Line segment detection is a fundamental procedure in computervision, pattern recognition, and image analysis applications. the paper proposes a novel method for wide line segment detection especially endpoints determ...
详细信息
Waste is causing a serious environmental problem. Waste management and circular economy offers a best alternative for preserving the environment and protecting nature resources. this paper presents an AI-based system ...
详细信息
In recent years, the agricultural sector has encountered major challenges due to the widespread presence of plant leaf diseases, which pose serious risks to crop yields and food security. Advancements in artificial in...
详细信息
Given the exponential growth of global data, research attention has increasingly focused on content-based image retrieval. While deep learning has optimized computervision tasks, existing image search tools continue ...
详细信息
To build a smarter and safer city, a secure, efficient, and sustainable transportation system is a key requirement. the autonomous driving system (ADS) plays an important role in the development of smart transportatio...
详细信息
this research introduces "Jaddah,"an innovative AI-based system for the automated detection of road infrastructure defects using advanced computervision and machine learning techniques. the system addresses...
详细信息
the integration of human-robot interaction (HRI) technologies with industrial automation has become increasingly essential for enhancing productivity and safety in manufacturing environments. In this paper, we propose...
详细信息
India's primary industry, agriculture, accounts for the majority of the country's GDP. Weed growth is one of the primary factors that lowers agricultural productivity. In the field, the combination of machine ...
详细信息
Event cameras, inspired by biological vision, are asynchronous sensors that detect changes in brightness. they offer notable advantages in environments characterized by high-speed motion, low lighting, or wide dynamic...
详细信息
the proceedings contain 23 papers. the special focus in this conference is on Security and Privacy in New Computing Environments. the topics include: Consortium Blockchain Storage Optimization Based on60;Fountain C...
ISBN:
(纸本)9783031736988
the proceedings contain 23 papers. the special focus in this conference is on Security and Privacy in New Computing Environments. the topics include: Consortium Blockchain Storage Optimization Based on Fountain Codes;an Incentive Mechanism and An Offline Trajectory Publishing Algorithm Considering Sensing Area Coverage Maximization and Participant Privacy Level;Research on Face Recognition System Based on RLWE Homomorphic Encryption;feedback Feed-Forward Iterative Learning Control for Non-affine Nonlinear Discrete-Time Systems with Varying Trail Lengths;open-Closed-Loop Iterative Learning Control Based on Differential Evolution Algorithm for Nonlinear System;overview of Vehicle Edge Computing and Its Security;conFlow: Contrast Network Flow Improving Class-Imbalanced Learning in Network Intrusion Detection;anomaly Detection of Unstable Log Data Based on Contrastive Learning;An Integration-Enhanced ZNN Approach for Chaotic Combination Synchronization with External Disturbances∗;a Lightweight Anomaly Detection Method for Industrial Processes Based on Event Correlation Behavior;a Novel Polar Code-Based Key Encapsulation Mechanism with Non-permutation Equivalent Public Key;two-Stage Multi-lingual Speech Emotion Recognition for Multi-lingual Emotional Speech Synthesis;EncoderMU: Machine Unlearning in Contrastive Learning;NoCrypto: A Web Mining Behavior Detection Method Based on RGB images;image Copy-Move Forgery Detection in the Social Media Based on a Prior Density Clustering and the Point Density;detection of Speech Spoofing Based on Dense Convolutional Network;speech Emotion Recognition Based on Recurrent Neural Networks with Conformer for Emotional Speech Synthesis;Route Privacy-Preserving Authentication Scheme Based on PUF in VANETs;Stable NICE Model-Based Picture Generation for Generative Steganography;computer-Generated image Forensics Based on vision Transformer with Forensic Feature Pre-processing Module;VoIP Steganalysis Using Shallow Multiscale Convolution and
暂无评论