![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
103 Result(s)
-
Chapter and Conference Paper
Intelligent routing for global broadband satellite internet
With the fast development of internet, the multicasting applications (such as Distant Learning) have become more and more important. Since multicasting multimedia information over the wired links might generat...
-
Chapter and Conference Paper
Phylogenetic k-Root and Steiner k-Root
Given a graph G = (V,E) and a positive integer k, the Phylogenetic k-Root Problem asks for a (unrooted) tree T without degree-2 nodes such that its leaves are labeled by V and (u, v)∈ E if and only if d ...
-
Chapter and Conference Paper
The Secret and Beauty of Ancient Chinese Padlocks
Most ancient Chinese padlocks are key-operated locks with splitting springs, and partially keyless letter-combination locks. They can be characterized based on the types of locks, the shapes of locks, the engr...
-
Chapter and Conference Paper
Visual Features Extracting & Selecting for Lipreading
This paper has put forward a way to select and extract visual features effectively for lipreading. These features come from both lowlevel and high-level, those are compensatory each other. There are 41 dimensi...
-
Chapter and Conference Paper
A Gravity-Based Intrusion Detection Method
It is an important issue for the security of network to detect new intrusions attack. We introduce the idea of the law of gravity to clustering analysis, and present a gravity-based clustering algorithm. At th...
-
Chapter and Conference Paper
Mining Maximal Frequent Itemsets for Intrusion Detection
It has been the recent research focus and trend to apply data mining techniques in an intrusion detection system for discovering new types of attacks, but it is still in its infancy. This paper presents an inn...
-
Chapter and Conference Paper
Embedded System Design for Network Time Synchronization
Every computer needs a timer mechanism to keep track of current time and also for various accounting purposes such as calculating the time spent by a process in CPU utilization, disk I/O, and so on, so that th...
-
Chapter and Conference Paper
On Scalability and Mobility Management of Hierarchical Large-Scale Ad Hoc Networks
With the increased interest in the mobile wireless communication, the development of large-scale ad hoc networks has drawn a lot of attention and the scalability of ad hoc networks has been the subject of exte...
-
Chapter and Conference Paper
Identity Based Delegation Network
Delegation of authorities is a common practice in various organizations. The way delegation is performed can be quite complicated. To capture possible delegation structures, the concept of delegation network is p...
-
Chapter and Conference Paper
A Cluster-Based QoS Multipath Routing Protocol for Large-Scale MANET
To support oS routing in MANET (Mobile Ad hoc Networks) is a core issue in the research of MANET. Numerous studies have shown the difficulty for provision of Quality-of-Service (QoS) guarantee in Mobile Ad hoc...
-
Chapter and Conference Paper
A Framework on Compound Knowledge Push System Oriented to Organizational Employees
Organizational employees have different knowledge demands and the knowledge is compound. So how to push the right compound knowledge to the right organizational employees becomes important. This paper attempts...
-
Chapter and Conference Paper
Select the Size of Training Set for Financial Forecasting with Neural Networks
The performance of financial forecasting with neural networks dependents on the particular training set. We design mean-change-point test to divide the original dataset into different training sets. The experi...
-
Chapter and Conference Paper
Scale A street case library for environmental design with agent interfaces
-
Chapter and Conference Paper
Adaptive Power-Aware Clustering and Multicasting Protocol for Mobile Ad Hoc Networks
One of the most critical issues in wireless ad hoc networks is represented by the limited availability of energy within network nodes. Most of the researches focused on the problem of routing issues rather tha...
-
Chapter and Conference Paper
Web-Based Three-Dimension E-Mail Traffic Visualization
E-mail pervades many aspects of our lives and is becoming indispensable communication method in areas such as commerce, government, production and general information dissemination. To maintain the security an...
-
Chapter and Conference Paper
An Open Service Platform at Network Edge
The last few years, users want various services that fit their needs and preferences. Many services are provided at network edges and are increasing in number. The open framework is needed for efficient servic...
-
Chapter and Conference Paper
New Criteria of Global Exponential Stability for a Class of Generalized Neural Networks with Time-Varying Delays
In this paper, we essentially drop the requirement of Lipschitz condition on the activation functions. By employing Lyapunov functional and several new inequalities, some new criteria concerning global exponen...
-
Chapter and Conference Paper
Design and Simulation of a Neural-PD Controller for Automatic Balancing of Rotor
In this paper, the automatic balancing method is studied at constant speed or acceleration operation for rotor systems. The magnitude and phase of original imbalance is determined by the influence coefficient ...
-
Chapter and Conference Paper
Vibration Fault Diagnosis of Large Generator Sets Using Extension Neural Network-Type 1
This paper proposes a novel neural network called Extension Neural Network-Type 1 (ENN1) for vibration fault recognition according to generator vibration characteristic spectra. The proposed ENN1 has a very si...
-
Chapter and Conference Paper
LMI Approach to Robust Stability Analysis of Cohen-Grossberg Neural Networks with Multiple Delays
Robust stability analysis of a class of Cohen-Grossberg neural networks with multiple delays is given. An approach combining the Lyapunov functional with the linear matrix inequality (LMI) is taken to obtain t...