![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Application of Multitaper Method (MTM) to Identify the Heterogeneity of Karst Aquifers
Karst aquifers supply drinking water for 25% of population on the earth. Better understanding of the heterogeneity of karst aquifers can help us develop karst groundwater sustainably. Karst hydrological proces...
-
Chapter and Conference Paper
Data Stream Adaptive Partitioning of Sliding Window Based on Gaussian Restricted Boltzmann Machine
In this paper, the adaptive partitioning problem of data stream under sliding window is discussed. Gaussian restricted Boltzmann machine (GRBM) model supporting decimal input is proposed, which can be trained ...
-
Chapter and Conference Paper
A New Traffic Priority Aware and Energy Efficient Protocol for WBANs
For long-term real-time monitoring of human parameters, providing effective treatment for patients and reduce medical costs WBANs emerged, electrical devices microminiaturization makes WBANs come true. The net...
-
Chapter and Conference Paper
Concept Drift Detection Based on Kolmogorov–Smirnov Test
With the advancement of information society, a large amount of data, which is in the form of stream, has been produced in many fields. As a result of its extensive application in the fields of sensor networks,...
-
Article
Load scheduling for distributed edge computing: A communication-computation tradeoff
Due to the intensive computation requirements of emerging applications and the limited computational capability of edge computing servers, the computation task must be executed on multiple edge servers in a di...
-
Chapter and Conference Paper
Modeling and Optimization for Sky Wave Propagation Loss Model Based on Enumerative Algorithm
Sky wave propagation is one of the important methods to transmit signal and is widely used in ship broadcast communication. In order to analyze the multi-hop system and optimize the emission angle of sky-wave ...
-
Article
Secure ultra-lightweight RFID mutual authentication protocol based on transparent computing for IoV
Transparent Computing (TC) has become a promising paradigm in the network computing era, the appearance of Transparent Computing have a real impact on the industry. A growing number of cars on the road, in ord...
-
Article
VD-PSO: An efficient mobile sink routing algorithm in wireless sensor networks
Efficient energy consumption is crucial for energy constrained networks such as Wireless Sensor Networks (WSN). Using a mobile sink to collect the data of the nodes is a good method to balance the energy level...
-
Chapter and Conference Paper
Research on Privacy Protection of WHOIS Information in DNS
WHOIS service allows people to ask the current registrant some Internet resources. WHOIS service has become an indispensable information service in the DNS. Unfortunately, WHOIS information is often available ...
-
Book and Conference Proceedings
-
Chapter and Conference Paper
The Design and Implementation of Linear Array Image Acquisition System
The theory of Compressive Sensing is briefly introduced and the design of the linear array image acquisition system which is based on the Compressive Sensing is deduced. The system design includes two aspects:...
-
Chapter and Conference Paper
Real Time Routing Optimization in ZigBee Hierarchical Networks
ZigBee hierarchical routing protocol (HRP) provides a simple but reliable topology. However, the transmission paths in HRP are always not efficient, and the links keep invariant since they were determined when...
-
Chapter and Conference Paper
Image Fusion Based on Compressed Sensing
Compressive sensing (CS) has received a lot of interest due to its compression capability and lack of complexity on the sensor side. This paper presented a new image fusion based on compressed sensing. The met...
-
Chapter and Conference Paper
Research on Time Triggered Ethernet Based on Deterministic Network Calculus
In this paper, we present a service-performance network calculus model based on Time-Triggered Ethernet, a deterministic safety critical real-time network protocol, which is used in avionics systems. We firstl...
-
Chapter and Conference Paper
Improved Hierarchical Topic Detection
Due to characteristics of low centralization and the topic drift, how to analyze Internet news reports timely and effectively is more and more concerned. An improved hierarchical topic detection method is prop...
-
Chapter and Conference Paper
Through Wall Human Detection Using Compressed UWB Radar Data
The technology for through wall human detection with UWB radar was discussed. Due to the large amount of UWB radar data, compressive sensing theory was introduced and compressed UWB radar data can be collected...
-
Chapter and Conference Paper
Storage and Analysis of Simulation Data Based on ADO and Visual C++
The purpose of simulation is to reduce the number of actual experiments, and to minimize development costs and improve development efficiency. Simulation system is an integrated, complex system. Each parameter...
-
Chapter and Conference Paper
Simplified Hybrid Routing Protocol in Low Complexity ZigBee Network
The hierarchical routing protocol (HRP) and Z-AODV routing are two options in ZigBee networks. However, the advantages of them, such as the simplicity in HRP and the global shortest path in Z-AODV, are alterna...
-
Chapter and Conference Paper
Minimal Global Hops Algorithm for Energy Balancing in ZigBee Hierarchical Network
Low power consumption is one of the most significant property and pursuing object for ZigBee networks. Because of the multi-hop mechanism in wireless communication, the nodes are always uneven used from the ov...
-
Chapter and Conference Paper
On-Line Anomaly Detection in Big Data Based on Compressive Sensing
The definitions of anomaly detection and big data were presented. Due to the sampling and storage burden of anomaly detection in big data, compressive sensing theory was introduced and used in anomaly detectio...