


default search action
SPCNC 2023: Xiamen, China
- Proceedings of the 2nd International Conference on Signal Processing, Computer Networks and Communications, SPCNC 2023, Xiamen, China, December 8-10, 2023. ACM 2023
Chapter 1- Sensing Signal Processing and Target Tracking
- Xunbo Zhu
, Shuangqing Lv
, Zhilong He
, Zhengguo Yang
, Xuefang Li, Jianhong Zhao
:
Bearings-only passive location mathematical model for UAV cluster based on three points. 1-5 - Honglin Wu
, Xueqiong Li
, Long Lan
, Liyang Xu
, Yuhua Tang
:
Towards Radar Emitter Recognition in Changing Environments with Domain Generalization. 6-11 - Weicai Luo
, Qi Xi
, Jing Wang
:
Codebook-based digital fountain encoding and decoding method. 12-16 - Minghui Ding
, Kai Zhu
, Lei Yue
, Shuang Liu
, Yuhong Shi
, Shuaishuai Yang
, Chao Li
:
Research on USBL Positioning Multi-target technology Based on COSTAS Frequency Hopping Signal. 17-22 - Ziang Fei
, Guanghua Lu
:
Joint Transmit and Passive Beamforming Design for IRS-assisted ISAC System Based on Cramér-Rao Bound Optimization. 23-28 - Miaolei Deng
, Yupei Kan
, Haihang Xu
, Chuanchuan Sun
:
A Review of Intrusion Detection Research Based on Deep Learning. 29-35 - Qinghao Zhu
, Fei Wen
, Xinyu Li
:
Design of Short Wave Anti Fading Monitoring System Based on Large Aperture Polarization Sensitive Array. 36-41 - Tong Liu
, Wei Yu
, Jiasheng Chen
, Lun Xin
, Fei Yu
, Yinfei Xu
:
Federated Learning with Sample-Level Class Balancing Aggregation. 42-46 - Xiaoyang Peng
, Fangjie Yu
, Yongcheng Gu
, Jianguo Zhu
, Muyu Zhang
:
Acceleration Signal Integration Method Based on Variational Mode Decomposition. 47-53 - Yuangang Lu, Ke Ma
, Maohui Peng
, Shuai Zou
:
Exploration of 5G wireless network coverage scheme in cement factory. 54-59 - Huanyin Zhou
, Feiyan Xu
, Feifei Wu
, Yanhui Xie
, Weiqi Huang
, Jiewei Hu
:
Study on Pulse Polarity Self-Adapting of Digital MCA. 60-65 - Lirong Zhang
, Jingxuan Ma
:
A method for flexible transmission based on FlexE granularityFlexE granularity for flexible transmissionBased on 1G, 1.25G and 5G granularity allocation. 66-71 - Hailong Xu
:
Research on voice recognition and control technology for the elderly at home. 72-77 - Yanping Hu
:
Design of a novel ultra-wideband antenna with six notches. 78-82 - Yihai Hu
, Yongsheng Xiao
, Ke Zhao
, Lizhen Huang
:
Radar Working Mode Recognition Algorithm Based on Recurrent Neural Networks. 83-88 - Yan Chen
, Li Wang
, Jiuxun Sun
:
Measurement of dielectric constant based on time-domain ground-penetrating radar curve imaging algorithm. 89-92 - Shuhang Chen
, Feng Xu
, Kaiming Su
:
A new Energy-Saving Sector Clustering Data Aggregation Method in Wireless Sensor Networks: Energy saving sector clustering data aggregation method. 93-97 - Jiansong Wang
, Wei Lin
:
YOLOGP: A YOLOv5-Based Lightweight Network for Efficient Vehicle Detection in Autonomous Driving Scenarios. 98-105 - Sicong Chen
, Ying Liu
:
Distributed Multi-kernel Learning Based on Gaussian Mixture Model with Missing Data. 106-111 - Yongjie Li
, Huanpeng Hou
, Jizhao Lu
, Wenge Wang
:
Research on channel quantitation and key negotiation technology in key generation based on satellite-ground communication. 112-117 - Hui Zhang
, Xiaoming Liu
, Yuqing Cheng
:
Multi-extended Targets PHD Filtering Tracking Algorithm with Unknown Measurement Noise Distribution. 118-123 - Lishan Yang
, Chenglin Bai
, Hengying Xu
, Yining Zhang
, Guizhen Wang
:
Energy-Balancing Data Acquisition Strategy by Employing Graph Signal Sampling-set Rotation Method for Edge Computing Enabled Industrial Internet of Things. 124-129 - Daqi Zheng
, Xian Zhu
:
A Robust Fast Dominant Mode Rejection Algorithm. 130-135 - Xurui Li
:
Exploring Dynamic Class Instantiation and Imagick Extension Vulnerabilities in PHP: Insights and Techniques in Securing PHP Applications - A Comprehensive Guide to Dynamic Class Instantiation and Imagick Extension Vulnerabilities. 136-140 - Li Ai
, Jingtao Guo
, Jin Ji
:
Analysis and Research of Communication Abnormalities of Remote Data Collectors. 141-145 - Yunwei Li
:
Research on Badminton Target Positioning and Tracking Technology Based on Wireless Sensor Network. 146-151
Chapter 2-Computer Network and Communication Frontier Technology
- Qian Wu
, Yangfan Li
, Zhifeng Tian
:
Design and analysis of transmission relay protection signal transmission for fiber optic communication networks. 152-156 - Weixing Chen
, Jing Zhao
, Xinyi Li
, Xiaolei Fan
:
SDWSN Routing Optimization Algorithm Based on Adaptive Factors and Gaussian Perturbation Particle Swarm Algorithm. 157-161 - Shouzhen Zhang
, Fei Jiang
, Mingdong Li
:
Facial Expression Recognition Based on Improved VGG16 Convolutional Neural Network. 162-168 - Xiaolong Li
, Kongpeng Wei
, Hongbin Gu
, Bo Liu
:
Research and Application of Network Security Situational Awareness Technology Based on Ridge Regression. 169-173 - Jianxin Liu
, Fuge Wang
, Qingkun Zhuo
, Xue Yang
:
PCIE-Based Shared Memory Technology between BMC and CPU. 174-179 - Xiao Peng
, Chaobing Huang
:
An Improved Real-Time Multiple Object Tracking Algorithm Based on YOLOv8. 180-184 - Fuqiang Ma
, Lixun Xie
, Fengming Wu
:
Numerical Modeling and Signature Analysis on Radiated Noise properties of Underwater Propulsor. 185-191 - Liheng Li
, Xiulin Qiu
, Bo Song
, Yaqi Ke
, Yuwang Yang
:
Topology Maintenance Optimization Algorithm Based on Deep Reinforcement Learning in High Dynamic Flying Ad-Hoc Networks. 192-198 - Qingchen Zhou
, Xianzhao Shen
, Mingming Xu
:
A beam domain cluster targets super-resolution DOA estimation method. 199-203 - Chunliang Ma
, Jun Ye
, Wei Wang
, Guansheng He
:
Deep learning for multi-data fusion in gravitational wave search. 204-209 - Chenglin Cai
, Mingjie Wu
, Kaihui Lv
:
Integration of Singular Spectrum Analysis and Adaptive Neuro-FuzzyInference System for BDS-3 Clock Bias Prediction. 210-214 - Li Jia
:
Design of Lora Communication System Based on Speech Recognition in Emergency Rescue Environment. 215-219 - Yuhao Deng
, Lin Li
:
Analysis and Experiment of Radar Position Clutter. 220-223 - Yinwei Jiang
, Hongfang Lv
, Ran Ren
:
Research on human pose estimation technique based on depth-separable convolution. 224-229 - Ran Ren
, Hongfang Lv
, Yinwei Jiang
:
Uav track planning based on Chaotic Golden Jackal Optimization algorithm. 230-234 - Zaocai Xu
, Yang Yang
, Yi Ji
, Dinggan Cheng
:
Automatic Positioning System for Industrial CT Image Defects Based on Machine Vision. 235-239 - Lujie Yan
, Guohua Wang
, Peng Zhang
:
Optimal Relay Algorithm for Unmanned Aerial Vehicles Based on Location Prediction. 240-244 - Bo Zhou
, Yang Song
, Jie Ai
:
Time-frequency analysis of non-stationary signals based on short-time Fourier transform. 245-248 - Jian Lin
, Xue Chen
, Li Chen
, Pengfei Wang
, Dishan Yang
:
Data Loss Recovery Strategy for Distribution Network Differential Protection Based on 5G Communication. 249-253 - Shisong Yang
, Peng Yang
, Teng Wu
:
Research on Simulation of Satellite Communication Networks Based on Non cooperative Games. 254-259 - Jiakai Zhou
, Yang Wang
:
A Novel Annotation Method on RGB Images for Head Pose Estimation. 260-264 - Lei Zhang
, Long Xie
, Xutao He
, Xiaobo Lin
, Jiangzheng Shu
, Qile Wang
:
Research on Underwater Acoustic Detection Based on Submarine Cable Distributed Acoustic Sensing. 265-270 - Hongyang Xu
, Haisheng Song
:
A low-scattering Vivald antenna in the K-band. 271-277 - Chaobing Wei
:
Research on training image recognition based on deep Convolutional neural networks: A case study of the hand-held insulated ladder recognition model. 278-283
Chapter 3- Network Security Supervision and Intelligent Recognition Technology
- Zhongjun Ding
, Zhiyuan Li
, Dewei Li
:
Underwater Image Fusion Enhancement Algorithm based on Color Correction and Sharpening. 284-289 - Haiyan Cheng
, Ruiqi Yang
, Guangzhi Di
:
Boundary Detector Network with Squeeze-and-Excitation Network for Semantic Segmentation of Remote Sensing Images. 290-295 - Xi Pan
, Haisheng Song
:
A Broadband U-shaped Slot Coupled Antenna with T-shaped Microstrip Feed. 296-300 - Yang Li
, Yaodong Jia
:
YOLOv5s object detection method based on separable convolution and SENet. 301-306 - Zeng Dou
, Zhihui Yang
, Yifan Tang
:
Research on UAV Interception Path Optimization Based on Markov Decision Process. 307-311 - Na Li
, Haijun Zhao
, Naibin Zhai
, Feng Wang
, Yu An
:
Automotive sound quality evaluation model based on EEG signal. 312-317 - Hao Xiao
, Geguo Du
, Yingyu Zhang
, Wenjun Yang
:
Realizing High Fidelity 3D Face of Images Using Self Encoding Networks. 318-322 - Long Zhao
, Yu Wan
, Hongyan Fang
, Jixing Chen
:
A Fusion Positioning Algorithm for WSN with BDS Based on Extended Kalman Filter. 323-326 - Xiaochun Xu
, Weizheng Lin
, Dingrong Chen
, Nanling Su
, Leinuo Tang
, Changxu Cai
:
A Completed Gaussian Extended Binary Pattern for Texture Image Classification. 327-331 - Jieyong Zhang
, Wei Liang
:
Identification of Important Nodes Based on Entropy and Neighborhood Relations in Complex Network. 332-338 - Yu Song
, Rumeng Peng
, Xu Feng
, Kunli Zhang
, Lei Zhuang
, Mengyang He
:
Parallel Deployment of Service Function Chains Based on Network State Prediction. 339-345 - Zhongran Zhou
, Cheng Huang
, Xuxi Zou
, Lei Mao
:
Lightweight Trusted Identity Architecture Based on Industrial Internet Cloud Edge Collaboration Technology. 346-349 - Weijun Gao
, Xiaofang Zhang
:
Research on the Improvement of the DPoS Consensus Mechanism Based on the EigenTrust Trust Model. 350-355 - Zhonghao Yin
, Haiqing Liu
, Xiao Lu
:
Comparison of Kalman Filtering and Wavelet Transform for Noise Reduction in Excavator Hydraulic Cylinder Thrust Data. 356-360 - Haonan Li
, Fang Wang
:
Research on Defect Detection of Insulators in Transmission Lines Based on Improved YOLOv5. 361-366 - Adama Hawa Rahima Fofana
, Jianjun Lei
:
Reinforcement Learning Based Cluster Formation Algorithm in Wireless Sensor Networks. 367-371 - Fan Bai
, Bin Jin
, Mingjie Liu
, Jingqiang Wang
, Jiajie Liu
:
Semantic Segmentation of Transmission Lines with Fusion of Convolution and Multi-Head Self-Attention. 372-377 - Nan Wang
, Qinghua Zhang
, Xu Yang
:
Discussion on the Application of Tracking Codes on Color Laser Printouts in Information Security and Document Anti-counterfeiting. 378-383 - Furui Zhang
, Guangya Zhu
:
Analysis of Stray Light in Inter-satellite Beacon-less Laser Communication and Its Influence on Acquisition Probability. 384-389 - Tao Chen
, Yi Zhuang
:
A Dynamic Hierarchical Single Link Fault Recovery Scheme for SDN Based on Dynamic Hierarchies. 390-396 - Dongmei Bin
, Fuchuan Tang
, Yangguang Lin
, Chunyan Yang
, Ying Ling
:
Application of Zero Trust Security Architecture in Power Communication Network Security Management System. 397-401 - Zhongyong Wang
, Shufeng Zhang
, Hong Sun
, Kexian Gong
, Honghua Liu
, Wei Wang
:
Fast Detection Algorithm for Equal Length Frame Signals Based on Pattern Matching. 402-407 - Junshan Yin
, Chunna Li
:
Feature selection SVM through Universum and its applications on text classification Feature selection SVM through Universum. 408-414 - Xinyi Ma
, Fan Wang
:
Deep Siamese Multi-level Feature Network for VIS and NIR Image Matching. 415-420 - Dongjin Huang
, Zhenyan Li
, Jinhua Liu
:
A Novel Hairstyle Transfer Method using Contextual Transformer Blocks. 421-425

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.