![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Open AccessHarmfulness metrics in digital twins of social network rumors detection in cloud computing environment
Social network rumor harm metric is a task to score the harm caused by a rumor by analyzing the spreading range of the rumor, the users affected, the repercussions caused, etc., and then the harm caused by the...
-
Article
A novel cross-network node pair embedding methodology for anchor link prediction
Anchor link prediction across social networks is highly important for multiple social network analysis. Traditional methods rely heavily on user-generated information or the quality of network topology informa...
-
Article
Examining the applications of intelligent tutoring systems in real educational contexts: A systematic literature review from the social experiment perspective
Intelligent Tutoring Systems (ITSs) have a great potential to effectively transform teaching and learning. As more efforts have been put on designing and develo** ITSs and integrating them within learning an...
-
Chapter and Conference Paper
Activities-Centered Participatory Community Design: Shoupa Community Service Station Rooftop Renovation Plan
This paper first provides an overview of the urban regeneration process of Bei**g since the1970s, with a focus of the shift from material promotion to historical cultural preservation and sustainability promo...
-
Chapter and Conference Paper
TTS-GAN: A Transformer-Based Time-Series Generative Adversarial Network
Signal measurements appearing in the form of time series are one of the most common types of data used in medical machine learning applications. However, such datasets are often small, making the training of d...
-
Chapter and Conference Paper
Privacy-Preserving Face Recognition with Learnable Privacy Budgets in Frequency Domain
Face recognition technology has been used in many fields due to its high recognition accuracy, including the face unlocking of mobile devices, community access control systems, and city surveillance. As the cu...
-
Article
Open AccessInvestigating feedback implemented by instructors to support online competency-based learning (CBL): a multiple case study
Instructional feedback has the power to enhance learning. However, learners do not always feel satisfied with their feedback experience. Simultaneously, little attention has been paid on investigating how feed...
-
Chapter and Conference Paper
A Capacitive Flexible Tactile Sensor
In this paper, a capacitive flexible tactile sensor was designed to measure the pressure of objects based on MEMS technology. This sensor is a structure of a 4 × 4 array, with metal Ag as the capacitive electr...
-
Article
Existence identifications of unobserved paths in graph-based social networks
In recent years, social networks have surged in popularity as one of the main applications of the Internet. One key aspect of social network research is exploring important unobserved network information which...
-
Chapter and Conference Paper
A Flexible Film Thermocouple Temperature Sensor
This article introduces a thin-film thermocouple temperature sensor with symmetrical electrode structure. It uses PI film as a flexible substrate. Cu film and CuNi film made by MEMS manufacturing process as p...
-
Chapter and Conference Paper
Federated Learning in Side-Channel Analysis
Recently introduced federated learning is an attractive framework for the distributed training of deep learning models with thousands of participants. However, it can potentially be used with malicious intent....
-
Chapter and Conference Paper
Multi-UAV Cooperative Exploring for the Unknown Indoor Environment Based on Dynamic Target Tracking
This paper proposes a method for collaborative exploration adopting multiple UAVs in an unknown GPS-denied indoor environment. The core of this method is to use the Tracking-D*Lite algorithm to track moving ta...
-
Chapter and Conference Paper
Research on Bionic Robot Micro Adsorption Mechanism SMA Driven System
In view of the shape memory alloy (SMA) actuation and sensing properties of smart materials, using of SMA output larger driving force in the process of phase transformation, a biasing SMA rigid elastic coupli...
-
Chapter and Conference Paper
Incorporating External Knowledge to Boost Machine Comprehension Based Question Answering
We propose an effective knowledge representation network via a two-level attention mechanism, called KRN, to represent the background knowledge of entities in documents for boosting machine comprehension (MC)....
-
Chapter and Conference Paper
Urban Interaction Design Supports Modular Design Practice for Urban Public Space
Multiple-dimensional structured urban space directs to an inter-disciplinary considers on public space utilization. The people-users are consciously and unconsciously in the communicative activities with the c...
-
Chapter and Conference Paper
Continuous Nearest Neighbor Query with the Direction Constraint
This paper proposes a new spatial data query, the continuous nearest neighbor query with the direction constraint (DCNN query). The DCNN query finds the nearest point of interest (POI), which also satisfies th...
-
Chapter and Conference Paper
Cross-Lingual Entity Matching for Heterogeneous Online Wikis
Knowledge bases play an increasing important role in many applications. However, many knowledge bases mainly focus on English knowledge, and have only a few knowledge for low-resource languages (LLs). If we ca...
-
Chapter and Conference Paper
Bridge the Physical and Virtual Design for Hutongs - Creative Design Supports Hutongs Community Participation
In the context of the urban renovation process, hutong community has become the focus of creative design in Bei**g, and there have been practical cases of hutongs that can improve public participation and acc...
-
Article
An event detection method for social networks based on hybrid link prediction and quantum swarm intelligent
How can we discover and estimate major events in complex social networks? Even with ever enlarging networks and data scale? Event detection and evaluation in social networks provide an effective solution, whic...
-
Chapter and Conference Paper
An Efficient Passive Authentication Scheme for Copy-Move Forgery Based on DCT
Digital images can be easily manipulated due to availability of powerful image processing software. Passive authentication as a common challenge method of digital image authentication is extensively used to de...