![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Open AccessStroke-GAN Painter: Learning to paint artworks using stroke-style generative adversarial networks
It is a challenging task to teach machines to paint like human artists in a stroke-by-stroke fashion. Despite advances in stroke-based image rendering and deep learning-based image rendering, existing painting...
-
Article
Machine translation and its evaluation: a study
Machine translation (namely MT) has been one of the most popular fields in computational linguistics and Artificial Intelligence (AI). As one of the most promising approaches, MT can potentially break the lang...
-
Article
Profit-based deep architecture with integration of reinforced data selector to enhance trend-following strategy
Despite the popularity of trend-following strategies in financial markets, they often lack adaptability to the emerging varied markets. Recently, deep learning (DL) methods demonstrate the effectiveness in sto...
-
Article
Leveraging deep learning for automatic literature screening in intelligent bibliometrics
Intelligent bibliometrics, by providing sufficient statistical information based on large-scale literature data analytics, is promising for understanding innovative pathways, addressing meaningful insights wit...
-
Chapter
Elastic Resource Allocation in Sharding-Based Blockchains
This chapter studies the PBFT-based sharded permissioned blockchain, which executes in either a local datacenter or a rented cloud platform. In such permissioned blockchain, the transaction (TX) assignment str...
-
Chapter
An Amalgamation of Blockchain and Connected Health for Combating COVID-19
The coronavirus disease created an unprecedented stress around the world. Because resources became severely constrained, especially during the , approaches to increase supply took center stage. The ...
-
Article
Kubernetes in IT administration and serverless computing: An empirical study and research challenges
Today’s industry has gradually realized the importance of lifting efficiency and saving costs during the life-cycle of an application. In particular, we see that most of the cloud-based applications and servic...
-
Chapter
Overview of Blockchain Intelligence
We have experienced the proliferation of diverse blockchain platforms, including cryptocurrencies as well as private blockchains. In this chapter, we present an overview of blockchain intelligence. We first br...
-
Chapter
Open Research Directions
Although blockchain intelligence has great potential to further improve existing blockchain systems, there are open research directions in this emerging area. In this chapter, we discuss the open issues of blo...
-
Chapter
On-chain and Off-chain Blockchain Data Collection
After the introduction of blockchain intelligence in Chap. 1, in this chapter, we present an overview of blockchain data collection. We first review the data growth brought ab...
-
Chapter and Conference Paper
MFF-AMD: Multivariate Feature Fusion for Android Malware Detection
Researchers have turned their focus on leveraging either dynamic or static features extracted from applications to train AI algorithms to identify malware precisely. However, the adversarial techniques have be...
-
Chapter and Conference Paper
Exploring Self-attention Mechanism of Deep Learning in Cloud Intrusion Detection
Cloud computing offers elastic and ubiquitous computing services, thereby receiving extensive attention recently. However, cloud servers have also become the targets of malicious attacks or hackers due to the ...
-
Chapter and Conference Paper
Cryptocurrencies Price Prediction Using Weighted Memory Multi-channels
After the invention of Bitcoin and a peer to peer electronic cash system based on the blockchain, the market of cryptocurrencies increases rapidly and attracts substantial interest from investors and researche...
-
Chapter and Conference Paper
Lightweight Distributed Attribute Based Keyword Search System for Internet of Things
Internet of Things (IoT) is a promising networking paradigm that connects various kinds of sensors and exchanges data from smart devices. Since IoT always related to user’s daily life, the problems of security...
-
Article
Connectivity of cognitive radio ad hoc networks with directional antennas
In cognitive radio ad hoc networks, omni-directional antennas are typically used at both primary users (PUs) and secondary users (SUs), which can cause high interference. We name such cognitive radio ad hoc ne...
-
Article
Open AccessData analysis on video streaming QoE over mobile networks
One of recent proposals on standardizing quality of user experience (QoE) of video streaming over mobile network is video Mean Opinion Score (vMOS), which can model QoE of video streaming in 5 discrete grades....
-
Chapter and Conference Paper
A Novel Hybrid Data Mining Framework for Credit Evaluation
Internet loan business has received extensive attentions recently. How to provide lenders with accurate credit scoring profiles of borrowers becomes a challenge due to the tremendous amount of loan requests an...
-
Chapter and Conference Paper
AT-MAC: A Novel Full Duplex MAC Design for Achieving Asymmetric Transmission
Wireless Full-duplex technique can significantly improve system throughput of a wireless network. Most existing full-duplex-supporting wireless MAC schemes only achieve symmetric transmission (i.e., the uplink...
-
Chapter and Conference Paper
Parallelizing Simulated Annealing Algorithm in Many Integrated Core Architecture
The simulated annealing algorithm (SAA) is a well-established approach to the approximate solution of combinatorial optimisation problems. SAA allows for occasional uphill moves in an attempt to reduce the probab...
-
Article
Open AccessOn the delay reduction of wireless ad hoc networks with directional antennas
It is shown that the throughput capacity of wireless ad hoc networks using omni-directional antennas (OMN networks) is significantly decreased with the increased number of nodes. One major reason lies in the inte...