![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Harvest Palm Tree Based on Detection Through 2D LiDAR Sensor Using Power Equation
The palm oil industry in Malaysia is encountering challenges that need innovative and technology-driven solutions. This study focuses on palm tree detection where 2D LiDAR sensors are utilized to collect data ...
-
Chapter and Conference Paper
Multimodal Emotion Recognition Using Attention-Based Model with Language, Audio, and Video Modalities
Multimodal emotion identification is becoming increasingly important in human–computer interaction due to the amount of emotional information in human communication. Multimodal emotion recognition is the techn...
-
Chapter and Conference Paper
Consumer Behavior Prediction During Covid-19 Pandemic Conditions Using Sentiment Analytics
Covid-19 pandemic created a global shift in the way how consumers purchase. Restrictions to movements of individuals and commodities created a big challenge on day today life. Due to isolation, social media us...
-
Chapter and Conference Paper
An Automatic GUI Generation Method Based on Generative Adversarial Network
As a technique applied with artificial neural networks, deep learning is widely used in the field of image recognition. However, a lack of available datasets leads to imperfect model learning. By analysing the...
-
Chapter and Conference Paper
A Naive but Effective Post-processing Approach for Dark Channel Prior (DCP)
Dark Channel Prior (DCP) is originally introduced to remove the haze effects from a digital image. Though the effectiveness of the DCP approach on haze removal, the DCP approach often leads the recovered image...
-
Chapter
Federated Learning for IoT Applications, Attacks and Defense Methods
Federated Learning (FL) is a distributed Machine Learning (ML) framework, which has been considered as a reliable approach to preserve privacy for the widely used Internet of Things (IoT) applications. Althoug...
-
Chapter and Conference Paper
Influence and Optimization of Power Grid ERP System Permission Management on Enterprise Internal Control
To further explore the impact of ERP (Enterprise Resource Planning, ERP) system authority management on the internal management control of power grid enterprises, further standardize the internal management pr...
-
Chapter and Conference Paper
A Computer-Aided Comparative Study on Grammatical Cohesion in Abstracts of Sci-Tech Journal Papers by Chinese and American Scholars
Cohesion, as one of the important ways to achieve discourse coherence, is a crucial part of discourse analysis. Therefore, employing computer-aided Independent Sample T-Test in SPSS software, this paper explor...
-
Chapter and Conference Paper
Project Management Mechanism Research of Distribution Network Based on Big Data
There are many kinds and large quantities of distribution network projects, and the traditional manual control method is inefficient. Power grid construction presents the trend of intellectualization, digitali...
-
Chapter and Conference Paper
Multi-scale Convolutional Neural Networks-Based Severity Prediction
The software defect report is an important part of the software repair process, and its severity attribute is very important. According to the description of the severity attribute of the software defect repor...
-
Chapter and Conference Paper
Influence of RPA Financial Robot on Financial Accounting and Its Countermeasures
With the continuous reform of digital technology, RPA financial robot emerges as the times require. Based on the automation of financial processing process, financial robot has a great influence on traditional...
-
Chapter and Conference Paper
Trusted Identity Cross-Domain Dynamic Authorization Mechanism Based on Master-Slave Chain
In order to solve the security problems existing when power users access power services in different domains, this paper proposes a dynamic authorization model for power users based on master-slave chain. In t...
-
Chapter and Conference Paper
Bit Slotted ALOHA Algorithm Based on a Polling Mechanism
In this study, we propose a bit slotted ALOHA algorithm based on a polling mechanism (PBSA) to address the tag collision problem of dynamic radio frequency identification (RFID) systems. This algorithm is base...
-
Chapter and Conference Paper
IoT Terminal Security Monitoring and Assessment Model Relying on Grey Relational Cluster Analysis
IoT (Internet of Things) terminal security monitoring and evaluation encompasses technique and administration. There are several uncertainties in the monitoring and assessment process of various types of IoT ...
-
Chapter and Conference Paper
Weighted Slopeone-IBCF Algorithm Based on User Interest Attenuation and Item Clustering
Aiming at the problem that the traditional collaborative filtering algorithm has low recommendation accuracy and unsatisfactory results when the matrix is sparse, weighted SlopeOne-IBCF algorithm based on user...
-
Chapter and Conference Paper
Entropy Enhanced AHP Algorithm for Heterogeneous Communication Access Decision in Power IoT Networks
In this paper, the importance of the coverage, security, transmission delay, service rate and cost in each heterogeneous wireless network to the power business is comprehensively analyzed from the perspective...