-
Chapter and Conference Paper
An Efficient Consortium Blockchain Dual Privacy Protection Scheme
The ledger on the blockchain is public, so that the transactions on the chain can be verified and traced by other nodes, but it will also lead to the privacy of blockchain users being leaked or analyzed by som...
-
Chapter and Conference Paper
Improved Blockchain Sharding Consensus for Cross-Shard Validation
The consensus algorithm, which serves as the core of blockchain technology, enables the realization of decentralized and secure trusted service delivery environments. To address the complex validation mechanis...
-
Chapter and Conference Paper
Practical Private Intersection-Sum Protocols with Good Scalability
Private intersection-sum (PI-Sum) enables participants to compute the sum of data associated with the intersection without revealing any personal information. It has been a research focus of secure multi-party...
-
Chapter and Conference Paper
Cooperative Control of Dual-Manipulator System with Unknown Dynamic Parameters
The precise control of the cooperative operation for dual-manipulator system has high requirements for the dynamic controller. In this paper, the cooperative control method of dual-manipulator system with unkn...
-
Chapter and Conference Paper
Iterative Refinement of an AIS Rewards System
Gamification-based reward systems are a key part of the design of modern adaptive instructional systems and can have substantial impacts on learner choices and engagement. In this paper, we discuss our efforts...
-
Chapter and Conference Paper
A Multi-pronged Redesign to Reduce Gaming the System
Despite almost two decades of interest in reducing gaming the system in interactive learning environments, gaming continues as a key factor reducing student learning outcomes and contributing to poorer learnin...
-
Chapter and Conference Paper
Research on the Shenzhen Mode of China’s State-Owned Enterprise Reform Serving Industrial Development in the New Era
Based on the neoclassical micro theory, this paper expounds those state-owned enterprises, as the micro main body of the market, have the function of guiding private and small-micro enterprises to fully partic...
-
Chapter and Conference Paper
SCEC: A Novel Single-Cell Classification Method Based on Cell-Pair Ensemble Learning
With the development of single-cell sequencing technology, the increasing amount of single-cell transcription data enables a deeper understanding of cellular heterogeneity and mechanisms at the cell level. Sin...
-
Chapter and Conference Paper
Retinal Vessel Segmentation Method Based on Improved Deep U-Net
The automatic segmentation of retinal vessels plays an important role in the early screening of eye diseases. However, vessels are difficult to segment with pathological retinal images. Hence, we propose the u...
-
Chapter and Conference Paper
Improved Spectral Clustering Method for Identifying Cell Types from Single-Cell Data
With the development of single-cell RNA sequencing (scRNA-seq) technology, characterizing heterogeneity at the cellular level has become a new area of computational biology research. However, the infiltration ...
-
Chapter and Conference Paper
Sharing Economy Protocol with Privacy Preservation and Fairness Based on Blockchain
Blockchain, as the core technology of cryptocurrency, provides a novel idea for the sharing economy. A user pays the agreed money to the property owner without any trust third party in blockchain, which leads ...
-
Chapter and Conference Paper
CDC-MRF for Hyperspectral Data Classification
This paper presents a new hyperspectral classification algorithm based on convolutional neural network (CNN). A CNN is first used to learn the posterior class distributions using a patch-wise training strategy...
-
Chapter and Conference Paper
Modular Robotic System for Nuclear Decommissioning
Because of the radioactivity, the nuclear environment operation requires robot system to complete. In this paper, a modular robot system for nuclear environment operation is developed, which is easy to maintai...
-
Chapter and Conference Paper
An Improved Artificial Bee Colony Algorithm and Its Taguchi Analysis
The artificial bee colony (ABC) algorithm is one of well-known evolutionary algorithms, which has been successfully applied to many continuous or combinatorial optimization problems. To increase further its co...
-
Chapter and Conference Paper
Face Detection with Better Representation Using a Multi-region WR-Inception Network Model
This paper proposes a multi-region WR-Inception network model for face detection based on the Faster RCNN framework. Firstly, we utilize multi-region features to obtain better face representation and introduce...
-
Chapter and Conference Paper
Speaker Identification System Based on Lip-Motion Feature
Traditional lip features have been used in speech recognition, but lately they have also been found useful as a new biometric identifier in computer vision applications. Firstly, we locate lips according to ge...
-
Chapter and Conference Paper
Cultural Differences in the Understanding of History on Wikipedia
This paper sheds light on cultural differences in the understanding of historical military events between Chinese, English, French, German, and Swedish Wikipedia language editions. Differences in understanding...
-
Chapter and Conference Paper
Mining RDF Data for OWL2 RL Axioms
The large amounts of linked data are a valuable resource for the development of semantic applications. However, these applications often meet the challenges posed by flawed or incomplete schema, which would le...
-
Chapter and Conference Paper
Probabilistic Error Detecting in Numerical Linked Data
Linked Open Data (LOD) has become a vast repository with billions of triples available in thousands of datasets. One of the most pressing challenges to Linked Data management is detecting errors in numerical d...
-
Chapter
Sequential Anomaly Detection Using Wireless Sensor Networks in Unknown Environment
Anomaly detection is an important problem for environment, fault diagnosis and intruder detection in Wireless Sensor Networks (WSNs). A key challenge is to minimize the communication overhead and energy consum...