![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
124 Result(s)
-
Article
Open AccessCross-chain asset trading scheme for notaries based on edge cloud storage
Blockchain has penetrated in various fields, such as finance, healthcare, supply chain, and intelligent transportation, but the value exchange between different blockchains limits their expansion. Cross-chain ...
-
Article
Open AccessGenetic algorithm-based secure cooperative control for high-order nonlinear multi-agent systems with unknown dynamics
Research has recently grown on multi-agent systems (MAS) and their coordination and secure cooperative control, for example in the field of edge-cloud computing. MAS offers robustness and flexibility compared ...
-
Article
Open AccessSmart and efficient EV charging navigation scheme in vehicular edge computing networks
With the increasing number of electric fast charging stations (FCSs) deployed along roadsides of both urban roads and highways, the long-distance travel of electric vehicles (EVs) becomes possible. The EV char...
-
Article
Open AccessFeature-enhanced fusion of U-NET-based improved brain tumor images segmentation
The field of medical image segmentation, particularly in the context of brain tumor delineation, plays an instrumental role in aiding healthcare professionals with diagnosis and accurate lesion quantification....
-
Article
Exploring the interaction of cognition and emotion in small group collaborative discourse by Heuristic Mining Algorithm (HMA) and Inductive Miner Algorithm (IMA)
This study explored the interaction between cognition and emotion in blended collaborative learning. The participants (n = 30) of this study were undergraduate students enrolled in a 16-week course on information...
-
Article
Open AccessContainer cascade fault detection based on spatial–temporal correlation in cloud environment
Containers are light, numerous, and interdependent, which are prone to cascading fault, increasing the probability of fault and the difficulty of detection. Existing detection methods are usually based on a ca...
-
Article
Open AccessLightweight similarity checking for English literatures in mobile edge computing
With the advent of information age, mobile devices have become one of the major convenient equipment that aids people’s daily office activities such as academic research, one of whose major tasks is to check t...
-
Article
Preface
-
Article
Open AccessAn efficient attribute-based hierarchical data access control scheme in cloud computing
Security issues in cloud computing have become a hot topic in academia and industry, and CP-ABE is an effective solution for managing and protecting data. When data is shared in cloud computing, they usually h...
-
Article
Open AccessA spatio-temporal specification language and its completeness & decidability
In the past few years, significant progress has been made on spatio-temporal cyber-physical systems in achieving spatio-temporal properties on several long-standing tasks. With the broader specification of spa...
-
Chapter and Conference Paper
Visual Compiler: Towards Translating Digital UI Design Draft to Front-End Code Automatically
One assignment of a front-end engineer is to transform the User Interface (UI) design drafts to arrangements with program compatibilities. To furnish the customer requirement, engineers usually need to consid...
-
Chapter and Conference Paper
Comprehensive Evaluation of an Educational Information Management Solution for Parents: MyStudentScope
Existing electronic student information systems used by schools were designed from the perspective of the educators or students, not the parents. Parents and caregivers have challenges optimizing their use of ...
-
Chapter and Conference Paper
Based on GAN Generating Chaotic Sequence
In this paper, an adversarial encryption algorithm based on generating chaotic sequence by GAN is proposed. Starting from the poor leakage resistance of the basic adversarial encryption communication model bas...
-
Chapter and Conference Paper
VLC-Enabled Human-Aware Building Management System
“Smart” buildings that can sense and detect people’s presence have been in use for the past few decades, mostly using technologies that trigger reactive responses such as turning on/off heating/ventilating, li...
-
Chapter and Conference Paper
Design Criteria for Kansei-Oriented Elderly Products
The purposes of this study included: (1) identifying the specific design components of functional shoes that affect the psychological feeling of the elderly, and establishing their weights; (2) exploring the ...
-
Chapter and Conference Paper
Research on Agricultural Scientific and Technological Information Dissemination System Based on Complex Network Technology
In view of the complexity of information dissemination in agriculture and the uncertainty of farmers’ demand for scientific and technological information, this paper makes a comprehensive and accurate analysis...
-
Chapter and Conference Paper
Study on Spatiotemporal Characteristics of Gaze Gesture Input
The gaze gesture input has the advantages of high bandwidth, high efficiency, no misoperation and high customization, but it also has the disadvantages of high cognitive load and high fatigue degree. At prese...
-
Chapter and Conference Paper
Optimizing Data Placement on Hierarchical Storage Architecture via Machine Learning
As storage hierarchies are getting deeper on modern high-performance computing systems, intelligent data placement strategies that can choose the optimal storage tier dynamically is the key to realize the pote...
-
Chapter and Conference Paper
Gamification in Local Intangible Cultural Heritage Museums for Children: A Case Design
Nowadays, local intangible cultural heritage is in danger of disappearing. The museum is a good way to protect it but the current problem is that visitors are less willing to visit boring museums. Gamification...
-
Chapter and Conference Paper
Mouse Behavior as an Index of Phishing Awareness
Phishing attacks are one of the most common security challenges faced by individuals and organizations today. Although many techniques exist to filter out phishing emails, they are not always effective leaving...