Skip to main content

Page of 293
and
  1. No Access

    Chapter and Conference Paper

    Spacecraft Information Flow Collaborative Design Model and Application

    To depict information flow structure of spacecraft system, the paper introduced information flow analysis method and defined tow information flow factors, the entity and the relationship. The relationships amo...

    Ruijun Li, Yanfang Fan, Jian Guo, Hongjun Zhang, Nan Pei in Wireless and Satellite Systems (2022)

  2. No Access

    Chapter and Conference Paper

    Open-Set Fault Diagnosis Method for Industrial Process Based on Semi-supervised Learning

    Aiming at the inconsistent distribution of labeled and unlabeled data categories in the actual industrial production process, this paper proposes an open-set semi-supervised process fault diagnosis method base...

    Jiaren Liu, Hong Song, Jianguo Wang in Intelligent Robotics and Applications (2022)

  3. No Access

    Chapter and Conference Paper

    Digging into Radiance Grid for Real-Time View Synthesis with Detail Preservation

    Neural Radiance Fields (NeRF) [31] series are impressive in representing scenes and synthesizing high-quality novel views. However, most previous works fail to preserve texture details and suffer from slow traini...

    Jian Zhang, **chi Huang, Bowen Cai, Huan Fu, Mingming Gong in Computer Vision – ECCV 2022 (2022)

  4. No Access

    Chapter and Conference Paper

    The Calibration of Pre-travel Error and Installation Eccentricity Error for On-Machine Probes

    Touch-trigger probes are widely used in modern high-precision CNC machine tools as an on-machine inspection solution. The calibration of the probe pre-travel error is a significantly factor affecting the accur...

    Jianyu Lin, Xu Zhang, Yijun Shen in Intelligent Robotics and Applications (2022)

  5. No Access

    Chapter and Conference Paper

    Differentiated Security Architecture for Secure and Efficient Infotainment Data Communication in IoV Networks

    This paper aims to provide differentiated security protection for infotainment data communication in Internet-of-Vehicle (IoV) networks. The IoV is a network of vehicles that uses various sensors, software, bu...

    Jiani Fan, Lwin Khin Shar, Jiale Guo, Wenzhuo Yang in Network and System Security (2022)

  6. No Access

    Chapter and Conference Paper

    Graph Intelligence Enhanced Bi-Channel Insider Threat Detection

    For an organization, insider intrusion generally poses far more detrimental threats than outsider intrusion. Traditionally, insider threat is detected by analyzing logged user behaviours and then establishing ...

    Wei Hong, Jiao Yin, Mingshan You, Hua Wang, **li Cao in Network and System Security (2022)

  7. No Access

    Chapter and Conference Paper

    Batched Fully Dynamic Multi-key FHE from FHEW-Like Cryptosystems

    Multi-key fully homomorphic encryption (MKFHE) schemes support arbitrary computations on data encrypted by different keys. Especially, in the fully dynamic setting, any ciphertexts can be computed at any time ...

    Yuting Jiang, Jianghong Wei, **g Pan in Provable and Practical Security (2022)

  8. No Access

    Chapter and Conference Paper

    Type Synthesis of Six Degrees of Freedom Parallel Mechanism with Decoupled Translation and Rotation

    A type synthesis method of six degrees of freedom (DOFs) parallel mechanism (PM) with decoupled translation and rotation (DTR) is proposed by analyzing the input and output characteristics of partially decoupl...

    Ya Liu, Wenjuan Lu, Jiahao Zeng, Jianhua Cong in Intelligent Robotics and Applications (2022)

  9. No Access

    Chapter and Conference Paper

    Research on Construction Method of SoS Architecture Knowledge Graph

    System of systems (SoS) architecture data is the foundation of SoS architecture design, modeling, and evaluation. Traditional methods of architecture data collection generally need the involvement of modelers....

    Yue Zhang, Minghao Li, **ngliang Wang, Yajie Dou in Knowledge and Systems Sciences (2022)

  10. No Access

    Chapter and Conference Paper

    Research on Dynamic Timeslot Reservation Handover Algorithm Based on Remaining Time in Beam Hop** System

    Recently, beam hop** (BH) technology has been considered as the key technology of the next generation High Throughput Satellite (HTS) system for its flexibility. In order to ensure the communication continui...

    Hongyu Pan, Chuang Wang, Lifeng Jiang in Wireless and Satellite Systems (2022)

  11. No Access

    Chapter and Conference Paper

    KPH: A Novel Blockchain Privacy Preserving Scheme Based on Paillier and FO Commitment

    Blockchain is a shared database with excellent characteristics, such as high decentralization and traceability. However, data leakage is still a major problem for blockchain transactions. To address this issue...

    Yang Li, Mengmeng Wang, Jianming Zhu, **uli Wang in Data Science (2022)

  12. No Access

    Chapter and Conference Paper

    Trajectory Tracking Control Based on RBF Neural Network Learning Control

    In this paper, a radial basis function neural network (RBFNN) learning control scheme is proposed to improve the trajectory tracking performance of a 3-DOF robot manipulator based on deterministic learning the...

    Chengyu Han, Yiming Fei, Zixian Zhao, Jiangang Li in Intelligent Robotics and Applications (2022)

  13. No Access

    Chapter and Conference Paper

    M-EDESE: Multi-Domain, Easily Deployable, and Efficiently Searchable Encryption

    Searchable encryption is an essential component of cryptography, which allows users to search for keywords and retrieve records from an encrypted database at cloud storage while ensuring the confidentiality of...

    Jiaming Yuan, Yingjiu Li, Jianting Ning in Information Security Practice and Experien… (2022)

  14. No Access

    Chapter and Conference Paper

    A Simple Approach to the Multiple Source Identification of Information Diffusion

    This paper studies the problem of identifying multiple information sources in networks. Assuming that the information diffusion follows a Susceptible-Infected (SI) model which allowing all nodes in the network...

    **aojie Li, **n Yu, Chubing Guo, Yuxin Wang, Jianshe Wu in Intelligence Science IV (2022)

  15. No Access

    Chapter and Conference Paper

    Design and Verification of an Active Lower Limb Exoskeleton for Micro-low Gravity Simulation Training

    Exploring the most economic method to achieve micro-low gravity simulation training has been troubling researchers for a long time. Hence, this paper presents an active lower limb exoskeleton to counteract gra...

    Yingxue Wang, **gshuo Gao, Zhuo Ma, Yuehua Li in Intelligent Robotics and Applications (2022)

  16. No Access

    Chapter and Conference Paper

    3D Visualization Supporting Situational Awareness of Model-Based System of Systems

    Model-based System of Systems Engineering (MBSoSE) enables to improve the efficiency of the architecture design, and the performance analysis and modeling of highly complex system of systems (SoS). Introducing...

    Yuqian Cao, Boyu **e, Jian Wang, **aochen Zheng in Knowledge and Systems Sciences (2022)

  17. No Access

    Chapter and Conference Paper

    Design of Envelo** Underwater Soft Gripper Based on the Bionic Structure

    The ocean has been an important research site for scientists in recent years. Many marine creatures with soft bodies such as sea cucumbers are fragile and easily deformed, so it is difficult when gras** thes...

    Jiansong Dou, Daohui Zhang, Yanxu Sun, **n Fu in Intelligent Robotics and Applications (2022)

  18. No Access

    Chapter and Conference Paper

    Gait Time Parameter Analysis-Based Rehabilitation Evaluation System of Lower Limb Motion Function

    Aiming at the problems of low accuracy and high time cost of existing motion function rehabilitation evaluation methods, this paper proposes a rehabilitation evaluation method and system of lower limb motion f...

    Yue-Peng Zhang, Guang-Zhong Cao, Jiang-Cheng Chen in Intelligent Robotics and Applications (2022)

  19. No Access

    Chapter and Conference Paper

    Nonlinear Methods on HD-sEMG Signals for Aging Effect Evaluation During Isometric Contractions of the Biceps Brachii

    Muscle aging is associated with a loss of muscle mass and strength. Different factors are responsible, which can possibly lead to a modification of the complexity of the neuromuscular system. This may be refle...

    Kawtar Ghiatt, Ahmad Diab, Sofiane Boudaoud in Intelligent Robotics and Applications (2022)

  20. No Access

    Chapter and Conference Paper

    TuneIn: Framework Design and Implementation for Education Using Dynamic Difficulty Adjustment Based on Deep Reinforcement Learning and Mathematical Approach

    Education, personal self-development, and overall learning have vastly changed over the years as a result of historical events, methodologies, and technologies. As students first, and then as educators, we hav...

    Alessio Bonti, Manas Palaparthi, Xuemei Jiang in Ad Hoc Networks and Tools for IT (2022)

Page of 293