![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Localization of Underwater Wireless Sensor Networks for Ranging Interference based on the AdaDelta Gradient Descent Algorithm
In Underwater Wireless Sensor Networks, ensuring precise localization of sensor nodes is crucial. Existing localization algorithms heavily rely on pre-deployed and known anchor nodes to compute and determine t...
-
Article
Open AccessAutoregressive graph Volterra models and applications
Graph-based learning and estimation are fundamental problems in various applications involving power, social, and brain networks, to name a few. While learning pair-wise interactions in network data is a well-...
-
Article
Deep reinforcement learning for optimal denial-of-service attacks scheduling
We consider an optimal denial-of-service (DoS) attack scheduling problem of N independent linear time-invariant processes, where sensors have limited computational capability. Sensors transmit measurements to the...
-
Article
Effects of dietary supplementation with Ampelopsis grossedentata extract on production performance and body health of hens
To investigate the potential of Ampelopsis grossedentata extract used as a feed additive, laying performance, egg quality, yolk cholesterol, plasma biochemical parameters, intestinal histology, and gut microbiota...
-
Chapter and Conference Paper
Survey on Deep Learning Based Fusion Recognition of Multimodal Biometrics
We take multimodal as a new research paradigm. This research paradigm is based on the premise that all human interactions with the outside world required the support of multimodal sensory systems. Deep learnin...
-
Chapter and Conference Paper
A Trust-Based Malicious Detection Scheme for Underwater Acoustic Sensor Networks
Underwater acoustic sensor networks (UASNs) have been widely applied in the fields of maritime and underwater industries and national defense. However, due to the unattended deployment environment of UASNs, th...
-
Chapter and Conference Paper
Anomaly Detection of Underwater Sensor Data Based on Temporal and Spatial Correlation
With the development of artificial intelligence, neural networks have been successfully applied to the research and analysis of time series data. Considering the dynamic and spatiotemporal correlation characte...
-
Chapter and Conference Paper
Application of Bionics in Underwater Acoustic Covert Communication
In order to overcome the problems brought by traditional covert communication methods, based on bionics, this paper adopts real or simulated dolphin calls as communication signals to achieve the effect of cove...
-
Chapter and Conference Paper
Hybrid Mac Protocol Based on Security in Clustering Topology
Underwater wireless sensor networks use acoustic waves as the transmission medium which have shortcomings such as long propagation delay, limited bandwidth and time-varying. Because of the openness of underwat...
-
Chapter and Conference Paper
False Data Filtering in Underwater Wireless Sensor Networks
Nowadays, people pay more and more attention to the safety of Marine Territory and the development and utilization of marine resources. Underwater wireless sensor networks (UWSNs) [1] technology has become one of...
-
Chapter and Conference Paper
Safety Situation Assessment of Underwater Nodes Based on BP Neural Network
With the wide application of underwater wireless sensor network, underwater node positioning technology also plays an important role in underwater wireless sensor network. However, nodes are very easy to be ca...
-
Chapter and Conference Paper
A Data Privacy Protection Scheme for Underwater Network
Underwater sensor network is deployed in unattended underwater environment, which can be used to collect sensitive information. It has problems such as low bandwidth, high energy consumption and difficulty in ...
-
Chapter and Conference Paper
CS-Based Homomorphism Encryption and Trust Scheme for Underwater Acoustic Sensor Networks
Underwater acoustic sensor networks (UASNs) have been exploited in many applications. However, due to the complex, unattended and, worse still, hostile deployment environment of the networks, they are vulnerab...
-
Chapter and Conference Paper
Energy-Saving and Efficient Underwater Wireless Sensor Network Security Data Aggregation Model
Due to the inherent characteristics of resource constrained sensors, communication overhead has always been a major problem in underwater wireless sensor networks. Data aggregation is an important technology ...
-
Chapter and Conference Paper
Research on Underwater Bionic Covert Communication
Due to the particularity of the underwater environment, underwater acoustic communication is an inevitable choice for underwater wireless sensor networks (UWSNs) communication. In recent years, with the develo...
-
Article
Effect of thickness on infrared optical property of VO2 film deposited by magnetron sputtering
A series of VO2 films with different thicknesses (from about 25 nm to 250 nm) were prepared on sapphire substrates by radio frequency magnetron sputtering. The deposition times varied from 15 min to 150 min. The ...
-
Article
Improved work function of preferentially oriented indium oxide films induced by the plasma exposure technique
The preferentially oriented In2O3 thin films were prepared on glass substrates by conventional magnetron sputtering with Ar+ plasma exposure at room temperature. Based on the x-ray diffraction, x-ray photoelectro...