Skip to main content

previous disabled Page of 10
and
  1. No Access

    Article

    Ethereum fraud behavior detection based on graph neural networks

    Since Bitcoin was first conceived in 2008, blockchain technology has attracted a large amount of researchers’ attention. At the same time, it has also facilitated a variety of cybercrimes. For example, Ethereu...

    Runnan Tan, Qingfeng Tan, Qin Zhang, Peng Zhang, Yushun **e, Zhao Li in Computing (2023)

  2. No Access

    Article

    Energy-aware scheduling for spark job based on deep reinforcement learning in cloud

    Big data frameworks such as Storm, Spark and Hadoop are widely deployed in commercial and research applications, the energy consumption of cloud data centers that support big data processing platforms is becom...

    Hongjian Li, Liang Lu, Wenhu Shi, Gangfan Tan, Hao Luo in Computing (2023)

  3. No Access

    Chapter and Conference Paper

    Deep Motion Flow Estimation for Monocular Endoscope

    For monocular endoscope motion estimation, traditional algorithms often suffer from poor robustness when encountering uninformative or dark frames since they only use prominent image features. In contrast, dee...

    Min Tan, Lijuan Feng, Zeyang **a, **g **ong in Intelligent Robotics and Applications (2022)

  4. No Access

    Chapter and Conference Paper

    Gait Time Parameter Analysis-Based Rehabilitation Evaluation System of Lower Limb Motion Function

    Aiming at the problems of low accuracy and high time cost of existing motion function rehabilitation evaluation methods, this paper proposes a rehabilitation evaluation method and system of lower limb motion f...

    Yue-Peng Zhang, Guang-Zhong Cao, Jiang-Cheng Chen in Intelligent Robotics and Applications (2022)

  5. No Access

    Chapter and Conference Paper

    Structural Design and Control of a Multi-degree-of-freedom Modular Bionic Arm Prosthesis

    Due to various reasons of natural disasters, car accidents, diseases and so on, different levels of amputations such as hand, wrist and shoulder disarticulation have been caused. A modular structural design of...

    Yingxiao Tan, Yue Zheng, **angxin Li, Guanglin Li in Intelligent Robotics and Applications (2022)

  6. No Access

    Chapter and Conference Paper

    Robotic Replacement System for Thermocouple Components in the Nuclear Power Plant

    Aiming at leakage, crystallization and deformation of RIC (In-Core Instrumentation) system, the thermocouple is mainly used to measure the outlet temperature of the reactor core coolant in the RIC system, whic...

    Haihua Huang, Yujie Feng, Yi Tan, Rui Ma in Intelligent Robotics and Applications (2022)

  7. No Access

    Chapter and Conference Paper

    Spatial Dependency in Software-Defined Networking In-Band Monitoring: Challenges and Future Perspective

    Software-Defined Networking (SDN) enhances the current networking infrastructure to be more flexible and manageable. The traditional networking infrastructure is heavily reliant on the hardware devices resulte...

    Chin Jun Nan, Tan Saw Chin in Mobile Web and Intelligent Information Systems (2022)

  8. No Access

    Chapter and Conference Paper

    An Improved Certificateless Partial Blind Signature Scheme Based on Homomorphic Encryption

    A modified Paillier homomorphic cryptography-based partial blind signature scheme is proposed to address the problems of centralized key generation in traditional blind signature schemes and the fact that the ...

    Pengfei Tan, Zhi Qin, Wunan Wan in Advances in Artificial Intelligence and Se… (2022)

  9. No Access

    Chapter and Conference Paper

    Identifying Factors Limiting the Prevalent Use of BIM Technology in the Turkish Construction Industry

    BIM can be defined in many ways such as system, approach, method, process, and information model. BIM technology has been adopted and used worldwide in recent years and continues to become widespread with its ...

    Seda Tan, Gülden Gümüşburun Ayalp in Advances in Building Information Modeling (2022)

  10. No Access

    Chapter and Conference Paper

    Machine Learning Inspired Fault Detection of Dynamical Networks

    Dynamical networks are a framework commonly used to model large networks of interacting time-varying components such as power grids and epidemic disease networks. The connectivity structure of dynamical networ...

    Eugene Tan, Débora C. Corrêa, Thomas Stemler in AI 2022: Advances in Artificial Intelligen… (2022)

  11. Chapter and Conference Paper

    Correction to: Performance Analysis of V2V-Based Vehicular Platoon with Modified CACC Scheme

    In the originally published chapter 52 the Figure 3 did not present the information correctly. The Figure 3 has been corrected by adding a blue dotted line to the graph.

    Siyuan Zhou, in Wireless Algorithms, Systems, and Applications (2021)

  12. No Access

    Chapter and Conference Paper

    Performance Analysis of V2V-Based Vehicular Platoon with Modified CACC Scheme

    By exploiting vehicle-to-vehicle (V2V) communication in vehicular platoon system, the platoon members could receive the real-time vehicle dynamics information of the leader vehicle and the preceding vehicle, w...

    Siyuan Zhou, in Wireless Algorithms, Systems, and Applications (2021)

  13. No Access

    Chapter and Conference Paper

    Deep Reinforcement Learning Based Collaborative Mobile Edge Caching for Omnidirectional Video Streaming

    Omnidirectional virtual reality video streaming requires high data rate and low latency to provide immersive experiences. Caching video contents at collaborative wireless edge servers is a promising approach t...

    Zengjie Tan, Yuanyuan Xu in Wireless Algorithms, Systems, and Applications (2021)

  14. No Access

    Article

    Towards emotion-sensitive learning cognitive state analysis of big data in education: deep learning-based facial expression analysis using ordinal information

    The boom of big data in education has provided an unrivalled opportunity for educators to evaluate the learners’ cognitive state. However, most existing cognitive state analysis methods focus on attention, ign...

    Ruyi Xu, **gying Chen, Jiaxu Han, Lei Tan, Luhui Xu in Computing (2020)

  15. No Access

    Chapter and Conference Paper

    A Hybrid Data-Driven Approach for Predicting Remaining Useful Life of Industrial Equipment

    Guaranteeing the safety of equipment is extremely important in industry. To improve reliability and availability of equipment, various methods for prognostics and health management (PHM) have been proposed. P...

    Zheng Tan, Yi** Wen, TianCai Li in Data Science (2020)

  16. No Access

    Chapter and Conference Paper

    Atomic Cross-Chain Swap-Based Decentralized Management System in Vehicular Networks

    Blockchain-based applications in VANETs could improve traffic safety and efficiency by dynamic key management and distributed trust management. However, the limited performance of a single blockchain cannot me...

    Chenkai Tan, Zhengjun **g, Shaoyi Bei in Frontiers in Cyber Security (2020)

  17. No Access

    Chapter and Conference Paper

    Automatic Detection of Solar Radio Spectrum Based on Codebook Model

    Space weather can affect human production and life, and solar radio burst will seriously affect space weather. Automatic detection of solar radio bursts in real time has a positive effect on space weather warn...

    Guoliang Li, Guowu Yuan, Hao Zhou, Hao Wu, Chengming Tan, Liang Dong in Data Science (2020)

  18. No Access

    Chapter and Conference Paper

    HCI Design Education at Hunan University: A Practical Case in Chinese Design Schools

    HCI design education is rapidly develo** in China, and HCI design and interaction design are in the process of becoming the main areas of specialty in Chinese design schools. This paper presents an overview...

    Hao Tan, Jialing Li in HCI International 2020 – Late Breaking Posters (2020)

  19. No Access

    Chapter and Conference Paper

    Design of Personal Credit Information Sharing Platform Based on Consortium Blockchain

    The technical features of blockchain, including decentralization, data transparency, tamper-proofing, traceability, privacy protection and open-sourcing, make it a suitable technology for solving the informati...

    **g Zhang, Rong Tan, Yu-dong Li in Frontiers in Cyber Security (2020)

  20. No Access

    Chapter and Conference Paper

    Application of Blockchain Technology to the Credit Management of Supply Chain

    Blockchain technology has been extensively applied to Supply Chain Management (SCM). Based on technological innovations such as distributed ledgers, symmetric encryption, authorization, consensus mechanisms, a...

    Rong Tan, Yudong Li, **g Zhang, Wen Si in Frontiers in Cyber Security (2020)

previous disabled Page of 10