-
Article
An improved weighted mean of vectors optimizer for multi-threshold image segmentation: case study of breast cancer
Women are commonly diagnosed with breast cancer (BC), and early detection can significantly increase the cure rate. This study suggested a multi-threshold image segmentation (MTIS) technique for dividing BC hi...
-
Article
Enhancing network security with information-guided-enhanced Runge Kutta feature selection for intrusion detection
Intrusion detection system (IDS) classify network traffic as either threatening or normal based on data features, aiming to identify malicious activities attempting to compromise computer systems. However, the...
-
Article
Face forgery detection by progressively enhancing spatial and frequency-aware features
Due to the security issues caused by face synthesis technology, face forgery detection has received considerable attention. Therefore, there is an increasing necessity to develop effective and generalized face...
-
Article
Irregular object measurement method based on improved adaptive slicing method
Surface shape feature is a very important index for monitoring objects. However, in the existing slicing methods, the volume measurement accuracy of point cloud is easy to be low due to the problems of indisti...
-
Article
Performance optimization of hunger games search for multi-threshold COVID-19 image segmentation
COVID-19 X-ray images are a vital approach for diagnosing whether a patient has an infection. By using multi-threshold image segmentation (MIS) technology to segment the target area of the COVID-19 X-ray image...
-
Article
Fusion of kinematic and physiological sensors for hand gesture recognition
The uncertainty of hand gestures, the variability of gestures across subjects, and the high cost of collecting a large amount of annotated data lead to a great challenge to the robust recognition of gestures, ...
-
Chapter and Conference Paper
RCPM_RLM: A Regional Co-location Pattern Mining Method Based on Representation Learning Model
Due to the heterogeneity of spatial data, spatial co-location patterns are not all global prevalent patterns. There are regional prevalent patterns that can only appear in specific local areas. Regional co-loc...
-
Chapter and Conference Paper
ECCRG: A Emotion- and Content-Controllable Response Generation Model
Most methods of emotional dialogue generation focus on how to make the generated replies express the set emotion categories, while ignoring the control over the semantic content of the replies. To this end, in...
-
Chapter and Conference Paper
Multi-trends Enhanced Dynamic Micro-video Recommendation
The explosively generated micro-videos on content sharing platforms call for recommender systems to permit personalized micro-video discovery with ease. Recent advances in micro-video recommendation have achie...
-
Chapter and Conference Paper
A Practical Multi-candidate Voting Protocol on Quantum Blockchain Adapted for Various Tally Principles
Quantum secure voting aims to provide various approaches to performing electronic voting via quantum technologies, like entangled particles or quantum key distribution, so as to guarantee the security of the v...
-
Chapter and Conference Paper
Enhanced Multipath QUIC Protocol with Lower Path Delay and Packet Loss Rate
Consider the high dynamics of traffic loading and resource provision on network hosts that forward data flows along a particular path between two endpoints. The Quick UDP Internet Connect (QUIC) protocol perfo...
-
Article
3D symmetry detection by a single image and geometric transformation
Three dimensional symmetry plane detection is a hot research topic in the field of computer vision. When detecting the symmetry plane, the integrity of the three-dimensional point cloud is often ignored, and i...
-
Article
Application of Visual Communication in Image Enhancement and Optimization of Human–Computer Interface
The visual plane of human–computer interaction has a great influence on the perception of color images. The author proposes the use of visual communication in the development and optimization of human–computer...
-
Chapter and Conference Paper
Smart Contract Vulnerability Detection Model Based on Siamese Network
Blockchain is experiencing the transition from the first generation to the second generation, and smart contract is the symbol of the second generation blockchain. Under the background of the explosive growth ...
-
Chapter and Conference Paper
Spatial Temporal Graph Convolutional Network Model for Rumor Source Detection Under Multiple Observations in Social Networks
Rumor source detection has long been an important but difficult problem. Most existing methods only rely on the limit observation of a single batch of single snapshot during the propagation process in the spat...
-
Chapter and Conference Paper
An Efficient Detection Model for Smart Contract Reentrancy Vulnerabilities
We propose a novel smart contract re-entry vulnerability detection model based on BiGAS. The model combines a BiGRU neural network that introduces an attention mechanism with an SVM. We start from the data fea...
-
Chapter and Conference Paper
Biological Fermentation Process Control on Account of Swarm Intelligence Algorithm
Biological fermentation industry is one of the modern industrial units in industrial economy. This technology has been applied in many aspects such as medical equipment and food on a large scale, and has been ...
-
Chapter and Conference Paper
Multi-angle Identification of Small Target Faults in Transmission Lines Based on Improved YOLOX Algorithm
In the grid patrol work, there are some fault types with small targets in the line that needs to be detected. For the problem of partial feature loss when the target is small in UAV image recognition, CutMix i...
-
Chapter and Conference Paper
Android Mobile Terminal Security Assessment Based on Analytical Hierarchy Process (AHP)
Mobile terminals especially smartphones are changing people’s work and life style. For example, mobile payments are experiencing rapid growth as consumers use mobile terminals as part of modern dynamic lifesty...
-
Chapter and Conference Paper
A Correlational Strategy for the Prediction of High-Dimensional Stock Data by Neural Networks and Technical Indicators
Stock price prediction generates interesting outputs for investors. In recent years, stock technical indicators (STI) have played an important role in stock price prediction. However, the current performance o...