![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
DC Voltage Detection Based on Combined Sinc and Kalman Filter
Relay test equipment are key equipment for rail transit to ensure safe operation of rail transit
-
Chapter and Conference Paper
Finite-Iteration Consensus Tracking Control of Nonlinear Multi-agent Systems with Input Sharing
In this paper, the distributed iterative learning control (DILC) based on control input sharing is constructed for nonlinear multi-agent system to achieve finite-iteration tracking. The strategy of input shari...
-
Chapter and Conference Paper
Intrusion Detection System Using Semi-supervised Learning with Hybrid Labeling Techniques
With the continuous development of the Internet and a substantial increase in interconnected devices, devices have become more vulnerable to cybersecurity attacks. Deploying Network-based Intrusion Detection S...
-
Chapter and Conference Paper
The Implement of a Reconfigurable Intelligence Trust Chain Platform with Anti-counterfeit Traceable Version Function for the Customized System-Module-IC
Today, information technology (IT) and operational technology (OT) accelerate the development of Intelligence of Things (IoT) systems, which consist of modular integrated circuits (ICs). However, the existing ...
-
Chapter and Conference Paper
Iterative Learning Consensus Tracking Control for Multi-agent Systems with Neighboring Agents’ Average Control Inputs
The iterative learning consensus tracking issue is addressed for homogeneous linear multi-agent systems in this paper. The neighboring agents’ previous knowledge is used to design a novel consensus control pro...
-
Chapter and Conference Paper
Analysis of the Causal Relationship Among Diversification Strategies, Financial Performance and Market Values by the Three-Stage Least Squares (3SLS)
According to many studies, product diversification will benefit companies and motivate companies to carry out business diversification, including improving market competitiveness, spreading business risks and ...
-
Chapter and Conference Paper
An NMT-Based Approach to Translate Natural Language Questions to SPARQL Queries
SPARQL is a powerful query language which has already been widely used in various natural language question answering (QA) systems. As the advances of deep neural networks, Neural Machine Translation (NMT) mod...
-
Chapter and Conference Paper
How Far Should We Look Back to Achieve Effective Real-Time Time-Series Anomaly Detection?
Anomaly detection is the process of identifying unexpected events or abnormalities in data, and it has been applied in many different areas such as system monitoring, fraud detection, healthcare, intrusion det...
-
Chapter and Conference Paper
Feedback Vocal Rehabilitation Software Applied to Mobile Devices for Maximum Phonation Time
The key to the maximum phonation time (MPT) is how much lung capacity you have. If the MPT is too short, one cannot cut the sentences inappropriate time and lead to communication difficulties. However, there i...
-
Chapter and Conference Paper
Study of the Intelligent Algorithm of Hilbert-Huang Transform in Advanced Power System
With the rapid increase in population and electricity consumption, power grid has long formed a large-scale interconnection of systems. The power system is a complex multi-dimensional dynamic system, the tradi...
-
Chapter and Conference Paper
Dynamic Facial Features in Positive-Emotional Speech for Identification of Depressive Tendencies
Depressive symptoms in young people may persist into adulthood and develop into depression. Early screening of depressive tendencies in university students helps to reduce the number and intensity of their dep...
-
Chapter and Conference Paper
RePAD: Real-Time Proactive Anomaly Detection for Time Series
During the past decade, many anomaly detection approaches have been introduced in different fields such as network monitoring, fraud detection, and intrusion detection. However, they require understanding of d...
-
Chapter and Conference Paper
Character Localization Based on Support Vector Machine
The purpose of character localization is to detect and locate a certain character from the picture, which can be used in automatic testing task. In this paper, we propose a new virtual keyboard character local...
-
Chapter and Conference Paper
DALC: Distributed Automatic LSTM Customization for Fine-Grained Traffic Speed Prediction
Over the past decade, several approaches have been introduced for short-term traffic prediction. However, providing fine-grained traffic prediction for large-scale transportation networks where numerous detec...
-
Chapter and Conference Paper
Study on the Factors Affecting Sharing Behavior of Social Media Platform Users
User’s behavior on social media platform becomes so complicate that only linear approach is hard to examine the structural issue. Therefore, the back propagation neural network is employed in this study since ...
-
Chapter and Conference Paper
The Speed Calculated Hand Activity Level (HAL) Matches Observer Estimates Better Than the Frequency Calculated HAL
Hand Activity Level (HAL) can be estimated from observations (HALO), calculated from exertion frequency, F and duty cycle D (HALF) or from speed, S and D (HALS). Data collected by prospective cohort studies were...
-
Chapter and Conference Paper
On an Improved K-Best Algorithm with High Performance and Low Complexity for MIMO Systems
Multiple-input multiple-output (MIMO) techniques are significantly advanced in contemporary high-rate wireless communications. The computational complexity and bit-error-rate (BER) performance are main issues...
-
Chapter and Conference Paper
Automated Video Lifting Posture Classification Using Bounding Box Dimensions
A method is introduced for automatically classifying lifting postures using simple features obtained through drawing a rectangular bounding box tightly around the body on the sagittal plane in video recordings...
-
Chapter and Conference Paper
Privacy Mining from IoT-Based Smart Homes
Recently, a wide range of smart devices are deployed in a variety of environments to improve the quality of human life. One of the important IoT-based applications is smart homes for healthcare, especially fo...
-
Chapter and Conference Paper
The Requirement Analysis and Initial Design of a Cloud and Crowd Supported Mathematics Learning Environment for Computer Science Students
Math learning has never been easy and math learning in computer science is not an exception. However, the important of math can never be underestimated. In computer science, it was found that students learning...