![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
350 Result(s)
-
Article
Research on variational optical flow method for rockfall monitoring
Rockfall is a global mountain disaster problem, which has the characteristics of wide distribution, strong randomness, and inconspicuousness. The contacted monitoring method is difficult to deploy. Simultaneou...
-
Article
An improved SMOTE based on center offset factor and synthesis strategy for imbalanced data classification
It is an enormous challenge for imbalanced data learning in the field of machine learning. To construct balanced datasets, oversampling techniques have been studied extensively. However, many oversampling meth...
-
Article
Multi-representation web service recommendation system based on attention mechanism
Recently, mashup developers seek to integrate multiple services with complementary functionalities from a large amount of web services. With so many available web services, it is difficult for developers to ch...
-
Article
Efficient algorithms for reachability and path queries on temporal bipartite graphs
Bipartite graphs are naturally used to model relationships between two types of entities, such as people-location, user-post, and investor-stock. When modeling real-world applications like disease outbreaks, e...
-
Article
Open AccessShort-term multi-step-ahead sector-based traffic flow prediction based on the attention-enhanced graph convolutional LSTM network (AGC-LSTM)
Accurate sector-based air traffic flow predictions are essential for ensuring the safety and efficiency of the air traffic management (ATM) system. However, due to the inherent spatial and temporal dependencie...
-
Article
A lightweight early forest fire and smoke detection method
Forest fire is natural disasters that are sudden, destructive and difficult to handle and rescue, with millions of hectares of forests burned every year all over the world, causing serious ecological damage, l...
-
Article
Label-constrained shortest path query processing on road networks
Computing the shortest path between two vertices is a fundamental problem in road networks. Most of the existing works assume that the edges in the road networks have no labels, but in many real applications, ...
-
Article
Identification of human microRNA-disease association via low-rank approximation-based link propagation and multiple kernel learning
Numerous studies have demonstrated that human microRNAs (miRNAs) and diseases are associated and studies on the microRNA-disease association (MDA) have been conducted. We developed a model using a low-rank app...
-
Article
Rumor blocking with pertinence set in large graphs
Online social networks facilitate the spread of information, while rumors can also propagate widely and fast, which may mislead some users. Therefore, suppressing the spread of rumors has become a daunting tas...
-
Chapter and Conference Paper
Efficient Maximum Relative Fair Clique Computation in Attributed Graphs
Cohesive subgraph mining is a fundamental problem in attributed graph analysis. However, the existing models on attributed graphs ignore the fairness of attributes. In this paper, we propose a novel model, cal...
-
Chapter and Conference Paper
A Checklist for the Usability Evaluation of Artificial Intelligence (AI) mHealth Applications Graphical User Interface
The download rate of AI mobile health (mHealth) apps has increased rapidly, and there are many usability evaluation studies based on mobile apps, but few studies have been conducted on the usability of AI mHea...
-
Article
Reversible data hiding in enhanced images with anti-detection capability
Reversible data hiding (RDH) technique has been widely used for content authentication. However, most conventional RDH schemes generally concentrates on the rate-and-distortion performance (namely high capacit...
-
Chapter and Conference Paper
An Android Malware Detection Method Based on Optimized Feature Extraction Using Graph Convolutional Network
With the development of the mobile Internet, mobile devices have been extensively promoted and popularized. Android, as the current popular mobile intelligent operating system, has encountered problems such as...
-
Chapter and Conference Paper
The Potential of Interactive Design in Children’s Picture Books and Its Impact on User Experience
With the development of digital technology, children’s picture books are transforming traditional printing to interactive digital media, which provides new possibilities for improving children’s reading experi...
-
Chapter and Conference Paper
Balanced Hop-Constrained Path Enumeration in Signed Directed Graphs
Hop-constrained path enumeration, which aims to output all the paths from two distinct vertices within the given hops, is one of the fundamental tasks in graph analysis. Previous works about this problem mainl...
-
Chapter and Conference Paper
Discovering Densest Subgraph over Heterogeneous Information Networks
Densest Subgraph Discovery (DSD) is a fundamental and challenging problem in the field of graph mining in recent years. The DSD aims to determine, given a graph G, the subgraph with the maximum density according ...
-
Article
Feature reduction of unbalanced data classification based on density clustering
With the development of big data, the problem of imbalanced data sets is becoming more and more serious. When dealing with high-dimensional imbalanced datasets, traditional classification algorithms usually te...
-
Article
Healthcare and Fitness Services: A Comprehensive Assessment of Blockchain, IoT, and Edge Computing in Smart Cities
Edge computing, blockchain technology, and the Internet of Things have all been identified as key enablers of innovative city initiatives. A comprehensive examination of the research found that IoT, blockchain...
-
Article
Hadamard Encoding Based Frequent Itemset Mining under Local Differential Privacy
Local differential privacy (LDP) approaches to collecting sensitive information for frequent itemset mining (FIM) can reliably guarantee privacy. Most current approaches to FIM under LDP add “padding and sampl...
-
Article
Handwritten Chinese signature detection with simple Copy–Paste augmentation on power plants technical documents
Verification and validation of signed documents holds the key to successful operation in many industries such as manufacturing and energy. In power plants, a huge amount of technical documents is accumulated o...