![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
CCLane: Concise Curve Anchor-Based Lane Detection Model with MLP-Mixer
Lane detection needs to meet the real-time requirements and efficiently utilize both local and global information on the feature map. In this paper, we propose a new lane detection model called CCLane, which u...
-
Chapter and Conference Paper
Security Risk Management of the Internet of Things Based on 5G Technology
The Internet of Things brings security issues as well as high connectivity. This paper proposes a security risk decision based on the bounded rationality of users, aiming at the security problems of power Inte...
-
Chapter and Conference Paper
Network Defense Resource Allocation Scheme with Multi-armed Bandits
The problem of limited defense resources owned by the network platform needs to be solved by designing a reasonable defense resource allocation scheme in Industrial Internet of Things (IIoT). However, most of ...
-
Chapter and Conference Paper
Production Line Balance Optimization Based on Improved Imperial Competition Algorithm
In order to solve the common manufacturing enterprises, line balancing rate optimization to maximize production and minimize production line balancing rate smoothness index as the optimization goal, a new impr...
-
Chapter and Conference Paper
Ankle Variable Impedance Control for Humanoid Robot Upright Balance Control
Upright balance control is the most fundamental, yet essential, function of a humanoid robot to enable the performance of various tasks that are traditionally performed by human being in various unstructured e...
-
Chapter and Conference Paper
A Secret Sharing Scheme of Dynamic Threshold with Cheaters Detection and Identification
There are many schemes to detect and identify cheaters when the number of participants is exactly equal to \( t \) ...
-
Chapter and Conference Paper
Multi-party Semi-quantum Secret Sharing Scheme Based on Bell States
Based on the semi-quantum theory, we propose an easy-to-implement multi-party semi-quantum secret sharing scheme using Bell states, which reduces the construction cost of quantum secret sharing network and com...
-
Chapter and Conference Paper
Dynamic Analysis of Regional Scientific and Technological Innovation Capacity—A Case Study in Sichuan Province
Aiming at the problem of regional scientific and technological innovation, this paper, first, adopted a dynamic model of regional scientific and technological innovation capacity, based on three aspects, envir...
-
Chapter and Conference Paper
An Iteration Method for X-Ray CT Reconstruction from Variable-Truncation Projection Data
-
Chapter and Conference Paper
A Variational Convex Hull Algorithm
Finding the convex hull of a given object or a point set is a very important problem. In this paper, we propose a variational convex hull model and numerical algorithms to solve it. Our model is based on level...
-
Chapter and Conference Paper
Research on Comprehensive Benefits of Urban Rail Transit System Based on the Joint Evaluation Methods
In this paper, based on qualitative and quantitative analysis method and the use of theoretical deduction, model building, empirical research and statistical analysis, the comprehensive benefits of urban rail ...
-
Chapter and Conference Paper
An Efficient Black-Box Vulnerability Scanning Method for Web Application
To discover web vulnerabilities before they are exploited by malicious attackers, black-box vulnerability scanners scan all the web pages of a web application. However, a web application implemented by several...
-
Chapter and Conference Paper
Properties of Fuzzy Relation Inequalities with Addition-Min Composition
Fuzzy relation inequalities with addition-min composition could be used to describe the Peer-to-Peer (P2P) file sharing system. In this paper we study some properties of a system of addition-min fuzzy relation...
-
Chapter and Conference Paper
Geometric Programming with Intuitionistic Fuzzy Coefficient
An geometric programming model is presented with the intuitionistic fuzzy coefficient, and then the model is turned into a crisp geometric programming based on centain accuracy degree of intuitionistic fuzzy s...
-
Chapter and Conference Paper
Note on Max-Łukasiewicz Bipolar Fuzzy Relation Equation
System of max-Łukasiewicz bipolar fuzzy relation equations is considered in this paper. A modified concept of characteristic matrix and the corresponding necessary and sufficient condition is given to check a ...
-
Chapter and Conference Paper
A Biogeography-Based Memetic Algorithm for Job-Shop Scheduling
Job shop scheduling problem (JSP) is a well-known combinatorial optimization problem of practical importance, but existing evolutionary algorithms for JSP often face problems of low convergence speed and/or pr...
-
Chapter and Conference Paper
Quadratic Programming with Max-product Fuzzy Relation Inequality Constraints
In this paper, a new method for quadratic programming with max-product fuzzy relation inequality constraints is proposed. First, the properties of the optimal solution are analyzed in several special cases of ...
-
Chapter and Conference Paper
C̆ech Closure Molecular Lattices
Some results on connected fuzzy topological spaces are extend to the setting of C̆ech closure molecular lattices, a natural generalization of Mashhour and Ghanim’s fuzzy closure spaces, Liu and Luo’s quasi-sub...
-
Chapter and Conference Paper
Weighted Min-Max Programming Subject to Max-Product Fuzzy Relation Equations
Weighted min-max programming subject to max-product fuzzy relation equations is investigated in this paper. For solving the proposed problem, we introduce concepts of discrimination matrix and solution matrix ...
-
Chapter and Conference Paper
An Algorithm of Semi-structured Data Scheme Extraction Based on OEM Model
In order to get the target model of semi-structured data rapidly, effectively and accurately, by combining the related nature of label path in the paper, this paper proposes an algorithm that can extract targe...