Skip to main content

previous disabled Page of 5
and
  1. No Access

    Article

    An improved weighted mean of vectors optimizer for multi-threshold image segmentation: case study of breast cancer

    Women are commonly diagnosed with breast cancer (BC), and early detection can significantly increase the cure rate. This study suggested a multi-threshold image segmentation (MTIS) technique for dividing BC hi...

    Shuhui Hao, Changcheng Huang, Ali Asghar Heidari, Huiling Chen in Cluster Computing (2024)

  2. No Access

    Article

    Enhancing network security with information-guided-enhanced Runge Kutta feature selection for intrusion detection

    Intrusion detection system (IDS) classify network traffic as either threatening or normal based on data features, aiming to identify malicious activities attempting to compromise computer systems. However, the...

    Li Yuan, **ongjun Tian, Jiacheng Yuan, **gyu zhang, **ao**g Dai in Cluster Computing (2024)

  3. No Access

    Article

    Face forgery detection by progressively enhancing spatial and frequency-aware features

    Due to the security issues caused by face synthesis technology, face forgery detection has received considerable attention. Therefore, there is an increasing necessity to develop effective and generalized face...

    Yongfeng Qi, Shengcong Wen, Hengrui Zhang, Anye Liang, Huili Chen in Multimedia Systems (2024)

  4. No Access

    Article

    Irregular object measurement method based on improved adaptive slicing method

    Surface shape feature is a very important index for monitoring objects. However, in the existing slicing methods, the volume measurement accuracy of point cloud is easy to be low due to the problems of indisti...

    Hui Chen, Hongyan Wu, Ning Yang, He** Huang in Multimedia Tools and Applications (2024)

  5. No Access

    Article

    Performance optimization of hunger games search for multi-threshold COVID-19 image segmentation

    COVID-19 X-ray images are a vital approach for diagnosing whether a patient has an infection. By using multi-threshold image segmentation (MIS) technology to segment the target area of the COVID-19 X-ray image...

    Shuhui Hao, Changcheng Huang, Ali Asghar Heidari in Multimedia Tools and Applications (2024)

  6. No Access

    Article

    Fusion of kinematic and physiological sensors for hand gesture recognition

    The uncertainty of hand gestures, the variability of gestures across subjects, and the high cost of collecting a large amount of annotated data lead to a great challenge to the robust recognition of gestures, ...

    Aiguo Wang, Huancheng Liu, Chundi Zheng, Huihui Chen in Multimedia Tools and Applications (2024)

  7. No Access

    Chapter and Conference Paper

    RCPM_RLM: A Regional Co-location Pattern Mining Method Based on Representation Learning Model

    Due to the heterogeneity of spatial data, spatial co-location patterns are not all global prevalent patterns. There are regional prevalent patterns that can only appear in specific local areas. Regional co-loc...

    Yi Cai, Lizhen Wang, Lihua Zhou, Hui Chen in Spatial Data and Intelligence (2024)

  8. No Access

    Chapter and Conference Paper

    ECCRG: A Emotion- and Content-Controllable Response Generation Model

    Most methods of emotional dialogue generation focus on how to make the generated replies express the set emotion categories, while ignoring the control over the semantic content of the replies. To this end, in...

    Hui Chen, Bo Wang, Ke Yang, Yi Song in Collaborative Computing: Networking, Appli… (2024)

  9. No Access

    Chapter and Conference Paper

    Multi-trends Enhanced Dynamic Micro-video Recommendation

    The explosively generated micro-videos on content sharing platforms call for recommender systems to permit personalized micro-video discovery with ease. Recent advances in micro-video recommendation have achie...

    Yujie Lu, Yingxuan Huang, Shengyu Zhang, Wei Han, Hui Chen in Artificial Intelligence (2024)

  10. No Access

    Chapter and Conference Paper

    A Practical Multi-candidate Voting Protocol on Quantum Blockchain Adapted for Various Tally Principles

    Quantum secure voting aims to provide various approaches to performing electronic voting via quantum technologies, like entangled particles or quantum key distribution, so as to guarantee the security of the v...

    **n Sun, Anran Cui, Hui Chen, **ngchi Su in Information Security and Cryptology (2024)

  11. No Access

    Chapter and Conference Paper

    Enhanced Multipath QUIC Protocol with Lower Path Delay and Packet Loss Rate

    Consider the high dynamics of traffic loading and resource provision on network hosts that forward data flows along a particular path between two endpoints. The Quick UDP Internet Connect (QUIC) protocol perfo...

    Chih-Lin Hu, Fang-Yi Lin, Wu-Min Sung in Frontier Computing on Industrial Applicati… (2024)

  12. No Access

    Article

    3D symmetry detection by a single image and geometric transformation

    Three dimensional symmetry plane detection is a hot research topic in the field of computer vision. When detecting the symmetry plane, the integrity of the three-dimensional point cloud is often ignored, and i...

    Hui Chen, Fangyong Xu in Multimedia Tools and Applications (2023)

  13. No Access

    Article

    Application of Visual Communication in Image Enhancement and Optimization of Human–Computer Interface

    The visual plane of human–computer interaction has a great influence on the perception of color images. The author proposes the use of visual communication in the development and optimization of human–computer...

    Kexiang Ma, Sungwon Lee, Hui Chen in Mobile Networks and Applications (2023)

  14. No Access

    Chapter and Conference Paper

    Smart Contract Vulnerability Detection Model Based on Siamese Network

    Blockchain is experiencing the transition from the first generation to the second generation, and smart contract is the symbol of the second generation blockchain. Under the background of the explosive growth ...

    Weijie Chen, Ran Guo, Guopeng Wang, Lejun Zhang in Smart Computing and Communication (2023)

  15. No Access

    Chapter and Conference Paper

    Spatial Temporal Graph Convolutional Network Model for Rumor Source Detection Under Multiple Observations in Social Networks

    Rumor source detection has long been an important but difficult problem. Most existing methods only rely on the limit observation of a single batch of single snapshot during the propagation process in the spat...

    **hao Wu, Hui Chen, Rong **, Qiufen Ni in Wireless Internet (2023)

  16. No Access

    Chapter and Conference Paper

    An Efficient Detection Model for Smart Contract Reentrancy Vulnerabilities

    We propose a novel smart contract re-entry vulnerability detection model based on BiGAS. The model combines a BiGRU neural network that introduces an attention mechanism with an SVM. We start from the data fea...

    Yuan Li, Ran Guo, Guopeng Wang, Lejun Zhang, **g Qiu in Smart Computing and Communication (2023)

  17. No Access

    Chapter and Conference Paper

    Biological Fermentation Process Control on Account of Swarm Intelligence Algorithm

    Biological fermentation industry is one of the modern industrial units in industrial economy. This technology has been applied in many aspects such as medical equipment and food on a large scale, and has been ...

    Shixiong Liu, Hui Chen, Zixuan Xu, Dacheng Liu in Frontier Computing (2023)

  18. No Access

    Chapter and Conference Paper

    Multi-angle Identification of Small Target Faults in Transmission Lines Based on Improved YOLOX Algorithm

    In the grid patrol work, there are some fault types with small targets in the line that needs to be detected. For the problem of partial feature loss when the target is small in UAV image recognition, CutMix i...

    Shurong Peng, Jieni He, Huixia Chen, Bin Li in Smart Grid and Innovative Frontiers in Tel… (2023)

  19. No Access

    Chapter and Conference Paper

    Android Mobile Terminal Security Assessment Based on Analytical Hierarchy Process (AHP)

    Mobile terminals especially smartphones are changing people’s work and life style. For example, mobile payments are experiencing rapid growth as consumers use mobile terminals as part of modern dynamic lifesty...

    Zhiyuan Hu, Linghang Shi, Huijun Chen, **ghui Lu in Digital Forensics and Cyber Crime (2023)

  20. No Access

    Chapter and Conference Paper

    A Correlational Strategy for the Prediction of High-Dimensional Stock Data by Neural Networks and Technical Indicators

    Stock price prediction generates interesting outputs for investors. In recent years, stock technical indicators (STI) have played an important role in stock price prediction. However, the current performance o...

    **gwei Hong, ** Han, Abdur Rasool, Hui Chen, Zhiling Hong in Big Data and Security (2023)

previous disabled Page of 5