Computers Materials&Continua
- Retinal Vessel Extraction Framework Using Modified Adaboost Extreme Learning Machine
- Dynamic Analysis of a Horizontal Oscillatory Cutting Brush
- Localization Based Evolutionary Routing (LOBER) for Efficient Aggregation in Wireless Multimedia Sensor Networks
- Failure Prediction,Lead Time Estimation and Health Degree Assessment for Hard Disk Drives Using Voting Based Decision Trees
- High Precision SAR ADC Using CNTFET for Internet of Things
- An Efficient Greedy Traffic Aware Routing Scheme for Internet of Vehicles
- GaiaWorld:A Novel Blockchain System Based on Competitive PoS Consensus Mechanism
- Research on Sensor Network Coverage Enhancement Based on Non-Cooperative Games
- Non-Contact Real-Time Heart Rate Measurement Algorithm Based on PPG-Standard Deviation
- Attention-Aware Network with Latent Semantic Analysis for Clothing Invariant Gait Recognition
- An Integrated Suture Simulation System with Deformation Constraint Under A Suture Control Strategy
- Few-Shot Learning with Generative Adversarial Networks Based on WOA13 Data
- Researching the Link Between the Geometric and Rènyi Discord for Special Canonical Initial States Based on Neural Network Method
- An Adaptive Superpixel Tracker Using Multiple Features
- Data Based Violated Behavior Analysis of Taxi Driver in Metropolis in China
- Analyzing Dynamic Change in Social Network Based on Distribution-Free Multivariate Process Control Method
- An Efficient Crossing-Line Crowd Counting Algorithm with Two-Stage Detection
- A Method of Obtaining Catchment Basins with Contour Lines for Foam Image Segmentation
- YATA:Yet Another Proposal for Traffic Analysis and Anomaly Detection
- Three-Dimensional Numerical Analysis of Blast-Induced Damage Characteristics of the e Intact and Jointed Rockmass
- Sentiment Analysis Method Based on Kmeans and Online Transfer Learning
- Tibetan Multi-Dialect Speech and Dialect Identity Recognition
- Privacy-Preserving Quantum Two-Party Geometric Intersection
- Distant Supervised Relation Extraction with Cost-Sensitive Loss
- A DDoS Attack Situation Assessment Method via Optim ized Cloud Model Based on Influence Function
- An Im proved End-to-End Memory Network for QA Tasks