![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
129 Result(s)
-
Chapter and Conference Paper
Research and Application of Integrated Fracturing Fluid for Tight Sandstone Gas in Ordos Basin
The characteristics of Ordos basin is large vertical span, poor connectivity, small effective reservoir thickness, poor reservoir physical properties, low clay mineral content, small pore throat radius and low...
-
Chapter and Conference Paper
3D Scene Modeling and Real-Time Infrared Simulation Technology Based on Artificial Intelligence Algorithm
With the continuous advancement of information technology and the increasing demand for real-time infrared simulation, establishing a high-performance real-time infrared simulation system is the primary task o...
-
Chapter and Conference Paper
CSEC: A Chinese Semantic Error Correction Dataset for Written Correction
Existing research primarily focuses on spelling and grammatical errors in English, such as missing or wrongly adding characters. This kind of shallow error has been well-studied. Instead, there are many unsolv...
-
Chapter and Conference Paper
Control and Active and Safety Path Planning of Land-Air Amphibious Unmanned Platform
With the rapid development of unmanned aerial and ground vehicle technology, human beings are no longer satisfied with their single function of flying in the air or traveling on the ground. The use of more fle...
-
Chapter and Conference Paper
Research and Application of CO2 Stimulation Technology in Horizontal Well of Heavy Oil Reservoir of Complex Fault Block
Nanpu land reservoir is a typical heavy oil reservoir with complex fault blocks. The horizontal well-directional well pattern is used to develop it. In order to improve the productivity of horizontal wells and...
-
Chapter and Conference Paper
A Cooperative Interception Allocation Method Faced on 3D Reachable Area Prediction Based on Deep Neural Network
This paper studies the problem of multi-intercept missile cooperative interception allocation faced on three-dimensional reachable area prediction. The key points of this paper are using neural network to pred...
-
Chapter and Conference Paper
A Subcell Limiting Based on High-Order Compact Nonuniform Nonlinear Weighted Schemes for High-Order CPR Method
This paper further investigates the subcell limiting approach based on compact nonuniform nonlinear weighted (CNNW) schemes for high-order correction procedure via reconstruction (CPR) method. A special subcel...
-
Chapter and Conference Paper
An Air Combat UCAV Autonomous Maneuver Decision Method Based on LSTM Network and MCDTS
This paper studies the integrated process of air combat UCAV action recognition and autonomous maneuver decision-making in combination with the aerial battlefield situation. The key points of this paper are re...
-
Chapter and Conference Paper
Revisiting Positive and Negative Samples in Variational Autoencoders for Top-N Recommendation
Top-N recommendation is a common tool to discover interesting items, which ranks the items based on user preference using their interaction history. Implicit feedback is often used by recommender systems due t...
-
Chapter and Conference Paper
You Need to Look Globally: Discovering Representative Topology Structures to Enhance Graph Neural Network
Graph Neural Networks (GNNs) have shown great ability in modeling graph-structured data. However, most current models aggregate information from the local neighborhoods of a node. They may fail to explicitly e...
-
Chapter and Conference Paper
Efficiently Answering Why-Not Questions on Radius-Bounded k-Core Searches
The problem of searching radius-bounded k-cores (RB-k-cores) for a given query vertex is to find cohesive subgraphs satisfying both social and spatial constraints on geo-social networks. However, the search resul...
-
Chapter and Conference Paper
Study on Air Foam Flooding Technology to Enhance Oil Recovery of Mid Deep Complex Fault Block Reservoir by Water Injection
In order to solve the problem of rapid increase in water content and decrease in production after water flooding in fault block reservoirs, the air foam flooding experiments of static low temperature oxidation...
-
Chapter and Conference Paper
Joint Pixel-Level and Feature-Level Unsupervised Domain Adaptation for Surveillance Face Recognition
Face recognition (FR) is one of the most successful image analysis and understanding applications, which has recently received significant attentions. However, despite the remarkable progress in face recogniti...
-
Chapter and Conference Paper
A Lightweight Encrypted Network Traffic Classification Method Based on Protocol Field and K-Nearest Neighbor
Encrypted traffic classification is a crucial issue to be addressed with popularization and application of encryption protocols in the network. How to identify and classify encrypted traffic with high efficien...
-
Chapter and Conference Paper
Refined Weighted Fusion Recognition Method for High Conflict Information
In synergy recognition, the fusion of multiple sources has to be considered to increase the reliability of target recognition. In classification fusion problem, it is considered that the classifiers have diffe...
-
Chapter and Conference Paper
Coal Mine Rescue Robots: Development, Applications and Lessons Learned
This article describes the research on key technologies and lessons learned by Coal Mine Robotics Research Institute of China University of Mining and Technology in the design, development and applications of ...
-
Chapter and Conference Paper
Modeling and Analysis of Combat System Confrontation Based on Large-Scale Knowledge Graph Network
Focusing on the confrontation analysis requirements of joint operation system of systems, this paper proposes an intelligent matching method of operational elements based on semantic features for typical large...
-
Chapter and Conference Paper
Image Enhancement Effects on the Forensic Facial Recognition System
In the field of forensic identification of human images, face recognition technology has become an important quantitative examination method for face similarity examination. Nevertheless, face image quality ha...
-
Chapter and Conference Paper
Beaver Triple Generator from Multiplicatively Homomorphic Key Management Protocol
SPDZ, the nickname of secure multi-party computation (MPC) protocol of Damgård et al. from Crypto 2012, is an elegant secret value splitting technique which enjoys highly scalable and efficient multiplication...
-
Chapter and Conference Paper
Design of Cold Chain Logistics Information Real Time Tracking System Based on Wireless RFID Technology
In order to improve the proportion of cold chain distribution, effectively control transportation links and information, and ensure the quality of cold chain food, it is necessary to establish an effective mon...