![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
10,751 Result(s)
-
Article
Quality evaluation methods of handwritten Chinese characters: a comprehensive survey
Quality evaluation of handwritten Chinese characters aims to automatically quantify and assess handwritten Chinese characters through computer vision and machine learning technology. It is a topic of great con...
-
Article
A novel brain tumor segmentation and classification model using deep neural network over MRI-flair images
Brain tumors pose a significant health concern globally, with their detection and diagnosis being crucial for timely intervention and treatment planning. These abnormal growths can develop within the brain or ...
-
Article
Fire danger forecasting using machine learning-based models and meteorological observation: a case study in Northeastern China
Wildfire is one of the primary natural disturbance agents in the forests of China. The forecast of fire danger is critically important to assist stakeholders to avoid and mitigate wildfire-induced hazards and ...
-
Article
Development of a parking system based on learning automata
Rapid growth of urban population and unplanned urbanization are reducing the number of urban parking spaces and increase traffic congestion. In China, due to the tripling of the number of motor vehicles in the...
-
Article
Incorporating self-attentions into robust spatial-temporal graph representation learning against dynamic graph perturbations
This paper proposes a Robust Spatial-Temporal Graph Neural Network (RSTGNN), which overcomes the limitations faced by graph-based models against dynamic graph perturbations using robust spatial-temporal self-a...
-
Article
MSF-YOLO: A multi-scale features fusion-based method for small object detection
Small object detection has been widely used in real-world applications, such as small object detection from the perspective of UAVs and industrial inspection to locate small defects visible on the surface of m...
-
Article
Improved optimal foraging algorithm for global optimization
The optimal foraging algorithm (OFA) is a swarm-based algorithm motivated by animal behavioral ecology theory. When solving complex optimization problems characterized by multiple peaks, OFA is easy to get tra...
-
Article
An ant colony path planning optimization based on opposition-based learning for AUV in irregular regions
Aiming at the problems of incomplete path coverage and path redundancy in Autonomous Underwater Vehicle (AUV) path planning, an Ant Colony Path Planning Optimization Based on Opposition-Based Learning (ACPPO-O...
-
Article
A block-based adaptive high fidelity reversible data hiding scheme in interpolation domain
Reversible Data Hiding (RDH) schemes enjoy the accomplishment of achieving high embedding capacity (EC) in interpolation domain. However, most existing methods usually embed the secret data into non-reference ...
-
Article
Semantically realizing discovery and composition for RESTful web services
The processes of service discovery and composition are crucial tasks in application development driven by Web Services. However, with RESTful Web Service replacing SOAP-based Web Service as the dominant servic...
-
Article
Saver: a proactive microservice resource scheduling strategy based on STGCN
As container technology and microservices mature, applications increasingly shift to microservices and cloud deployment. Growing microservices scale complicates resource scheduling. Traditional methods, based ...
-
Article
CCIM-SLR: Incomplete multiview co-clustering by sparse low-rank representation
Clustering incomplete multiview data in real-world applications has become a topic of recent interest. However, producing clustering results from multiview data with missing views and different degrees of miss...
-
Article
CSMB-VSS: video scene segmentation with cosine similarity matrix
Video scene segmentation is a crucial step in video structural analysis, which divides a long video into discrete scenes, each consisting of a series of semantically coherent shots. The purpose of video scene ...
-
Article
Progressive secret image sharing based on Boolean operations and polynomial interpolations
With the expansion of network bandwidth and the rise of social networks, image sharing on open networks has become a trend. The ensuing privacy leakage events have aroused widespread concerns. Therefore, image...
-
Article
Integrating self-organizing feature map with graph convolutional network for enhanced superpixel segmentation and feature extraction in non-Euclidean data structure
Deep learning has been widely used on Euclidean data type, and the deep learning architecture has made a breakthrough by the development of technology. The common neural network architectures include Deep Neur...
-
Article
A multi-lesion segmentation method for diabetic retinopathy based on location information guidance
In order to solve the problem that the segmentation model does not pay enough attention to the lesion information and loses the lesion information, this paper proposes the MLS-Net (Multiple-Lesions-Segmentatio...
-
Article
Human identification based on sphenoid sinus in point cloud with geometric self-attention network
Human identification is a crucial element in forensic medicine to identify unknown bodies. As a unique anatomical feature of the human body, the sphenoid sinus has been used for human identification due to its...
-
Article
Traffic flow prediction based on graph convolutional networks with a parallel attention network and stacked gate recurrent units
Accurate traffic flow prediction is essential to address traffic issues and assist traffic managers make informed decisions in intelligent transportation systems. Extracting potential features from traffic dat...
-
Article
Enhancing network security with information-guided-enhanced Runge Kutta feature selection for intrusion detection
Intrusion detection system (IDS) classify network traffic as either threatening or normal based on data features, aiming to identify malicious activities attempting to compromise computer systems. However, the...
-
Article
NResNet: nested residual network based on channel and frequency domain attention mechanism for speaker verification in classroom
With the development of deep learning technology, the pattern of artificial intelligence in education has attracted more and more attention. However, most of the existing verbal interaction analysis methods ut...