![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Quantum key distribution over a mimicked dynamic-scattering channel
Free-space quantum key distribution (QKD) plays an important role in the global quantum network. However, free space channels suffer from the atmospheric turbulence and scattering effects of haze, fog, and dus...
-
Article
BiMuF: a bi-directional recommender system with multi-semantic filter for online recruitment
Most existing recommendation research has been concentrated on unidirectional recommendation, i.e., only recommending items to users. However, the platform needs to achieve bi-directional recommendation in man...
-
Article
LINDA: multi-agent local information decomposition for awareness of teammates
In cooperative multi-agent reinforcement learning (MARL), where agents only have access to partial observations, efficiently leveraging local information is critical. During long-time observations, agents can ...
-
Article
PyCIL: a Python toolbox for class-incremental learning
We have presented PyCIL, a classincremental learning toolbox written in Python. It contains implementations of a number of founding studies of CIL, but also provides current state-of-the-art algorithms that ca...
-
Article
A Survey of Non-Volatile Main Memory File Systems
Non-volatile memories (NVMs) provide lower latency and higher bandwidth than block devices. Besides, NVMs are byte-addressable and provide persistence that can be used as memory-level storage devices (non-vola...
-
Article
Swarm Intelligence Research: From Bio-inspired Single-population Swarm Intelligence to Human-machine Hybrid Swarm Intelligence
Swarm intelligence has become a hot research field of artificial intelligence. Considering the importance of swarm intelligence for the future development of artificial intelligence, we discuss and analyze swa...
-
Article
Polarization-insensitive quantum key distribution using planar lightwave circuit chips
Self-stabilizing the quantum key distribution (QKD) system is essential to evaluate eavesdroppers’ information accurately. We develop and verify a polarization-insensitive time-bin decoder chip for QKD with th...
-
Article
Accelerating Data Transfer in Dataflow Architectures Through a Look-Ahead Acknowledgment Mechanism
The dataflow architecture, which is characterized by a lack of a redundant unified control logic, has been shown to have an advantage over the control-flow architecture as it improves the computational perform...
-
Article
Preface
-
Article
Vector soliton and noise-like pulse generation using a Ti3C2 MXene material in a fiber laser
We built a Tm:Ho co-doped fiber laser using a Ti3C2 MXene material as a saturable absorber (SA). The formation of vector solitons (VSs) and noise-like pulses (NLPs) was observed. The SA was prepared by drip** a...
-
Article
Image fuzzy enhancement algorithm based on contourlet transform domain
In order to solve the problems of low contrast, global darkness and noise amplification in some hyperspectral and remote-sensing images, a new image fuzzy enhancement method based on contourlet transform (CT) ...
-
Article
Energy-efficient power amplifiers and linearization techniques for massive MIMO transmitters: a review
Highly efficient power amplifiers (PAs) and associated linearization techniques have been developed to accommodate the explosive growth in the data transmission rate and application of massive multiple input m...
-
Article
Defocus Hyperspectral Image Deblurring with Adaptive Reference Image and Scale Map
Defocus blur is one of the primary problems among hyperspectral imaging systems equipped with simple lenses. Most of the previous deblurring methods focus on how to utilize structure information of a single ch...
-
Article
A security-based steganographic scheme in vector quantization coding between correlated neighboring blocks
With the growth of the Internet and the advancements in modern communication systems, sending data over the Internet or other media is now a commonplace practice. Consequently, it has become an important issue...
-
Article
Use of a coded voltage signal for cable switching and fault isolation in cabled seafloor observatories
Cabled seafloor observatories play an important role in ocean exploration for its long-term, real-time, and in-situ observation characteristics. In establishing a permanent, reliable, and robust seafloor obser...
-
Article
Underwater video transceiver designs based on channel state information and video content
Underwater hostile channel conditions challenge video transmission designs. The current designs often treat video coding and transmission schemes as individual modules. In this study, we develop an adaptive tr...
-
Article
Solving IIR system identification by a variant of particle swarm optimization
A variant of particle swarm optimization (PSO) is represented to solve the infinitive impulse response (IIR) system identification problem. Called improved PSO (IPSO), it makes significant enhancement over PSO...
-
Article
Cross-lingual implicit discourse relation recognition with co-training
A lack of labeled corpora obstructs the research progress on implicit discourse relation recognition (DRR) for Chinese, while there are some available discourse corpora in other languages, such as English. In ...
-
Article
An effective data fusion-based routing algorithm with time synchronization support for vehicular wireless sensor networks
In the field of vehicular wireless sensor networks-based structural health monitoring, the structural damage identification is achieved by two structural features, namely natural frequencies and mode shapes. T...
-
Article
Cryptanalysis of an identity-based public auditing protocol for cloud storage
Public verification of data integrity is crucial for promoting the serviceability of cloud storage systems. Recently, Tan and Jia (2014) proposed an identity-based public verification (NaEPASC) protocol for cl...