![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
13,644 Result(s)
-
Chapter and Conference Paper
Emphasizing Boundary-Positioning and Leveraging Multi-scale Feature Fusion for Camouflaged Object Detection
Camouflaged object detection (COD) aims to identify objects that blend in with their surroundings and have numerous practical applications. However, COD is a challenging task due to the high similarity between...
-
Chapter and Conference Paper
Research on Intelligent Manufacturing Training System Based on Industrial Metaverse
Skilled human resource becomes an essential resource for implementing intelligent manufacturing in the new era, prompting high demands on Intelligent Manufacturing Training (IMT). Empowering the effective IMT,...
-
Chapter and Conference Paper
Empowering Work-Life Harmony: Introducing a Porsche-Inspired Voice Digital Assistants Tailored for Women
With the rapid increase in the personalized demands for in-car voice assistants in the Generation Z era, innovation in digital assistants (DA) becomes crucial to better meet the growing needs of human-vehicle ...
-
Chapter and Conference Paper
KGCN-DDA: A Knowledge Graph Based GCN Method for Drug-Disease Association Prediction
Exploring the potential efficacy of a drug is a valid approach for drug discovery with shorter development times and lower costs. Recently, several computational drug repositioning methods have been introduced...
-
Chapter and Conference Paper
Multimodal Rumor Detection by Using Additive Angular Margin with Class-Aware Attention for Hard Samples
Currently, several factors limit the practicality of multimodal rumor detection (MRD). These include incomplete feature fusion in multimodal data, the weak discriminative power in the softmax-based loss, and t...
-
Chapter and Conference Paper
Multi-agent Perception via Co-attentive Communication Mechanism
Multi-agent collaborative perception has the potential to significantly enhance perception performance by facilitating the exchange of complementary information among agents through communication. Effective co...
-
Chapter and Conference Paper
Deep Recognition of Chinese Herbal Medicines Based on a Caputo Fractional Order Convolutional Neural Network
Chinese herbal medicines are the treasure of Chinese traditional medicine, which contains active ingredients that have significant therapeutic effects for many diseases. To solve the fluctuation and inefficien...
-
Chapter and Conference Paper
Channel Allocation Scheme Based on NSGA-II for Frequency-Division-Multiplexing UHF RFID System
With the proposal and development of the internet of things (IoT), the ultra-high frequency (UHF) passive radio frequency identification (RFID) system based on backscatter communication technology has become o...
-
Chapter and Conference Paper
PiDiNeXt: An Efficient Edge Detector Based on Parallel Pixel Difference Networks
The Pixel Difference Network (PiDiNet) is well-known for its success in edge detection. Combining traditional operators with deep learning, PiDiNet achieves competitive results with fewer parameters. However, ...
-
Chapter and Conference Paper
Tailoring Large Language Models to Radiology: A Preliminary Approach to LLM Adaptation for a Highly Specialized Domain
In this preliminary work, we present a domain fine-tuned LLM model for radiology, an experimental large language model adapted for radiology. This model, created through an exploratory application of instructi...
-
Chapter and Conference Paper
Highlight Removal from a Single Image Based on a Prior Knowledge Guided Unsupervised CycleGAN
Highlights widely exist in many objects, such as the optical images of high-gloss leather, glass, plastic, metal parts, and other mirror-reflective objects. It is difficult to directly apply optical measuremen...
-
Chapter and Conference Paper
Research on UUV Rudder Angle Control Method Based on Sliding Mode Control
It is difficult to control the rudder Angle of UUV due to its nonlinear characteristics, dynamic matching, and many interference terms. With the increase of the number and type of uncertainty items, the corres...
-
Chapter and Conference Paper
Multi-scale Attention Conditional GAN for Underwater Image Enhancement
Underwater image enhancement (UIE) has achieved impressive achievements in various marine tasks, such as aquaculture and biological monitoring. However, complex underwater scenarios impede current UIE method a...
-
Chapter and Conference Paper
Power of Randomness Recovery: Tighter CCA-Secure KEM in the QROM
We propose a novel, efficient and secure Key Encapsulation Mechanism (KEM) transformation in the random oracle model. Furthermore, we demonstrate its security in the Quantum Random Oracle Model (QROM) as intro...
-
Chapter and Conference Paper
Research on Physical Layer of Passive IoT Communication Protocol Based on Cellular Fusion
As transportation, logistics and other industries put forward the demand for low-cost item tracking, it is urgent to use the advantages of cellular networks to achieve seamless coverage of the connection of th...
-
Chapter and Conference Paper
A Data Security Protection Method for Deep Neural Network Model Based on Mobility and Sharing
With the rapid development of digital economy, numerous business scenarios, such as smart grid, energy network, intelligent transportation, etc., require the design and distribution of deep neural network (DNN...
-
Chapter and Conference Paper
DQN-Based Applications Offloading with Multiple Interdependent Tasks in Mobile Edge Computing
Recently, Vehicular Edge Computing (VEC) is evolving as a solution for offloading computationally intensive tasks in in-vehicle environments. However, when the number of vehicles and users is large, pure edge ...
-
Chapter and Conference Paper
Research on Key Intelligent System in Unmanned Surface Vessel
With the rapid development of automated control and mobile communication technologies, unmanned ship technology is a derivative product of robotics. This paper aims to study the key technologies of intelligent...
-
Chapter and Conference Paper
Correction to: A Survey of Control Flow Graph Recovery for Binary Code
-
Chapter and Conference Paper
A Novel Network Topology Sensing Method for Network Security Situation Awareness
In Network Security Situation Awareness (NSSA), topology information of the monitored network constitutes the foundation of the whole NSSA process. This paper presents a novel method for network topology sensi...