-
Chapter and Conference Paper
Bridging Recommendations Across Domains: An Overview of Cross-Domain Recommendation
As the Internet has become increasingly ubiquitous and information has experienced explosive growth, recommendation systems have evolved to become an indispensable component across various fields. Traditional ...
-
Article
Safeguarding text generation API’s intellectual property through meaning-preserving lexical watermarks
We aim to protect text generation APIs in this work. Previous LW methods compromised text quality and made watermarks easy to detect through error analysis due to not considering polysemy. To fit this, we prop...
-
Article
The enhancement of magnetism and the occurrence of phase transition in Fe doped g-C3N4 nanoribbons
Two-dimensional graphene-like materials have numerous pores, large surface areas, and other excellent properties. And two-dimensional graphene-like materials have great potential in magnetic and spintronic dev...
-
Article
Design and optimization of novel transceiver device for one-way single-wire power transfer
The further development of wireless power transfer technology is hindered by the limiting relationship between transmission distance, transmission efficiency, and size of the coupling mechanism. Thus, a feasib...
-
Chapter and Conference Paper
Adsorption Behaviors of Hydrogen on Equal Atomic Ratio TiZrV Film Applied in AB-BNCT by Density Functional Theory Study
For accelerator-based boron neutron capture therapy (AB-BNCT), the stable operation of the beam in vacuum is very important. Vacuum instability may affect the efficiency and accuracy of cancer treatments. The ...
-
Chapter and Conference Paper
Hydrogen Adsorption Mechanism of Non-equal Atomic Ratio TiZrV NEG Films Surface
Boron neutron capture therapy (BNCT) is a radiotherapy that destroys cancer cells using heavy ions produced by the nuclear reaction of neutrons with boron in the tumors. With the development of accelerator tec...
-
Chapter and Conference Paper
STL-FNN: An Intelligent Prediction Model of Daily Theft Level
Theft is a long-standing crime against property, which exists alongside the development of private ownership. If the time pattern of thefts could be found out well, police officers can take preventive measures...
-
Chapter and Conference Paper
A Gradient Invariant DCT-Based Image Watermarking Scheme for Object Detection
In this paper, we proposed a novel DCT-based watermarking scheme for grayscale images, which utilizes the connection between discrete cosine transform (DCT) and the Histogram of Oriented Gradient (HOG) feature...
-
Chapter and Conference Paper
Pedestrian Detection Based on Deep Neural Network in Video Surveillance
Pedestrian detection is an essential and challenging problem in machine vision and video surveillance signal processing. To handle the high cost of training-specific discriminative classifier for pedestrian de...
-
Chapter and Conference Paper
Survey of Big Data Application Technology on Multimedia Data of Public Security
The era of multimedia big data has a profound and extensive impact on the field of public security. The application of multimedia data and big data technology has brought new opportunities to the construction ...
-
Article
Inclusion Size Effect on Mechanical Properties of Particle Hydrogel Composite
Particle hydrogel composite (PHC) combines the characteristics of at least two materials and has potential applications in many fields. Different functions require the particle size to range from nanometer to ...
-
Article
Building an Optimal Point-Location Structure in \(O( sort (n))\) I/Os
We revisit the problem of constructing an external memory data structure on a planar subdivision formed by n segments to answer point location queries optimally in
-
Article
Semi-Group Range Sum Revisited: Query-Space Lower Bound Tightened
Let \(\mathcal {D}\) D ...
-
Article
Stream sampling over windows with worst-case optimality and \(\ell \) -overlap independence
Sampling provides fundamental support to numerous applications that cannot afford to materialize all the objects arriving at a rapid speed. Existing stream sampling algorithms guarantee small space and query o...
-
Article
Optimal structural similarity constraint for reversible data hiding
Until now, most reversible data hiding techniques have been evaluated by peak signal-to-noise ratio(PSNR), which based on mean squared error(MSE). Unfortunately, MSE turns out to be an extremely poor measure w...
-
Article
Improving visual quality of reversible data hiding by twice sorting
In most literatures on reversible data hiding (RDH), the visual quality of marked images is only assessed by PSNR, and the smoothness-priority-based sorting technique is efficient for improving PSNR. However, ...
-
Chapter and Conference Paper
Incremental Max-Margin Learning for Semi-Supervised Multi-Class Problem
In this paper, proposed an max-margin model for semi-supervised multi-classification learning, where efficient and accuracy need to be considered. Three notable properties are introduced: (1) the model pre...
-
Chapter and Conference Paper
Reversible Image Data Hiding with Local Adaptive Contrast Enhancement
Recently, a novel reversible data hiding scheme is proposed for contrast enhancement by Wu (IEEE Signal Process Lett 22.1:81–85, 2015). Instead of pursuing the traditional high PSNR value, he designs the message ...
-
Article
Instance-level worst-case query bounds on R-trees
Even with its significant impacts on the database area, the R-tree is often criticized by its lack of good worst-case guarantees. For example, in range search (where we want to report all the data points in a que...
-
Chapter and Conference Paper
Shortest Unique Queries on Strings
Let D be a long input string of n characters (from an alphabet of size up to 2 w , where w is the number of bits in a machine word). Given a substring q of D, a shortest unique q...