![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Trends in Human-Computer Interaction in the 5G Era: Emerging Life Scenarios with 5G Networks
With the development of 5G networks, capacity enhancement, massive connectivity, ultra-high reliability, and low latency are typical use scenarios of information communication technology (ICT). These ICT impr...
-
Chapter and Conference Paper
Design and Application of a Visual System for the Supply Chain of Thermal Coal Based on Big Data
Big data is now applied to many different fields. The paper will introduce the application of big data in the coal supply chain of the power industry. We designed and implemented a visual system for the Supply...
-
Chapter and Conference Paper
3D Deep Convolutional Neural Network Revealed the Value of Brain Network Overlap in Differentiating Autism Spectrum Disorder from Healthy Controls
Spatial distribution patterns of functional brain networks derived from resting state fMRI data have been widely examined in the literature. However, the spatial overlap patterns among those brain networks hav...
-
Chapter and Conference Paper
Energy Conservation for Wireless Mesh Networks: A PSO Approach with Throughput-Energy Consumption Scheme Using Solar Energy
A basic problem in the design of Wireless Mesh Networks (WMNs) is presented by the choice of renewable energy for the communication problems in remote regions and post-disaster reconstruction areas. Since the...
-
Chapter and Conference Paper
K-mer Counting for Genomic Big Data
Counting the abundance of all the k-mers (substrings of length k) in sequencing reads is an important step of many bioinformatics applications, including de novo assembly, error correction and multiple sequen...
-
Chapter and Conference Paper
Fully Secure IBE with Tighter Reduction in Prime Order Bilinear Groups
This paper present an identity-based encryption (IBE) scheme with full security in prime order bilinear groups by using dual pairing vector space. The security of our scheme is based upon decisional linear and...
-
Chapter and Conference Paper
A Multi-parameter Integrated Water Quality Sensors System
Because of the rapid development of aquaculture in China at present, it is more and more urgent to apply hi-tech devices in aquaculture field to guarantee its efficiency. There are already many devices used fo...
-
Chapter and Conference Paper
Intellectualized Identifying and Precision Control System for Horticultural Crop Diseases Based on Small Unmanned Aerial Vehicle
To explore small unmanned aerial vehicle (UAV) remote sensing identifying technology for horticultural crop diseases, and to combine it with small UAV spraying, the peach leaf blade was taken as material, the ...
-
Chapter and Conference Paper
Game Theoretic Approach for Cost-Benefit Analysis of Malware Proliferation Prevention
Many existing research efforts in the field of malware proliferation aim at modelling and analysing its spread dynamics. Many malware dissemination models are based on the characteristics of biological disease...
-
Chapter and Conference Paper
Simulated Analysis of a Wheeled Tractor on Soft Soil Based on RecurDyn
A simulation model of a wheeled tractor was built using the multi-body dynamics software RecurDyn. The model consisted of four wheels, front and rear axles, and a body frame. An interaction model between tires...
-
Chapter and Conference Paper
Rice Kernel Shape Description Using an Improved Fourier Descriptor
A Fourier descriptor is one of the best methods for describing object boundaries, but there are limitations in describing the boundary of rice kernels using traditional Fourier descriptors. An innovative appro...
-
Chapter and Conference Paper
Image Segmentation of Pseudo-foreign Fibers in Cotton on the Basis of Improved Genetic Algorithm
In the foreign fibers cleaning process, pseudo-foreign fibers are often mistaken for foreign fibers, this result not only seriously affects the detecting precision of foreign fibers cleaning machine, but also ...
-
Chapter and Conference Paper
Analyzing Key-Click Patterns of PIN Input for Recognizing VoIP Users
Malicious intermediaries are able to detect the availability of VoIP conversation flows in a network and observe the IP addresses used by the conversation partners. However, it is insufficient to infer the cal...
-
Chapter and Conference Paper
Development of the Information Management System for Monitoring Alien Invasive Species
One of the effective methods to prevent the excessive extending of alien invasive species is to really master their epidemic trends and to take appropriate measures to control them. So, the information managem...
-
Chapter and Conference Paper
Modeling and Simulation for the Spread of H1N1 Influenza in School Using Artificial Societies
According to the outbreak of H1N1 influenza on campus in Langfang city, Hebei province, at north of China in 2009, this paper constructed an artificial society model of the school, and simulated the spread of ...
-
Chapter and Conference Paper
The User’s Emotional Elements Research of Mobile Network Products Development Guided by User Experience
In the whole products process of enterprise-class, the product definition decides the product’s “gene”. By way of in-depth research on user experience and behavior, our brand strategy, product planning and pro...
-
Chapter and Conference Paper
Research and Application of Cultivation-Simulation-Optimization Decision Making System for Rapeseed (Brassica Napus L.)
The objectives of this study were to develop Rapeseed Cultivation Simulation-Optimization-Decision Making System (Rape-CSODS), and validate it in order to design rapeseed planting, regulate and control its gro...
-
Chapter and Conference Paper
Multipath for Agricultural and Rural Information Services in China
Internet cannot provide perfect information services for farmers in rural regions in China, because farmers in rural regions can hardly access the internet by now. But the wide coverage of mobile signal, telep...
-
Chapter and Conference Paper
SIP Proxies: New Reflectors in the Internet
To mitigate identity theft in SIP networks, an inter-domain authentication mechanism based on certificates is proposed in RFC 4474 [10]. Unfortunately, the design of the certificate distribution in this mechan...
-
Chapter and Conference Paper
Object Link Structure in the Semantic Web
Lots of RDF data have been published in the Semantic Web. The RDF data model, together with the decentralized linkage nature of the Semantic Web, brings object link structure to the worldwide scope. Object lin...