![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
178 Result(s)
-
Article
Open AccessAttention-based RNN with question-aware loss and multi-level copying mechanism for natural answer generation
Natural answer generation is in a very clear practical significance and strong application background, which can be widely used in the field of knowledge services such as community question answering and intel...
-
Article
Open AccessMulti-view subspace clustering based on multi-order neighbor diffusion
Multi-view subspace clustering (MVC) intends to separate out samples via integrating the complementary information from diverse views. In MVC, since the structural information in the graph is crucial to the gr...
-
Article
Open AccessEnhancing the Performance and Accuracy in Real-Time Football and Player Detection Using Upgraded YOLOv5 Architecture
The study presents a significantly improved version of the YOLOv5 real-time object detection model for football player recognition. The proposed technique includes feature-tuning and hyper-parameter optimizati...
-
Article
Open AccessTwin-tower transformer network for skeleton-based Parkinson’s disease early detection
Parkinson’s disease is a chronic neurodegenerative condition accompanied by a variety of motor and non-motor clinical symptoms. Diagnosing Parkinson’s disease presents many challenges, such as excessive relian...
-
Article
Open AccessDevelopment of a semi-empirical bond strength model for multi-pass hot roll bonding based on the characterizations using the truncated-cone experiment
With special reference to the modelling of hot roll bonding, new experimental procedures to measure the resulting bond strength for a combination of AA6016 and AA8079 aluminum alloys at elevated temperatures a...
-
Article
Open AccessAn edge-assisted group authentication scheme for the narrowband internet of things
As an emerging wireless communication technology, narrowband Internet of Things is widely used in various scenarios, but it also brings new security problems, especially the group authentication between termin...
-
Article
Open AccessApplication of Artificial Intelligence Technology in Vulnerability Analysis of Intelligent Ship Network
The improvement in transportation efficiency, security, safety, and environmental effects may be possible due to the impending advent of autonomous ships. Automatic situational awareness, risk detection, and i...
-
Article
Open AccessFuzzy Neural Network Model for Intelligent Course Development in Music and Dance Education
Interactions are mandatory for online or offline music and dance education to improve understandability and learning efficacy. The course designed for such artistic education incorporates multi-point interacti...
-
Article
Open AccessTime-aware MADDPG with LSTM for multi-agent obstacle avoidance: a comparative study
Intelligent agents and multi-agent systems are increasingly used in complex scenarios, such as controlling groups of drones and non-player characters in video games. In these applications, multi-agent navigati...
-
Article
Open AccessDRL-based dependent task offloading with delay-energy tradeoff in medical image edge computing
Task offloading solves the problem that the computing resources of terminal devices in hospitals are limited by offloading massive radiomics-based medical image diagnosis model (RIDM) tasks to edge servers (ES...
-
Article
Open AccessA lightweight and personalized edge federated learning model
As a new distributed machine learning paradigm, federated learning has gained increasing attention in the industry and research community. However, federated learning is challenging to implement on edge device...
-
Article
Open AccessICDM-GEHC: identifying cancer driver module based on graph embedding and hierarchical clustering
Due to the high heterogeneity of cancers, it is rather essential to explore driver modules with the help of gene mutation data as well as known interactions between genes/proteins. Unfortunately, latent false ...
-
Article
Open AccessFlexible job-shop scheduling problem with parallel batch machines based on an enhanced multi-population genetic algorithm
The flexible job-shop scheduling problem (FJSP) with parallel batch processing machine (PBM) is one of those long-standing issues that needs cutting-edge approaches. It is a recent extension of standard flexib...
-
Article
Open AccessTeam formation through an assessor: choosing MARL agents in pursuit–evasion games
Team formation in multi-agent systems usually assumes the capabilities of each team member are known, and the best formation can be derived from that information. As AI agents become more sophisticated, this c...
-
Article
Open AccessAn improved fruit fly optimization algorithm with Q-learning for solving distributed permutation flow shop scheduling problems
The distributed permutation flow shop scheduling problem (DPFSP) is one of the hottest issues in the context of economic globalization. In this paper, a Q-learning enhanced fruit fly optimization algorithm (QF...
-
Article
Open AccessSituational diversity in video person re-identification: introducing MSA-BUPT dataset
Thanks to the success of deep learning over the past few years, the video person re-identification (ReID) algorithms have achieved high accuracy on multiple public benchmark datasets. However, the available vi...
-
Article
Open AccessCoordinated Control of the Onboard and Wayside Energy Storage System of an Urban Rail Train Based on Rule Mining
There are three major challenges to the broad implementation of energy storage systems (ESSs) in urban rail transit: maximizing the absorption of regenerative braking power, enabling online global optimal cont...
-
Article
Open AccessAdaptive local neighborhood information based efficient fuzzy clustering approach
The purpose of clustering is to partition data similar with each other into a same group and partition data dissimilar with each other into different groups. However, in most existing fuzzy clustering approach...
-
Article
Open AccessDATFNets-dynamic adaptive assigned transformer network for fire detection
Fires cause severe damage to the ecological environment and threaten human life and property. Although the traditional convolutional neural network method effectively detects large-area fires, it cannot captur...
-
Article
Open AccessA Region-Selective Anti-compression Image Encryption Algorithm Based on Deep Networks
In recent years, related research has focused on how to safely transfer and protect the privacy of images in social network services while providing easy access by authorized users. To safeguard privacy, we su...