![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
A Soft Robotic Glove for Hand Rehabilitation Using Pneumatic Actuators with Variable Stiffness
Traditional rigid robots exist many problems in rehabilitation training. Soft robotics is conducive to breaking the limitations of rigid robots. This paper presents a soft wearable device for the rehabilitatio...
-
Chapter and Conference Paper
New Robustness Measures of Communication Networks Against Virus Attacks
The robustness of the communication network is an important measurement of network connectivity after some attacks, such as virus and failure. To evaluate the network robustness, many robustness measures have...
-
Chapter and Conference Paper
Application of DeepWalk Based on Hyperbolic Coordinates on Unsupervised Clustering
In the real world, various information can be represented by graph structure data. For example, interpersonal relationships and protein structure. In recent years, with the development of artificial intellige...
-
Chapter and Conference Paper
High-Efficiency Triangle Counting on the GPU
Triangle counting is an important step in calculating the network clustering confficient and transitivity, and is widely used in important role recognition, spam detection, community discovery, and biological ...
-
Chapter and Conference Paper
Force Analysis and Experiment of Variable Stiffness Soft Actuator Based on Particle Jamming
At present, the jamming mechanism has some problems such as particles rearrangement and elastoplastic deformation. Therefore, this paper proposes a variable stiffness soft actuator based on the combination of ...
-
Chapter and Conference Paper
Multiplex PageRank in Multilayer Networks Considering Shunt
Recently it has been recognized that many complex biological, technological and social networks have a multilayer nature and can be described by multilayer networks. Multilayer networks are formed by a set of ...
-
Chapter and Conference Paper
The Model of Malware Propagation in Wireless Sensor Networks with Regional Detection Mechanism
The characteristics of wireless sensor networks can be programmed over the air interface lead to a serious threat to its security. This paper proposed susceptible - infectious - recovered model of propagation ...