112 Result(s)
-
Article
Open AccessAnalysis and prediction of virtual machine boot time on virtualized computing environments
Starting a virtual machine (VM) is a common operation in cloud computing platforms. In order to achieve better management of resource provisioning, a cloud platform needs to accurately estimate the VM boot tim...
-
Chapter and Conference Paper
Numerical Investigation on Turbulence Models and the Hydrodynamics of a UVMS
Underwater vehicle-manipulator systems (UVMS) have been widely used in many underwater tasks. In this paper, a numerical investigation of the hydrodynamic performances of a small-size UVMS is carried out by us...
-
Chapter and Conference Paper
Exploring the Role of Culture-Centric Design Guidelines in the Design of mHealth Application for Senior Informal Caregivers: Lessons Learned in a Field Study
Mobile health (mHealth) applications help reduce the burden of informal caregivers. However, limited mHealth applications are fully adopted by informal caregivers. Research has suggested that cultural tendency...
-
Chapter and Conference Paper
Design and Control of a Bimanual Rehabilitation System for Trunk Impairment Patients
Stroke is one of the leading causes of severe long-term disability worldwide. Past research has proved the effectiveness and importance of trunk rehabilitation in enhancing the locomotive capacities and balanc...
-
Chapter and Conference Paper
Facial Action Unit Detection by Exploring the Weak Relationships Between AU Labels
In recent years, facial action unit (AU) detection attracts more and more attentions and great progress has been made. However, few approaches solve AU detection problem by applying the emotion information, an...
-
Chapter and Conference Paper
BIPS: Bi-modal Indoor Panorama Synthesis via Residual Depth-Aided Adversarial Learning
Providing omnidirectional depth along with RGB information is important for numerous applications. However, as omnidirectional RGB-D data is not always available, synthesizing RGB-D panorama data from limited ...
-
Chapter and Conference Paper
Adaptive Technologies of Hybrid Carrier Based on WFRFT Facing Coverage and Spectral Efficiency Balance
Adaptive Modulation and Coding (AMC) and power control are adopted to balance spectral efficiency and coverage facing the problem of spectrum shortage in recent years. Considering the Orthogonal Frequency Divi...
-
Chapter and Conference Paper
XRR: Explainable Risk Ranking for Financial Reports
We propose an eXplainable Risk Ranking (XRR) model that uses multilevel encoders and attention mechanisms to analyze financial risks among companies. In specific, the proposed method utilizes the textual infor...
-
Chapter and Conference Paper
Coverless Image Information Hiding Based on Deep Convolution Features
The coverless information hiding technology proposed in recent years does not need to modify the carrier image and has good anti-detection ability. However, the existing coverless information hiding technology...
-
Chapter and Conference Paper
VTLayout: Fusion of Visual and Text Features for Document Layout Analysis
Documents often contain complex physical structures, which make the Document Layout Analysis (DLA) task challenging. As a pre-processing step for content extraction, DLA has the potential to capture rich infor...
-
Chapter and Conference Paper
SQKT: A Student Attention-Based and Question-Aware Model for Knowledge Tracing
The goal of Knowledge Tracing (KT) is to trace student’s knowledge states in relation to different knowledge concepts and make prediction of student’s performance on new exercises. With the growing number of o...
-
Article
Open AccessCNN based lane detection with instance segmentation in edge-cloud computing
At present, the number of vehicle owners is increasing, and the cars with autonomous driving functions have attracted more and more attention. The lane detection combined with cloud computing can effectively s...
-
Chapter and Conference Paper
Performance Analysis of QUIC-UDP Protocol Under High Load
The QUIC protocol is currently recognized as a network pro- tocol that is expected to replace TCP. It is characterized by encryption, multiplexing, and low latency. It was proposed by Google in 2013 and aims t...
-
Chapter and Conference Paper
Double LSTM Structure for Network Traffic Flow Prediction
The network traffic prediction is important for service quality control in computer network. The performance of the traditional prediction method significantly degrades for the burst short-term flow. In view o...
-
Chapter and Conference Paper
Mind the Propagation of States
Impossible differentials cryptanalysis and impossible polytopic cryptanalysis are the most effective approaches to estimate the security of block ciphers. However, the previous automatic search methods of thei...
-
Chapter and Conference Paper
Class Indistinguishability for Outsourcing Equality Conjunction Search
Searchable symmetric encryption (SSE) enables a remote cloud server...
-
Chapter and Conference Paper
GparMiner: A System to Mine Graph Pattern Association Rules
With the rapid development, social network analysis has been receiving significant attention. One popular direction in the filed is to mine graph-pattern association rules (
-
Chapter and Conference Paper
Detection of Overlapped Apples in Orchard Scene Using Improved K-means and Distance Least Square
Automatic detection of mature apples in a complex agricultural condition is still a challenge for an autonomous picking robot due to the influence from overlap**. In order to detecting overlapped apples in t...
-
Chapter and Conference Paper
Mixing Property Tester: A General Framework for Evaluating the Mixing Properties of Initialization of Stream Ciphers
In this paper, a general framework for evaluating the mixing properties of initialization of stream ciphers, called Mixing Property Tester-MPT, is exploited and formalized. Based on this general framework, we pro...
-
Chapter and Conference Paper
Detection of Young Green Apples in Orchard Environment Using Adaptive Ratio Chromatic Aberration and HOG-SVM
It is still a challenge for fruit robot to automatic detecting young green apples in a complex grove environment due to color similarity with the background and varying illumination conditions. The purpose of ...