default search action
SPCNC 2023: Xiamen, China
- Proceedings of the 2nd International Conference on Signal Processing, Computer Networks and Communications, SPCNC 2023, Xiamen, China, December 8-10, 2023. ACM 2023
Chapter 1- Sensing Signal Processing and Target Tracking
- Xunbo Zhu, Shuangqing Lv, Zhilong He, Zhengguo Yang, Xuefang Li, Jianhong Zhao:
Bearings-only passive location mathematical model for UAV cluster based on three points. 1-5 - Honglin Wu, Xueqiong Li, Long Lan, Liyang Xu, Yuhua Tang:
Towards Radar Emitter Recognition in Changing Environments with Domain Generalization. 6-11 - Weicai Luo, Qi Xi, Jing Wang:
Codebook-based digital fountain encoding and decoding method. 12-16 - Minghui Ding, Kai Zhu, Lei Yue, Shuang Liu, Yuhong Shi, Shuaishuai Yang, Chao Li:
Research on USBL Positioning Multi-target technology Based on COSTAS Frequency Hopping Signal. 17-22 - Ziang Fei, Guanghua Lu:
Joint Transmit and Passive Beamforming Design for IRS-assisted ISAC System Based on Cramér-Rao Bound Optimization. 23-28 - Miaolei Deng, Yupei Kan, Haihang Xu, Chuanchuan Sun:
A Review of Intrusion Detection Research Based on Deep Learning. 29-35 - Qinghao Zhu, Fei Wen, Xinyu Li:
Design of Short Wave Anti Fading Monitoring System Based on Large Aperture Polarization Sensitive Array. 36-41 - Tong Liu, Wei Yu, Jiasheng Chen, Lun Xin, Fei Yu, Yinfei Xu:
Federated Learning with Sample-Level Class Balancing Aggregation. 42-46 - Xiaoyang Peng, Fangjie Yu, Yongcheng Gu, Jianguo Zhu, Muyu Zhang:
Acceleration Signal Integration Method Based on Variational Mode Decomposition. 47-53 - Yuangang Lu, Ke Ma, Maohui Peng, Shuai Zou:
Exploration of 5G wireless network coverage scheme in cement factory. 54-59 - Huanyin Zhou, Feiyan Xu, Feifei Wu, Yanhui Xie, Weiqi Huang, Jiewei Hu:
Study on Pulse Polarity Self-Adapting of Digital MCA. 60-65 - Lirong Zhang, Jingxuan Ma:
A method for flexible transmission based on FlexE granularityFlexE granularity for flexible transmissionBased on 1G, 1.25G and 5G granularity allocation. 66-71 - Hailong Xu:
Research on voice recognition and control technology for the elderly at home. 72-77 - Yanping Hu:
Design of a novel ultra-wideband antenna with six notches. 78-82 - Yihai Hu, Yongsheng Xiao, Ke Zhao, Lizhen Huang:
Radar Working Mode Recognition Algorithm Based on Recurrent Neural Networks. 83-88 - Yan Chen, Li Wang, Jiuxun Sun:
Measurement of dielectric constant based on time-domain ground-penetrating radar curve imaging algorithm. 89-92 - Shuhang Chen, Feng Xu, Kaiming Su:
A new Energy-Saving Sector Clustering Data Aggregation Method in Wireless Sensor Networks: Energy saving sector clustering data aggregation method. 93-97 - Jiansong Wang, Wei Lin:
YOLOGP: A YOLOv5-Based Lightweight Network for Efficient Vehicle Detection in Autonomous Driving Scenarios. 98-105 - Sicong Chen, Ying Liu:
Distributed Multi-kernel Learning Based on Gaussian Mixture Model with Missing Data. 106-111 - Yongjie Li, Huanpeng Hou, Jizhao Lu, Wenge Wang:
Research on channel quantitation and key negotiation technology in key generation based on satellite-ground communication. 112-117 - Hui Zhang, Xiaoming Liu, Yuqing Cheng:
Multi-extended Targets PHD Filtering Tracking Algorithm with Unknown Measurement Noise Distribution. 118-123 - Lishan Yang, Chenglin Bai, Hengying Xu, Yining Zhang, Guizhen Wang:
Energy-Balancing Data Acquisition Strategy by Employing Graph Signal Sampling-set Rotation Method for Edge Computing Enabled Industrial Internet of Things. 124-129 - Daqi Zheng, Xian Zhu:
A Robust Fast Dominant Mode Rejection Algorithm. 130-135 - Xurui Li:
Exploring Dynamic Class Instantiation and Imagick Extension Vulnerabilities in PHP: Insights and Techniques in Securing PHP Applications - A Comprehensive Guide to Dynamic Class Instantiation and Imagick Extension Vulnerabilities. 136-140 - Li Ai, Jingtao Guo, Jin Ji:
Analysis and Research of Communication Abnormalities of Remote Data Collectors. 141-145 - Yunwei Li:
Research on Badminton Target Positioning and Tracking Technology Based on Wireless Sensor Network. 146-151
Chapter 2-Computer Network and Communication Frontier Technology
- Qian Wu, Yangfan Li, Zhifeng Tian:
Design and analysis of transmission relay protection signal transmission for fiber optic communication networks. 152-156 - Weixing Chen, Jing Zhao, Xinyi Li, Xiaolei Fan:
SDWSN Routing Optimization Algorithm Based on Adaptive Factors and Gaussian Perturbation Particle Swarm Algorithm. 157-161 - Shouzhen Zhang, Fei Jiang, Mingdong Li:
Facial Expression Recognition Based on Improved VGG16 Convolutional Neural Network. 162-168 - Xiaolong Li, Kongpeng Wei, Hongbin Gu, Bo Liu:
Research and Application of Network Security Situational Awareness Technology Based on Ridge Regression. 169-173 - Jianxin Liu, Fuge Wang, Qingkun Zhuo, Xue Yang:
PCIE-Based Shared Memory Technology between BMC and CPU. 174-179 - Xiao Peng, Chaobing Huang:
An Improved Real-Time Multiple Object Tracking Algorithm Based on YOLOv8. 180-184 - Fuqiang Ma, Lixun Xie, Fengming Wu:
Numerical Modeling and Signature Analysis on Radiated Noise properties of Underwater Propulsor. 185-191 - Liheng Li, Xiulin Qiu, Bo Song, Yaqi Ke, Yuwang Yang:
Topology Maintenance Optimization Algorithm Based on Deep Reinforcement Learning in High Dynamic Flying Ad-Hoc Networks. 192-198 - Qingchen Zhou, Xianzhao Shen, Mingming Xu:
A beam domain cluster targets super-resolution DOA estimation method. 199-203 - Chunliang Ma, Jun Ye, Wei Wang, Guansheng He:
Deep learning for multi-data fusion in gravitational wave search. 204-209 - Chenglin Cai, Mingjie Wu, Kaihui Lv:
Integration of Singular Spectrum Analysis and Adaptive Neuro-FuzzyInference System for BDS-3 Clock Bias Prediction. 210-214 - Li Jia:
Design of Lora Communication System Based on Speech Recognition in Emergency Rescue Environment. 215-219 - Yuhao Deng, Lin Li:
Analysis and Experiment of Radar Position Clutter. 220-223 - Yinwei Jiang, Hongfang Lv, Ran Ren:
Research on human pose estimation technique based on depth-separable convolution. 224-229 - Ran Ren, Hongfang Lv, Yinwei Jiang:
Uav track planning based on Chaotic Golden Jackal Optimization algorithm. 230-234 - Zaocai Xu, Yang Yang, Yi Ji, Dinggan Cheng:
Automatic Positioning System for Industrial CT Image Defects Based on Machine Vision. 235-239 - Lujie Yan, Guohua Wang, Peng Zhang:
Optimal Relay Algorithm for Unmanned Aerial Vehicles Based on Location Prediction. 240-244 - Bo Zhou, Yang Song, Jie Ai:
Time-frequency analysis of non-stationary signals based on short-time Fourier transform. 245-248 - Jian Lin, Xue Chen, Li Chen, Pengfei Wang, Dishan Yang:
Data Loss Recovery Strategy for Distribution Network Differential Protection Based on 5G Communication. 249-253 - Shisong Yang, Peng Yang, Teng Wu:
Research on Simulation of Satellite Communication Networks Based on Non cooperative Games. 254-259 - Jiakai Zhou, Yang Wang:
A Novel Annotation Method on RGB Images for Head Pose Estimation. 260-264 - Lei Zhang, Long Xie, Xutao He, Xiaobo Lin, Jiangzheng Shu, Qile Wang:
Research on Underwater Acoustic Detection Based on Submarine Cable Distributed Acoustic Sensing. 265-270 - Hongyang Xu, Haisheng Song:
A low-scattering Vivald antenna in the K-band. 271-277 - Chaobing Wei:
Research on training image recognition based on deep Convolutional neural networks: A case study of the hand-held insulated ladder recognition model. 278-283
Chapter 3- Network Security Supervision and Intelligent Recognition Technology
- Zhongjun Ding, Zhiyuan Li, Dewei Li:
Underwater Image Fusion Enhancement Algorithm based on Color Correction and Sharpening. 284-289 - Haiyan Cheng, Ruiqi Yang, Guangzhi Di:
Boundary Detector Network with Squeeze-and-Excitation Network for Semantic Segmentation of Remote Sensing Images. 290-295 - Xi Pan, Haisheng Song:
A Broadband U-shaped Slot Coupled Antenna with T-shaped Microstrip Feed. 296-300 - Yang Li, Yaodong Jia:
YOLOv5s object detection method based on separable convolution and SENet. 301-306 - Zeng Dou, Zhihui Yang, Yifan Tang:
Research on UAV Interception Path Optimization Based on Markov Decision Process. 307-311 - Na Li, Haijun Zhao, Naibin Zhai, Feng Wang, Yu An:
Automotive sound quality evaluation model based on EEG signal. 312-317 - Hao Xiao, Geguo Du, Yingyu Zhang, Wenjun Yang:
Realizing High Fidelity 3D Face of Images Using Self Encoding Networks. 318-322 - Long Zhao, Yu Wan, Hongyan Fang, Jixing Chen:
A Fusion Positioning Algorithm for WSN with BDS Based on Extended Kalman Filter. 323-326 - Xiaochun Xu, Weizheng Lin, Dingrong Chen, Nanling Su, Leinuo Tang, Changxu Cai:
A Completed Gaussian Extended Binary Pattern for Texture Image Classification. 327-331 - Jieyong Zhang, Wei Liang:
Identification of Important Nodes Based on Entropy and Neighborhood Relations in Complex Network. 332-338 - Yu Song, Rumeng Peng, Xu Feng, Kunli Zhang, Lei Zhuang, Mengyang He:
Parallel Deployment of Service Function Chains Based on Network State Prediction. 339-345 - Zhongran Zhou, Cheng Huang, Xuxi Zou, Lei Mao:
Lightweight Trusted Identity Architecture Based on Industrial Internet Cloud Edge Collaboration Technology. 346-349 - Weijun Gao, Xiaofang Zhang:
Research on the Improvement of the DPoS Consensus Mechanism Based on the EigenTrust Trust Model. 350-355 - Zhonghao Yin, Haiqing Liu, Xiao Lu:
Comparison of Kalman Filtering and Wavelet Transform for Noise Reduction in Excavator Hydraulic Cylinder Thrust Data. 356-360 - Haonan Li, Fang Wang:
Research on Defect Detection of Insulators in Transmission Lines Based on Improved YOLOv5. 361-366 - Adama Hawa Rahima Fofana, Jianjun Lei:
Reinforcement Learning Based Cluster Formation Algorithm in Wireless Sensor Networks. 367-371 - Fan Bai, Bin Jin, Mingjie Liu, Jingqiang Wang, Jiajie Liu:
Semantic Segmentation of Transmission Lines with Fusion of Convolution and Multi-Head Self-Attention. 372-377 - Nan Wang, Qinghua Zhang, Xu Yang:
Discussion on the Application of Tracking Codes on Color Laser Printouts in Information Security and Document Anti-counterfeiting. 378-383 - Furui Zhang, Guangya Zhu:
Analysis of Stray Light in Inter-satellite Beacon-less Laser Communication and Its Influence on Acquisition Probability. 384-389 - Tao Chen, Yi Zhuang:
A Dynamic Hierarchical Single Link Fault Recovery Scheme for SDN Based on Dynamic Hierarchies. 390-396 - Dongmei Bin, Fuchuan Tang, Yangguang Lin, Chunyan Yang, Ying Ling:
Application of Zero Trust Security Architecture in Power Communication Network Security Management System. 397-401 - Zhongyong Wang, Shufeng Zhang, Hong Sun, Kexian Gong, Honghua Liu, Wei Wang:
Fast Detection Algorithm for Equal Length Frame Signals Based on Pattern Matching. 402-407 - Junshan Yin, Chunna Li:
Feature selection SVM through Universum and its applications on text classification Feature selection SVM through Universum. 408-414 - Xinyi Ma, Fan Wang:
Deep Siamese Multi-level Feature Network for VIS and NIR Image Matching. 415-420 - Dongjin Huang, Zhenyan Li, Jinhua Liu:
A Novel Hairstyle Transfer Method using Contextual Transformer Blocks. 421-425
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.