![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Density peaks clustering algorithm based on multi-cluster merge and its application in the extraction of typical load patterns of users
The density peaks clustering (DPC) algorithm is simple in principle, efficient in operation, and has good clustering effects on various types of datasets. However, this algorithm still has some defects: (1) du...
-
Article
Personalized behavior modeling network for human mobility prediction
Predicting human mobility is essential for urban planning and personalized services. The problem addressed in this study is analyzing user behavior patterns and predicting their next destination. Due to the co...
-
Article
Data hiding method for AMBTC compressed images
With the current growth of multimedia applications, a substantial amount of visual data, including images and videos, is transmitted daily, making information forensics and security essential. Thus, protecting...
-
Article
Energy-delay tradeoff for virtual machine placement in virtualized multi-access edge computing: a two-sided matching approach
By decoupling network functions from the underlying physical machines (PMs) at the edge of the networks, the virtualized multi-access edge computing (MEC) enables deployment of new network services and elastic...
-
Article
A new relational reflection graph convolutional network for the knowledge representation
The goal of the knowledge representation is to embed entities and relationships in the facts into consecutive low-dimensional dense vectors. Although shallow embedding methods can directly map entities or rela...
-
Article
Recidivism early warning model based on rough sets and the improved K-prototype clustering algorithm and a back propagation neural network
The rate of recidivism by criminals after their release from prison is high, which is harmful to society. Thus, it is socially significant to reduce their recidivism rate. This article uses public data from th...
-
Chapter and Conference Paper
Debias in Deep Learning Recommender System
In recent years, plenty of researchers work on recommender systems, predicting users’ ratings or preferences for items based on massive data. Traditional statistical learning recommender system includes collab...
-
Article
**’an tourism destination image analysis via deep learning
Existing methods focus on destination image construction by textual description or visual content separately. However, descriptions and images are closely related since they are taken from the same reviews and...
-
Article
Open AccessUAV low-altitude obstacle detection based on the fusion of LiDAR and camera
In this paper, aiming at the flying scene of the small unmanned aerial vehicle (UAV) in the low-altitude suburban environment, we choose the sensor configuration scheme of LiDAR and visible light camera, and d...
-
Article
Design and performance evaluation of V2X communication protocol based on Nakagami-m outage probability
In automotive field, the term Internet of Vehicles (IoV) is a sub-application of Internet of Things (IoT).The communication scenario of IoV usually changes in the space-time dimension. Unfortunately, vehicles ...
-
Article
Smart city oriented optimization of residential blocks on intensive urban sensing data based on fuzzy evaluation algorithm
The unreasonable planning of land use in residential blocks affects the quality of the city and the comfort and convenience of urban residents. How to improve the vitality of the street from the source is an u...
-
Article
Design of a robust adaptive sliding mode control using recurrent fuzzy wavelet functional link neural networks for industrial robot manipulator with dead zone
This paper addresses the problem of trajectory tracking control for industrial robot manipulators (IRMs) in the presence of external disturbances and uncertain dynamics. A novel robust adaptive recurrent fuzzy...
-
Article
Online model-learning algorithm from samples and trajectories
Learning of the value function and the policy for continuous MDPs is non-trial due to the difficulty in collecting enough data. Model learning can use the collected data effectively, to learn a model and then ...
-
Chapter and Conference Paper
Knowledge Graph Embedding Bi-vector Models for Symmetric Relation
Knowledge graph embedding (KGE) models focus only on the characteristics of the datasets, ignoring the relation semantics. Most of KGEs have no ability to handle dataset with large numbers of symmetric relatio...
-
Chapter and Conference Paper
Research on Establishment Method of Steel Composition Model Based on High Dimension and Small Sample Data
This paper hopes to predict the corrosion potential of steel by establishing a model of the relationship between the corrosion potential of steel in the marine environment and its component content. However, t...
-
Chapter and Conference Paper
A Study on PD-like Fuzzy Logic Control Based Active Noise Control for Narrowband Noise Cancellation with Acoustic Feedback and Distance Ratio
This study considers the significance of geometrical configuration on the point noise cancellation in the three-dimensional linear propagation medium as its background field and proposes a Proportional Derivat...
-
Chapter and Conference Paper
Optimization Path Planning Algorithm Based on STL File Reconstruction for Automated Fiber Placement
A path planning optimization algorithm for automated fiber placement is proposed. According to the STL model file triangle patch and the vertex index number of the triangle, the STL model file is converted int...
-
Chapter and Conference Paper
Research on Connection Between Physiological Index and Endurance Training on Military Academy Cadets
Purpose is to research on the connection between physiological index and endurance training on military academy cadets. Methodology is to choose 30 cadets randomly in a military academy for tests on their physiol...
-
Chapter and Conference Paper
A Novel Competitive Particle Swarm Optimization Algorithm Based on Levy Flight
The particle swarm optimization is a classical optimization algorithm (PSO) that has been applied to various fields. It implements simple but efficient evolution operators to search for optimums in parameter s...
-
Chapter and Conference Paper
Research on the Management of Equipment Use Risk Based on “Man-Machine-Environment” Model
There are too much considerable risk factors in military operations because of the use of the largest and most complex equipment system in it. If the risk factors are poorly managed, the risk will be transform...