496 Result(s)
-
Chapter and Conference Paper
Crowd Intelligence Driven Design Framework Based on Perception-Retrieval Cognitive Mechanism
Currently, the use of crowd intelligence in which the knowledge from different disciplines is integrated for complex product design has attracted increasing attention from both academia and industry. However, ...
-
Chapter and Conference Paper
A Prototype Tool of Optimal Wireless Sensor Placement for Structural Health Monitoring
With increasing collapses of civil infrastructures and popularized utilization of large-scale structures, worldwide deployment of structural health monitoring (SHM) systems is of importance in emerging and fut...
-
Chapter and Conference Paper
Development and Improvement of Deep Learning Based Automated Defect Detection for Sewer Pipe Inspection Using Faster R-CNN
Currently, visual inspection techniques, especially closed-circuit television (CCTV), are commonly utilized for sewer pipe inspection. Computer vision techniques are applied for automated interpretation of CCT...
-
Chapter and Conference Paper
Adaptive Firefly Algorithm with a Modified Attractiveness Strategy
The performance of firefly algorithm (FA) is seriously affected by its parameters. Recently, we proposed a new FA with adaptive control parameters (ApFA), in which the step factor is dynamically updated and th...
-
Chapter and Conference Paper
Layout Optimization for a Long Distance Wireless Mesh Network: An Industrial Case Study
In the deployment of industrial wireless network, nodes can only be deployed in some special regions due to the restriction of the environment in the factory, thus failing to effectively elude occlusions, and ...
-
Chapter and Conference Paper
Conducting Correlated Laplace Mechanism for Differential Privacy
Recently, differential privacy achieves good trade-offs between data publishing and sensitive information hiding. But in data publishing for correlated data, the independent Laplace noise implemented in curren...
-
Chapter and Conference Paper
Accurate Indoor Localization with Multiple Feature Fusion
In recent years, many fingerprint-based localization approaches have been proposed, in which different features (e.g., received signal strength (RSS) and channel state information (CSI)) were used as the finge...
-
Chapter and Conference Paper
Maximum-Weighted \(\lambda \) -Colorable Subgraph: Revisiting and Applications
Given a vertex-weighted graph G and a positive integer \(\lambda \) λ ...
-
Chapter and Conference Paper
Employing Smartwatch for Enhanced Password Authentication
This paper presents an enhanced password authentication scheme by systematically exploiting the motion sensors in a smartwatch. We extract unique features from the sensor data when a smartwatch bearer types hi...
-
Chapter and Conference Paper
Social D2D Communications Based on Fog Computing for IoT Applications
To satisfy the rapidly growing requirements of wireless data services recently, fog computing which is as an extension of cloud computing is proposed for offloading the Internet of Things (IoT) data services a...
-
Chapter and Conference Paper
Leveraging Scheduling to Minimize the Tardiness of Video Packets Transmission in Maritime Wideband Communication
In this paper, we investigated the scheduling issue of the vessel’s uploading data to the infostations through the maritime communication network, to optimize the dispatching process by Dynamic Programming. We...
-
Chapter and Conference Paper
Newton Method for Interval Predictor Model with Sphere Parameter Set
In this paper, we study the construction of interval prediction model. After introducing the family of models and some basic information, we present the computational results for the construction of interval p...
-
Chapter and Conference Paper
Detecting Flooding DDoS Under Flash Crowds Based on Mondrian Forest
Flooding Distributed Denial of Service (DDoS) attacks could cause huge damages to Internet, which has much similarity with Flash Crowds (FC). Traditional Machine learning methods usually have a better performa...
-
Chapter and Conference Paper
Community Verification with Topic Modeling
Different performance measurement metrics have been proposed to evaluate the performance of community detection algorithms, such as modularity, conductance, etc. However, there is few work which makes sense of...
-
Chapter and Conference Paper
A Credibility Evaluation Method in Opportunistic Networks
There are lots of misbehaving nodes in opportunistic networks which can cause severe performance downgrade. Those misbehaving nodes contains malicious nodes and selfish nodes. Selfish nodes don’t cooperate in ...
-
Chapter and Conference Paper
Server-Less Lightweight Authentication Protocol for RFID System
The design of secure authentication protocols for RFID system is still a great challenging problem. Many authentication protocols for RFID have been presented, but most have security flaws. We analyzes the sec...
-
Chapter and Conference Paper
A Particle Swarm Optimization and Mutation Operator Based Node Deployment Strategy for WSNs
Coverage control is one of the most critical issues for wireless sensor networks (WSNs), which is closely related to the sensor network performance. Generally, sensor nodes are randomly and massively deployed ...
-
Chapter and Conference Paper
Quantified Attribute Access Control Model for Cloud Storage Platform
Recently, cloud computing is the most domain studies in information technology. At the same time, the security of cloud computing becomes an important challenge. Existing access control models are poor on the ...
-
Chapter and Conference Paper
OE-CP-ABE: Over-Encryption Based CP-ABE Scheme for Efficient Policy Updating
Ciphertext-Policy Attribute Based Encryption (CP-ABE) is a promising technique to enable fine-grained access control for data storage and sharing. In CP-ABE, data are encrypted with an access policy on attribu...
-
Chapter and Conference Paper
Differential Direction Adaptive Based Reversible Information Hiding
In order to reversibly hide information in images with high capacity, an self-adaptive method is proposed in this paper by optimally selecting the differential direction. By dividing image into blocks, differe...