Loading [MathJax]/extensions/MathMenu.js
Shan Jiang - IEEE Xplore Author Profile

Showing 1-5 of 5 results

Results

Low-light image enhancement technology is mainly used to process the images which are taken under the conditions of short exposure time of the device or dark ambient light. Aiming at the effective enhancement of the brightness of images and the preservation of the details as well, a light enhancement algorithm based on Retinex is proposed. First of all, a decomposition network is built based on Co...Show More
Beetle Antennae Search Algorithm (BAS) is a new single-agent intelligent optimization algorithm, which low computational complexity, ease of implementation and fast convergence speed in low-dimensional function optimization. Based on BAS, this paper proposes Adaptive and Parallel Beetle Antennae Optimization Algorithm (APBAO), which evolves from a single iterative individual in BAS to multiple par...Show More
Images captured in low-light settings often manifest issues, notably reduced brightness and amplified noise. Addressing these concerns, our research elucidates a sophisticated technique crafted to enhance the fidelity of images taken under such adverse circumstances. During the image acquisition phase, the camera sensor meticulously logs the raw RGB data. This information subsequently undergoes a ...Show More
Multi-modality sentiment analysis in the Social Internet of Things (SIoT) is an emerging area of study. The integration of information from different modalities is the essence of multi-modal sentiment analysis tasks. In social networks, there is often a correspondence between the text and images within a comment. Users tend to use emotionally charged words to describe the subjects in the images. T...Show More
Nowadays, image tampering technology is becoming more and more mature, tampered images have posed a serious threat to personal privacy, social order, and national security, so techniques for detecting and locating tampered areas in an image are gaining attention. Most existing methods use convolutional blocks to build networks to accomplish this task, without considering the local receptive fields...Show More