![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Edge Computing Task Unloading Decision Optimization Algorithm Based on Deep Reinforcement Learning
Mobile Edge Computing (MEC) is used to enhance the data processing capability of low-power networks and has now become an efficient computing paradigm. In this paper, an edge-cloud collaborative system compose...
-
Chapter
Electrolyte Technologies
The solutes of human body fluids can be chemically divided into electrolytes and non-electrolytes. Electrolytes usually refer to potassium (K+), sodium (Na+), chloride (Cl−), calcium (Ca++), lithium (Li+), magnes...
-
Chapter
Analysis of Blood Gas
Analysis of blood gas has recently been a rapidly developed medical inspection technique. At the end of the 1950s, Poul Astrup, a Danish physician, and chemist, developed the first blood gas analyzer. Since th...
-
Chapter and Conference Paper
Design of an Image Segmentation System Based on Hierarchical Density-Based Spatial Clustering of Applications with Noise for Off-Road Unmanned Ground Vehicles
This paper presents an improved, unsupervised machine learning image segmentation system with density-based noisy spatial hierarchical clustering (IS-HDBSCAN). Compared with the conventional image segmentation...
-
Chapter and Conference Paper
The Application of Machine Learning Algorithms to Diagnose CKD Stages and Identify Critical Metabolites Features
Background: Chronic kidney disease (CKD) is a progressive and heterogeneous disorder that affects kidney structures and functions. Now it becomes one of the major challenges of public health. Early-stage detectio...
-
Chapter and Conference Paper
Local Community Detection Based on Bridges Ideas
In complex network analysis, the local community detection problem is getting more and more attention. Because of the difficulty to get complete information of the network, such as the World Wide Web, the loca...
-
Chapter and Conference Paper
An Airport Noise Prediction Model Based on Selective Ensemble of LOF-FSVR
Airport noise prediction is of vital importance to the planning and designing of airports and flights, as well as in controlling airport noise. Benefited from the development of the Internet of things, large-s...
-
Chapter and Conference Paper
Current Attitude Prediction Model Based on Game Theory
Social interactions on online communities involve both positive and negative relationships: people give feedbacks to indicate friendship, support, or approval; but they also express disagreement or distrust of...
-
Chapter and Conference Paper
A Bricklaying Best-Fit Heuristic Algorithm for the Orthogonal Rectangle Packing Problem
The present paper presents a novel heuristic algorithm, “BBF” algorithm, for the two-dimensional orthogonal rectangular packing problem. The BBF algorithm combines the main ideas of the Best-fit algorithm and ...
-
Chapter and Conference Paper
Modeling of Flight Delay State-Space Model
Flight delay prediction remains an important research topic due to its dynamic nature. Dynamic data-driven approach might provide a solution to this problem. To apply the approach, a flight delay state-space m...
-
Chapter
A Blind Approach to Identification of Hammerstein Systems
Hammerstein systems form a class of block-oriented nonlinear models, where a static nonlinearity precedes a linear dynamic system. There exist a large number of works on the topic of identification of Hammerst...
-
Chapter
Light Localization by Defects in Optically Induced Photonic Structures
In the past ten years, there has blossomed an interest in the study of collective behavior of wave propagation in periodic waveguide arrays and photonic lattices [1–3]. The unique bandgap structures of these p...
-
Chapter and Conference Paper
A Secure Channel Free Public Key Encryption with Keyword Search Scheme without Random Oracle
The public key encryption with keyword Search (PEKS) scheme, proposed by Boneh, Di Crescenzo, Ostrovsky and Persiano, enables one to search for encrypted keywords without compromising the security of the origi...
-
Chapter and Conference Paper
Anonymous Conditional Proxy Re-encryption without Random Oracle
A proxy re-encryption scheme enables a proxy to re-encrypt a ciphertext under a delegator’s public-key and designate it to a delegatee. Weng et al. introduced the notion of conditional proxy re-encryption (or C-P...
-
Chapter and Conference Paper
An Integrated Approach for Mining Meta-rules
An integrated approach of mining association rules and meta-rules based on a hyper-structure is put forward. In this approach, time serial databases are partitioned according to time segments, and the total nu...
-
Chapter and Conference Paper
Explanation-based learning helps acquire knowledge from natural language texts
Existing systems to acquire knowledge from expository texts do not perform any learning beyond interpreting the contents of the text. The opportunity to learn from examples included in texts is not exploited. ...