![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
An Efficient Feature Selection Method for High Dimensional Data Based on Improved BOA in AIoT
Feature selection can eliminate irrelevant redundant information in high-dimensional data, reduce dimensions, improve classification performance, and relieve the computational burden of machine learning. In th...
-
Chapter and Conference Paper
Research on the Effect of BBR Delay Detection Interval in TCP Transmission Competition on Heterogeneous Wireless Networks
The bottleneck bandwidth and round-trip propagation time (BBR) algorithm effectively improves the network bandwidth utilization by its unique minimum delay and maximum bandwidth detection mechanism. However, w...
-
Chapter and Conference Paper
INGCF: An Improved Recommendation Algorithm Based on NGCF
Strengthening the representation and learning of user vector and item vector is the key of recommendation system. Neural Graph Collaborative Filtering (NGCF) has the problem of insufficient feature extraction ...
-
Chapter and Conference Paper
OP-RAW: A RAW Grou** Algorithm Based on Outage Probability for Industrial Internet of Things
IEEE 802.11ah is a wireless network protocol designed for large-scale Industrial Internet of Things (IIoT) scenarios. The restricted access window (RAW) mechanism introduced by IEEE 802.11ah assigns the nodes ...
-
Chapter and Conference Paper
An Outage Probability Based Channel Bonding Algorithm for 6G Network
Multiple input multiple output (MIMO) can greatly improve the throughput and frequency utilization of wireless transmission systems. In the IEEE 802.11ax protocol, 4G, 5G, and even future 6G communications, MI...
-
Chapter and Conference Paper
An SVM Based Secural Image Steganography Algorithm for IoT
With the fast development of IoT network, there are more and more images generated by sensors and other devices, which increases the transmission expenses. By adopting image steganography, the images can deli...
-
Chapter and Conference Paper
A GIS-Based Optimization of ACO in UAV Network
UAVs can carry out rescue work in the disaster area. The ant colony algorithm is used to search and rescue work in the disaster area based on GIS. Considering regional priority, an algorithm named priority-PAA...
-
Chapter and Conference Paper
Technology and Application on Reservoir Architecture Characterization Based on Sandbodies Spatial Orientation
As the high percent of effective sandbody thickness, the braided river reservoir becomes an important exploration and exploitation area. The Shihezi group lower eighth section of Sulige gas field is a typical ...
-
Chapter and Conference Paper
Application of Adaptive Channel Facies Modeling to Geo-Steering of Horizontal Wells
In view of the 2D section geo-steering technology based on the start well and the end well, the relationship between adjacent wells cannot be fully reflected, and the reservoir prediction effect is poor. Using...
-
Chapter and Conference Paper
MACCA: A SDN Based Collaborative Classification Algorithm for QoS Guaranteed Transmission on IoT
Software defined network (SDN) can effectively balance link loads and guarantee QoS for different application categories of data streams on Internet of Things (IoT). To achieve high accuracy and low time consu...
-
Chapter and Conference Paper
Protecting Privacy for Big Data in Body Sensor Networks: A Differential Privacy Approach
As a special kind of application of wireless sensor networks, Body Sensor Networks (BSNs) have broad perspectives especially in clinical caring and medical monitoring. Big data acquired from BSNs usually conta...
-
Chapter and Conference Paper
A Collaborated IPv6-Packets Matching Mechanism Base on Flow Label in OpenFlow
Software Defined Networks (SDN), the separation of a network device’s control and data planes, do not need to rely on the underlying network equipment (routers, switches, firewall).It is a new network which co...
-
Chapter and Conference Paper
Research on ARP Spoof Detection Strategies in Unreliable LAN
A detective strategy with multi-layer modules and algorithm on ARP spoof attacks are proposed after some researches against the security problem of ARP. By the research of ARP and ARP attacks, and the consider...
-
Chapter and Conference Paper
Group Participation Game Strategy for Resource Allocation in Cloud Computing
Based on the characteristics of cloud—resources belonging to the same institution and independent resource pool, we proposed a model for the complex task-resource and task-task interactions in cloud by game th...
-
Chapter and Conference Paper
RoboGene: An Image Retrieval System with Multi-Level Log-Based Relevance Feedback Scheme
This demo presents an image retrieval system named RoboGene using multi-level log-based relevance feedback scheme. By analyzing previous users’ perception on the content of images stored in user log, MLLR rank...
-
Chapter and Conference Paper
A High-Accuracy Current Sensing Circuit with Clam** Current Compensation for Current-Mode DC-DC Buck Converter
In this paper, a detailed analysis method of eliminating clam** current error is first proposed. A high accuracy on chip current sensing circuit with clam** current compensation technique for current-mode ...
-
Chapter and Conference Paper
Multi-level Log-Based Relevance Feedback Scheme for Image Retrieval
Relevance feedback has been shown as a powerful tool to improve the retrieval performance of content-based image retrieval (CBIR). However, the feedback iteration process is tedious and time-consuming. History...
-
Chapter and Conference Paper
Texture Image Retrieval Based on Contourlet Coefficient Modeling with Generalized Gaussian Distribution
This paper presents a texture image retrieval scheme based on contourlet transform. In this scheme, the generalized Gaussian distribution (GGD) parameters are used to represent the detail subband features obta...