[PDF][PDF] Abnormal Crowd Behavior Detection Using Optimized Pyramidal Lucas-Kanade Technique

G Rajasekaran, J Raja Sekar - Intelligent Automation & Soft …, 2023 - cdn.techscience.cn
Abnormal behavior detection is challenging and one of the growing research areas in
computer vision. The main aim of this research work is to focus on panic and escape …

[PDF][PDF] Improved Lightweight Deep Learning Algorithm in 3D Reconstruction.

T Zhang, Y Cao - Computers, Materials & Continua, 2022 - cdn.techscience.cn
The three-dimensional (3D) reconstruction technology based on structured light has been
widely used in the field of industrial measurement due to its many advantages. Aiming at the …

Evolutionary Neural Architecture Search and Its Applications in Healthcare

X Liu, J Li, J Zhao, B Cao, R Yan, Z Lyu - CMES-Computer Modeling …, 2024 - diva-portal.org
Most of the neural network architectures are based on human experience, which requires a
long and tedious trial-and-error process. Neural architecture search (NAS) attempts to detect …

[PDF][PDF] Chinese news text classification based on convolutional neural network

H Wang, X Li - Journal on Big Data, 2022 - cdn.techscience.cn
With the explosive growth of Internet text information, the task of text classification is more
important. As a part of text classification, Chinese news text classification also plays an …

Recent Trends in Neural Architecture Search Systems

S Ali, MA Wani - 2022 21st IEEE International Conference on …, 2022 - ieeexplore.ieee.org
Explosive research has been done on Neural Architecture Search (NAS) to automatically
create high-performing neural architectures. The majority of the architectures in use today …

Continuous Weighted Neural Cognitive Diagnosis Method for Online Education

S Wang, P Fu, M Fu, B Li, B Zhang, Z Chen… - … Conference on Artificial …, 2022 - Springer
With the rapid development of online education, extensive data records from online
education are accumulated in large quantities, therefore the educational evaluation industry …

HuntFlow: Search the Arithmetic Vulnerability in Ethereum Smart Contract

K Zhou, J Cheng, L Liu, VS Sheng - International Conference on Artificial …, 2022 - Springer
With the development of blockchain technology, smart contracts have been applied in more
and more industries. Smart contracts are immutable once deployed, so unaudited smart …

A Comprehensive Utilization Model of Informationization Teaching Resources

H Jin, M Jiang, S Chen, Y Jiang, X Liu… - … Conference on Artificial …, 2022 - Springer
The rapid development, popularization, and application of new-generation information
technologies such as the Internet of things, big data, artificial intelligence, and cloud …

A cross-domain trust model of smart city IoT based on self-certification

Y Wang, Y Wang, Z Ning, M Waqas - 2023 - ro.ecu.edu.au
Smart city refers to the information system with Internet of things and cloud computing as the
core technology and government management and industrial development as the core …

Applications in Medical Technology for Optimized Convolutional Neural Network Using Differential Evolutionary Algorithm

VS Buradkar, A Ambhaikar - International Conference on Communication …, 2023 - Springer
Overall, in the world, most deaths are caused by heart attacks and cancer. Development in
medical imaging technology using deep learning algorithms and optimizers is becoming …