![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Implementing Lattice-Based PQC on Resource-Constrained Processors:
This paper studies the implementation of the lattice-based PQC on the 32-bit constrained processors that only have constrained multiplication instructions. A typical example of such constrained processors is t...
-
Article
Open AccessDynamic Context Removal: A General Training Strategy for Robust Models on Video Action Predictive Tasks
Predicting future actions is an essential feature of intelligent systems and embodied AI. However, compared to the traditional recognition tasks, the uncertainty of the future and the reasoning ability require...
-
Chapter and Conference Paper
M \(^2\) HGCL: Multi-scale Meta-path Integrated Heterogeneous Graph Contrastive Learning
Inspired by the successful application of contrastive learning on graphs, researchers attempt to impose graph contrastive learning approaches on heterogeneous information networks. Orthogonal to homogeneous gr...
-
Article
Open AccessData news dissemination strategy for decision making using new media platform
In big data era, data has become an important part of human lives and work. At the same time, data plays an important role in information acquisition and dissemination. At present, the influence of data journa...
-
Chapter and Conference Paper
Small Object Detection Based on Multi-source Data Learning Fusion Network
Small object group detection is a difficult task in the field of object detection. In recent years, with the development of sensing technology and unmanned driving, there are more and more multi-source data in...
-
Chapter and Conference Paper
Study on the Method of Adversarial Example Attack Based on MI-FGSM
neural network outperformed human beings in many fields such as image classification [1–3], object detection [4, 5], and image semantic segmentation [6] in recent years. But this model has security risks; ...
-
Chapter and Conference Paper
Automatic Generation of Distribution Network Operation Data Report and Application of Data Mining
Electricity is the main pillar of today’s social progress, and the rapid progress of social economy has also driven the rapid growth of electricity. The scope of the power system continues to expand, the netwo...
-
Chapter and Conference Paper
Privacy-Preserving and Truthful Auction for Task Assignment in Outsourced Cloud Environments
Due to high fairness and allocation efficiency, the task assignment problem of mobile applications via auctions has become a promising approach to motivate bidders to provide their mobile device resources effe...
-
Chapter and Conference Paper
SLUGBOT, an Aplysia-Inspired Robotic Grasper for Studying Control
Living systems can use a single periphery to perform a variety of tasks and adapt to a dynamic environment. This multifunctionality is achieved through the use of neural circuitry that adaptively controls the ...
-
Chapter and Conference Paper
Privacy-Preserving Auction for Heterogeneous Task Assignment in Mobile Device Clouds
In the past several decades, despite the continuous improvement of mobile devices, mobile applications requiring resources are still beyond its capacity to be completed on a single device. Due to high fairness...
-
Article
Optimization of kernel learning algorithm based on parallel architecture
This paper concentrates on a parallel acceleration method of optimizing Gaussian hyper-parameters with the maximum likelihood estimation. In the process of optimizing the hyper-parameters, many calculations of...
-
Article
MPI-RCDD: A Framework for MPI Runtime Communication Deadlock Detection
The message passing interface (MPI) has become a de facto standard for programming models of high-performance computing, but its rich and flexible interface semantics makes the program easy to generate communi...
-
Chapter and Conference Paper
Design of Intelligent Mobile Robot Control System Based on Gesture Recognition
At present, technologies such as smart home and intelligent wearable devices are develo**, bringing convenience and enjoyment to our daily lives, while also avoiding a series of potential hidden dangers. Thi...
-
Chapter and Conference Paper
Light Pre-Trained Chinese Language Model for NLP Tasks
We present the results of shared-task 1 held in the 2020 Conference on Natural Language Processing and Chinese Computing (NLPCC): Light Pre-Trained Chinese Language Model for NLP tasks. This shared-task examin...
-
Chapter and Conference Paper
A Method of Communication State Monitoring for Multi-node CAN Bus Network
Multi-node CAN bus network tended to have higher requirements for communication capability. In the multi-node CAN bus network which does not need application layer protocol of CAN bus to develop, with the incr...
-
Chapter and Conference Paper
Efficient Privacy-Preserving Skyline Queries over Outsourced Cloud
In the cloud computing paradigm, data owners could outsource their databases to the service provider, and thus reap huge benefits from releasing the heavy storage and management tasks to the cloud server. Howe...
-
Article
Boost particle swarm optimization with fitness estimation
It is well known that the classical particle swarm optimization (PSO) is time-consuming when used to solve complex fitness optimization problems. In this study, we perform in-depth research on fitness estimati...
-
Chapter and Conference Paper
Parallel MOEA/D for Real-Time Multi-objective Optimization Problems
There are a large number of multi-objective optimization problems in real-world applications, like in games, that need to be solved in real time. In order to meet this pressing need, we suggests a method of pa...
-
Chapter and Conference Paper
Research on Knowledge Discovery in Database of Traffic Flow State Based on Attribute Reduction
Recognizing and diagnosing the state of traffic flow is an important research area, which is the basis of improving the level of traffic management and the quality of traffic information services. However, due...
-
Chapter and Conference Paper
Data Fault Identification and Repair Method of Traffic Detector
The quality control and evaluation of traffic detector data are a prerequisite for subsequent applications. Considering that the PCA method is not ideal when detecting fault information with time-varying and ...