![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
235 Result(s)
-
Article
Open AccessAnalysis of Emotional Tendency of Tourism Consumers Based on LSTM and Fuzzy Control Algorithm
Learning the emotional tendency of travelers improves their interests and provide optimal traveling recommendations. This, however, requires large volumes of data such as travel plans, visit sites, personal in...
-
Article
Open AccessDynamic Color Regulation of the Lycaenid Butterfly Wing Scales
Butterfly coloration originates from the finely structured scales grown on the underlying wing cuticle. Most researchers who study butterfly scales are focused on the static optic properties of cover scales, w...
-
Article
Open AccessCross-modal learning using privileged information for long-tailed image classification
The prevalence of long-tailed distributions in real-world data often results in classification models favoring the dominant classes, neglecting the less frequent ones. Current approaches address the issues in ...
-
Article
Open AccessDynamic YOLO for small underwater object detection
The practical application of object detection inevitably encounters challenges posed by small objects. In underwater object detection, a crucial method for marine exploration, the presence of small objects in ...
-
Article
Retraction Note: Quality assessment for virtual reality technology based on real scene
-
Article
Open AccessTemporally Consistent Enhancement of Low-Light Videos via Spatial-Temporal Compatible Learning
Temporal inconsistency is the annoying artifact that has been commonly introduced in low-light video enhancement, but current methods tend to overlook the significance of utilizing both data-centric clues and ...
-
Article
Open AccessMCAD: Multi-classification anomaly detection with relational knowledge distillation
With the wide application of deep learning in anomaly detection (AD), industrial vision AD has achieved remarkable success. However, current AD usually focuses on anomaly localization and rarely investigates a...
-
Article
Open AccessReinforcement learning tutor better supported lower performers in a math task
Resource limitations make it challenging to provide all students with one of the most effective educational interventions: personalized instruction. Reinforcement learning could be a pivotal tool to decrease t...
-
Article
Open AccessEfficient image restoration with style-guided context cluster and interaction
Recently, convolutional neural networks (CNNs) and vision transformers (ViTs) have emerged as powerful tools for image restoration (IR). Nonetheless, they encountered some limitations due to their characterist...
-
Article
Open AccessIDG-SemiAD: An Immune Detector Generation-Based Collaborative Learning Scheme for Semi-supervised Anomaly Detection in Industrial Cyber-physical Systems
Anomaly detection is a critical line of defense to ensure the network security of industrial cyber-physical systems. However, a significant issue in the anomaly detection is the insufficient labels of anomaly ...
-
Article
Open AccessLearning to compose diversified prompts for image emotion classification
Image emotion classification (IEC) aims to extract the abstract emotions evoked in images. Recently, language-supervised methods such as contrastive language-image pretraining (CLIP) have demonstrated superior...
-
Article
Open AccessForestry Ecosystem Protection from the Perspective of Eco-civilization Based on Self-Attention Using Hierarchical Dilated Convolutional Neural Network
Ensuring the sustainable protection of forestry ecosystems faces numerous challenges. One significant hurdle is the constant threat of illegal logging and deforestation. Despite various regulations and conserv...
-
Article
A Survey on Differential Privacy for Medical Data Analysis
Machine learning methods promote the sustainable development of wise information technology of medicine (WITMED), and a variety of medical data brings high value and convenience to medical analysis. However, t...
-
Article
Open AccessRetraction Note: Network Attribute Analysis and Competitiveness Evaluation of Auto Parts Industry Cluster for e-Commerce Platform
-
Article
Open AccessRejuvenating classical brain electrophysiology source localization methods with spatial graph Fourier filters for source extents estimation
EEG/MEG source imaging (ESI) aims to find the underlying brain sources to explain the observed EEG or MEG measurement. Multiple classical approaches have been proposed to solve the ESI problem based on differe...
-
Article
Open AccessWhere To Go at the Next Timestamp
The next Point of Interest (POI) recommendation is the core technology of smart city. Current state-of-the-art models attempt to improve the accuracy of the next POI recommendation by incorporating temporal and s...
-
Article
Open AccessDeepMCGCN: Multi-channel Deep Graph Neural Networks
Graph neural networks (GNNs) have shown powerful capabilities in modeling and representing graph structural data across various graph learning tasks as an emerging deep learning approach. However, most existin...
-
Article
Open AccessFew-Shot Semantic Segmentation via Mask Aggregation
Few-shot semantic segmentation aims to recognize novel classes with only very few labelled data. This challenging task requires mining of the correlation between the query image and the support images. Previou...
-
Article
Open AccessShapley value: from cooperative game to explainable artificial intelligence
With the tremendous success of machine learning (ML), concerns about their black-box nature have grown. The issue of interpretability affects trust in ML systems and raises ethical concerns such as algorithmic...
-
Article
Open AccessA Robust Sequential Recommendation Model Based on Multiple Feedback Behavior Denoising and Trusted Neighbors
At present, most of the personalized sequential recommendations utilize users’ implicit positive feedback (such as clicks) to predict user behavior, ignoring the impact of implicit negative feedback and explic...