![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Open AccessAccess control scheme based on blockchain and attribute-based searchable encryption in cloud environment
With the rapid development of cloud computing technology, how to achieve secure access to cloud data has become a current research hotspot. Attribute-based encryption technology provides the feasibility to ach...
-
Article
Open AccessFSPLO: a fast sensor placement location optimization method for cloud-aided inspection of smart buildings
With the awakening of health awareness, people are raising a series of health-related requirements for the buildings they live in, with a view to improving their living conditions. In this context, BIM (Buildi...
-
Article
Open AccessMemory sharing for handling memory overload on physical machines in cloud data centers
Over-committing computing resources is a widely adopted strategy for increased cluster utilization in Infrastructure as a Service (IaaS) cloud data centers. A potential consequence of over-committing computing...
-
Article
Open AccessCollaborative task offloading and resource allocation with hybrid energy supply for UAV-assisted multi-clouds
Cloud computing has emerged as a promising paradigm for meeting the growing resource demands of Internet of Things (IoT) devices. Meanwhile, with the popularity of mobile aerial base stations, Unmanned Aerial ...
-
Chapter and Conference Paper
Design and Application of a Visual System for the Supply Chain of Thermal Coal Based on Big Data
Big data is now applied to many different fields. The paper will introduce the application of big data in the coal supply chain of the power industry. We designed and implemented a visual system for the Supply...
-
Chapter and Conference Paper
K-mer Counting for Genomic Big Data
Counting the abundance of all the k-mers (substrings of length k) in sequencing reads is an important step of many bioinformatics applications, including de novo assembly, error correction and multiple sequen...
-
Chapter and Conference Paper
A Multi-parameter Integrated Water Quality Sensors System
Because of the rapid development of aquaculture in China at present, it is more and more urgent to apply hi-tech devices in aquaculture field to guarantee its efficiency. There are already many devices used fo...
-
Chapter and Conference Paper
Intellectualized Identifying and Precision Control System for Horticultural Crop Diseases Based on Small Unmanned Aerial Vehicle
To explore small unmanned aerial vehicle (UAV) remote sensing identifying technology for horticultural crop diseases, and to combine it with small UAV spraying, the peach leaf blade was taken as material, the ...
-
Chapter and Conference Paper
Game Theoretic Approach for Cost-Benefit Analysis of Malware Proliferation Prevention
Many existing research efforts in the field of malware proliferation aim at modelling and analysing its spread dynamics. Many malware dissemination models are based on the characteristics of biological disease...
-
Chapter and Conference Paper
Simulated Analysis of a Wheeled Tractor on Soft Soil Based on RecurDyn
A simulation model of a wheeled tractor was built using the multi-body dynamics software RecurDyn. The model consisted of four wheels, front and rear axles, and a body frame. An interaction model between tires...
-
Chapter and Conference Paper
Rice Kernel Shape Description Using an Improved Fourier Descriptor
A Fourier descriptor is one of the best methods for describing object boundaries, but there are limitations in describing the boundary of rice kernels using traditional Fourier descriptors. An innovative appro...
-
Chapter and Conference Paper
Image Segmentation of Pseudo-foreign Fibers in Cotton on the Basis of Improved Genetic Algorithm
In the foreign fibers cleaning process, pseudo-foreign fibers are often mistaken for foreign fibers, this result not only seriously affects the detecting precision of foreign fibers cleaning machine, but also ...
-
Chapter and Conference Paper
Analyzing Key-Click Patterns of PIN Input for Recognizing VoIP Users
Malicious intermediaries are able to detect the availability of VoIP conversation flows in a network and observe the IP addresses used by the conversation partners. However, it is insufficient to infer the cal...
-
Chapter and Conference Paper
Development of the Information Management System for Monitoring Alien Invasive Species
One of the effective methods to prevent the excessive extending of alien invasive species is to really master their epidemic trends and to take appropriate measures to control them. So, the information managem...
-
Chapter and Conference Paper
Modeling and Simulation for the Spread of H1N1 Influenza in School Using Artificial Societies
According to the outbreak of H1N1 influenza on campus in Langfang city, Hebei province, at north of China in 2009, this paper constructed an artificial society model of the school, and simulated the spread of ...
-
Chapter and Conference Paper
The User’s Emotional Elements Research of Mobile Network Products Development Guided by User Experience
In the whole products process of enterprise-class, the product definition decides the product’s “gene”. By way of in-depth research on user experience and behavior, our brand strategy, product planning and pro...
-
Chapter and Conference Paper
Research and Application of Cultivation-Simulation-Optimization Decision Making System for Rapeseed (Brassica Napus L.)
The objectives of this study were to develop Rapeseed Cultivation Simulation-Optimization-Decision Making System (Rape-CSODS), and validate it in order to design rapeseed planting, regulate and control its gro...
-
Chapter and Conference Paper
Object Link Structure in the Semantic Web
Lots of RDF data have been published in the Semantic Web. The RDF data model, together with the decentralized linkage nature of the Semantic Web, brings object link structure to the worldwide scope. Object lin...
-
Chapter and Conference Paper
An Analysis for Anonymity and Unlinkability for a VoIP Conversation
With the growth of its popularity, VoIP is increasingly popular nowadays. Similarly to other Internet applications, VoIP users may desire to be unlinkable with their participated VoIP session records for priva...
-
Chapter and Conference Paper
Assisting Trustworthiness Based Web Services Selection Using the Fidelity of Websites
Web services selection aims to choose an appropriate web service among a number of service candidates. The trustworthiness of web services is an important metric for web services selection. Many trustworthines...