


default search action
SPCNC 2023: Xiamen, China
- Proceedings of the 2nd International Conference on Signal Processing, Computer Networks and Communications, SPCNC 2023, Xiamen, China, December 8-10, 2023. ACM 2023

Chapter 1- Sensing Signal Processing and Target Tracking
- Xunbo Zhu

, Shuangqing Lv
, Zhilong He
, Zhengguo Yang
, Xuefang Li, Jianhong Zhao
:
Bearings-only passive location mathematical model for UAV cluster based on three points. 1-5 - Honglin Wu

, Xueqiong Li
, Long Lan
, Liyang Xu
, Yuhua Tang
:
Towards Radar Emitter Recognition in Changing Environments with Domain Generalization. 6-11 - Weicai Luo

, Qi Xi
, Jing Wang
:
Codebook-based digital fountain encoding and decoding method. 12-16 - Minghui Ding

, Kai Zhu
, Lei Yue
, Shuang Liu
, Yuhong Shi
, Shuaishuai Yang
, Chao Li
:
Research on USBL Positioning Multi-target technology Based on COSTAS Frequency Hopping Signal. 17-22 - Ziang Fei

, Guanghua Lu
:
Joint Transmit and Passive Beamforming Design for IRS-assisted ISAC System Based on Cramér-Rao Bound Optimization. 23-28 - Miaolei Deng

, Yupei Kan
, Haihang Xu
, Chuanchuan Sun
:
A Review of Intrusion Detection Research Based on Deep Learning. 29-35 - Qinghao Zhu

, Fei Wen
, Xinyu Li
:
Design of Short Wave Anti Fading Monitoring System Based on Large Aperture Polarization Sensitive Array. 36-41 - Tong Liu

, Wei Yu
, Jiasheng Chen
, Lun Xin
, Fei Yu
, Yinfei Xu
:
Federated Learning with Sample-Level Class Balancing Aggregation. 42-46 - Xiaoyang Peng

, Fangjie Yu
, Yongcheng Gu
, Jianguo Zhu
, Muyu Zhang
:
Acceleration Signal Integration Method Based on Variational Mode Decomposition. 47-53 - Yuangang Lu, Ke Ma

, Maohui Peng
, Shuai Zou
:
Exploration of 5G wireless network coverage scheme in cement factory. 54-59 - Huanyin Zhou

, Feiyan Xu
, Feifei Wu
, Yanhui Xie
, Weiqi Huang
, Jiewei Hu
:
Study on Pulse Polarity Self-Adapting of Digital MCA. 60-65 - Lirong Zhang

, Jingxuan Ma
:
A method for flexible transmission based on FlexE granularityFlexE granularity for flexible transmissionBased on 1G, 1.25G and 5G granularity allocation. 66-71 - Hailong Xu

:
Research on voice recognition and control technology for the elderly at home. 72-77 - Yanping Hu

:
Design of a novel ultra-wideband antenna with six notches. 78-82 - Yihai Hu

, Yongsheng Xiao
, Ke Zhao
, Lizhen Huang
:
Radar Working Mode Recognition Algorithm Based on Recurrent Neural Networks. 83-88 - Yan Chen

, Li Wang
, Jiuxun Sun
:
Measurement of dielectric constant based on time-domain ground-penetrating radar curve imaging algorithm. 89-92 - Shuhang Chen

, Feng Xu
, Kaiming Su
:
A new Energy-Saving Sector Clustering Data Aggregation Method in Wireless Sensor Networks: Energy saving sector clustering data aggregation method. 93-97 - Jiansong Wang

, Wei Lin
:
YOLOGP: A YOLOv5-Based Lightweight Network for Efficient Vehicle Detection in Autonomous Driving Scenarios. 98-105 - Sicong Chen

, Ying Liu
:
Distributed Multi-kernel Learning Based on Gaussian Mixture Model with Missing Data. 106-111 - Yongjie Li

, Huanpeng Hou
, Jizhao Lu
, Wenge Wang
:
Research on channel quantitation and key negotiation technology in key generation based on satellite-ground communication. 112-117 - Hui Zhang

, Xiaoming Liu
, Yuqing Cheng
:
Multi-extended Targets PHD Filtering Tracking Algorithm with Unknown Measurement Noise Distribution. 118-123 - Lishan Yang

, Chenglin Bai
, Hengying Xu
, Yining Zhang
, Guizhen Wang
:
Energy-Balancing Data Acquisition Strategy by Employing Graph Signal Sampling-set Rotation Method for Edge Computing Enabled Industrial Internet of Things. 124-129 - Daqi Zheng

, Xian Zhu
:
A Robust Fast Dominant Mode Rejection Algorithm. 130-135 - Xurui Li

:
Exploring Dynamic Class Instantiation and Imagick Extension Vulnerabilities in PHP: Insights and Techniques in Securing PHP Applications - A Comprehensive Guide to Dynamic Class Instantiation and Imagick Extension Vulnerabilities. 136-140 - Li Ai

, Jingtao Guo
, Jin Ji
:
Analysis and Research of Communication Abnormalities of Remote Data Collectors. 141-145 - Yunwei Li

:
Research on Badminton Target Positioning and Tracking Technology Based on Wireless Sensor Network. 146-151
Chapter 2-Computer Network and Communication Frontier Technology
- Qian Wu

, Yangfan Li
, Zhifeng Tian
:
Design and analysis of transmission relay protection signal transmission for fiber optic communication networks. 152-156 - Weixing Chen

, Jing Zhao
, Xinyi Li
, Xiaolei Fan
:
SDWSN Routing Optimization Algorithm Based on Adaptive Factors and Gaussian Perturbation Particle Swarm Algorithm. 157-161 - Shouzhen Zhang

, Fei Jiang
, Mingdong Li
:
Facial Expression Recognition Based on Improved VGG16 Convolutional Neural Network. 162-168 - Xiaolong Li

, Kongpeng Wei
, Hongbin Gu
, Bo Liu
:
Research and Application of Network Security Situational Awareness Technology Based on Ridge Regression. 169-173 - Jianxin Liu

, Fuge Wang
, Qingkun Zhuo
, Xue Yang
:
PCIE-Based Shared Memory Technology between BMC and CPU. 174-179 - Xiao Peng

, Chaobing Huang
:
An Improved Real-Time Multiple Object Tracking Algorithm Based on YOLOv8. 180-184 - Fuqiang Ma

, Lixun Xie
, Fengming Wu
:
Numerical Modeling and Signature Analysis on Radiated Noise properties of Underwater Propulsor. 185-191 - Liheng Li

, Xiulin Qiu
, Bo Song
, Yaqi Ke
, Yuwang Yang
:
Topology Maintenance Optimization Algorithm Based on Deep Reinforcement Learning in High Dynamic Flying Ad-Hoc Networks. 192-198 - Qingchen Zhou

, Xianzhao Shen
, Mingming Xu
:
A beam domain cluster targets super-resolution DOA estimation method. 199-203 - Chunliang Ma

, Jun Ye
, Wei Wang
, Guansheng He
:
Deep learning for multi-data fusion in gravitational wave search. 204-209 - Chenglin Cai

, Mingjie Wu
, Kaihui Lv
:
Integration of Singular Spectrum Analysis and Adaptive Neuro-FuzzyInference System for BDS-3 Clock Bias Prediction. 210-214 - Li Jia

:
Design of Lora Communication System Based on Speech Recognition in Emergency Rescue Environment. 215-219 - Yuhao Deng

, Lin Li
:
Analysis and Experiment of Radar Position Clutter. 220-223 - Yinwei Jiang

, Hongfang Lv
, Ran Ren
:
Research on human pose estimation technique based on depth-separable convolution. 224-229 - Ran Ren

, Hongfang Lv
, Yinwei Jiang
:
Uav track planning based on Chaotic Golden Jackal Optimization algorithm. 230-234 - Zaocai Xu

, Yang Yang
, Yi Ji
, Dinggan Cheng
:
Automatic Positioning System for Industrial CT Image Defects Based on Machine Vision. 235-239 - Lujie Yan

, Guohua Wang
, Peng Zhang
:
Optimal Relay Algorithm for Unmanned Aerial Vehicles Based on Location Prediction. 240-244 - Bo Zhou

, Yang Song
, Jie Ai
:
Time-frequency analysis of non-stationary signals based on short-time Fourier transform. 245-248 - Jian Lin

, Xue Chen
, Li Chen
, Pengfei Wang
, Dishan Yang
:
Data Loss Recovery Strategy for Distribution Network Differential Protection Based on 5G Communication. 249-253 - Shisong Yang

, Peng Yang
, Teng Wu
:
Research on Simulation of Satellite Communication Networks Based on Non cooperative Games. 254-259 - Jiakai Zhou

, Yang Wang
:
A Novel Annotation Method on RGB Images for Head Pose Estimation. 260-264 - Lei Zhang

, Long Xie
, Xutao He
, Xiaobo Lin
, Jiangzheng Shu
, Qile Wang
:
Research on Underwater Acoustic Detection Based on Submarine Cable Distributed Acoustic Sensing. 265-270 - Hongyang Xu

, Haisheng Song
:
A low-scattering Vivald antenna in the K-band. 271-277 - Chaobing Wei

:
Research on training image recognition based on deep Convolutional neural networks: A case study of the hand-held insulated ladder recognition model. 278-283
Chapter 3- Network Security Supervision and Intelligent Recognition Technology
- Zhongjun Ding

, Zhiyuan Li
, Dewei Li
:
Underwater Image Fusion Enhancement Algorithm based on Color Correction and Sharpening. 284-289 - Haiyan Cheng

, Ruiqi Yang
, Guangzhi Di
:
Boundary Detector Network with Squeeze-and-Excitation Network for Semantic Segmentation of Remote Sensing Images. 290-295 - Xi Pan

, Haisheng Song
:
A Broadband U-shaped Slot Coupled Antenna with T-shaped Microstrip Feed. 296-300 - Yang Li

, Yaodong Jia
:
YOLOv5s object detection method based on separable convolution and SENet. 301-306 - Zeng Dou

, Zhihui Yang
, Yifan Tang
:
Research on UAV Interception Path Optimization Based on Markov Decision Process. 307-311 - Na Li

, Haijun Zhao
, Naibin Zhai
, Feng Wang
, Yu An
:
Automotive sound quality evaluation model based on EEG signal. 312-317 - Hao Xiao

, Geguo Du
, Yingyu Zhang
, Wenjun Yang
:
Realizing High Fidelity 3D Face of Images Using Self Encoding Networks. 318-322 - Long Zhao

, Yu Wan
, Hongyan Fang
, Jixing Chen
:
A Fusion Positioning Algorithm for WSN with BDS Based on Extended Kalman Filter. 323-326 - Xiaochun Xu

, Weizheng Lin
, Dingrong Chen
, Nanling Su
, Leinuo Tang
, Changxu Cai
:
A Completed Gaussian Extended Binary Pattern for Texture Image Classification. 327-331 - Jieyong Zhang

, Wei Liang
:
Identification of Important Nodes Based on Entropy and Neighborhood Relations in Complex Network. 332-338 - Yu Song

, Rumeng Peng
, Xu Feng
, Kunli Zhang
, Lei Zhuang
, Mengyang He
:
Parallel Deployment of Service Function Chains Based on Network State Prediction. 339-345 - Zhongran Zhou

, Cheng Huang
, Xuxi Zou
, Lei Mao
:
Lightweight Trusted Identity Architecture Based on Industrial Internet Cloud Edge Collaboration Technology. 346-349 - Weijun Gao

, Xiaofang Zhang
:
Research on the Improvement of the DPoS Consensus Mechanism Based on the EigenTrust Trust Model. 350-355 - Zhonghao Yin

, Haiqing Liu
, Xiao Lu
:
Comparison of Kalman Filtering and Wavelet Transform for Noise Reduction in Excavator Hydraulic Cylinder Thrust Data. 356-360 - Haonan Li

, Wang Fang
:
Research on Defect Detection of Insulators in Transmission Lines Based on Improved YOLOv5. 361-366 - Adama Hawa Rahima Fofana

, Jianjun Lei
:
Reinforcement Learning Based Cluster Formation Algorithm in Wireless Sensor Networks. 367-371 - Fan Bai

, Bin Jin
, Mingjie Liu
, Jingqiang Wang
, Jiajie Liu
:
Semantic Segmentation of Transmission Lines with Fusion of Convolution and Multi-Head Self-Attention. 372-377 - Nan Wang

, Qinghua Zhang
, Xu Yang
:
Discussion on the Application of Tracking Codes on Color Laser Printouts in Information Security and Document Anti-counterfeiting. 378-383 - Furui Zhang

, Guangya Zhu
:
Analysis of Stray Light in Inter-satellite Beacon-less Laser Communication and Its Influence on Acquisition Probability. 384-389 - Tao Chen

, Yi Zhuang
:
A Dynamic Hierarchical Single Link Fault Recovery Scheme for SDN Based on Dynamic Hierarchies. 390-396 - Dongmei Bin

, Fuchuan Tang
, Yangguang Lin
, Chunyan Yang
, Ying Ling
:
Application of Zero Trust Security Architecture in Power Communication Network Security Management System. 397-401 - Zhongyong Wang

, Shufeng Zhang
, Hong Sun
, Kexian Gong
, Honghua Liu
, Wei Wang
:
Fast Detection Algorithm for Equal Length Frame Signals Based on Pattern Matching. 402-407 - Junshan Yin

, Chunna Li
:
Feature selection SVM through Universum and its applications on text classification Feature selection SVM through Universum. 408-414 - Xinyi Ma

, Fan Wang
:
Deep Siamese Multi-level Feature Network for VIS and NIR Image Matching. 415-420 - Dongjin Huang

, Zhenyan Li
, Jinhua Liu
:
A Novel Hairstyle Transfer Method using Contextual Transformer Blocks. 421-425

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














