6,649 Result(s)
-
Article
Retraction Note: Does the increase of labor protection intensity promote regional economic growth? Evidence from China
-
Article
The impact of supply chain digitalization on supply chain performance: a moderated mediation model
Despite extensive attention that researchers and practitioners have paid to supply chain digitalization, our understanding of how to leverage supply chain digitalization for superior supply chain performance r...
-
Article
Leveraging large language model to generate a novel metaheuristic algorithm with CRISPE framework
In this paper, we introduce the large language model (LLM) ChatGPT-3.5 to automatically and intelligently generate a new metaheuristic algorithm (MA) according to the standard prompt engineering framework CRIS...
-
Article
Context-aware adaptive network for UDA semantic segmentation
Unsupervised Domain Adaptation (UDA) plays a pivotal role in enhancing the segmentation performance of models in the target domain by mitigating the domain shift between the source and target domains. However,...
-
Article
Blind quality evaluator for multi-exposure fusion image via joint sparse features and complex-wavelet statistical characteristics
Multi-Exposure Fusion (MEF) technique aims to fuse multiple images taken from the same scene at different exposure levels into an image with more details. Although more and more MEF algorithms have been develo...
-
Article
Quality evaluation methods of handwritten Chinese characters: a comprehensive survey
Quality evaluation of handwritten Chinese characters aims to automatically quantify and assess handwritten Chinese characters through computer vision and machine learning technology. It is a topic of great con...
-
Article
An oversampling method for imbalanced dataset based on sparsity and boundary degree
In order to improve the classification accuracy of minority samples in imbalanced dataset, we proposed a novel oversampling method, HRSB-SMOTE (HDBSCAN-Ratio-Sparsity-Boundary-SMOTE), which is based on HDBSCAN...
-
Article
A feasibility study on scanning imaging of tip-enhanced Raman spectroscopy using a spiral plasmonic lens
In the previous work, to achieve the ultra-compact configuration and the lab-on-a-chip technique of tip-enhanced Raman spectroscopy (TERS), a novel TERS based on symmetry breaking plasmonic lens (PL) excitatio...
-
Article
Saliency guided progressive fusion of infrared and polarization for military images with complex backgrounds \(^{\star }\)
Thermal targets stand out on infrared light images but infrared imaging is vulnerable to thermal noise, thus the edges of targets in infrared images are often blurred. On the other hand, visible polarized imag...
-
Article
Packet header-based reweight-long short term memory (Rew-LSTM) method for encrypted network traffic classification
With the development of Internet technology, cyberspace security has become a research hotspot. Network traffic classification is closely related to cyberspace security. In this paper, the problem of classific...
-
Article
Conjunctive searchable encryption with efficient authorization for group sharing
Multi-user searchable encryption (MUSE) schemes provide solutions for searching over ciphertexts shared by different users, but the significant overhead of communication and computation leads to high latency i...
-
Article
Lightweight improved residual network for efficient inverse tone map**
The display devices like HDR10 televisions are increasingly prevalent in our daily life for visualizing high dynamic range (HDR) images. But the majority of media images on the internet remain in 8-bit standar...
-
Article
Enabling privacy-preserving data validation from multi-writer encryption with aggregated keywords search
Public key encryption with keyword search (PEKS) has long been a promising way for secure data validation, which tells one whether the coming entry contains the designated keyword without decryption. Despite t...
-
Article
Improving completeness and consistency of co-reference annotation standard
As the processing power of mobile terminals increases, wireless network applications such as voice assistants can put more context-sensitive tasks on the mobile terminals, thus reducing the wireless network ba...
-
Article
Multi-objective resource allocation in mobile edge computing using PAES for Internet of Things
In recent years, mobile edge computing (MEC), as a powerful computing paradigm, provides sufficient computing resources for Internet of Things (IoT). Generally, the deployment of MEC servers closer to mobile u...
-
Article
Task allocation for unmanned aerial vehicles in mobile crowdsensing
Mobile crowdsensing is a new paradigm for intelligent mobile devices to collect and share various types of sensing data in the urban environment. The recent rapid development of unmanned aerial vehicle (UAV) t...
-
Article
A resource allocation scheme based on predatory search algorithm for ultra-dense D2D communications
In this paper, resource allocation problem for ultra-dense D2D communications is studied. In ultra-dense scenarios, the number of D2D user equipments is far bigger than the number of cellular user equipments. ...
-
Article
Differentially private federated learning with non-IID data
In Differentially Private Federated Learning (DPFL), gradient clip** and random noise addition disproportionately affect statistically heterogeneous data. As a consequence, DPFL has a disparate impact: the a...
-
Article
Dual-attention-based semantic-aware self-supervised monocular depth estimation
Based on the assumption of photometric consistency, self-supervised monocular depth estimation has been widely studied due to the advantage of avoiding costly annotations. However, it is sensitive to noise, oc...
-
Article
Crowded pedestrian detection with optimal bounding box relocation
In crowded pedestrian detection, occlusion situations are common challenges that seriously impact detection performance. These occlusions are usually classified into pedestrian-to-pedestrian occlusions and obj...