Abstract is missing.
- Bearings-only passive location mathematical model for UAV cluster based on three pointsXunbo Zhu, Shuangqing Lv, Zhilong He, Zhengguo Yang, Xuefang Li, Jianhong Zhao. 1-5 [doi]
- Towards Radar Emitter Recognition in Changing Environments with Domain GeneralizationHonglin Wu, Xueqiong Li, Long Lan, Liyang Xu, Yuhua Tang. 6-11 [doi]
- Codebook-based digital fountain encoding and decoding methodWeicai Luo, Qi Xi, Jing Wang. 12-16 [doi]
- Research on USBL Positioning Multi-target technology Based on COSTAS Frequency Hopping SignalMinghui Ding, Kai Zhu, Lei Yue, Shuang Liu, Yuhong Shi, Shuaishuai Yang, Chao Li. 17-22 [doi]
- Joint Transmit and Passive Beamforming Design for IRS-assisted ISAC System Based on Cramér-Rao Bound OptimizationZiang Fei, Guanghua Lu. 23-28 [doi]
- A Review of Intrusion Detection Research Based on Deep LearningMiaolei Deng, Yupei Kan, Haihang Xu, Chuanchuan Sun. 29-35 [doi]
- Design of Short Wave Anti Fading Monitoring System Based on Large Aperture Polarization Sensitive ArrayQinghao Zhu, Fei Wen, Xinyu Li. 36-41 [doi]
- Federated Learning with Sample-Level Class Balancing AggregationTong Liu, Wei Yu 0001, Jiasheng Chen, Lun Xin, Fei Yu, Yinfei Xu. 42-46 [doi]
- Acceleration Signal Integration Method Based on Variational Mode DecompositionXiaoyang Peng, Fangjie Yu, Yongcheng Gu, Jianguo Zhu, Muyu Zhang. 47-53 [doi]
- Exploration of 5G wireless network coverage scheme in cement factoryYuangang Lu, Ke Ma, Maohui Peng, Shuai Zou. 54-59 [doi]
- Study on Pulse Polarity Self-Adapting of Digital MCAHuanyin Zhou, Feiyan Xu, Feifei Wu, Yanhui Xie, Weiqi Huang, Jiewei Hu. 60-65 [doi]
- A method for flexible transmission based on FlexE granularityFlexE granularity for flexible transmissionBased on 1G, 1.25G and 5G granularity allocationLirong Zhang, Jingxuan Ma. 66-71 [doi]
- Research on voice recognition and control technology for the elderly at homeHailong Xu. 72-77 [doi]
- Design of a novel ultra-wideband antenna with six notchesYanping Hu. 78-82 [doi]
- Radar Working Mode Recognition Algorithm Based on Recurrent Neural NetworksYihai Hu, Yongsheng Xiao, Ke Zhao, Lizhen Huang. 83-88 [doi]
- Measurement of dielectric constant based on time-domain ground-penetrating radar curve imaging algorithmYan Chen, Li Wang, Jiuxun Sun. 89-92 [doi]
- A new Energy-Saving Sector Clustering Data Aggregation Method in Wireless Sensor Networks: Energy saving sector clustering data aggregation methodShuhang Chen, Feng Xu, Kaiming Su. 93-97 [doi]
- YOLOGP: A YOLOv5-Based Lightweight Network for Efficient Vehicle Detection in Autonomous Driving ScenariosJiansong Wang, Wei Lin. 98-105 [doi]
- Distributed Multi-kernel Learning Based on Gaussian Mixture Model with Missing DataSicong Chen, Ying Liu 0020. 106-111 [doi]
- Research on channel quantitation and key negotiation technology in key generation based on satellite-ground communicationYongjie Li 0004, Huanpeng Hou, Jizhao Lu, Wenge Wang. 112-117 [doi]
- Multi-extended Targets PHD Filtering Tracking Algorithm with Unknown Measurement Noise DistributionHui Zhang, Xiaoming Liu, Yuqing Cheng. 118-123 [doi]
- Energy-Balancing Data Acquisition Strategy by Employing Graph Signal Sampling-set Rotation Method for Edge Computing Enabled Industrial Internet of ThingsLishan Yang, Chenglin Bai, Hengying Xu, Yining Zhang, Guizhen Wang. 124-129 [doi]
- A Robust Fast Dominant Mode Rejection AlgorithmDaqi Zheng, Xian Zhu. 130-135 [doi]
- Exploring Dynamic Class Instantiation and Imagick Extension Vulnerabilities in PHP: Insights and Techniques in Securing PHP Applications - A Comprehensive Guide to Dynamic Class Instantiation and Imagick Extension VulnerabilitiesXurui Li. 136-140 [doi]
- Analysis and Research of Communication Abnormalities of Remote Data CollectorsLi Ai, Jingtao Guo, Jin Ji. 141-145 [doi]
- Research on Badminton Target Positioning and Tracking Technology Based on Wireless Sensor NetworkYunwei Li. 146-151 [doi]
- Design and analysis of transmission relay protection signal transmission for fiber optic communication networksQian Wu, Yangfan Li, Zhifeng Tian. 152-156 [doi]
- SDWSN Routing Optimization Algorithm Based on Adaptive Factors and Gaussian Perturbation Particle Swarm AlgorithmWeixing Chen, Jing Zhao, Xinyi Li, Xiaolei Fan. 157-161 [doi]
- Facial Expression Recognition Based on Improved VGG16 Convolutional Neural NetworkShouzhen Zhang, Fei Jiang, Mingdong Li. 162-168 [doi]
- Research and Application of Network Security Situational Awareness Technology Based on Ridge RegressionXiaolong Li, Kongpeng Wei, Hongbin Gu, Bo Liu. 169-173 [doi]
- PCIE-Based Shared Memory Technology between BMC and CPUJianxin Liu, Fuge Wang, Qingkun Zhuo, Xue Yang. 174-179 [doi]
- An Improved Real-Time Multiple Object Tracking Algorithm Based on YOLOv8Xiao Peng, Chaobing Huang. 180-184 [doi]
- Numerical Modeling and Signature Analysis on Radiated Noise properties of Underwater PropulsorFuqiang Ma, Lixun Xie, Fengming Wu. 185-191 [doi]
- Topology Maintenance Optimization Algorithm Based on Deep Reinforcement Learning in High Dynamic Flying Ad-Hoc NetworksLiheng Li, Xiulin Qiu, Bo Song, Yaqi Ke, Yuwang Yang. 192-198 [doi]
- A beam domain cluster targets super-resolution DOA estimation methodQingchen Zhou, Xianzhao Shen, Mingming Xu. 199-203 [doi]
- Deep learning for multi-data fusion in gravitational wave searchChunliang Ma, Jun Ye, Wei Wang 0151, Guansheng He. 204-209 [doi]
- Integration of Singular Spectrum Analysis and Adaptive Neuro-FuzzyInference System for BDS-3 Clock Bias PredictionChenglin Cai, Mingjie Wu, Kaihui Lv. 210-214 [doi]
- Design of Lora Communication System Based on Speech Recognition in Emergency Rescue EnvironmentLi Jia. 215-219 [doi]
- Analysis and Experiment of Radar Position ClutterYuhao Deng, Lin Li. 220-223 [doi]
- Research on human pose estimation technique based on depth-separable convolutionYinwei Jiang, Hongfang Lv, Ran Ren. 224-229 [doi]
- Uav track planning based on Chaotic Golden Jackal Optimization algorithmRan Ren, Hongfang Lv, Yinwei Jiang. 230-234 [doi]
- Automatic Positioning System for Industrial CT Image Defects Based on Machine VisionZaocai Xu, Yang Yang, Yi Ji, Dinggan Cheng. 235-239 [doi]
- Optimal Relay Algorithm for Unmanned Aerial Vehicles Based on Location PredictionLujie Yan, Guohua Wang, Peng Zhang. 240-244 [doi]
- Time-frequency analysis of non-stationary signals based on short-time Fourier transformBo Zhou, Yang Song, Jie Ai. 245-248 [doi]
- Data Loss Recovery Strategy for Distribution Network Differential Protection Based on 5G CommunicationJian Lin, Xue Chen, Li Chen, Pengfei Wang, Dishan Yang. 249-253 [doi]
- Research on Simulation of Satellite Communication Networks Based on Non cooperative GamesShisong Yang, Peng Yang, Teng Wu. 254-259 [doi]
- A Novel Annotation Method on RGB Images for Head Pose EstimationJiakai Zhou, Yang Wang. 260-264 [doi]
- Research on Underwater Acoustic Detection Based on Submarine Cable Distributed Acoustic SensingLei Zhang, Long Xie, Xutao He, Xiaobo Lin, Jiangzheng Shu, Qile Wang. 265-270 [doi]
- A low-scattering Vivald antenna in the K-bandHongyang Xu, Haisheng Song. 271-277 [doi]
- Research on training image recognition based on deep Convolutional neural networks: A case study of the hand-held insulated ladder recognition modelChaobing Wei. 278-283 [doi]
- Underwater Image Fusion Enhancement Algorithm based on Color Correction and SharpeningZhongjun Ding, Zhiyuan Li, Dewei Li. 284-289 [doi]
- Boundary Detector Network with Squeeze-and-Excitation Network for Semantic Segmentation of Remote Sensing ImagesHaiyan Cheng, Ruiqi Yang, Guangzhi Di. 290-295 [doi]
- A Broadband U-shaped Slot Coupled Antenna with T-shaped Microstrip FeedXi Pan, Haisheng Song. 296-300 [doi]
- YOLOv5s object detection method based on separable convolution and SENetYang Li, Yaodong Jia. 301-306 [doi]
- Research on UAV Interception Path Optimization Based on Markov Decision ProcessZeng Dou, Zhihui Yang, Yifan Tang. 307-311 [doi]
- Automotive sound quality evaluation model based on EEG signalNa Li, Haijun Zhao, Naibin Zhai, Feng Wang, Yu-an. 312-317 [doi]
- Realizing High Fidelity 3D Face of Images Using Self Encoding NetworksHao Xiao, Geguo Du, Yingyu Zhang, Wenjun Yang. 318-322 [doi]
- A Fusion Positioning Algorithm for WSN with BDS Based on Extended Kalman FilterLong Zhao, Yu Wan, Hongyan Fang, Jixing Chen. 323-326 [doi]
- A Completed Gaussian Extended Binary Pattern for Texture Image ClassificationXiaochun Xu, Weizheng Lin, Dingrong Chen, Nanling Su, Leinuo Tang, Changxu Cai. 327-331 [doi]
- Identification of Important Nodes Based on Entropy and Neighborhood Relations in Complex NetworkJieyong Zhang, Wei Liang. 332-338 [doi]
- Parallel Deployment of Service Function Chains Based on Network State PredictionYu Song, Rumeng Peng, Xu Feng, Kunli Zhang, Lei Zhuang, Mengyang He. 339-345 [doi]
- Lightweight Trusted Identity Architecture Based on Industrial Internet Cloud Edge Collaboration TechnologyZhongran Zhou, Cheng Huang, Xuxi Zou, Lei Mao. 346-349 [doi]
- Research on the Improvement of the DPoS Consensus Mechanism Based on the EigenTrust Trust ModelWeijun Gao, Xiaofang Zhang. 350-355 [doi]
- Comparison of Kalman Filtering and Wavelet Transform for Noise Reduction in Excavator Hydraulic Cylinder Thrust DataZhonghao Yin, Haiqing Liu, Xiao Lu. 356-360 [doi]
- Research on Defect Detection of Insulators in Transmission Lines Based on Improved YOLOv5Haonan Li, Fang Wang. 361-366 [doi]
- Reinforcement Learning Based Cluster Formation Algorithm in Wireless Sensor NetworksAdama Hawa Rahima Fofana, Jianjun Lei. 367-371 [doi]
- Semantic Segmentation of Transmission Lines with Fusion of Convolution and Multi-Head Self-AttentionFan Bai, Bin Jin, Mingjie Liu, Jingqiang Wang, Jiajie Liu. 372-377 [doi]
- Discussion on the Application of Tracking Codes on Color Laser Printouts in Information Security and Document Anti-counterfeitingNan Wang, Qinghua Zhang, Xu Yang. 378-383 [doi]
- Analysis of Stray Light in Inter-satellite Beacon-less Laser Communication and Its Influence on Acquisition ProbabilityFurui Zhang, Guangya Zhu. 384-389 [doi]
- A Dynamic Hierarchical Single Link Fault Recovery Scheme for SDN Based on Dynamic HierarchiesTao Chen, Yi Zhuang. 390-396 [doi]
- Application of Zero Trust Security Architecture in Power Communication Network Security Management SystemDongmei Bin, Fuchuan Tang, Yangguang Lin, Chunyan Yang, Ying Ling. 397-401 [doi]
- Fast Detection Algorithm for Equal Length Frame Signals Based on Pattern MatchingZhongyong Wang, Shufeng Zhang, Hong Sun, Kexian Gong, Honghua Liu, Wei Wang. 402-407 [doi]
- Feature selection SVM through Universum and its applications on text classification Feature selection SVM through UniversumJunshan Yin, Chunna Li. 408-414 [doi]
- Deep Siamese Multi-level Feature Network for VIS and NIR Image MatchingXinyi Ma, Fan Wang. 415-420 [doi]
- A Novel Hairstyle Transfer Method using Contextual Transformer BlocksDongjin Huang, Zhenyan Li, Jinhua Liu. 421-425 [doi]