![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
149 Result(s)
-
Chapter and Conference Paper
Efficient Chinese Relation Extraction with Multi-entity Dependency Tree Pruning and Path-Fusion
Relation Extraction (RE) is a crucial task in natural language processing that aims to predict the relationship between two given entities. In recent years, a large majority of approaches utilized syntactic in...
-
Chapter and Conference Paper
Identification and Statistical Study of Key Characteristics of Effective Mushroom Quantity of Sea Mushrooms
Before the ripening period of seafood mushrooms, it is usually necessary to judge the growth status of seafood mushrooms from the effective amount of seafood mushrooms, and then adjust environmental parameters...
-
Chapter and Conference Paper
CATS: Connection-Aware and Interaction-Based Text Steganalysis in Social Networks
The generative linguistic steganography in social networks have potential huge abuse and regulatory risks, with serious implications for information security, especially in the era of large language models. Ma...
-
Chapter and Conference Paper
Hi-Stega: A Hierarchical Linguistic Steganography Framework Combining Retrieval and Generation
Due to the widespread use of social media, linguistic steganography which embeds secret message into normal text to protect the security and privacy of secret message, has been widely studied and applied. Howe...
-
Chapter and Conference Paper
VStego800K: Large-Scale Steganalysis Dataset for Streaming Voice
In recent years, more and more steganographic methods based on streaming voice have appeared, which poses a great threat to the security of cyberspace. In this paper, in order to promote the development of str...
-
Chapter and Conference Paper
Genetic-A* Algorithm-Based Routing for Continuous-Flow Microfluidic Biochip in Intelligent Digital Healthcare
In the field of intelligent digital healthcare, Continuous-flow microfluidic biochip (CFMB) has become a research direction of widespread concern. CFMB integrates a large number of microvalves and large-scale ...
-
Chapter and Conference Paper
On Half Guarding Polygons
Given a polygon P and a set of potential guard locations \(G \in P\) G ...
-
Chapter and Conference Paper
Distributed Super-Twisting Sliding Mode Adaptive Fault-Tolerant Control for Multiple UAVs with Prescribed Performance
In this paper, the super-twisting sliding mode-based distributed adaptive fault-tolerant attitude tracking control strategy is proposed for multiple unmanned aerial vehicles (UAVs) with prescribed performance....
-
Chapter and Conference Paper
IGBT Health Monitoring of Traction Converter Based on Self-Excited Short-Circuit Current Function of Drive Circuit
The aging fault of insulated gate bipolar transistor (IGBT) is mainly reflected in the fracture of bonding wire. The health status of the module can be monitored by short-circuit current. For the traction inve...
-
Chapter and Conference Paper
Coupling Environment Experiment Technique of Radiation and Convection Aerodynamic Heating in Wind Tunnel
A coupling environment experiment capability has been developed that incorporates mutual interactions between radiative heating and convective heating on FD-04 arc-heating wind tunnel of China Academy of Aeros...
-
Chapter and Conference Paper
Mask Reconstruction Augmentation and Attention Aggregation for Stereo Matching
Stereo matching is a significant task in computer vision and is widely used for depth prediction. Although deep learning stereo matching networks have achieved impressive results in recent years, the current m...
-
Chapter and Conference Paper
Research of Rural Landscape Evaluation System Based on AHP: A Case Study of Zhao Chengwan in Wuhan
Based on the combination of stratified analysis and fuzzy comprehensive evaluation, Zhao Chengwan rural landscape characteristics and expert opinions, the rural landscape evaluation system in this region was c...
-
Chapter and Conference Paper
Design and Analysis of Energy Storage Converters for Regenerative Braking Energy Absorption in Urban Rail Transit
Nowadays, the development of urban rail transit is getting faster and faster, but its consequent electric consumption problem is getting more attention, and how to better solve the problem of regenerative brak...
-
Chapter and Conference Paper
A Study on Deformation Mechanisms of Ti2AlNb-Based Alloy Under Plane Strain Compression
As a superalloy, Ti2AlNb-based alloy faces a great challenge due to the commonly existent centimeter-level coarse grains in as-cast material, which severely deteriorate their mechanical property. In-depth underst...
-
Chapter and Conference Paper
Optimization Design of High-Pressure Simulated Rotor
Combined elastic support which include squirrel cage and squeeze film damper (SFD) are widely used in aero-engines, gas turbine, and steam turbine. Squirrel cage can vary the critical speed and strain energy d...
-
Chapter and Conference Paper
Refinement Mechanism of Centimeter-Grade Coarse Grains in As-Cast Ti2AlNb-Based Alloy Through Uniaxial and Multi-axial Compressions
Ti2AlNb-based alloy has great application potential in the aerospace industry due to its low density, high service temperature, and excellent mechanical properties. However, the ingots of this material are usuall...
-
Chapter and Conference Paper
Resource Binding and Module Placement Algorithms for Continuous-Flow Microfluidic Biochip in Intelligent Digital Healthcare
Continuous-Flow Microfluidic Biochip (CFMB), with their integrated features, bring traditional biochemical experiments on a single chip to accomplish complex operations and reactions through precise control, e...
-
Chapter and Conference Paper
DNA Steganalysis Based on Multi-dimensional Feature Extraction and Fusion
Steganalysis, as an adversarial technique to steganography, aims to uncover potential concealed information transmission, holding significant research implications and value in maintaining societal peace and s...
-
Chapter and Conference Paper
Linguistic Steganalysis Based on Clustering and Ensemble Learning in Imbalanced Scenario
With the rapid development of the Internet, more and more methods of text steganography have emerged. However, these methods are easily abused in public networks for malicious purposes, which poses a great thr...
-
Chapter and Conference Paper
Secure Steganography Scheme Based on Steganography Generative Adversarial Network
Taking into consideration the security concerns surrounding steganography due to the infiltration of dense images during the image stealth process, this article proposes the addition of a noise layer between t...