![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
2,078 Result(s)
-
Article
Two guidance joint network based on coarse map and edge map for camouflaged object detection
Camouflaged object detection (COD) entails identifying objects in an image that blend with the background. However, most traditional COD methods have not comprehensively considered the information provided by ...
-
Article
Some New Concepts of Interval-Valued Picture Fuzzy Graphs and Their Application Toward the Selection Criteria
Interval-valued picture fuzzy sets (IVPFSs) being the most advanced form of fuzzy sets (FSs) has more capacity to analyze the network state more intelligently. It is proven that IVPFS is most useful to solve m...
-
Article
A novel approach to detect, analyze and block adversarial web pages
The phenomenon of distraction is very common, and its adverse effects are seen among people. The major cause underlying this issue is the ease with which adversarial web sites and web pages can be accessed. It...
-
Article
Energy efficient dynamic resource allocation in C-RAN using tunicate swarm and whale optimization algorithm
In Cloud radio access network (C-RAN) architecture, the signals are processed through cloud-computing method where the baseband units (BBUs) of all base stations are accumulated into a centralized BBU pool, wh...
-
Article
GPDF-Net: geometric prior-guided stereo matching with disparity fusion refinement
Stereo matching is a popular topic in the image processing and computer vision fields. Although deep learning-based stereo matching approaches have achieved remarkable performance with respect to both estimati...
-
Article
Speech emotion recognition with transfer learning and multi-condition training for noisy environments
This paper explores the use of transfer learning techniques to develop robust speech emotion recognition (SER) models capable of handling noise in real-world environments. Two SER frameworks have been proposed...
-
Article
Optimized quantum circuit implementation of SATURNIN for Grover’s algorithm
In 2019, SATURNIN a light-weighted block cipher was proposed for post-quantum security. In this research, we try to examine the security strength of SATURNIN by implementing its quantum circuit to apply Grover...
-
Article
Intelligent mobility planning for a cost-effective object follower mobile robotic system with obstacle avoidance using robot vision and deep learning
Few industries use manually controlled robots or automobiles to carry material to the desired position, and in some cases, man power are used due to a lack of money. This cannot be used all the time, in all pl...
-
Article
Efficient latency-and-energy-aware IoT-fog-cloud task orchestration: novel algorithmic approach with enhanced arithmetic optimization and pattern search
Nowadays, the load on datacenters has become more and more due to the unprecedented growth of diversified data from many IoT devices; hence, resource utilization has become more difficult. So, Cloud computing ...
-
Article
Exploiting counter-examples for active learning with partial labels
This paper studies a new problem, active learning with partial labels (ALPL). In this setting, an oracle annotates the query samples with partial labels, relaxing the oracle from the demanding accurate labeling p...
-
Article
Video emotional description with fact reinforcement and emotion awaking
Video description aims to translate the visual content in a video with appropriate natural language. Most of current works only focus on the description of factual content, paying insufficient attention to the...
-
Article
Health professions students’ perceptions of artificial intelligence and its integration to health professions education and healthcare: a thematic analysis
Artificial intelligence (AI) is being tightly integrated into healthcare today. Even though AI is being utilized in healthcare, its application in clinical settings and health professions education is still co...
-
Article
AlexDarkNet: Hybrid CNN architecture for real-time Traffic monitoring with unprecedented reliability
In recent years, the proliferation of vehicles on roadways, accompanied by an escalating demand for augmented safety and refined traffic management, has fueled substantial progress in the domains of computer v...
-
Article
Open AccessMultimodal Machine Learning in Image-Based and Clinical Biomedicine: Survey and Prospects
Machine learning (ML) applications in medical artificial intelligence (AI) systems have shifted from traditional and statistical methods to increasing application of deep learning models. This survey navigates...
-
Article
Open AccessBusiness chatbots with deep learning technologies: state-of-the-art, taxonomies, and future research directions
With the support of advanced hardware and software technology, Artificial Intelligence (AI) techniques, especially the increasing number of deep learning algorithms, have spawned the popularization of online i...
-
Article
Computational intelligence for estimating software development effort: a systematic map** study
Software development effort estimation (SDEE) is critical for predicting the required resource investment. Since the late 2000s, numerous studies have advocated using computational intelligence (CI) to enhance...
-
Article
Open AccessA Deeper Analysis of Volumetric Relightable Faces
Portrait viewpoint and illumination editing is an important problem with several applications in VR/AR, movies, and photography. Comprehensive knowledge of geometry and illumination is critical for obtaining p...
-
Article
Design optimization of cam–follower mechanisms using Rao algorithms and their variants
This paper presents the design optimization of cam–follower mechanisms (CFM) with eccentric roller type follower using recently developed advanced optimization algorithms, namely Rao, SAMP-Rao, and QO-Rao algo...
-
Article
Cross-domain Fisher Discrimination Criterion: A Domain Adaptive Method Based on the Nature of Classifier
Most domain adaptive methods enhance the classification performance of target domain via overcoming the distribution difference between source and target domains while ignoring the nature of classifier, i.e., ...
-
Article
A robust feature selection method based on meta-heuristic optimization for speech emotion recognition
Most of the traditional feature selection methods do not show effective performance on speech emotion recognition systems. One of the recent advances in the feature selection is using meta-heuristic optimizati...