Abstract is missing.
- Bisecting K-Means Based Fingerprint Indoor LocalizationYuxing Chen, Wei Liu, Haojie Zhao, Shuling Cao, Shasha Fu, Dingde Jiang. 1-12 [doi]
- MTAPS: Indoor Localization Algorithm Based on Multiple Times APPengyu Huang, Haojie Zhao, Wei Liu, Dingde Jiang. 13-24 [doi]
- Formalizing Model Transformations Within MDEZhi Zhu, Yongling Lei, Qun Li, Yifan Zhu. 25-42 [doi]
- Congestion Control for RTP Media: A Comparison on Simulated EnvironmentSongyang Zhang, Weimin Lei, Wei Zhang 0033, Yunchong Guan. 43-52 [doi]
- Network Traffic Model with Multi-fractal Discrete Wavelet Transform in Power Telecommunication Access NetworksYi Lu, Huan Li, Bin Lu, Yun Zhao, Dongdong Wang, Xiaoli Gong, Xin Wei. 53-62 [doi]
- Smartphone-Based Lifelogging: An Investigation of Data Volume Generation Strength of Smartphone SensorsInayat Khan, Shaukat Ali 0002, Shah Khusro. 63-73 [doi]
- A Relay Station Deployment Algorithm for Smart Grid Based on Delay OptimizationFanbo Meng, Baogang Zhang, Zhihao Zhao, Ang Li, Minlan Jiang. 74-83 [doi]
- A Collection Node Planning Algorithm of Power Wireless Private Network in Smart GridFanbo Meng, Guoqing Liu, Bin Lu, Dongdong Wang, Ling Wang, DongMing Tang, Dingde Jiang. 84-93 [doi]
- A SDN-Based Network Traffic Estimating Algorithm in Power Telecommunication NetworkRenxiang Huang, Huibin Jia, Xing Huang. 94-103 [doi]
- A Routing Algorithm Based on Weighted Graph for Power Distribution NetworkRenxiang Huang, Huibin Jia, Xing Huang. 104-114 [doi]
- An Adaptive Measurement Method for Flow Traffic in Software Defined NetworkingLiuwei Huo, Dingde Jiang, Xiangnan Zhu, Huibin Jia. 115-124 [doi]
- A Linear Regression-Based Prediction Method to Traffic Flow for Low-Power WAN with Smart Electric Power AllocationsBing Liu, Fanbo Meng, Yun Zhao, Xinge Qi, Bin Lu, Kai Yang, Xiao Yan. 125-134 [doi]
- Dynamic Computing Resource Adjustment in Edge Computing Satellite NetworksFeng Wang, Dingde Jiang, Sheng Qi, Chen Qiao, Jiping Xiong. 135-145 [doi]
- A Security Traffic Measurement Approach in SDN-Based Internet of ThingsLiuwei Huo, Dingde Jiang, Hui Qi. 146-156 [doi]
- An Intelligent Relay Node Selection Scheme in Space-Air-Ground Integrated NetworksFeng Wang, Dingde Jiang, Jiang Zhu, Zuoliang Liu. 157-167 [doi]
- An Semi-formal Co-verification Approach for High-Assurance CPSYu Zhang, Mengxing Huang, Wenlong Feng. 168-179 [doi]
- Analyzing on User Behavior and User Experience of Social Network ServicesRong Bao, Lei Chen, Ping Cui. 180-185 [doi]
- ITU TWDM-PON Module for ns-3 Network SimulatorYu Nakayama, Ryoma Yasunaga. 186-195 [doi]
- Research on Implementation Scheme of Power IMS Network Based on NFV ArchitectureXing Huang, Fanbo Meng, Xi Li, Lei Zhang, Xiaoyu Zhu. 196-204 [doi]
- A Data Fusion Algorithm and Simulation Based on TQMMKe Zhang, Zeyang Wang, Huiling Li. 205-217 [doi]
- Design of Low-Power USB Audio System Based on LPM ProtocolHua Ren, Jia Cui, Wen Xie, Chengjun Zhou, Ke Zhang. 218-227 [doi]
- A Hybrid Virtualization Approach to Emulate Heterogeneous Network NodesJunyu Lai, Jiaqi Tian, Dingde Jiang, Jiaming Sun, Ke Zhang. 228-237 [doi]
- A New MCMC Particle Filter Resampling Algorithm Based on Minimizing Sampling VarianceJuan Tian, Dan Li. 238-247 [doi]
- ExploreBP: A Simulation Tool for Mobile Browser Energy OptimizationJin Zhang 0003, Xin Wei, Zhen Liu, Fangxin Liu, Tao Li, Tingjuan Lu, Xiaoli Gong. 248-257 [doi]
- Design and Simulation of a Deterministic Quantum Secure Direct Communication and Authentication Protocol Based on Three-Particle Asymmetric Entangled StateYan-yan Hou, Jian Li 0035, Qinghui Liu, Hengji Li, Xinjie Lv, Xuhong Li, Yu Zhang. 258-266 [doi]
- A Multi-objective Artificial Flora Optimization AlgorithmXuehan Wu, Huaizong Shao, Shafei Wang, Wen-Qin Wang. 267-277 [doi]
- Design and Simulation of a Quantum Key Distribution Protocol Based on Single-Particle and EPR EntanglementLeilei Li, Jian Li, Hengji Li, Chaoyang Li, Yan Zheng, Yuguang Yang. 278-287 [doi]
- A Quantum Key Distribution Protocol Based on the EPR Pairs and Its SimulationJian Li, Hengji Li, Chaoyang Li, Leilei Li, Yanyan Hou, Xiubo Chen, Yuguang Yang. 288-301 [doi]
- An Adaptive Threshold Algorithm for Offline Uyghur Handwritten Text Line SegmentationEliyas Suleyman, Palidan Tuerxun, Kamil Moydin, Askar Hamdulla. 302-312 [doi]
- Channel Equalization Secret Communication Method Based on Time ReversalZhu Jiang, Ding Qiang. 313-325 [doi]
- Research on Energy Efficiency in Wireless Powered Communication Network with User Cooperative RelayGang Feng, Xizhong Qin, Zhenhong Jia, Yongming Li. 326-338 [doi]
- Video Monitoring System Application to Urban Traffic IntersectionJin-ping Sun, Lei Chen, Rong Bao, Dan Li, Dai-Hong Jiang. 339-345 [doi]
- A Test System for Vehicular Voice Cloud ServiceLi Yu, Kailiang Zhang, Jiang Man, Hao Yu, Yuqing Yao, Lei Chen. 346-352 [doi]
- Security Analysis on Gait-Based Biometric Fuzzy Commitment Scheme Using SmartphoneZhang Min. 353-362 [doi]
- Particle Swarm Optimization Algorithm Based on Natural Selection and Simulated Annealing for PID Controller ParametersMinlan Jiang, Ying Wu, Lan Jiang, Fei Li. 363-373 [doi]
- HSS-Iteration-Based Iterative Interpolation of Curves and Surfaces with NTP BasesLiangchen Hu, Huahao Shou, Zhenlei Dai. 374-384 [doi]
- Attention-Based Hybrid Model for Automatic Short Answer ScoringHui Qi, Yue Wang, Jinyu Dai, Jinqing Li, Xiaoqiang Di. 385-394 [doi]
- Performance Evaluation of a Unified IEEE 802.11 DCF Model in NS-3Yachao Yin, Yayu Gao, Xiaojun Hei. 395-406 [doi]
- An Improved Ant Colony-Based Alternate Path Selection Method for Wide-Area Protection System in Optical Communication Network of Power GridHailin Gu, Xing Huang, Li Li, Ruowei Li, Jinghua Yao. 407-415 [doi]
- Parameter Optimization Strategy of Fuzzy Petri Net Utilizing Hybrid GA-SFLA AlgorithmWei Jiang, Kai-qing Zhou, Li-Ping Mo. 416-426 [doi]
- Joint Transmit Power Allocation and Power Splitting for SWIPT System with Time ReversalZuoliang Liu, Shanxue Chen. 427-436 [doi]
- Development of an Effective Method of Tariff Formation for Rural Areas: The Case of Russian FederationJoão Paulo Pereira, Daria Zamotajlova, Elena Popova. 437-447 [doi]
- Study the Preprocessing Effect on RNN Based Online Uyghur Handwriting Word RecognitionWujiahemaiti Simayi, Mayire Ibrayim, Askar Hamdulla. 448-458 [doi]
- Point Target Detection Based on Quantum Genetic Algorithm with Morphological Contrast OperationGuofeng Zhang 0016, Askar Hamdulla. 459-468 [doi]
- Analysis of Phonemes and Tones Confusion Rules Obtained by ASRGulnur Arkin, Askar Hamdulla. 469-476 [doi]
- Network Recovery for Large-Scale Failures in Smart Grid by SimulationHuibin Jia, Hongda Zheng, Yonghe Gai, Dongfang Xu. 477-485 [doi]
- Matrix-Variate Restricted Boltzmann Machine Classification ModelJinghua Li, Pengyu Tian, Dehui Kong, Lichun Wang 0002, Shaofan Wang, Baocai Yin. 486-497 [doi]
- The Adaptive PID Controlling Algorithm Using Asynchronous Advantage Actor-Critic Learning MethodQifeng Sun, Hui Ren, Youxiang Duan, Yanan Yan. 498-507 [doi]
- Network Emulation as a Service (NEaaS): Towards a Cloud-Based Network Emulation PlatformJunyu Lai, Jiaqi Tian, Dingde Jiang, Jiaming Sun, Ke Zhang. 508-517 [doi]
- A Study of RNN Based Online Handwritten Uyghur Word Recognition Using Different Word TranscriptionsWujiahemaiti Simayi, Mayire Ibrayim, Askar Hamdulla. 518-527 [doi]
- Computer Generated Hologram-Based Image Cryptosystem with Multiple Chaotic SystemsChuying Yu, Jianzhong Li. 528-538 [doi]
- Study and Hardware-in-the-Loop Simulation of Flight Mach Control System Based on Fuzzy Control TheoryGan Cui, Huiqiang Zhang. 539-548 [doi]
- Spatial Propagation Measurement and Analysis of Millimeter-Wave Channels at 28 GHzRuonan Zhang, Yang Wang, Changyou Li, Yi Jiang 0005, Bin Li 0017. 549-558 [doi]
- Study and Implementation of Minority Mobile Application Recommendation SoftwareXiaofeng Wang, DongMing Tang, Hui Zheng, Ke Zhang. 559-566 [doi]
- DSWIPT Scheme for Cooperative Transmission in Downlink NOMA SystemKai Yang, Xiao Yan, Qian Wang, Kaiyu Qin, Dingde Jiang. 567-577 [doi]
- Large-Scale Fading Measurement and Comparison for O2I Channels at Three FrequenciesRuonan Zhang, Linyuan Wei, Yi Jiang 0005, Daosen Zhai, Bin Li 0017. 578-587 [doi]
- Simulated Traffic Sign Classification Using Cross-Connected Convolution Neural Networks Based on Compressive Sensing DomainJiping Xiong, Lingfeng Ye, Fei Wang, Tong Ye. 588-597 [doi]
- Comparative Study of Evolutionary Algorithms for Protein-Ligand Docking Problem on the AutoDockZhuoran Liu, Changsheng Zhang, Qidong Zhao, Bin Zhang 0001, Wenjuan Sun. 598-607 [doi]
- Image Mosaic Based on Improved Logarithmic Polar Coordinate Transformation and Ransac AlgorithmDan Li, Lei Chen, Jun Tian, Dai-Hong Jiang, Jin-ping Sun, Bin Ding. 608-614 [doi]
- "Smart Entity" - How to Build DEVS Models from Large Amount of Data and Small Amount of Knowledge?Thierry Antoine-Santoni, Bastien Poggi, Evelyne Vittori, Ho Van Hieux, Marielle Delhom, Antoine Aïello. 615-626 [doi]
- Optimal Scheduling User Number in Massive MIMO with QoS RequirementLei Chen, Lu Zhang. 627-632 [doi]
- An Improved Exhausted-Food-Sources-Identification Mechanism for the Artificial Bee Colony AlgorithmJiaxu Ning, Haitong Zhao, Peng Sun, Yunfei Feng, Tianyu Zhao. 633-642 [doi]
- LSTM Network Based Traffic Flow Prediction for Cellular NetworksShulin Cao, Wei Liu. 643-653 [doi]
- Network Security Situation Prediction Based on Improved WGANJiang Zhu, Tingting Wang. 654-664 [doi]