-
Chapter and Conference Paper
Exploring High Dimension Large Data Correlation Analysis with Mutual Information and Application
Applying for information entropy theory, we present a measure of dependence for multi-variables relationships: the high dimensional maximal mutual information coefficient (HMIC). It is a kind of maximal informati...
-
Article
Tomographic PIV investigation on coherent vortex structures over shark-skin-inspired drag-reducing riblets
Nature has shown us that the microstructure of the skin of fast-swimming sharks in the ocean can reduce the skin friction drag due to the well-known shark-skin effect. In the present study, the effect of shark...
-
Chapter and Conference Paper
3D Models to Educated Museum Interactive Exhibition with Computing Techniques
The use of 3D scanner for the digitalization of 3D objects of cultural heritage is now an established approach. This paper aims at contributing to a better understanding of the emergence of new ideas in exhibi...
-
Chapter and Conference Paper
An Improved Virtualization Resource Migration Strategy and Its Application in Data Center
In order to improve the efficiency of virtualization of data center and to reduce the cost of computation migration, this paper studies all kinds of virtualization solutions and migration strategies to make a...
-
Article
Critical node identification for complex network based on a novel minimum connected dominating set
Identifying critical nodes in complex networks aims to fragment a graph \(G = (V, E)\) ...
-
Article
Statistical learning based fully homomorphic encryption on encrypted data
Statistical learning has been widely used in many fields, such as science, engineering and finance, to extract important patterns, trends, and understand “what the data say”. Privacy of statistical learning, i...
-
Chapter and Conference Paper
The Immune System Model Based on B Method
Due to the lack of understanding of immunology, the immune theory is still controversial, which causes the difficulty in the immune system simulation. Based on the strict mathematics, the formal B method which...
-
Chapter and Conference Paper
Research on High-Speed Railway Network Effectiveness Based on Theory of Constraints
Analytical method of carrying capacity based on Theory of Constraints was put forward. The effectiveness of HRN under the existing high-speed railway transportation organization was analyzed. The results show ...
-
Chapter and Conference Paper
A Novel Approach for Objectness Estimation Based on Saliency Segmentation and Superpixels Clustering
Object detection is an important and challenging vision task. It is a critical part in many applications such as image search, robot navigation, and scene understanding. In this paper, we propose a novel objec...
-
Chapter and Conference Paper
The Implementation of NetFlow Log System Using Ceph and ELK Stack
Each software always has log data. Log data is essential for developers and end-users. With log data, we can indicate the information of system error, warning events or whether our system processes are loading...
-
Chapter and Conference Paper
Evaluating Water Supply Scheme from Urbanization Perspective Based on Weighted TOPSIS
With the rapid development of urbanization process, water resource has become one of the key factors in restricting urbanization. With this in mind, this paper establishes the calculation model of water supply...
-
Chapter and Conference Paper
Formative Assessment System of College English Based on the Big Data
It is an era of rapid development of network information technology. The informatization becomes one of the most prominent features nowadays. And the field of education has also been considerably influenced. P...
-
Chapter and Conference Paper
Applying Random Forest Method to Analyze Elderly Fitness Training Routine Data
This study used the random forest algorithm to predict Senior Fitness test results on the execution of Synchronized Monitoring Analysis Record Care (SMARC) programs with the aim of aiding healthcare profession...
-
Article
An Adaptive Regularization Approach to Colonoscopic Polyp Detection Using a Cascaded Structure of Encoder–Decoders
This research aims to segment colonoscopic images by automatically extracting polyp features by exploiting the strengths of convolution neural networks (CNN). The proposed model employs deep learning and adapt...
-
Chapter and Conference Paper
The Implementation of a Network Log System Using RNN on Cyberattack Detection with Data Visualization
Network log data is essential to web administrator, which provides information such as, system error, cyberattack warning, mobile data gigabytes, message sending status, and so on. Managing the massive volume ...
-
Chapter and Conference Paper
Location Choice of Overseas Investments in Transportation Infrastructure by Chinese Enterprises: From the Perspective of the “BRICS+” Mode
The paper discusses the issue of location selection of overseas investment of Chinese enterprises in transportation infrastructure in the “BRICS+” region, and analyzes the influencing factors of such investmen...
-
Chapter and Conference Paper
Research on the Influence of Internal Factors on the Quality of Decision-Making of MNCs
Quality of decision is the key to and premise of the success of international business of multinational enterprises. The correctness, integrity, feasibility, timeliness and efficiency of decision-making consti...
-
Article
A density-core-based clustering algorithm with local resultant force
Clustering analysis has been widely used in image segmentation, face recognition, protein identification, intrusion detection, document clustering and so on. Most of the previous clustering algorithms are not ...
-
Article
A Fuzzy Segmentation Method to Learn Classification of Mitosis
Mitotic counts are widely used as a metric for cellular proliferation for prognosis and to determine the aggressiveness of individual cancers. This study presents a less labor-intensive method to count mitotic...
-
Chapter and Conference Paper
Using Spark Distributed Deep Learning to Analyze NetFlow in Data Lake System
usage of data to improve information security has become the focus of research in the development of big data and artificial intelligence. However, the traditional single database technology is unable...