題 目
作者期頁
產學一線
一個工控系統(tǒng)病毒的處置及思考
王紹杰,霍朝賓,田曉娜(1)5
新型Android銀行木馬“MoqHao”利用社交網絡隱藏C&C服務器
甘杰,郭山語(1)9
攻擊者對安全體系的預測、繞過、干擾與安全防護應對
肖新光(2)3
基于非線性預處理及邏輯回歸的異常檢測算法
董偉,楊晨,邵俊杰(3)4
基于數(shù)據(jù)驅動的工業(yè)信息安全防護
王弢,崔君榮(6)3
產業(yè)互聯(lián)網下的企業(yè)變革——以元器件分銷企業(yè)轉型實踐為例
宋健,周杰(6)6
基于大樣本的隨機森林惡意代碼檢測與分類算法
李雪虎,王發(fā)明,戰(zhàn)凱(7)3
交通行業(yè)工控系統(tǒng)遭病毒入侵給我國關鍵信息基礎設施安全的啟示
董偉,李致成,馮志(9)1
ITNS主題專欄:網絡空間安全
大規(guī)模網絡安全態(tài)勢分析系統(tǒng)YHSAS設計與實現(xiàn)
賈焰,韓偉紅,王偉(1)17
構筑工業(yè)互聯(lián)網安全防護體系為推動先進制造業(yè)發(fā)展保駕護航
劉仁輝,張尼,吳云峰(1)23
基于JSON的RSA-PKCS#1加密算法的安全性研究
何建,蔣琳,廖清等(1)25
Secure Enclave安全體系技術分析與研究
廖正赟,郭建勝(1)30
ITNS主題專欄:網絡人工智能與智能網絡管理
基于軟件定義網絡技術實現(xiàn)人工智能網絡體系架構
劉惠文,姚海鵬,張培穎(2)7
SDN架構下基于優(yōu)先級的帶寬保障算法研究
曹紹華,張斌,張培穎(2)11
人工智能集成學習方法在入侵檢測中的運用
金雅晴,丁振興,姬慶慶(2)15
基于AI的LEO衛(wèi)星網絡資源管理架構設計
王朱偉,徐廣書,買天樂等(2)20
ITNS主題專欄:工業(yè)控制系統(tǒng)及信息安全
可編程控制器原生的信息安全設計
朱毅明(3)8
本質安全型抽水蓄能電站計算機監(jiān)控系統(tǒng)設計探討
彭煜民,吳云峰(3)11
智能工廠新型數(shù)據(jù)采集系統(tǒng)構建
龔濤,趙赫男(3)15
引調水工程控制系統(tǒng)及信息安全防護設計思考
李連全,李潤偉(3)20
題 目
作者期頁
智能制造帶來的工業(yè)信息安全思考
吳吉慶,韋有雙(3)24
工控系統(tǒng)現(xiàn)場控制網絡異常檢測技術淺析
趙貴成,程鵬,王文海(3)28
工業(yè)控制系統(tǒng)APT攻擊分析和防御問題探討
許劍新,還約輝,王迎(3)32
電力工控系統(tǒng)網絡入侵和攻擊典型模型研究
郭志民,呂卓,陳岑(3)37
ITNS主題專欄:大數(shù)據(jù)安全技術
大數(shù)據(jù)產業(yè)現(xiàn)狀和挑戰(zhàn)
顧釗銓,張尼,李樹棟等(4)3
大數(shù)據(jù)分析關鍵技術與挑戰(zhàn)
韓偉紅,賈焰,周斌(4)7
面向大數(shù)據(jù)的知識語義建模技術研究綜述
柴瑜晗,劉妍,司亞琪等(4)11
醫(yī)療大數(shù)據(jù)平臺數(shù)據(jù)高并發(fā)方案設計與關鍵技術分析
張偉(4)18
大數(shù)據(jù)時代網絡涉軍輿情預警的新范式
劉澤睿(4)23
ITNS主題專欄:工控安全技術發(fā)展及應用
工業(yè)控制系統(tǒng)網絡安全態(tài)勢感知框架研究
陶耀東,賈新桐(5)3
長輸天然氣管道工控系統(tǒng)安全防護措施及相關建議
王磊,魏娜(5)7
離散制造行業(yè)的工控安全保障體系
趙劍明,尚文利,齊盈盈等(5)12
PLC控制系統(tǒng)在智能制造時代的應用及發(fā)展趨勢
韓慶敏,林浩,姜洪朝等(5)18
等保2.0時代下工控安全技術革新
謝云龍,吳得清,姜紅勇(5)22
ITNS主題專欄:匿名與隱私保護
DP2Gsister:差分隱私社交網絡圖發(fā)布模型
殷軼平,徐睿峰(6)11
Internet服務可訪問性技術綜述
譚慶豐,時金橋,王學賓等(6)18
基于OT協(xié)議的外包隱私集合交集計算協(xié)議
廖鵬程,陳小軍,申立艷等(6)28
本地化差分隱私在數(shù)據(jù)眾包中的應用
方俊斌,蔣千越,李愛平(6)32
基于差分隱私的社交網絡隱私保護
黃茜茜,蔣千越,蔣琳等(6)36
ITNS主題專欄:金融信息安全
金融行業(yè)“金融安全3.0”理論與生態(tài)
李洋,唐秀江,陳春璐等(7)6
基于軟件定義安全的企業(yè)內網威脅誘捕機制
劉文懋,劉威歆(7)9
日志智能分析在銀行業(yè)IT安全運維管理中的應用
孫惟皓,凌宗南,陳煒忻(7)13
智慧城市信息安全保障體系研究
李洋,謝晴,邱菁萍等(7)18
ERC20智能合約整數(shù)溢出系列漏洞披露
陳力波,殷婷婷,倪遠東等(8)3
基于大數(shù)據(jù)的互聯(lián)網金融安全建設思路
安丙春,張健,陶蓉(8)7
農村金融機構亟需建設新一代網絡安全體系
左英男(8)11
題 目
作者期頁
發(fā)布區(qū)塊鏈標準應用模型及應用部署技術研究
白杰,李東云,吳先鋒(8)13
ITNS主題專欄:中國電子“網絡安全和信息化”專題
RTD-gated HEMT研究進展
朱長舉(9)5
輕量級插件式Linux圖形桌面環(huán)境設計與優(yōu)化技術
余杰,馬俊,彭歡等(9)9
工控行業(yè)自主可控編程編譯工具關鍵技術研究
郭肖旺,陳海,趙德政(9)13
國產辦公信息系統(tǒng)若干關鍵問題研究
郭長國,謝勁松,韓鵬等(9)17
一種基于開放聚合框架的網絡流量安全監(jiān)測體系設計
王艷偉,鄔江,羅赟騫等(9)22
基于北斗衛(wèi)星導航系統(tǒng)的安全芯片設計
范長永(9)27
基于RC4算法的流密碼原理與實現(xiàn)
劉程遠(9)31
基于延遲線的超高速SD卡動態(tài)相位調整技術
劉艷麗,張璐,馮彥朝等(9)34
基于國產數(shù)據(jù)庫的電子政務建設安全性初探
姜會林(9)38
ITNS主題專欄:信息安全與密碼技術研究
基于全同態(tài)加密的ORAM方案
宋寧寧(11)1
NIST隨機性檢測方法研究
王超,溫濤,段冉陽(11)5
ZUC算法隨機性檢測研究
王超,范國浩,付寶仁(11)9
大整數(shù)分解算法綜述
楊江帥(11)12
基于混沌映射的身份認證與密鑰協(xié)商方案
國佃利(11)16
簡化版分組密碼KATAN32的相關密鑰立方攻擊
王明興(11)20
輕量級分組密碼算法設計研究
陳懷鳳(11)25
網絡與信息安全
從三種融合角度解讀《網絡安全法》
范赫男,張鐘(1)33
用戶網絡行為模擬技術研究
李晶晶,劉紅日,劉揚等(1)36
聯(lián)網工業(yè)控制系統(tǒng)主動感知預警技術研究
馬強,殷順堯,羊依銀(1)40
一種基于半監(jiān)督學習的工控網絡入侵檢測方法
張松清,劉智國(1)44
基于機器學習的輿情傾向性分析研究
羅裕雋(1)48
基于敏感性分級的(k, δ, ai)-匿名模型
劉陽,祝永志,遲玉良(1)52
基于軌道交通控制系統(tǒng)網絡信息安全仿真分析
徐超,莫嘉永,林俊南(1)57
云環(huán)境下主客觀協(xié)同的信任模型研究
張迪,丁箐(2)23
基于非線性預處理和神經網絡的字符序列單向Hash算法
朱巍(2)29
基于嵌入式平臺的網絡視頻監(jiān)控系統(tǒng)應用
蔡偉立,卿粼波,滕奇志等(2)33
基于嵌入式的QR二維碼加密系統(tǒng)設計與實現(xiàn)
周佳華,李福山(2)37
SDN網絡流量分類技術研究綜述
蔣海軍,謝鈞,郭小帆等(2)40
工業(yè)控制系統(tǒng)信息安全測試平臺研究
盧凱,朱廣宇,王紹杰等(3)40
城市污水處理廠控制系統(tǒng)可信安全防護設計
吳云峰(3)45
題 目
作者期頁
基于alpha疊加的視頻信息隱藏算法
蘇鵬濤,田澤,劉逸涵(3)50
eSIM卡安全架構研究
黃健,黃健文,李俊磊等(3)53
基于BP神經網絡的網絡安全指標體系構建
劉海天,韓偉紅,賈焰(4)26
基于神經網絡模型的網絡入侵檢測的研究
王禹,丁箐,羅弦(4)30
一種面向主動安全的動態(tài)采集策略設計與實現(xiàn)
翟友鈞,趙旦譜,臺憲青(4)34
基于云的工業(yè)信息安全試驗平臺架構設計
霍朝賓,賀敏超,劉思洋(5)25
基于SVM算法的工業(yè)防火墻規(guī)則自學習方法
潘峰,王世偉,薛萍(5)29
應用混合核函數(shù)支持向量機的網絡安全檢測模型研究
張彥軍(5)34
關鍵信息基礎設施安全保護運營措施分析與建議
高煥新,高永前(5)37
面向未來的網絡靶場體系架構研究
劉智國,于增明,王建等(6)41
一種基于可信嵌入式交互模塊的物聯(lián)網遠程管理平臺安全方案
陳波,楊永剛,朱廣宇(6)47
中央企業(yè)在國家網絡安全保障中的作用研究
林濤,張向宏(6)52
基于區(qū)塊鏈的身份管理研究
陳宇翔,張兆雷,卓見等(7)22
基于方向極化調制的安全可靠傳輸技術研究
齊帥,張邦寧,郭道省等(7)27
深度學習在網絡信息安全中的應用
陳驍(7)33
基于深度學習和半監(jiān)督學習的webshell檢測方法
吳斌,趙力(8)19
基于SECaaS模式的網絡安全監(jiān)管服務化研究
張智南,柯賢良,傅愛民(8)23
基于云計算服務的安全體系設計
張偉(9)42
一種基于分布式蜜罐技術的勒索蠕蟲病毒監(jiān)測方法
秦玉杰(9)45
IEC60870-5-104規(guī)約安全性分析及攻擊實驗
江澤鑫(10)1
電廠工控信息安全半實物仿真模型研究
蘇暢,熊申鐸,羅安琴等(10)5
基于深度學習的集成DGA域名檢測方法
羅赟騫,鄔江,王艷偉等(10)10
基于Hadoop的大數(shù)據(jù)分析管理平臺架構設計
張偉(11)30
基于區(qū)塊鏈的智慧云制造系統(tǒng)安全架構
杜蘭,陳琳琳,張麗等(11)34
一種基于STIX信息交互的滲透測試協(xié)作方案研究
劉岳,張海峰,張良等(12)1
基于貝葉斯網絡的等級保護風險評估模型研究
趙一鳴,謝炯,王鋼等(12)6
電力企業(yè)云百科系統(tǒng)的架構設計
張偉(12)11
信息通信
物聯(lián)網平臺及其云化平臺的開放性評估
賈雪琴,胡云,邢宇龍(1)62
大數(shù)據(jù)平臺安全威脅與防護技術研究
劉明輝,陳湉,王竹欣(1)65
無線傳感器網絡中基于模式頻繁度的異常檢測方法
施曉斌,吳丹萍,程紅舉(1)70
基于增強現(xiàn)實的計算機輔助微創(chuàng)手術導航系統(tǒng)
黃偉萍,韋孟宇,杜民等(1)76
協(xié)同通信系統(tǒng)中基于協(xié)作干擾的無線安全增強
周錢,臧國珍,彭磊等(1)81
題 目
作者期頁
一種改進的頻偏估計方法及應用
劉凱,周淵平(1)87
TIPC在嵌入式集群系統(tǒng)中的應用與優(yōu)化
施思,葉建芳,何睿(2)63
車聯(lián)網中基于模糊邏輯處理的多跳廣播協(xié)議
廖恩瑞,潘燕燕,宋祥(2)68
寬頻帶縫隙饋電雙層貼片微帶天線設計
周兵,鄒傳云(2)72
GLONASS衛(wèi)星導航信號模擬與接收驗證軟件開發(fā)
賁星,宋茂忠,熊駿(3)96
能量均衡的無線傳感器網絡多跳非均勻分簇算法
馬威風,陳桂芬(3)100
基于藍牙通信的IC卡水表遠程付費裝置設計
常興智(3)105
一種用于CDMA2000 1x導頻捕獲的自適應門限算法研究
王文實,夏文龍,郭慶功(4)79
免疫粒子群優(yōu)化的DV-Hop定位算法
吳珍珍,方旺盛(4)84
波束形成算法研究與改進
劉權,周淵平,徐磊等(4)88
一種改進的碼率兼容QC-LDPC碼構造算法
范仁基,趙旦峰(5)58
WiFi輔助的IMU室內定位方法的研究
袁國良,謝奎(5)62
平移不變小波變換在脈搏波去噪中的應用
王泰琨,張海英,張以濤等(5)66
面向導航星座的混合路由技術研究
張方,周淦,喻瑤瑤等(6)94
CSI誤差下MIMO干擾廣播信道的非線性收發(fā)機設計
賈亞平,耿烜(6)99
Ku波段便攜式雷達收發(fā)系統(tǒng)設計
蔡暢,楊浩,杜澤保(6)104
一種基于RB-HARQ安全傳輸技術的吞吐量最大化方法
王雷,郭道省,蔣炫佑(7)62
基于GNURadio的CMA盲均衡器和鎖相環(huán)組合設計與實現(xiàn)
李曉光,潘克剛(7)67
LTE中SVC視頻層數(shù)選擇和資源分配的聯(lián)合優(yōu)化
邢志浩,楊博文,楊堅(7)71
基于Nginx的科普云直播系統(tǒng)研究與實現(xiàn)
馬艾田,耿立宏,王閏強等(8)54
具有射頻監(jiān)測能力的雷達接收前端技術
張秋艷,王超,陳嚴君(8)58
基于PXI總線多通道矢量信號源的設計與實現(xiàn)
張秋艷,張鵬(9)76
基于坐標變換的交互多模型車載定位研究
焦雨琪,牛蕊,夏志(9)80
基于無人機雙路移動中繼通信的干擾抑制
楊潤豐,駱春波,張依群(9)85
終端換機業(yè)務分析研究
路瑋,李軼群,李佳俊等(9)89
基于ZYNQ的高速數(shù)據(jù)中心接口單元設計
呂俊杰,武杰(10)51
基于期望最大化算法的雙音頻率估計方法研究
袁恩,劉鵬,陳隆亮等(10)55
對支持MEC的SCN蜂窩網絡緩存策略的研究
何驕鴻,潘沛生(11)69
一種RB-HARQ輔助下基于非規(guī)則LDPC碼的安全傳輸方案
王雷,丁曉暉(11)74
無線Ad Hoc網絡MAC層中針對FD中繼的高效空間復用機制
宋宇,齊望東,趙衛(wèi)偉(11)79
衛(wèi)星通信中干擾極化狀態(tài)自適應跟蹤算法
齊帥,郭道省, 張邦寧等(12)48
逼近高斯信道容量的M-APSK調制星座優(yōu)化設計
蔣炫佑,魏以民,王雷等(12)52
智能算法
基于雙維度云模型的協(xié)同過濾推薦算法
劉美博,滿君豐,彭成等(1)92
題 目
作者期頁
基于HALCON的機器人手眼標定精度分析與反演方法
楊厚易(1)97
考慮移動群智感知用戶類型的激勵機制設計
林燁婷,陳忠輝,馮心欣等(1)101
基于奇異值分解和隱Markov模型的動態(tài)手勢識別
蔣海軍,謝鈞,段國侖等(1)106
基于多尺度域和能量特征分析的航空圖像增強
劉暢,廖一鵬(1)111
基于灰色新陳代謝和神經網絡的故障預測方法研究
杲玄玄,李長云,雷小葳(1)115
基于Ext JS框架MVC模式的復用技術研究
周玉,聞金華,徐建良(2)46
基于費用函數(shù)的測試性指標優(yōu)化分配方法
王賀,朱智平,王貴騰等(2)51
基于自然語義處理的裁判文書分割系統(tǒng)
鄭少婉,陸培民(2)55
低帶寬條件下機器人探索地圖的傳輸方法
張紅陽,肖宇峰,劉冉(2)58
基于三幀差法與聚類算法的目標識別方法
梁瓊,蔡湧達,路梅梅等(3)57
基于AIHS的遙感影像融合方法及其應用研究
胡佳偉,劉軍清,汪康等(3)61
基于SVM的建筑電氣系統(tǒng)無中心故障診斷算法研究
趙雪辰,邢建春,王平等(3)65
一種基于多元回歸的能見度檢測方法
唐紹恩,李騫,顧大權等(3)70
基于距離變換的PRM路徑規(guī)劃算法
李敏,周遠遠,黃魯(3)74
一種基于關聯(lián)規(guī)則的網絡軟件缺陷預測方法
胡柳,鄧杰,趙正偉等(4)41
基于區(qū)域過濾的測序序列比對算法研究
丁勝楠,吳鳴,徐云(4)45
深度森林與人工神經網絡在光伏出力預測的比較
沈文博,孫榮霞,馬少卿等(4)49
一種智能化媒資檢索系統(tǒng)的研究
關力,張向文,張帆等(4)52
基于隱馬爾可夫模型的有向地圖匹配算法研究
陳忠輝,王彪,馮心欣等(4)55
基于自然特征的移動增強現(xiàn)實注冊算法
謝振超,黃俊,張磊等(5)71
基于改進的暗原色先驗圖像去霧算法
楊斌,林志賢,郭太良(5)75
一種改進的加權頻差電阻抗成像算法
張夏婉(5)80
基于MapReduce的分布式貪心EM算法
曹家慶,吳觀茂(5)84
基于模糊C-均值和特征加權法的協(xié)同過濾推薦算法
字云飛,李業(yè)麗,孫華艷等(6)54
基于粒子濾波的鋰電池SOC二次濾波算法
邢云鳳,趙野(6)59
基于數(shù)據(jù)敏感度自適應的SDT改進算法
張涵笑,慕福奇,呂欣巖(6)64
變參數(shù)深度玻爾茲曼計算模型研究
王娜,陳賢富(6)68
基于Floyd改進加速算法的最短路徑選擇
馬瑩,陳志龍,劉賀等(6)72
基于蝴蝶優(yōu)化的粒子濾波算法
劉云濤(7)37
面向文件存儲的虛擬網絡映射算法
陳晨,鄭烇,王志臻等(7)42
基于二倍體顯性機制的DNA算法研究
徐凱,陳賢富(7)46
基于混沌擾動PSO算法的云計算任務調度
許向陽,張芳磊(8)27
Landsat 8 OLI多光譜與全色影像融合算法的比較
姜曉晨,鄧正棟,武國瑛等(8)31
基于粒子群優(yōu)化的模糊C均值聚類算法
王宇鋼(8)36
基于自適應閾值PCA的多目標人臉識別方法研究
郝剛,梁鵬(9)49
題 目
作者期頁
二分查找判定樹的RHC構造法
徐有為,張宏軍,程愷等(9)52
一種基于OpenCV的家用安防多閾值運動目標檢測算法
劉志聰,陳德為,李鴻揚等(9)57
基于LFSR具有并行與串行結果一致的隨機數(shù)生成算法
王超,張秋艷,張姍等(10)15
基于支持向量機的格斗評估算法研究
陳澤嘉,曾培峰(10)19
基于Welch和柔性形態(tài)學的LPI信號噪聲基底處理
耿常青,楊承志,張志剛等(10)24
一種結合用戶和項目聚類的協(xié)同過濾算法
羅弦,丁箐,王禹(10)28
基于自適應相機運動速度的視頻穩(wěn)像算法
胡琪,羅健欣,胡谷雨等(10)32
基于區(qū)域劃分的點云全局配準研究
周建釗,杜文超,顏雨吉等(11)39
網絡用戶自描述標簽向量生成及標簽層次體系構建方法
孫毅,裘杭萍,王沁雪(11)44
面向虛擬現(xiàn)實的A算法的分析與改進
宋健,何小海,王正勇等(11)50
高空懸掛式相機拍攝中的拉索提取方法
何榜耕,吳曉紅,何小海等(11)54
基于改進優(yōu)先權的對稱相似圖像修復算法
鄭成松,李琦(12)14
一種事件驅動的生物特征識別框架服務的設計與實現(xiàn)
蔣林軒,余杰,劉曉東等(12)18
云計算環(huán)境下基于信任主體和效益值的動態(tài)任務調度算法研究
吳洲(12)26
基于資源三號衛(wèi)星與Landsat 8 OLI的水庫庫容估算
姜曉晨,鄧正棟,武國瑛(12)30
人工智能
開放式環(huán)境下變電站機器人SLAM算法研究
任杰,宋建濤,李功燕(3)80
基于STM32的運動分析裝置設計與研究
方曉明,蘇凱雄(3)84
流形降維最小二乘回歸子空間分割
林智鵬,黃増裕,簡彩仁(3)88
基于ZYNQ的車載行人檢測系統(tǒng)設計與實現(xiàn)
鄧健峰,謝云(3)91
基于深度神經網絡的說話人自適應方法研究
古典,李輝(4)60
基于優(yōu)化的并行AlexNet人臉特征點檢測算法
陳東敏,姚劍敏(4)65
基于拉普拉斯卷積網絡和SMM分類器的小麥麥粒識別
康朋新,卿粼波,滕奇志等(4)71
TensorFlow平臺下基于深度學習的數(shù)字識別
靳濤,張永愛(4)74
一種快速的車型識別方法
胡鵬,白天,許曉瓏(5)41
改進的卷積神經網絡在答案選擇模塊中的研究
許暢,張琳(5)46
基于EdgeBoxes與旋轉不變特征的車輛檢測
婁玉強,蔣華濤,常琳等(5)50
基于生成對抗網絡的語音增強算法研究
柯健,徐志京(5)54
一種融合多種信息的Web文檔分類方法
段國侖,謝鈞,郭蕾蕾等(6)76
一種基于隔離損失函數(shù)的人臉表情識別方法
曾逸琪,關勝曉(6)80
交叉口信號優(yōu)化控制的深度循環(huán)Q學習方法
施賽江,陳鋒(6)85
基于連續(xù)幀的在線實時人體行為檢測
周道洋,關勝曉,夏雨薇(6)90
基于深度卷積神經網絡的小尺度行人檢測
郭愛心,殷保群,李運(7)50
一種基于LSTM的視頻車輛檢測算法
李歲纏,陳鋒(7)54
融合多視角信息的RGB-D圖像協(xié)同顯著性檢測
吳乾紳(7)58
題 目
作者期頁
基于生成對抗網絡的人臉熱紅外圖像生成
王雅欣,史瀟瀟(8)40
一種基于高級驅動輔助系統(tǒng)快速時空立體匹配方法
朱素杰,王萌(8)45
基于網絡搜索數(shù)據(jù)的品牌汽車銷量預測研究
謝天保,崔田(8)50
基于CNN-XGBoost的PTA平均粒徑動態(tài)軟測量模型
周鵬(9)61
基于深度學習的多條形碼檢測與實現(xiàn)
周勉,劉秉瀚(9)65
基于伴隨文本信息的Web圖像批量標注方法
郭蕾蕾,俞璐,段國侖等(9)70
基于邏輯回歸模型的火焰檢測
官洪運,楊益?zhèn)?,吳煒?10)36
基于分布式核的在線AUC最大化算法
劉鑫,潘志松,周星宇等(10)41
基于FSVM算法的TCD醫(yī)療數(shù)據(jù)分類
王志遠,吳成浩,王正等(10)46
基于全卷積神經網絡的地震初至波拾取
劉佳楠,武杰(11)58
基于公路監(jiān)控視頻的車輛檢測和識別
陳偉星,白天,許曉瓏(11)64
基于頻譜特性和自適應蟲孔定位的小麥識別
王周璞,何小海,吳小強等(12)35
基于KCF的目標遮擋再檢測算法
王德培,謝云(12)39
基于樸素貝葉斯與半樸素貝葉斯圖像識別比較
劉闖(12)44
工業(yè)自動化技術
智能制造系統(tǒng)實施方法論在新能源行業(yè)的研究與應用
李末軍,韓慶敏,杜軍釗(1)118
多旋翼燃料電池無人機能量管理策略研究
張志祥,肖鐸,王佳斌(1)122
核電站KSN系統(tǒng)操作監(jiān)控軟件的仿真技術研究
程敏敏,景應剛,張才科等(1)127
基于MC-AHP-FCE系統(tǒng)對瓦斯災害的預警評估
許顥礫,王大慶,鄧正棟等(1)131
基于簡化粒子群優(yōu)化的高鐵鋼軌智能檢測技術
王曼,王姮,張華(2)77
一種基于智能機器視覺識別的工業(yè)探傷技術
牛乾,劉桂華,康含玉(2)81
工業(yè)控制中電渦流傳感器位移測量精度研究
宋士蘭,盧文科,左鋒(2)85
基于STM32F4的基板檢測輸送平臺運動控制器設計
張群,陶曉杰,張藍等(2)90
全方位移動平臺運動控制系統(tǒng)的實現(xiàn)
曾令棟,裴東,王全州等(2)95
基于邊緣計算的工業(yè)數(shù)據(jù)采集
馬吉軍,賈雪琴,壽顏波等(4)91
基于PSO-BP預測模型的盾構機密封艙土壓平衡控制
李強,李景軒(4)94
一種下垂控制逆變器與柴油發(fā)電機并聯(lián)運行控制策略
黃家豪,王金全,徐曄等(4)100
基于電渦流傳感的地面沉降分層監(jiān)測裝置設計
呂中虎,張青,張曉飛(4)106
導發(fā)架主控計算機供配電管理的設計與實現(xiàn)
景德勝,張坤(4)109
基于EtherCAT架構的伺服系統(tǒng)諧振在線檢測
郭高潔,蔣平,李欣等(5)102
基于聲紋識別技術的Android設備聲音功能自動化測試系統(tǒng)
李嘉偉,胡海龍,林志賢(5)106
題 目
作者期頁
主動對象計算模型在工業(yè)機器人系統(tǒng)中的應用
殷冰磊,董伯麟(5)110
平板檢測系統(tǒng)人機界面設計
李洋,林曉,汪鑄杰等(6)108
多通道超聲波數(shù)據(jù)采集傳輸實現(xiàn)方法
丁孝超,楊媛,陳福(6)112
一種芯片電容高精度批量測試設備設計
劉書萌,馮國兵,王龍等(6)117
基于物聯(lián)網的煎炸油品質在線檢測系統(tǒng)設計
霍慧清,歐文,莫宏波等(7)77
淺析云計算在電梯行業(yè)中的應用
吳祥容(7)82
基于ZigBee網絡的高速公路防霧霾路燈控制系統(tǒng)
何子力,張麗娜,張放心等(7)86
基于有源RFID的牧場定位技術研究
盧圣文,歐文(7)90
基于圖像處理的煙條段搭口寬度測量方法
文韜,韓龍,文一夫(7)95
柴油發(fā)電機組帶恒功率脈沖負載運行特性研究
邢鑫,王金全,徐曄等(8)62
基于FPGA的猝發(fā)多脈沖產生系統(tǒng)設計與實現(xiàn)
馮傳均,何泱,戴文峰(8)70
控制系統(tǒng)的“四防”
蘇耀東(8)73
基于FPGA的刀具圖像預處理系統(tǒng)研究
溫佳靜,范紅,朱江澤等(9)94
基于改進灰狼算法的最大功率點跟蹤
楊麗麗,孫榮霞,王碩南(9)97
電力機車裝配線智能節(jié)拍系統(tǒng)設計
楊晨,孫麗(9)101
儲能電池基于等效電路模型的功率特性研究
劉堯斌,徐曄,李建科等(9)105
遍歷式最大電流點硅光電池追蹤系統(tǒng)設計
薄中亞(10)59
一種便攜式近地告警測試設備的設計與實現(xiàn)
夏小春,王鍵,趙曉晴(10)62
脈沖負載作用下發(fā)電機端電壓波動問題研究
劉博,黃克峰,徐曄(10)66
基于物聯(lián)網的工業(yè)定制化生產系統(tǒng)設計
謝仁栩,陳丹,徐哲壯等(10)72
基于NTSM的伺服電機模糊滑??刂撇呗匝芯?/p>
黃皓,涂群章,潘明等(11)84
國產PLC系統(tǒng)與OPC UA通信過程的身份認證機制優(yōu)化
趙悅琪,閔曉霜(12)58
基于ZigBee的智能照明控制系統(tǒng)設計
張斌,侯嚴嚴,趙濤(12)62
計算機硬件
SRD建模及其在無芯片RFID系統(tǒng)中的應用
張精華,郭海燕,鄒傳云(2)100
一種應用于10 MHz 8位SAR ADC的分段式DAC電路設計
徐韋佳,田俊杰,李延標等(2)104
基于電流模電路的通用寬帶電流放大器的設計與仿真
豐豪,趙柏樹,李宣成(3)109
一種低抖動快鎖定的時鐘數(shù)據(jù)恢復電路設計
胡騰飛,方毅,黃魯(3)113
基于NEO-M8P的RTK定位系統(tǒng)設計與實現(xiàn)
劉煉軍,黃繼偉(3)117
基于ARM9的自動氣象站控制模塊設計
葉楠,劉懷芝,鹿旭(4)112
一種減小紋波電壓的新型電荷泵調節(jié)電路
歐陽托日,黃魯(4)116
NFC門禁控制系統(tǒng)研究與設計
曹澤玲,王琪(5)88
題 目
作者期頁
超聲波腐蝕在線監(jiān)測系統(tǒng)前端信號分析
王潤,孟令雅,劉晶姝(5)93
K波段pHEMT下變頻混頻器的設計與研究
李罡,余凱,李思臻等(5)97
基于i.MX6的雷達顯示終端設計與實現(xiàn)
李紅兵(6)121
脈沖負載下獨立微電網混合儲能的優(yōu)化控制策略
師萌,王金全,黃克峰等(6)125
基于FPGA的EtherCAT從站控制器FMMU模塊設計
姚旺君,林浩,王永利等(8)77
一種S模式ADS-B前導脈沖檢測方法
王永利,姚旺君,陳嚴君等(8)83
一種防霧霾智能口罩的設計
徐磊,周淵平,黃思遠等(8)88
一種基于Leap Motion的交互全息投影方法
呂寶媛,蔡煜城,林偉達等(10)78
自適應閾值FAST特征點檢測算法的FPGA實現(xiàn)
程彪,黃魯(10)82
便攜式光導聲波滅火器的研究與設計
官洪運,蘇振濤,汪晨(11)92
一種雙波源車輛行車方向識別方法
秦攀,張奔牛,張明輝(11)96
基于過程數(shù)據(jù)模塊的裝備故障診斷技術研究
蒙立榮,馬永起,程錚等(12)66
基于國產軟硬件平臺的OPC UA服務器設計與實現(xiàn)
閔曉霜,楊鑫(12)71
行業(yè)應用
基于相關濾波器的長時艦船目標跟蹤方法
陳威,李決龍,邢建春等(1)135
基于北斗短報文通信的水質監(jiān)測系統(tǒng)設計
王星星,姜嵐,黃科等(1)139
基于STM32和ZigBee無線通信的實驗室安防系統(tǒng)
朱利娟,云中華,邊巴旺堆等(1)143
運動目標檢測在單兵作戰(zhàn)中的應用
張芝賢,張凱(2)108
一種星載固態(tài)功放驅動電源的設計
董碩,陳贊,王正之等(2)112
基于Emotiv的腦機接口研究
陳侃,張勝利,丁凡(2)116
一種大功率重頻充電電流的分析與研制
馮傳均,何泱,戴文峰(2)119
角點和邊緣結合的紅外與可見光圖像匹配
葛雯,何博(2)122
一種改進的雙麥克智能語音前端算法
方賽鴻(2)127
基于STM32和LABVIEW的兩用太陽跟蹤器設計
蘇楊,劉卿卿(2)131
混合迭代學習法在發(fā)動機怠速穩(wěn)速控制中的應用
崔建平,李登科,劉成基(2)135
一種動力電池制造環(huán)境監(jiān)測的智能網關技術
徐勛庭,梅領亮,駱德漢(2)140
虛擬手術中心臟跳動仿真技術研究
劉波,陳國棟,王娜(2)143
程序源代碼中的切片摘要提取及在搜索中的應用
李潤青,曾國蓀(3)122
基于RFID/GIS的城市地下管網監(jiān)控管理系統(tǒng)
章光旭,陳明智,毛五星等(3)126
基于數(shù)據(jù)緩沖池技術的二次設備狀態(tài)評價數(shù)據(jù)處理方法
李金,高壽(3)131
負載弱電流遠程監(jiān)控系統(tǒng)設計
楊峰,童軒,李建奇(3)134
運動目標微弱放射性核素的快速識別方法
王昌龍,張江梅(3)137
交直流配電網及柔性變電站仿真研究
解騰,亢夢婕,王譜宇等(3)140
題 目
作者期頁
采用商業(yè)元器件降低航天器成本研究
周劍波,叢彥超,趙鵬飛等(3)144
基于交通一卡通的智能化住宅小區(qū)應用模式研究
伍冠樺,余紅玲,吳金成(3)150
體外反搏治療效果自動優(yōu)化算法與實現(xiàn)
肖前軍(3)154
一種基于6LoWPAN用于土木結構監(jiān)測的無線數(shù)據(jù)采集系統(tǒng)設計
陳海燕,陳志聰,周海芳等(4)120
可穿戴脈搏壓力監(jiān)測系統(tǒng)設計
胡威,吳學洲,朱臣等(4)125
基于PCIE總線的DMA控制器設計與實現(xiàn)
何廣亮(4)131
基于數(shù)字化生產車間的郵件系統(tǒng)設計與集成
任凱斌,曾鵬飛,郝永平(4)136
JIRA在生產異常管理實踐中的應用
張克典,范振強,李智皓等(5)115
固體礦產儲量三維輔助評審系統(tǒng)設計與實現(xiàn)
彭斌,陳志曉(5)119
隧道交通智能逃生引導系統(tǒng)設計
姚丹,朱映雪,吳燕等(6)130
基于中間件的開放式基金登記結算系統(tǒng)
陳松楠(6)134
基于壓電信號的兩種心率呼吸率提取算法比較
賈學斌,廖曦文,商春恒等(7)98
基于ANSYS的氣氛燒結爐動態(tài)溫度場研究
李強,王璐(7)102
基于ZigBee的教學應答系統(tǒng)軟件設計
陳科,蘇魯陽,楊筆鋒(8)91
基于特征選擇和HMM的股票價格行為研究
喻永生,謝天異丹,劉暢等(8)96
題 目
作者期頁
基于車聯(lián)網的物流信息監(jiān)控平臺的研究與設計
張愛玲,曹磊(9)110
基于NFC手機的跨域交通卡移資應用技術的研究
何建兵,徐鋒,冷夢甜(9)114
霍爾傳感器實時自動定位系統(tǒng)設計
汪遠銀,岳彩銳,李真山等(9)118
基于B/S模式的三維巖心瀏覽系統(tǒng)的設計與實現(xiàn)
陳岑,卿粼波,何小海等(10)87
智能終端運營管理系統(tǒng)之微服務架構改造實踐
王衛(wèi)國,潘雨(10)91
海洋石油平臺污染物在線監(jiān)測軟件開發(fā)應用
胡斌,楊敏,徐棟等(10)95
MES系統(tǒng)在水產加工車間的應用
鄒佳霖,范寶德,韓兆玉(10)99
基于AM5728的自適應圖像增強算法的研究與實現(xiàn)
郭威,卿粼波,熊淑華等(11)100
基于Canvas的貨車圖像瀏覽及增強系統(tǒng)設計與實現(xiàn)
高斯文,卿粼波,熊淑華等(11)104
區(qū)塊鏈技術在民航領域的應用
王天山,楊健,王堯(11)109
基于降維的人臉識別方法研究與應用
簡彩仁,莊凌宇,林智鵬(12)75
基于云計算的企業(yè)信息系統(tǒng)集成與安全機制
支艷利(12)79
仿生嗅覺在空氣凈化器氣味識別中的應用研究
馬東旭,駱德漢,徐勛庭等(12)82
XINXIJISHU YU WANGLUOANQUAN
General Contents of Issue1to Issue12,2018
Title
AuthorIssuePage
FrontlineofIndustryandUniversity
The disposal and thinking of an industrial control system virus
Wang Shaojie, Huo Chaobin, et al(1)5
New Android bank Trojan uses social network to hide C&C server
Gan Jie, Guo shanyu(1)9
The prediction, bypassing and interference of the security system and the safety protection
Xiao Xinguang(2)3
An algorithm for anomaly detection based on nonlinear preprocessing and logistic regression
Dong Wei,Yang Chen,Shao Junjie(3)4
Data driven industrial control system cyber security
Wang Tao, Cui Junrong(6)3
Industrial internet impact enterprise transformation
Song Jian,Zhou Jie(6)6
Large sample-based random forest malicious code detection and classification algorithm
Li Xuehu,Wang Faming,Zhan Kai(7)3
Analysis on a virus intrusion of traffic industrial control system and security of critical information infrastructure in China
Dong Wei,Li Zhicheng,F(xiàn)eng Zhi(9)1
ITNSThemeColumn:CyberspaceSecurity
Research and implementation security situation analysis and prediction system for large-scale network
Jia Yan, Han Weihong, Wang Wei(1)17
On thinking of constructing an industrial internet security protection system
Liu Renhui, Zhang Ni, Wu Yunfeng(1)23
The security analysis of RSA-PKCS#1 encryption algorithm in JSON
He Jian,Jiang Lin,Liao Qing,et al(1)25
Analysis and research on secure enclave architecture
Liao Zhengyun,Guo Jiansheng(1)30
ITNSThemeColumn:Networkartificialintelligence
andintelligentnetworkadministration
An artificial intelligence network architecture based on software defined network
Liu Huiwen,Yao Haipeng,Zhang Peiying(2)7
Research of priority-based bandwidth guarantee algorithm on SDN architecture
Cao Shaohua,Zhang Bin,Zhang Peiying(2)11
The use of artificial-intelligence-based ensembles for intrusion detection
Jin Yaqing,Ding Zhenxing,Ji Qingqing(2)15
Design of LEO satellite network resource management architecture based on AI
Wang Zhuwei,Xu Guangshu,Mai Tianle, et al(2)20
Title
AuthorIssuePage
ITNSThemeColumn:IndustrialControl
SystemandInformationSecurity
Native security design in PLC
Zhu Yiming(3)8
Design of the intrinsically-safe CSCS for pumped storage power station
Peng Yumin,Wu Yunfeng(3)11
Construction of new data acquisition system in intelligent factory
Gong Tao,Zhao Henan(3)15
Design of control system and information security protection for water diversion project
Li Lianquan, Li Runwei(3)20
Risk analysis of intelligent manufacturing on industrial information security
Wu Jiqing,Wei Youshuang(3)24
Analysis on the anomaly detection of field control network
Zhao Guicheng,Cheng Peng,Wang Wenhai(3)28
Analysis of APT attack and defense in industrial control systems
Xu Jianxin,Huan Yuehui,Wang Ying(3)32
Research on typical model of network intrusion and attack in power industrial control system
Guo Zhimin, Lv Zhuo, Chen Cen(3)37
ITNSThemeColumn:
BigDataSecurityTechnology
Status and challenges of the big data industry
Gu Zhaoquan, Zhang Ni, Li Shudong, et al(4)3
The key technologies and challenges of big data analysis
Han Weihong, Jia Yan, Zhou Bin(4)7
Research of knowledge semantic modeling technology for bigdata:an overview
Chai Yuhan, Liu Yan, Si Yaqi, et al(4)11
Design and key technology analysis of high concurrency data for medical big data platform
Zhang Wei(4)18
A new paradigm of early warning of network public opinion
Liu Zerui(4)23
ITNSThemeColumn:IndustrialInformation
SecurityTechnologyDevelopmentandApplication
Research on industrial control system cyber security situation awareness framework
Tao Yaodong,Jia Xintong(5)3
Security protection measures and related suggestions for industrial control system of long-distance natural gas transmission pipeline
Wang Lei,Wei Na(5)7
Title
AuthorIssuePage
Industrial control assurance system for discrete manufacturing industry
Zhao Jianming,Shang Wenli ,Qi Yingying, et al(5)12
Application and development trend of PLC control system in age of intelligent manufacturing
Han Qingmin, Lin Hao, Jiang Hongzhao, et al(5)18
Technological change of industrial control security under the age of classified protection 2
Xie Yunlong,Wu Deqing,Jiang Hongyong(5)22
ITNSThemeColumn:
AnonymityandPrivacyProtection
DP2Gsister: differential privacy publishing model for social network graph
Yin Yiping,Xu Ruifeng(6)11
Survey of Internet service accessibility
Tan Qingfeng,Shi Jinqiao,Wang Xuebin, et al(6)18
Outsourcing private set intersection computing protocol based on OT protocol
Liao Pengcheng,Chen Xiaojun,Shen Liyan, et al(6)28
Local differential privacy applications in data crowdsourcing
Fang Junbin,Jiang Qianyue,Li Aiping(6)32
Privacy preserving in social network based on differential privacy
Huang Xixi,Jiang Qianyue,Jiang Lin, et al(6)36
ITNSThemeColumn:
FinancialInformationSecurity
The theory of“Financial Security (Fin Sec) 3.0” and financial security ecosystem
Li Yang, TangXiujiang, Chen chunlu, et al(7)6
A software defined threat trapping mechanism
Liu Wenmao, Liu Weixin(7)9
The application of log intelligent analysis in bank information security operation
Sun Weihao, Ling Zongnan, Chen Weixin(7)13
The system research on information security in smart cities
Li Yang,Xie Qing, Qiu Jingpingi, et al(7)18
Dozens of integer overflow vulnerabilities found in ERC20 smart contracts
Chen Libo, Yin Tingting, Ni Yuandong, et al(8)3
The big-data-based construction thinking for Internet finance
An Bingchun, Zhang Jian, Tao Rong(8)7
The construction of network security systems in rural financial institutions
Zuo Yingnan(8)11
The standard of blockchain applications model publication and deployment technologies research
Bai Jie, Li Dongyun, Wu Xianfeng(8)13
ITNSThemeColumn:
CECNetworkSecurityandInformatization
A survey of RTD-gated HEMT
Zhu Changju(9)5
Design and optimization of a lightweight Linux desktop environment based on pluggable framework
Yu Jie, Ma Jun,Peng Huan, et al(9)9
Title
AuthorIssuePage
Study on the key technology of automatic controlled programming compilation tool in industrial control industry
Guo Xiaowang, Chen Hai, Zhao Dezheng(9)13
Research on several key problems of domestic office information system
Guo Changguo,Xie Jinsong,Han Peng, et al(9)17
Design of network traffic security monitoring system based on open aggregation framework
Wang Yanwei,Wu Jiang,Luo Yunqian, et al(9)22
Security IC design based on the Beidou satellite navigation system
Fan Changyong(9)27
The principle of a stream cipher based on RC4 algorithm and how to realize it
Liu Chengyuan(9)31
Implementing a SD UHS dynamic tuning phase based on delayline
Liu Yanli,Zhang Lu,F(xiàn)eng Yanzhao, et al(9)34
A preliminary study on the security of e-government construction based on domestic database
Jiang huilin(9)38
ITNSThemeColumn:Researchon
informationsecurityandCryptography
ORAM scheme based on fully homomorphic encryption
Song Ningning(11)1
Research of NIST statistical test
Wang Chao,Wen Tao,Duan Ranyang(11)5
Research of ZUC algorithm randomness test
Wang Chao,F(xiàn)an Guohao,F(xiàn)u Baoren(11)9
Survey of large integer factorization algorithm
Yang Jiangshuai(11)12
Chaotic map based authenticated key agreement scheme
Guo Dianli(11)16
Related-key cube attack on round-reduced block cipher KATAN32
Wang Mingxing(11)20
The study on design of lightweight block ciphers
Chen Huaifeng(11)25
NetworkandInformationSecurity
The analysis of network security from three kinds of fusion angles
Fan Henan, ZhangZhong(1)33
A survey of user network behavior simulation technology
Li Jingjing, Liu Hongri, Liu Yang, et al(1)36
Research on active awareness warning method for networked industrial control system
Ma Qiang,Yin Shunyao,Yang Yiyin(1)40
An intrusion detection method based on semi-supervised learning for industry control system network
Zhang Songqing, Liu Zhiguo(1)44
Research for public opinion orientation analysis based on machine learning
Luo Yujun(1)48
(k, δ, ai)-anonymity model based on sensitivity hierarchical
Liu Yang, ZhuYongzhi, Chi Yuliang(1)52
The network information security simulation and analysis for rail traffic control system
Xu Chao,Mo Jiayong,Lin Junnan(1)57
Research on trust model of subjective and objective collaboration in Cloud environment
Zhang Di,Ding Qing(2)23
Title
AuthorIssuePage
One-way character sequence hash algorithm based on nonlinear preprocess and neural network
Zhu Wei(2)29
Application of network video monitoring system based on embedded platform
Cai Weili, Qing Linbo, Teng Qizhi, et al(2)33
Design and implementation of QR code encryption system based on embedded platform
Zhou Jiahua, Li Fushan(2)37
A survey of network traffic classification technology based on SDN
Jiang Haijun, Xie Jun, Guo Xiaofan, et al(2)40
Research on information security testing platform of ICS
Lu Kai, Zhu Guangyu, Wang Shaojie, et al(3)40
Security protection design based on trusted computing for control system of urban sewage treatment plant
Wu Yunfeng(3)45
Video information hiding algorithm based on alpha superposition
Su Pengtao,Tian Ze,Liu Yihan(3)50
Research of security architecture oneSIM card
Huang Jian,Huang Jianwen,Li Junlei, et al(3)53
Construction of network security indication-system based on back propagation neural network
Liu Haitian, Han Weihong, Jia Yan(4)26
Research on network intrusion detection based on neural network model
Wang Yu, Ding Qing,Luo Xian(4)30
Design and implementation of a dynamic acquisition strategy for active safety
Zhai Youjun, Zhao Danpu, Tai Xianqing(4)34
Research on future architecture of network range
Liu Zhiguo, Yu Zengming, Wang Jian, et al(6)41
An IoT remote management platform security solution based on trusted embedded interactive module
Chen Bo, Yang Yonggang, Zhu Guangyu(6)47
Research on the role of central enterprises in national network security
Lin Tao,Zhang Xianghong(6)52
Identity management research based on blockchain
Chen Yuxiang,Zhang Zhaolei,Zhuo Jian, et al(7)22
Research on secure and reliable transmission based on directional polarization modulation
Qi Shuai, Zhang Bangning, Guo Daoxing, et al(7)27
Applications of deep learning in network information security
Chen Xiao(7)33
Webshell detection method based on deep learning and semi-supervised learning
Wu Bin,Zhao Li(8)19
Research on servitization of network security supervision based on SECaaS
Zhang Zhinan, Ke Xianliang, Fu Aimin(8)23
Design of security system based on cloud computing services
Zhang wei(9)42
Ransom worm virus monitoring method based on distributed honeypot technology
Qin Yujie(9)45
Cyber security analysis and attack experiment on IEC60870-5-104 SCADA system
Jiang Zexin(10)1
Research on hardware in the loop simulation model based on industrial control system of power plant information security
Su Chang,Xiong Shenduo,Luo Anqin, et al(10)5
DGA domain ensemble detection method based on deep learning
Luo Yunqian,Wu Jiang,Wang Yanwei, et al(10)10
Architecture design of big data analysis and management platform based on Hadoop
Zhang Wei(11)30
Title
AuthorIssuePage
Security architecture based on blockchain for smart Cloud manufacturing
Du Lan,Chen Linlin,Zhang Li, et al(11)34
Research on a collaborative method of penetration testing based on STIX information interaction
Liu Yue,Zhang Haifeng,Zhang Liang, et al(12)1
Research on risk assessment model of grade protection based on Bayesian network
Zhao Yiming,Xie Jiong,Wang Gang, et al(12)6
Architecture design of Cloud encyclopedia system for power enterprises
Zhang Wei(12)11
InformationCommunication
IoT platform and the open evaluation of its Cloud platform
Jia Xueqin, Hu Yun, Xing Yulong(1)62
Research on security and protection technology of big data platform
Liu Minghui,Chen Tian,Wang Zhuxin(1)65
Anomaly detection method based on pattern frequencies in wireless sensor networks
Shi Xiaobin,Wu Danping,Cheng Hongju(1)70
Computer-aided minimally invasive surgical navigation system based on augmented reality
Huang Weiping,Wei Mengyu,Du Min,et al(1)76
Wireless secure enhancement with cooperative jamming in cooperative communication system
Zhou Qian,Zang Guozhen,Peng Lei,et al(1)81
An improved estimation algorithm of frequency offset and its application
Liu Kai, Zhou Yuanping(1)87
Application and optimization of TIPC in embedded cluster system
Shi Si, Ye Jianfang, He Rui(2)63
Multi-hop broadcast protocol in VANET based on fuzzy logic approach
Liao Enrui, Pan Yanyan, Song Xiang(2)68
Design of wide-band aperture-stacked patchmicrostrip antennas
Zhou Bing,Zou Chuanyun(2)72
GLONASS satellite navigation signal simulation and software development of receiving verification
Ben Xing,Song Maozhong,Xiong Jun(3)96
A multi-hop uneven clustering algorithm for wireless sensor networks with energy balance
Ma Weifeng, Chen Guifen(3)100
Design of the remote payment device for IC card water meter based on Bluetooth communication
Chang Xingzhi(3)105
A novel adaptive threshold algorithm used for CDMA2000 1x pilot channel capture
Wang Wenshi, Xia Wenlong, Guo Qinggong(4)79
Immune particle swarm optimization algorithm for DV-Hop localization
Wu Zhenzhen, Fang Wangsheng(4)84
Research and improvement of beamforming algorithm
Liu Quan, Zhou Yuanping, Xu Lei, et al(4)88
An improved construction algorithm for adaptive QC-LDPC codes
Fan Renji, Zhao Danfeng(5)58
Research on WiFi assisted IMU indoor location method
Yuan Guoliang,Xie Kui(5)62
Application of translation invariant wavelet in pulse wave signals de-noising
Wang Taikun,Zhang Haiying,Zhang Yitao,et al(5)66
Research on hybrid routing technology for navigation constellation
Zhang Fang,Zhou Gan,Yu Yaoyao, et al(6)94
Non-linear transceiver design for MIMO interference broadcast channel with CSI error
Jia Yaping,Geng Xuan(6)99
Design of Ku-band portable radar transceiver system
Cai Chang, Yang Hao, Du Zebao, et al(6)104
Title
AuthorIssuePage
A method for the maximum throughput of the RB-HARQ implemented in secure transmission
Wang Lei,Guo Daoxing,Jiang Xuanyou(7)62
Design and implementation of CMA blind equalizer and PLL based on GNURadio
Li Xiaoguang,Pan Kegang(7)67
Joint resource allocation and layer selection for scalable video transmission in long term evolution system
Xing Zhihao,Yang Bowen,Yang Jian(7)71
Research and implementation of the Kepu Cloud Webcast system based on Nginx
Ma Aitian, Geng Lihong, Wang Runqiang,et al(8)54
Radar receiving front-end technology with frequency monitoring capability
Zhang Qiuyan,Wang Chao,Chen Yanjun(8)58
Design and implementation of multi-channel vector signal source based on PXI bus
Zhang Qiuyan, Zhang Peng(9)76
Research on IMM based on coordinate transformation in vehicle positioning
Jiao Yuqi, Niu Rui,Xia Zhi(9)80
Interference suppress method for UAV communications in two-way mobile relays
Yang Runfeng,Luo Chunbo,Zhang Yiqun(9)85
Research and analysis of terminal replacement technology
Lu Wei,Li Yiqun,Li Jiajun,et al(9)89
Design of high speed data center interface unit based on ZYNQ
Lv Junjie,Wu Jie(10)51
Study on dual-tone signal frequency estimation based on expectation maximization algorithm
Yuan En,Liu Peng,Chen Longliang, et al(10)55
Study on cache strategy of small cell networks supporting MEC
He Jiaohong, Pan Peisheng(11)69
Reliability-based HARQ assisted irregular LDPC code in secure transmission
Wang Lei,Ding Xiaohui(11)74
Efficient spatial reuse mechanism for FD relay in MAC layer of wireless Ad Hoc networks
Song Yu,Qi Wangdong,Zhao Weiwei(11)79
Adaptive tracking algorithm of interference polarization state in satellite communication
Qi Shuai, Guo Daoxing, Zhang Bangning, et al(12)48
Optimal design of M-APSK modulation constellation approaching Gaussian channel capacity
Jiang Xuanyou,Wei Yimin,Wang Lei, et al(12)52
IntelligentAlgorithm
A collaborative filtering recommendation algorithm based on double-dimensional cloud model
Liu Meibo,Man Junfeng,Peng Cheng,et al(1)92
Accuracy analysis and inversion method of robot hand-eye calibration based on HALCON
Yang Houyi(1)97
User type-based incentive mechanism design in participatory sensing system
Lin Yeting,Chen Zhonghui,F(xiàn)eng Xinxin,et al(1)101
Dynamic gesture recognition based on SVD feature compression and HMM
Jiang Haijun, Xie Jun, Duan Guolun, et al(1)106
Aerial image enhancement based on multi-scale domain and energy feature
analysis
Liu Chang, LiaoYipeng(1)111
Research on method of fault prediction based on gray metabolism model and neural network
Gao Xuanxuan, Li Changyun, Lei Xiaowei(1)115
Research of reuse technology based on the Ext JS framework MVC model
Zhou Yu,Wen Jinhua,Xu Jianliang(2)46
Optimal allocation method of testability index based on cost function
Wang He,Zhu Zhiping,Wang Guiteng, et al(2)51
Referee document segmentation system based on natural semantic processing
Zheng Shaowan, Lu Peimin(2)55
Title
AuthorIssuePage
Transmission method for robot exploring map under wireless low bandwidth
Zhang Hongyang, Xiao Yufeng, Liu Ran(2)58
Target recognition method based on three frame difference method and clustering algorithm
Liang Qiong, Cai Yongda, Lu Meimei, et al(3)57
The method and its application of remote sensing image fusion based on AIHS
Hu Jiawei, Liu Junqing, Wang Kang, et al(3)61
Research on the decentralized fault diagnosis algorithm for building electrical system based on SVM
Zhao Xuechen,Xing Jianchun,Wang Ping,et al(3)65
A method of visibility detection based on multiple regression
Tang Shaoen, Li Qian, Gu Daquan, et al(3)70
Distance transform based PRM path planning algorithm
Li Min,Zhou Yuanyuan,Huang Lu(3)74
Network software defect prediction method based on association rules
Hu Liu, Deng Jie, Zhao Zhengwei, et al(4)41
Study on the alignment algorithm for sequencing based on region filtering
Ding Shengnan, Wu Ming, Xu Yun(4)45
Comparison of deep forest and artificial neural network in prediction of PV output
Shen Wenbo, Sun Rongxia, Ma Shaoqing, et al(4)49
Research of intelligent searching system of mediums
Guan Li, Zhang Xiangwen, Zhang Fan, et al(4)52
Research of directed map matching based on Hidden Markov Model
Chen Zhonghui, Wang Biao, Feng Xinxin, et al(4)55
Mobile augmented reality registration algorithm based on natural features
Xie Zhenchao,Huang Jun,Zhang Lei,et al(5)71
An improved dehazing algorithm based on dark channel prior
Yang Bin, Lin Zhixian,Guo Tailiang(5)75
An improved weighted frequency differential electrical impedance tomography algorithm
Zhang Xiawan(5)80
Greedy EM algorithm based on MapReduce framework
Cao Jiaqing,Wu Guanmao(5)84
Collaborative filtering algorithm based on fuzzy C-means and weighted method of eigenvalues
Zi Yunfei, Li Yeli, Sun Huayan, et al(6)54
Estimation of lithium battery SOC based on KPDF algorithm
Xing Yunfeng,Zhao Ye(6)59
Improved SDT algorithm based on data sensitivity adaptation
Zhang Hanxiao,Mu Fuqi,Lv Xinyan(6)64
Study on deep Boltzmann model with variable parameter
Wang Na, ChenXianfu(6)68
Study on the shortest path selection based on Floyd improved acceleration algorithm
Ma Ying, Chen Zhilong, Liu He, et al(6)72
Optimizing particle filter algorithm using butterfly algorithm
Liu Yuntao(7)37
Virtual network mapping alogorithm for file storage
Chen Chen,Zheng Quan,Wang Zhizhen, et al(7)42
Study on DNA algorithm based on diploid dominant mechanism
Xu Kai, Chen Xianfu(7)46
Task scheduling based on chaotic disturbance particle swarm optimization algorithm in Cloud computing environment
Xu Xiangyang,Zhang Fanglei(8)27
Comparisons on fusion algorithms of Landsat 8 OLI multi-spectral and panchromatic images
Jiang Xiaochen, Deng Zhengdong, Wu Guoying, et al(8)31
Fuzzy C-means clustering algorithm based on particle swarm optimization
Wang Yugang(8)36
Research on multi-target face recognition based on adaptive threshold PCA
Hao Gang, Liang Peng(9)49
Title
AuthorIssuePage
RHC construction method for binary search decision tree
Xu Youwei,Zhang Hongjun,Cheng Kai, et al(9)52
A multi-threshold moving target detection algorithm for home security based on OpenCV
Liu Zhicong,Chen Dewei,Li Hongyang, et al(9)57
Random number generator based on LFSR supporting both parallel and serial
Wang Chao,Zhang Qiuyan,Zhang Shan, et al(10)15
Research on fighting evaluation algorithm based on SVM
Chen Zejia,Zeng Peifeng(10)19
Noise base processing of LPI signals based on Welch and flexible morphology
Geng Changqing,Yang Chengzhi,Zhang Zhigang, et al(10)24
An improved collaborative filtering algorithm based on user clustering and item clustering
Luo Xian, Ding Qing, Wang Yu(10)28
Video stabilization algorithm based on adaptive camera motion speed
Hu Qi,Luo Jianxin,Hu Guyu, et al(10)32
The research of Point cloud global registration based on region division
Zhou Jianzhao,Du Wenchao,Yan Yuji, et al(11)39
A method to generate hashtag vector and build hierarchy architecture of network users′ self-describing hashtag
Sun Yi,Qiu Hangping,Wang Qinxue(11)44
The analysis and improvement of A*algorithm based on Virtual Reality
Song Jian,He Xiaohai,Wang Zhengyong, et al(11)50
Method for extracting cable in aerial image
He Banggeng,Wu Xiaohong,He Xiaohai, et al(11)54
Symmetric similar image completion based on redefined priority
Zheng Chengsong, Li Qi(12)14
Design and implementation of an event-driven biometric identification framework service
Jiang Linxuan, Yu Jie, Liu Xiaodong, et al(12)18
Research on task scheduling algorithm based on trust subject and benefit value in Cloud computing environment
Wu Zhou(12)26
Estimation of reservoirs capacity based on ZY-3 and Landsat 8 OLI
Jiang Xiaochen, Deng Zhengdong, Wu Guoying(12)30
ArtificialIntelligence
Study on inspection robot SLAM in open environment
Ren Jie,Song Jiantao,Li Gongyan(3)80
Design and research of motion analysis device based on STM32
Fang Xiaoming,Su Kaixiong(3)84
Least-squares regression subspace segmentation using manifold dimensionality reduction method
Lin Zhipeng, Huang Zengyu, Jian Cairen(3)88
Design and realization of vehicle pedestrian detection system based on ZYNQ
Deng Jianfeng,Xie Yun(3)91
Study of speaker adaptation method based on deep neural network
Gu Dian, Li Hui(4)60
Face points detection based on optimized parallel AlexNet model
Chen Dongmin, Yao Jianmin(4)65
Wheat kernel recognition based on Laplacian convolution network and SMM classifier
Kang Pengxin, Qing Linbo, Teng Qizhi, et al(4)71
Digital recognition based on deep learning in TensorFlow platform
Jin Tao, Zhang Yongai(4)74
A fast method of vehicle identification
Hu Peng, Bai Tian, Xu Xiaolong(5)41
Research on improved convolutional neural network in answer selection module
Xu Chang,Zhang Lin(5)46
Title
AuthorIssuePage
Car detection based on EdgeBoxes and rotation-invariant features
Lou Yuqiang, Jiang Huatao, Chang Lin,et al(5)50
Research on speech enhancement algorithm based on generative adversarial networks
Ke Jian, Xu Zhijing(5)54
A method of Web document classification based on fusion of various information
Duan Guolun,Xie Jun,Guo Leilei, et al(6)76
A method of facial expression recognition based on island loss
Zeng Yiqi,Guan Shengxiao(6)80
Deep recurrent Q-learning method for traffic signal optimization control
Shi Saijiang,Chen Feng(6)85
Online real-time human action detection based on continuous frames
Zhou Daoyang, Guan Shengxiao, Xia Yuwei(6)90
Small-size pedestrian detection via deep convolutional neural network
Guo Aixin,Yin Baoqun,Li Yun(7)50
A LSTM-based method for vehicle detection in video
Li Suichan,Chen Feng(7)54
RGB-D co-saliency detection via multi-view information fusion
Wu Qianshen(7)58
Facial thermal infrared image generated on GAN
Wang Yaxin,Shi Xiaoxiao(8)40
A fast time-space stereo matching method based on advanced driving assistance system
Zhu Sujie,Wang Meng(8)45
Research on brand vehicle sales forecasting based on network search data
Xie Tianbao,Cui Tian(8)50
A dynamic soft sensor model of PTA average particle size based on CNN-XGBoost
Zhou Peng(9)61
Multi-barcode detection and implementation based on deep learning
Zhou Mian,Liu Binghan(9)65
A method for batch Web image annotation based on surrounding text information
Guo Leilei,Yu Lu,Duan Guolun, et al(9)70
Flame detection based on logistic regression model
Guan Hongyun,Yang Yiwei,Wu Wei, et al(10)36
Distributed kernel-based online AUC maximization
Liu Xin,Pan Zhisong,Zhou Xingyu, et al(10)41
TCD medical data classification based on FSVM algorithm
Wang Zhiyuan,Wu Chenghao,Wang Zheng, et al(10)46
Seismic first arrival picking based on fully convolutional networks
Liu Jianan,Wu Jie(11)58
Vehicle detection and recognition based on highway monitoring video
Chen Weixing,Bai Tian,Xu Xiaolong(11)64
Wheat recognition method based on spectrum properties and adaptive wormhole positioning
Wang Zhoupu,He Xiaohai,Wu Xiaoqiang, et al(12)35
Target occlusion detection algorithm based on KCF
Wang Depei,Xie Yun(12)39
Image recognition comparison based on Naive Bayes and Semi-Naive Bayes
Liu Chuang(12)44
IndustrialAutomationTechnology
Research and application on smart manufacturing system implementation methodology in new energy Industry
Li Mojun, Han Qingmin, Du Junzhao(1)118
Research of energy management strategy for fuel cell hybrid power system of multi-rotor unmanned aerial vehicle
Zhang Zhixiang,Xiao Duo,Wang Jiabin(1)122
Title
AuthorIssuePage
Simulation technology research of operation monitoring software for KSN system in nuclear power plant
Cheng Minmin,Jing Yinggang,Zhang Caike,et al(1)127
Early-warning assessment of gas disaster based on MC-AHP-FCE system
Xu Haoli, Wang Daqing, Deng Zhengdong, et al(1)131
Intelligent detection technology of high speed rail based on simplified particle swarm optimization
Wang Man, Wang Heng, Zhang Hua(2)77
A kind of industrial flaw detection technology based on intelligent machine vision recognition
Niu Qian,Liu Guihua,Kang Hanyu(2)81
Research on the displacement measurement accuracy of eddy current sensor inindustral control
Song Shilan, Lu Wenke, Zuo Feng(2)85
Design of motion controller in flat-panel detection and conveying platform based on STM32F4
Zhang Qun,Tao Xiaojie,Zhang Lan, et al(2)90
The implementation of control system for omni-directional mobile platform
Zeng Lingdong, Pei Dong, Wang Quanzhou, et al(2)95
Edge computing based industrial data acquisition
Ma Jijun, Jia Xueqin, Shou Yanbo, et al(4)91
Chamber earth pressure balance control for shield machine based on PSO-BP prediction model
Li Qiang, Li Jingxuan(4)94
A control strategy of droop control inverter and diesel generator parallel operation
Huang Jiahao, Wang Jinquan, Xu Ye, et al(4)100
The design of land subsidence layered monitoring device based on eddy current sensor
Lv Zhonghu, Zhang Qing, Zhang Xiaofei(4)106
Design and realization of master control computer’s power supply control management of missile launcher
Jing Desheng, Zhang Kun(4)109
Online detection of servo system resonance based onEtherCAT
Guo Gaojie,Jiang Ping,Li Xin,et al(5)102
An automatic testing system for audio function of Android devices based on the voiceprint recognition technology
Li Jiawei, Hu Hailong, Lin Zhixian(5)106
The application of active object computing model in industry robot system
Yin Binglei,Dong Bolin(5)110
The design of human-machine interface on flat panel display inspection system
Li Yang,Lin Xiao,Wang Zhujie, et al(6)108
Multi-channel ultrasonic excitation and data acquisition and transmission method
Ding Xiaochao,Yang Yuan,Chen Fu(6)112
A design of high precision batch test equipment for chip capacitor
Liu Shumeng, Feng Guobing, Wang Long, et al(6)117
Design of online inspection system for frying oil quality based on Internet of Things
Huo Huiqing, Ou Wen, Mo Hongbo, et al(7)77
Analysis on the application of Cloud computing in elevator industry
Wu Xiangrong(7)82
Anti-haze expressway light control system based on ZigBee network
He Zili, Zhang Lina, Zhang Fangxin, et al(7)86
Research on pasture positioning technology based on active RFID
Lu Shengwen,Ou Wen(7)90
Measuring the width of laps on tobacco rods based on image processing
Wen Tao, Han Long, Wen Yifu(7)95
The research on operating characteristics of diesel generating set with constant power pulse load
Xing Xin,Wang Jinquan,Xu Ye, et al(8)62
Design and realization of a burst pulses generating system based on FPGA
Feng Chuanjun, He Yang, Dai Wenfeng(8)70
Four type of prevention of the process control system
Su Yaodong(8)73
Research on tool image preprocessing system based on FPGA
Wen Jiajing, Fan Hong, Zhu Jiangze, et al(9)94
Title
AuthorIssuePage
Maximum power point tracking based on improved grey wolf algorithm
Yang Lili, Sun Rongxia, Wang Shuonan(9)97
Design of intelligent beat system for electric locomotive assembly line
Yang Chen,Sun Li(9)101
Study on power characteristics of energy storage battery based on equivalentcir cuitmodel
Liu Yaobin, Xu Ye, Li Jianke, et al(9)105
Design of ergodic scanning maximum current point photovoltaic panel tracking system
Bo Zhongya(10)59
Design and implementation of a portable test equipment about ground proximity warningsystem
Xia Xiaochun, Wang Jian, Zhao Xiaoqing(10)62
Research on the problem of voltage fluctuation of generator terminal under pulse load
Liu Bo,Huang Kefeng,Xu Ye(10)66
Design of industrial customization production system based on Internet of Things
Xie Renxu,Chen Dan,Xu Zhezhuang, et al(10)72
Research on fuzzy sliding mode control strategy of servo motor based on NTSM
Huang Hao,Tu Qunzhang,Pan Ming, et al(11)84
Optimization of authentication mechanism for communication process between domestic PLC system and OPC UA
Zhao Yueqi, Min Xiaoshuang(12)58
Design of intelligent lighting control system based on ZigBee
Zhang Bin,Hou Yanyan,Zhao Tao(12)62
ComputerHardware
Modeling of SRD and its application in chipless RFID system
Zhang Jinghua, Guo Haiyan, Zou Chuanyun(2)100
Designing a sectional structure DAC for 10 MHz 8-bit SAR ADC
Xu Weijia, Tian Junjie, Li Yanbiao, et al(2)104
Design and simulation of the universal broadband current amplifier based on current mode circuit
Feng Hao,Zhao Baishu,Li Xuancheng(3)109
Design of a low jitter and fast locking clock and date recovery circuit
Hu Tengfei, Fang Yi, Huang Lu(3)113
The design and implementation of RTK positioning system based on NEO-M8P
Liu Lianjun, Huang Jiwei(3)117
Automatic weather station control module design based on ARM9
Ye Nan, Liu Huazhi, Lu Xu(4)112
A new charge pump regulator with small ripple voltage
Ouyang Tuori, Huang Lu(4)116
Research and design of NFC access control system
Cao Zeling, Wang Qi(5)88
The analysis of front-end signal of ultrasonic corrosion on-line monitoring system
Wang Run,Meng Lingya, Liu Jingshu(5)93
Design and research of K band pHEMT down-conversion mixer
Li Gang, Yu Kai, Li Sizhen,et al(5)97
The design and implementation of i.MX6-based radar display terminal
Li Hongbing(6)121
Optimization control strategy of hybrid energy storage system for isolated microgrid with pulse load
Shi Meng, Wang Jinquan, Huang Kefeng, et al(6)125
The design of FMMU module in EtherCAT slave controller based on FPGA
Yao Wangjun,Lin Hao,Wang Yongli, et al(8)77
A method to detect S mode ADS-B preamble pulse
Wang Yongli,Yao Wangjun,Chen Yanjun, et al(8)83
Design of an anti-fog and haze intelligent mask
Xu Lei,Zhou Yuanping,Huang Siyuan, et al(8)88
Title
AuthorIssuePage
A method of interactive holographic projection using Leap Motion
Lv Baoyuan, Cai Yucheng, Lin Weida, et al(10)78
Hardware implementation of adaptive threshold FAST feature point detection algorithm based on FPGA
Cheng Biao,Huang Lu(10)82
Research and design of portable photoconductive acoustic fire extinguisher
Guan Hongyun,Su Zhentao,Wang Chen(11)92
A method of vehicle direction recognition based on double wave sources
Qin Pan,Zhang Benniu,Zhang Minghui(11)96
Research of interactive fault reasoning based on process data module
Meng Lirong,Ma Yongqi,Cheng Zheng, et al(12)66
Design and development about OPC UA server based on the localization software and hardware platform
Min Xiaoshuang,Yang Xin(12)71
IndustrialApplication
Ship object tracking based on long-term correlation filter
Chen Wei,Li Juelong,Xing Jianchun,et al(1)135
Design of water quality monitoring system based on Beidou short message communication
Wang Xingxing, Jiang Lan, Huang Ke, et al(1)139
Laboratory security system based on STM32 and ZigBee wireless communication
Zhu Lijuan, Yun Zhonghua, Bianbawangdui, et al(1)143
The application of motion target detection in single-soldier combat
Zhang Zhixian, Zhang Kai(2)108
Design of an on-satellite solid-state power amplifier driving power
Dong Shuo, Chen Zan, Wang Zhengzhi, et al(2)112
Research on brain-computer interface system based on Emotiv
Chen Kan, Zhang Shengli, Ding Fan(2)116
Analysis and development of a high power repetetive charging power supply
Feng Chuanjun, He Yang, Dai Wenfeng(2)119
Infrared and visible light images matching based on corner and edge
Ge Wen, He Bo(2)122
An improved dual MAC intelligent speech front-end algorithm
Fang Saihong(2)127
Design of a dual-use solar tracker based on STM32 and LABVIEW
Su Yang,Liu Qingqing(2)131
Application of hybrid iterative learning in vehicles engine idle speed stability control
Cui Jianping, Li Dengke, Liu Chengji(2)135
Intelligent gateway technology for monitoring power battery manufacturing environment
Xu Xunting, Mei Lingliang, Luo Dehan(2)140
Research on heart beat simulation technology in virtual surgery
Liu Bo,Chen Guodong,Wang Na(2)143
Extraction of slice abstraction from program source code and its application in code search
Li Runqing,Zeng Guosun(3)122
Monitoring and management system of urban underground pipe network based on RFID/GIS
Zhang Guangxu,Chen Mingzhi, Mao Wuxing, et al(3)126
Data processing scheme based on data buffer pool technology for secondary device
Li Jin,Gao Shou(3)131
Design of remote monitor system for load weak current
Yang Feng,Tong Xuan,Li Jianqi(3)134
Rapid detection of weak radionuclide in moving target
Wang Changlong, Zhang Jiangmei(3)137
Simulation of AC/DC distribution network and flexible substation
Xie Teng, Kang Mengjie, Wang Puyu, et al(3)140
Using COTS to reduce the cost of spacecraft
Zhou Jianbo, Cong Yanchao, Zhao Pengfei, et al(3)144
Study on the application mode of intelligent residential district based on traffic card
Wu Guanhua, Yu Hongling, Wu Jincheng(3)150
Title
AuthorIssuePage
Automatic optimization algorithm and its implementation of treatment effect of external counterpulsation device
Xiao Qianjun(3)154
Design of a wireless data acquisition system based on 6LoWPAN for civil structural monitoring
Chen Haiyan, Chen Zhicong, Zhou Haifang, et al(4)120
Design of wearable monitoring system for pulse pressure
Hu Wei, Wu Xuezhou, Zhu Chen, et al(4)125
Design and implementation of DMA controller based on PCIE bus
He Guangliang(4)131
Design and integration of e-mail system based on digital production workshop
Ren Kaibin, Zeng Pengfei, Hao Yongping(4)136
Application of JIRA in production abnormal handling practice
Zhang Kedian,F(xiàn)an Zhenqiang,Li Zhihao,et al(5)115
Design and implementation of the 3D assistant evaluation system of solid mineral reserves
Peng Bin, Chen Zhixiao(5)119
Design of intelligent escape guidance system for tunnel traffic
Yao Dan, Zhu Yingxue, Wu Yan, et al(6)130
Research and application of open-ended fund transfer agent system based on middleware
Chen Songnan(6)134
The comparison of two kinds of heart rate and respiration rate extraction algorithms for piezoelectric signal
Jia Xuebin,Liao Xiwen,Shang Chunheng, et al(7)98
Research on dynamic temperature field of atmosphere sintering furnace based on ANSYS
Li Qiang,Wang Lu(7)102
The program design of teaching response system based on ZigBee
Chen Ke, Su Luyang,Yang Bifeng(8)91
A study of stock price behavior based on feature selection and HMM
Yu Yongsheng,Xie Tianyidan,Liu Chang, et al(8)96
Research and design of logistics information monitoring platform based on vehicle interconnection
Zhang Ailing, Cao Lei(9)110
A study of IC card transfer application technology based on NFC mobile phone
He Jianbing,Xu Feng,Leng Mengtian(9)114
The real-time automatic positioning system design of Hall sensor
Wang Yuanyin,Yue Cairui,Li Zhenshan, et al(9)118
The design and implementation of three-dimensional core image browsing system based on B/S model
Chen Cen,Qing Linbo,He Xiaohai, et al(10)87
Transformation practice of micro service architecture for intelligent terminal operation management system
Wang Weiguo,Pan Yu(10)91
Development and application of offshore oil platform pollutant online monitoring software
Hu Bin,Yang Min,Xu Dong, et al(10)95
Application of MES system in aquaculture workshop
Zou Jialin,F(xiàn)an Baode,Han Zhaoyu(10)99
Research and implementation of adaptive image enhancement algorithm based on AM5728
Guo Wei,Qing Linbo,Xiong Shuhua, et al(11)100
Design and implementation of browsing and enhancement system for moving freight car images based on Canvas
Gao Siwen,Qing Linbo,Xiong Shuhua, et al(11)104
Application of blockchain technology in civil aviation
Wang Tianshan,Yang Jian,Wang Yao(11)109
Face recognition method based on dimensionality reduction and its application
Jian Cairen, Zhuang Lingyu,Lin Zhipeng(12)75
Research of enterprise information system integration and security mechanism based on cloud computing
Zhi Yanli(12)79
Application research of biomimetic olfactory in odor recognition of air purifier
Ma Dongxu, Luo Dehan, Xu Xunting, et al(12)82