Wireless Sensor and Actor Networks.
IEEE Access, 2016

User interest acquisition by adding home and work related contexts on mobile big data analysis.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016

2015
TDOCP: A two-dimensional optimization integrating channel assignment and power control for large-scale WLANs with dense users.
Ad Hoc Networks, 2015

Understanding Access Stability and Mobility Patterns of Mobile Internet Users.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

2014
Algebro-geometric Quasi-periodic Solutions to the Three-Wave Resonant Interaction Hierarchy.
SIAM J. Math. Anal., 2014

Underwater Continuous Localization Based on Magnetic Dipole Target Using Magnetic Gradient Tensor and Draft Depth.
IEEE Geosci. Remote. Sens. Lett., 2014

Long tail and small world characteristic of mobile internet traffic dynamics.
Proceedings of the 2014 IEEE International Conference on Systems, Man, and Cybernetics, 2014

2013
Quasi-periodic Solutions of the Kaup-Kupershmidt Hierarchy.
J. Nonlinear Sci., 2013

The full positive flows of Manakov hierarchy, Hamiltonian structures and conservation laws.
Appl. Math. Comput., 2013

2012
Characterizations of one-way general quantum finite automata.
Theor. Comput. Sci., 2012

Entropy, Similarity Measure, Inclusion Measure of Intuitionistic Fuzzy Sets and Their Relationships.
Int. J. Comput. Intell. Syst., 2012

Automata theory based on complete residuated lattice-valued logic: Turing machines.
Fuzzy Sets Syst., 2012

A practical approach to topic detection based on credible association rule mining.
Proceedings of the 3rd IEEE International Conference on Network Infrastructure and Digital Content, 2012

Information Entropy, Similarity Measure and Inclusion Measure of Intuitionistic Fuzzy Sets.
Proceedings of the Information Computing and Applications - Third International Conference, 2012

2011
PRIS at TREC 2011 Legal Track Discovery Based on Relevant Feedback.
Proceedings of The Twentieth Text REtrieval Conference, 2011

Immune Gravitation Inspired Optimization Algorithm.
Proceedings of the Advanced Intelligent Computing - 7th International Conference, 2011

A Modification to the Jelinski-Moranda Software Reliability Growth Model Based on Cloud Model Theory.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

Qualitative Modeling for Parallel Software System Reliability Evaluation.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

A Cloud Model Approach to the Modification of the Exponential Function Model for Software Reliability.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

Automatic Detection Model of Malware Signature for Anti-virus Cloud Computing.
Proceedings of the 10th IEEE/ACIS International Conference on Computer and Information Science, 2011

Research of the Computer Virus Evolution Model Based on Immune Genetic Algorithm.
Proceedings of the 10th IEEE/ACIS International Conference on Computer and Information Science, 2011

2010
Automata theory based on complete residuated lattice-valued logic: Reduction and minimization.
Fuzzy Sets Syst., 2010

A new super-extension of the KdV hierarchy.
Appl. Math. Lett., 2010

Immunity-Based Model for Malicious Code Detection.
Proceedings of the Advanced Intelligent Computing Theories and Applications, 2010

2009
On mathematical theory of the duality computers.
Quantum Inf. Process., 2009

A Novel MHC-Inspired Approach for Malicious Code Detection.
Proceedings of the Software Engineering Research, 2009

MHC-inspired Antibody Clone Algorithm for Multimodal Function Optimization.
Proceedings of the Seventh ACIS International Conference on Software Engineering Research, 2009

A Personalized Intelligent Web Retrieval System Based on the Knowledge-Base Concept and Latent Semantic Indexing Model.
Proceedings of the Seventh ACIS International Conference on Software Engineering Research, 2009

2007
The penalty method for generalized multivalued nonlinear variational inequalities in Banach spaces.
Appl. Math. Lett., 2007

Observation Reduction for Strong Plans.
Proceedings of the IJCAI 2007, 2007

2006
Predicting the final prices of online auction items.
Expert Syst. Appl., 2006

2005
Modeling user multiple interests by an improved GCS approach.
Expert Syst. Appl., 2005


  Loading...