![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
5,231 Result(s)
-
Article
Resisting TUL attack: balancing data privacy and utility on trajectory via collaborative adversarial learning
Nowadays, large-scale individual trajectories can be collected by various location-based social network services, which enables us to better understand human mobility patterns. However, the trajectory data usu...
-
Article
Abnormal operation recognition based on a spatiotemporal residual network
Artificial intelligence technologies have been widely used in many scenarios, however, the detection of abnormal actions in most industrial applications still depends on the recognition of static behaviors, su...
-
Article
Space to depth convolution bundled with coordinate attention for detecting surface defects
Surface defects of steel plates unavoidably exist during the industrial production proceeding due to the complex productive technologies and always exhibit some typical characteristics, such as irregular shape...
-
Article
An effective recognition of moving target seismic anomaly for security region based on deep bidirectional LSTM combined CNN
Ground motion target recognition based on seismic signals is more convenient and efficient than traditional manual patrol identification. However, current high-precision identification methods are limited to s...
-
Article
Direct sequence spread spectrum (DSSS) signal detection based on eigenvalues local binary pattern residual network (EL-ResNet)
Direct sequence spread spectrum (DSSS) communications are highly significant in military and civilian wireless communications because of its ability to resist narrowband interference, multipath interference an...
-
Article
CSMB-VSS: video scene segmentation with cosine similarity matrix
Video scene segmentation is a crucial step in video structural analysis, which divides a long video into discrete scenes, each consisting of a series of semantically coherent shots. The purpose of video scene ...
-
Article
A multiscale network for deblurring coal slurry foam images
Deblurring coal slurry foam images is critical for coal slurry flotation condition identification. To improve the quality of images acquired in industrial scenarios of flotation production and to achieve real-...
-
Article
Using improved YOLO V5s to recognize tomatoes in a continuous working environment
In the continuous working environment of the picking robots, factors such as illumination change, camera hardware, the movement of the picking robots, and image background interference have a great impact on t...
-
Article
SES-YOLOv8n: automatic driving object detection algorithm based on improved YOLOv8
The perception system in autonomous driving mainly uses object detection algorithms to obtain the distribution of obstacles for recognition and analysis. Current object detection algorithms have rapidly develo...
-
Article
A digital speckle stereo matching algorithm based on epipolar line correction
When the digital speckle correlation method captures images under certain working conditions, the extreme tilt of the camera leads to a weak correlation between the left and right images, which in turn makes t...
-
Article
PCB defect detection based on PSO-optimized threshold segmentation and SURF features
This paper proposes an automated inspection approach for printed circuit boards (PCBs) that can accurately locate defects to solve the issues of low precision, complex equipment, and high cost. Digital image p...
-
Article
Multi-scale saliency features fusion model for person re-identification
Person re-identification mainly uses computer vision technology to determine whether there are specific pedestrians in the image or video. Belong to cross-device retrieval images, due to the changing style of ...
-
Article
Attention-based color consistency underwater image enhancement network
Underwater images often exhibit color deviation, reduced contrast, distortion, and other issues due to light refraction, scattering, and absorption. Therefore, restoring detailed information in underwater imag...
-
Article
Cancelable color face recognition using trinion gyrator transform and randomized nonlinear PCANet
For the analysis of color images, the single-channel processing method fails to consider the internal correlation between color components, while the quaternion matrix representation is not compact enough. To ...
-
Article
Image inpainting via multi-resolution network with Fourier convolutions
Image inpainting has been a trending topic among researchers in recent years, which aims to fill missing areas in images while maintaining visual and semantic consistency with the original image. Existing meth...
-
Article
Iterative shrinkage thresholding-based anti-multi-noise compression perceptual image reconstruction network
Telemedicine imaging services usually require wireless transmission of a large number of medical images MRI/CT, etc., in the network, which are subject to noise interference and block effect during transmissio...
-
Article
Open AccessPerformance model for factory automation in 5G networks
The fifth generation (5G) of mobile networks is emerging as a key enabler of modern factory automation (FA) applications that ensure timely and reliable data exchange between network components. Network slicin...
-
Article
Efficient spatial queries over complex polygons with hybrid representations
One major goal of spatial query processing is to mitigate I/O costs and minimize the search space. However, geometric computation can be heavy-duty for spatial queries, in particular for complex geometries suc...
-
Article
A robust visual SLAM system for low-texture and semi-static environments
Precisely estimating a vehicle’s pose in a prior map is a fundamental capability for autonomous driving. This task, however, remains challenging in low-texture and semi-static environments where the number of ...
-
Article
Self-trained multi-cues model for video anomaly detection
Video anomaly detection is an extremely challenging task in the field of intelligent surveillance analysis. In this paper, we propose a video anomaly detection method without any manual annotation information,...