We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 10,000 results
  1. Disturbance event triggered-model predictive tracking control for 4WIS–4WID mobile robot

    Wheel-ground interactions during operation cause the robot to deviate from the reference trajectory, affecting the stability and safety of the robot....

    **aosheng Sun, Lei Liu, ... Feng Wan in Signal, Image and Video Processing
    Article 10 July 2024
  2. End-to-end semi-supervised approach with modulated object queries for table detection in documents

    Table detection, a pivotal task in document analysis, aims to precisely recognize and locate tables within document images. Although deep learning...

    Iqraa Ehsan, Tahira Shehzadi, ... Muhammad Zeshan Afzal in International Journal on Document Analysis and Recognition (IJDAR)
    Article 10 July 2024
  3. Enhanced speech emotion recognition using averaged valence arousal dominance map** and deep neural networks

    This study delves into advancements in speech emotion recognition (SER) by establishing a novel approach for emotion map** and prediction using the...

    Davit Rizhinashvili, Abdallah Hussein Sham, Gholamreza Anbarjafari in Signal, Image and Video Processing
    Article 10 July 2024
  4. Smart contract vulnerabilities detection with bidirectional encoder representations from transformers and control flow graph

    Up to now, the smart contract vulnerabilities detection methods based on sequence modal data and sequence models have been the most commonly used....

    Peng Su, **gyuan Hu in Multimedia Systems
    Article 10 July 2024
  5. Real-time and secure identity authentication transmission mechanism for artificial intelligence generated image content

    The rapid development of generative artificial intelligence technology and large-scale pre-training models has led to the emergence of artificial...

    **ao Feng, Zheng Yuan in Journal of Real-Time Image Processing
    Article 10 July 2024
  6. Signal processing implementation of low-cost target speed detection of CW radar using FPGA

    The low-cost Continuous Wave (CW) radar architecture for object speed detection is presented in this research. An FPGA (Field-Programmable Gate...

    Sameh G. Salem, Mohamed El Hosseny in International Journal of Information Technology
    Article Open access 10 July 2024
  7. Intersecting realms: a cross-disciplinary examination of VR quality of experience research

    The advent of virtual reality (VR) technology has necessitated a reevaluation of quality of experience (QoE) models. While numerous recent efforts...

    Aleksandra Zheleva, Lieven De Marez, ... Klaas Bombeke in Virtual Reality
    Article Open access 10 July 2024
  8. Continual learning approaches to hand–eye calibration in robots

    This study addresses the problem of hand–eye calibration in robotic systems by develo** Continual Learning (CL)-based approaches. Traditionally,...

    Ozan Bahadir, Jan Paul Siebert, Gerardo Aragon-Camarasa in Machine Vision and Applications
    Article Open access 10 July 2024
  9. Usability of visualizing position and orientation deviations for manual precise manipulation of objects in augmented reality

    Manual precise manipulation of objects is an essential skill in everyday life, and Augmented Reality (AR) is increasingly being used to support such...

    ** He, ... Zenglei Wang in Virtual Reality
    Article Open access 09 July 2024
  10. Autocleandeepfood: auto-cleaning and data balancing transfer learning for regional gastronomy food computing

    Food computing has emerged as a promising research field, employing artificial intelligence, deep learning, and data science methodologies to enhance...

    Nauman Ullah Gilal, Marwa Qaraqe, ... Marco Agus in The Visual Computer
    Article Open access 09 July 2024
  11. A novel single kernel parallel image encryption scheme based on a chaotic map

    The development of communication technologies has increased concerns about data security, increasing the prominence of cryptography. Images are one...

    Joao Inacio Moreira Bezerra, Alexandre Molter, ... Vinícius Valduga de Almeida Camargo in Journal of Real-Time Image Processing
    Article 09 July 2024
  12. A robust method for malware analysis using stacking classifiers and dendrogram visualization

    Malware analysis is a vital and challenging task in the ever-changing cyber threat landscape. Traditional signature-based methods cannot keep up with...

    N. Naveen Kumar, S. Balamurugan, ... P. Seshu Kumar in International Journal of Information Technology
    Article 09 July 2024
  13. TSDAnet: texture strip dual attention network for intraclass texture classification

    Intraclass texture classification is a challenging task due to the high similarity between subtypes within the same texture. The presence of...

    G. Sakthipriya, N. Padmapriya, N. Venkateswaran in Signal, Image and Video Processing
    Article 09 July 2024
  14. MDUNet: deep-prior unrolling network with multi-parameter data integration for low-dose computed tomography reconstruction

    The goal of this study is to reconstruct a high-quality computed tomography (CT) image from low-dose acquisition using an unrolling deep...

    Temitope Emmanuel Komolafe, Nizhuan Wang, ... Liang Zhou in Machine Vision and Applications
    Article 09 July 2024
  15. Continual few-shot patch-based learning for anime-style colorization

    The automatic colorization of anime line drawings is a challenging problem in production pipelines. Recent advances in deep neural networks have...

    Akinobu Maejima, Seitaro Shinagawa, ... Yasuhiro Mukaigawa in Computational Visual Media
    Article Open access 09 July 2024
Did you find what you were looking for? Share feedback.