![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Open AccessIntelligent detection method of microparticle virus in silkworm based on YOLOv8 improved algorithm
The presence of microparticle viruses significantly impacts the quality of silkworm seeds for domestic sericulture, making their exclusion from detection in silkworm seed production crucial. Traditional method...
-
Article
Retraction Note: Periodic multimedia spectrum sensing method based on high-order anti-jamming mechanism in cognitive wireless networks
-
Article
Open AccessAutomatic grid topology detection method based on Lasso algorithm and t-SNE algorithm
For a long time, the low-voltage distribution network has the problems of untimely management and complex and frequently changing lines, which makes the problem of missing grid topology information increasingl...
-
Article
Open AccessShort-term multi-step-ahead sector-based traffic flow prediction based on the attention-enhanced graph convolutional LSTM network (AGC-LSTM)
Accurate sector-based air traffic flow predictions are essential for ensuring the safety and efficiency of the air traffic management (ATM) system. However, due to the inherent spatial and temporal dependencie...
-
Article
Open AccessMulti-scale feature flow alignment fusion with Transformer for the microscopic images segmentation of activated sludge
Accurate microscopic images segmentation of activated sludge is essential for monitoring wastewater treatment processes. However, it is a challenging task due to poor contrast, artifacts, morphological similar...
-
Article
Open AccessGraphSAGE++: Weighted Multi-scale GNN for Graph Representation Learning
Graph neural networks (GNNs) have emerged as a powerful tool in graph representation learning. However, they are increasingly challenged by over-smoothing as network depth grows, compromising their ability to ...
-
Article
Open AccessFPGN: follower prediction framework for infectious disease prevention
In recent years, how to prevent the widespread transmission of infectious diseases in communities has been a research hot spot. Tracing close contact with infected individuals is one of the most severe problem...
-
Article
Open AccessMAFSIDS: a reinforcement learning-based intrusion detection model for multi-agent feature selection networks
Large unbalanced datasets pose challenges for machine learning models, as redundant and irrelevant features can hinder their effectiveness. Furthermore, the performance of intrusion detection systems (IDS) can...
-
Article
Open AccessSCRE: special cargo relation extraction using representation learning
The airfreight industry of ship** goods with special handling needs, also known as special cargo, often deals with non-transparent data and outdated technology, resulting in significant inefficiency. A speci...
-
Article
Open AccessData-driven modeling for thermo-elastic properties of vacancy-defective graphene reinforced nanocomposites with its application to functionally graded beams
The presence of unavoidable defects in the form of atom vacancies in graphene sheets considerably deteriorates the thermo-elastic properties of graphene-reinforced nanocomposites. Since none of the existing mi...
-
Article
Open AccessBeyond the horizon: immersive developments for animal ecology research
More diverse data on animal ecology are now available. This “data deluge” presents challenges for both biologists and computer scientists; however, it also creates opportunities to improve analysis and answer ...
-
Article
Open AccessRisk and UCON-based access control model for healthcare big data
The rapid development of healthcare big data has brought certain convenience to medical research and health management, but privacy protection of healthcare big data is an issue that must be considered in the ...
-
Article
Construction of high-dimensional cyclic symmetric chaotic map with one-dimensional chaotic map and its security application
Classical one-dimensional chaotic map has many ideal characteristics which is quite suitable for many different kinds of scientific fields, especially cryptography. In this paper, we propose an idea of constru...
-
Article
Open AccessAccelerated butterfly counting with vertex priority on bipartite graphs
Bipartite graphs are of great importance in many real-world applications. Butterfly, which is a complete \(2 \times 2\) ...
-
Article
Open AccessMaximum and top-k diversified biclique search at scale
Maximum biclique search, which finds the biclique with the maximum number of edges in a bipartite graph, is a fundamental problem with a wide spectrum of applications in different domains, such as E-Commerce, ...
-
Chapter
Knowledge Modeling and Incident Analysis for Special Cargo
The airfreight industry of ship** goods with special handling needs, also known as special cargo, suffers from nontransparent ship** processes, resulting in inefficiency. The LARA project (Lane Analysis an...
-
Article
Open AccessLearning 2-Opt Heuristics for Routing Problems via Deep Reinforcement Learning
Recent works using deep learning to solve routing problems such as the traveling salesman problem (TSP) have focused on learning construction heuristics. Such approaches find good quality solutions but require...
-
Article
Preface
-
Article
Correction: A survey of community search over big graphs
In the original article, the Table 1 was published with incorrect figures. The correct Table 1 is given below
-
Chapter and Conference Paper
Dynamic Pricing Using Thompson Sampling with Fuzzy Events
In this paper we study a repeated posted-price auction between a single seller and a single buyer that interact for a finite number of periods or rounds. In each round, the seller offers the same item for sale...