![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Image fuzzy enhancement algorithm based on contourlet transform domain
In order to solve the problems of low contrast, global darkness and noise amplification in some hyperspectral and remote-sensing images, a new image fuzzy enhancement method based on contourlet transform (CT) ...
-
Chapter and Conference Paper
Research on Cross-cultural Participatory Design by Design Teams Based on Chinese Cultural Background
With the acceleration of globalization, the acculturation issue of design is becoming an emerging challenge. At the same time, as one of the several design patterns in service design, which is becoming a mains...
-
Chapter and Conference Paper
Quality-Aware Streaming Network Embedding with Memory Refreshing
Static network embedding has been widely studied to convert sparse structure information into a dense latent space. However, the majority of real networks are continuously evolving, and deriving the whole embe...
-
Article
Energy-efficient power amplifiers and linearization techniques for massive MIMO transmitters: a review
Highly efficient power amplifiers (PAs) and associated linearization techniques have been developed to accommodate the explosive growth in the data transmission rate and application of massive multiple input m...
-
Article
Defocus Hyperspectral Image Deblurring with Adaptive Reference Image and Scale Map
Defocus blur is one of the primary problems among hyperspectral imaging systems equipped with simple lenses. Most of the previous deblurring methods focus on how to utilize structure information of a single ch...
-
Article
A security-based steganographic scheme in vector quantization coding between correlated neighboring blocks
With the growth of the Internet and the advancements in modern communication systems, sending data over the Internet or other media is now a commonplace practice. Consequently, it has become an important issue...
-
Chapter and Conference Paper
Top-N Collaborative Filtering Recommendation Algorithm Based on Knowledge Graph Embedding
The traditional collaborative filtering recommendation algorithm only uses the item-user rating matrix without considering the semantic information of the item itself, resulting in a problem that the recommend...
-
Article
Use of a coded voltage signal for cable switching and fault isolation in cabled seafloor observatories
Cabled seafloor observatories play an important role in ocean exploration for its long-term, real-time, and in-situ observation characteristics. In establishing a permanent, reliable, and robust seafloor obser...
-
Article
Underwater video transceiver designs based on channel state information and video content
Underwater hostile channel conditions challenge video transmission designs. The current designs often treat video coding and transmission schemes as individual modules. In this study, we develop an adaptive tr...
-
Article
Solving IIR system identification by a variant of particle swarm optimization
A variant of particle swarm optimization (PSO) is represented to solve the infinitive impulse response (IIR) system identification problem. Called improved PSO (IPSO), it makes significant enhancement over PSO...
-
Article
Cross-lingual implicit discourse relation recognition with co-training
A lack of labeled corpora obstructs the research progress on implicit discourse relation recognition (DRR) for Chinese, while there are some available discourse corpora in other languages, such as English. In ...
-
Article
An effective data fusion-based routing algorithm with time synchronization support for vehicular wireless sensor networks
In the field of vehicular wireless sensor networks-based structural health monitoring, the structural damage identification is achieved by two structural features, namely natural frequencies and mode shapes. T...
-
Chapter and Conference Paper
A Tool Integration Language to Formalize Co-simulation Tool-Chains for Cyber-Physical System (CPS)
Co-simulation has grown from point-to-point between simulation tools for specific purposes to complex tool-chains which often require additional functionalities, e.g., process management, data management and t...
-
Article
Cryptanalysis of an identity-based public auditing protocol for cloud storage
Public verification of data integrity is crucial for promoting the serviceability of cloud storage systems. Recently, Tan and Jia (2014) proposed an identity-based public verification (NaEPASC) protocol for cl...
-
Article
FIMI: A Constant Frugal Incentive Mechanism for Time Window Coverage in Mobile Crowdsensing
Mobile crowdsensing has become an efficient paradigm for performing large-scale sensing tasks. An incentive mechanism is important for a mobile crowdsensing system to stimulate participants and to achieve good...
-
Chapter and Conference Paper
VQ Coding in Data Hiding Using Correlated Neighboring Blocks in Security Performance
With the continued expansion of the Internet and increased means of communication, it is inevitable that we send data via the Internet or other such media. The important issue of maintaining the confidentialit...
-
Article
A modified simulated annealing algorithm and an excessive area model for floorplanning using fixed-outline constraints
Outline-free floorplanning focuses on area and wirelength reductions, which are usually meaningless, since they can hardly satisfy modern design requirements. We concentrate on a more difficult and useful issu...
-
Article
Intelligent computing budget allocation for on-road trajectory planning based on candidate curves
In this paper, on-road trajectory planning is solved by introducing intelligent computing budget allocation (ICBA) into a candidate-curve-based planning algorithm, namely, ordinal-optimization-based differenti...
-
Article
A new method to estimate ages of facial image for large database
As a common consensus that the appearances of different persons with the same age diverge widely, we have an opinion that the estimated result of a facial image should be a dynamic range or discrete candidate ...
-
Chapter and Conference Paper
Simulation for Harmonic Analysis of an Integrated Power System
Modeling and Simulation is an effective way to predict the behaviors of Shipboard Integrated Power System (IPS). This paper presents the methods applying simulink blockset to building the models of twelve-pha...