![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Research on Highly Secure Metaverse Based on Extended Reality Under Edge Computing
With the explosion of ChatGPT, the development of artificial intelligence technology ushered in another explosion. Similarly, with the rapid development of extended reality technology and Internet of Things te...
-
Article
Theories, algorithms and applications in tensor learning
Due to the accelerated development and popularization of Internet, mobile Internet, and Internet of Things and the breakthrough of storage and communication technologies, the amount of data obtained in the fie...
-
Chapter and Conference Paper
Edge Intelligence Based Garbage Classification Detection Method
To address the problem that the classification and cleaning of garbage in city streets is always ineffective nowadays, the paper proposes a garbage detection method based on edge intelligence. The edge intelli...
-
Chapter and Conference Paper
Prediction for Surface Subsidence of Shield Construction in Water-Rich Sand Egg Stratum Based on Edge Intelligence
The refinement and intelligent control of shield tunneling is the development trend of modern tunnel construction technology. In order to better predict and control the surface subsidence caused by shield exca...
-
Chapter and Conference Paper
A Co-caching Strategy for Edges Based on Federated Learning and Regional Prevalence
With the rise of data storage computing and IoT technology. The increase in data volume and user demand, the accurate delivery of data and low latency during transmission become important factors that affect t...
-
Chapter and Conference Paper
Federated Learning Based User Scheduling for Real-Time Multimedia Tasks in Edge Devices
Edge networks are highly volatile and the quality of device communication and computational resources change not only over time but also according to the movement of users
-
Article
Unsupervised anomaly detection for network traffic using artificial immune network
In the existing approaches of multifarious knowledge based anomaly detection for network traffic, the priori knowledge labelled by human experts has to be consecutively updated for identification of new anomal...
-
Chapter and Conference Paper
Unsupervised Anomaly Detection for Network Flow Using Immune Network Based K-means Clustering
To detect effectively unknown anomalous attack behaviors of network traffic, an Unsupervised Anomaly Detection approach for network flow using Immune Network based K-means clustering (UADINK) is proposed. In U...
-
Article
An immunity-based time series prediction approach and its application for network security situation
To effectively improve the prediction precision of network security situation and prevent the large-scale network security attacks, an immunity-based time series prediction approach for network security situat...
-
Article
Open AccessChaotic Time Series Prediction Using Immune Optimization Theory
To solve chaotic time series prediction problem, a novel Prediction approach for chaotic time series based on Immune Optimization Theory (PIOT) is proposed. In PIOT, the concepts and formal definitions of anti...