![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
BDNet: a method based on forward and backward convolutional networks for action recognition in videos
Human action recognition analyzes the behavior in a scene according to the spatiotemporal features carried in image sequences. Existing works suffers from ineffective spatial–temporal feature learning. For sho...
-
Chapter
ChatGPT Implementation in the Metaverse: Towards Another Level of Immersiveness in Education
Novel artificial intelligence (AI) technologies have the capability to reinvent education and enhance the immersive experience of learners. The education industry is continually embracing advanced AI tools to ...
-
Article
Bifurcation Analysis of a Fractional-Order Bidirectional Associative Memory Neural Network with Multiple Delays
The bidirectional associative memory (BAM) neural network has the capability to store hetero-associative pattern pairs, which has high requirements for stability. This paper inquires into Hopf bifurcation of f...
-
Article
SVF-Net: spatial and visual feature enhancement network for brain structure segmentation
Brain structure segmentation in Magnetic Resonance Images (MRI) is essential to the assessment and treatment of medical disorders, especially neuropsychiatric diseases. The key to semantic segmentation is to u...
-
Article
Disturbance-observer-based adaptive dynamic surface control for nonlinear systems with input dead-zone and delay using neural networks
Disturbance-observer-based adaptive neural control approach is proposed for nonlinear systems. Considering the effect caused by long input delay and dead-zone, a novel auxiliary system has been introduced to d...
-
Article
MNSSp3: Medical big data privacy protection platform based on Internet of things
How to transform the growing medical big data into medical knowledge is a global topic. However, medical data contains a large amount of personal privacy information, especially electronic medical records, gen...
-
Article
A high-efficiency blind watermarking algorithm for double color image using Walsh Hadamard transform
This paper presents an efficient blind watermarking algorithm for double color images using Walsh Hadamard transform (WHT). In this algorithm, the energy gathering function of WHT and the strong correlation be...
-
Chapter and Conference Paper
Activities-Centered Participatory Community Design: Shoupa Community Service Station Rooftop Renovation Plan
This paper first provides an overview of the urban regeneration process of Bei**g since the1970s, with a focus of the shift from material promotion to historical cultural preservation and sustainability promo...
-
Chapter and Conference Paper
Design and Application of Endangered Animal Monitoring System Based on Mobile APP
In view of the wide distribution area of Yangtze finless porpoise, the small number of existing population and the insufficient number of professional monitors, a mobile app-based finless porpoise information ...
-
Chapter and Conference Paper
TTS-GAN: A Transformer-Based Time-Series Generative Adversarial Network
Signal measurements appearing in the form of time series are one of the most common types of data used in medical machine learning applications. However, such datasets are often small, making the training of d...
-
Chapter and Conference Paper
Mixup Without Hesitation
Mixup linearly interpolates pairs of examples to form new samples, which has been shown to be effective in image classification tasks. However, there are two drawbacks in mixup: one is that more training epoch...
-
Chapter and Conference Paper
Efficient Cluster Head Selection for Multimode Sensors in Wireless Sensor Network
It needs simple and effective network organization to improve the network lifetime in building practical wireless sensor networks (WSNs). As we know, clustering is a classical network model and has been widel...
-
Chapter and Conference Paper
A Novel Codebook Design Scheme for Sparse Code Multiple Access
The sparse code multiple access (SCMA) technology proposed by Huawei has become a very competitive one of many NOMA solutions due to its high overload capability. SCMA maps the user’s binary bit data input by ...
-
Chapter and Conference Paper
Satellite Navigation Software Receiver Design
The establishment of the Global Navigation Satellite System can provide users with precise navigation information, including speed, three-dimensional position and precise time. In this paper, the signal struct...
-
Chapter and Conference Paper
Phase Partition Based Virtual Metrology for Material Removal Rate Prediction in Chemical Mechanical Planarization Process
In semiconductor manufacturing, the average Material Removal Rate (MRR) in Chemical Mechanical Planarization (CMP) process is important but difficult to measure. A useful method to predict MRR is to build a da...
-
Chapter and Conference Paper
End-to-End Anomaly Score Estimation for Contaminated Data via Adversarial Representation Learning
In recent years, deep learning has been widely used in the field of anomaly detection. Existing deep anomaly detection methods mostly focus on extracting feature representations that represent the essence of t...
-
Chapter and Conference Paper
Low Contrast Chinese Rubbing Image Segmentation Based on Gradient Filtering
For more than 1,500 years, rubbing is one of the most perhaps the oldest of the techniques that have been used in printmaking. Despite the fact that image binarization has been a widely studied in the past dec...
-
Chapter and Conference Paper
NAS-SCAM: Neural Architecture Search-Based Spatial and Channel Joint Attention Module for Nuclei Semantic Segmentation and Classification
The segmentation and classification of different types of nuclei plays an important role in discriminating and diagnosing of the initiation, development, invasion, metastasis and therapeutic response of tumors...
-
Article
Bidirectional LSTM Malicious webpages detection algorithm based on convolutional neural network and independent recurrent neural network
This paper proposes a bidirectional LSTM algorithm (CBIR) based on convolutional neural network and independent recurrent neural network. The algorithm extracts the “texture fingerprint” feature used to expres...
-
Chapter and Conference Paper
Automated Segmentation of Skin Lesion Based on Pyramid Attention Network
Automatic segmentation of skin lesion in dermatoscope images is important for clinic diagnosis and assessment of melanoma. However, due to the large variations of scale, shape and appearance of the lesion area...