![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Security enhanced privacy-preserving data aggregation scheme for intelligent transportation system
The intelligent transportation system can make traffic decisions through the sensory data collected by vehicles to ensure driving safety, improve traffic efficiency and traffic environment. Thus, the system ha...
-
Article
A double-embedding hidden image encryption and authentication scheme based on compressed sensing and double random phase encoding
The image may be maliciously tampered when transmitted on the shared platform, and the receiver cannot determine whether the received image is a true image. In order to solve the above problems, an image encry...
-
Article
Compressed sensing based visually secure multi-secret image encryption-sharing scheme
The existing encryption schemes of visually secure image have drawbacks, such as excessive concentration of image data and insufficient resistance to various attacks in the transmission channel. Based on the c...
-
Chapter
Theoretical Basis for Space Archaeology
Space archaeology takes space technologies as research means and tool carriers. First, it can improve archaeologists’ ability and work efficiency for discovering relics and remains of ancient human activities.
-
Chapter
Comprehensive Technologies for Space Archaeology
Earth observation takes the Earth as the research object to rely on space platforms such as satellites, spacecraft, near-space vehicles, and the ground and use various detection means of visible light, infrare...
-
Chapter
Spatial Cognition of Large-Scale Cultural Heritage Sites in China
In recent years, with a deepening understanding of heritage, a series of large-scale linear heritage sites like Cultural Routes, Heritage Canal, Heritage Corridor, which reflect the integrity and continuity of...
-
Article
Which standard classification algorithm has more stable performance for imbalanced network traffic data?
Most standard classification algorithms are difficult to effectively learn and predict from imbalanced network traffic data, which usually leads to lower classification accuracy. To analyze the influence of im...
-
Chapter
Archaeology and Its Development
Archaeology was once defined as “the science of restoring ancient society and exploring the patterns of historical development by studying underground relics and remains” (China Encyclopedia Compilation Commit...
-
Chapter
Remote Sensing Technology and Archaeology
As sensor and information technologies develop rapidly, modern remote sensing technology has entered a new stage of providing fast, dynamic, multi-platform, multi-temporal, and high-resolution Earth observatio...
-
Chapter
Spatial Cognition for Information of World Cultural Heritage
The world cultural heritage is a precious textbook for people to know the history and culture of different countries and nationalities.
-
Book
-
Chapter
Towards Space Archaeology
Archaeology is a branch of science that analyzes and reconstructs past or ancient human activities by discovering and studying the physical remains (such as artifacts and buildings) left by ancient human socie...
-
Chapter
Space-Based Observation Technology
The new space-based observation technology (SBOT) helps people acquire the spatial data they depend on for survival, and enhance their abilities of understanding the world and adapting to society through numer...
-
Article
Can Axillary Lymph Node Dissection be Omitted in Breast Cancer Patients with Metastatic Sentinel Lymph Nodes Undergoing Mastectomy? A Systematic Review and Meta-Analysis of Real-World Evidence
The omission of axillary lymph node dissection (ALND) in patients with breast cancer who have metastatic sentinel lymph nodes (SLNs) undergoing mastectomy remains controversial. This meta-analysis explored the...
-
Article
A low-overhead compressed sensing-driven multi-party secret image sharing scheme
A single multimedia image encryption scheme cannot well overcome the insecurity factors such as data loss and noise influence in the network channel. Taking advantage of the similarity in structure between com...
-
Article
Hybrid scheduling strategy of multiple mobile charging vehicles in wireless rechargeable sensor networks
Charging optimization is an important research issue in wireless rechargeable sensor networks. The current researches on wireless charging mainly consider a single mobile charger to replenish sensors. However,...
-
Article
Open AccessScreening and validating of endogenous reference genes in Chlorella sp. TLD 6B under abiotic stress
Chlorella sp. TLD 6B, a microalgae growing in the Taklamakan Desert, **njiang of China, is a good model material for studying the physiological and environmental adaptation mechanisms of plants in their arid habi...
-
Article
Open AccessRisk assessment of city site landscapes in the central plains of China
Scientific cognition and assessment of threats to cultural heritage and surrounding landscapes are prerequisites for targeted management and protection of cultural heritage. This study took 530 city sites in t...
-
Article
Progressive and multi-level secret image sharing scheme with hierarchical shadows
Multi-level secret image sharing is a scheme combining hierarchical shadows with progressive reconstruction. But in previous schemes, the generated shadows are divided into two hierarchies, and these hierarchy...
-
Chapter and Conference Paper
JointContrast: Skeleton-Based Mutual Action Recognition with Contrastive Learning
Skeleton-based action recognition relies on skeleton sequences to detect certain categories of human actions. In skeleton-based action recognition, it is observed that many scenes are mutual actions characteri...