default search action
Quanyu Wang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j11]Zhen Gao, Caiyun Lu
, Hongwen Li, Jin He, Qingjie Wang, Quanyu Wang, Zhinan Wang, Chengkun Zhai, Zihan Zhang, Guilian Wu, Shouyuan Liu, Huaying Zhao:
A corn seed spacing detection method based on image stitching and YOLOX. Comput. Electron. Agric. 222: 109087 (2024) - [j10]Yanyun Zhang, Guanyu Chen, Li Cheng, Quanyu Wang, Qi Li:
Corrigendum to "Methods to balance the exploration and exploitation in Differential Evolution from different scales: A survey" [Neurocomputing 561 (2023) 126899]. Neurocomputing 571: 127156 (2024) - [j9]Quanyu Wang, Yao Zhang:
Automobile Intelligent Vehicle-machine and Human-computer Interaction System based on Big Data. Scalable Comput. Pract. Exp. 25(6) (2024) - [c13]Guanyu Chen
, Yang Hu, Zuheng Wang, Zhiquan Song, Jun Hu, Tuo Yang, Quanyu Wang
:
Nested Named Entity Recognition in Geotechnical Engineering Based on Pre-training and Information Enhancement. ICIC (LNAI 3) 2024: 291-303 - [c12]Zhihao Deng, Guangyan Zhou, Guanyu Chen
, Zuheng Wang, Jun Hu, Quanyu Wang
:
Unmixing Detrital Zircon U-Pb Age Distribution Based on Multi-objective Optimization. PRICAI (5) 2024: 3-15 - 2023
- [j8]Zhengyang Wu
, Hongwen Li
, Caiyun Lu, Jin He, Qingjie Wang, Di Liu, Dandan Cui, Rongrong Li, Quanyu Wang, Dong He
:
Development and evaluations of an approach with full utilization of point cloud for measuring the angle of repose. Comput. Electron. Agric. 209: 107799 (2023) - [j7]Yanyun Zhang
, Guanyu Chen, Li Cheng, Quanyu Wang, Qi Li:
Methods to balance the exploration and exploitation in Differential Evolution from different scales: A survey. Neurocomputing 561: 126899 (2023) - [c11]Guanyu Chen, Quanyu Wang, Qi Li, Jun Hu, Jingyi Liu:
Solving Class Imbalance Problem in Target Detection with a Squared Cross Entropy Based Method. ICIC (2) 2023: 124-136 - 2022
- [j6]Quanyu Wang, Kaixiang Zhang
, Manjotho Ali Asghar
:
Skeleton-Based ST-GCN for Human Action Recognition With Extended Skeleton Graph and Partitioning Strategy. IEEE Access 10: 41403-41410 (2022) - [j5]Uzair Saeed
, Ammar Armghan
, Quanyu Wang, Fayadh Alenezi
, Sun Yue
, Prayag Tiwari
:
One-shot many-to-many facial reenactment using Bi-Layer Graph Convolutional Networks. Neural Networks 156: 193-204 (2022) - 2021
- [j4]Yuan-Xin Li
, Quanyu Wang, Shaocheng Tong
:
Fuzzy Adaptive Fault-Tolerant Control of Fractional-Order Nonlinear Systems. IEEE Trans. Syst. Man Cybern. Syst. 51(3): 1372-1379 (2021)
2010 – 2019
- 2019
- [c10]Chunli Wang, Quanyu Wang:
Research on Speech Enhancement Algorithms Based on Blind Source Separation in Outdoor Environment. CSIA 2019: 837-842 - [c9]Chunli Wang, Quanyu Wang:
Analysis and Research on Speech Enhancement Algorithms for Mobile Communication. CSIA 2019: 1041-1047 - 2018
- [c8]Haoge Wang, Quanyu Wang, Wenming Wang:
Text Mining for Educational Literature on Big Data with Hadoop. SmartCloud 2018: 166-170 - [c7]Junjie Wang, Quanyu Wang, Uzair Saeed
:
A visual-GPS fusion based outdoor augmented reality method. VRCAI 2018: 25:1-25:4 - 2017
- [j3]Abderrezak Chelghoum, Quanyu Wang, Kang Wang:
Design and Simulation of Autonomous Mobile Robots Obstacle Avoidance System. Trans. Edutainment 13: 165-180 (2017) - [j2]Quanyu Wang, Yuan Guo, Lida Yang, Mi Tian:
An Indoor Positioning System Based on iBeacon. Trans. Edutainment 13: 262-272 (2017) - [c6]Xingfu Zhong, Wenming Wang, Quanyu Wang:
An indoor AR registration technique based on iBeacons. ICIA 2017: 1093-1098 - 2016
- [c5]Lida Yang, Quanyu Wang, Guangjie Wang:
Positioning in an indoor environment based on iBeacons. ICIA 2016: 894-899 - 2015
- [j1]Quanyu Wang, Guobin Lv, Shi Ying, Feng Zhou:
一种策略驱动的BPEL流程异常处理框架 (Policy Driven Exception Handling Framework for BPEL Processes). 计算机科学 42(1): 180-186 (2015) - 2012
- [c4]Quanyu Wang, Guobin Lv, Shi Ying, Jing Wen:
A policy-driven exception handling approach for service-oriented processes. CSCWD 2012: 449-455
2000 – 2009
- 2008
- [c3]Quanyu Wang, Bin Lu, Xin Lu:
BITBot-a modelling and simulation platform for robots. Humanoids 2008: 469-474 - 2006
- [c2]Quanyu Wang, Siyin Liu:
Chinese Chess Based on Jabber. Edutainment 2006: 706-710 - [c1]Quanyu Wang, Siyin Liu, Zhe Wang:
A New Internet Architecture for Robot Remote Control. IROS 2006: 4989-4993
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-04 21:05 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint