Skip to main content

Page of 262
and
  1. No Access

    Article

    Resisting TUL attack: balancing data privacy and utility on trajectory via collaborative adversarial learning

    Nowadays, large-scale individual trajectories can be collected by various location-based social network services, which enables us to better understand human mobility patterns. However, the trajectory data usu...

    Yandi Lun, Hao Miao, Jiaxing Shen, Renzhi Wang, **ang Wang, Senzhang Wang in GeoInformatica (2024)

  2. No Access

    Article

    Abnormal operation recognition based on a spatiotemporal residual network

    Artificial intelligence technologies have been widely used in many scenarios, however, the detection of abnormal actions in most industrial applications still depends on the recognition of static behaviors, su...

    Linqi Liu, **uhui Wang, **aofang Huang, Qifu Bao in Multimedia Tools and Applications (2024)

  3. No Access

    Article

    Space to depth convolution bundled with coordinate attention for detecting surface defects

    Surface defects of steel plates unavoidably exist during the industrial production proceeding due to the complex productive technologies and always exhibit some typical characteristics, such as irregular shape...

    Wenqian Wan, Lei Wang, Bingbing Wang, Haoyang Yu in Signal, Image and Video Processing (2024)

  4. No Access

    Article

    An effective recognition of moving target seismic anomaly for security region based on deep bidirectional LSTM combined CNN

    Ground motion target recognition based on seismic signals is more convenient and efficient than traditional manual patrol identification. However, current high-precision identification methods are limited to s...

    Tongyu Nie, Sirui Wang, Yuqi Wang, Xunqian Tong in Multimedia Tools and Applications (2024)

  5. No Access

    Article

    Direct sequence spread spectrum (DSSS) signal detection based on eigenvalues local binary pattern residual network (EL-ResNet)

    Direct sequence spread spectrum (DSSS) communications are highly significant in military and civilian wireless communications because of its ability to resist narrowband interference, multipath interference an...

    Bo Wang, Lei Shen, Huaxia Wang, Yudong Yao in Signal, Image and Video Processing (2024)

  6. No Access

    Article

    CSMB-VSS: video scene segmentation with cosine similarity matrix

    Video scene segmentation is a crucial step in video structural analysis, which divides a long video into discrete scenes, each consisting of a series of semantically coherent shots. The purpose of video scene ...

    Zeyu Chen, **nbo Wang, Ji Wang, Yi Zhang, **ang Cao in Multimedia Tools and Applications (2024)

  7. No Access

    Article

    A multiscale network for deblurring coal slurry foam images

    Deblurring coal slurry foam images is critical for coal slurry flotation condition identification. To improve the quality of images acquired in industrial scenarios of flotation production and to achieve real-...

    Yuxiao Wang, **anwu Huang, Haili Shang, **shan Zhang in Signal, Image and Video Processing (2024)

  8. No Access

    Article

    Using improved YOLO V5s to recognize tomatoes in a continuous working environment

    In the continuous working environment of the picking robots, factors such as illumination change, camera hardware, the movement of the picking robots, and image background interference have a great impact on t...

    Guohua Gao, Ciyin Shuai, Shuangyou Wang, Tao Ding in Signal, Image and Video Processing (2024)

  9. No Access

    Article

    SES-YOLOv8n: automatic driving object detection algorithm based on improved YOLOv8

    The perception system in autonomous driving mainly uses object detection algorithms to obtain the distribution of obstacles for recognition and analysis. Current object detection algorithms have rapidly develo...

    Yang Sun, Yuhang Zhang, Haiyang Wang, Jianhua Guo in Signal, Image and Video Processing (2024)

  10. No Access

    Article

    A digital speckle stereo matching algorithm based on epipolar line correction

    When the digital speckle correlation method captures images under certain working conditions, the extreme tilt of the camera leads to a weak correlation between the left and right images, which in turn makes t...

    Li** Liu, Boya Niu, Zhuo Xu, Songyang Zhang in Signal, Image and Video Processing (2024)

  11. No Access

    Article

    PCB defect detection based on PSO-optimized threshold segmentation and SURF features

    This paper proposes an automated inspection approach for printed circuit boards (PCBs) that can accurately locate defects to solve the issues of low precision, complex equipment, and high cost. Digital image p...

    Yuanpei Chang, Ying Xue, Yu Zhang, **gguo Sun in Signal, Image and Video Processing (2024)

  12. No Access

    Article

    Multi-scale saliency features fusion model for person re-identification

    Person re-identification mainly uses computer vision technology to determine whether there are specific pedestrians in the image or video. Belong to cross-device retrieval images, due to the changing style of ...

    Kaiyang Liao, Keer Wang, Yuanlin Zheng, Guangfeng Lin in Multimedia Tools and Applications (2024)

  13. No Access

    Article

    Attention-based color consistency underwater image enhancement network

    Underwater images often exhibit color deviation, reduced contrast, distortion, and other issues due to light refraction, scattering, and absorption. Therefore, restoring detailed information in underwater imag...

    Baocai Chang, **jiang Li, Haiyang Wang, Mengjun Li in Signal, Image and Video Processing (2024)

  14. No Access

    Article

    Cancelable color face recognition using trinion gyrator transform and randomized nonlinear PCANet

    For the analysis of color images, the single-channel processing method fails to consider the internal correlation between color components, while the quaternion matrix representation is not compact enough. To ...

    Zhuhong Shao, Xue Wang, Bicao Li, Yu Zhang in Multimedia Tools and Applications (2024)

  15. No Access

    Article

    Image inpainting via multi-resolution network with Fourier convolutions

    Image inpainting has been a trending topic among researchers in recent years, which aims to fill missing areas in images while maintaining visual and semantic consistency with the original image. Existing meth...

    Hao-Nan Zhao, Li-Yong Shen, Ji-Wei Wang in Signal, Image and Video Processing (2024)

  16. No Access

    Article

    Iterative shrinkage thresholding-based anti-multi-noise compression perceptual image reconstruction network

    Telemedicine imaging services usually require wireless transmission of a large number of medical images MRI/CT, etc., in the network, which are subject to noise interference and block effect during transmissio...

    Jianhong **ang, Qiming Liang, Hao Xu, Linyu Wang in Signal, Image and Video Processing (2024)

  17. Article

    Open Access

    Performance model for factory automation in 5G networks

    The fifth generation (5G) of mobile networks is emerging as a key enabler of modern factory automation (FA) applications that ensure timely and reliable data exchange between network components. Network slicin...

    Jiao Wang, Jay Weitzen, Oguz Bayat, Volkan Sevindik in Multimedia Tools and Applications (2024)

  18. No Access

    Article

    Efficient spatial queries over complex polygons with hybrid representations

    One major goal of spatial query processing is to mitigate I/O costs and minimize the search space. However, geometric computation can be heavy-duty for spatial queries, in particular for complex geometries suc...

    Dejun Teng, Furqan Baig, Zhaohui Peng, Jun Kong, Fusheng Wang in GeoInformatica (2024)

  19. No Access

    Article

    A robust visual SLAM system for low-texture and semi-static environments

    Precisely estimating a vehicle’s pose in a prior map is a fundamental capability for autonomous driving. This task, however, remains challenging in low-texture and semi-static environments where the number of ...

    Bin He, Sixiong Xu, Yanchao Dong, Senbo Wang in Multimedia Tools and Applications (2024)

  20. No Access

    Article

    Self-trained multi-cues model for video anomaly detection

    Video anomaly detection is an extremely challenging task in the field of intelligent surveillance analysis. In this paper, we propose a video anomaly detection method without any manual annotation information,...

    Xusheng Wang, Zhengang Nie, Wei Liang, Mingtao Pei in Multimedia Tools and Applications (2024)

Page of 262