1,934 Result(s)
-
Article
CSGAT-Net: a conditional pedestrian trajectory prediction network based on scene semantic maps and spatiotemporal graph attention
Pedestrian behavior exhibits high levels of dynamism, and pedestrian trajectories are influenced not only by the pedestrians themselves, but also by interactions with surrounding objects. Efficiently understan...
-
Article
Survey of deep emotion recognition in dynamic data using facial, speech and textual cues
With the advancement of multimedia and human-computer interaction, it has become increasingly crucial to perceive people’s emotional states in dynamic data (e.g., video, audio, text stream) in order to effecti...
-
Article
Channel modeling for MI-based wireless underground sensor networks with conductive objects
We develop a comprehensive and accurate channel model forMI-WUSNs by taking into account the impact of multiple conductive objects located in different positions. The mathematical expressions for mutual induct...
-
Article
An end-to-end repair-based joint training framework for weakly supervised pavement crack segmentation
Weakly supervised pavement crack segmentation aims to assign each pixel of pavement surface images a category label (crack or non-crack) using limited annotation information. Most existing methods adopt the mu...
-
Article
Boiler furnace temperature and oxygen content prediction based on hybrid CNN, biLSTM, and SE-Net models
Furnace temperature and oxygen content are important parameters reflecting the combustion inside a circulating fluidized bed (CFB) boiler. Accurately predicting boiler output is a complex task due to the high ...
-
Article
Open AccessPutting the flesh on the bones: using a fishbone digital learning design method to align educational objectives
Learning design has become increasingly important in the context of expanding and dynamic digital learning environments. More traditional teaching approaches are no longer sufficient to engage learners in thes...
-
Article
GaitRA: triple-branch multimodal gait recognition with larger effective receptive fields and mixed attention
Gait Recognition, as a long-distance biometric technique for identity recognition, has attracted widespread attention in recent years. Previous academia typically employs minor convolutional networks to extrac...
-
Article
Examining generative AI user disclosure intention: an ELM perspective
Generative AI needs to collect massive information including personal information to train the model and improve the accuracy of answers. This may incur privacy risks and reduce user disclosure intention. Base...
-
Article
The existence of \((\mathbb {Z}_v,4,1)\) -disjoint difference families
This paper shows that a \((\mathbb {Z}_v,4,1)\) ( Z ...
-
Article
Open AccessRobust and privacy-preserving collaborative training: a comprehensive survey
Increasing numbers of artificial intelligence systems are employing collaborative machine learning techniques, such as federated learning, to build a shared powerful deep model among participants, while keepin...
-
Article
Contour extraction model introducing contrast adaptive characteristics based on visual pathway
Effectively extracting image subject contours holds significant importance for subsequent image processing tasks. Recognizing the pivotal role of contrast features in contour characterization, this paper propo...
-
Article
MFMANet: a multispectral pedestrian detection network using multi-resolution RGB feature reuse with multi-scale FIR attentions
In the realm of multispectral pedestrian detection, especially under challenging low-illumination, the existing methods, characterized by cross-modality feature interaction, lack generalization and are hard to...
-
Article
Cognitive Tracing Data Trails: Auditing Data Provenance in Discriminative Language Models Using Accumulated Discrepancy Score
The burgeoning practice of unauthorized acquisition and utilization of personal textual data (e.g., social media comments and search histories) by certain entities has become a discernible trend. To uphold dat...
-
Article
Optimal ternary locally repairable codes
Locally repairable codes (LRCs) are linear codes with locality properties for code symbols, which have important applications in distributed storage systems. In this paper, we completely classify all the possi...
-
Article
Diff-Font: Diffusion Model for Robust One-Shot Font Generation
Font generation presents a significant challenge due to the intricate details needed, especially for languages with complex ideograms and numerous characters, such as Chinese and Korean. Although various few-s...
-
Article
RaBFT: an improved Byzantine fault tolerance consensus algorithm based on raft
To address the limitations of the Raft consensus algorithm, such as the lack of support for Byzantine fault tolerance, performance bottleneck of the leader single node, and high leader election delay, an impro...
-
Article
A transfer-learning-based windspeed estimation on the ocean surface: implication for the requirements on the spatial-spectral resolution of remote sensors
The windspeed on the sea surface is an important factor affecting the process of detecting sea surface targets, as it affects the reflection and radiation intensity, posing challenges for precise detection of ...
-
Article
meTMQI: multi-task and exposure-prior learning for Tone-Mapped Quality Index
With limited dynamic range in consumer-level photographs and electronic displays, high dynamic range images can be rendered as the standard dynamic range image by tone map** algorithms. To quantify the disto...
-
Article
A CUDA-based parallel optimization method for SM3 hash algorithm
Hash algorithms are among the most crucial algorithms in cryptography. The SM3 algorithm is a hash cryptographic standard of China. Because of the strong collision resistance and irreversibility of hash algori...
-
Article
Speech enhancement based on emphasizing the fundamental frequency integrated with SNMF/DNN
Single-channel speech enhancement is a popular problem in speech enhancement and related fields, but the traditional research direction is to improve the data structure, which always faces the problem of heavi...