![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
9,459 Result(s)
-
Article
Math-LLMs: AI Cyberinfrastructure with Pre-trained Transformers for Math Education
In recent years, the pre-training of Large Language Models (LLMs) in the educational domain has garnered significant attention. However, a discernible gap exists in the application of these models to mathemati...
-
Article
Open AccessGeneration and Countermeasures of adversarial examples on vision: a survey
Recent studies have found that deep learning models are vulnerable to adversarial examples, demonstrating that applying a certain imperceptible perturbation on clean examples can effectively deceive the well-t...
-
Article
Development of a leech-inspired peristaltic crawling soft robot for intestine inspection
The development of a non-destructive and patient-friendly method for examining the intestines is crucial for early prevention and timely diagnosis of prevalent intestinal diseases that pose a threat to human h...
-
Article
Unsupervised diffusion based anomaly detection for time series
Unsupervised anomaly detection aims to construct a model that effectively detects invisible anomalies by training and reconstruct normal data. While a significant amount of reconstruction-based methods has mad...
-
Article
Computational intelligence and its dynamic development: statistical exploration, comprehensive evaluation and prospect expansion
Computational intelligence (CI) has become one of the most useful and successful tools for dealing with uncertainties and complex problems in many fields, such as neural networks, genetic algorithms, and swarm...
-
Article
Open AccessReview of few-shot learning application in CSI human sensing
Wi-Fi sensing has garnered increasing interest for its significant advantages, primarily leveraging Wi-Fi signal fluctuations induced by human activities and advanced neural network algorithms. However, its ap...
-
Article
An extended power geometric technique for multiple-attribute decision-making under single-valued neutrosophic sets and applications to embedded computers’ performance evaluation
Embedded computer systems refer to specialized computer systems that integrate operating systems and functional software into computer hardware systems, are application centric, based on computer technology, a...
-
Article
Open AccessFormal design, verification and implementation of robotic controller software via RoboChart and RoboTool
Current practice in simulation and implementation of robot controllers is usually undertaken with guidance from high-level design diagrams and pseudocode. Thus, no rigorous connection between the design and th...
-
Article
Multi-scale modeling to investigate the effects of transcranial magnetic stimulation on morphologically-realistic neuron with depression
Transcranial magnetic stimulation (TMS) is a non-invasive neuromodulation technique to activate or inhibit the activity of neurons, and thereby regulate their excitability. This technique has demonstrated pote...
-
Article
CoFF-CHP: coarse-to-fine filters with concept heuristic prompt for few-shot relation classification
Few-shot relation classification (RC) is a crucial task that aims to identify the relationships between entity pairs with limited mentions. However, this task is challenging due to the insufficient amount of a...
-
Article
Open AccessPersonalized hairstyle and hair color editing based on multi-feature fusion
In the metaverse era, virtual design of hairstyle becomes very popular for personalized aesthetics. As hair design tasks can be decomposed into hair attribute editing and generation, the development of generat...
-
Article
DCSG: data complement pseudo-label refinement and self-guided pre-training for unsupervised person re-identification
Existing unsupervised person re-identification (Re-ID) methods use clustering to generate pseudo-labels that are generally noisy, and initializing the model with ImageNet pre-training weights introduces a larg...
-
Article
An automatic framework for quadrilateral surface reconstruction with partitions from 3D point clouds
Currently, three-dimensional (3D) point clouds are widely used in the gaming and film industries. Inspired by the reverse process of polycube-based parametrical map**, we present an automatic framework that ...
-
Article
Incorporating self-attentions into robust spatial-temporal graph representation learning against dynamic graph perturbations
This paper proposes a Robust Spatial-Temporal Graph Neural Network (RSTGNN), which overcomes the limitations faced by graph-based models against dynamic graph perturbations using robust spatial-temporal self-a...
-
Article
Strand-accurate multi-view facial hair reconstruction and tracking
Accurate modeling of facial hair is crucial not only for reconstructing a clean-shaven face but also for enhancing realism when creating digital human avatars. Previous methods have primarily focused on recons...
-
Article
Benchmarking the Robustness of LiDAR Semantic Segmentation Models
When using LiDAR semantic segmentation models for safety-critical applications such as autonomous driving, it is essential to understand and improve their robustness with respect to a large range of LiDAR corr...
-
Article
Open AccessA method for visualizing urban road events using distributed acoustic sensing
This study presents the construction of an urban underground sensing system using distributed acoustic sensing (DAS) technology, which utilizes the existing optical fiber infrastructure around urban roads for ...
-
Article
Open AccessFew-shot anime pose transfer
In this paper, we propose a few-shot method for pose transfer of anime characters—given a source image of an anime character and a target pose, we transfer the pose of the target to the source character. Despi...
-
Article
Automated catastrophic optical damage inspection of semiconductor laser chip based on multi-scale strip convolution aggregation
Catastrophic optical damage (COD) is one of the reasons limiting the output power and lifetime of semiconductor lasers. Nevertheless, the automatic defects inspection of the COD is a challenging task due to se...
-
Article
Time series clustering of dynamical systems via deterministic learning
A recent deterministic learning theory has achieved locally-accurate identification of unknown system dynamics. This article presents a novel application of deterministic learning theory to unsupervised learni...