Advanced search in
Research products
arrow_drop_down
Searching FieldsTerms
Field of Science [Beta]
arrow_drop_down
is
arrow_drop_down
software engineering
Include:

Filters

151,463 Research products, page 1 of 3,030

50
arrow_drop_down
Relevance
arrow_drop_down
  • Closed Access
    Authors: 
    Hicham Amakdouf; Amal Zouhri; Mostafa El Mallahi; Hassan Qjidaa;
    Publisher: Springer Science and Business Media LLC

    In this work, we suggest a new set of quaternion discrete radial Krawtchouk moments (QDRKMs) for color image reconstruction and classification. These new discrete moments are represented over a disk by using discrete orthogonal radial Krawtchouk moments. The use of Quat...

  • Authors: 
    D. Naveen Kumar; B. Leela Kumari;
    Publisher: IEEE

    Target tracking is one among the foremost aspects usually utilized in microwave radar applications, police investigation, communication, embedded systems, etc. In particular, tracking is crucial in single as well as multiple object environments. The target Motion is ana...

  • Closed Access
    Authors: 
    Ifrah Afzal; Shabir A. Parah; Nasir N. Hurrah; Oh-Young Song;
    Publisher: Springer Science and Business Media LLC

    Electronic Health Record, which comprises of medical imagery, patient history, prescription and clinical observations is a highly sensitive data. This data is not generally sent over the network in its original form as it is prone to numerous security related issues. Ge...

  • Open Access
    Authors: 
    Yiwei Zhao; Han Liu; Igor Borovikov; Ahmad Beirami; Maziar Sanjabi; Kazi Atif-Uz Zaman;
    Publisher: Association for Computing Machinery (ACM)

    Achieving highly detailed terrain models spanning vast areas is crucial to modern computer graphics. The pipeline for obtaining such terrains is via amplification of a low-resolution terrain to refine the details given a desired theme, which is a time-consuming and labo...

  • Closed Access
    Authors: 
    Xiaoai Dai; Xuwei He; Shouheng Guo; Senhao Liu; Fujiang Ji; Huihua Ruan;
    Publisher: Springer Science and Business Media LLC

    Hyper-spectral image can provide precise information on land surface targets identification and classification thanks to its advanced feature on spectral resolution. However, due to its complicated hyper-dimension data structure, greater challenge is put on the conventi...

  • Closed Access
    Authors: 
    Achmad Abdurrazzaq; Ahmad Kadri Junoh; Zainab Yahya; Ismail Mohd;
    Publisher: Springer Science and Business Media LLC

    Segmentation technique is a commonly used method to detect white blood cells. The segmentation technique aims to separate the blood image into several parts based on the similarity of features in the image. Therefore, the detection results do not completely contain whit...

  • Authors: 
    Marc Alexa;
    Publisher: Institute of Electrical and Electronics Engineers (IEEE)

    We consider the problem of approximating given shapes so that the surface normals are restricted to a prescribed discrete set. Such shape approximations are commonly required in the context of manufacturing shapes. We provide an algorithm that first computes maximal int...

  • Authors: 
    Sun Lijuan; Wang Shujuan; Wang Yanli;
    Publisher: IEEE

    This paper, based on the research of the object-oriented software testing technology and the J2EE architecture, generates the testing strategies for the Web system based on the J2EE Platform. It presents a two-layer testing strategy in which unit testing and acceptance ...

  • Closed Access
    Authors: 
    Deng-Shun Yang; Chun-Yu Liu; Wei-Hao Liao; Shanq-Jang Ruan;
    Publisher: Springer Science and Business Media LLC

    The abnormal event detection becomes an important topic recently. This paper presents a method to detect the crowd gathering, as well as the commotion event after the crowd gathering. The proposed stillness model and the motion model are based on the improved background...

  • Closed Access
    Authors: 
    Taizhong Wu; Junsheng Zhou; Weiguang Qu; Yanhui Gu; Bin Li; Huilin Zhong; Yunfei Long;
    Publisher: Springer Science and Business Media LLC

    Abstract meaning representations (AMRs) represent sentence semantics as rooted labeled directed acyclic graphs. Though there is a strong correlation between the AMR graph of a sentence and its corresponding dependency tree, the recent neural network AMR parsers do negle...

  • Closed Access
    Authors: 
    Hongyue Xiang; Lingfeng Liu;
    Publisher: Springer Science and Business Media LLC

    Chaos maps are widely used in image encryption systems due to their intrinsic advantages such as extreme sensitivity to initial values., ergodicity and pseudo-randomness. 1D Logistic map has attracted the attention of researchers due to its simple structure and easy imp...

  • Closed Access
    Authors: 
    Han Wang; Kexin Wang; Yuqing Wu; Zhongzhi Wang; Ling Zou;
    Publisher: Springer Science and Business Media LLC

    Video highlight detection is a technique to retrieval short video clips that capture a user’s primary attention or interest within an unedited video. There exists a substantial interest in automatizing highlight detection to facilitate efficient video browsing. Recent r...

  • Closed Access
    Authors: 
    Zheping Yan; Jinzhong Zhang; Jialing Tang;
    Publisher: Springer Science and Business Media LLC

    Multilevel thresholding is a simple and important method for image segmentation in various applications that has drawn widespread attention in recent years. However, the computational complexity increases correspondingly when the threshold levels increase. To overcome t...

  • Publication . Part of book or chapter of book . 2020
    Authors: 
    Jan Kruse;
    Publisher: IGI Global

    The development of software to produce Visual Effects is based on a unique model. The majority of large companies across the film industry have taken a distinctive approach for three decades, which might explain their ongoing business success, despite the same tough con...

  • Closed Access
    Authors: 
    Isabella Biscoglio; Attilio Ciancabilla; Mario Fusani; Giuseppe Lami; Gianluca Trentanni;
    Publisher: Springer International Publishing
    Country: Italy

    Methods and tools for detecting and measuring ambiguity in texts have been proposed for years, yet their efficacy is still under study for improvement, encouraged by results in various application fields (requirements, legal documents, interviews, ...). The paper presen...

  • Closed Access
    Authors: 
    Mukhalad Al-nasrawi; Guang Deng; Waseem Waheed;
    Publisher: Springer Science and Business Media LLC

    The aim of structure extraction is to decompose an image into prominent structures and textures. In this paper, we present a new structure extraction method which has two main steps. First, high-frequency components due to the texture information in the original image a...

  • Closed Access
    Authors: 
    Zhang, Kunlin; Xu, Jihui; Xu, Huaiyu; Su, Ruidan;
    Publisher: Springer Science and Business Media LLC

    Axle is an important part of high-speed train. The axle is the key component connecting the train wheelset, which has a great impact on the train safety. The health monitoring of axles is very important for the safe and smooth operation of trains. The axle health detect...

  • Publication . Article . 2019
    Closed Access
    Authors: 
    Miłosz Makowski; Torsten Hädrich; Jan Scheffczyk; Dominik L. Michels; Sören Pirk; Wojtek Palubicki;
    Publisher: Association for Computing Machinery (ACM)

    Due to the enormous amount of detail and the interplay of various biological phenomena, modeling realistic ecosystems of trees and other plants is a challenging and open problem. Previous research on modeling plant ecologies has focused on representations to handle this...

  • Closed Access
    Authors: 
    Hongbo Gao; Hang Su; Yingfeng Cai; Renfei Wu; Hao Zhengyuan; Yongneng Xu; Wei Wu; Jianqing Wang; Zhijun Li; Zhen Kan;
    Publisher: Springer Science and Business Media LLC

    Cyclist trajectory prediction is of great significance for both active collision avoidance and path planning of intelligent vehicles. This paper presents a trajectory prediction method for the motion intention of cyclists in real traffic scenarios. This method is based ...

  • Open Access
    Authors: 
    Xiaoyu Li; Bo Zhang; Jing Liao; Pedro V. Sander;
    Publisher: Association for Computing Machinery (ACM)

    We propose a novel learning method to rectify document images with various distortion types from a single input image. As opposed to previous learning-based methods, our approach seeks to first learn the distortion flow on input image patches rather than the entire imag...

  • Publication . Article . Preprint . 2019
    Open Access
    Authors: 
    Yifei Yuan; Zhao Yajun; Baiqing Zong; Sergio Parolari;
    Publisher: Springer Science and Business Media LLC

    The standard development of 5G wireless communication culminated between 2017 and 2019, followed by the worldwide deployment of 5G networks, which is expected to result in very high data rate for enhanced mobile broadband, support ultra-reliable and low-latency services...

  • Closed Access
    Authors: 
    Sara Farrag; Wassim Alexan;
    Publisher: Springer Science and Business Media LLC

    Due to its powerful ability to conceal secret data inside an unsuspicious cover object, image steganography has emerged as an active field of research. Recently, a lot of advancements in relation to software and hardware have been carried out, allowing for faster proces...

  • Open Access
    Authors: 
    Kerry A. Seitz; Tim Foley; Serban D. Porumbescu; John D. Owens;
    Publisher: Association for Computing Machinery (ACM)
    Country: United States

    The shader system for a modern game engine comprises much more than just compilation of source code to executable kernels. Shaders must also be exposed to art tools, interfaced with engine code, and specialized for performance. Engines typically address each of these ta...

  • Authors: 
    Tatsiana Viarbitskaya; Andrzej Dobrucki;
    Publisher: IEEE

    The topic of the article is a continuation of the works about violin sound recognition. This paper shows how to achieve higher quality of recorded sound, which is closer to human's subjective perception, using signal processing and algorithms, which consider using violi...

  • Publication . Conference object . 2018
    Closed Access
    Authors: 
    Byron Bashforth; Fernando de Goes; Jacob Kuenzel; Jake Merrell; Athena Xenakis;
    Publisher: ACM

    Coco presented a challenge for the garment shading team. Firstly, the scale of the movie is significant with both the human and skeleton worlds filled with primary, secondary, and background characters. Secondly, the garments speak to a specific culture and our shading ...

  • Closed Access
    Authors: 
    Fan Guo; Weiqing Li; Zhonghao Kuang; Jin Tang;
    Publisher: Springer Science and Business Media LLC

    Glaucoma, diabetic retinopathy, and other eye diseases have seriously threatened people’s visual health. Whether it is clinical diagnosis or computer-aided diagnosis, the accurate segmentation of the retinal tissues and lesion areas (optic disc (OD), optic cup (OC), ret...

  • Closed Access
    Authors: 
    Yong Zhang; Wentao Tu; Kairui Chen; Chun-Ho Wu; Li Li; Wai Hung Ip; Ching Yuen Chan;
    Publisher: Springer Science and Business Media LLC

    Bus passenger flow statistics can be used to improve passenger travelling experience and reduce trip delay, this is very important for intelligent transportation. In this paper, a bus passenger flow statistics algorithm based on SSD (Single Shot MultiBox Detector) and K...

  • Open Access English
    Authors: 
    Safrul Muluk; Habiburrahim Habiburrahim; Siti Rechal Rechal;
    Publisher: Universitas Islam Negeri Ar-Raniry

    Learning style is one of the significant elements in learning process that helps students achieve their learning goals. Nevertheless, students should be aware of their own style in learning which make them maximally enhance learning. Therefore, in study, the researcher ...

  • Closed Access
    Authors: 
    Chang-Soo Sung; Joo Yeon Park;
    Publisher: Springer Science and Business Media LLC

    As the security threat and crime rate have been increased all over the globe, the video surveillance system using closed-circuit television (CCTV) has become an essential tool for many security-related applications and is widely used in many areas as a monitoring system...

  • Open Access
    Authors: 
    Emanuele Pagone; Michail Papanikolaou; Konstantinos Salonitis; Mark Jolly;
    Publisher: Inderscience Publishers
    Country: United Kingdom

    Although a significant body of literature has been devoted to establish metrics capable of measuring the performance of manufacturing systems (including foundries) and their influence on decision-making, there is a scarcity of comprehensive and organic studies on perfor...

  • Publication . Conference object . 2020
    Authors: 
    Jaturong Kongmanee; Phongphun Kijsanayothin; Rattikorn Hewett;
    Publisher: IEEE

    Blockchain is an emerging technology that underlies creation and exchange of the digital assets, including cryptocurrency such as Bitcoin and Ether, without the need for a central authority. It provides a public ledger for recording sequence of transactions in blocks th...

  • Closed Access
    Authors: 
    Sangeeta Dhall; Rinku Sharma; Shailender Gupta;
    Publisher: Springer Science and Business Media LLC

    Recent advances in processing capabilities of hardware devices and 5 g spectrum availability has not only made the life of users heaven but has also instigated intruders to crack the security mechanism easily. Therefore, it is mandatory for the researcher to enhance the...

  • Open Access
    Authors: 
    André Brinkmann; Kathryn Mohror; Weikuan Yu; Philip Carns; Toni Cortes; Scott Klasky; Alberto Miranda; Franz-Josef Pfreundt; Robert Ross; Marc-André Vef;
    Publisher: Springer Science and Business Media LLC
    Countries: Spain, Germany

    Storage backends of parallel compute clusters are still based mostly on magnetic disks, while newer and faster storage technologies such as flash-based SSDs or non-volatile random access memory (NVRAM) are deployed within compute nodes. Including these new storage techn...

  • Publication . Article . 2020
    Closed Access
    Authors: 
    Shaohao Cai; Xiaonan Wang;
    Publisher: Springer Science and Business Media LLC

    Nowadays, most of the traffic in vehicular networks is relevant to content, so the content-to-requester method could be an ideal solution for vehicular content delivery. However, due to the features of vehicular networks such as high mobility, the content-to-requester p...

  • Closed Access
    Authors: 
    P. Mathivanan; A. Balaji Ganesh;
    Publisher: Springer Science and Business Media LLC

    The paper presents a novel QR code based color image steganography to facilitate remote transmission of ECG signal along with patient diagnosis data. The proposed system is configured with two stag...

  • Closed Access
    Authors: 
    Andreas Keler; Jukka M. Krisp;
    Publisher: Springer International Publishing
    Country: Germany

    Floating Car Data (FCD) is GNSS-tracked vehicle movement, includes often large data size and is difficult to handle, especially in terms of visualization. Recently, FCD is often the base for interactive traffic maps for navigation and traffic forecasting. Handling FCD i...

  • Closed Access
    Authors: 
    Masoud Zadghorban Lifkooee; Celong Liu; Yongqing Liang; Yimin Zhu; Xin Li;
    Publisher: Springer Science and Business Media LLC

    We propose a human avatar representation scheme based on intrinsic coordinates, which are invariant to isometry and insensitive to human pose changes, and an efficient pose transfer algorithm that can utilize this representation to reconstruct a human body geometry foll...

  • Closed Access
    Authors: 
    Saptarshi Chakraborty; Dalton Meitei Thounaojam; Nidul Sinha;
    Publisher: Springer Science and Business Media LLC

    The paper proposes a novel video segmentation system with maiden application of CIEDE2000 colour-difference and mean luminace pattern. CIEDE2000 colour-difference uses Lab colour space which is a stable and efficient colour space. The main advantage of Lab colour space ...

  • Closed Access
    Authors: 
    Wang, Huan; Shi, Manshu; Li, Hong;
    Publisher: Springer Science and Business Media LLC

    Infrared small target detection (ISTD) is a critical technique in both civil and military applications such as leak and defect inspection, cell segmentation for medicine analysis, early-warning systems and so on. Over the last decade, numerous ISTD methods have been pro...

  • Closed Access
    Authors: 
    Hongdan Li; Chunyan Han; Huanshui Zhang;
    Publisher: Springer Science and Business Media LLC

    This paper mainly discusses the stabilization problem for discrete-time Markov jump linear systems (MJLSs) involving multiplicative noise with an infinite horizon. The cost weighting matrices are generalized to be indefinite. To the best of our knowledge, this paper is ...

  • Closed Access
    Authors: 
    Michael J. Ryan; Louis S. Wheatcraft;
    Publisher: Wiley
  • Open Access
    Authors: 
    Faraj Alhwarin; Alexander Ferrein; Ingrid Scholl;
    Publisher: SCITEPRESS - Science and Technology Publications
  • Closed Access
    Authors: 
    Zhao, Xun; Wu, Yanhong; Lee, Dik Lun; Cui, Weiwei;
    Publisher: Institute of Electrical and Electronics Engineers (IEEE)

    As an ensemble model that consists of many independent decision trees, random forests generate predictions by feeding the input to internal trees and summarizing their outputs. The ensemble nature of the model helps random forests outperform any individual decision tree...

  • Closed Access
    Authors: 
    Xiaoying Wang; Songhe Feng; Congyan Lang;
    Publisher: Springer Science and Business Media LLC

    Automatic image annotation as a typical multi-label learning problem, has gained extensive attention in recent years owing to its application in image semantic understanding and relevant disciplines. Nevertheless, existing annotation methods share the same challenge tha...

  • Closed Access
    Authors: 
    Su, Wengui; Wang, Xiang; Li, Fu; Shen, Yulong; Pei, Qingqi;
    Publisher: Springer Science and Business Media LLC

    The reversible watermarking algorithm based on pixel value ordering (PVO) embeds secret data by modifying the maximum and minimum values in a pixel block. The performance of this algorithm heavily depends on the inherent correlation among adjacent pixels within an image...

  • Open Access
    Authors: 
    Agnihotri, M.; Rathod, A.; Thapar, D.; Gaurav Jaswal; Tiwari, K.; Nigam, A.;
    Publisher: Scitepress

    Recently, deep hierarchically learned models (such as CNN) have achieved superior performance in various computer vision tasks but limited attention has been paid to biometrics till now. This is major because of the number of samples available in biometrics are limited ...

  • Closed Access
    Authors: 
    P. Gnanasivam; M. S. Sudhakar;
    Publisher: Springer Science and Business Media LLC

    The demand for adaptive image retrieval is still an active research area, particularly in a dynamic environment. Erstwhile retrieval schemes ensure adaptivity by tuning the same image basis with wavelet transforms, in accordance with user’s significance. To enhance adap...

  • Closed Access
    Authors: 
    Ani Brown Mary N; A. Robert Singh; Suganya Athisayamani;
    Publisher: Springer Science and Business Media LLC

    Among the fruit harvest, banana is one of the most significant crops in the international business for yielding the foreign exchange in many African countries. Nowadays, banana leaf diseases are the most significant factors regarding agricultural goods. These diseases r...

  • Closed Access
    Authors: 
    Pellegrin, Luis; Escalante, Hugo Jair; Montes-y-Gómez, Manuel; González, Fabio A.;
    Publisher: Springer Science and Business Media LLC

    Automatic Image Annotation (AIA) is the task of assigning keywords to images, with the aim to describe their visual content. Recently, an unsupervised approach has been used to tackle this task. Unsupervised AIA (UAIA) methods use reference collections that consist of t...

  • Publication . Conference object . 2020
    Open Access
    Authors: 
    Laurens Sion; Katja Tuma; Riccardo Scandariato; Koen Yskout; Wouter Joosen;
    Publisher: IEEE
    Country: Belgium

    Efficiency of security-by-design has become an important goal for organizations implementing software engineering practices such as Agile, DevOps, and Continuous Integration. Software architectures are (often manually) analyzed at design time for potential security desi...