![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
523 Result(s)
-
Article
M2BIST-SPNet: RUL prediction for railway signaling electromechanical devices
Railway signaling electromechanical devices (RSEDs) play a pivotal role in the railway industry. Normal wear and tear of these devices occur during day-and-night operation and even progressively develop into f...
-
Article
SPD-YOLOv8: an small-size object detection model of UAV imagery in complex scene
Traditional camera sensors rely on human observation. However, in complex scenes, people often experience fatigue when observing objects of various sizes. Moreover, human cognitive abilities have inherent limi...
-
Article
Open AccessThreshold ring signature: generic construction and logarithmic size instantiation
A ring signature is a variant of normal digital signature and protects the privacy of a specific signer in the sense that a ring signature can be verified, but the signer’s identity can only be traced to a lim...
-
Article
Open AccessRobust and privacy-preserving collaborative training: a comprehensive survey
Increasing numbers of artificial intelligence systems are employing collaborative machine learning techniques, such as federated learning, to build a shared powerful deep model among participants, while keepin...
-
Article
RaBFT: an improved Byzantine fault tolerance consensus algorithm based on raft
To address the limitations of the Raft consensus algorithm, such as the lack of support for Byzantine fault tolerance, performance bottleneck of the leader single node, and high leader election delay, an impro...
-
Article
meTMQI: multi-task and exposure-prior learning for Tone-Mapped Quality Index
With limited dynamic range in consumer-level photographs and electronic displays, high dynamic range images can be rendered as the standard dynamic range image by tone map** algorithms. To quantify the disto...
-
Article
A CUDA-based parallel optimization method for SM3 hash algorithm
Hash algorithms are among the most crucial algorithms in cryptography. The SM3 algorithm is a hash cryptographic standard of China. Because of the strong collision resistance and irreversibility of hash algori...
-
Article
DEAR: a novel deep-level semantics feature reinforce framework for Infrared Small Object Segmentation
Infrared Small Object Segmentation (ISOS) faces challenges in isolating small and faint objects from infrared images due to their limited texture details and small spatial presence. Existing deep learning meth...
-
Article
Open AccessAtomic cross-chain swap based on private key exchange
Atomic Cross-Chain Swap (ACCS) is one important topic in cryptocurrency, where users can securely and trustlessly exchange assets between two different blockchains. However, most known ACCS schemes assume spec...
-
Article
Collective Movement Simulation: Methods and Applications
Collective movement simulations are challenging and important in many areas, including life science, mathematics, physics, information science and public safety. In this survey, we provide a comprehensive revi...
-
Article
Open AccessHSS: enhancing IoT malicious traffic classification leveraging hybrid sampling strategy
Using deep learning models to deal with the classification tasks in network traffic offers a new approach to address the imbalanced Internet of Things malicious traffic classification problems. However, the em...
-
Article
Optimal Strategy for Aircraft Pursuit-evasion Games via Self-play Iteration
In this paper, the pursuit-evasion game with state and control constraints is solved to achieve the Nash equilibrium of both the pursuer and the evader with an iterative self-play technique. Under the conditio...
-
Article
On Robust Cross-view Consistency in Self-supervised Monocular Depth Estimation
Remarkable progress has been made in self-supervised monocular depth estimation (SS-MDE) by exploring cross-view consistency, e.g., photometric consistency and 3D point cloud consistency. However, they are ver...
-
Article
Open AccessOptimizing sparse general matrix–matrix multiplication for DCUs
Sparse general matrix–matrix multiplication (SpGEMM) is a crucial and complex computational task in many practical applications. Improving the performance of SpGEMM on SIMT processors like modern GPUs is chall...
-
Article
Open AccessDeep learning implementation of image segmentation in agricultural applications: a comprehensive review
Image segmentation is a crucial task in computer vision, which divides a digital image into multiple segments and objects. In agriculture, image segmentation is extensively used for crop and soil monitoring, p...
-
Article
Joint super-resolution-based fast face image coding for human and machine vision
As the Internet of Things continues to grow and thrive, more and more data are consumed by machines for intelligent analysis. How to simultaneously support fast machine vision analysis and obtain high-quality ...
-
Article
Face photo-sketch portraits transformation via generation pipeline
Portrait sketching is widely used in digital art, forensic security and other fields with its unique value. However, existing portrait sketch style transfer techniques often focus on overall style transformati...
-
Article
Coordination of networking and computing: toward new information infrastructure and new services mode
-
Article
SNCL: a supernode OpenCL implementation for hybrid computing arrays
Heterogeneous computing has been develo** continuously in the field of high-performance computing because of its high performance and energy efficiency. More and more accelerators have emerged, such as GPU, ...
-
Article
A survey of energy-efficient strategies for federated learning inmobile edge computing
With the booming development of fifth-generation network technology and Internet of Things, the number of end-user devices (EDs) and diverse applications is surging, resulting in massive data generated at the ...