Skip to main content

previous disabled Page of 333
and
  1. Article

    Retraction Note: Does the increase of labor protection intensity promote regional economic growth? Evidence from China

    **npeng Xu, **aopeng Fu, Fuxia Gao, Yaqian Li, Yiming Xu in Electronic Commerce Research (2024)

  2. No Access

    Article

    The impact of supply chain digitalization on supply chain performance: a moderated mediation model

    Despite extensive attention that researchers and practitioners have paid to supply chain digitalization, our understanding of how to leverage supply chain digitalization for superior supply chain performance r...

    Shaobo Wei, Hua Liu, Wanying Xu, **ayu Chen in Information Technology and Management (2024)

  3. No Access

    Article

    Leveraging large language model to generate a novel metaheuristic algorithm with CRISPE framework

    In this paper, we introduce the large language model (LLM) ChatGPT-3.5 to automatically and intelligently generate a new metaheuristic algorithm (MA) according to the standard prompt engineering framework CRIS...

    Rui Zhong, Yuefeng Xu, Chao Zhang, Jun Yu in Cluster Computing (2024)

  4. No Access

    Article

    Context-aware adaptive network for UDA semantic segmentation

    Unsupervised Domain Adaptation (UDA) plays a pivotal role in enhancing the segmentation performance of models in the target domain by mitigating the domain shift between the source and target domains. However,...

    Yu Yuan, **long Shi, **n Shu, Qiang Qian, Yunna Song, Zhen Ou in Multimedia Systems (2024)

  5. No Access

    Article

    Blind quality evaluator for multi-exposure fusion image via joint sparse features and complex-wavelet statistical characteristics

    Multi-Exposure Fusion (MEF) technique aims to fuse multiple images taken from the same scene at different exposure levels into an image with more details. Although more and more MEF algorithms have been develo...

    Benquan Yang, Yueli Cui, Lihong Liu, Guang Chen, Jiamin Xu in Multimedia Systems (2024)

  6. No Access

    Article

    Quality evaluation methods of handwritten Chinese characters: a comprehensive survey

    Quality evaluation of handwritten Chinese characters aims to automatically quantify and assess handwritten Chinese characters through computer vision and machine learning technology. It is a topic of great con...

    Weiran Chen, Jiaqi Su, Weitao Song, Jialiang Xu, Guiqian Zhu, Ying Li in Multimedia Systems (2024)

  7. No Access

    Article

    An oversampling method for imbalanced dataset based on sparsity and boundary degree

    In order to improve the classification accuracy of minority samples in imbalanced dataset, we proposed a novel oversampling method, HRSB-SMOTE (HDBSCAN-Ratio-Sparsity-Boundary-SMOTE), which is based on HDBSCAN...

    Zhen Xue, Yan Gao, Liangliang Zhang, Xu Yang in Multimedia Tools and Applications (2024)

  8. No Access

    Article

    A feasibility study on scanning imaging of tip-enhanced Raman spectroscopy using a spiral plasmonic lens

    In the previous work, to achieve the ultra-compact configuration and the lab-on-a-chip technique of tip-enhanced Raman spectroscopy (TERS), a novel TERS based on symmetry breaking plasmonic lens (PL) excitatio...

    Kai Gu, Hanwen Zhao, Ming Sun, Bin Xu, Bin Ni in Optical and Quantum Electronics (2024)

  9. No Access

    Article

    Saliency guided progressive fusion of infrared and polarization for military images with complex backgrounds \(^{\star }\)

    Thermal targets stand out on infrared light images but infrared imaging is vulnerable to thermal noise, thus the edges of targets in infrared images are often blurred. On the other hand, visible polarized imag...

    Yukai Lao, Huan Zhang, Xu Zhang, Jiazhen Dou in Multimedia Tools and Applications (2024)

  10. No Access

    Article

    Packet header-based reweight-long short term memory (Rew-LSTM) method for encrypted network traffic classification

    With the development of Internet technology, cyberspace security has become a research hotspot. Network traffic classification is closely related to cyberspace security. In this paper, the problem of classific...

    Jiangang Hou, **n Li, Hongji Xu, Chun Wang, Lizhen Cui, Zhi Liu, Changzhen Hu in Computing (2024)

  11. No Access

    Article

    Conjunctive searchable encryption with efficient authorization for group sharing

    Multi-user searchable encryption (MUSE) schemes provide solutions for searching over ciphertexts shared by different users, but the significant overhead of communication and computation leads to high latency i...

    Lin Mei, Chungen Xu, Lei Xu in Wireless Networks (2024)

  12. No Access

    Article

    Lightweight improved residual network for efficient inverse tone map**

    The display devices like HDR10 televisions are increasingly prevalent in our daily life for visualizing high dynamic range (HDR) images. But the majority of media images on the internet remain in 8-bit standar...

    Liqi Xue, Tianyi Xu, Yongbao Song, Yan Liu, Lei Zhang in Multimedia Tools and Applications (2024)

  13. No Access

    Article

    Enabling privacy-preserving data validation from multi-writer encryption with aggregated keywords search

    Public key encryption with keyword search (PEKS) has long been a promising way for secure data validation, which tells one whether the coming entry contains the designated keyword without decryption. Despite t...

    Lei Xu, Chengzhi Xu, Jianghua Liu, Bennian Dou, **aocan ** in Wireless Networks (2024)

  14. No Access

    Article

    Improving completeness and consistency of co-reference annotation standard

    As the processing power of mobile terminals increases, wireless network applications such as voice assistants can put more context-sensitive tasks on the mobile terminals, thus reducing the wireless network ba...

    Yang Xu, Fadi Farha, Yueliang Wan, Jiabo Xu, Hong Liu, Huansheng Ning in Wireless Networks (2024)

  15. No Access

    Article

    Multi-objective resource allocation in mobile edge computing using PAES for Internet of Things

    In recent years, mobile edge computing (MEC), as a powerful computing paradigm, provides sufficient computing resources for Internet of Things (IoT). Generally, the deployment of MEC servers closer to mobile u...

    Qi Liu, Ruichao Mo, **aolong Xu, Xu Ma in Wireless Networks (2024)

  16. No Access

    Article

    Task allocation for unmanned aerial vehicles in mobile crowdsensing

    Mobile crowdsensing is a new paradigm for intelligent mobile devices to collect and share various types of sensing data in the urban environment. The recent rapid development of unmanned aerial vehicle (UAV) t...

    Sunyue Xu, **g Zhang, Shunmei Meng, Jian Xu in Wireless Networks (2024)

  17. No Access

    Article

    A resource allocation scheme based on predatory search algorithm for ultra-dense D2D communications

    In this paper, resource allocation problem for ultra-dense D2D communications is studied. In ultra-dense scenarios, the number of D2D user equipments is far bigger than the number of cellular user equipments. ...

    Xujie Li, Ying Sun, Lingjie Zhou, Yanli Xu, Siyuan Zhou in Wireless Networks (2024)

  18. No Access

    Article

    Differentially private federated learning with non-IID data

    In Differentially Private Federated Learning (DPFL), gradient clip** and random noise addition disproportionately affect statistically heterogeneous data. As a consequence, DPFL has a disparate impact: the a...

    Shuyan Cheng, Peng Li, Ruchuan Wang, He Xu in Computing (2024)

  19. No Access

    Article

    Dual-attention-based semantic-aware self-supervised monocular depth estimation

    Based on the assumption of photometric consistency, self-supervised monocular depth estimation has been widely studied due to the advantage of avoiding costly annotations. However, it is sensitive to noise, oc...

    **ze Xu, Feng Ye, Yizong Lai in Multimedia Tools and Applications (2024)

  20. No Access

    Article

    Crowded pedestrian detection with optimal bounding box relocation

    In crowded pedestrian detection, occlusion situations are common challenges that seriously impact detection performance. These occlusions are usually classified into pedestrian-to-pedestrian occlusions and obj...

    Ren Han, Meiqi Xu, Songwen Pei in Multimedia Tools and Applications (2024)

previous disabled Page of 333