Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleNovember 2024
Research on Autonomous Driving Decision-making Strategies based Deep Reinforcement Learning
IoTML '24: Proceedings of the 2024 4th International Conference on Internet of Things and Machine LearningPages 211–215https://doi.org/10.1145/3697467.3697643The behavior decision-making subsystem is a key component of the autonomous driving system, which reflects the decision-making ability of the vehicle and the driver, and is an important symbol of the high-level intelligence of the vehicle. However, the ...
- research-articleJuly 2024
High invisibility image steganography with wavelet transform and generative adversarial network
Expert Systems with Applications: An International Journal (EXWA), Volume 249, Issue PAhttps://doi.org/10.1016/j.eswa.2024.123540AbstractRecently, extensive research is showing that deep learning has enormous potential in image steganography. However, most steganography methods based on deep learning are not sufficiently invisible. In this paper, a novel end-to-end deep neural ...
Highlights- End-to-end deep neural network based image steganography method.
- An effective DWT based method to embed information in frequency.
- A multi-scale attention convolution is used to find a better embedding location.
- A fusion module ...
- research-articleJune 2024
Research on BiLSTM-Attention short-term electricity price forecasting considering similar days
ICBAR '23: Proceedings of the 2023 3rd International Conference on Big Data, Artificial Intelligence and Risk ManagementPages 362–367https://doi.org/10.1145/3656766.3656828Short-term electricity price forecasting has always been one of the important issues in the electricity market. An accurate and applicable electricity price forecasting method can effectively avoid the risk of the trading market to maximize the economic ...
- brief-reportDecember 2020
FedMEC: Improving Efficiency of Differentially Private Federated Learning via Mobile Edge Computing
Mobile Networks and Applications (MNET), Volume 25, Issue 6Pages 2421–2433https://doi.org/10.1007/s11036-020-01586-4AbstractFederated learning is a recently proposed paradigm that presents significant advantages in privacy-preserving machine learning services. It enables the deep learning applications on mobile devices, where a deep neural network (DNN) is trained in a ...
- articleApril 2015
The design of an electronic pedigree system for food safety
Information Systems Frontiers (KLU-ISFI), Volume 17, Issue 2Pages 275–287https://doi.org/10.1007/s10796-012-9372-yThe problem of food safety is a critical issue in recent years. To address the issue, the technologies of the Internet of Things are used to offer the possibilities to easily track the processes in the production, storage, transportation, sale, and even ...
-
- articleJanuary 2015
Enterprise-oriented IoT name service for agricultural product supply chain management
International Journal of Distributed Sensor Networks (IJDSN-H), Volume 2015Article No.: 7, Page 7https://doi.org/10.1155/2015/308165Internet of Things (IoT) technologies have a great potential to improve the safety and quality of agricultural products. By providing near continuous monitoring from planting through harvesting and to our homes, IoT technologies are able to provide farm ...
- research-articleJanuary 2015
Wireless sensor network for real-time perishable food supply chain management
Computers and Electronics in Agriculture (COEA), Volume 110, Issue CPages 196–207https://doi.org/10.1016/j.compag.2014.11.009The WSN nodes can monitor both environmental parameters and the states of motion.The WSN system is configurable according the requirements of applications.The non-joined EndDevice improved by network switching scheme is more energy-efficient.The ...
- articleDecember 2014
Session-based security enhancement of RFID systems for emerging open-loop applications
Personal and Ubiquitous Computing (PUC), Volume 18, Issue 8Pages 1881–1891https://doi.org/10.1007/s00779-014-0788-xRadio frequency identification (RFID) is an important technique used for automatic identification and data capture. In recent years, low-cost RFID tags have been used in many open-loop applications beyond supply chain management, such as the tagging of ...
- ArticleOctober 2014
Enterprise-Oriented IoT Name Service for Agriculture Product Supply Chain Management
IIKI '14: Proceedings of the 2014 International Conference on Identification, Information and Knowledge in the Internet of ThingsPages 237–241https://doi.org/10.1109/IIKI.2014.55Internet of Things (IoT) technologies have great potential in protecting safety and quality of agriculture products. Convenient and efficient identification and name service (NS) are the basis of such IoT technologies. An enterprise-oriented name service ...
- articleFebruary 2014
A low-cost UHF RFID tag chip with AES cryptography engine
Security and Communication Networks (SACN), Volume 7, Issue 2Pages 365–375https://doi.org/10.1002/sec.723In this paper, the design of a low-cost ultra-high-frequency UHF Radio Frequency IDentification RFID tag chip with an advanced encryption standard AES cryptographic engine is presented. The design of digital baseband is verified on a Field-Programmable ...
- articleDecember 2008
Similarity solutions to the power-law generalized Newtonian fluid
Journal of Computational and Applied Mathematics (JCAM), Volume 222, Issue 2Pages 381–391https://doi.org/10.1016/j.cam.2007.11.004The authors of this paper study a second-order nonlinear parabolic equation with a background describing the motion of the power-law generalized Newtonian fluid. The existence of similarity solutions is obtained and the asymptotic behavior of the ...
- ArticleOctober 2007
Virtual Logistics Enterprise System Integration Model Based on SOA
SKG '07: Proceedings of the Third International Conference on Semantics, Knowledge and GridPages 606–607https://doi.org/10.1109/SKG.2007.292that organizing a network-based, logistics business-based, agile and loose virtual logistics enterprise (VLE). However, it becomes difficult for organizing a VLE that how to manage and coordinate partnership enterprise information systems, which is ...
- research-articleSeptember 2007
Exact self-similar solutions of the magnetohydrodynamic boundary layer system for power-law fluids
Zeitschrift für Angewandte Mathematik und Physik (ZAMP) (ZAMP), Volume 58, Issue 5Pages 805–817https://doi.org/10.1007/s00033-006-5117-4Abstract.In a particular self-similar case, the magnetohydrodynamic boundary layer system for an electrically conducting power-law fluid together with certain boundary conditions can be transformed into a boundary value problem for a third-order nonlinear ...
- research-articleSeptember 2004
A boundary layer problem arising in gravity-driven laminar film flow of power-law fluids along vertical walls
Zeitschrift für Angewandte Mathematik und Physik (ZAMP) (ZAMP), Volume 55, Issue 5Pages 769–780https://doi.org/10.1007/s00033-004-1122-7Abstract.A rigorous mathematical analysis is given for a boundary layer problem for a third-order nonlinear ordinary differential equation, which arises in gravity-driven laminar film flow of power-law fluids along vertical walls. Firstly, the problem is ...
- articleOctober 2002
The upper and lower solution method for a class of singular nonlinear second order three-point boundary value problems
Journal of Computational and Applied Mathematics (JCAM), Volume 147, Issue 1Pages 41–52https://doi.org/10.1016/S0377-0427(02)00390-4In this paper we develop the upper and lower solution method and the monotone iterative technique for a class of singular nonlinear second order three-point boundary value problems. A maximum principle is established and some new existence results are ...