APP下载

2018年第1期~第12期总目次

2018-03-04

网络安全与数据管理 2018年12期
关键词:算法设计研究

题 目

作者期页

产学一线

一个工控系统病毒的处置及思考

王绍杰,霍朝宾,田晓娜(1)5

新型Android银行木马“MoqHao”利用社交网络隐藏C&C服务器

甘杰,郭山语(1)9

攻击者对安全体系的预测、绕过、干扰与安全防护应对

肖新光(2)3

基于非线性预处理及逻辑回归的异常检测算法

董伟,杨晨,邵俊杰(3)4

基于数据驱动的工业信息安全防护

王弢,崔君荣(6)3

产业互联网下的企业变革——以元器件分销企业转型实践为例

宋健,周杰(6)6

基于大样本的随机森林恶意代码检测与分类算法

李雪虎,王发明,战凯(7)3

交通行业工控系统遭病毒入侵给我国关键信息基础设施安全的启示

董伟,李致成,冯志(9)1

ITNS主题专栏:网络空间安全

大规模网络安全态势分析系统YHSAS设计与实现

贾焰,韩伟红,王伟(1)17

构筑工业互联网安全防护体系为推动先进制造业发展保驾护航

刘仁辉,张尼,吴云峰(1)23

基于JSON的RSA-PKCS#1加密算法的安全性研究

何建,蒋琳,廖清等(1)25

Secure Enclave安全体系技术分析与研究

廖正赟,郭建胜(1)30

ITNS主题专栏:网络人工智能与智能网络管理

基于软件定义网络技术实现人工智能网络体系架构

刘惠文,姚海鹏,张培颖(2)7

SDN架构下基于优先级的带宽保障算法研究

曹绍华,张斌,张培颖(2)11

人工智能集成学习方法在入侵检测中的运用

金雅晴,丁振兴,姬庆庆(2)15

基于AI的LEO卫星网络资源管理架构设计

王朱伟,徐广书,买天乐等(2)20

ITNS主题专栏:工业控制系统及信息安全

可编程控制器原生的信息安全设计

朱毅明(3)8

本质安全型抽水蓄能电站计算机监控系统设计探讨

彭煜民,吴云峰(3)11

智能工厂新型数据采集系统构建

龚涛,赵赫男(3)15

引调水工程控制系统及信息安全防护设计思考

李连全,李润伟(3)20

题 目

作者期页

智能制造带来的工业信息安全思考

吴吉庆,韦有双(3)24

工控系统现场控制网络异常检测技术浅析

赵贵成,程鹏,王文海(3)28

工业控制系统APT攻击分析和防御问题探讨

许剑新,还约辉,王迎(3)32

电力工控系统网络入侵和攻击典型模型研究

郭志民,吕卓,陈岑(3)37

ITNS主题专栏:大数据安全技术

大数据产业现状和挑战

顾钊铨,张尼,李树栋等(4)3

大数据分析关键技术与挑战

韩伟红,贾焰,周斌(4)7

面向大数据的知识语义建模技术研究综述

柴瑜晗,刘妍,司亚琪等(4)11

医疗大数据平台数据高并发方案设计与关键技术分析

张伟(4)18

大数据时代网络涉军舆情预警的新范式

刘泽睿(4)23

ITNS主题专栏:工控安全技术发展及应用

工业控制系统网络安全态势感知框架研究

陶耀东,贾新桐(5)3

长输天然气管道工控系统安全防护措施及相关建议

王磊,魏娜(5)7

离散制造行业的工控安全保障体系

赵剑明,尚文利,齐盈盈等(5)12

PLC控制系统在智能制造时代的应用及发展趋势

韩庆敏,林浩,姜洪朝等(5)18

等保2.0时代下工控安全技术革新

谢云龙,吴得清,姜红勇(5)22

ITNS主题专栏:匿名与隐私保护

DP2Gsister:差分隐私社交网络图发布模型

殷轶平,徐睿峰(6)11

Internet服务可访问性技术综述

谭庆丰,时金桥,王学宾等(6)18

基于OT协议的外包隐私集合交集计算协议

廖鹏程,陈小军,申立艳等(6)28

本地化差分隐私在数据众包中的应用

方俊斌,蒋千越,李爱平(6)32

基于差分隐私的社交网络隐私保护

黄茜茜,蒋千越,蒋琳等(6)36

ITNS主题专栏:金融信息安全

金融行业“金融安全3.0”理论与生态

李洋,唐秀江,陈春璐等(7)6

基于软件定义安全的企业内网威胁诱捕机制

刘文懋,刘威歆(7)9

日志智能分析在银行业IT安全运维管理中的应用

孙惟皓,凌宗南,陈炜忻(7)13

智慧城市信息安全保障体系研究

李洋,谢晴,邱菁萍等(7)18

ERC20智能合约整数溢出系列漏洞披露

陈力波,殷婷婷,倪远东等(8)3

基于大数据的互联网金融安全建设思路

安丙春,张健,陶蓉(8)7

农村金融机构亟需建设新一代网络安全体系

左英男(8)11

题 目

作者期页

发布区块链标准应用模型及应用部署技术研究

白杰,李东云,吴先锋(8)13

ITNS主题专栏:中国电子“网络安全和信息化”专题

RTD-gated HEMT研究进展

朱长举(9)5

轻量级插件式Linux图形桌面环境设计与优化技术

余杰,马俊,彭欢等(9)9

工控行业自主可控编程编译工具关键技术研究

郭肖旺,陈海,赵德政(9)13

国产办公信息系统若干关键问题研究

郭长国,谢劲松,韩鹏等(9)17

一种基于开放聚合框架的网络流量安全监测体系设计

王艳伟,邬江,罗赟骞等(9)22

基于北斗卫星导航系统的安全芯片设计

范长永(9)27

基于RC4算法的流密码原理与实现

刘程远(9)31

基于延迟线的超高速SD卡动态相位调整技术

刘艳丽,张璐,冯彦朝等(9)34

基于国产数据库的电子政务建设安全性初探

姜会林(9)38

ITNS主题专栏:信息安全与密码技术研究

基于全同态加密的ORAM方案

宋宁宁(11)1

NIST随机性检测方法研究

王超,温涛,段冉阳(11)5

ZUC算法随机性检测研究

王超,范国浩,付宝仁(11)9

大整数分解算法综述

杨江帅(11)12

基于混沌映射的身份认证与密钥协商方案

国佃利(11)16

简化版分组密码KATAN32的相关密钥立方攻击

王明兴(11)20

轻量级分组密码算法设计研究

陈怀凤(11)25

网络与信息安全

从三种融合角度解读《网络安全法》

范赫男,张钟(1)33

用户网络行为模拟技术研究

李晶晶,刘红日,刘扬等(1)36

联网工业控制系统主动感知预警技术研究

马强,殷顺尧,羊依银(1)40

一种基于半监督学习的工控网络入侵检测方法

张松清,刘智国(1)44

基于机器学习的舆情倾向性分析研究

罗裕隽(1)48

基于敏感性分级的(k, δ, ai)-匿名模型

刘阳,祝永志,迟玉良(1)52

基于轨道交通控制系统网络信息安全仿真分析

徐超,莫嘉永,林俊南(1)57

云环境下主客观协同的信任模型研究

张迪,丁箐(2)23

基于非线性预处理和神经网络的字符序列单向Hash算法

朱巍(2)29

基于嵌入式平台的网络视频监控系统应用

蔡伟立,卿粼波,滕奇志等(2)33

基于嵌入式的QR二维码加密系统设计与实现

周佳华,李福山(2)37

SDN网络流量分类技术研究综述

蒋海军,谢钧,郭小帆等(2)40

工业控制系统信息安全测试平台研究

卢凯,朱广宇,王绍杰等(3)40

城市污水处理厂控制系统可信安全防护设计

吴云峰(3)45

题 目

作者期页

基于alpha叠加的视频信息隐藏算法

苏鹏涛,田泽,刘逸涵(3)50

eSIM卡安全架构研究

黄健,黄健文,李俊磊等(3)53

基于BP神经网络的网络安全指标体系构建

刘海天,韩伟红,贾焰(4)26

基于神经网络模型的网络入侵检测的研究

王禹,丁箐,罗弦(4)30

一种面向主动安全的动态采集策略设计与实现

翟友钧,赵旦谱,台宪青(4)34

基于云的工业信息安全试验平台架构设计

霍朝宾,贺敏超,刘思洋(5)25

基于SVM算法的工业防火墙规则自学习方法

潘峰,王世伟,薛萍(5)29

应用混合核函数支持向量机的网络安全检测模型研究

张彦军(5)34

关键信息基础设施安全保护运营措施分析与建议

高焕新,高永前(5)37

面向未来的网络靶场体系架构研究

刘智国,于增明,王建等(6)41

一种基于可信嵌入式交互模块的物联网远程管理平台安全方案

陈波,杨永刚,朱广宇(6)47

中央企业在国家网络安全保障中的作用研究

林涛,张向宏(6)52

基于区块链的身份管理研究

陈宇翔,张兆雷,卓见等(7)22

基于方向极化调制的安全可靠传输技术研究

齐帅,张邦宁,郭道省等(7)27

深度学习在网络信息安全中的应用

陈骁(7)33

基于深度学习和半监督学习的webshell检测方法

吴斌,赵力(8)19

基于SECaaS模式的网络安全监管服务化研究

张智南,柯贤良,傅爱民(8)23

基于云计算服务的安全体系设计

张伟(9)42

一种基于分布式蜜罐技术的勒索蠕虫病毒监测方法

秦玉杰(9)45

IEC60870-5-104规约安全性分析及攻击实验

江泽鑫(10)1

电厂工控信息安全半实物仿真模型研究

苏畅,熊申铎,罗安琴等(10)5

基于深度学习的集成DGA域名检测方法

罗赟骞,邬江,王艳伟等(10)10

基于Hadoop的大数据分析管理平台架构设计

张伟(11)30

基于区块链的智慧云制造系统安全架构

杜兰,陈琳琳,张丽等(11)34

一种基于STIX信息交互的渗透测试协作方案研究

刘岳,张海峰,张良等(12)1

基于贝叶斯网络的等级保护风险评估模型研究

赵一鸣,谢炯,王钢等(12)6

电力企业云百科系统的架构设计

张伟(12)11

信息通信

物联网平台及其云化平台的开放性评估

贾雪琴,胡云,邢宇龙(1)62

大数据平台安全威胁与防护技术研究

刘明辉,陈湉,王竹欣(1)65

无线传感器网络中基于模式频繁度的异常检测方法

施晓斌,吴丹萍,程红举(1)70

基于增强现实的计算机辅助微创手术导航系统

黄伟萍,韦孟宇,杜民等(1)76

协同通信系统中基于协作干扰的无线安全增强

周钱,臧国珍,彭磊等(1)81

题 目

作者期页

一种改进的频偏估计方法及应用

刘凯,周渊平(1)87

TIPC在嵌入式集群系统中的应用与优化

施思,叶建芳,何睿(2)63

车联网中基于模糊逻辑处理的多跳广播协议

廖恩瑞,潘燕燕,宋祥(2)68

宽频带缝隙馈电双层贴片微带天线设计

周兵,邹传云(2)72

GLONASS卫星导航信号模拟与接收验证软件开发

贲星,宋茂忠,熊骏(3)96

能量均衡的无线传感器网络多跳非均匀分簇算法

马威风,陈桂芬(3)100

基于蓝牙通信的IC卡水表远程付费装置设计

常兴智(3)105

一种用于CDMA2000 1x导频捕获的自适应门限算法研究

王文实,夏文龙,郭庆功(4)79

免疫粒子群优化的DV-Hop定位算法

吴珍珍,方旺盛(4)84

波束形成算法研究与改进

刘权,周渊平,徐磊等(4)88

一种改进的码率兼容QC-LDPC码构造算法

范仁基,赵旦峰(5)58

WiFi辅助的IMU室内定位方法的研究

袁国良,谢奎(5)62

平移不变小波变换在脉搏波去噪中的应用

王泰琨,张海英,张以涛等(5)66

面向导航星座的混合路由技术研究

张方,周淦,喻瑶瑶等(6)94

CSI误差下MIMO干扰广播信道的非线性收发机设计

贾亚平,耿烜(6)99

Ku波段便携式雷达收发系统设计

蔡畅,杨浩,杜泽保(6)104

一种基于RB-HARQ安全传输技术的吞吐量最大化方法

王雷,郭道省,蒋炫佑(7)62

基于GNURadio的CMA盲均衡器和锁相环组合设计与实现

李晓光,潘克刚(7)67

LTE中SVC视频层数选择和资源分配的联合优化

邢志浩,杨博文,杨坚(7)71

基于Nginx的科普云直播系统研究与实现

马艾田,耿立宏,王闰强等(8)54

具有射频监测能力的雷达接收前端技术

张秋艳,王超,陈严君(8)58

基于PXI总线多通道矢量信号源的设计与实现

张秋艳,张鹏(9)76

基于坐标变换的交互多模型车载定位研究

焦雨琪,牛蕊,夏志(9)80

基于无人机双路移动中继通信的干扰抑制

杨润丰,骆春波,张依群(9)85

终端换机业务分析研究

路玮,李轶群,李佳俊等(9)89

基于ZYNQ的高速数据中心接口单元设计

吕俊杰,武杰(10)51

基于期望最大化算法的双音频率估计方法研究

袁恩,刘鹏,陈隆亮等(10)55

对支持MEC的SCN蜂窝网络缓存策略的研究

何骄鸿,潘沛生(11)69

一种RB-HARQ辅助下基于非规则LDPC码的安全传输方案

王雷,丁晓晖(11)74

无线Ad Hoc网络MAC层中针对FD中继的高效空间复用机制

宋宇,齐望东,赵卫伟(11)79

卫星通信中干扰极化状态自适应跟踪算法

齐帅,郭道省, 张邦宁等(12)48

逼近高斯信道容量的M-APSK调制星座优化设计

蒋炫佑,魏以民,王雷等(12)52

智能算法

基于双维度云模型的协同过滤推荐算法

刘美博,满君丰,彭成等(1)92

题 目

作者期页

基于HALCON的机器人手眼标定精度分析与反演方法

杨厚易(1)97

考虑移动群智感知用户类型的激励机制设计

林烨婷,陈忠辉,冯心欣等(1)101

基于奇异值分解和隐Markov模型的动态手势识别

蒋海军,谢钧,段国仑等(1)106

基于多尺度域和能量特征分析的航空图像增强

刘畅,廖一鹏(1)111

基于灰色新陈代谢和神经网络的故障预测方法研究

杲玄玄,李长云,雷小葳(1)115

基于Ext JS框架MVC模式的复用技术研究

周玉,闻金华,徐建良(2)46

基于费用函数的测试性指标优化分配方法

王贺,朱智平,王贵腾等(2)51

基于自然语义处理的裁判文书分割系统

郑少婉,陆培民(2)55

低带宽条件下机器人探索地图的传输方法

张红阳,肖宇峰,刘冉(2)58

基于三帧差法与聚类算法的目标识别方法

梁琼,蔡湧达,路梅梅等(3)57

基于AIHS的遥感影像融合方法及其应用研究

胡佳伟,刘军清,汪康等(3)61

基于SVM的建筑电气系统无中心故障诊断算法研究

赵雪辰,邢建春,王平等(3)65

一种基于多元回归的能见度检测方法

唐绍恩,李骞,顾大权等(3)70

基于距离变换的PRM路径规划算法

李敏,周远远,黄鲁(3)74

一种基于关联规则的网络软件缺陷预测方法

胡柳,邓杰,赵正伟等(4)41

基于区域过滤的测序序列比对算法研究

丁胜楠,吴鸣,徐云(4)45

深度森林与人工神经网络在光伏出力预测的比较

沈文博,孙荣霞,马少卿等(4)49

一种智能化媒资检索系统的研究

关力,张向文,张帆等(4)52

基于隐马尔可夫模型的有向地图匹配算法研究

陈忠辉,王彪,冯心欣等(4)55

基于自然特征的移动增强现实注册算法

谢振超,黄俊,张磊等(5)71

基于改进的暗原色先验图像去雾算法

杨斌,林志贤,郭太良(5)75

一种改进的加权频差电阻抗成像算法

张夏婉(5)80

基于MapReduce的分布式贪心EM算法

曹家庆,吴观茂(5)84

基于模糊C-均值和特征加权法的协同过滤推荐算法

字云飞,李业丽,孙华艳等(6)54

基于粒子滤波的锂电池SOC二次滤波算法

邢云凤,赵野(6)59

基于数据敏感度自适应的SDT改进算法

张涵笑,慕福奇,吕欣岩(6)64

变参数深度玻尔兹曼计算模型研究

王娜,陈贤富(6)68

基于Floyd改进加速算法的最短路径选择

马莹,陈志龙,刘贺等(6)72

基于蝴蝶优化的粒子滤波算法

刘云涛(7)37

面向文件存储的虚拟网络映射算法

陈晨,郑烇,王志臻等(7)42

基于二倍体显性机制的DNA算法研究

徐凯,陈贤富(7)46

基于混沌扰动PSO算法的云计算任务调度

许向阳,张芳磊(8)27

Landsat 8 OLI多光谱与全色影像融合算法的比较

姜晓晨,邓正栋,武国瑛等(8)31

基于粒子群优化的模糊C均值聚类算法

王宇钢(8)36

基于自适应阈值PCA的多目标人脸识别方法研究

郝刚,梁鹏(9)49

题 目

作者期页

二分查找判定树的RHC构造法

徐有为,张宏军,程恺等(9)52

一种基于OpenCV的家用安防多阈值运动目标检测算法

刘志聪,陈德为,李鸿扬等(9)57

基于LFSR具有并行与串行结果一致的随机数生成算法

王超,张秋艳,张姗等(10)15

基于支持向量机的格斗评估算法研究

陈泽嘉,曾培峰(10)19

基于Welch和柔性形态学的LPI信号噪声基底处理

耿常青,杨承志,张志刚等(10)24

一种结合用户和项目聚类的协同过滤算法

罗弦,丁箐,王禹(10)28

基于自适应相机运动速度的视频稳像算法

胡琪,罗健欣,胡谷雨等(10)32

基于区域划分的点云全局配准研究

周建钊,杜文超,颜雨吉等(11)39

网络用户自描述标签向量生成及标签层次体系构建方法

孙毅,裘杭萍,王沁雪(11)44

面向虚拟现实的A算法的分析与改进

宋健,何小海,王正勇等(11)50

高空悬挂式相机拍摄中的拉索提取方法

何榜耕,吴晓红,何小海等(11)54

基于改进优先权的对称相似图像修复算法

郑成松,李琦(12)14

一种事件驱动的生物特征识别框架服务的设计与实现

蒋林轩,余杰,刘晓东等(12)18

云计算环境下基于信任主体和效益值的动态任务调度算法研究

吴洲(12)26

基于资源三号卫星与Landsat 8 OLI的水库库容估算

姜晓晨,邓正栋,武国瑛(12)30

人工智能

开放式环境下变电站机器人SLAM算法研究

任杰,宋建涛,李功燕(3)80

基于STM32的运动分析装置设计与研究

方晓明,苏凯雄(3)84

流形降维最小二乘回归子空间分割

林智鹏,黄増裕,简彩仁(3)88

基于ZYNQ的车载行人检测系统设计与实现

邓健峰,谢云(3)91

基于深度神经网络的说话人自适应方法研究

古典,李辉(4)60

基于优化的并行AlexNet人脸特征点检测算法

陈东敏,姚剑敏(4)65

基于拉普拉斯卷积网络和SMM分类器的小麦麦粒识别

康朋新,卿粼波,滕奇志等(4)71

TensorFlow平台下基于深度学习的数字识别

靳涛,张永爱(4)74

一种快速的车型识别方法

胡鹏,白天,许晓珑(5)41

改进的卷积神经网络在答案选择模块中的研究

许畅,张琳(5)46

基于EdgeBoxes与旋转不变特征的车辆检测

娄玉强,蒋华涛,常琳等(5)50

基于生成对抗网络的语音增强算法研究

柯健,徐志京(5)54

一种融合多种信息的Web文档分类方法

段国仑,谢钧,郭蕾蕾等(6)76

一种基于隔离损失函数的人脸表情识别方法

曾逸琪,关胜晓(6)80

交叉口信号优化控制的深度循环Q学习方法

施赛江,陈锋(6)85

基于连续帧的在线实时人体行为检测

周道洋,关胜晓,夏雨薇(6)90

基于深度卷积神经网络的小尺度行人检测

郭爱心,殷保群,李运(7)50

一种基于LSTM的视频车辆检测算法

李岁缠,陈锋(7)54

融合多视角信息的RGB-D图像协同显著性检测

吴乾绅(7)58

题 目

作者期页

基于生成对抗网络的人脸热红外图像生成

王雅欣,史潇潇(8)40

一种基于高级驱动辅助系统快速时空立体匹配方法

朱素杰,王萌(8)45

基于网络搜索数据的品牌汽车销量预测研究

谢天保,崔田(8)50

基于CNN-XGBoost的PTA平均粒径动态软测量模型

周鹏(9)61

基于深度学习的多条形码检测与实现

周勉,刘秉瀚(9)65

基于伴随文本信息的Web图像批量标注方法

郭蕾蕾,俞璐,段国仑等(9)70

基于逻辑回归模型的火焰检测

官洪运,杨益伟,吴炜等(10)36

基于分布式核的在线AUC最大化算法

刘鑫,潘志松,周星宇等(10)41

基于FSVM算法的TCD医疗数据分类

王志远,吴成浩,王正等(10)46

基于全卷积神经网络的地震初至波拾取

刘佳楠,武杰(11)58

基于公路监控视频的车辆检测和识别

陈伟星,白天,许晓珑(11)64

基于频谱特性和自适应虫孔定位的小麦识别

王周璞,何小海,吴小强等(12)35

基于KCF的目标遮挡再检测算法

王德培,谢云(12)39

基于朴素贝叶斯与半朴素贝叶斯图像识别比较

刘闯(12)44

工业自动化技术

智能制造系统实施方法论在新能源行业的研究与应用

李末军,韩庆敏,杜军钊(1)118

多旋翼燃料电池无人机能量管理策略研究

张志祥,肖铎,王佳斌(1)122

核电站KSN系统操作监控软件的仿真技术研究

程敏敏,景应刚,张才科等(1)127

基于MC-AHP-FCE系统对瓦斯灾害的预警评估

许颢砾,王大庆,邓正栋等(1)131

基于简化粒子群优化的高铁钢轨智能检测技术

王曼,王姮,张华(2)77

一种基于智能机器视觉识别的工业探伤技术

牛乾,刘桂华,康含玉(2)81

工业控制中电涡流传感器位移测量精度研究

宋士兰,卢文科,左锋(2)85

基于STM32F4的基板检测输送平台运动控制器设计

张群,陶晓杰,张蓝等(2)90

全方位移动平台运动控制系统的实现

曾令栋,裴东,王全州等(2)95

基于边缘计算的工业数据采集

马吉军,贾雪琴,寿颜波等(4)91

基于PSO-BP预测模型的盾构机密封舱土压平衡控制

李强,李景轩(4)94

一种下垂控制逆变器与柴油发电机并联运行控制策略

黄家豪,王金全,徐晔等(4)100

基于电涡流传感的地面沉降分层监测装置设计

吕中虎,张青,张晓飞(4)106

导发架主控计算机供配电管理的设计与实现

景德胜,张坤(4)109

基于EtherCAT架构的伺服系统谐振在线检测

郭高洁,蒋平,李欣等(5)102

基于声纹识别技术的Android设备声音功能自动化测试系统

李嘉伟,胡海龙,林志贤(5)106

题 目

作者期页

主动对象计算模型在工业机器人系统中的应用

殷冰磊,董伯麟(5)110

平板检测系统人机界面设计

李洋,林晓,汪铸杰等(6)108

多通道超声波数据采集传输实现方法

丁孝超,杨媛,陈福(6)112

一种芯片电容高精度批量测试设备设计

刘书萌,冯国兵,王龙等(6)117

基于物联网的煎炸油品质在线检测系统设计

霍慧清,欧文,莫宏波等(7)77

浅析云计算在电梯行业中的应用

吴祥容(7)82

基于ZigBee网络的高速公路防雾霾路灯控制系统

何子力,张丽娜,张放心等(7)86

基于有源RFID的牧场定位技术研究

卢圣文,欧文(7)90

基于图像处理的烟条段搭口宽度测量方法

文韬,韩龙,文一夫(7)95

柴油发电机组带恒功率脉冲负载运行特性研究

邢鑫,王金全,徐晔等(8)62

基于FPGA的猝发多脉冲产生系统设计与实现

冯传均,何泱,戴文峰(8)70

控制系统的“四防”

苏耀东(8)73

基于FPGA的刀具图像预处理系统研究

温佳静,范红,朱江泽等(9)94

基于改进灰狼算法的最大功率点跟踪

杨丽丽,孙荣霞,王硕南(9)97

电力机车装配线智能节拍系统设计

杨晨,孙丽(9)101

储能电池基于等效电路模型的功率特性研究

刘尧斌,徐晔,李建科等(9)105

遍历式最大电流点硅光电池追踪系统设计

薄中亚(10)59

一种便携式近地告警测试设备的设计与实现

夏小春,王键,赵晓晴(10)62

脉冲负载作用下发电机端电压波动问题研究

刘博,黄克峰,徐晔(10)66

基于物联网的工业定制化生产系统设计

谢仁栩,陈丹,徐哲壮等(10)72

基于NTSM的伺服电机模糊滑模控制策略研究

黄皓,涂群章,潘明等(11)84

国产PLC系统与OPC UA通信过程的身份认证机制优化

赵悦琪,闵晓霜(12)58

基于ZigBee的智能照明控制系统设计

张斌,侯严严,赵涛(12)62

计算机硬件

SRD建模及其在无芯片RFID系统中的应用

张精华,郭海燕,邹传云(2)100

一种应用于10 MHz 8位SAR ADC的分段式DAC电路设计

徐韦佳,田俊杰,李延标等(2)104

基于电流模电路的通用宽带电流放大器的设计与仿真

丰豪,赵柏树,李宣成(3)109

一种低抖动快锁定的时钟数据恢复电路设计

胡腾飞,方毅,黄鲁(3)113

基于NEO-M8P的RTK定位系统设计与实现

刘炼军,黄继伟(3)117

基于ARM9的自动气象站控制模块设计

叶楠,刘怀芝,鹿旭(4)112

一种减小纹波电压的新型电荷泵调节电路

欧阳托日,黄鲁(4)116

NFC门禁控制系统研究与设计

曹泽玲,王琪(5)88

题 目

作者期页

超声波腐蚀在线监测系统前端信号分析

王润,孟令雅,刘晶姝(5)93

K波段pHEMT下变频混频器的设计与研究

李罡,余凯,李思臻等(5)97

基于i.MX6的雷达显示终端设计与实现

李红兵(6)121

脉冲负载下独立微电网混合储能的优化控制策略

师萌,王金全,黄克峰等(6)125

基于FPGA的EtherCAT从站控制器FMMU模块设计

姚旺君,林浩,王永利等(8)77

一种S模式ADS-B前导脉冲检测方法

王永利,姚旺君,陈严君等(8)83

一种防雾霾智能口罩的设计

徐磊,周渊平,黄思远等(8)88

一种基于Leap Motion的交互全息投影方法

吕宝媛,蔡煜城,林伟达等(10)78

自适应阈值FAST特征点检测算法的FPGA实现

程彪,黄鲁(10)82

便携式光导声波灭火器的研究与设计

官洪运,苏振涛,汪晨(11)92

一种双波源车辆行车方向识别方法

秦攀,张奔牛,张明辉(11)96

基于过程数据模块的装备故障诊断技术研究

蒙立荣,马永起,程铮等(12)66

基于国产软硬件平台的OPC UA服务器设计与实现

闵晓霜,杨鑫(12)71

行业应用

基于相关滤波器的长时舰船目标跟踪方法

陈威,李决龙,邢建春等(1)135

基于北斗短报文通信的水质监测系统设计

王星星,姜岚,黄科等(1)139

基于STM32和ZigBee无线通信的实验室安防系统

朱利娟,云中华,边巴旺堆等(1)143

运动目标检测在单兵作战中的应用

张芝贤,张凯(2)108

一种星载固态功放驱动电源的设计

董硕,陈赞,王正之等(2)112

基于Emotiv的脑机接口研究

陈侃,张胜利,丁凡(2)116

一种大功率重频充电电流的分析与研制

冯传均,何泱,戴文峰(2)119

角点和边缘结合的红外与可见光图像匹配

葛雯,何博(2)122

一种改进的双麦克智能语音前端算法

方赛鸿(2)127

基于STM32和LABVIEW的两用太阳跟踪器设计

苏杨,刘卿卿(2)131

混合迭代学习法在发动机怠速稳速控制中的应用

崔建平,李登科,刘成基(2)135

一种动力电池制造环境监测的智能网关技术

徐勋庭,梅领亮,骆德汉(2)140

虚拟手术中心脏跳动仿真技术研究

刘波,陈国栋,王娜(2)143

程序源代码中的切片摘要提取及在搜索中的应用

李润青,曾国荪(3)122

基于RFID/GIS的城市地下管网监控管理系统

章光旭,陈明智,毛五星等(3)126

基于数据缓冲池技术的二次设备状态评价数据处理方法

李金,高寿(3)131

负载弱电流远程监控系统设计

杨峰,童轩,李建奇(3)134

运动目标微弱放射性核素的快速识别方法

王昌龙,张江梅(3)137

交直流配电网及柔性变电站仿真研究

解腾,亢梦婕,王谱宇等(3)140

题 目

作者期页

采用商业元器件降低航天器成本研究

周剑波,丛彦超,赵鹏飞等(3)144

基于交通一卡通的智能化住宅小区应用模式研究

伍冠桦,余红玲,吴金成(3)150

体外反搏治疗效果自动优化算法与实现

肖前军(3)154

一种基于6LoWPAN用于土木结构监测的无线数据采集系统设计

陈海燕,陈志聪,周海芳等(4)120

可穿戴脉搏压力监测系统设计

胡威,吴学洲,朱臣等(4)125

基于PCIE总线的DMA控制器设计与实现

何广亮(4)131

基于数字化生产车间的邮件系统设计与集成

任凯斌,曾鹏飞,郝永平(4)136

JIRA在生产异常管理实践中的应用

张克典,范振强,李智皓等(5)115

固体矿产储量三维辅助评审系统设计与实现

彭斌,陈志晓(5)119

隧道交通智能逃生引导系统设计

姚丹,朱映雪,吴燕等(6)130

基于中间件的开放式基金登记结算系统

陈松楠(6)134

基于压电信号的两种心率呼吸率提取算法比较

贾学斌,廖曦文,商春恒等(7)98

基于ANSYS的气氛烧结炉动态温度场研究

李强,王璐(7)102

基于ZigBee的教学应答系统软件设计

陈科,苏鲁阳,杨笔锋(8)91

基于特征选择和HMM的股票价格行为研究

喻永生,谢天异丹,刘畅等(8)96

题 目

作者期页

基于车联网的物流信息监控平台的研究与设计

张爱玲,曹磊(9)110

基于NFC手机的跨域交通卡移资应用技术的研究

何建兵,徐锋,冷梦甜(9)114

霍尔传感器实时自动定位系统设计

汪远银,岳彩锐,李真山等(9)118

基于B/S模式的三维岩心浏览系统的设计与实现

陈岑,卿粼波,何小海等(10)87

智能终端运营管理系统之微服务架构改造实践

王卫国,潘雨(10)91

海洋石油平台污染物在线监测软件开发应用

胡斌,杨敏,徐栋等(10)95

MES系统在水产加工车间的应用

邹佳霖,范宝德,韩兆玉(10)99

基于AM5728的自适应图像增强算法的研究与实现

郭威,卿粼波,熊淑华等(11)100

基于Canvas的货车图像浏览及增强系统设计与实现

高斯文,卿粼波,熊淑华等(11)104

区块链技术在民航领域的应用

王天山,杨健,王尧(11)109

基于降维的人脸识别方法研究与应用

简彩仁,庄凌宇,林智鹏(12)75

基于云计算的企业信息系统集成与安全机制

支艳利(12)79

仿生嗅觉在空气净化器气味识别中的应用研究

马东旭,骆德汉,徐勋庭等(12)82

XINXIJISHU YU WANGLUOANQUAN

General Contents of Issue1to Issue12,2018

Title

AuthorIssuePage

FrontlineofIndustryandUniversity

The disposal and thinking of an industrial control system virus

Wang Shaojie, Huo Chaobin, et al(1)5

New Android bank Trojan uses social network to hide C&C server

Gan Jie, Guo shanyu(1)9

The prediction, bypassing and interference of the security system and the safety protection

Xiao Xinguang(2)3

An algorithm for anomaly detection based on nonlinear preprocessing and logistic regression

Dong Wei,Yang Chen,Shao Junjie(3)4

Data driven industrial control system cyber security

Wang Tao, Cui Junrong(6)3

Industrial internet impact enterprise transformation

Song Jian,Zhou Jie(6)6

Large sample-based random forest malicious code detection and classification algorithm

Li Xuehu,Wang Faming,Zhan Kai(7)3

Analysis on a virus intrusion of traffic industrial control system and security of critical information infrastructure in China

Dong Wei,Li Zhicheng,Feng Zhi(9)1

ITNSThemeColumn:CyberspaceSecurity

Research and implementation security situation analysis and prediction system for large-scale network

Jia Yan, Han Weihong, Wang Wei(1)17

On thinking of constructing an industrial internet security protection system

Liu Renhui, Zhang Ni, Wu Yunfeng(1)23

The security analysis of RSA-PKCS#1 encryption algorithm in JSON

He Jian,Jiang Lin,Liao Qing,et al(1)25

Analysis and research on secure enclave architecture

Liao Zhengyun,Guo Jiansheng(1)30

ITNSThemeColumn:Networkartificialintelligence

andintelligentnetworkadministration

An artificial intelligence network architecture based on software defined network

Liu Huiwen,Yao Haipeng,Zhang Peiying(2)7

Research of priority-based bandwidth guarantee algorithm on SDN architecture

Cao Shaohua,Zhang Bin,Zhang Peiying(2)11

The use of artificial-intelligence-based ensembles for intrusion detection

Jin Yaqing,Ding Zhenxing,Ji Qingqing(2)15

Design of LEO satellite network resource management architecture based on AI

Wang Zhuwei,Xu Guangshu,Mai Tianle, et al(2)20

Title

AuthorIssuePage

ITNSThemeColumn:IndustrialControl

SystemandInformationSecurity

Native security design in PLC

Zhu Yiming(3)8

Design of the intrinsically-safe CSCS for pumped storage power station

Peng Yumin,Wu Yunfeng(3)11

Construction of new data acquisition system in intelligent factory

Gong Tao,Zhao Henan(3)15

Design of control system and information security protection for water diversion project

Li Lianquan, Li Runwei(3)20

Risk analysis of intelligent manufacturing on industrial information security

Wu Jiqing,Wei Youshuang(3)24

Analysis on the anomaly detection of field control network

Zhao Guicheng,Cheng Peng,Wang Wenhai(3)28

Analysis of APT attack and defense in industrial control systems

Xu Jianxin,Huan Yuehui,Wang Ying(3)32

Research on typical model of network intrusion and attack in power industrial control system

Guo Zhimin, Lv Zhuo, Chen Cen(3)37

ITNSThemeColumn:

BigDataSecurityTechnology

Status and challenges of the big data industry

Gu Zhaoquan, Zhang Ni, Li Shudong, et al(4)3

The key technologies and challenges of big data analysis

Han Weihong, Jia Yan, Zhou Bin(4)7

Research of knowledge semantic modeling technology for bigdata:an overview

Chai Yuhan, Liu Yan, Si Yaqi, et al(4)11

Design and key technology analysis of high concurrency data for medical big data platform

Zhang Wei(4)18

A new paradigm of early warning of network public opinion

Liu Zerui(4)23

ITNSThemeColumn:IndustrialInformation

SecurityTechnologyDevelopmentandApplication

Research on industrial control system cyber security situation awareness framework

Tao Yaodong,Jia Xintong(5)3

Security protection measures and related suggestions for industrial control system of long-distance natural gas transmission pipeline

Wang Lei,Wei Na(5)7

Title

AuthorIssuePage

Industrial control assurance system for discrete manufacturing industry

Zhao Jianming,Shang Wenli ,Qi Yingying, et al(5)12

Application and development trend of PLC control system in age of intelligent manufacturing

Han Qingmin, Lin Hao, Jiang Hongzhao, et al(5)18

Technological change of industrial control security under the age of classified protection 2

Xie Yunlong,Wu Deqing,Jiang Hongyong(5)22

ITNSThemeColumn:

AnonymityandPrivacyProtection

DP2Gsister: differential privacy publishing model for social network graph

Yin Yiping,Xu Ruifeng(6)11

Survey of Internet service accessibility

Tan Qingfeng,Shi Jinqiao,Wang Xuebin, et al(6)18

Outsourcing private set intersection computing protocol based on OT protocol

Liao Pengcheng,Chen Xiaojun,Shen Liyan, et al(6)28

Local differential privacy applications in data crowdsourcing

Fang Junbin,Jiang Qianyue,Li Aiping(6)32

Privacy preserving in social network based on differential privacy

Huang Xixi,Jiang Qianyue,Jiang Lin, et al(6)36

ITNSThemeColumn:

FinancialInformationSecurity

The theory of“Financial Security (Fin Sec) 3.0” and financial security ecosystem

Li Yang, TangXiujiang, Chen chunlu, et al(7)6

A software defined threat trapping mechanism

Liu Wenmao, Liu Weixin(7)9

The application of log intelligent analysis in bank information security operation

Sun Weihao, Ling Zongnan, Chen Weixin(7)13

The system research on information security in smart cities

Li Yang,Xie Qing, Qiu Jingpingi, et al(7)18

Dozens of integer overflow vulnerabilities found in ERC20 smart contracts

Chen Libo, Yin Tingting, Ni Yuandong, et al(8)3

The big-data-based construction thinking for Internet finance

An Bingchun, Zhang Jian, Tao Rong(8)7

The construction of network security systems in rural financial institutions

Zuo Yingnan(8)11

The standard of blockchain applications model publication and deployment technologies research

Bai Jie, Li Dongyun, Wu Xianfeng(8)13

ITNSThemeColumn:

CECNetworkSecurityandInformatization

A survey of RTD-gated HEMT

Zhu Changju(9)5

Design and optimization of a lightweight Linux desktop environment based on pluggable framework

Yu Jie, Ma Jun,Peng Huan, et al(9)9

Title

AuthorIssuePage

Study on the key technology of automatic controlled programming compilation tool in industrial control industry

Guo Xiaowang, Chen Hai, Zhao Dezheng(9)13

Research on several key problems of domestic office information system

Guo Changguo,Xie Jinsong,Han Peng, et al(9)17

Design of network traffic security monitoring system based on open aggregation framework

Wang Yanwei,Wu Jiang,Luo Yunqian, et al(9)22

Security IC design based on the Beidou satellite navigation system

Fan Changyong(9)27

The principle of a stream cipher based on RC4 algorithm and how to realize it

Liu Chengyuan(9)31

Implementing a SD UHS dynamic tuning phase based on delayline

Liu Yanli,Zhang Lu,Feng Yanzhao, et al(9)34

A preliminary study on the security of e-government construction based on domestic database

Jiang huilin(9)38

ITNSThemeColumn:Researchon

informationsecurityandCryptography

ORAM scheme based on fully homomorphic encryption

Song Ningning(11)1

Research of NIST statistical test

Wang Chao,Wen Tao,Duan Ranyang(11)5

Research of ZUC algorithm randomness test

Wang Chao,Fan Guohao,Fu Baoren(11)9

Survey of large integer factorization algorithm

Yang Jiangshuai(11)12

Chaotic map based authenticated key agreement scheme

Guo Dianli(11)16

Related-key cube attack on round-reduced block cipher KATAN32

Wang Mingxing(11)20

The study on design of lightweight block ciphers

Chen Huaifeng(11)25

NetworkandInformationSecurity

The analysis of network security from three kinds of fusion angles

Fan Henan, ZhangZhong(1)33

A survey of user network behavior simulation technology

Li Jingjing, Liu Hongri, Liu Yang, et al(1)36

Research on active awareness warning method for networked industrial control system

Ma Qiang,Yin Shunyao,Yang Yiyin(1)40

An intrusion detection method based on semi-supervised learning for industry control system network

Zhang Songqing, Liu Zhiguo(1)44

Research for public opinion orientation analysis based on machine learning

Luo Yujun(1)48

(k, δ, ai)-anonymity model based on sensitivity hierarchical

Liu Yang, ZhuYongzhi, Chi Yuliang(1)52

The network information security simulation and analysis for rail traffic control system

Xu Chao,Mo Jiayong,Lin Junnan(1)57

Research on trust model of subjective and objective collaboration in Cloud environment

Zhang Di,Ding Qing(2)23

Title

AuthorIssuePage

One-way character sequence hash algorithm based on nonlinear preprocess and neural network

Zhu Wei(2)29

Application of network video monitoring system based on embedded platform

Cai Weili, Qing Linbo, Teng Qizhi, et al(2)33

Design and implementation of QR code encryption system based on embedded platform

Zhou Jiahua, Li Fushan(2)37

A survey of network traffic classification technology based on SDN

Jiang Haijun, Xie Jun, Guo Xiaofan, et al(2)40

Research on information security testing platform of ICS

Lu Kai, Zhu Guangyu, Wang Shaojie, et al(3)40

Security protection design based on trusted computing for control system of urban sewage treatment plant

Wu Yunfeng(3)45

Video information hiding algorithm based on alpha superposition

Su Pengtao,Tian Ze,Liu Yihan(3)50

Research of security architecture oneSIM card

Huang Jian,Huang Jianwen,Li Junlei, et al(3)53

Construction of network security indication-system based on back propagation neural network

Liu Haitian, Han Weihong, Jia Yan(4)26

Research on network intrusion detection based on neural network model

Wang Yu, Ding Qing,Luo Xian(4)30

Design and implementation of a dynamic acquisition strategy for active safety

Zhai Youjun, Zhao Danpu, Tai Xianqing(4)34

Research on future architecture of network range

Liu Zhiguo, Yu Zengming, Wang Jian, et al(6)41

An IoT remote management platform security solution based on trusted embedded interactive module

Chen Bo, Yang Yonggang, Zhu Guangyu(6)47

Research on the role of central enterprises in national network security

Lin Tao,Zhang Xianghong(6)52

Identity management research based on blockchain

Chen Yuxiang,Zhang Zhaolei,Zhuo Jian, et al(7)22

Research on secure and reliable transmission based on directional polarization modulation

Qi Shuai, Zhang Bangning, Guo Daoxing, et al(7)27

Applications of deep learning in network information security

Chen Xiao(7)33

Webshell detection method based on deep learning and semi-supervised learning

Wu Bin,Zhao Li(8)19

Research on servitization of network security supervision based on SECaaS

Zhang Zhinan, Ke Xianliang, Fu Aimin(8)23

Design of security system based on cloud computing services

Zhang wei(9)42

Ransom worm virus monitoring method based on distributed honeypot technology

Qin Yujie(9)45

Cyber security analysis and attack experiment on IEC60870-5-104 SCADA system

Jiang Zexin(10)1

Research on hardware in the loop simulation model based on industrial control system of power plant information security

Su Chang,Xiong Shenduo,Luo Anqin, et al(10)5

DGA domain ensemble detection method based on deep learning

Luo Yunqian,Wu Jiang,Wang Yanwei, et al(10)10

Architecture design of big data analysis and management platform based on Hadoop

Zhang Wei(11)30

Title

AuthorIssuePage

Security architecture based on blockchain for smart Cloud manufacturing

Du Lan,Chen Linlin,Zhang Li, et al(11)34

Research on a collaborative method of penetration testing based on STIX information interaction

Liu Yue,Zhang Haifeng,Zhang Liang, et al(12)1

Research on risk assessment model of grade protection based on Bayesian network

Zhao Yiming,Xie Jiong,Wang Gang, et al(12)6

Architecture design of Cloud encyclopedia system for power enterprises

Zhang Wei(12)11

InformationCommunication

IoT platform and the open evaluation of its Cloud platform

Jia Xueqin, Hu Yun, Xing Yulong(1)62

Research on security and protection technology of big data platform

Liu Minghui,Chen Tian,Wang Zhuxin(1)65

Anomaly detection method based on pattern frequencies in wireless sensor networks

Shi Xiaobin,Wu Danping,Cheng Hongju(1)70

Computer-aided minimally invasive surgical navigation system based on augmented reality

Huang Weiping,Wei Mengyu,Du Min,et al(1)76

Wireless secure enhancement with cooperative jamming in cooperative communication system

Zhou Qian,Zang Guozhen,Peng Lei,et al(1)81

An improved estimation algorithm of frequency offset and its application

Liu Kai, Zhou Yuanping(1)87

Application and optimization of TIPC in embedded cluster system

Shi Si, Ye Jianfang, He Rui(2)63

Multi-hop broadcast protocol in VANET based on fuzzy logic approach

Liao Enrui, Pan Yanyan, Song Xiang(2)68

Design of wide-band aperture-stacked patchmicrostrip antennas

Zhou Bing,Zou Chuanyun(2)72

GLONASS satellite navigation signal simulation and software development of receiving verification

Ben Xing,Song Maozhong,Xiong Jun(3)96

A multi-hop uneven clustering algorithm for wireless sensor networks with energy balance

Ma Weifeng, Chen Guifen(3)100

Design of the remote payment device for IC card water meter based on Bluetooth communication

Chang Xingzhi(3)105

A novel adaptive threshold algorithm used for CDMA2000 1x pilot channel capture

Wang Wenshi, Xia Wenlong, Guo Qinggong(4)79

Immune particle swarm optimization algorithm for DV-Hop localization

Wu Zhenzhen, Fang Wangsheng(4)84

Research and improvement of beamforming algorithm

Liu Quan, Zhou Yuanping, Xu Lei, et al(4)88

An improved construction algorithm for adaptive QC-LDPC codes

Fan Renji, Zhao Danfeng(5)58

Research on WiFi assisted IMU indoor location method

Yuan Guoliang,Xie Kui(5)62

Application of translation invariant wavelet in pulse wave signals de-noising

Wang Taikun,Zhang Haiying,Zhang Yitao,et al(5)66

Research on hybrid routing technology for navigation constellation

Zhang Fang,Zhou Gan,Yu Yaoyao, et al(6)94

Non-linear transceiver design for MIMO interference broadcast channel with CSI error

Jia Yaping,Geng Xuan(6)99

Design of Ku-band portable radar transceiver system

Cai Chang, Yang Hao, Du Zebao, et al(6)104

Title

AuthorIssuePage

A method for the maximum throughput of the RB-HARQ implemented in secure transmission

Wang Lei,Guo Daoxing,Jiang Xuanyou(7)62

Design and implementation of CMA blind equalizer and PLL based on GNURadio

Li Xiaoguang,Pan Kegang(7)67

Joint resource allocation and layer selection for scalable video transmission in long term evolution system

Xing Zhihao,Yang Bowen,Yang Jian(7)71

Research and implementation of the Kepu Cloud Webcast system based on Nginx

Ma Aitian, Geng Lihong, Wang Runqiang,et al(8)54

Radar receiving front-end technology with frequency monitoring capability

Zhang Qiuyan,Wang Chao,Chen Yanjun(8)58

Design and implementation of multi-channel vector signal source based on PXI bus

Zhang Qiuyan, Zhang Peng(9)76

Research on IMM based on coordinate transformation in vehicle positioning

Jiao Yuqi, Niu Rui,Xia Zhi(9)80

Interference suppress method for UAV communications in two-way mobile relays

Yang Runfeng,Luo Chunbo,Zhang Yiqun(9)85

Research and analysis of terminal replacement technology

Lu Wei,Li Yiqun,Li Jiajun,et al(9)89

Design of high speed data center interface unit based on ZYNQ

Lv Junjie,Wu Jie(10)51

Study on dual-tone signal frequency estimation based on expectation maximization algorithm

Yuan En,Liu Peng,Chen Longliang, et al(10)55

Study on cache strategy of small cell networks supporting MEC

He Jiaohong, Pan Peisheng(11)69

Reliability-based HARQ assisted irregular LDPC code in secure transmission

Wang Lei,Ding Xiaohui(11)74

Efficient spatial reuse mechanism for FD relay in MAC layer of wireless Ad Hoc networks

Song Yu,Qi Wangdong,Zhao Weiwei(11)79

Adaptive tracking algorithm of interference polarization state in satellite communication

Qi Shuai, Guo Daoxing, Zhang Bangning, et al(12)48

Optimal design of M-APSK modulation constellation approaching Gaussian channel capacity

Jiang Xuanyou,Wei Yimin,Wang Lei, et al(12)52

IntelligentAlgorithm

A collaborative filtering recommendation algorithm based on double-dimensional cloud model

Liu Meibo,Man Junfeng,Peng Cheng,et al(1)92

Accuracy analysis and inversion method of robot hand-eye calibration based on HALCON

Yang Houyi(1)97

User type-based incentive mechanism design in participatory sensing system

Lin Yeting,Chen Zhonghui,Feng Xinxin,et al(1)101

Dynamic gesture recognition based on SVD feature compression and HMM

Jiang Haijun, Xie Jun, Duan Guolun, et al(1)106

Aerial image enhancement based on multi-scale domain and energy feature

analysis

Liu Chang, LiaoYipeng(1)111

Research on method of fault prediction based on gray metabolism model and neural network

Gao Xuanxuan, Li Changyun, Lei Xiaowei(1)115

Research of reuse technology based on the Ext JS framework MVC model

Zhou Yu,Wen Jinhua,Xu Jianliang(2)46

Optimal allocation method of testability index based on cost function

Wang He,Zhu Zhiping,Wang Guiteng, et al(2)51

Referee document segmentation system based on natural semantic processing

Zheng Shaowan, Lu Peimin(2)55

Title

AuthorIssuePage

Transmission method for robot exploring map under wireless low bandwidth

Zhang Hongyang, Xiao Yufeng, Liu Ran(2)58

Target recognition method based on three frame difference method and clustering algorithm

Liang Qiong, Cai Yongda, Lu Meimei, et al(3)57

The method and its application of remote sensing image fusion based on AIHS

Hu Jiawei, Liu Junqing, Wang Kang, et al(3)61

Research on the decentralized fault diagnosis algorithm for building electrical system based on SVM

Zhao Xuechen,Xing Jianchun,Wang Ping,et al(3)65

A method of visibility detection based on multiple regression

Tang Shaoen, Li Qian, Gu Daquan, et al(3)70

Distance transform based PRM path planning algorithm

Li Min,Zhou Yuanyuan,Huang Lu(3)74

Network software defect prediction method based on association rules

Hu Liu, Deng Jie, Zhao Zhengwei, et al(4)41

Study on the alignment algorithm for sequencing based on region filtering

Ding Shengnan, Wu Ming, Xu Yun(4)45

Comparison of deep forest and artificial neural network in prediction of PV output

Shen Wenbo, Sun Rongxia, Ma Shaoqing, et al(4)49

Research of intelligent searching system of mediums

Guan Li, Zhang Xiangwen, Zhang Fan, et al(4)52

Research of directed map matching based on Hidden Markov Model

Chen Zhonghui, Wang Biao, Feng Xinxin, et al(4)55

Mobile augmented reality registration algorithm based on natural features

Xie Zhenchao,Huang Jun,Zhang Lei,et al(5)71

An improved dehazing algorithm based on dark channel prior

Yang Bin, Lin Zhixian,Guo Tailiang(5)75

An improved weighted frequency differential electrical impedance tomography algorithm

Zhang Xiawan(5)80

Greedy EM algorithm based on MapReduce framework

Cao Jiaqing,Wu Guanmao(5)84

Collaborative filtering algorithm based on fuzzy C-means and weighted method of eigenvalues

Zi Yunfei, Li Yeli, Sun Huayan, et al(6)54

Estimation of lithium battery SOC based on KPDF algorithm

Xing Yunfeng,Zhao Ye(6)59

Improved SDT algorithm based on data sensitivity adaptation

Zhang Hanxiao,Mu Fuqi,Lv Xinyan(6)64

Study on deep Boltzmann model with variable parameter

Wang Na, ChenXianfu(6)68

Study on the shortest path selection based on Floyd improved acceleration algorithm

Ma Ying, Chen Zhilong, Liu He, et al(6)72

Optimizing particle filter algorithm using butterfly algorithm

Liu Yuntao(7)37

Virtual network mapping alogorithm for file storage

Chen Chen,Zheng Quan,Wang Zhizhen, et al(7)42

Study on DNA algorithm based on diploid dominant mechanism

Xu Kai, Chen Xianfu(7)46

Task scheduling based on chaotic disturbance particle swarm optimization algorithm in Cloud computing environment

Xu Xiangyang,Zhang Fanglei(8)27

Comparisons on fusion algorithms of Landsat 8 OLI multi-spectral and panchromatic images

Jiang Xiaochen, Deng Zhengdong, Wu Guoying, et al(8)31

Fuzzy C-means clustering algorithm based on particle swarm optimization

Wang Yugang(8)36

Research on multi-target face recognition based on adaptive threshold PCA

Hao Gang, Liang Peng(9)49

Title

AuthorIssuePage

RHC construction method for binary search decision tree

Xu Youwei,Zhang Hongjun,Cheng Kai, et al(9)52

A multi-threshold moving target detection algorithm for home security based on OpenCV

Liu Zhicong,Chen Dewei,Li Hongyang, et al(9)57

Random number generator based on LFSR supporting both parallel and serial

Wang Chao,Zhang Qiuyan,Zhang Shan, et al(10)15

Research on fighting evaluation algorithm based on SVM

Chen Zejia,Zeng Peifeng(10)19

Noise base processing of LPI signals based on Welch and flexible morphology

Geng Changqing,Yang Chengzhi,Zhang Zhigang, et al(10)24

An improved collaborative filtering algorithm based on user clustering and item clustering

Luo Xian, Ding Qing, Wang Yu(10)28

Video stabilization algorithm based on adaptive camera motion speed

Hu Qi,Luo Jianxin,Hu Guyu, et al(10)32

The research of Point cloud global registration based on region division

Zhou Jianzhao,Du Wenchao,Yan Yuji, et al(11)39

A method to generate hashtag vector and build hierarchy architecture of network users′ self-describing hashtag

Sun Yi,Qiu Hangping,Wang Qinxue(11)44

The analysis and improvement of A*algorithm based on Virtual Reality

Song Jian,He Xiaohai,Wang Zhengyong, et al(11)50

Method for extracting cable in aerial image

He Banggeng,Wu Xiaohong,He Xiaohai, et al(11)54

Symmetric similar image completion based on redefined priority

Zheng Chengsong, Li Qi(12)14

Design and implementation of an event-driven biometric identification framework service

Jiang Linxuan, Yu Jie, Liu Xiaodong, et al(12)18

Research on task scheduling algorithm based on trust subject and benefit value in Cloud computing environment

Wu Zhou(12)26

Estimation of reservoirs capacity based on ZY-3 and Landsat 8 OLI

Jiang Xiaochen, Deng Zhengdong, Wu Guoying(12)30

ArtificialIntelligence

Study on inspection robot SLAM in open environment

Ren Jie,Song Jiantao,Li Gongyan(3)80

Design and research of motion analysis device based on STM32

Fang Xiaoming,Su Kaixiong(3)84

Least-squares regression subspace segmentation using manifold dimensionality reduction method

Lin Zhipeng, Huang Zengyu, Jian Cairen(3)88

Design and realization of vehicle pedestrian detection system based on ZYNQ

Deng Jianfeng,Xie Yun(3)91

Study of speaker adaptation method based on deep neural network

Gu Dian, Li Hui(4)60

Face points detection based on optimized parallel AlexNet model

Chen Dongmin, Yao Jianmin(4)65

Wheat kernel recognition based on Laplacian convolution network and SMM classifier

Kang Pengxin, Qing Linbo, Teng Qizhi, et al(4)71

Digital recognition based on deep learning in TensorFlow platform

Jin Tao, Zhang Yongai(4)74

A fast method of vehicle identification

Hu Peng, Bai Tian, Xu Xiaolong(5)41

Research on improved convolutional neural network in answer selection module

Xu Chang,Zhang Lin(5)46

Title

AuthorIssuePage

Car detection based on EdgeBoxes and rotation-invariant features

Lou Yuqiang, Jiang Huatao, Chang Lin,et al(5)50

Research on speech enhancement algorithm based on generative adversarial networks

Ke Jian, Xu Zhijing(5)54

A method of Web document classification based on fusion of various information

Duan Guolun,Xie Jun,Guo Leilei, et al(6)76

A method of facial expression recognition based on island loss

Zeng Yiqi,Guan Shengxiao(6)80

Deep recurrent Q-learning method for traffic signal optimization control

Shi Saijiang,Chen Feng(6)85

Online real-time human action detection based on continuous frames

Zhou Daoyang, Guan Shengxiao, Xia Yuwei(6)90

Small-size pedestrian detection via deep convolutional neural network

Guo Aixin,Yin Baoqun,Li Yun(7)50

A LSTM-based method for vehicle detection in video

Li Suichan,Chen Feng(7)54

RGB-D co-saliency detection via multi-view information fusion

Wu Qianshen(7)58

Facial thermal infrared image generated on GAN

Wang Yaxin,Shi Xiaoxiao(8)40

A fast time-space stereo matching method based on advanced driving assistance system

Zhu Sujie,Wang Meng(8)45

Research on brand vehicle sales forecasting based on network search data

Xie Tianbao,Cui Tian(8)50

A dynamic soft sensor model of PTA average particle size based on CNN-XGBoost

Zhou Peng(9)61

Multi-barcode detection and implementation based on deep learning

Zhou Mian,Liu Binghan(9)65

A method for batch Web image annotation based on surrounding text information

Guo Leilei,Yu Lu,Duan Guolun, et al(9)70

Flame detection based on logistic regression model

Guan Hongyun,Yang Yiwei,Wu Wei, et al(10)36

Distributed kernel-based online AUC maximization

Liu Xin,Pan Zhisong,Zhou Xingyu, et al(10)41

TCD medical data classification based on FSVM algorithm

Wang Zhiyuan,Wu Chenghao,Wang Zheng, et al(10)46

Seismic first arrival picking based on fully convolutional networks

Liu Jianan,Wu Jie(11)58

Vehicle detection and recognition based on highway monitoring video

Chen Weixing,Bai Tian,Xu Xiaolong(11)64

Wheat recognition method based on spectrum properties and adaptive wormhole positioning

Wang Zhoupu,He Xiaohai,Wu Xiaoqiang, et al(12)35

Target occlusion detection algorithm based on KCF

Wang Depei,Xie Yun(12)39

Image recognition comparison based on Naive Bayes and Semi-Naive Bayes

Liu Chuang(12)44

IndustrialAutomationTechnology

Research and application on smart manufacturing system implementation methodology in new energy Industry

Li Mojun, Han Qingmin, Du Junzhao(1)118

Research of energy management strategy for fuel cell hybrid power system of multi-rotor unmanned aerial vehicle

Zhang Zhixiang,Xiao Duo,Wang Jiabin(1)122

Title

AuthorIssuePage

Simulation technology research of operation monitoring software for KSN system in nuclear power plant

Cheng Minmin,Jing Yinggang,Zhang Caike,et al(1)127

Early-warning assessment of gas disaster based on MC-AHP-FCE system

Xu Haoli, Wang Daqing, Deng Zhengdong, et al(1)131

Intelligent detection technology of high speed rail based on simplified particle swarm optimization

Wang Man, Wang Heng, Zhang Hua(2)77

A kind of industrial flaw detection technology based on intelligent machine vision recognition

Niu Qian,Liu Guihua,Kang Hanyu(2)81

Research on the displacement measurement accuracy of eddy current sensor inindustral control

Song Shilan, Lu Wenke, Zuo Feng(2)85

Design of motion controller in flat-panel detection and conveying platform based on STM32F4

Zhang Qun,Tao Xiaojie,Zhang Lan, et al(2)90

The implementation of control system for omni-directional mobile platform

Zeng Lingdong, Pei Dong, Wang Quanzhou, et al(2)95

Edge computing based industrial data acquisition

Ma Jijun, Jia Xueqin, Shou Yanbo, et al(4)91

Chamber earth pressure balance control for shield machine based on PSO-BP prediction model

Li Qiang, Li Jingxuan(4)94

A control strategy of droop control inverter and diesel generator parallel operation

Huang Jiahao, Wang Jinquan, Xu Ye, et al(4)100

The design of land subsidence layered monitoring device based on eddy current sensor

Lv Zhonghu, Zhang Qing, Zhang Xiaofei(4)106

Design and realization of master control computer’s power supply control management of missile launcher

Jing Desheng, Zhang Kun(4)109

Online detection of servo system resonance based onEtherCAT

Guo Gaojie,Jiang Ping,Li Xin,et al(5)102

An automatic testing system for audio function of Android devices based on the voiceprint recognition technology

Li Jiawei, Hu Hailong, Lin Zhixian(5)106

The application of active object computing model in industry robot system

Yin Binglei,Dong Bolin(5)110

The design of human-machine interface on flat panel display inspection system

Li Yang,Lin Xiao,Wang Zhujie, et al(6)108

Multi-channel ultrasonic excitation and data acquisition and transmission method

Ding Xiaochao,Yang Yuan,Chen Fu(6)112

A design of high precision batch test equipment for chip capacitor

Liu Shumeng, Feng Guobing, Wang Long, et al(6)117

Design of online inspection system for frying oil quality based on Internet of Things

Huo Huiqing, Ou Wen, Mo Hongbo, et al(7)77

Analysis on the application of Cloud computing in elevator industry

Wu Xiangrong(7)82

Anti-haze expressway light control system based on ZigBee network

He Zili, Zhang Lina, Zhang Fangxin, et al(7)86

Research on pasture positioning technology based on active RFID

Lu Shengwen,Ou Wen(7)90

Measuring the width of laps on tobacco rods based on image processing

Wen Tao, Han Long, Wen Yifu(7)95

The research on operating characteristics of diesel generating set with constant power pulse load

Xing Xin,Wang Jinquan,Xu Ye, et al(8)62

Design and realization of a burst pulses generating system based on FPGA

Feng Chuanjun, He Yang, Dai Wenfeng(8)70

Four type of prevention of the process control system

Su Yaodong(8)73

Research on tool image preprocessing system based on FPGA

Wen Jiajing, Fan Hong, Zhu Jiangze, et al(9)94

Title

AuthorIssuePage

Maximum power point tracking based on improved grey wolf algorithm

Yang Lili, Sun Rongxia, Wang Shuonan(9)97

Design of intelligent beat system for electric locomotive assembly line

Yang Chen,Sun Li(9)101

Study on power characteristics of energy storage battery based on equivalentcir cuitmodel

Liu Yaobin, Xu Ye, Li Jianke, et al(9)105

Design of ergodic scanning maximum current point photovoltaic panel tracking system

Bo Zhongya(10)59

Design and implementation of a portable test equipment about ground proximity warningsystem

Xia Xiaochun, Wang Jian, Zhao Xiaoqing(10)62

Research on the problem of voltage fluctuation of generator terminal under pulse load

Liu Bo,Huang Kefeng,Xu Ye(10)66

Design of industrial customization production system based on Internet of Things

Xie Renxu,Chen Dan,Xu Zhezhuang, et al(10)72

Research on fuzzy sliding mode control strategy of servo motor based on NTSM

Huang Hao,Tu Qunzhang,Pan Ming, et al(11)84

Optimization of authentication mechanism for communication process between domestic PLC system and OPC UA

Zhao Yueqi, Min Xiaoshuang(12)58

Design of intelligent lighting control system based on ZigBee

Zhang Bin,Hou Yanyan,Zhao Tao(12)62

ComputerHardware

Modeling of SRD and its application in chipless RFID system

Zhang Jinghua, Guo Haiyan, Zou Chuanyun(2)100

Designing a sectional structure DAC for 10 MHz 8-bit SAR ADC

Xu Weijia, Tian Junjie, Li Yanbiao, et al(2)104

Design and simulation of the universal broadband current amplifier based on current mode circuit

Feng Hao,Zhao Baishu,Li Xuancheng(3)109

Design of a low jitter and fast locking clock and date recovery circuit

Hu Tengfei, Fang Yi, Huang Lu(3)113

The design and implementation of RTK positioning system based on NEO-M8P

Liu Lianjun, Huang Jiwei(3)117

Automatic weather station control module design based on ARM9

Ye Nan, Liu Huazhi, Lu Xu(4)112

A new charge pump regulator with small ripple voltage

Ouyang Tuori, Huang Lu(4)116

Research and design of NFC access control system

Cao Zeling, Wang Qi(5)88

The analysis of front-end signal of ultrasonic corrosion on-line monitoring system

Wang Run,Meng Lingya, Liu Jingshu(5)93

Design and research of K band pHEMT down-conversion mixer

Li Gang, Yu Kai, Li Sizhen,et al(5)97

The design and implementation of i.MX6-based radar display terminal

Li Hongbing(6)121

Optimization control strategy of hybrid energy storage system for isolated microgrid with pulse load

Shi Meng, Wang Jinquan, Huang Kefeng, et al(6)125

The design of FMMU module in EtherCAT slave controller based on FPGA

Yao Wangjun,Lin Hao,Wang Yongli, et al(8)77

A method to detect S mode ADS-B preamble pulse

Wang Yongli,Yao Wangjun,Chen Yanjun, et al(8)83

Design of an anti-fog and haze intelligent mask

Xu Lei,Zhou Yuanping,Huang Siyuan, et al(8)88

Title

AuthorIssuePage

A method of interactive holographic projection using Leap Motion

Lv Baoyuan, Cai Yucheng, Lin Weida, et al(10)78

Hardware implementation of adaptive threshold FAST feature point detection algorithm based on FPGA

Cheng Biao,Huang Lu(10)82

Research and design of portable photoconductive acoustic fire extinguisher

Guan Hongyun,Su Zhentao,Wang Chen(11)92

A method of vehicle direction recognition based on double wave sources

Qin Pan,Zhang Benniu,Zhang Minghui(11)96

Research of interactive fault reasoning based on process data module

Meng Lirong,Ma Yongqi,Cheng Zheng, et al(12)66

Design and development about OPC UA server based on the localization software and hardware platform

Min Xiaoshuang,Yang Xin(12)71

IndustrialApplication

Ship object tracking based on long-term correlation filter

Chen Wei,Li Juelong,Xing Jianchun,et al(1)135

Design of water quality monitoring system based on Beidou short message communication

Wang Xingxing, Jiang Lan, Huang Ke, et al(1)139

Laboratory security system based on STM32 and ZigBee wireless communication

Zhu Lijuan, Yun Zhonghua, Bianbawangdui, et al(1)143

The application of motion target detection in single-soldier combat

Zhang Zhixian, Zhang Kai(2)108

Design of an on-satellite solid-state power amplifier driving power

Dong Shuo, Chen Zan, Wang Zhengzhi, et al(2)112

Research on brain-computer interface system based on Emotiv

Chen Kan, Zhang Shengli, Ding Fan(2)116

Analysis and development of a high power repetetive charging power supply

Feng Chuanjun, He Yang, Dai Wenfeng(2)119

Infrared and visible light images matching based on corner and edge

Ge Wen, He Bo(2)122

An improved dual MAC intelligent speech front-end algorithm

Fang Saihong(2)127

Design of a dual-use solar tracker based on STM32 and LABVIEW

Su Yang,Liu Qingqing(2)131

Application of hybrid iterative learning in vehicles engine idle speed stability control

Cui Jianping, Li Dengke, Liu Chengji(2)135

Intelligent gateway technology for monitoring power battery manufacturing environment

Xu Xunting, Mei Lingliang, Luo Dehan(2)140

Research on heart beat simulation technology in virtual surgery

Liu Bo,Chen Guodong,Wang Na(2)143

Extraction of slice abstraction from program source code and its application in code search

Li Runqing,Zeng Guosun(3)122

Monitoring and management system of urban underground pipe network based on RFID/GIS

Zhang Guangxu,Chen Mingzhi, Mao Wuxing, et al(3)126

Data processing scheme based on data buffer pool technology for secondary device

Li Jin,Gao Shou(3)131

Design of remote monitor system for load weak current

Yang Feng,Tong Xuan,Li Jianqi(3)134

Rapid detection of weak radionuclide in moving target

Wang Changlong, Zhang Jiangmei(3)137

Simulation of AC/DC distribution network and flexible substation

Xie Teng, Kang Mengjie, Wang Puyu, et al(3)140

Using COTS to reduce the cost of spacecraft

Zhou Jianbo, Cong Yanchao, Zhao Pengfei, et al(3)144

Study on the application mode of intelligent residential district based on traffic card

Wu Guanhua, Yu Hongling, Wu Jincheng(3)150

Title

AuthorIssuePage

Automatic optimization algorithm and its implementation of treatment effect of external counterpulsation device

Xiao Qianjun(3)154

Design of a wireless data acquisition system based on 6LoWPAN for civil structural monitoring

Chen Haiyan, Chen Zhicong, Zhou Haifang, et al(4)120

Design of wearable monitoring system for pulse pressure

Hu Wei, Wu Xuezhou, Zhu Chen, et al(4)125

Design and implementation of DMA controller based on PCIE bus

He Guangliang(4)131

Design and integration of e-mail system based on digital production workshop

Ren Kaibin, Zeng Pengfei, Hao Yongping(4)136

Application of JIRA in production abnormal handling practice

Zhang Kedian,Fan Zhenqiang,Li Zhihao,et al(5)115

Design and implementation of the 3D assistant evaluation system of solid mineral reserves

Peng Bin, Chen Zhixiao(5)119

Design of intelligent escape guidance system for tunnel traffic

Yao Dan, Zhu Yingxue, Wu Yan, et al(6)130

Research and application of open-ended fund transfer agent system based on middleware

Chen Songnan(6)134

The comparison of two kinds of heart rate and respiration rate extraction algorithms for piezoelectric signal

Jia Xuebin,Liao Xiwen,Shang Chunheng, et al(7)98

Research on dynamic temperature field of atmosphere sintering furnace based on ANSYS

Li Qiang,Wang Lu(7)102

The program design of teaching response system based on ZigBee

Chen Ke, Su Luyang,Yang Bifeng(8)91

A study of stock price behavior based on feature selection and HMM

Yu Yongsheng,Xie Tianyidan,Liu Chang, et al(8)96

Research and design of logistics information monitoring platform based on vehicle interconnection

Zhang Ailing, Cao Lei(9)110

A study of IC card transfer application technology based on NFC mobile phone

He Jianbing,Xu Feng,Leng Mengtian(9)114

The real-time automatic positioning system design of Hall sensor

Wang Yuanyin,Yue Cairui,Li Zhenshan, et al(9)118

The design and implementation of three-dimensional core image browsing system based on B/S model

Chen Cen,Qing Linbo,He Xiaohai, et al(10)87

Transformation practice of micro service architecture for intelligent terminal operation management system

Wang Weiguo,Pan Yu(10)91

Development and application of offshore oil platform pollutant online monitoring software

Hu Bin,Yang Min,Xu Dong, et al(10)95

Application of MES system in aquaculture workshop

Zou Jialin,Fan Baode,Han Zhaoyu(10)99

Research and implementation of adaptive image enhancement algorithm based on AM5728

Guo Wei,Qing Linbo,Xiong Shuhua, et al(11)100

Design and implementation of browsing and enhancement system for moving freight car images based on Canvas

Gao Siwen,Qing Linbo,Xiong Shuhua, et al(11)104

Application of blockchain technology in civil aviation

Wang Tianshan,Yang Jian,Wang Yao(11)109

Face recognition method based on dimensionality reduction and its application

Jian Cairen, Zhuang Lingyu,Lin Zhipeng(12)75

Research of enterprise information system integration and security mechanism based on cloud computing

Zhi Yanli(12)79

Application research of biomimetic olfactory in odor recognition of air purifier

Ma Dongxu, Luo Dehan, Xu Xunting, et al(12)82

猜你喜欢

算法设计研究
FMS与YBT相关性的实证研究
辽代千人邑研究述论
视错觉在平面设计中的应用与研究
基于MapReduce的改进Eclat算法
Travellng thg World Full—time for Rree
EMA伺服控制系统研究
进位加法的两种算法
瞒天过海——仿生设计萌到家
设计秀
有种设计叫而专