![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
A Clustered Routing Protocol with Distributed Intrusion Detection for Wireless Sensor Networks
Clustered routing protocols in wireless sensor networks (WSN) provide significant advantages in energy saving and data preprocessing. However, the communication greatly depends on cluster heads, which leads to...
-
Chapter and Conference Paper
Short-Term Power Load Forecasting by Interval Type-2 Fuzzy Logic System
Power load forecasting is very important in power industry, which can ensure power network runs safely and economically. A novel method for forecasting power load based on interval type-2 fuzzy logic system is...
-
Chapter and Conference Paper
Group Signature Based Trace Hiding in Web Query
To provide better service or push personalized advertisement, Internet companies collect users’ browsing information intentionally to analyze their behaviors. However, users want to hide browsing traces someti...
-
Chapter and Conference Paper
Target Detection and Tracking in Big Surveillance Video Data
The big video data information has become widely used in many application areas such as video monitoring. Moving object detection and tracking is one of the most important and difficult problems. This paper pu...
-
Chapter and Conference Paper
Privacy Preserving in the Publication of Large-Scale Trajectory Databases
In recent years, preserving individual privacy when publishing trajectory data receives increasing attention. However, the existing trajectory data privacy preserving techniques cannot resolve the anonymous is...
-
Chapter and Conference Paper
An Asynchronous 2D-Torus Network-on-Chip Using Adaptive Routing Algorithm
An asynchronous 2D-Torus Network-on-Chip (ATNoC) design based on System Verilog is implemented in this paper. A dynamic asynchronous XY routing algorithm DA-XY is proposed and designed as an Intellectual Prope...
-
Article
A novel reputation incentive mechanism and game theory analysis for service caching in software-defined vehicle edge computing
Service caching can improve the QoS of computationally intensive vehicle applications by pre-storing the necessary application programs and related data for computing tasks on edge servers. In this paper, we p...
-
Article
An image classification model based on transfer learning for ulcerative proctitis
Ulcerative colitis (UC) can be classified as proctitis, left-sided colitis or pancolitis, usually with rectal involvement at the beginning. Mucosal carcinogenesis is one of the most severe complications of UC....
-
Article
Reducing blind spots in esophagogastroduodenoscopy examinations using a novel deep learning model
The intricate architecture of gastric anatomy coupled with the complexities inherent in esophagogastroduodenoscopy (EGD) procedures can lead to blind spots during examinations. These blind spots refer to anato...