![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
2,134 Result(s)
-
Chapter and Conference Paper
STAPointGNN: Spatial-Temporal Attention Graph Neural Network for Gesture Recognition Using Millimeter-Wave Radar
Gesture recognition plays a pivotal role in enabling natural and intuitive human-computer interaction (HCI), finding applications in diverse domains such as smart homes, robot control, and virtual reality. Tha...
-
Chapter and Conference Paper
FedECCR: Federated Learning Method with Encoding Comparison and Classification Rectification
Federated learning is a distributed training method that integrates multi-party data information using privacy-preserving technologies through dispersed client data sets to jointly construct a global model und...
-
Chapter and Conference Paper
Research on Distributed Routing Technology for LEO Satellite Network
During the development of 6G networks, cellular networks that rely solely on ground infrastructure cannot meet network coverage in remote areas. On this basis, the concept of Low Earth Orbit (LEO) satellites p...
-
Chapter and Conference Paper
Robustness-Enhanced Assertion Generation Method Based on Code Mutation and Attack Defense
Writing high-quality unit tests plays a crucial role in discovering and diagnosing early-stage errors and preventing their further propagation throughout the development cycle. However, the low readability of ...
-
Chapter and Conference Paper
Predicting Future Spatio-Temporal States Using a Robust Causal Graph Attention Model
Spatiotemporal prediction is a research topic in urban planning and management. Most existing spatiotemporal prediction models currently face challenges. More specifically, most prediction models are sensitive...
-
Chapter and Conference Paper
Disease Recognition of Plants Leaves in Northern Shaanxi Based on Siamese Networks
Crop disease image recognition is crucial for early detection and prevention of diseases in agriculture. With the development of deep learning technology, accurate identification can be achieved with large dat...
-
Chapter and Conference Paper
A Review of Image and Point Cloud Fusion in Autonomous Driving
In the task of autonomous driving perception scenarios, multi-sensor fusion is gradually becoming the current mainstream trend. At this stage, researchers use multimodal fusion to leverage information and ulti...
-
Chapter and Conference Paper
Analysis of Weld Pool Characteristics in Narrow Gap GTAW Welding Based on Passive Vision
In the process of narrow gap pipeline welding, the welding quality can be controlled and judged by the characteristic information of the weld pool. The traditional active vision laser is limited by the geometr...
-
Chapter and Conference Paper
Deep Learning in Strawberry Growth Monitoring Research: A Review
Intelligent equipment is increasingly employed in strawberry production to enhance fruit yield. To effectively monitor strawberry growth, the utilization of deep learning, specifically convolutional neural net...
-
Chapter and Conference Paper
Multiple Color Feature and Contextual Attention Mechanism Based on YOLOX
Object detection aims to find out and classify objects in which people are interested. YOLOX is the one-stage object detector representative, with being famous for its quick speed. Nevertheless, recent studies...
-
Chapter and Conference Paper
A Novel Topology Metric for Indoor Point Cloud SLAM Based on Plane Detection Optimization
Accurate self-localization and navigation in complex indoor environments are essential functions for the intelligent robots. However, the existing SLAM algorithms rely heavily on differential GPS or additional...
-
Chapter and Conference Paper
Neural HD Map Generation from Multiple Vectorized Tiles Locally Produced by Autonomous Vehicles
High-definition (HD) map is a fundamental component of autonomous driving systems, as it can provide precise environmental information about driving scenes. Recent work on vectorized map generation could produ...
-
Chapter and Conference Paper
Improved War Strategy Optimization Algorithm Based on Hybrid Strategy
The Standard WSO algorithm has several shortcomings, including uneven distribution of initial population, slow convergence speed, and weak global search ability. To address these issues, the present study prop...
-
Chapter and Conference Paper
Measurement and Research on the Conflict Between Residential Space and Tourism Space in Pianyan Ancient Township
Studying spatial behavioral conflicts is the main method to understand the conflicts between tourists and residents. However, academic research on spatial conflict mostly involves urban macro-level discussions...
-
Chapter and Conference Paper
Smoke Segmentation Method Based on Super Pixel Segmentation and Convolutional Neural Network
The steps of the fire disaster are from smokes to open flame. It has significant and practical meaning to use fixed camera stands to detect smoke. As the rapid development of AI in recent years the methods tha...
-
Chapter and Conference Paper
A Review on Urban Modelling for Future Smart Cities
The rapid development of information technology has brought about the emergence of urban multi-source big data and the improvement of computing power, and promoted the emergence of new technologies such as art...
-
Chapter and Conference Paper
Budget-Constrained Contention-Aware Workflow Scheduling in a Hybrid Cloud
Private clouds offer high controllability but lack scalability, while public clouds provide high scalability with limited controllability. The hybrid cloud paradigm combining them can well balance controllabil...
-
Chapter and Conference Paper
DualDNSMiner: A Dual-Stack Resolver Discovery Method Based on Alias Resolution
With the rapid development of IPv6 network applications, the transition to IPv6 dns has accelerated. In this process, dual-stack resolvers take on the crucial role that ensures the resolution of domains under ...
-
Chapter and Conference Paper
Protect Applications and Data in Use in IoT Environment Using Collaborative Computing
In IoT systems, traditional encryption can be used to protect IoT applications and data at rest or in transit that transforms data in to ciphertext making it unreadable. However, it is very challenging to prot...
-
Chapter and Conference Paper
An Efficient Authentication and Key Agreement Scheme for CAV Internal Applications
The data of applications in connected and autonomous vehicles are important, which is usually collected by service providers to improve their services, such as object detection model. But, wireless communicati...