![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
A Distributed Multicast Protocol with Location-Aware for Mobile Ad-Hoc Networks
Mobile ad-hoc networks mean a group of mobile devices which communicate to each other without infrastructure assistant in wireless networks. Since the nodes are mobile, the network topology may change rapidly ...
-
Chapter and Conference Paper
Application and Design of Artificial Neural Network for Multi-cavity Injection Molding Process Conditions
In this study, an artificial neural network (ANN) with a predictive model for the warpage of multi-cavity plastic injection molding parts. The developed method in this paper indicate that the minimum and the m...
-
Chapter and Conference Paper
Mining High Utility Itemsets Based on the Pre-large Concept
In this paper, an incremental mining algorithm is proposed for efficiently maintaining the discovered high utility itemsets based on the pre-large concept. It first partitions itemsets into nine cases accordin...
-
Chapter and Conference Paper
A High Energy Efficiency Approach Based on Fuzzy Clustering Topology for Long Lifetime in Wireless Sensor Networks
Fuzzy logic has been successfully applied in various fields of daily life. Fuzzy logic is based on non-crisp set. The characteristic function of non-crisp set is permitted to have to range value between 0 and ...
-
Chapter and Conference Paper
Design and Implementation of an IPv4/IPv6 Dual-Stack Automatic Service Discovery Mechanism for an Access Control System
With the development of the Internet network technologies, a vast number of things are connecting to the Internet. The available IPv4 addresses are used up almost. IPv6 and IPv4 will coexist for many years. Th...
-
Chapter and Conference Paper
Advanced Center-Folding based Reversible Hiding Scheme with Pixel Value Ordering
Dual image techniques have been broadly applied to reversible information hiding in recent years. Center folding strategy proposed by Lu et al. in 2015 compresses the secret symbol and then utilizes averaging ...
-
Chapter and Conference Paper
The Requirement Analysis and Initial Design of a Cloud and Crowd Supported Mathematics Learning Environment for Computer Science Students
Math learning has never been easy and math learning in computer science is not an exception. However, the important of math can never be underestimated. In computer science, it was found that students learning...
-
Chapter and Conference Paper
Application of Fuzzy Comprehensive Evaluation Model in Mentality Adaptive Research of College Freshmen
This paper study the mentality adaption of college freshmen. Based on analysis and exception handling on the mentality adaption index data of freshmen from Guangdong province, fuzzy comprehensive evaluation (F...
-
Chapter and Conference Paper
The Speed Calculated Hand Activity Level (HAL) Matches Observer Estimates Better Than the Frequency Calculated HAL
Hand Activity Level (HAL) can be estimated from observations (HALO), calculated from exertion frequency, F and duty cycle D (HALF) or from speed, S and D (HALS). Data collected by prospective cohort studies were...
-
Chapter and Conference Paper
On an Improved K-Best Algorithm with High Performance and Low Complexity for MIMO Systems
Multiple-input multiple-output (MIMO) techniques are significantly advanced in contemporary high-rate wireless communications. The computational complexity and bit-error-rate (BER) performance are main issues...
-
Chapter and Conference Paper
Automated Video Lifting Posture Classification Using Bounding Box Dimensions
A method is introduced for automatically classifying lifting postures using simple features obtained through drawing a rectangular bounding box tightly around the body on the sagittal plane in video recordings...
-
Chapter and Conference Paper
Privacy Mining from IoT-Based Smart Homes
Recently, a wide range of smart devices are deployed in a variety of environments to improve the quality of human life. One of the important IoT-based applications is smart homes for healthcare, especially fo...
-
Chapter and Conference Paper
Dynamic Facial Features in Positive-Emotional Speech for Identification of Depressive Tendencies
Depressive symptoms in young people may persist into adulthood and develop into depression. Early screening of depressive tendencies in university students helps to reduce the number and intensity of their dep...
-
Chapter and Conference Paper
RePAD: Real-Time Proactive Anomaly Detection for Time Series
During the past decade, many anomaly detection approaches have been introduced in different fields such as network monitoring, fraud detection, and intrusion detection. However, they require understanding of d...
-
Chapter and Conference Paper
Character Localization Based on Support Vector Machine
The purpose of character localization is to detect and locate a certain character from the picture, which can be used in automatic testing task. In this paper, we propose a new virtual keyboard character local...
-
Chapter and Conference Paper
DALC: Distributed Automatic LSTM Customization for Fine-Grained Traffic Speed Prediction
Over the past decade, several approaches have been introduced for short-term traffic prediction. However, providing fine-grained traffic prediction for large-scale transportation networks where numerous detec...
-
Chapter and Conference Paper
Study on the Factors Affecting Sharing Behavior of Social Media Platform Users
User’s behavior on social media platform becomes so complicate that only linear approach is hard to examine the structural issue. Therefore, the back propagation neural network is employed in this study since ...
-
Chapter and Conference Paper
An NMT-Based Approach to Translate Natural Language Questions to SPARQL Queries
SPARQL is a powerful query language which has already been widely used in various natural language question answering (QA) systems. As the advances of deep neural networks, Neural Machine Translation (NMT) mod...
-
Chapter and Conference Paper
How Far Should We Look Back to Achieve Effective Real-Time Time-Series Anomaly Detection?
Anomaly detection is the process of identifying unexpected events or abnormalities in data, and it has been applied in many different areas such as system monitoring, fraud detection, healthcare, intrusion det...
-
Chapter and Conference Paper
Feedback Vocal Rehabilitation Software Applied to Mobile Devices for Maximum Phonation Time
The key to the maximum phonation time (MPT) is how much lung capacity you have. If the MPT is too short, one cannot cut the sentences inappropriate time and lead to communication difficulties. However, there i...