


default search action
5th ICCCS 2020: Shanghai, China
- 5th International Conference on Computer and Communication Systems, ICCCS 2020, Shanghai, China, May 15-18, 2020. IEEE 2020, ISBN 978-1-7281-6136-5

- Kun Yue, Jiahui Wang, Xinbai Li, Kuang Hu:

Representation-Based Completion of Knowledge Graph with Open-World Data. 1-8 - Xingzhe Li, Changbao Yang, Zhiguo Meng, Haobin Zhang:

Research on Alteration Information Extraction Based on Sentinel-2A Satellite Data : Taking the Beiya Gold Mine as an example. 9-14 - Xiaojian Xu, Charlie Shay:

Optimal Training Data Selection in Active Learning for Discrimination and Classification. 15-19 - Jianli Xiao, Hongyu Wang:

Traffic Index Cloud Maps for Traffic Flow Analysis with Big Traffic Data. 20-23 - Lijing Niu, Chenhao Yang, Yongxing Du, Ling Qin, Baoshan Li:

Cattle Disease Auxiliary Diagnosis and Treatment System Based on Data Analysis and Mining. 24-27 - Fahimeh Nezhadalinaei, Lei Zhang, Reza Ghaemi, Faezeh Jamshidi:

Data Classification and Weighted Evidence Accumulation to Detect Relevant Pathology. 28-34 - Kechang Qian, Youchen Fan, Dapeng Xiong, Jie Qiang:

A Fusion Method of Multivariate Measurement Data Based on Principal Component Estimation. 35-39 - Jayshree Ghorpade

, Balwant A. Sonkamble:
Predictive Analysis of Heterogeneous Data - Techniques & Tools. 40-44 - Yiran Liu, Wanjiang Han, Xiaoxiang Wang, Qi Li:

Oversampling Algorithm Based on Spatial Distribution of Data Sets for Imbalance Learning. 45-49 - Zeng Rui, Hongli Yin, Jinyan Cai:

Research on the Model of Missing Information Completion of Telecom Customers Based on Factor Analysis and Data Mining. 50-53 - Chen Zhengbo, Liu Xiu, Xing Yafei, Hu Miao, Ju Xiaoming:

Markov Encrypted Data Prefetching Model Based On Attribute Classification. 54-59 - Xiliang Wang, Gansen Zhao, Xinming Wang, Xiaocong Zhou:

Translation Of DDL And DML For Constructing Flexible Schemas In Saas Applications. 60-66 - Zhengwen Zhang, Fengning Wang, Cheng Zhong, Huizhuo Ma:

Grid Terminal Data Security Management Mechanism Based On Master-Slave Blockchain. 67-70 - Jawwad Latif, Pouyan Mehryar

, Lei Hou
, Ali Zulfiqur
:
An Efficient Data Compression Algorithm For Real-Time Monitoring Applications In Healthcare. 71-75 - Yihong Long, Feng Xiong:

Collaborative Generations Of Sm9 Private Key And Digital Signature Using Homomorphic Encryption. 76-81 - Xingchuan Liu, Lin Han, Jiang Zhu, Zhiwei Xu:

Fast Inverse-Free Generalized Sparse Bayesian Iearning Algorithm. 82-86 - Xi Qian, Jiufen Liu, Chunxiang Gu, Yonghui Zheng:

An Improved BKW Algorithm For LWE With Binary Uniform Errors. 87-92 - Guodong Li, Qiu Zhang, Rongrong Zheng, Chenhui Wang:

A Fault Analysis Method Based on Text Clustering. 93-98 - Yi Sun, YinXiao Liu, ZhongYao Wang, BaoLong Niu:

Automating Multi-element Subspace Exploration via Reinforcement Learning. 99-103 - Qinghua Li, Hailong Ma, Zhao Zhang, Chao Feng:

An Effective Nuclear Extraction Mask Method for SVM Classification. 104-108 - Patcharanikarn Pongthanoo, Wararat Songpan

:
Feature Selection and Reduction Based on SMOTE and Information Gain for Sentiment Mining. 109-114 - Thomas Gabor, Sebastian Zielinski, Christoph Roch, Sebastian Feld, Claudia Linnhoff-Popien:

The U Q Platform: A U nifed Approach To Q uantum Annealing. 115-119 - Qing-Dao-Er-Ji Ren, Ying Qiu, Tiancheng Li:

Application of Convolution Neural Network Based on Transfer Learning in Sandstorm Prediction in Inner Mongolia. 120-124 - Baoyou Zheng, Zhiping Wang:

PATS: A New Neural Network Activation Function with Parameter. 125-129 - Ziqian Jia, Xingjun Wang, Xiaoqing Zhang, Mingkai Xu:

Automatic Arousal Detection Using Multi-model Deep Neural Network. 130-133 - Wei Cheng, Qiyue Yin, Junge Zhang:

Opponent Strategy Recognition In Real Time Strategy Game Using Deep Feature Fusion Neural Network. 134-137 - YongJian Bao, Hao Yang, Zhongliang Yang, Sheng Liu, Yongfeng Huang

:
Text Steganalysis with Attentional L STM-CNN. 138-142 - Junchao Dong, Feijuan He, Yunchuan Guo, Huibing Zhang:

A Commodity Review Sentiment Analysis Based on BERT-CNN Model. 143-147 - Atchara Mahaweerawa, Chatree Nilnumpetch, Pawalai Kraipeerapun:

Applying Stacked Generalization with the Difference of Truth and Falsity Data to Predict Student's Performance. 148-152 - Yang Zheng, Yin Chunlin, Fang Zhengyun, Zhao Na:

Trust Chain Model and Credibility Analysis in Software Systems. 153-156 - Li Wei, Wang Yong, Hou Huijuan, Xiaoqi Zhao:

Software Quality Evaluation Model of Smart Electricity Meters Based on CMMI. 157-161 - Yanwei Wu, Ru Wang, Xiaohua Xu:

A Certificate Pin BGP Protocol: CP-BGP. 162-166 - Zhibin Guan, Xiaomeng Wang, Wei Xin, Jiajie Wang, Li Zhang:

A Survey on Deep Learning-Based Source Code Defect Analysis. 167-171 - Nabil Almashfi, Lunjin Lu:

Code Smell Detection Tool for Java Script Programs. 172-176 - Sayed Ehsanullah Ahmady, Osamu Uchida:

Telegram-Based Chatbot Application for Foreign People in Japan to Share Disaster-Related Information in Real-Time. 177-181 - Hui Cao, Jian Kang:

Study on Improvement of Recommendation Algorithm Based on Emotional Polarity Classification. 182-186 - Sun Lei:

The Reconstruction of the Historical Moving Path for Certain Lost Agent in One Multi-mobile Intelligence Agent Group. 187-190 - Hitendra Shankarrao Khairnar, Balwant A. Sonkamble:

Aggregated Time Series based Vehicular Traffic Path Recommendation. 191-195 - Lei Sun, Guizhen Wang, Zhiqiang Zhao:

Synchronization Voting Method in Reconstruction of Historical Moving Path for Certain Lost Agent in One Multi-mobile Intelligence Agent Group. 196-200 - Yunjie Fang, Jingcheng Ye, Haoyu Wang:

Realization of Intelligent Invigilation System Based on Adaptive Threshold. 201-205 - Yumeng Zhen, Peng Cao, Liuping Feng, Fangfang Chen:

Research on Pseudo-Random Noise Information Identification Technology of Printed Anti-Counterfeiting Image Based on Deep Learning. 206-209 - Guodong Li, Jinyi Sun, Xin Guo:

An ICT System Fault Analysis Technology Based on Text Classification and Image Recognition. 210-214 - Songchenchen Gong, El-Bay Bourennane

, Junyu Gao:
Multi-feature Counting of Dense Crowd Image Based on Multi-column Convolutional Neural Network. 215-219 - Yiwen Ou, Zhiming Cai

, Jian Lu, Jian Dong, Yufeng Ling:
Evaluation of Image Feature Detection and Matching Algorithms. 220-224 - Chengli Hou:

A study on IMU-Based Human Activity Recognition Using Deep Learning and Traditional Machine Learning. 225-234 - Xiaolei Zhao, Yang Yi, Zemin Qiu, Qingqing Zeng:

Feature Retrieving for Human Action Recognition by Mixed Scale Deep Feature Combined with Attention Model. 235-239 - Huangqiang Fang, Yulin He, Wanyang Xu, Yanyan Xu, Dengfeng Ke, Kaile Su

:
A Generalized Denoising Method with an Optimized Loss Function for Automated Bird Sound Recognition. 240-245 - Chunlan Jiao, Jianbin Liu:

Research on Procedure Pattern Recognition Method Based on Conditional Constraints. 246-250 - Chen Chen, Ping Lu, Siqi Wang, Zijie Li:

PoseNet Based Acupoint Recognition of Blind Massage Robot. 251-255 - Shinnosuke Kaida, Pornprom Kiawjak, Kousuke Matsushima:

Behavior Prediction Using 3D Box Estimation in Road Environment. 256-260 - PengPeng Jiang, Kun Zhang, Peijian Zhang, Ping Lu:

Batch Target Recognition Count under Complex Conditions Based on Att-Unet. 261-265 - Jin Wei, Chen Ying:

Aggregative Adversarial Network for Still-to-Video Face Recognition. 266-270 - Liping Liu, Guangli Wu, Zhilong Yang:

Research on Terror Video Identification Technology Based on Multi-instance Learning. 271-276 - Guimei Qi, Li Du, Min Zhi, Qing Yong:

Driving State Recognition for Ego-central Driving Videos. 277-280 - Guangli Wu, Leiting Li, Zhenzhou Guo, Chengxiang Wang, Yanpeng Yao:

Video Summarization Based on ListNet Scoring Mechanism. 281-285 - Hang Cao, Xiaowen Liu, Yida Wang, Yuting Li, Weimin Lei:

Enhanced Down/Up-Sampling-Based Video Coding Using the Residual Compensation. 286-290 - Wei Wang, Jianhua Chen:

Hybrid Side Information Generation Algorithm Based on Probability Fusion for Distributed Video Coding. 291-295 - Hao Li, Weimin Lei, Wei Zhang:

QEVC: Quality Enhancement-Oriented Video Coding. 296-300 - Tingting Lu, Lei Zhang:

Analysis and Application Based on GTF Infrared and Visible Image Fusion. 301-308 - Dongyang Li, Guiying Tang, Li Zhao, Xiaoqin Zhang, Xiuzi Ye:

Single I mage Haze Removal Based on Concentration Scale Prior. 309-313 - Huazhi Dong, Yushan Qian, Linlin Wang, Pei Lu:

The Application of Image Style Transformation Based on GAN in the Intelligent Mobile Terminal. 314-318 - Kai-Xuan Bao, Qi-Pei Qian, Ya-Xuan Yang:

Micro Distortion Image Compression Based on Huffman Encoding. 319-323 - Qiang Zhou, Chaobang Gao, Wen Yang, Yudie Zhong:

A New Fractional Differential Mask Based on Interpolation Operation and Its Application in Image Enhancement. 324-328 - Wen Qian, Chao Zhou, Dengyin Zhang:

CIASM-Net: A Novel Convolutional Neural Network for Dehazing Image. 329-333 - Haishan Zhang, Xiaonan Liu:

Cascading Framework for Multi-level Image Quality Evaluation. 334-337 - JunHong Fu, Kun Zhang, Peijian Zhang:

Poorly Differentiated Colorectal Gland Segmentation Approach Based on Internal and External Stress in Histology Images. 338-342 - Zheng-Ming Gao

, Juan Zhao, Su-Ruo Li, Ru-Rong Hu:
The Improved Equilibrium Optimization Algorithm with Tent Map. 343-346 - Yunchao Zhang, Ning Xu, Huiming Chen, Wong Hing Lam, Xin Zhang, Tian Qiu:

A Robust and High-performance White Blood Cell Segmentation Algorithm. 347-351 - Juan Zhao, Zheng-Ming Gao

:
The Improved Equilibrium Optimization Algorithm with Levy Flight. 352-355 - Yanwen Wu, Lei Zhang:

Spatio-Temporal Fish-Eye Image Processing Based on Neural Network. 356-362 - Xuhao Jiang, Yifei Xu, Pingping Wei, Zhuming Zhou:

CT Image Super Resolution Based On Improved SRGAN. 363-367 - Tang Sisi, Yaping Wan:

Finding Multiple Variables Causal Dispositions In Images. 368-372 - Un-Sook Choi, Sung Jin Cho, Sung Won Kang:

High Speed Color Image Encryption Using Pixel Shuffling With 1-D MLCA. 373-377 - Yujie Bai, Shuang Yang, Ying Wu, Yongcan Chen, Shiqi Pan, Yansong Deng

:
Expansible Surface Waste Cleaning Robot. 378-383 - Rui Li, Yongfu Zhang, Lihui Peng, Xinghe Liao:

An Image Reconstruction For Electrical Capacitance Tomography Using Parametric Level Set. 384-390 - Mingwan Zhu, Linlin Zhu

, Yu Han, Xiaoqi Xi, Lei Li, Bin Yan:
Geometric Artifact Evaluation of X-ray Computed Tomography Images Based on Convolutional Neural Network. 391-394 - Guoqing Deng, Yangguang Zhao, Long Zhang, Zhigang Li, Yong Liu, Yi Zhang, Bin Li:

Image Classification and Detection of Cigarette Combustion Cone Based on Inception Resnet V2. 395-399 - Zijie Li, Kun Zhang, Jiangguo Wu, Ping Lu:

External Thread Measurement Based on ResUnet and HMM. 400-403 - Jiming Sa, Zhihao Li, Qijun Yang, Xuan Chen:

Packaging Defect Detection System Based on Machine Vision and Deep Learning. 404-408 - Ziyue Liu, Tomoya Chihara, Joo Kooi Tan:

Ego-Posture Estimation for a Pedestrian Using a Monocular Wearable Camera. 409-412 - Jiandong Cui, Andrew Beng Jin Teoh:

Deep Index-of-Maximum Hashing for Face Template Protection. 413-418 - Yang Liu, Osamu Uchida, Keisuke Utsu:

A Proposal on Disaster Information and Rescue Request Sharing Application Using Sina Weibo. 419-423 - Qing Li, Yonghui Ju, Chang Zhao:

Classification of Discrete Sequential Protocol Messages Based on LSTM Network and Transfer Learning. 424-430 - Takuya Kondo, Osamu Uchida:

Real-Time Disaster Information Providing System for Inducing Risk Perception. 431-435 - Taoyong Li, Yongxiang Liu, Xiaohong Diao, Linru Jiang, Jing Zhang:

Research on Distributed New Energy Information Interconnection Mode Based on Blockchain Consensus Mechanism. 436-441 - Hiroya Yamada, Yoshitaka Kajita, Sachi Tajima, Keisuke Utsu, Osamu Uchida, Yuji Murakami:

Effects and Issues of the Disaster Information Tweeting and Mapping System for Residents. 442-446 - Chao Lu, Shaofu Lin, Xiliang Liu, Hui Shi:

Telecom Fraud Identification Based on ADASYN and Random Forest. 447-452 - Meelis Kitsing

:
Scenarios for Digital Platform Ecosystems. 453-457 - Azin Moradbeikie, Kamal Jamshidi, Ali Bohlooli

, Jordi Garcia
, Xavi Masip-Bruin:
A Fog Based Approach for Hazards Differentiation in an IIoT Scenario. 458-462 - Run Wang, Shudong Shi:

Security Analysis of Home Agent Time-Stamped Binding Update Based on CS Logic. 463-466 - Zhe Sun:

A Security Reinforcement Method for Intranet Computer Terminal. 467-471 - Xin Jiang, Fan Yang, Yuhan Dong

:
Impact of HPA Nonlinearity on Artificial Noise Assisted Secure Communication Systems. 472-476 - Abdallah Tubaishat, Mariam Al Jouhi:

Building a Security Framework for Smart Cities: A Case Study from UAE. 477-481 - Feng Liu, Xin Wang:

Implementation of Distributed Crawler System Based on Spark for Massive Data Mining. 482-485 - Yunhe Cui, Qing Qian:

MIND: Message Classification Based Controller Scheduling Method for Resisting DDoS Attack in Software-Defined Networking. 486-490 - Md Delwar Hossain

, Hideya Ochiai, Doudou Fall, Youki Kadobayashi:
SSH and FTP brute-force Attacks Detection in Computer Networks: LSTM and Machine Learning Approaches. 491-497 - Chenguang Wu, Jizhao Lu, Wencui Li, Huiping Meng, Yinlin Ren:

Master-slave Blockchain Based Cross-domain Trust Access Mechanism for UPIOT. 498-503 - Jingcheng Ye, Yunjie Fang, Xingda Bao:

Fast Detection Model of Untrusted Nodes in Fog Computing Based on CGAN. 504-509 - Rongyong Zhao, Yan Wang, Qiong Liu, Daheng Dong, Cuiling Li:

Knowledge Acquisition Model for Stability Situation Judgement Used in Crowd Evacuation. 510-514 - Wang Jun-Feng, Lin Chuan-Wen, Hu Xue-You, Liu Gang:

Three-Dimensional Simulation of Nd: YAG Crystal Growth Based on Computational Fluid Dynamics Analysis Software. 515-519 - Changdao Du, Iman Firmansyah, Yoshiki Yamaguchi:

High-Performance Computation of LGCA Fluid Dynamics on an FPGA-Based Platform. 520-525 - Xiaoyu Huang, Weiyi Xie, Xiaomin Xu, Delphine Ya-Chu Chan:

Usage Intention of Internet of Vehicles Based on CAB Model: The Moderating Effect of Reference Groups. 526-532 - Peng Pengfei, Li Yating, Zhou Linru:

Research on Interactive Collaborative Decision-Making Method of Equipment Support Task Planning. 533-537 - Dunnan Liu, Lingxiang Wang, Mingguang Liu, Mi Liu, Junhui Li, Haiming Zhou:

Research on Operation Strategy of Power Market Subject under The Background of Global Energy Interconnection. 538-542 - Chunhua Chen, Fengsong Zhou, Bin Chu, Xiangqiang Zeng, Min-si Ao:

A Novel Evaluation Approach for the Elevation Datum Product. 543-546 - Junhui Li, Haiming Zhou, Xiao Han, Jing Zhang, Rong Yu, Yujie Ma:

Research on Multi-energy Interaction Mode and Value System under the Background of Energy Internet. 547-551 - Huayan Pei, Guanghui Yan, Huanmin Wang:

Monetary Punishment Promotes Cooperation in Complex Networks. 552-556 - Toshiya Kawato, Masayuki Higashino, Kenichi Takahashi, Takao Kawamura:

Proposal of Distributed e-Learning System Using Idle Resources. 557-561 - Yanhua Wu, Zhiqiang Ma, Zhengyang Zhao, Zhibo Cheng:

Dual Preference Matrix Collaborative Filtering Algorithm and Its Application in Railway B2BE-commerce Platform. 562-569 - Quanyv Wang, Panpan Fu, Shouzhen Zhang:

A Comparison of Concatenated Polar Codes with Different Interleaving and Decoding Schemes. 570-574 - Juhua Wang, Suchun Yuan, Yuan Zhou, Guohua Zhang:

Codec Implementation of QC-LDPC Code in CCSDS Near-Earth Standard. 575-579 - Xinyue Wang, Tao Peng, Peiliang Zuo, Xing Wang:

Spectrum Prediction Method for ISM Bands Based on LSTM. 580-584 - Shuangyin Ren

, Gaigai Tang:
A Reactive Traffic Flow Estimation in Software Defined Networks. 585-588 - Wei Hu, Suiyan Geng, Xiongwen Zhao:

Mm-Wave 60 GHz Channel Fading Effects Analysis Based on RBF Neural Network. 589-593 - Lerson Kirasamuthranon, Paramote Wardkein, Jeerasuda Koseeyaporn:

Narrow Bandwidth PLL Based Multiplier Phase Detector for PSK Modulator. 594-598 - Yinhang Zhang, Huiyuan Yang:

High Speed MLSD Equalization for Serial Link. 599-603 - Xinyuan Dong, Wen Chen:

Research and Implementation of Dual-Frequency Precise Point Position Based on U-blox F9P. 604-608 - Jietai Wang, Xiaoniu Yang, Zhenxing Luo:

An Indoor Wi-Fi Positioning Approach optimized by Virtual Node. 609-612 - Tan Wang, Hui Xiong, Hong Ding, Linhua Zheng:

Automatic Setup Method for Anchor Coordinate in Asynchronous Localization System. 613-617 - Yonglin Ju

, Zhiwen Liu, Yougen Xu:
A Nyström-Based Method for Incoherently Distributed Source Localization. 618-622 - Shuang Cao, Yulong Wang, Xiaoxiang Wang, Qi Li:

A Rapid Assessment Method for Seismic Intensity Area and Affecting Field Direction Using Mobile Phone Base Stations. 623-627 - Lu Wang

, Jingwen Zhang, Ce Sun, Hanxiao Yu, Haoyu Wang:
Adaptive Determination of PMI Feedback Period for FDD PDSCH in 5G eMBB Scenario. 628-634 - Jing Yang, Hui Li:

Deep Learning Based Detection and Channel Tracking for MIMO Systems. 635-639 - Yachang Hou, Xiangning Chen, Kaiyan Du:

Comparison and Analysis of SFO Estimation Methods Based on OFDM. 640-644 - Haiying Yuan, Tong Zheng, Kai Zhang, Yichen Wang:

An Efficient Schedule Synthesis Method based on Constraint Programming Technology for Time-Triggered Ethernet. 645-649 - Si Thu Aung, Thandar Thein:

Internet Traffic Categories Demand Prediction to Support Dynamic QoS. 650-654 - Rong Chen, Xin Hu, Xiuhua Li, Weidong Wang:

Optimum Power Allocation based on Traffic Matching Service for Multi-beam Satellite System. 655-659 - Hang Liu, Bo Wang, Daizhi Lang, Rongqiang Huang:

Processing Optical Fiber Sensing Signals with Improved Compressed Sensing Algorithm. 660-664 - Qi Li, Aihua Zhang, Jianjun Li, Bing Ning:

Soft Decision Signal Detection of MIMO System Based on Deep Neural Network. 665-669 - Alok Yadav, Chaiwat Nuthong:

Traffic Signal Timings optimization Based on Genetic Algorithm and Gradient Descent. 670-674 - Yunjie Fang, Qiaodan Hou, Weihao Li:

A Learning State Monitor Based on the Entropy of EEG Signal Samples. 675-679 - Qing Qian, Yunhe Cui:

A Fragile Watermarking Algorithm for Speech Authentication by Modifying Least Significant Digits. 680-684 - Tolulope Bamidele Ijitona

, Hong Yue
, John J. Soraghan, Anja Lowit
:
Improved Silence-Unvoiced-Voiced (SUV) Segmentation for Dysarthric Speech Signals using Linear Prediction Error Variance. 685-690 - Jun Lu, Xiaowei Qin, Xiaodong Xu, Yingke Lei:

Identification of Multiple-Antenna Emitters Using Power Amplifier Nonlinearity. 691-696 - Qin Mingnuan, Zhang Yao, Yan Yalong, Liang Zhen:

The Resource Dynamic Recombination and Its Technology Development of Space TT&C Equipment. 697-702 - Huaning Wu, Hengfeng Wang

, Hua Qin, Xu Xie:
A Gain-improved Broadband Twin-Whip Antenna for High Frequency. 703-707 - Shida Shao, Jixiang Wan:

A WideBand Circularly Polarized Printed Crossed-Dipose Antenna. 708-711 - Iftikhar Ahmad, Houjun Sun, Yi Zhang, Qasim Ali:

Low Profile, Compact Size Frequency Reconfigurable Antenna for 5G mm-Wave Wireless Communication. 712-716 - Zukun Lu, Feiqiang Chen, Yuchen Xie, Zhe Liu:

Impact on Anti-jamming Performance of GNSS Signal Bandwidth under Channel Mismatch Used Antenna Arrays. 717-722 - Iftikhar Ahmad, Houjun Sun, Yi Zhang, Abdul Samad:

High Gain Rectangular Slot Microstrip Patch Antenna for 5G mm-Wave Wireless Communication. 723-727 - Jialing Chen, Mingxi Yin, Xiaohui Duan, Bingli Jiao:

Q -Learning Based Selection Strategies for Load Balance and Energy Balance in Heterogeneous Networks. 728-732 - Jianjun Yang, Juan Guo, Ju Shen, Mingyuan Yan:

Landmark Based Circle Routing in Wireless Sensor Networks. 733-737 - Hua Zhang, Jiancun Zuo:

Optimization of Uplink Power Control Parameters in Wireless Cellular Networks. 738-741 - Honggao Lin, Li Li:

Efficiency Analysis and Optimization for Multiple-Receiver Magnetic Coupling Resonant Wireless Power Transfer System. 742-747 - Yunkai Liu, Yijian Pei:

Design and Implementation of Bionic Manipulator System with Wireless Control. 748-751 - Hui Wang, Li Ma, Hongying Bai:

A Three-tier Scheme for Sybil Attack Detection in Wireless Sensor Networks. 752-756 - Jiude Zhu, Yijian Pei, Yunkai Liu, Donglin Gao:

Design and Implementation of Dual-Arm Mobile Robot System Based on Wireless Transmission. 757-760 - Zheng Su, Mukai Hao, Qiang Zhang, Bo Chai, Ting Zhao:

Automatic Knowledge Graph Construction Based on Relational Data of Power Terminal Equipment. 761-765 - Bowei Zhang, Weinong wu, Xin Hu, Yingzhao Xie, Quanyong Fu, Jian Wang, Jinfu Li

:
Joint Resource Allocation and Power Control Algorithm for Internet of Things based on Wireless Power Transfer and Edge Computing. 766-770 - Somaiya Khan

, Athar Shahzad Fazal
, Bo Li, Bilal Hassan
:
Self-Organized Network Management of UAV Based Internet of Flying Things. 771-775 - Bernardo Santos, Bruno Dzogovic

, Boning Feng, Niels Jacot, Van Thuan Do, Thanh Van Do:
Improving Cellular IoT Security with Identity Federation and Anomaly Detection. 776-780 - Xinglin Gong, Erwu Liu

, Rui Wang:
Blockchain-Based IoT Application Using Smart Contracts: Case Study of M2M Autonomous Trading. 781-785 - Farhan Amin

, Gyu Sang Choi:
Social Pal: A Combined Platform for Internet of Things and Social Networks. 786-790 - Wenjie Yang, Fang Deng:

A Service Selection Method Based on QoS in IOT. 791-795 - Thi Minh Chau Nguyen, Doan Hoang:

Software-Defined Virtual Sensors for Provisioning IoT Services on Demand. 796-802 - Abdikarim A. Dahir, Zhihua Yu:

Dispersion Compensation by Using FBG and Low Pass Gaussian Filter. 803-806 - Chunhui Duan, Lin Tan, Wenfeng Qi:

Remarks on Mixture and Yoyo Distinguishers for Reduced-Round AES. 807-815 - Yongxue Wang, Rong Song, Sunan Wang, Weiqiang Wu:

Study of the Prototype Filter and Bit Error Rate for the Filter Bank Multi-carrier System. 816-820 - Abdul Samad, Weidong Hu, Waseem Shahzad, Hamid Raza:

Design of DS-CSRR Based Microwave Sensor for Efficient Measurement of Dielectric Constant of Materials. 821-824 - Xiaowen Yang, Xiaohui Zhang, Zhaoying Wang, Chunhua Li, Xingming Yang, Lei Sang:

Design of a Circular Ring Frequency Selective Surface at Tri-band. 825-829 - Pengxin Guan, Hongkang Yu, Hongfei Zhu

, Yuping Zhao:
A Novel Residual Carrier Frequency Offset Estimation Approach for LoRa Systems. 830-834 - Wenhui Xiao, Liang Bo, Ramanpreet Kaur:

Design of LED Lighting System Based on Power line Communication. 835-839 - Hamid Dhanyal, Weidong Hu, Hassan Feroz, Hamza Nawaz, Abdul Samad, Umar Farooq:

Miniaturized High-Efficiency Pulsed-Power Amplifier for Surveillance and Tracking Radar. 840-843 - Junjie Wang, Yunhao Jiang, Mingyang Li, Lingyun Fan, Chunlan Xie:

Adaptive Delay Matching Method in Radiated Interference Cancellation System. 844-847 - Yang Gong, Chen Cui:

Offline Estimation and Online Update Algorithm of Clutter Intensity in Multi-target Tracking. 848-853 - HongYing Yan, Jizheng Chu:

RFID Positioning Algorithm Based on BA Optimization. 854-858 - Sisamouth Hongvanthong:

Novel Four-Layered Software Defined 5G Architecture for AI-based Load Balancing and QoS Provisioning. 859-863 - Bruno Dzogovic

, Van Thuan Do, Bernardo Santos, Niels Jacot, Boning Feng, Thanh Van Do:
Secure Healthcare: 5G-enabled Network Slicing for Elderly Care. 864-868 - Liyuan Zhao, Li Li:

Reinforcement Learning for Resource Mapping in 5G Network Slicing. 869-873 - Fang Li, Jun Xiong, Xiaodi Zhao, Haitao Zhao, Xuanhan Zhou:

An Improved FCME Algorithm Based on Differential Spectrum Envelope for Interference Detection in Satellite Communication Systems. 874-879 - Haofei Xie, Xingwei Yuan, Zhejian Jia, Zhihui Wang:

Spreading Factor Allocation for Large-Scale Deployment In LoRaWAN Network. 880-885 - Jun Lu, Huagang Xiong, Feng He, Zhong Zheng:

Hierarchical Message Scheduling Modeling in Heterogeneous Time-Triggered Ethernet Using Software Defined Network. 886-890 - S. M. Tasmeeh Ahsan, Fariha Jahan, Nawshin Mannan Proma:

Inspection of Picocell's Performance using Different Models in Different Regions. 891-894 - Yuan Gao, Yiqing Liu:

Integrated Circuit IO Characteristic Intelligent System. 895-899 - Siying Wu, Huilin Zhou:

Research on Scatter Imaging Method for Electromagnetic Field Inverse Problem Based on Sparse Constraints. 900-904 - Jianwei Zhang, Tao Han, Yajun Li, Jinghu Li:

Real-Time Redundant Scrubbing (RRS) System for Radiation Protection on SRAM-Based FPGA. 905-911 - YaoYuan Tian, Chengbin Chen, Kaixiong Su, Jiade Yuan, JianChao Zhang:

Design of Photovoltaic Array Fault Online Evaluation System. 912-916 - Toshinori Sato

, Tomoaki Ukezono:
A Dynamically Configurable Approximate Array Multiplier with Exact Mode. 917-921 - Chao Huo, Di Mu:

Key Technology and Equipment Development of Multi-mode Integrated Access Terminal for Regional Energy Interconnection. 922-926 - Qi-Pei Qian, Kai-Xuan Bao, Kai Zhao, Yin Lu:

Research on the Impact of Open Residential Roads on Traffic Capability. 927-931 - Takuho Matsuo, Masafumi Kosugi, Osamu Uchida:

Improvement of Disaster Situation Visualization System Using Truck-mounted Camera. 932-935 - Xinyan Wang, Feng Gao, Jing Zhang, Xiao Feng, Xing Hu:

Cross-domain Authentication Mechanism for Power Terminals Based on Blockchain and Credibility Evaluation. 936-940 - Siqi Wang, Chen Chen:

Short-Term Wind Power Prediction Based on DBSCAN Clustering and Support Vector Machine Regression. 941-945 - Sebastian Feld, Christoph Roch, Thomas Gabor, Xiao-Ting Michelle To, Claudia Linnhoff-Popien:

The Dynamic Time Warping Distance Measure as Q U BO Formulation. 946-950 - Tongjian Yang, Gang Li:

Mathematical Model of Pitch Channel of Multi-rotor Aircraft. 951-955 - Liping Hu, Xiaolong Liang, Jiaqiang Zhang, Dan Huo:

Analysis of the Current Situation of Aviation Swarm Operations. 956-961 - Dangdang Zheng, Bing Han, Geng Liu, Ruiting Tong:

Automatic Modeling System for Skeleton Model of Aircraft with Complex Surfaces. 962-966 - Ning Zhang, Shaobiao Xie, Huanlin Luo, Xinzhong Zhu, Naiming Qi:

Airport Aircraft Target Detection Based on Space Spectrum Feature Fusion. 967-971 - Yan Chen, Junjie Wang, Ya Zhang, Wanzeng Cai, Yuan Li

:
Multitasking Command and Control System of Equipment Test Based on Virtual Machine Platform. 972-976 - Chen Liang, HanXv Sun, QingXuan Jia, Cao Shaozhong, Zhao Wei, Yu Tao:

A New Kind of Measuring Tooling and Closed-loop Control for Gough-Stewart Parallel Robot. 977-984 - Li Zhang:

Fractal Stable Effect of the External Disturbance on the Generalized Diffusion Limited Aggregation by Backstepping Control Method. 985-988 - Weiwei Miao, Zeng Zeng, Chuanjun Wang, Yueqin Chen, Chunhe Song:

Efficient and Accurate Classification Enabled by a Lightweight CNN. 989-992

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














