We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 81-100 of 10,000 results
  1. Poly-cam: high resolution class activation map for convolutional neural networks

    The demand for explainable AI continues to rise alongside advancements in deep learning technology. Existing methods such as convolutional neural...

    Alexandre Englebert, Olivier Cornu, Christophe De Vleeschouwer in Machine Vision and Applications
    Article 03 July 2024
  2. Short-term POI recommendation with personalized time-weighted latent ranking

    In this paper, we formulate a novel Point-of-interest (POI) recommendation task to recommend a set of new POIs for visit in a short period following...

    Yufeng Zou, Kaiqi Zhao in Discover Computing
    Article Open access 03 July 2024
  3. FastBeltNet: a dual-branch light-weight network for real-time conveyor belt edge detection

    Belt conveyors are widely used in multiple industries, including coal, steel, port, power, metallurgy, and chemical, etc. One major challenge faced...

    **ng Zhao, Minhao Zeng, ... Xutao Mo in Journal of Real-Time Image Processing
    Article 03 July 2024
  4. Undersampling based on generalized learning vector quantization and natural nearest neighbors for imbalanced data

    Imbalanced datasets can adversely affect classifier performance. Conventional undersampling approaches may lead to the loss of essential information,...

    Long-Hui Wang, Qi Dai, ... Lifang Chen in International Journal of Machine Learning and Cybernetics
    Article 03 July 2024
  5. YOLO-FGD: a fast lightweight PCB defect method based on FasterNet and the Gather-and-Distribute mechanism

    With the rapid expansion of the electronics industry, the demand for high-quality printed circuit boards has surged. However, existing PCB defect...

    Changxin Qin, Zhongyu Zhou in Journal of Real-Time Image Processing
    Article 03 July 2024
  6. A copy-move forgery detection technique using DBSCAN-based keypoint similarity matching

    In an era marked by the contrast between information and disinformation, the ability to differentiate between authentic and manipulated images holds...

    Soumya Mukherjee, Arup Kumar Pal, Soham Maji in International Journal of Machine Learning and Cybernetics
    Article 03 July 2024
  7. An improved classification diagnosis approach for cervical images based on deep neural networks

    In order to enhance the speed and performance of cervical diagnosis, we propose an improved Residual Network (ResNet) by combining pyramid...

    Juan Wang, Mengying Zhao, Chengyi **a in Pattern Analysis and Applications
    Article 03 July 2024
  8. Dual model knowledge distillation for industrial anomaly detection

    Unsupervised anomaly detection holds significant importance in large-scale industrial manufacturing. Recent methods have capitalized on the benefits...

    Simon Thomine, Hichem Snoussi in Pattern Analysis and Applications
    Article 02 July 2024
  9. Towards Unified Defense for Face Forgery and Spoofing Attacks via Dual Space Reconstruction Learning

    Real-world face recognition systems are vulnerable to diverse face attacks, ranging from digitally manipulated artifacts to physically crafted...

    Junyi Cao, Ke-Yue Zhang, ... Chao Ma in International Journal of Computer Vision
    Article 02 July 2024
  10. Event-Driven Heterogeneous Network for Video Deraining

    Restoring clear frames from rainy videos poses a significant challenge due to the swift motion of rain streaks. Traditional frame-based visual...

    Xueyang Fu, Chengzhi Cao, ... Zheng-Jun Zha in International Journal of Computer Vision
    Article 02 July 2024
  11. Discriminative binary pattern descriptor for face recognition

    Among several local descriptors invented in literature, the local binary pattern (LBP) is the prolific one. Despite its advantages like low...

    Shekhar Karanwal in Pattern Analysis and Applications
    Article 02 July 2024
  12. Class-structure preserving multi-view correlated discriminant analysis for multiblock data

    With the rapid development in data acquisition methods, multiple data sources are now becoming available to explain different views of an object....

    Article 02 July 2024
  13. A New Look at the Dirichlet Distribution: Robustness, Clustering, and Both Together

    Compositional data have peculiar characteristics that pose significant challenges to traditional statistical methods and models. Within this...

    Salvatore D. Tomarchio, Antonio Punzo, ... Andriette Bekker in Journal of Classification
    Article Open access 02 July 2024
  14. Computer-aided diagnosis of Alzheimer’s disease and neurocognitive disorders with multimodal Bi-Vision Transformer (BiViT)

    Cognitive disorders affect various cognitive functions that can have a substantial impact on individual’s daily life. Alzheimer’s disease (AD) is one...

    S. Muhammad Ahmed Hassan Shah, Muhammad Qasim Khan, ... Mona M. Jamjoom in Pattern Analysis and Applications
    Article Open access 01 July 2024
  15. Federated learning-guided intrusion detection and neural key exchange for safeguarding patient data on the internet of medical things

    To improve the security of the Internet of Medical Things (IoMT) in healthcare, this paper offers a Federated Learning (FL)-guided Intrusion...

    Chongzhou Zhong, Arindam Sarkar, ... Koyel Chakraborty in International Journal of Machine Learning and Cybernetics
    Article 01 July 2024
  16. Towards scanning electron microscopy image denoising: a state-of-the-art overview, benchmark, taxonomies, and future direction

    Scanning electron microscope (SEM) enables imaging of micro-nano scale objects. It is an analytical tool widely used in the material, earth and life...

    Sheikh Shah Mohammad Motiur Rahman, Michel Salomon, Sounkalo Dembélé in Machine Vision and Applications
    Article 01 July 2024
  17. Adversarial defence by learning differentiated feature representation in deep ensemble

    Deep learning models have been shown to be vulnerable to critical attacks under adversarial conditions. Attackers are able to generate powerful...

    ** Chen, Huang Wei, ... Zhizhong Zhou in Machine Vision and Applications
    Article 01 July 2024
  18. Automatic Topic Title Assignment with Word Embedding

    In this paper, we propose TAWE (title assignment with word embedding), a new method to automatically assign titles to topics inferred from sets of...

    Gianpaolo Zammarchi, Maurizio Romano, Claudio Conversano in Journal of Classification
    Article Open access 01 July 2024
  19. Sequential attention layer-wise fusion network for multi-view classification

    Graph convolutional network has shown excellent performance in multi-view classification. Currently, to output a fused node embedding representation...

    Qing Teng, **bei Yang, ... Taihua Xu in International Journal of Machine Learning and Cybernetics
    Article 01 July 2024
Did you find what you were looking for? Share feedback.