Skip Content
You are currently on the new version of our website. Access the old version .

6,096 Results Found

  • Article
  • Open Access
8 Citations
5,810 Views
17 Pages

Image steganography is a multipurpose-serving key emerging technology that is used for covertly transferring, storing, and governing various digital data, including intellectual properties and copyrights, social media data, multimedia data, and secre...

  • Article
  • Open Access
4 Citations
2,548 Views
10 Pages

20 August 2020

Deep learning methods are gaining popularity in different application domains, and especially in natural language processing. It is commonly believed that using a large enough dataset and an adequate network architecture, almost any processing proble...

  • Article
  • Open Access
6 Citations
1,932 Views
16 Pages

28 March 2024

This paper studies the use of varying threshold in the statistical process control (SPC) of batch processes. The motivation is driven by how when multiple phases are implicated in each repetition, the distributions of the features behind vary with ph...

  • Article
  • Open Access
2 Citations
2,814 Views
33 Pages

An Encoder–Decoder Architecture within a Classical Signal-Processing Framework for Real-Time Barcode Segmentation

  • Óscar Gómez-Cárdenes,
  • José Gil Marichal-Hernández,
  • Jung-Young Son,
  • Rafael Pérez Jiménez and
  • José Manuel Rodríguez-Ramos

3 July 2023

In this work, two methods are proposed for solving the problem of one-dimensional barcode segmentation in images, with an emphasis on augmented reality (AR) applications. These methods take the partial discrete Radon transform as a building block. Th...

  • Article
  • Open Access
8 Citations
3,455 Views
24 Pages

A Novel Real-Time Echo Separation Processing Architecture for Space–Time Waveform-Encoding SAR Based on Elevation Digital Beamforming

  • Jinsong Qiu,
  • Zhimin Zhang,
  • Zhen Chen,
  • Shuo Han,
  • Wei Wang,
  • Yuhao Wen,
  • Xiangrui Meng and
  • Huaitao Fan

4 January 2022

Space–time waveform-encoding (STWE) SAR can receive echoes from multiple sub-swaths simultaneously with a single receive window. The echoes overlap each other in the time domain. To separate the echoes from different directions, traditional schemes a...

  • Article
  • Open Access
2 Citations
2,003 Views
20 Pages

26 April 2024

Faced with the problem of incompatibility between traditional information acquisition mode and spaceborne earth observation tasks, starting from the general mathematical model of compressed sensing, a theoretical model of block compressed sensing was...

  • Article
  • Open Access
7 Citations
6,233 Views
14 Pages

Distinct Episodic Verbal Memory Profiles in Schizophrenia

  • Perrine Brazo,
  • Michaelle Ilongo and
  • Sonia Dollfus

2 April 2013

According to some authors, episodic memory impairment may be a feature shared by all schizophrenic patients, whereas others argue in favor of the mnesic heterogeneity. Our aims were to determine whether patients can be grouped based on according to t...

  • Article
  • Open Access
19 Citations
4,348 Views
20 Pages

Multiplication is an essential image processing operation commonly implemented in hardware DSP cores. To improve DSP cores’ area, speed, or energy efficiency, we can approximate multiplication. We present an approximate multiplier that generates two...

  • Article
  • Open Access
7 Citations
4,256 Views
29 Pages

22 November 2018

A novel compression-based toolkit for modelling and processing natural language text is described. The design of the toolkit adopts an encoding perspective—applications are considered to be problems in searching for the best encoding of differe...

  • Article
  • Open Access
839 Views
19 Pages

20 October 2025

Reflection removal from a single image is an ill-posed problem due to the inherent ambiguity in separating transmission and reflection components from a single composite observation. In this paper, we address this challenge by introducing a reversibl...

  • Article
  • Open Access
988 Views
18 Pages

27 October 2025

Although associative interference has traditionally been attributed to retrieval competition, emerging evidence suggests that interference may also arise from encoding-based representational processes. The present study examined whether retroactive i...

  • Article
  • Open Access
8 Citations
6,469 Views
12 Pages

Background: Heart failure poses a significant global health challenge, with high rates of readmission and mortality. Accurate models to predict these outcomes are essential for effective patient management. This study investigates the impact of data...

  • Article
  • Open Access
4 Citations
4,884 Views
15 Pages

Haze weather deteriorates image quality, causing images to become blurry with reduced contrast. This makes object edges and features unclear, leading to lower detection accuracy and reliability. To enhance haze removal effectiveness, we propose an im...

  • Article
  • Open Access
11 Citations
5,611 Views
22 Pages

30 June 2020

The encoder–decoder architecture is a well-established, effective and widely used approach in many tasks of natural language processing (NLP), among other domains. It consists of two closely-collaborating components: An encoder that transforms...

  • Article
  • Open Access
6 Citations
4,584 Views
24 Pages

Low-Order Spherical Harmonic HRTF Restoration Using a Neural Network Approach

  • Benjamin Tsui,
  • William A. P. Smith and
  • Gavin Kearney

20 August 2020

Spherical harmonic (SH) interpolation is a commonly used method to spatially up-sample sparse head related transfer function (HRTF) datasets to denser HRTF datasets. However, depending on the number of sparse HRTF measurements and SH order, this proc...

  • Article
  • Open Access
7 Citations
3,687 Views
15 Pages

23 May 2024

Auditory temporal processing is a vital component of auditory stream segregation, or the process in which complex sounds are separated and organized into perceptually meaningful objects. Temporal processing can degrade prior to hearing loss, and is s...

  • Article
  • Open Access
6 Citations
5,996 Views
14 Pages

15 March 2022

Third-generation DNA sequencers provided by Oxford Nanopore Technologies (ONT) produce a series of samples of an electrical current in the nanopore. Such a time series is used to detect the sequence of nucleotides. The task of translation of current...

  • Article
  • Open Access
11 Citations
4,300 Views
14 Pages

26 August 2022

The sudden increase in containerization volumes around the globe has increased the overall number of cargo losses, infrastructure damage, and human errors. Most critical losses occur during handling procedures performed by port cranes while sliding t...

  • Article
  • Open Access
2 Citations
1,895 Views
18 Pages

23 October 2024

The patent serves as a vital component of scientific text, and over time, escalating competition has generated a substantial demand for patent analysis encompassing areas such as company strategy and legal services, necessitating fast, accurate, and...

  • Article
  • Open Access
2 Citations
1,850 Views
23 Pages

Advancing Digital Image-Based Recognition of Soil Water Content: A Case Study in Bailu Highland, Shaanxi Province, China

  • Yaozhong Zhang,
  • Han Zhang,
  • Hengxing Lan,
  • Yunchuang Li,
  • Honggang Liu,
  • Dexin Sun,
  • Erhao Wang and
  • Zhonghong Dong

16 April 2024

Soil water content (SWC) plays a vital role in agricultural management, geotechnical engineering, hydrological modeling, and climate research. Image-based SWC recognition methods show great potential compared to traditional methods. However, their ac...

  • Article
  • Open Access
36 Citations
7,572 Views
13 Pages

A New Method of Angle Measurement Error Analysis of Rotary Encoders

  • Hua-Kun Jia,
  • Lian-Dong Yu,
  • Hui-Ning Zhao and
  • Yi-Zhou Jiang

19 August 2019

In this article, a method of error source analysis and detection to improve the angle measurement accuracy of rotary encoders in precision measuring instruments is proposed. The angle measurement error caused by the installation eccentricity of the g...

  • Article
  • Open Access
3,401 Views
14 Pages

Graph variational auto-encoder (GVAE) is a model that combines neural networks and Bayes methods, capable of deeper exploring the influential latent features of graph reconstruction. However, several pieces of research based on GVAE employ a plain pr...

  • Article
  • Open Access
4 Citations
3,400 Views
13 Pages

Full Digital Processing System of Photoelectric Encoder

  • Changhai Zhao,
  • Qiuhua Wan,
  • Lihui Liang and
  • Ying Sun

9 November 2019

A photoelectric signal, output by a photoelectric receiver, may detrimentally change after the photoelectric encoder is used for a period of time or when the environment changes; this will directly affect the accuracy of the encoder and lead to fatal...

  • Article
  • Open Access
35 Citations
4,994 Views
18 Pages

Harris Hawks Sparse Auto-Encoder Networks for Automatic Speech Recognition System

  • Mohammed Hasan Ali,
  • Mustafa Musa Jaber,
  • Sura Khalil Abd,
  • Amjad Rehman,
  • Mazhar Javed Awan,
  • Daiva Vitkutė-Adžgauskienė,
  • Robertas Damaševičius and
  • Saeed Ali Bahaj

21 January 2022

Automatic speech recognition (ASR) is an effective technique that can convert human speech into text format or computer actions. ASR systems are widely used in smart appliances, smart homes, and biometric systems. Signal processing and machine learni...

  • Article
  • Open Access
4 Citations
3,702 Views
15 Pages

2 September 2020

Representation invariance plays a significant role in the performance of deep convolutional neural networks (CNNs) and human visual information processing in various complicated image-based tasks. However, there has been abounding confusion concernin...

  • Article
  • Open Access
41 Citations
11,003 Views
30 Pages

Towards the Natural Language Processing as Spelling Correction for Offline Handwritten Text Recognition Systems

  • Arthur Flor de Sousa Neto,
  • Byron Leite Dantas Bezerra and
  • Alejandro Héctor Toselli

31 October 2020

The increasing portability of physical manuscripts to the digital environment makes it common for systems to offer automatic mechanisms for offline Handwritten Text Recognition (HTR). However, several scenarios and writing variations bring challenges...

  • Article
  • Open Access
4 Citations
2,546 Views
21 Pages

30 August 2023

Language acquisition depends on the ability to process and learn probabilistic information, often through the integration of performance feedback. Children with developmental language disorder (DLD) have demonstrated weaknesses in both probabilistic...

  • Article
  • Open Access
55 Views
14 Pages

One of the most harmful and deceptive forms of cybercrime is phishing, which targets users with malicious emails and websites. In this paper, we focus on the use of natural language processing (NLP) techniques and transformer models for phishing emai...

  • Article
  • Open Access
3 Citations
1,466 Views
20 Pages

30 October 2024

Maintaining the reliability of rotating machinery in industrial environments entails significant challenges. The objective of this paper is to develop a methodology that can accurately predict the condition of rotating machinery in order to facilitat...

  • Article
  • Open Access
1 Citations
1,184 Views
19 Pages

13 December 2024

The Rare Earth Extraction Process (REEP) model is difficult to accurately establish via the extraction mechanism method due to its high complexity. This paper proposes a multi-branch deep feature fusion network with SAE (SAE-MBDFFN) for modeling REEP...

  • Article
  • Open Access
8 Citations
2,821 Views
11 Pages

3 June 2023

Contextual representation has taken center stage in Natural Language Processing (NLP) in the recent past. Models such as Bidirectional Encoder Representations from Transformers (BERT) have found tremendous success in the arena. As a first attempt in...

  • Article
  • Open Access
50 Citations
31,497 Views
26 Pages

15 October 2023

Email phishing is a widespread cyber threat that can result in the theft of sensitive information and financial loss. It uses malicious emails to trick recipients into providing sensitive information or transferring money, often by disguising themsel...

  • Article
  • Open Access
59 Citations
5,452 Views
18 Pages

13 July 2021

To better understand the behavior of attackers and describe the network state, we construct an LSTM-DT model for network security situation awareness, which provides risk assessment indicators and quantitative methods. This paper introduces the conce...

  • Article
  • Open Access
13 Citations
5,225 Views
25 Pages

18 January 2022

Similarity-based retrieval of semantic graphs is a core task of Process-Oriented Case-Based Reasoning (POCBR) with applications in real-world scenarios, e.g., in smart manufacturing. The involved similarity computation is usually complex and time-con...

  • Article
  • Open Access
3 Citations
1,625 Views
27 Pages

Contrastive Transformer Network for Track Segment Association with Two-Stage Online Method

  • Zongqing Cao,
  • Bing Liu,
  • Jianchao Yang,
  • Ke Tan,
  • Zheng Dai,
  • Xingyu Lu and
  • Hong Gu

11 September 2024

Interrupted and multi-source track segment association (TSA) are two key challenges in target trajectory research within radar data processing. Traditional methods often rely on simplistic assumptions about target motion and statistical techniques fo...

  • Article
  • Open Access
12 Citations
3,950 Views
19 Pages

End-to-End Deep Convolutional Recurrent Models for Noise Robust Waveform Speech Enhancement

  • Rizwan Ullah,
  • Lunchakorn Wuttisittikulkij,
  • Sushank Chaudhary,
  • Amir Parnianifard,
  • Shashi Shah,
  • Muhammad Ibrar and
  • Fazal-E Wahab

13 October 2022

Because of their simple design structure, end-to-end deep learning (E2E-DL) models have gained a lot of attention for speech enhancement. A number of DL models have achieved excellent results in eliminating the background noise and enhancing the qual...

  • Article
  • Open Access
23 Citations
4,817 Views
26 Pages

Utilizing Large Language Models to Illustrate Constraints for Construction Planning

  • Chuanni He,
  • Bei Yu,
  • Min Liu,
  • Lu Guo,
  • Li Tian and
  • Jianfeng Huang

14 August 2024

Effective construction project planning relies on addressing constraints related to materials, labor, equipment, and others. Planning meetings are typical venues for stakeholders to identify, communicate, and remove constraints. However, a critical g...

  • Article
  • Open Access
15 Citations
4,083 Views
20 Pages

Frequency Selective Auto-Encoder for Smart Meter Data Compression

  • Jihoon Lee,
  • Seungwook Yoon and
  • Euiseok Hwang

22 February 2021

With the development of the internet of things (IoT), the power grid has become intelligent using massive IoT sensors, such as smart meters. Generally, installed smart meters can collect large amounts of data to improve grid visibility and situationa...

  • Article
  • Open Access
7 Citations
3,802 Views
18 Pages

25 March 2025

Natural Language Processing (NLP) and advanced acoustic analysis have opened new avenues in animal welfare research by decoding the vocal signals of farm animals. This study explored the feasibility of adapting a large-scale Transformer-based model,...

  • Article
  • Open Access
6 Citations
3,762 Views
17 Pages

14 November 2023

Variational auto-encoders (VAE) have been widely used in process modeling due to the ability of deep feature extraction and noise robustness. However, the construction of a supervised VAE model still faces huge challenges. The data generated by the e...

  • Brief Report
  • Open Access
32 Citations
4,710 Views
10 Pages

Evaluation of the Function of the ASFV KP177R Gene, Encoding for Structural Protein p22, in the Process of Virus Replication and in Swine Virulence

  • Elizabeth A. Vuono,
  • Elizabeth Ramirez-Medina,
  • Sarah Pruitt,
  • Ayushi Rai,
  • Nallely Espinoza,
  • Lauro Velazquez-Salinas,
  • Douglas P. Gladue and
  • Manuel V. Borca

26 May 2021

African swine fever virus (ASFV) causes a devastating disease of swine that has caused outbreaks in Central Europe since 2007, spreading into Asia in 2018. ASFV is a large, structurally complex virus with a large dsDNA genome encoding for more than 1...

  • Article
  • Open Access
3 Citations
2,658 Views
18 Pages

9 October 2021

Modern industrial mining and mineral processing applications are characterized by large volumes of historical process data. Hazardous events occurring in these processes compromise process safety and therefore overall viability. These events are reco...

  • Article
  • Open Access
767 Views
17 Pages

A Novel Reconfigurable Vector-Processed Interleaving Algorithm for a DVB-RCS2 Turbo Encoder

  • Moshe Bensimon,
  • Ohad Boxerman,
  • Yehuda Ben-Shimol,
  • Erez Manor and
  • Shlomo Greenberg

Turbo Codes (TCs) are a family of convolutional codes that provide powerful Forward Error Correction (FEC) and operate near the Shannon limit for channel capacity. In the context of modern communication systems, such as those conforming to the DVB-RC...

  • Article
  • Open Access
5 Citations
3,435 Views
26 Pages

JSCC-Cast: A Joint Source Channel Coding Video Encoding and Transmission System with Limited Digital Metadata

  • Jose Balsa,
  • Óscar Fresnedo,
  • José A. García-Naya,
  • Tomás Domínguez-Bolaño and
  • Luis Castedo

16 September 2021

This work considers the design and practical implementation of JSCC-Cast, a comprehensive analog video encoding and transmission system requiring a reduced amount of digital metadata. Suitable applications for JSCC-Cast are multicast transmissions ov...

  • Article
  • Open Access
3,135 Views
17 Pages

16 February 2025

Developing robust and reliable models for Named Entity Recognition (NER) in the Russian language presents significant challenges due to the linguistic complexity of Russian and the limited availability of suitable training datasets. This study introd...

  • Article
  • Open Access
3 Citations
1,916 Views
12 Pages

9 January 2024

Working with the literary heritage of writers requires the studying of a large amount of materials. Finding them can take a considerable amount of time even when using search engines. The solution to this problem is to create a linked corpus of liter...

  • Article
  • Open Access
50 Citations
12,197 Views
24 Pages

25 March 2023

In recent decades, the Variational AutoEncoder (VAE) model has shown good potential and capability in image generation and dimensionality reduction. The combination of VAE and various machine learning frameworks has also worked effectively in differe...

  • Article
  • Open Access
9 Citations
3,251 Views
22 Pages

MISF2 Encodes an Essential Mitochondrial Splicing Cofactor Required for nad2 mRNA Processing and Embryo Development in Arabidopsis thaliana

  • Tan-Trung Nguyen,
  • Corinne Best,
  • Sofia Shevtsov,
  • Michal Zmudjak,
  • Martine Quadrado,
  • Ron Mizrahi,
  • Hagit Zer,
  • Hakim Mireau and
  • Oren Ostersetzer-Biran

28 February 2022

Mitochondria play key roles in cellular energy metabolism in eukaryotes. Mitochondria of most organisms contain their own genome and specific transcription and translation machineries. The expression of angiosperm mtDNA involves extensive RNA-process...

  • Article
  • Open Access
15 Citations
4,367 Views
20 Pages

Policy-Gradient and Actor-Critic Based State Representation Learning for Safe Driving of Autonomous Vehicles

  • Abhishek Gupta,
  • Ahmed Shaharyar Khwaja,
  • Alagan Anpalagan,
  • Ling Guan and
  • Bala Venkatesh

22 October 2020

In this paper, we propose an environment perception framework for autonomous driving using state representation learning (SRL). Unlike existing Q-learning based methods for efficient environment perception and object detection, our proposed method ta...

  • Article
  • Open Access
18 Citations
6,076 Views
16 Pages

Comparative Evaluation of NLP-Based Approaches for Linking CAPEC Attack Patterns from CVE Vulnerability Information

  • Kenta Kanakogi,
  • Hironori Washizaki,
  • Yoshiaki Fukazawa,
  • Shinpei Ogata,
  • Takao Okubo,
  • Takehisa Kato,
  • Hideyuki Kanuka,
  • Atsuo Hazeyama and
  • Nobukazu Yoshioka

27 March 2022

Vulnerability and attack information must be collected to assess the severity of vulnerabilities and prioritize countermeasures against cyberattacks quickly and accurately. Common Vulnerabilities and Exposures is a dictionary that lists vulnerabiliti...

of 122