![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Path signature-based XAI-enabled network time series classification
Classifying network time series (NTS) is crucial for automating network administration and ensuring cyberspace security. It enables the detection of anomalies, the identification of network attacks, and the mo...
-
Article
Virtual human pose estimation in a fire education system for children with autism spectrum disorders
Children with autism face challenges in areas like language and social skills, which hinder their ability to undergo regular fire training. Fire is one of the most common and dangerous disaster in real life, m...
-
Chapter and Conference Paper
V-Curve25519: Efficient Implementation of Curve25519 on RISC-V Architecture
Internet of Everything technology has greatly promoted the development of intelligent Internet of Vehicles (IoV) system. Similar to the Internet of Things system, the Internet of Vehicles also faces the proble...
-
Article
Open AccessData storage mechanism of industrial IoT based on LRC sharding blockchain
With the rapid development of Industry 4.0, the data security of Industrial Internet of Things in the Industry 4.0 environment has received widespread attention. Blockchain has the characteristics of decentral...
-
Article
Evaluation of the immune protective effects of rEmMIC2 and rEmMIC3 from Eimeria magna in rabbits
Eimeria magna is a common pathogen in rabbits, which results in lethargy, weight loss, diarrhea, and even death in severe cases after infection. The current method for preventing rabbit coccidiosis is to add anti...
-
Article
Blockchain-based trust establishment mechanism in the internet of multimedia things
Through the application of powerful semiconductors and high-speed communication technologies such as 5G, large-scale or even ultra-large-scale Internet of Multimedia Things (IoMT) will soon appear. Secure comm...
-
Article
Open AccessLINC01287 facilitates proliferation, migration, invasion and EMT of colon cancer cells via miR-4500/MAP3K13 pathway
Accumulated studies indicate that aberrant expression of long noncoding RNAs (lncRNAs) is associated with tumorigenesis and progression of colon cancer. In the present study, long intergenic non-protein coding...
-
Chapter and Conference Paper
Key Exposure Resistant Group Key Agreement Protocol
With the development of the Internet and computer science, the demand for collaboration over the Internet is constantly increasing. The group key agreement (GKA) protocol has been a desirable candidate for thi...
-
Article
Open AccessAn efficient method for meteorological nephogram recognition in cloud environment
Nephogram could provide important information for meteorological business, and nephogram recognition is a kind of challenge in the meteorological industry. In this paper, a selective neural network ensemble me...
-
Article
Open AccessComparative analysis of host resistance to Sarcoptes scabiei var. cuniculi in two different rabbit breeds
Scabies, caused by infestation of the mite Sarcoptes scabiei, is one of the most severe ectoparasitic diseases in rabbits. Scabies seriously affects the commercial rabbit breeding, causing severe economic losses....
-
Article
A hierarchical clustering based method to evaluate reuse of rare earth tailings under cloud computing environment
Because of their unique electronic, magnetic and optical features, the rare earth has become an important strategic resource. Moreover, improving the exploitation of rare earth resources is very significant. T...
-
Article
Open AccessA chitinase-like protein from Sarcoptes scabiei as a candidate anti-mite vaccine that contributes to immune protection in rabbits
Scabies is caused by Sarcoptes scabiei burrowing into the stratum corneum of the host’s skin and is detrimental to the health of humans and animals. Vaccines are an attractive alternative to replace the acaricide...
-
Article
Implicit authentication protocol and self-healing key management for WBANs
In recent years, the rapid development of computer science and technology brings health care into the information era. As a typical representation, wireless body area networks (WBANs) has also promoted the dev...
-
Chapter and Conference Paper
Preservation Mechanism of Electronic Record Based on Erasure Code and Multi Copies in Cloud Storage
With the rapid growth of cloud storage center, the cumulative volume of data reaches EB and even ZB from PB. As a result, both network size and the number of storage nodes continue to grow explosively, while t...
-
Chapter and Conference Paper
Digital Continuity Guarantee Based on Data Consistency in Cloud Storage
Since the British National Archives put forward the concept of the digital continuity in 2007, Some developed countries have developed a digital continuity plan of action. At the same time, digital continuity ...
-
Chapter and Conference Paper
Consistency Guarantee Method of Electronic Record Based on Blockchain in Cloud Storage
Cloud storage is now a hot research topic in information technology, which has changed the technical architecture and implementation method of electronic record management. However, due to loss of physical con...
-
Chapter and Conference Paper
Digital Continuity Guarantee of Electronic Record Based on Data Usability in Big Data Environment
At present some developed countries have put forward their digital continuity action plans. And the digital continuity has also become a hot spot in the research of electronic records. However, the technology ...
-
Article
Open AccessExpression and characterisation of a Sarcoptes scabiei protein tyrosine kinase as a potential antigen for scabies diagnosis
Scabies is a disease that harms humans and other animals that is caused by the itch mite Sarcoptes scabiei burrowing into the stratum corneum of the skin. In the early stages of scabies, symptoms are often subcli...
-
Article
Efficient data integrity auditing for storage security in mobile health cloud
Cloud storage services can enable data owners to eliminate the need for the initial investment of expensive infrastructure setup and also minimize development and maintenance costs. Outsourcing the health data...
-
Chapter and Conference Paper
A RFID Based Localization Algorithm for Wireless Sensor Networks
The localization technology takes an important role in real-time alarm and rapid response. In this paper, we propose a novel localization method for wireless sensor network which is based on Radio Frequency I...