![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Open AccessClassification of barely visible impact damage in composite laminates using deep learning and pulsed thermographic inspection
With the increasingly comprehensive utilisation of Carbon Fibre-Reinforced Polymers (CFRP) in modern industry, defects detection and characterisation of these materials have become very important and draw sign...
-
Article
Open AccessA semi-supervised short text sentiment classification method based on improved Bert model from unlabelled data
Short text information has considerable commercial value and immeasurable social value. Natural language processing and short text sentiment analysis technology can organize and analyze short text information ...
-
Article
Open AccessA machine learning-based clustering approach to diagnose multi-component degradation of aircraft fuel systems
Accurate fault diagnosis and prognosis can significantly reduce maintenance costs, increase the safety and availability of engineering systems that have become increasingly complex. It has been observed that v...
-
Article
Open AccessAutomatic reconstruction of irregular shape defects in pulsed thermography using deep learning neural network
Quantitative defect and damage reconstruction play a critical role in industrial quality management. Accurate defect characterisation in Infrared Thermography (IRT), as one of the widely used Non-Destructive T...
-
Article
Open AccessCrowdMed-II: a blockchain-based framework for efficient consent management in health data sharing
The healthcare industry faces serious problems with health data. Firstly, health data is fragmented and its quality needs to be improved. Data fragmentation means that it is difficult to integrate the patient ...
-
Article
Open AccessSuffix-based double reader tag movement RFID anti-collision method
At present, some existing tag anti-collision algorithms are used mostly in scenarios of fixed number of tags and they perform poorly in tag moving scenarios. Therefore, this paper proposes a double reader tag ...
-
Article
Deep cross-platform product matching in e-commerce
Online shop** has become more and more popular in recent years, which leads to a prosperity on online platforms. Generally, the identical products are provided by many sellers on multiple platforms. Thus the...
-
Chapter and Conference Paper
Neural Multi-task Learning for Teacher Question Detection in Online Classrooms
Asking questions is one of the most crucial pedagogical techniques used by teachers in class. It not only offers open-ended discussions between teachers and students to exchange ideas but also provokes deeper ...
-
Chapter and Conference Paper
Philosophical Principles of Data Discovery
Data discovery is a basis in science and technology research because of nothing to do in case of no data. So, it is very important to find data. Where is the data? Data exists in the research objects which inc...
-
Chapter and Conference Paper
Parallel Search by Reinforcement Learning for Object Detection
Object detection algorithms generally search through extensive potential areas without considering spatial correlations. To fully utilize rich information contained in high-level image features, a hierarchical...
-
Chapter and Conference Paper
A Security-Enhanced vTPM 2.0 for Cloud Computing
Virtual Trusted Platform Module is required in cloud due to the scalability and migration of virtual machine. Through allocating a vTPM (Virtual Trusted Platform Module) to a VM (Virtual Machine), users of VM...
-
Chapter and Conference Paper
Three Dimensional Stress Wave Imaging Method of Wood Internal Defects Based on TKriging
In order to detect the size, shape and degree of decay inside wood, a three dimensional stress wave imaging method based on TKriging is proposed. The method uses sensors to obtain the stress wave velocity data...
-
Chapter and Conference Paper
Deep CORAL: Correlation Alignment for Deep Domain Adaptation
Deep neural networks are able to learn powerful representations from large quantities of labeled input data, however they cannot always generalize well across changes in input distributions. Domain adaptation ...
-
Chapter and Conference Paper
MB-DDIVR: A Map-Based Dynamic Data Integrity Verification and Recovery Scheme in Cloud Storage
Outsourcing data to are remote cloud service provider allows organizations or individual users to store more data on the cloud storage than on private computer systems. However, a specific problem encountered ...
-
Chapter and Conference Paper
Small-Scale Evaluation of Tobacco Planting Suitability Based on Spatial Information Technology
Crop planting suitability evaluation is important for agricultural production. In this study, a comprehensive evaluation framework which combined geographical information system, remote sensing, global positio...
-
Chapter and Conference Paper
Information Service System For Small Forestowners
Individual owned forests have boomed in the last decade in China. Hundreds of millions of private forest owners have emerged since years of afforestation practice and collective forest ownership reform. Most o...
-
Chapter
Program Verification by Using DISCOVERER
Recent advances in program verification indicate that various verification problems can be reduced to semi-algebraic system (SAS for short) solving. An SAS consists of polynomial equations and polynomial inequ...