![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
The Research on Covert Communication Model Based on Blockchain: A Case Study of Ethereum’s Whisper Protocol
Covert communication is an extension of the traditional encryption technology, which hides information through carriers such as text and images. Traditional covert communication relies on a third-party central...
-
Chapter and Conference Paper
Performance Analysis of Consensus-Based Distributed System Under False Data Injection Attacks
This paper investigates the security problem of consensus-based distributed system under false data injection attacks (FDIAs). Since the injected false data will spread to the whole network through data exchan...
-
Chapter and Conference Paper
An Adaptive MAC Layer Energy-Saving Algorithm for ZigBee-Enabled IoT Networks
Energy conservation has become a major bottleneck for wide deployment of Internet of Things (IoT) technologies. This paper presents energy consumption analysis of ZigBee-enabled IoT networks, and shows the pri...
-
Chapter and Conference Paper
Application of Internet of Things and GIS in Power Grid Emergency Command System
The power grid is vulnerable to natural disasters and causes grid faults. When power disasters in the process of handling, the effective implementation of emergency command is important for timely restoring of...
-
Chapter and Conference Paper
The Application Research of AlphaGo Double Decision System in Network Bad Information Recognition
As the carrier of information transmission, the internet inevitably contains much bad information. In view of this phenomenon, with the purpose of identifying the bad information in the network, we combine exi...
-
Chapter and Conference Paper
Application of Project Management in Undergraduates’ Innovation Experiment Teaching
In view of unique characteristics of the experiment course of low power embedded system design and implementation, the project management theory is introduced into undergraduates’ innovation experiment teachin...
-
Chapter and Conference Paper
From Small Scale Guerrilla Warfare to a Wide Range of Army Operations the Development Direction of Software Production and Education
With the great improvement of computer computing power, the requirement of the software can be greatly improved in terms of performance, scale and reliability. From the programming of one or several people, it...
-
Chapter and Conference Paper
The Requirement Analysis and Initial Design of a Cloud and Crowd Supported Mathematics Learning Environment for Computer Science Students
Math learning has never been easy and math learning in computer science is not an exception. However, the important of math can never be underestimated. In computer science, it was found that students learning...
-
Article
Open AccessErgodic Channel Capacity Analysis of Downlink in the Hybrid Satellite-Terrestrial Cooperative System
In this paper, the ergodic channel capacity of the downlink is analyzed for a hybrid satellite-terrestrial cooperative system, which consists of a satellite (the source), a mobile terminal (the destination), a...
-
Chapter and Conference Paper
Planar-Based Visual Positioning for a Mobile Robot with Monocular Vision
Positioning is a fundamental component in many applications such as mobile robot. In this field, vision-based positioning becomes a popular way. This paper proposes an approach of positioning in the planar sce...
-
Article
Post-FEC performance evaluation of coherent QPSK system with an enhanced pilot-aided CPE scheme
In this paper, a simple and robust pilot-aided carrier phase estimation scheme with a modified phase unwrap** is proposed. The principle of the proposed phase unwrap** is shown with a step-by-step procedur...
-
Article
A novel image matting method using sparse manual clicks
Traditional image matting methods often have strict requirements on user input. This paper proposes a new matting method based on spectral clustering, which generates a well matte using a sparse user input. Fi...
-
Chapter and Conference Paper
Classification and Comparative Analysis of Resource Management Methods in Ad Hoc Network
Due to distinct characteristics of Ad hoc network, such as constrained energy of nodes, the instability of wireless links, the rapid changes of topology, and the limited communication range, resource managemen...
-
Chapter and Conference Paper
WhozDriving: Abnormal Driving Trajectory Detection by Studying Multi-faceted Driving Behavior Features
Vehicles have become essential tools of transport, offering a great opportunity to exploit the relationship between people and the car. This paper aims to solve an interesting problem, recognizing who the pers...
-
Chapter and Conference Paper
Social Aware Mobile Payment Service Popularity Analysis: The Case of WeChat Payment in China
Since its release in 2013, WeChat payment service has gradually become one of the most popular mobile payment services in China. Different from other mobile payment platforms, WeChat payment bundles with the m...
-
Chapter and Conference Paper
Virtual View Synthesis Based on DIBR and Image Inpainting
In 3DTV research, virtual view synthesis is a key component to the technology. Depth-image-based-rendering (DIBR) is an important method to realize virtual view synthesis. However, DIBR always results in hole ...
-
Chapter and Conference Paper
Intrusion Detection Algorithm for the Wormhole Attack in Ad Hoc Network
The wormhole attack is a kind of attack that is focusing on routing protocols and having big destructiveness. We propose a path-tracking method based on detecting nodes. It deploys a number of detecting nodes ...
-
Article
Complex Step-Shape Binary Offset Carrier Modulation for a Unitary Analytical Framework of GNSS Signals
The Binary Offset Carrier and Binary Coded Symbol modulation family is widely used in the existing Global Navigation Satellite Systems (GNSS). There are several modulation types in this family and new types ar...
-
Article
A resource integration approach for HTML5 mobile applications
As the new HTML5 specification is being accepted, comprehensive HTML5-based mobile applications provide users with better experiences. Huge amount of existing Internet-based resources are rapidly integrated in...
-
Article
Fault-Tolerant Cooperative Spectrum Sensing Scheme for Cognitive Radio Networks
In order to solve the uncertainty resulting from shadowing effect and resist the attack from malicious cognitive radio (CR) users, we propose a fault-tolerant cooperative spectrum sensing scheme for CR network...