![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Information Service System For Small Forestowners
Individual owned forests have boomed in the last decade in China. Hundreds of millions of private forest owners have emerged since years of afforestation practice and collective forest ownership reform. Most o...
-
Chapter and Conference Paper
Small-Scale Evaluation of Tobacco Planting Suitability Based on Spatial Information Technology
Crop planting suitability evaluation is important for agricultural production. In this study, a comprehensive evaluation framework which combined geographical information system, remote sensing, global positio...
-
Chapter and Conference Paper
Deep CORAL: Correlation Alignment for Deep Domain Adaptation
Deep neural networks are able to learn powerful representations from large quantities of labeled input data, however they cannot always generalize well across changes in input distributions. Domain adaptation ...
-
Chapter and Conference Paper
MB-DDIVR: A Map-Based Dynamic Data Integrity Verification and Recovery Scheme in Cloud Storage
Outsourcing data to are remote cloud service provider allows organizations or individual users to store more data on the cloud storage than on private computer systems. However, a specific problem encountered ...
-
Chapter and Conference Paper
Three Dimensional Stress Wave Imaging Method of Wood Internal Defects Based on TKriging
In order to detect the size, shape and degree of decay inside wood, a three dimensional stress wave imaging method based on TKriging is proposed. The method uses sensors to obtain the stress wave velocity data...
-
Chapter and Conference Paper
Parallel Search by Reinforcement Learning for Object Detection
Object detection algorithms generally search through extensive potential areas without considering spatial correlations. To fully utilize rich information contained in high-level image features, a hierarchical...
-
Chapter and Conference Paper
A Security-Enhanced vTPM 2.0 for Cloud Computing
Virtual Trusted Platform Module is required in cloud due to the scalability and migration of virtual machine. Through allocating a vTPM (Virtual Trusted Platform Module) to a VM (Virtual Machine), users of VM...
-
Chapter and Conference Paper
Philosophical Principles of Data Discovery
Data discovery is a basis in science and technology research because of nothing to do in case of no data. So, it is very important to find data. Where is the data? Data exists in the research objects which inc...
-
Chapter and Conference Paper
Neural Multi-task Learning for Teacher Question Detection in Online Classrooms
Asking questions is one of the most crucial pedagogical techniques used by teachers in class. It not only offers open-ended discussions between teachers and students to exchange ideas but also provokes deeper ...
-
Chapter and Conference Paper
Multilateral Boundary Blasting Theory of High and Steep Slope in Open Pit Mine and Its Application
At present, the blasting theory of high and steep rock slope mainly focuses on flat terrain, ignoring the influence of micro-terrain boundary factors on blasting effect, which leads to excessive blasting energ...
-
Chapter and Conference Paper
Research on Vibration Signal Characteristics of Multilateral Boundary Deep Hole Blasting
The essence of blasting action is the interaction between explosive energy and medium, and the blasting effect depends on the characteristics of explosive energy, medium and interaction law. The multi-boundary...
-
Chapter and Conference Paper
Non-destructive Detection of Grouting Defects Behind Shield Tunnel Wall by Combining Ground Penetrating Radar with Seismic Wave Method
The shield construction is a mature tunnel construction technology. Grouting behind segment wall synchronously during shield construction is an important measure to control stratum deformation, reduce ground s...