![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
1,005 Result(s)
-
Chapter and Conference Paper
A Survey of Routing Protocols for WSNs in Smart Farming Applications
Wireless sensor networks (WSNs) are used in various applications ranging from military to home automation and smart farming. WSNs are deployed to sense the environment so that decision-management systems can ...
-
Chapter and Conference Paper
Combining Artificial Intelligence and Edge Computing to Reshape Distance Education (Case Study: K-12 Learners)
Nowadays, the use of distance learning is increasing, especially with the recent Covid-19 pandemic. To improve e-learning and maximise its effectiveness, artificial intelligence (AI) is used to analyse learnin...
-
Chapter and Conference Paper
Characterization of the State of Health of Electronic Devices for Fostering Safety and Circular Economy
Inspired by the concept of the health of the human body, the state of health (SoH) determination of products has been gaining importance for preventive maintenance and product lifetime extension. In electronic...
-
Chapter and Conference Paper
ImageCLEF 2022: Multimedia Retrieval in Medical, Nature, Fusion, and Internet Applications
ImageCLEF s part of the Conference and Labs of the Evaluation Forum (CLEF) since 2003. CLEF 2022 will take place in Bologna, Italy. ImageCLEF is an ongoing evaluation initiative which promotes the evaluation ...
-
Chapter and Conference Paper
ICU Mortality Prediction Using Long Short-Term Memory Networks
Extensive bedside monitoring in Intensive Care Units (ICUs) has resulted in complex temporal data regarding patient physiology, which presents an upscale context for clinical data analysis. In the other hand, ...
-
Chapter and Conference Paper
Morphological Analysis for Design Science Research: The Case of Human-Drone Collaboration in Emergencies
Drones are becoming pervasive in private and professional settings. The engineering of human-drone collaboration poses unique challenges. Specifically, drones’ distinctive capabilities yield a vast design spac...
-
Chapter and Conference Paper
Kaspar Causally Explains
The Kaspar robot has been used with great success to work as an education and social mediator with children with autism spectrum disorder. Enabling the robot to automatically generate causal explanations is ke...
-
Chapter and Conference Paper
The INTERSECT Open Federated Architecture for the Laboratory of the Future
A federated instrument-to-edge-to-center architecture is needed to autonomously collect, transfer, store, process, curate, and archive scientific data and reduce human-in-the-loop needs with (a) common interfa...
-
Chapter and Conference Paper
Modeling Long-Range Travelling Times with Big Railway Data
Big Railway Data, such as train movement logs and timetables, have become increasingly available. By analyzing these data, insights about train movement and delay can be extracted, allowing train operators to ...
-
Chapter and Conference Paper
IiCE: A Proposed System Based on IoTaaS to Study Administrative Efficiency in Primary Schools
Although many studies are conducted for ICT systems for educational organisations, there is a lack of understanding of ICT systems’ usage for school administration. Infrastructure IT support Communication Exp...
-
Chapter and Conference Paper
Threat Modeling of Cyber-Physical Systems in Practice
Traditional Cyber-physical Systems (CPSs) were not built with cybersecurity in mind. They operated on separate Operational Technology (OT) networks. As these systems now become more integrated with Informatio...
-
Chapter and Conference Paper
A Comprehensive Study on the Energy Efficiency of IoT from Four Angles: Clustering and Routing in WSNs, Smart Grid, Fog Computing and MQTT & CoAP Application Protocols
The Internet of things (IoT) technologies have been develo** since their inception. Consequently, the number of connected devices increases yearly. The development of IoT devices has to be set, taking into c...
-
Chapter and Conference Paper
How Byzantine is a Send Corruption?
Consensus protocols enable n parties, each holding some input string, to agree on a common output even in the presence of corrupted parties. Recent work has pushed to understand the problem when a majority of par...
-
Chapter and Conference Paper
Proof Labeling Schemes for Reachability-Related Problems in Directed Graphs
We study proof labeling schemes in directed networks, and ask what assumptions are necessary to be able to certify reachability-related problems such as strong connectivity, or the existence of a node from whi...
-
Chapter and Conference Paper
Verifiable Private Information Retrieval
A computational PIR scheme allows a client to privately query a database hosted on a single server without downloading the entire database. We introduce the notion of verifiable PIR (vPIR) where the server can...
-
Chapter and Conference Paper
Research on Demand Forecasting Method of Multi-user Group Based on Big Data
In order to accurately meet the purchasing needs of consumers, this paper proposes a multi-user demand forecasting model based on big data that organically combines sentiment classification and user portraits....
-
Chapter and Conference Paper
A New Addition Law in Twisted Edwards Curves on Non Local Ring
Let \(\mathbb {F}_{q}\) be a finite field of q elements with ...
-
Chapter and Conference Paper
Extending SysML with Refinement and Decomposition Mechanisms to Generate Event-B Specifications
SysML, dedicated to system design, provides graphical models. One of the strengths of these graphical models is that they can be validated by domain experts. However, the semantics of SysML is given in natural la...
-
Chapter and Conference Paper
The Effect of the Loss on Generalization: Empirical Study on Synthetic Lung Nodule Data
Convolutional Neural Networks (CNNs) are widely used for image classification in a variety of fields, including medical imaging. While most studies deploy cross-entropy as the loss function in such tasks, a gr...
-
Chapter and Conference Paper
Cast-as-Intended: A Formal Definition and Case Studies
Verifiable voting systems allow voters to check whether their ballot is correctly recorded (individual verifiability) and allow anyone to check whether votes expressed in recorded ballots are correctly counted...