Skip to main content

previous disabled Page of 2
and
Your search also matched 502 preview-only Content is preview-only when you or your institution have not yet subscribed to it.

By making our abstracts and previews universally accessible we help you purchase only the content that is relevant to you.
results, e.g.

DecTrans: Person Re-identification with Multifaceted Part Features via Decomposed Transformer

Include preview-only content
  1. Chapter and Conference Paper

    Trends in Human-Computer Interaction in the 5G Era: Emerging Life Scenarios with 5G Networks

    With the development of 5G networks, capacity enhancement, massive connectivity, ultra-high reliability, and low latency are typical use scenarios of information communication technology (ICT). These ICT impr...

    **gyu Zhao, Andong Zhang in Cross-Cultural Design. User Experience of … (2020)

  2. Chapter and Conference Paper

    Design and Application of a Visual System for the Supply Chain of Thermal Coal Based on Big Data

    Big data is now applied to many different fields. The paper will introduce the application of big data in the coal supply chain of the power industry. We designed and implemented a visual system for the Supply...

    **nyue Zhang, Yanmin Han, Wei Ge, Daqiang Yan, Yiming Chen in Big Data – BigData 2018 (2018)

  3. Chapter and Conference Paper

    3D Deep Convolutional Neural Network Revealed the Value of Brain Network Overlap in Differentiating Autism Spectrum Disorder from Healthy Controls

    Spatial distribution patterns of functional brain networks derived from resting state fMRI data have been widely examined in the literature. However, the spatial overlap patterns among those brain networks hav...

    Yu Zhao, Fangfei Ge, Shu Zhang, Tianming Liu in Medical Image Computing and Computer Assis… (2018)

  4. Chapter and Conference Paper

    Energy Conservation for Wireless Mesh Networks: A PSO Approach with Throughput-Energy Consumption Scheme Using Solar Energy

    A basic problem in the design of Wireless Mesh Networks (WMNs) is presented by the choice of renewable energy for the communication problems in remote regions and post-disaster reconstruction areas. Since the...

    Zhe Wang, Taoshen Li, ** Ye, Zhihui Ge in Intelligent Information Processing IX (2018)

  5. Chapter and Conference Paper

    K-mer Counting for Genomic Big Data

    Counting the abundance of all the k-mers (substrings of length k) in sequencing reads is an important step of many bioinformatics applications, including de novo assembly, error correction and multiple sequen...

    Jianqiu Ge, Ning Guo, **tao Meng, Bingqiang Wang, Pavan Balaji in Big Data – BigData 2018 (2018)

  6. Chapter and Conference Paper

    Fully Secure IBE with Tighter Reduction in Prime Order Bilinear Groups

    This paper present an identity-based encryption (IBE) scheme with full security in prime order bilinear groups by using dual pairing vector space. The security of our scheme is based upon decisional linear and...

    Jie Zhang, Aijun Ge, Siyu **ao, Chuangui Ma in Information and Communications Security (2016)

  7. Chapter and Conference Paper

    A Multi-parameter Integrated Water Quality Sensors System

    Because of the rapid development of aquaculture in China at present, it is more and more urgent to apply hi-tech devices in aquaculture field to guarantee its efficiency. There are already many devices used fo...

    Mingli Li, Daoliang Li, Qisheng Ding in Computer and Computing Technologies in Agr… (2013)

  8. Chapter and Conference Paper

    Intellectualized Identifying and Precision Control System for Horticultural Crop Diseases Based on Small Unmanned Aerial Vehicle

    To explore small unmanned aerial vehicle (UAV) remote sensing identifying technology for horticultural crop diseases, and to combine it with small UAV spraying, the peach leaf blade was taken as material, the ...

    Hongxin Cao, Yuwang Yang, Zhiyuan Pei in Computer and Computing Technologies in Agr… (2013)

  9. Chapter and Conference Paper

    Game Theoretic Approach for Cost-Benefit Analysis of Malware Proliferation Prevention

    Many existing research efforts in the field of malware proliferation aim at modelling and analysing its spread dynamics. Many malware dissemination models are based on the characteristics of biological disease...

    Theodoros Spyridopoulos, George Oikonomou in Security and Privacy Protection in Informa… (2013)

  10. Chapter and Conference Paper

    Simulated Analysis of a Wheeled Tractor on Soft Soil Based on RecurDyn

    A simulation model of a wheeled tractor was built using the multi-body dynamics software RecurDyn. The model consisted of four wheels, front and rear axles, and a body frame. An interaction model between tires...

    Wenqian Huang, Feijun Xu, Jishuai Ge in Computer and Computing Technologies in Agr… (2012)

  11. Chapter and Conference Paper

    Rice Kernel Shape Description Using an Improved Fourier Descriptor

    A Fourier descriptor is one of the best methods for describing object boundaries, but there are limitations in describing the boundary of rice kernels using traditional Fourier descriptors. An innovative appro...

    Hua Gao, Yaqin Wang, Guangmei Zhang in Computer and Computing Technologies in Agr… (2012)

  12. Chapter and Conference Paper

    Image Segmentation of Pseudo-foreign Fibers in Cotton on the Basis of Improved Genetic Algorithm

    In the foreign fibers cleaning process, pseudo-foreign fibers are often mistaken for foreign fibers, this result not only seriously affects the detecting precision of foreign fibers cleaning machine, but also ...

    Lulu Ge, Daoliang Li, Liu Yang, Wenzhu Yang in Computer and Computing Technologies in Agr… (2012)

  13. Chapter and Conference Paper

    Analyzing Key-Click Patterns of PIN Input for Recognizing VoIP Users

    Malicious intermediaries are able to detect the availability of VoIP conversation flows in a network and observe the IP addresses used by the conversation partners. However, it is insufficient to infer the cal...

    Ge Zhang in Future Challenges in Security and Privacy for Academia and Industry (2011)

  14. Chapter and Conference Paper

    Development of the Information Management System for Monitoring Alien Invasive Species

    One of the effective methods to prevent the excessive extending of alien invasive species is to really master their epidemic trends and to take appropriate measures to control them. So, the information managem...

    Hui Li, Ningning Ge, Lingwang Gao in Computer and Computing Technologies in Agr… (2011)

  15. Chapter and Conference Paper

    Modeling and Simulation for the Spread of H1N1 Influenza in School Using Artificial Societies

    According to the outbreak of H1N1 influenza on campus in Langfang city, Hebei province, at north of China in 2009, this paper constructed an artificial society model of the school, and simulated the spread of ...

    Wei Duan, Zhidong Cao, Yuanzheng Ge, **aogang Qiu in Intelligence and Security Informatics (2011)

  16. Chapter and Conference Paper

    The User’s Emotional Elements Research of Mobile Network Products Development Guided by User Experience

    In the whole products process of enterprise-class, the product definition decides the product’s “gene”. By way of in-depth research on user experience and behavior, our brand strategy, product planning and pro...

    Yin Wang, Qing Ge in Internationalization, Design and Global Development (2011)

  17. Chapter and Conference Paper

    Research and Application of Cultivation-Simulation-Optimization Decision Making System for Rapeseed (Brassica Napus L.)

    The objectives of this study were to develop Rapeseed Cultivation Simulation-Optimization-Decision Making System (Rape-CSODS), and validate it in order to design rapeseed planting, regulate and control its gro...

    Hongxin Cao, Chunlei Zhang, Baojun Zhang in Computer and Computing Technologies in Agr… (2011)

  18. Chapter and Conference Paper

    Multipath for Agricultural and Rural Information Services in China

    Internet cannot provide perfect information services for farmers in rural regions in China, because farmers in rural regions can hardly access the internet by now. But the wide coverage of mobile signal, telep...

    Ningning Ge, Zhiyuan Zang, Lingwang Gao in Computer and Computing Technologies in Agr… (2010)

  19. Chapter and Conference Paper

    SIP Proxies: New Reflectors in the Internet

    To mitigate identity theft in SIP networks, an inter-domain authentication mechanism based on certificates is proposed in RFC 4474 [10]. Unfortunately, the design of the certificate distribution in this mechan...

    Ge Zhang, Jordi Jaen Pallares, Yacine Rebahi in Communications and Multimedia Security (2010)

  20. Chapter and Conference Paper

    Object Link Structure in the Semantic Web

    Lots of RDF data have been published in the Semantic Web. The RDF data model, together with the decentralized linkage nature of the Semantic Web, brings object link structure to the worldwide scope. Object lin...

    Weiyi Ge, Jianfeng Chen, Wei Hu, Yuzhong Qu in The Semantic Web: Research and Applications (2010)

previous disabled Page of 2