![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Fragrant Pear Target Identification and Positioning Based on Deep Learning
In the rapid development of artificial intelligence technology, scholars around the world based on the research results of various stages, the relevant technical theories are applied to various fields, not onl...
-
Chapter and Conference Paper
Evaluation of Dynamic Incentive Pricing for Congestion Management in Transit System: An Agent-Based Simulation
This paper analyzed the feasibility of a dynamic fare incentive strategy by characterizing commuters’ travel patterns and the extent of their flexibility in departure times using multi-source data. In the prop...
-
Chapter and Conference Paper
Comprehensive Evaluation of Partition Aggregation of Energy Storage Power Station Based on Entropy Weight-Analytic Hierarchy Process
Energy storage power station is an important object of new power systems participating in peak shaving, frequency modulation, and voltage regulation scenarios, and it is of great reference significance to eval...
-
Chapter and Conference Paper
Evaluation of Control Ability of Multi-type Energy Storage Power Station Based on AHP
Due to the characteristics of fast response and bidirectional adjustment, the new energy storage technology can effectually solve the challenges of grid stability and reliability brought by a high proportion o...
-
Chapter and Conference Paper
Performance Evaluation of Multi-type Energy Storage Power Station Based on AHP and FCE
In the quickly evolving field of new power systems, energy storage has superior performance in renewable energy accommodation. AHP and FCE are combined to form a performance evaluation method for multi-type en...
-
Chapter
The Business Environment of Jilin Province
In 2019, our research team conducted a second survey of Jilin Province. Through stratified random sampling, five cities were investigated in Jilin Province: Changchun, Jilin, Si**, Baishan and Songyuan. A to...
-
Chapter and Conference Paper
Fill the K-Space and Refine the Image: Prompting for Dynamic and Multi-Contrast MRI Reconstruction
The key to dynamic or multi-contrast magnetic resonance imaging (MRI) reconstruction lies in exploring inter-frame or inter-contrast information. Currently, the unrolled model, an approach combining iterative ...
-
Chapter and Conference Paper
IKE: Threshold Key Escrow Service with Intermediary Encryption
Blockchain has gained significant attention for its potential to revolutionize various fields. The security of the blockchain system heavily relies on private key management, and traditional key management sch...
-
Chapter and Conference Paper
Analysis and Optimization of Queuing Problem in Barbershop
Queuing is a phenomenon often encountered in daily life. In a service system, long queue time and low service efficiency will lead to a decrease in customer satisfaction. Many barbershops also face serious que...
-
Chapter and Conference Paper
A Moderated Mediation Analysis of Meaningfulness and Positive Intergroup Outcomes Through Prosocial Gameplay
This study examines how the meaningfulness of a story influences empathy and attitudes towards racial or ethnic outgroups through a prosocial video game that features meaningful dialogic encounters with a fict...
-
Chapter and Conference Paper
LSTM-TD3-Based Control for Delayed Drone Combat Strategies
Reinforcement learning has made great achievements in the field of game confrontation, and military rendition intelligence is also imminent. In this paper, we propose a game confrontation game model based on L...
-
Chapter and Conference Paper
Numerical Solution of Boltzmann Equation Based on Adaptive Physics-Informed Neural Networks (aPINN)
Boltzmann equation is a partial differential equation (PDE) describing the statistical behavior of non-equilibrium thermodynamics systems which is widely used in plasma physics. However, traditional numerical ...
-
Chapter and Conference Paper
Mechanism of Collision and Adhesion Between Adhesive Impact Ball and Spacecraft
In the non-cooperative space object close-proximity tracking problem, a method of utilizing an impact ball to collide with the object is proposed to change the angular momentum and estimate the inertial parame...
-
Chapter and Conference Paper
Interval Principal Component Analysis of Non-probabilistic Convex Model
The non-probabilistic convex model describes uncertainty of parameters in the form of a bounded set rather than the probability distribution and is generally applied to interval uncertainty analysis based on t...
-
Chapter and Conference Paper
Cross-Camera Prototype Learning for Intra-camera Supervised Person Re-identification
Person Re-Identification (ReID) aims at retrieving images of the specific pedestrian across disjoint cameras. However, the annotations are extremely costly as the number of cameras increases, which derives a n...
-
Chapter and Conference Paper
Continuous Weighted Neural Cognitive Diagnosis Method for Online Education
With the rapid development of online education, extensive data records from online education are accumulated in large quantities, therefore the educational evaluation industry is of great potential. Cognitive ...
-
Chapter and Conference Paper
Parameter Optimization Design of Axial Permanent Magnet Spherical Magnetic Bearingless Flywheel Machine
In order to meet the requirements of high speed operation and high efficiency suspension performance of flywheel energy storage system, a new axial permanent magnet spherical magnetic bearingless flywheel mach...
-
Chapter and Conference Paper
Tracking Multi-objects with Anchor-Free Siamese Network
Single object tracker based on siamese neural network have become one of the most popular frameworks in this field for its strong discrimination ability and high efficiency. However, when the task switch to mu...
-
Chapter
Temporal Suspension, Precarity, and Agency Among International Students During the COVID-19
-
Chapter and Conference Paper
PEPEC: Precomputed ECC Points Embedded in Certificates and Verified by CT Log Servers
Elliptic curve cryptography (ECC) is respected in public key infrastructures (PKIs) due to its high performance and small key size. However, for some client devices with limited computing resources, signature ...