![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
A Cross-Domain Secure Deduplication Scheme Based on Threshold Blind Signature
In the cloud storage environment, client-side deduplication can perform file repetitive detection locally. However, client-side deduplication still faces many security challenges. First, if the file hash value...
-
Chapter and Conference Paper
An Improved Weighted ELM with Hierarchical Feature Representation for Imbalanced Biomedical Datasets
In medical intelligent diagnosis, most of the real-world datasets have the class-imbalance problem and some strong correlation features. In this paper, a novel classification model with hierarchical feature re...
-
Chapter and Conference Paper
A New Color Information Entropy Retrieval Method for Pathological Cell Image
For the distribution characteristics in a slice of pathological cell image, the system transforms them into the characteristic vector by quantization and clustering in HSV color model, it promotes the concerne...
-
Chapter and Conference Paper
An Automatic Index Validity for Clustering
Many validity index algorithms have been proposed to determine the number of clusters. These methods usually employ the Euclidean distance as the measurement. However, it is difficult for the Euclidean distanc...