202,997 Result(s)
-
Chapter and Conference Paper
Performance Evaluation of WMN-PSOHC and WMN-PSO Simulation Systems for Node Placement in Wireless Mesh Networks: A Comparison Study
Wireless Mesh Networks (WMNs) have many advantages such as low cost and increased high speed wireless Internet connectivity, therefore WMNs are becoming an important networking infrastructure. In our previous ...
Shinji Sakamoto, Kosuke Ozera, Tetsuya Oda… in Advances in Internetworking, Data & Web Te… (2018)
-
Chapter and Conference Paper
Selective Ensemble Based on Probability PSO Algorithm
In order to overcome the disadvantages of high complexity, low speed and accuracy of selective ensemble algorithm based on genetic algorithm. We proposed a new selective ensemble algorithm based on probabilit...
Wen Quan, Jian Wang, Zhongmin He… in Advances in Internetworking, Data & Web Te… (2018)
-
Chapter and Conference Paper
Video Stabilization Algorithm Based on Kalman Filter and Homography Transformation
The camera systems are usually suffered from random jitter. In this paper, a new method based on Kalman filter and homography transformation is proposed to stabilize the unstable video. Firstly, the SURF (Spee...
Cong Liu, Xiang Li, Minghu Wu in Advances in Internetworking, Data & Web Technologies (2018)
-
Chapter
Discussion and Conclusion
Chapter 6 concludes this thesis by summarizing its findings. The results are holistically discussed in the light of the overarching research question and the underlying theoretical framework. To end, implicati...
Christoph W. Künne in Online Intermediaries for Co-Creation (2018)
-
Chapter and Conference Paper
A Routing Based on Geographical Location Information for Wireless Ad Hoc Networks
This paper Propose the location-based routing algorithm forwarding with alternative copies. This routing algorithm considers both the location information and the velocity vector to establish the utility func...
Yongqiang Li, Zhong Wang, Qinggang Fan… in Advances in Internetworking, Data & Web Te… (2018)
-
Chapter and Conference Paper
Improved Leader-Follower Method in Formation Transformation Based on Greedy Algorithm
A method based on the leader-follower method is proposed for formation transformation in large-scale mass incidents. The greedy algorithm is introduced to realize regional division and leader matching problem...
Yan-Yu Duan, Qing-Ge Gong, Zhen-Sheng Peng… in Advances in Internetworking, Data & Web Te… (2018)
-
Chapter and Conference Paper
A User Prediction and Identification System for Tor Networks Using ARIMA Model
Due to the amount of anonymity afforded to users of the Tor infrastructure, Tor has become a useful tool for malicious users. With Tor, the users are able to compromise the non-repudiation principle of compute...
Tetsuya Oda, Miralda Cuka, Ryoichiro Obukata… in Advances in Internetworking, Data & Web Te… (2018)
-
Chapter and Conference Paper
Developing Cloud-Based Tools for Water Resources Data Analysis Using R and Shiny
Aimed at developing and utilizing the water resource appropriately, it is critical to analyze, mine and present the valuable information and knowledge. Until recently, analyzing the big data in an online envir...
Feng Ye, Yong Chen, Qian Huang, Ling Li in Advances in Internetworking, Data & Web Te… (2018)
-
Chapter and Conference Paper
An Efficient and Secure Outsourcing Algorithm for Bilinear Pairing Computation
Bilinear pairing computation is one of the most important cryptographic primitives, which is widely used in the public key encryption schemes. However, it has been considered the most expensive operation in th...
Xiaoshuang Luo, Xiaoyuan Yang, Xiangzhou Niu in Advances in Internetworking, Data & Web Te… (2018)
-
Chapter and Conference Paper
Multi-focus Image Fusion Method Based on NSST and IICM
Multi-focus image fusion is a classic issue in the field of image processing. How to extract and fuse the in-focus information from the source images into the single one is the key to resolving the above probl...
Yang Lei in Advances in Internetworking, Data & Web Technologies (2018)
-
Chapter and Conference Paper
Study of a Disaster Relief Troop’s Transportation Problem Based on Minimum Cost Maximum Flow
In rescue missions, time is life, and only when the army arrives the first time around can risk to people’s lives and property be minimized. Therefore, not only does a troop’s transportation require reasonable...
Zhen-Sheng Peng, Qing-Ge Gong, Yan-Yu Duan… in Advances in Internetworking, Data & Web Te… (2018)
-
Chapter and Conference Paper
Key Encapsulation Mechanism from Multilinear Maps
The key encapsulation mechanism (KEM) and the data encapsulation mechanism (DEM) form a hybrid encryption, which effectively solves the problem of low efficiency of public key cryptography and key distribution...
Liqun Lv, Wenjun Sun, Xiaoyuan Yang… in Advances in Internetworking, Data & Web Te… (2018)
-
Chapter and Conference Paper
Multi-target Detection of FMCW Radar Based on Width Filtering
Considering the issue of how to implement multi-target detection rightly in the complex environment of LFMCW (linear frequency modulated continuous wave) radar, a framework was proposed to analyze target detec...
Mingfei Liu, Yi Qu, Yefeng Zhang in Advances in Internetworking, Data & Web Technologies (2018)
-
Chapter and Conference Paper
DPHKMS: An Efficient Hybrid Clustering Preserving Differential Privacy in Spark
k-means is one of the most widely used clustering algorithms by far. However, when faced with massive data clustering tasks, traditional data mining approaches, especially existing clustering mechanisms ...
Zhi-Qiang Gao, Long-Jun Zhang in Advances in Internetworking, Data & Web Technologies (2018)
-
Chapter and Conference Paper
Detecting Crowdsourcing Spammers in Community Question Answering Websites
The growth of online crowdsourcing marketplaces has attracted massive normal buyers and micro workers, even campaigners and malicious users who post spamming jobs. Due to the significant role in information se...
Kaiqing Hao, Lei Wang in Advances in Internetworking, Data & Web Technologies (2018)
-
Chapter and Conference Paper
Research on CSER Rumor Spreading Model in Online Social Network
In the field of rumor spreading, kill rumor is a very important concept. In the previous study of rumor spreading, only considering the rumor from the outside of the network, while ignoring the node itself has...
An-Hui Li, Jing Wang, Ya-Qi Wang in Advances in Internetworking, Data & Web Technologies (2018)
-
Chapter and Conference Paper
Fast Iterative Reconstruction Based on Condensed Hierarchy Tree
Based on the traditional iterative reconstruction workflow, a fast iterative reconstruction algorithm FIRA is proposed. First, using the image feature points extracted by SIFT algorithm, calculation of image s...
Wan Fang, Jin HuaZhong, Lei GuangBo, Ruan Ou in Advances in Internetworking, Data & Web Te… (2018)
-
Chapter and Conference Paper
Spam Mail Filtering Method Based on Suffix Tree
In recent years, e-mail technology is prospering, bringing efficiency to people from all over the world. It is not limited to time and space, making the transmission of information more convenient. However, t...
Runqiu Hu, Yitao Yang in Advances in Internetworking, Data & Web Technologies (2018)
-
Chapter and Conference Paper
Implementation of an Actor Node for an Ambient Intelligence Testbed: Evaluation and Effects of Actor Node on Human Sleeping Condition
Ambient intelligence (AmI) deals with a new world of ubiquitous computing devices, where physical environments interact intelligently and unobtrusively with people. AmI environments can be diverse, such as hom...
Ryoichiro Obukata, Miralda Cuka… in Advances in Internetworking, Data & Web Te… (2018)
-
Chapter and Conference Paper
Multi-documents Summarization Based on the TextRank and Its Application in Argumentation System
In the group argumentation environment, a large amount of text information will be produced. How to find the specific speeches of experts from many similar speeches and extract their common summary is of great...
Caiquan Xiong, Yuan Li, Ke Lv in Advances in Internetworking, Data & Web Technologies (2018)