![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Visual Monitoring Method of Digital Computer Room Based on Digital Twin
With the rapid development of the Internet of things, big data, artificial intelligence and other new generation information technologies, more and more information technologies are applied in actual productio...
-
Chapter and Conference Paper
Data Reconstruction from Gradient Updates in Federated Learning
Federated learning has become an emerging technology to protect data privacy in the distributed learning area, by kee** each client user’s data locally. However, recent work shows that client users’ data mig...
-
Chapter and Conference Paper
Data Leakage with Label Reconstruction in Distributed Learning Environments
Distributed learning is commonly applied for the high demands of computation resources while training models with large-scale data. However, existing solutions revealed that it may lead to information leakage ...
-
Chapter and Conference Paper
Efficient and Secure Outsourced Image Watermarking in Cloud Computing
Image watermark has played an important role in image copyright protection. With the development of cloud computing in recent years, more and more people are willing to outsource the watermark embedding proces...
-
Chapter and Conference Paper
An Underwater Image Color Correction Algorithm Based on Underwater Scene Prior and Residual Network
Color distortion in underwater scenes affect the accuracy of pattern recognition, visual understanding and key feature extraction work of underwater robots. In this paper, we propose a method to correct color ...
-
Chapter and Conference Paper
BDCuckoo: an Efficient Cuckoo Hash for Block Device
Hash is widely used in various storage systems due to its excellent insertion and search performance. However, existing hash designs are not friendly for block devices because they will generate a lot of rando...
-
Chapter and Conference Paper
EBANet: Efficient Boundary-Aware Network for RGB-D Semantic Segmentation
Semantic segmentation is widely used in robot perception and can be used for various subsequent tasks. Depth information has been proven to be a useful clue in the semantic segmentation of RGB-D images for pro...
-
Chapter and Conference Paper
Thoughts on the Application of Low-Interactive Honeypot Based on Raspberry Pi in Public Security Actual Combat, LIHRP
With development of the network, more and more information elements have been integrated into people’s daily life. However, the seriousness of the network security problem has become increasingly apparent, too...
-
Chapter and Conference Paper
Variations of Solar Radiation in Typical Resource Regions of China During 1961–2016
Based on the total solar radiation, horizontal direct radiation and scattered radiation data of six typical resource regions in China from 1961 to 2016, this paper focuses on analyzing the variation trend of s...
-
Chapter and Conference Paper
Research on Business Travel Problem Based on Simulated Annealing and Tabu Search Algorithms
In logistics and transportation, it is usually necessary to take into account the distance, route, time, transportation cost, and human resources. In this paper, the coordinates of 31 cities are used as data s...
-
Chapter and Conference Paper
Texture-Guided U-Net for OCT-to-OCTA Generation
As a new imaging modality, optical coherence tomography angiography (OCTA) can fully explore the characteristics of retinal blood flow. Considering the inconvenience of acquiring OCTA images and inevitable mec...
-
Chapter and Conference Paper
Hole Detection with Texture-Suppression on Wooden Plate Surfaces
We devote to the detection of holes on the surface of household panels. Due to the wide variety of furniture panel patterns, the most critical problem is to eliminate the interference of the texture attached t...
-
Chapter and Conference Paper
Regulation of Space Manipulators with Free-Swinging Joint Failure Based on Iterative Learning Control
To ensure that tasks can be completed after a free-swinging joint failure occurs, an iterative learning control method for the space manipulator is proposed in this paper. First, the dynamics coupling relation...
-
Chapter and Conference Paper
MSC-Fuse: An Unsupervised Multi-scale Convolutional Fusion Framework for Infrared and Visible Image
Lacking the labeled data, how to establish an unsupervised learning method is essential for the infrared and visible image fusion task. As such, this article introduces a novel unsupervised learning fusion fra...
-
Chapter and Conference Paper
Halftone Image Steganography Based on Minimizing Distortion with Pixel Density Transition
Many advanced halftone steganographic schemes focus only on the distortion of human visual perception or the distortion according to statistics. In this paper, a halftone image steganography based on minimizin...
-
Chapter and Conference Paper
A Resource-Saving Multi-layer Fault-Tolerant Low Orbit Satellite Network
Low-orbit satellites have the advantages of low latency, low cost, and flexible launching. They are the main direction for the development of next-generation satellite communications. Based on the STK analysis...
-
Chapter and Conference Paper
Research on Mobile Robot Processing System Based on Shape and Position Measurement
Aiming at the problem of on-line inspection and processing due to the alignment errors in the assembly process of large aeronautical components, an adaptive digital processing and assembly method is proposed, ...
-
Chapter and Conference Paper
Using Conv-LSTM to Refine Features for Lightweight Image Super-Resolution Network
In this paper, we propose a lightweight network that uses conv-LSTM for feature fusion (LFN) to improve image super-resolution performance and save the number of parameters. The network extracts features of di...
-
Chapter and Conference Paper
The Regional Clusting Effect of the Blockchain Industry Base on Unsupervised Learning Methods
The blockchain industry has developed rapidly in China last years, but in an extremely uneven pattern, especially in different regions. This paper adopts unsupervised learning methods to delineate the uneven r...
-
Chapter and Conference Paper
Selective Multi-scale Learning for Object Detection
Pyramidal networks are standard methods for multi-scale object detection. Current researches on feature pyramid networks usually adopt layer connections to collect features from certain levels of the feature h...