![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
1,316 Result(s)
-
Article
Transferable map** shift network for unsupervised domain adaptation using in vibration signal fault diagnosis under variable conditions
Unsupervised domain adaptation as one of the popular techniques of deep transfer learning used to tackle the model performance suffers the domain gap between the source and target data, and it is recently deve...
-
Article
Retraction Note: Adoption of human metabolic processes as Data Quality Based Models
-
Article
Unconditional energy stability and maximum principle preserving scheme for the Allen-Cahn equation
In this paper, we propose a novel fully implicit numerical scheme that satisfies both nonlinear energy stability and maximum principle for the space fractional Allen-Cahn equation. Especially, the fully implic...
-
Article
Event-Driven Heterogeneous Network for Video Deraining
Restoring clear frames from rainy videos poses a significant challenge due to the swift motion of rain streaks. Traditional frame-based visual sensors, which record dense scene content synchronously, struggle ...
-
Article
Open AccessFew-shot anime pose transfer
In this paper, we propose a few-shot method for pose transfer of anime characters—given a source image of an anime character and a target pose, we transfer the pose of the target to the source character. Despi...
-
Article
Deep supervised fused similarity hashing for cross-modal retrieval
The need for cross-modal retrieval increases significantly with the rapid growth of multimedia information on the Internet. However, most of existing cross-modal retrieval methods neglect the correlation betwe...
-
Article
Are the confidence scores of reviewers consistent with the review content? Evidence from top conference proceedings in AI
Peer review is a critical process used in academia to assess the quality and validity of research articles. Top-tier conferences in the field of artificial intelligence (e.g. ICLR and ACL et al.) require revie...
-
Article
A wide load-range OTA using a digitally assisted compensating technique
-
Article
GANCDE: Neural networks based on graphs and attention neural control differential equations for human activity recognition
The success of human activity recognition relies on the extraction of effective features, which can provide richer information for subsequent downstream tasks after embedding spatial fusion. However, due to th...
-
Article
Towards Generalized UAV Object Detection: A Novel Perspective from Frequency Domain Disentanglement
When deploying unmanned aerial vehicle (UAV) object detection networks to complex, real-world scenes, generalization ability is often reduced due to domain shift. While most existing domain-generalized object ...
-
Article
SS-Pro: a simplified Siamese contrastive learning approach for protein surface representation
In this paper, we introduce a simple Siamese contrastive self-supervised learning framework for protein surface representation learning. The encoder in this framework can be adapted to various point cloud feat...
-
Article
PEDI-GAN: power equipment data imputation based on generative adversarial networks with auxiliary encoder
Smart grids commonly rely on analyzing sensor data to monitor power equipment. However, these sensor data can suffer varying levels of loss or corruption due to complex interferences, leading to a pressing nee...
-
Article
IATN: illumination-aware two-stage network for low-light image enhancement
Images captured in low brightness environment have issues with low contrast and noise due to uneven lighting, which can seriously affect the accuracy of high-level computer vision tasks. Currently, most enhanc...
-
Article
Influence maximization in mobile social networks based on RWP-CELF
Influence maximization (IM) problem for messages propagation is an important topic in mobile social networks. The success of the spreading process depends on the mechanism for selection of the influential user...
-
Article
Extracting problem and method sentence from scientific papers: a context-enhanced transformer using formulaic expression desensitization
Billions of scientific papers lead to the need to identify essential parts from the massive text. Scientific research is an activity from putting forward problems to using methods. To learn the main idea from ...
-
Article
A smart contract-driven access control scheme with integrity checking for electronic health records
The application of healthcare systems has led to an explosive growth in personal electronic health records (EHRs). These EHRs are generated from different healthcare institutions and stored in cloud data cente...
-
Article
Next generation multiple access for IMT towards 2030 and beyond
NOMA assisted NGMA has been envisioned in the recently published IMT-2030 Framework. This perspective has outlined three important features of NOMA assisted NGMA, namely multi-domain utilization, multi-mode co...
-
Article
HRNN: Hypergraph Recurrent Neural Network for Network Intrusion Detection
In intrusion detection systems, deep learning has demonstrated its capability to effectively mine flow representations, significantly enhancing the ability to detect anomalies. However, current approaches stil...
-
Article
Align vision-language semantics by multi-task learning for multi-modal summarization
Most current multi-modal summarization methods follow a cascaded manner, where an off-the-shelf object detector is first used to extract visual features. After that, these visual features are fused with langua...
-
Article
Emotional voice conversion using DBiLSTM-NN with MFCC and LogF0 features
Emotional voice conversion(EVC) aims to convert the speaker’s voice from one emotion state to another without changing the speaker and the voice content. In the early emotional voice conversion task, it is dif...