![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
364 Result(s)
-
Article
DBU-PG: energy-efficient noc design using dual-buffering power gating
With the continuous reduction in transistor size, the power consumption issue associated with the adoption of Network-on-Chips (NoCs) in multicore systems has become increasingly prominent and severe, particul...
-
Article
Lightweight wildfire smoke monitoring algorithm based on unmanned aerial vehicle vision
Forest fires have a serious impact on people’s living environment. Currently, drones enable rapid detection of forest fires. Due to the limited processing capabilities of onboard drones, the accuracy of smoke ...
-
Article
Open AccessTwo-dimensional materials for future information technology: status and prospects
Over the past 70 years, the semiconductor industry has undergone transformative changes, largely driven by the miniaturization of devices and the integration of innovative structures and materials. Two-dimensi...
-
Article
Using particle size distributions to identify indoor emissions: a machine learning method for source recognition
Variation in emitted particle sizes between sources offers potential for source identification. Seven thousand two hundred particle size distributions collected in a single-family home were categorized into fo...
-
Article
VioDroid-Finder: automated evaluation of compliance and consistency for Android apps
Rapid growth in the variety and quantity of apps makes it difficult for users to protect their privacy, although existing regulations have been introduced and the Android ecosystem is constantly being improved...
-
Article
Cross-modal pedestrian re-recognition based on attention mechanism
Person re-identification, as an essential research direction in intelligent security, has gained the focus of researchers and scholars. In practical scenarios, visible light cameras depend highly on lighting c...
-
Article
Towards High-Performance Graph Processing: From a Hardware/Software Co-Design Perspective
Graph processing has been widely used in many scenarios, from scientific computing to artificial intelligence. Graph processing exhibits irregular computational parallelism and random memory accesses, unlike t...
-
Article
MCLEMCD: multimodal collaborative learning encoder for enhanced music classification from dances
Music classification is widely applied in the automatic organization of music archives and intelligent music interfaces. Music is frequently accompanied by other media, such as image sequences. Combining vario...
-
Book
-
Chapter and Conference Paper
Generalized W-Net: Arbitrary-Style Chinese Character Synthesization
Synthesizing Chinese characters with consistent style using few stylized examples is challenging. Existing models struggle to generate arbitrary style characters with limited examples. In this paper, we propos...
-
Chapter and Conference Paper
List-Based Workflow Scheduling Utilizing Deep Reinforcement Learning
Workflow scheduling is a well-known NP-complete research problem with wide applications and increasing importance. Traditionally, heuristic and guided random search methods, e.g. genetic algorithm, are the two...
-
Chapter and Conference Paper
Real-Time Automated Body Condition Scoring of Dairy Cows
Traditional management and farming of dairy cows have relied primarily on human labor and experience. However, this approach has limitations such as the lack of real-time monitoring and predictive capabilities...
-
Chapter and Conference Paper
Continuous Engineering for Trustworthy Learning-Enabled Autonomous Systems
Learning-enabled autonomous systems (LEAS) use machine learning (ML) components for essential functions of autonomous operation, such as perception and control. LEAS are often safety-critical. The development ...
-
Chapter and Conference Paper
Best-of-Both-Worlds Multiparty Quantum Computation with Publicly Verifiable Identifiable Abort
Alon et al. (CRYPTO 2021) introduced a multiparty quantum computation protocol that is secure with identifiable abort (MPQC-SWIA). However, their protocol allows only inside MPQC parties to know the identity o...
-
Article
Open AccessFederated machine learning for predicting acute kidney injury in critically ill patients: a multicenter study in Taiwan
To address the contentious data sharing across hospitals, this study adopted a novel approach, federated learning (FL), to establish an aggregate model for acute kidney injury (AKI) prediction in critically il...
-
Article
TongueMobile: automated tongue segmentation and diagnosis on smartphones
Tongue diagnosis is a useful process in traditional Chinese medicine to assess diseases non-invasively by visually inspecting the tongue and its various properties. In this study, we developed an automated ton...
-
Article
Cloth texture preserving image-based 3D virtual try-on
3D virtual try-on based on a single image can provide an excellent shop** experience for Internet users and has enormous business potential. The existing methods of processing the clothed 3D human body gener...
-
Article
Open AccessAI in Human-computer Gaming: Techniques, Challenges and Opportunities
With the breakthrough of AlphaGo, human-computer gaming AI has ushered in a big explosion, attracting more and more researchers all over the world. As a recognized standard for testing artificial intelligence,...
-
Article
Open AccessDevelopment of 5G Cyber-Physical Production System
The cyber-physical production system (CPPS) was developed for the interconnection between operational technology (OT) and information and communication technology (ICT) among the machines and decentralized pro...
-
Article
Open AccessPerformance evaluation of multi-exaflops machines using Equality network topology
In modern computing architectures, graph theory is the soul of the play due to the rising core counts. It is indispensable to keep finding a better way to connect the cores. A novel chordal-ring interconnect t...