![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Energy Storage Capacity Optimization for Deviation Compensation in Dispatching Grid-Connected Wind Power
Many uncertain factors in wind power forecasting lead to large prediction errors. Various prediction technologies have been developed to reduce errors and improve the dispatch-ability of grid-connected wind po...
-
Chapter and Conference Paper
Artificial Bee Colony Algorithm Based on Ensemble of Constraint Handing Techniques
Artificial Bee Colony (ABC) Algorithm was firstly proposed for unconstrained optimization problems. Later many constraint processing techniques have been developed for ABC algorithms. According to the no free ...
-
Chapter and Conference Paper
Newton Method for Interval Predictor Model with Sphere Parameter Set
In this paper, we study the construction of interval prediction model. After introducing the family of models and some basic information, we present the computational results for the construction of interval p...
-
Chapter and Conference Paper
A Tight Security Reduction Designated Verifier Proxy Signature Scheme Without Random Oracle
Most of existing designated verifier proxy signature (DVPSt) schemes which are proved to be secure in the standard model is constructed based on Water’s identity-based encryption. Therefore, security reduction...
-
Chapter and Conference Paper
An Execution Tracing Tool for Multi-tier Web Applications
A precise request tracing tool is essential to help both developers and administrators debug performance problems of multi-tier web applications. This paper introduces a non-intrusive end-to-end runtime path t...
-
Chapter and Conference Paper
Research and Analysis of TD-SCDMA Uplink Capacity
In 3thG system network planning, the cell capacity calculation is a very important and critical issue. Assumed under the single-service of TD-SCDMA, this paper investigated the uplink cell capacities of the TD-SC...
-
Chapter and Conference Paper
An Improvement Method for Daugman’s Iris Localization Algorithm
An improvement method is present in this paper for Daugman’s iris localization algorithm. It may make iris localization more rapid and more precise. It may also decrease the computational complexity of the loc...
-
Chapter and Conference Paper
Spatio-temporal Simulation of Epidemiological SIQR Model Based on the Multi-Agent System with Focus on Influenza A (H1N1)
Influenza A (H1N1) has caused tremendous damage in the world, so to learn its law is of great significance in the epidemic prevention and social stability. Taking the multi-agent system (MAS), geo-spatial envi...
-
Chapter and Conference Paper
Improving Web-Based OOV Translation Mining for Query Translation
Query translation is the most widely used approach for cross-language information retrieval (CLIR). The major challenge of query translation is translating Out-Of-Vocabulary (OOV) terms. This paper proposes th...
-
Chapter and Conference Paper
A Probability-Based Framework for Dynamic Resource Scheduling in Grid Environment
Recent enthusiasm in grid computing has resulted in a tremendous amount of research in resource scheduling techniques for tasks in a workflow. Most of the work on resource scheduling is aimed at minimizing the...
-
Chapter and Conference Paper
Application of Weighted Ideal Point Method to Environmental/Economic Load Dispatch
This paper proposes a novel environmental/economic load dispatch model by considering the fuel cost and emissionfunctions with uncertain co-efficients and the constraints of a ramp rate. The uncertain coeffici...
-
Chapter and Conference Paper
Practical t-out-n Oblivious Transfer and Its Applications
General constructions of t-out-n (string) oblivious transfers and millionaire protocol are presented using two-lock crypto-system, which enables Alice to send Bob secret without shared key. In the proposed t-out-