Dengyin Zhang
YOU?
Author Swipe
View article: HAP-UAV-assisted hierarchical aerial computing framework for video offloading: a deep reinforcement learning approach
HAP-UAV-assisted hierarchical aerial computing framework for video offloading: a deep reinforcement learning approach Open
Unmanned aerial vehicles (UAVs) and high altitude platforms (HAPs) can work together to provide real-time video analytics for ground camera equipments (CEs) in disaster rescue. Resource-constrained UAV can offload video analytics tasks to …
View article: SR-YOLO: Spatial-to-Depth Enhanced Multi-Scale Attention Network for Small Target Detection in UAV Aerial Imagery
SR-YOLO: Spatial-to-Depth Enhanced Multi-Scale Attention Network for Small Target Detection in UAV Aerial Imagery Open
The detection of aerial imagery captured by Unmanned Aerial Vehicles (UAVs) is widely employed across various domains, including engineering construction, traffic regulation, and precision agriculture. However, aerial images are typically …
View article: Network Security Anomaly Node Detection Based on Graph Neural Network and Attention Mechanism
Network Security Anomaly Node Detection Based on Graph Neural Network and Attention Mechanism Open
Protecting networks from malicious access is a highly challenging task. Identifying and detecting anomalous paths can effectively filter out potential network threats. Despite extensive research in this field, the advent of new network tec…
View article: Pose Estimation Based on Bidirectional Visual–Inertial Odometry with 3D LiDAR (BV-LIO)
Pose Estimation Based on Bidirectional Visual–Inertial Odometry with 3D LiDAR (BV-LIO) Open
Due to the limitation of a single sensor such as only camera or only LiDAR, the Visual SLAM detects few effective features in the case of poor lighting or no texture. The LiDAR SLAM will also degrade in an unstructured environment and open…
View article: Security-Aware Task Offloading Using Deep Reinforcement Learning in Mobile Edge Computing Systems
Security-Aware Task Offloading Using Deep Reinforcement Learning in Mobile Edge Computing Systems Open
With the proliferation of intelligent applications, mobile devices are increasingly handling computation-intensive tasks but often struggle with limited computing power and energy resources. Mobile Edge Computing (MEC) offers a solution by…
View article: Hybrid Hierarchical Particle Swarm Optimization with Evolutionary Artificial Bee Colony Algorithm for Task Scheduling in Cloud Computing
Hybrid Hierarchical Particle Swarm Optimization with Evolutionary Artificial Bee Colony Algorithm for Task Scheduling in Cloud Computing Open
Task scheduling plays a key role in effectively managing and allocating computing resources to meet various computing tasks in a cloud computing environment. Short execution time and low load imbalance may be the challenges for some algori…
View article: Hound: A Parallel Image Distribution System for Cluster Based on Docker
Hound: A Parallel Image Distribution System for Cluster Based on Docker Open
Current applications, consisting of multiple replicas, are packaged into lightweight containers with their execution dependencies. Considering the dominant impact of distribution efficiency of gigantic images on container startup (e.g., di…
View article: Local Adaptive Image Filtering Based on Recursive Dilation Segmentation
Local Adaptive Image Filtering Based on Recursive Dilation Segmentation Open
This paper introduces a simple but effective image filtering method, namely, local adaptive image filtering (LAIF), based on an image segmentation method, i.e., recursive dilation segmentation (RDS). The algorithm is motivated by the obser…
View article: Exploiting NOMA and RIS in Integrated Sensing and Communication
Exploiting NOMA and RIS in Integrated Sensing and Communication Open
A novel integrated sensing and communication (ISAC) system is proposed, where a dual-functional base station is utilized to transmit the superimposed non-orthogonal multiple access (NOMA) communication signal for serving communication user…
View article: A multi-resource scheduling scheme of Kubernetes for IIoT
A multi-resource scheduling scheme of Kubernetes for IIoT Open
With the rapid development of data applications in the scene of Industrial Internet of Things (IIoT), how to schedule resources in IIoT environment has become an urgent problem to be solved.Due to benefit of its strong scalability and comp…
View article: High-Resolution Representations Network for Single Image Dehazing
High-Resolution Representations Network for Single Image Dehazing Open
Deep learning-based image dehazing methods have made great progress, but there are still many problems such as inaccurate model parameter estimation and preserving spatial information in the U-Net-based architecture. To address these probl…
View article: Multitarget Detection in Depth-Perception Traffic Scenarios
Multitarget Detection in Depth-Perception Traffic Scenarios Open
Multitarget detection in complex traffic scenarios usually has many problems: missed detection of targets, difficult detection of small targets, etc. In order to solve these problems, this paper proposes a two-step detection model of depth…
View article: A Review of Remote Sensing Image Dehazing
A Review of Remote Sensing Image Dehazing Open
Remote sensing (RS) is one of the data collection technologies that help explore more earth surface information. However, RS data captured by satellite are susceptible to particles suspended during the imaging process, especially for data …
View article: Light-YOLOv3: License Plate Detection in Multi-Vehicle Scenario
Light-YOLOv3: License Plate Detection in Multi-Vehicle Scenario Open
With the development of the Internet of Vehicles, License plate detection technology is widely used, e.g., smart city and edge senor monitor. However, traditional license plate detection methods are based on the license plate edge detectio…
View article: Video super‐resolution with non‐local alignment network
Video super‐resolution with non‐local alignment network Open
Video super‐resolution (VSR) aims at recovering high‐resolution frames from their low‐resolution counterparts. Over the past few years, deep neural networks have dominated the video super‐resolution task because of its strong non‐linear re…
View article: A Network Selection Algorithm Based on Vehicle Trajectory Prediction and AHP
A Network Selection Algorithm Based on Vehicle Trajectory Prediction and AHP Open
This paper proposes a network selection algorithm based on Vehicle Trajectory Prediction and AHP (VMAP). The Markov chain is used to predict the running trajectory of the vehicle. The predicted trajectory is used to calculate the dwell tim…
View article: Form location and extraction based on deep learning
Form location and extraction based on deep learning Open
To obtain users’ information on form images with different types and resolutions, a form location and extraction method based on deep learning is proposed in this paper. We adopt two classification models to better the detection accuracy: …
View article: FAOD-Net: A Fast AOD-Net for Dehazing Single Image
FAOD-Net: A Fast AOD-Net for Dehazing Single Image Open
In this paper, we present an extremely computation-efficient model called FAOD-Net for dehazing single image. FAOD-Net is based on a streamlined architecture that uses depthwise separable convolutions to build lightweight deep neural netwo…
View article: Fast Compass Alignment for Strapdown Inertial Navigation System
Fast Compass Alignment for Strapdown Inertial Navigation System Open
Initial alignment is the precondition for strapdown inertial navigation system (SINS) to navigate. Its two important indexes are accuracy and rapidity, the accuracy of the initial alignment is directly related to the working accuracy of SI…
View article: JsrNet: A Joint Sampling–Reconstruction Framework for Distributed Compressive Video Sensing
JsrNet: A Joint Sampling–Reconstruction Framework for Distributed Compressive Video Sensing Open
Huge video data has posed great challenges on computing power and storage space, triggering the emergence of distributed compressive video sensing (DCVS). Hardware-friendly characteristics of this technique have consolidated its position a…
View article: Deep Reinforcement Learning for Smart Home Energy Management
Deep Reinforcement Learning for Smart Home Energy Management Open
In this paper, we investigate an energy cost minimization problem for a smart\nhome in the absence of a building thermal dynamics model with the consideration\nof a comfortable temperature range. Due to the existence of model uncertainty,\…
View article: Multi-Hypothesis Prediction Scheme Based on the Joint Sparsity Model
Multi-Hypothesis Prediction Scheme Based on the Joint Sparsity Model Open
Distributed compressive video sensing (DCVS) has received considerable attention due to its potential in source-limited communication, e.g., wireless video sensor networks (WVSNs). Multi-hypothesis (MH) prediction, which treats the target …
View article: Security-aware dual-hop communication for amplify-and-forward relay networks
Security-aware dual-hop communication for amplify-and-forward relay networks Open
The authentication scheme for vehicular ad hoc networks aims to improve the security and integrity of message delivery. The base station manages a large number of vehicular nodes, so the security communications are non-trivial. In this art…
View article: Consumption behavior evaluation of college students based on PSO-DTSVM
Consumption behavior evaluation of college students based on PSO-DTSVM Open
Blind and reckless consumption of the college students has become a common phenomenon. To give a correctly guiding, a decision tree support vector machine (DTSVM) based on particle swarm optimization (PSO) used to evaluate college students…
View article: A Terminal-Oriented Distributed Traffic Flow Splitting Strategy for Multi-Service of V2X Networks
A Terminal-Oriented Distributed Traffic Flow Splitting Strategy for Multi-Service of V2X Networks Open
With the development and the characteristics of terminal services of the 5G (5th-Generation network) Internet of Vehicles (IoVs), this paper proposes a distributed splitting strategy for multi-type services of 5G V2X (Vehicle to X) network…
View article: Short-term Traffic Flow Prediction based on Data-Driven Knearest neighbour Nonparametric Regression
Short-term Traffic Flow Prediction based on Data-Driven Knearest neighbour Nonparametric Regression Open
In order to solve the problem that the KNN algorithm is not accurate enough in the short-term traffic forecasting process and the prediction efficiency is not high caused by the search for past observations, a short-term traffic flow predi…
View article: A New Video Tracking Algorithm Based on Multi-Complementary Features Fusion
A New Video Tracking Algorithm Based on Multi-Complementary Features Fusion Open
In order to make full use of the diversity of sample information in the tracking process and improve the generalization ability of the tracker, this paper integrates the object model prediction results on the basis of the Staple algorithm,…
View article: A Hierarchical Failure Detector Based on Architecture in VANETs
A Hierarchical Failure Detector Based on Architecture in VANETs Open
The failure detector is one of the fundamental components for maintaining high availability of Vehicular Ad-hoc Networks (VANETs). However, the dynamic nature of VANETs caused by the high mobility of vehicles and communication link failure…
View article: MH-Net: A Learnable Multi-Hypothesis Network for Compressed Video Sensing
MH-Net: A Learnable Multi-Hypothesis Network for Compressed Video Sensing Open
This paper establishes a novel recovery network called MH-Net-a framework for compressed video sensing (CVS) based on recently emerging deep neural networks (DNNs) techniques. MH-Net exploits temporal correlation between frames in the form…
View article: Distributed Compressive Video Sensing with Mixed Multihypothesis Prediction
Distributed Compressive Video Sensing with Mixed Multihypothesis Prediction Open
Traditional video acquisition systems require complex data compression at the encoder, which makes them unacceptable for resource-limited applications such as wireless multimedia sensor networks (WMSNs). To address this problem, distribute…