![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Do** Effect on Chloroindium Phthalocyanine (ClInPc)/C60 Solar Cells
For inorganic semiconductor solar cells, controlled do** is important because it can cause Fermi level shift of the inorganic semiconductor and achieve ohmic contact at the metal-semiconductor interface. In ...
-
Article
Complementary and alternative medicine therapies for the anesthesiologist and pain practitioner: a narrative review
This narrative review provides an overview of the complementary and alternative medicine (CAM) therapies that anesthesiologists and pain management practitioners commonly encounter along with recommendations f...
-
Chapter and Conference Paper
Experiential Interaction Modeling for Virtual Training of Ultra-High Voltage Power System and Its Application
Staff skills training of Ultra-High voltage (UHV) power system have an urgent need for virtual reality (VR) simulation technique, and the interaction modeling is the critical factor to decide the effectivenes...
-
Chapter and Conference Paper
A Model and Application of Collaborative Simulation Training System for Substation Based on Virtual Reality
Regarding the imperfection and poor collaborative interaction ability in existing substation simulation training system, this paper proposes a virtual reality simulation training system model for multiuser coo...
-
Article
Exponential negation of a probability distribution
Negation operation is important in intelligent information processing. Different existing arithmetic negation, an exponential negation is presented in this paper. The new negation can be seen as a kind of geom...
-
Chapter and Conference Paper
A Feature Extraction Algorithm Based on Blockchain Storage that Combines ORB Feature Points and Quadtree Division
In the process of 5G power grid inspection robot moving for a long time, the sensor constantly collects the feature information of the substation. Due to the limited memory capacity, this feature information m...
-
Chapter and Conference Paper
Design and Analysis of Two Efficient Socialist Millionaires’ Protocols for Privacy Protection
Yao's Millionaires’ problem has led to the emergence of secure multi-party computation. As an important tool for privacy protection in cryptography, secure multi-party computation has attracted more and more s...
-
Article
Open AccessThe secure judgment of graphic similarity against malicious adversaries and its applications
With the advent of the era of big data, privacy computing analyzes and calculates data on the premise of protecting data privacy, to achieve data ‘available and invisible’. As an important branch of secure mul...
-
Article
CNN-VAE: An intelligent text representation algorithm
Collecting and analyzing data from all devices to improve the efficiency of business processes is an important task of Industrial Internet of Things (IIoT). In the age of data explosion, extensive text data ge...
-
Article
MF-DAT: a stock trend prediction of the double-graph attention network based on multisource information fusion
Stock forecasting research, which aims to predict the future price movement of stocks, has been the focus of investors and scholars. This is important for practical applications related to human-centric comput...
-
Article
Correction to: MFDAT: a stock trend prediction of the doublegraph attention network based on multisource information fusion