![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Scalable multi-view clustering with graph filtering
With the explosive growth of multi-source data, multi-view clustering has attracted great attention in recent years. Most existing multi-view methods operate in raw feature space and heavily depend on the qual...
-
Article
Learning Chinese word representation better by cascade morphological n-gram
Word embedding refers to map** words or phrases to vectors of real numbers. This is the precondition of text classification, sentiment analysis and text mining in natural language processing using deep neura...
-
Article
Learning evolving user’s behaviors on location-based social networks
With the popularity of smart phones, users’ activities on location-based social networks (LBSNs) evolve faster than traditional social networks. Existing models focus on modeling users’ long-term preferences, ...
-
Article
Application of hyperspectral image anomaly detection algorithm for Internet of things
Hyperspectral image(HSI) anomaly detection, as one of the hottest topics in current remote sensing information processing and image processing,has important theoretical value and has been widely used in milita...
-
Chapter and Conference Paper
Anomaly Detection via Trajectory Representation
Trajectory anomaly detection is a vital task in real scene, such as road surveillance and marine emergency survival system. Existing trajectory anomaly detection methods focus on exploring the density, shapes ...
-
Chapter and Conference Paper
Behavior of Social Network Users to Privacy Leakage: An Agent-Based Approach
As the rapid development of online social networks, the service providers collect a tremendous amount of personal data. They have the potential motivation to sell the users’ data for extra profits. To figure o...
-
Article
Common and distinct changes of default mode and salience network in schizophrenia and major depression
Brain imaging reveals schizophrenia as a disorder of macroscopic brain networks. In particular, default mode and salience network (DMN, SN) show highly consistent alterations in both interacting brain activity...
-
Article
A parallel image encryption algorithm based on chaotic Duffing oscillators
Image encryption has been a popular research field in recent decades. This paper presents a novel parallel image encryption algorithm, which is based on the chaotic duffing oscillators. Image encryption system...
-
Article
Open AccessRTGOR: Reliability and Timeliness Guaranteed Opportunistic Routing in wireless sensor networks
Cyber-physical systems (CPSs) connect physical equipment and the information system to realize real-time perception and intelligent control of the equipment. With the rapid development of wireless sensors, wir...
-
Article
Open AccessHybrid connectivity restoration in wireless sensor and actor networks
Wireless sensor and actor networks are becoming more and more popular in the recent years. Each WSAN consists of numerous sensors and a few actors working collaboratively to carry out specific tasks. Unfortuna...
-
Article
Open AccessAn algorithm based on logistic regression with data fusion in wireless sensor networks
A decision fusion rule using the total number of detections reported by the local sensors for hypothesis testing and the total number of detections that report “1” to the fusion center (FC) is studied for a wi...
-
Article
An image encryption scheme based on chaotic tent map
Image encryption has been an attractive research field in recent years. The chaos-based cryptographic algorithms have suggested some new and efficient ways to develop secure image encryption techniques. This p...
-
Chapter and Conference Paper
A Hybrid PSO and SVM Algorithm for Content Based Image Retrieval
In order to improve the speed and accuracy of image retrieval, This paper presents a hybrid optimization algorithm which originates from Particle Swarm Optimization (PSO) and SVM (Support Vector Machine). Firs...
-
Article
Adaptive Spraying for Routing in Delay Tolerant Networks
Message delivery in Delay Tolerant Networks (DTNs) is challenging due to the fact that the network is intermittently connected. Mobility can be exploited to improve DTN performance. In this paper, we propose a...