Skip to main content

previous disabled Page of 538
and
  1. No Access

    Article

    Quality evaluation methods of handwritten Chinese characters: a comprehensive survey

    Quality evaluation of handwritten Chinese characters aims to automatically quantify and assess handwritten Chinese characters through computer vision and machine learning technology. It is a topic of great con...

    Weiran Chen, Jiaqi Su, Weitao Song, Jialiang Xu, Guiqian Zhu, Ying Li in Multimedia Systems (2024)

  2. No Access

    Article

    A novel brain tumor segmentation and classification model using deep neural network over MRI-flair images

    Brain tumors pose a significant health concern globally, with their detection and diagnosis being crucial for timely intervention and treatment planning. These abnormal growths can develop within the brain or ...

    Rajmohan Rajendirane, T. Ananth Kumar, S. G. Sandhya in Multimedia Tools and Applications (2024)

  3. No Access

    Article

    Fire danger forecasting using machine learning-based models and meteorological observation: a case study in Northeastern China

    Wildfire is one of the primary natural disturbance agents in the forests of China. The forecast of fire danger is critically important to assist stakeholders to avoid and mitigate wildfire-induced hazards and ...

    Zhenyu Chen, Chen Zhang, Wendi Li, Lanyu Gao in Multimedia Tools and Applications (2024)

  4. No Access

    Article

    Development of a parking system based on learning automata

    Rapid growth of urban population and unplanned urbanization are reducing the number of urban parking spaces and increase traffic congestion. In China, due to the tripling of the number of motor vehicles in the...

    LiangLiang Chen in Multimedia Tools and Applications (2024)

  5. No Access

    Article

    Incorporating self-attentions into robust spatial-temporal graph representation learning against dynamic graph perturbations

    This paper proposes a Robust Spatial-Temporal Graph Neural Network (RSTGNN), which overcomes the limitations faced by graph-based models against dynamic graph perturbations using robust spatial-temporal self-a...

    Zhuo Zeng, Chengliang Wang, Fei Ma, Xusheng Li, **nrun Chen in Computing (2024)

  6. No Access

    Article

    MSF-YOLO: A multi-scale features fusion-based method for small object detection

    Small object detection has been widely used in real-world applications, such as small object detection from the perspective of UAVs and industrial inspection to locate small defects visible on the surface of m...

    Fengyu Yang, Jiaqi Zhou, Yuan Chen, Jie Liao in Multimedia Tools and Applications (2024)

  7. No Access

    Article

    Improved optimal foraging algorithm for global optimization

    The optimal foraging algorithm (OFA) is a swarm-based algorithm motivated by animal behavioral ecology theory. When solving complex optimization problems characterized by multiple peaks, OFA is easy to get tra...

    Chen Ding, GuangYu Zhu in Computing (2024)

  8. No Access

    Article

    An ant colony path planning optimization based on opposition-based learning for AUV in irregular regions

    Aiming at the problems of incomplete path coverage and path redundancy in Autonomous Underwater Vehicle (AUV) path planning, an Ant Colony Path Planning Optimization Based on Opposition-Based Learning (ACPPO-O...

    Jiaxing Chen, **aoqian Liu, Chao Wu, Jiahui Ma, Zhiyuan Cui, Zhihua Liu in Computing (2024)

  9. No Access

    Article

    A block-based adaptive high fidelity reversible data hiding scheme in interpolation domain

    Reversible Data Hiding (RDH) schemes enjoy the accomplishment of achieving high embedding capacity (EC) in interpolation domain. However, most existing methods usually embed the secret data into non-reference ...

    Zhiyun Huang, Yu Lin, **aofeng Chen in Multimedia Tools and Applications (2024)

  10. No Access

    Article

    Semantically realizing discovery and composition for RESTful web services

    The processes of service discovery and composition are crucial tasks in application development driven by Web Services. However, with RESTful Web Service replacing SOAP-based Web Service as the dominant servic...

    Haijun Gu, Yingyu Ma, Siqi Wang, **ncheng Chen, Weihua Su in Computing (2024)

  11. No Access

    Article

    Saver: a proactive microservice resource scheduling strategy based on STGCN

    As container technology and microservices mature, applications increasingly shift to microservices and cloud deployment. Growing microservices scale complicates resource scheduling. Traditional methods, based ...

    Yi Jiang, ** Xue, Kun Hu, Tianxiang Chen, Tong Wu in Cluster Computing (2024)

  12. No Access

    Article

    CCIM-SLR: Incomplete multiview co-clustering by sparse low-rank representation

    Clustering incomplete multiview data in real-world applications has become a topic of recent interest. However, producing clustering results from multiview data with missing views and different degrees of miss...

    Zhenjiao Liu, Zhikui Chen, Kai Lou, Praboda Rajapaksha in Multimedia Tools and Applications (2024)

  13. No Access

    Article

    CSMB-VSS: video scene segmentation with cosine similarity matrix

    Video scene segmentation is a crucial step in video structural analysis, which divides a long video into discrete scenes, each consisting of a series of semantically coherent shots. The purpose of video scene ...

    Zeyu Chen, **nbo Wang, Ji Wang, Yi Zhang, **ang Cao in Multimedia Tools and Applications (2024)

  14. No Access

    Article

    Progressive secret image sharing based on Boolean operations and polynomial interpolations

    With the expansion of network bandwidth and the rise of social networks, image sharing on open networks has become a trend. The ensuing privacy leakage events have aroused widespread concerns. Therefore, image...

    Hao Chen, Lizhi **ong, Ching-Nung Yang in Multimedia Systems (2024)

  15. No Access

    Article

    Integrating self-organizing feature map with graph convolutional network for enhanced superpixel segmentation and feature extraction in non-Euclidean data structure

    Deep learning has been widely used on Euclidean data type, and the deep learning architecture has made a breakthrough by the development of technology. The common neural network architectures include Deep Neur...

    Yi-Zeng Hsieh, Chia-Hsuan Wu, Yu-Ting Chen in Multimedia Tools and Applications (2024)

  16. No Access

    Article

    A multi-lesion segmentation method for diabetic retinopathy based on location information guidance

    In order to solve the problem that the segmentation model does not pay enough attention to the lesion information and loses the lesion information, this paper proposes the MLS-Net (Multiple-Lesions-Segmentatio...

    Yu Chen, Shibao Xu, Jun Long, Yining **e in Multimedia Tools and Applications (2024)

  17. No Access

    Article

    Human identification based on sphenoid sinus in point cloud with geometric self-attention network

    Human identification is a crucial element in forensic medicine to identify unknown bodies. As a unique anatomical feature of the human body, the sphenoid sinus has been used for human identification due to its...

    **aofeng Li, Ruotong Zou, Hu Chen in Multimedia Tools and Applications (2024)

  18. No Access

    Article

    Traffic flow prediction based on graph convolutional networks with a parallel attention network and stacked gate recurrent units

    Accurate traffic flow prediction is essential to address traffic issues and assist traffic managers make informed decisions in intelligent transportation systems. Extracting potential features from traffic dat...

    Dawen **a, Yuce Ao, **aoduo Wei, Yunsong Li, Yan Chen in Multimedia Tools and Applications (2024)

  19. No Access

    Article

    Enhancing network security with information-guided-enhanced Runge Kutta feature selection for intrusion detection

    Intrusion detection system (IDS) classify network traffic as either threatening or normal based on data features, aiming to identify malicious activities attempting to compromise computer systems. However, the...

    Li Yuan, **ongjun Tian, Jiacheng Yuan, **gyu zhang, **ao**g Dai in Cluster Computing (2024)

  20. No Access

    Article

    NResNet: nested residual network based on channel and frequency domain attention mechanism for speaker verification in classroom

    With the development of deep learning technology, the pattern of artificial intelligence in education has attracted more and more attention. However, most of the existing verbal interaction analysis methods ut...

    Qiuyu Zheng, Zengzhao Chen, **nxing Jiang in Multimedia Tools and Applications (2024)

previous disabled Page of 538