![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
36,384 Result(s)
-
Chapter and Conference Paper
Design of a Rotating Inverted Pendulum Control System Based on Qube-Servo2
In this paper, based on the Qube-Serco2 rotating inverted pendulum system, the mathematical model and state space expression are established, and a stable pendulum control algorithm based on BP neural network ...
-
Chapter and Conference Paper
Trend and Methods of IoT Sequential Data Outlier Detection
In recent years, the state has made great efforts to develop the transportation industry. With the continuous expansion of the transportation network and the large-scale increase of vehicles, traffic congestio...
-
Chapter and Conference Paper
A Refined Hardness Estimation of LWE in Two-Step Mode
Recently, researchers have proposed many LWE estimators, such as lattice-estimator (Albrecht et al, Asiacrypt 2017) and leaky-LWE-Estimator (Dachman-Soled et al, Crypto 2020), while the latter has already been...
-
Chapter
Introduction
Data, which refers to transmittable and storable computer information, has been an integral part of modern society ever since the invention of computers. Especially in the past decade, its indispensable role in v...
-
Chapter and Conference Paper
Approval-Based Participatory Budgeting with Donations
Participatory budgeting (PB) is a democratic process that allows voters to directly participate in the decision-making process regarding budget spending. The process typically involves presenting voters with a...
-
Chapter
Coverage Dynamics: Modeling and Analysis of Data Coverage in Heterogeneous Edge Networks
Our study in the previous chapter revealed the lifetime of mobile data in large networks, to address the when question. In this chapter, we shift gear to another important aspect of mobile data, that is, the wher...
-
Chapter and Conference Paper
FRBBM-Scheme: A Flexible Ratio Virtual Primary Key Generation Approach Based on Binary Matching
The protection of database watermarking techniques based on primary key (PK) is weakened by potential PK attacks and their huge impact. Using virtual primary key (VPK) schemes is an effective solution to enhan...
-
Chapter and Conference Paper
Image Segmentation Algorithm Based on Improved U-Net for Mineral Froth Flotation Process
The froth size distribution in mineral flotation production is closely tied to production indicators. Therefore, accurate segmentation of froth images is of great significance for optimizing and controlling th...
-
Chapter
Spectrum Dynamics: Modeling, Analysis, and Design of Spectrum Activity Surveillance in DSA-Enabled Systems
In the previous chapter, we discussed the impact on network resource by data movements in the offloading process, but it is still not clear how to observe such impact. This is especially true for the spectrum res...
-
Chapter and Conference Paper
Research and Application of Offline Log Analysis Method for E-commerce Based on HHS
Today, with the rapid development of Internet technology, the storage, analysis and mining of massive data have become an important technical topic in the era of information explosion. The big data technology ...
-
Chapter and Conference Paper
Attribution Guided Layerwise Knowledge Amalgamation from Graph Neural Networks
Knowledge Amalgamation (KA), aiming to transfer knowledge from multiple well-trained teacher networks to a multi-talented and compact student, is gaining attention due to its crucial role in resource-constrain...
-
Chapter and Conference Paper
Decoding Policy Directives: An Empirical Study on the Influence of Central Policy Signals on Local Environmental Regulation Behavior
Central policy texts are crucial instruments utilized by the central government for communicating policy directions, guiding behavior, and administering societal affairs. Analyzing central policy texts helps t...
-
Chapter and Conference Paper
A Modified Two_Arch2 Based on Reference Points for Many-Objective Optimization
Many-objective optimization problems (MaOPs) refer to those multi-objective problems (MOPs) having more than three objectives. For MaOPs, the performance of most multi-objective evolutionary algorithms (MOEAs)...
-
Chapter and Conference Paper
Zero-Shot Medical Information Retrieval via Knowledge Graph Embedding
In the era of the Internet of Things (IoT), the retrieval of relevant medical information has become essential for efficient clinical decision-making. This paper introduces MedFusionRank, a novel approach to z...
-
Chapter and Conference Paper
FAI: A Fraudulent Account Identification System
Fraudulent account detection is essential for businesses and online Internet enterprises, which can help to avoid financial loss and improve user experience. However, conventional solutions suffer from two mai...
-
Chapter and Conference Paper
Dual-Stream Context-Aware Neural Network for Survival Prediction from Whole Slide Images
Whole slide images (WSI) encompass a wealth of information about the tumor micro-environment, which holds prognostic value for patients’ survival. While significant progress has been made in predicting patient...
-
Chapter and Conference Paper
Classification Method for Ship-Radiated Noise Based on Joint Feature Extraction
In order to address the problem of poor recognition performance from single signal features in ship identification and to enhance the accuracy of Convolutional Neural Networks (CNNs) in underwater acoustic tar...
-
Chapter and Conference Paper
Optimization of Takagi-Sugeno-Kang Fuzzy Model Based on Differential Evolution with Lévy Flight
In this article, a novel evolutionary algorithm called differential evolution with Lévy flight (DEFL) algorithm was proposed to optimize the Takagi-Sugeno-Kang fuzzy model (TSK fuzzy model) by finding the opti...
-
Chapter and Conference Paper
Task Offloading Method for Industrial Internet of Things (IIoT) Targeting Computational Resource Management
In the context of industrial scenarios, devices exhibit specificity and task arrival rates vary over time. Considering real-world task queuing issues and incorporating edge computing offloading and D2D offload...
-
Chapter and Conference Paper
Joint Training or Not: An Exploration of Pre-trained Speech Models in Audio-Visual Speaker Diarization
The scarcity of labeled audio-visual datasets is a constraint for training superior audio-visual speaker diarization systems. To improve the performance of audio-visual speaker diarization, we leverage pre-tra...