![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
A Lower Bound on the Share Size of Leakage-Resilient Secret-Sharing Schemes
-
Chapter and Conference Paper
Study on Factors Influencing the Unbalance of Double-Split Parallel Cable Current Carrying
In recent years, the transmission capacity of a single high-voltage cable has been unable to meet the growing load demand, and double-split parallel cables have become a necessary treatment to improve the tran...
-
Chapter and Conference Paper
Lower Bounds on the Share Size of Leakage Resilient Cheating Detectable Secret Sharing
Cheating detectable secret sharing schemes (CDSS) detects changes in the secret that is caused by an adversary who modifies shares of an unauthorized subset of participants. We consider leakage resilient cheat...
-
Chapter and Conference Paper
Research on Data Acquisition Algorithm Based on ZYNQ Biometric Signal
Under the irradiation of laser, biological particles emit fluorescence and scattered light. The spectral signals composed of fluorescence and scattered light can be used to classify and recognize biological pa...
-
Chapter and Conference Paper
Biological Particle Recognition Based on BP Neural Network Algorithm
The particles in the air are collected by the biomonitoring alarm, which produces fluorescence and scattered light under laser irradiation, and is converted into an electrical signal using a photoelectric sens...
-
Chapter and Conference Paper
Design of Intelligent Boiler Controller
This paper discusses the development status of boilers in China. The design and implementation of the intelligent boiler controller are introduced in detail. The author completed the controller using the STC89...
-
Chapter and Conference Paper
Design of Multi-Input High Fidelity Preamplifier Based on STM32
With the popularization of audio-visual entertainment equipment, the application of pre-stage power amplifiers is becoming more and more extensive. The use of a high-quality pre-stage amplifier will often brin...
-
Chapter and Conference Paper
Design of Fire Alarm Based on 51 Single Chip Microcomputer
In this paper, 51 single-chip microcomputer is designed and implemented. In this design, 51 single-chip microcomputer is the main control chip, MQ-2 smoke sensor is used to detect the concentration of combusti...
-
Chapter and Conference Paper
PAKEs: New Framework, New Techniques and More Efficient Lattice-Based Constructions in the Standard Model
Password-based authenticated key exchange (PAKE) allows two parties with a shared password to agree on a session key. In the last decade, the design of PAKE protocols from lattice assumptions has attracted lot...
-
Chapter and Conference Paper
Robust Topology Optimization with Loading Magnitude and Direction Uncertainty
The robust topology optimization approach with uncertainties of loading magnitude and direction is investigated for continuum structures. The input loadings with uncertain magnitude and direction are decompose...
-
Chapter and Conference Paper
Application of CO2 Gas Monitoring System in the CO2 Geological Storage Project
In this paper, we designed a set of CO2 gas monitoring system in the CO2 Geological Storage Project which was used in Ordos Basin of western China. The change of CO2 concentration in atmosphere and soil was effec...
-
Chapter and Conference Paper
Monitoring of the Ground Subsidence in Macao Using the PSI Technique
In this paper, we investigated the long-term reclamation-induced ground subsidence in Macao, a coastal city of southern China. Persistent Scatterers Interferometry (PSI) technique was applied to retrieve the ...
-
Chapter and Conference Paper
Mining User Preferences for Recommendation: A Competition Perspective
Mining user preferences plays an important role in building personalized recommender systems. Instead of mining user preferences with the item content or the user-item-rating matrix, we exploit Bradley-Terry m...
-
Chapter and Conference Paper
User-Characteristics Topic Model
This paper proposes a method to capture user’s characteristics in a topic model frame, where user characteristics act as a latent variable that does not depend on texts. As it is obvious that different people ...
-
Chapter and Conference Paper
Timed Encryption with Application to Deniable Key Exchange
We propose a new notion of timed encryption, in which the security holds within time t while it is totally insecure after some time T > t. We are interested in the case where t and T are both polynomial and propo...
-
Chapter and Conference Paper
On Peer Feedback in English Writing Classes in China
Writing, as one of the four major language skills, has been playing the same important role in China’s EFL (English as a foreign language) classroom as the other three ones. It is an important activity which a...
-
Chapter and Conference Paper
A New Interpretation of Culture in Teaching English as an International Language
This paper argues for a new way to interprete culture in contrast with traditional views of culture commonly existing in foreign and second language learning. It also proposes ways to restructure curriculum ac...
-
Chapter and Conference Paper
Content–Based Medical Image Retrieval Based on Fuzzy Image Structure and Content
This paper proposed a new method to retrieve cerebral hemorrhage CT images based on fuzzy binary tree structure and content (FBTS). Most of fuzzy-region-based CBIR systems only use fuzzy content information of...
-
Chapter and Conference Paper
Reweighting BiasMap Based Image Retrieval and Relevance Feedback for Medical Cerebral MRI Image
This paper proposed a region based image retrieval and relevant feedback (RF) system for Medical cerebral MRI images. In the system, firstly, the brains were extracted from cerebral images by a modified BET al...
-
Chapter and Conference Paper
A Simple Power Control Approach in Wireless Ad Hoc Network
Ad hoc networks are a new paradigm of wireless communication for mobile hosts, in which there are no fixed infrastructure such as base stations or mobile switching centers. Mobile nodes that are within each ot...