![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter
A VLSI Pipelined Neuroemulator
Applications and interest on artificial neural networks (ANN) have been increasing in recent years. Applications include pattern matching, associative memory, image processing and word recognition (Simpson 199...
-
Article
Efficient Maintenance of Continuous Queries for Trajectories
We address the problem of optimizing the maintenance of continuous queries in Moving Objects Databases, when a set of pending continuous queries need to be reevaluated as a result of bulk updates to the trajec...
-
Article
A study on speaker identification based on weighted LS-SVM
As one of a practical method, least squares support vector machine (LS-SVM) is usable for nonlinear separable problem as speaker identification. However, single LS-SVM can only do such classifying as binary cl...
-
Chapter and Conference Paper
Text-Independent Voice Conversion Based on Kernel Eigenvoice
Almost of the current spectral conversion methods required parallel corpus containing the same utterances from source and target speakers, which was often inconvenient and sometimes hard to fulfill. This paper...
-
Chapter and Conference Paper
Palliating Visual Artifacts through Audio Rendering
In this paper, we present a pipeline for combining graphical rendering through an impostor-based level of detail (LOD) technique with audio rendering of an environment sound at different LODs. Two experiments ...
-
Chapter and Conference Paper
Research of Emergency Logistics Distribution Routing Optimization Based on Improved Ant Colony Algorithm
Emergency relief has characteristics of complexity, urgency, sustainability, technicality, and so on. In this paper a mathematical model to seek the shortest delivery time as the ultimate goal is established b...
-
Article
Experimental comparison of representation methods and distance measures for time series data
The previous decade has brought a remarkable increase of the interest in applications that deal with querying and mining of time series data. Many of the research efforts in this context have focused on introd...
-
Article
Routing, modulation level and spectrum allocation with dynamic modulation level conversion in elastic optical networks
Elastic optical network is introduced as a promising technology to provide multi-bitrate-friendly data transmission in the optical layer. Elastic optical networks are based on flexible modulation format conver...
-
Chapter and Conference Paper
The Research of Analysis Addiction of Online Game
The convenience and popularity of nowadays internet has more influenced as we know and the internet is actually essential on the daily life of individuals. Thus, internet addiction issues become topics as well...
-
Chapter and Conference Paper
Local Zernike Moment and Multiscale Patch-Based LPQ for Face Recognition
In this paper, a novel feature extraction method combining Zernike moment with multiscale patch-based local phase quantization is introduced, which can deal with the problem of uncontrolled image conditions in...
-
Chapter and Conference Paper
Low-Light Image Enhancement Based on Constrained Norm Estimation
Low-light images often suffer from poor quality and low visibility. Improving the quality of low-light image is becoming a highly desired subject in both computational photography and computer vision applicati...
-
Article
Pixel-wise partial volume effects correction on arterial spin labeling magnetic resonance images
Arterial spin labeling is a recently emerging imaging modality in functional magnetic resonance, and it is widely acknowledged to be effective in directly measuring the cerebral blood flow of patients while be...
-
Article
Image-based dementia disease diagnosis via deep low-resource pair-wise learning
Medical Images data is widely acknowledged for its large volumes, high complexities and limited labels information, which makes learning-based tasks challenging to obtain promising performance based on such im...
-
Article
Multiple color image encryption and authentication based on phase retrieval and partial decryption in quaternion gyrator domain
In this paper, a multiple color image encryption and authentication scheme by using phase retrieval in quaternion gyrator domain and partial decryption is introduced. The quaternion representation is firstly e...
-
Article
Single-target localization in video sequences using offline deep-ranked metric learning and online learned models updating
Foreground targets localization in video sequences receives much popularity in computer vision during the past few years, and its studies are highly related toward machine learning techniques. Driven by the re...
-
Chapter and Conference Paper
Novel Bi-directional Images Synthesis Based on WGAN-GP with GMM-Based Noise Generation
A novel WGAN-GP-based model is proposed in this study to fulfill bi-directional synthesis of medical images for the first time. GMM-based noise generated from the Glow model is newly incorporated into the WGAN...
-
Chapter and Conference Paper
Development of a Multi-objective Optimized Planning Method for Microwave Liver Tumor Ablation
Microwave ablation (MWA) is an effective minimal invasive therapy of hepatic cancer. Preoperative treatment planning is key to successful ablation, which aims to find a plan with the minimum number of electrod...
-
Chapter and Conference Paper
Arterial Spin Labeling Images Synthesis via Locally-Constrained WGAN-GP Ensemble
Arterial spin labeling (ASL) images begin to receive much popularity in dementia diseases diagnosis recently, yet it is still not commonly seen in well-established image datasets for investigating dementia di...
-
Chapter and Conference Paper
MsFcNET: Multi-scale Feature-Crossing Attention Network for Multi-field Sparse Data
Feature engineering usually needs to excavate dense-and-implicit cross features from multi-filed sparse data. Recently, many state-of-the-art models have been proposed to achieve low-order and high-order feat...
-
Article
Color image encryption based on discrete trinion Fourier transform and random-multiresolution singular value decomposition
With more and more color images are spread and shared in the untrusted cloud server remotely over the open Internet, some private or confidential information may be contained, it is necessary to develop crypto...