Minghai Yao
YOU?
Author Swipe
View article: Covert Marketing Advertising Law Review Paper
Covert Marketing Advertising Law Review Paper Open
This paper examines the legal and ethical issues surrounding stealth marketing, especially in the current popular trend of influencer marketing on social media, and its effects on the trust and perception of consumers. The paper explores r…
View article: Research on Performance Prediction Method Based on Gaussian Process Regression
Research on Performance Prediction Method Based on Gaussian Process Regression Open
View article: Strategy for perovskite solar cells approaching to S–Q limited efficiency
Strategy for perovskite solar cells approaching to S–Q limited efficiency Open
Despite recent substantial improvements in the efficiency of perovskite solar cells, the record efficiency of single-junction perovskite solar cells still falls short of the theoretical limiting efficiency predicted by Shockley–Queisser du…
View article: Influence of parasitic optical losses on the performance of perovskite solar cells
Influence of parasitic optical losses on the performance of perovskite solar cells Open
Parasitic optical losses, including free-carrier absorption and absorption from the rear mirror, could significantly affect the performance of solar cells. Although estimates of their influence have been made in the past, they have not pre…
View article: Role of Light Trapping Structures on the Performance of Perovskite Solar Cells
Role of Light Trapping Structures on the Performance of Perovskite Solar Cells Open
View article: Recent Progress of Anomaly Detection
Recent Progress of Anomaly Detection Open
Anomaly analysis is of great interest to diverse fields, including data mining and machine learning, and plays a critical role in a wide range of applications, such as medical health, credit card fraud, and intrusion detection. Recently, a…
View article: Recent Progress of Anomaly Detection
Recent Progress of Anomaly Detection Open
Anomaly analysis is of great interest to diverse fields, including data mining and machine learning, and plays a critical role in a wide range of applications, such as medical health, credit card fraud, and intrusion detection. Recently, a…
View article: Improving the Efficiency of Encoder-Decoder Architecture for Pixel-Level Crack Detection
Improving the Efficiency of Encoder-Decoder Architecture for Pixel-Level Crack Detection Open
Cracks are one of the most common categories of pavement distress that may potentially threaten road and highway safety. Thus, a reliable and efficient pixel-level method of crack detection is necessary for real-time measurement of the cra…
View article: A Comparison of Outlier Detection Techniques for High-Dimensional Data
A Comparison of Outlier Detection Techniques for High-Dimensional Data Open
Outlier detection is a hot topic in machine learning. With the newly emerging technologies and diverse applications, the interest of outlier detection is increasing greatly. Recently, a significant number of outlier detection methods have …
View article: A Novel Video Hiding Method for Biometric Identification
A Novel Video Hiding Method for Biometric Identification Open
In this study, a novel video hiding method is proposed for protecting the transmitted biometric information.Different from the most of existing information hiding methods, the hiding content is an image set rather than a single image or fe…
View article: Image Dehazing Method Based on Multi-scale Feature Fusion
Image Dehazing Method Based on Multi-scale Feature Fusion Open
In recent years, image dehazing has become an active topic in computer vision.This paper presents a novel dehazing method based on adaptive clustering and image fusion for restoring a single image degraded by fog or haze.Firstly, the coars…
View article: The Design of Defect Detection Algorithm for the Energy-saving Lamp Tungsten
The Design of Defect Detection Algorithm for the Energy-saving Lamp Tungsten Open
In the energy-saving lamp production, there may be some defects such as no lamp post, too long tail, excess or not enough powder coating.The paper proposes the defect detection algorithm based on tungsten defect features with machine visio…
View article: An Improved Information Hiding Method Based on Sparse Representation
An Improved Information Hiding Method Based on Sparse Representation Open
A novel biometric authentication information hiding method based on the sparse representation is proposed for enhancing the security of biometric information transmitted in the network. In order to make good use of abundant information of …