2018年第1期~第12期总目次
2018-03-04
题 目
作者期页
产学一线
一个工控系统病毒的处置及思考
王绍杰,霍朝宾,田晓娜(1)5
新型Android银行木马“MoqHao”利用社交网络隐藏C&C服务器
甘杰,郭山语(1)9
攻击者对安全体系的预测、绕过、干扰与安全防护应对
肖新光(2)3
基于非线性预处理及逻辑回归的异常检测算法
董伟,杨晨,邵俊杰(3)4
基于数据驱动的工业信息安全防护
王弢,崔君荣(6)3
产业互联网下的企业变革——以元器件分销企业转型实践为例
宋健,周杰(6)6
基于大样本的随机森林恶意代码检测与分类算法
李雪虎,王发明,战凯(7)3
交通行业工控系统遭病毒入侵给我国关键信息基础设施安全的启示
董伟,李致成,冯志(9)1
ITNS主题专栏:网络空间安全
大规模网络安全态势分析系统YHSAS设计与实现
贾焰,韩伟红,王伟(1)17
构筑工业互联网安全防护体系为推动先进制造业发展保驾护航
刘仁辉,张尼,吴云峰(1)23
基于JSON的RSA-PKCS#1加密算法的安全性研究
何建,蒋琳,廖清等(1)25
Secure Enclave安全体系技术分析与研究
廖正赟,郭建胜(1)30
ITNS主题专栏:网络人工智能与智能网络管理
基于软件定义网络技术实现人工智能网络体系架构
刘惠文,姚海鹏,张培颖(2)7
SDN架构下基于优先级的带宽保障算法研究
曹绍华,张斌,张培颖(2)11
人工智能集成学习方法在入侵检测中的运用
金雅晴,丁振兴,姬庆庆(2)15
基于AI的LEO卫星网络资源管理架构设计
王朱伟,徐广书,买天乐等(2)20
ITNS主题专栏:工业控制系统及信息安全
可编程控制器原生的信息安全设计
朱毅明(3)8
本质安全型抽水蓄能电站计算机监控系统设计探讨
彭煜民,吴云峰(3)11
智能工厂新型数据采集系统构建
龚涛,赵赫男(3)15
引调水工程控制系统及信息安全防护设计思考
李连全,李润伟(3)20
题 目
作者期页
智能制造带来的工业信息安全思考
吴吉庆,韦有双(3)24
工控系统现场控制网络异常检测技术浅析
赵贵成,程鹏,王文海(3)28
工业控制系统APT攻击分析和防御问题探讨
许剑新,还约辉,王迎(3)32
电力工控系统网络入侵和攻击典型模型研究
郭志民,吕卓,陈岑(3)37
ITNS主题专栏:大数据安全技术
大数据产业现状和挑战
顾钊铨,张尼,李树栋等(4)3
大数据分析关键技术与挑战
韩伟红,贾焰,周斌(4)7
面向大数据的知识语义建模技术研究综述
柴瑜晗,刘妍,司亚琪等(4)11
医疗大数据平台数据高并发方案设计与关键技术分析
张伟(4)18
大数据时代网络涉军舆情预警的新范式
刘泽睿(4)23
ITNS主题专栏:工控安全技术发展及应用
工业控制系统网络安全态势感知框架研究
陶耀东,贾新桐(5)3
长输天然气管道工控系统安全防护措施及相关建议
王磊,魏娜(5)7
离散制造行业的工控安全保障体系
赵剑明,尚文利,齐盈盈等(5)12
PLC控制系统在智能制造时代的应用及发展趋势
韩庆敏,林浩,姜洪朝等(5)18
等保2.0时代下工控安全技术革新
谢云龙,吴得清,姜红勇(5)22
ITNS主题专栏:匿名与隐私保护
DP2Gsister:差分隐私社交网络图发布模型
殷轶平,徐睿峰(6)11
Internet服务可访问性技术综述
谭庆丰,时金桥,王学宾等(6)18
基于OT协议的外包隐私集合交集计算协议
廖鹏程,陈小军,申立艳等(6)28
本地化差分隐私在数据众包中的应用
方俊斌,蒋千越,李爱平(6)32
基于差分隐私的社交网络隐私保护
黄茜茜,蒋千越,蒋琳等(6)36
ITNS主题专栏:金融信息安全
金融行业“金融安全3.0”理论与生态
李洋,唐秀江,陈春璐等(7)6
基于软件定义安全的企业内网威胁诱捕机制
刘文懋,刘威歆(7)9
日志智能分析在银行业IT安全运维管理中的应用
孙惟皓,凌宗南,陈炜忻(7)13
智慧城市信息安全保障体系研究
李洋,谢晴,邱菁萍等(7)18
ERC20智能合约整数溢出系列漏洞披露
陈力波,殷婷婷,倪远东等(8)3
基于大数据的互联网金融安全建设思路
安丙春,张健,陶蓉(8)7
农村金融机构亟需建设新一代网络安全体系
左英男(8)11
题 目
作者期页
发布区块链标准应用模型及应用部署技术研究
白杰,李东云,吴先锋(8)13
ITNS主题专栏:中国电子“网络安全和信息化”专题
RTD-gated HEMT研究进展
朱长举(9)5
轻量级插件式Linux图形桌面环境设计与优化技术
余杰,马俊,彭欢等(9)9
工控行业自主可控编程编译工具关键技术研究
郭肖旺,陈海,赵德政(9)13
国产办公信息系统若干关键问题研究
郭长国,谢劲松,韩鹏等(9)17
一种基于开放聚合框架的网络流量安全监测体系设计
王艳伟,邬江,罗赟骞等(9)22
基于北斗卫星导航系统的安全芯片设计
范长永(9)27
基于RC4算法的流密码原理与实现
刘程远(9)31
基于延迟线的超高速SD卡动态相位调整技术
刘艳丽,张璐,冯彦朝等(9)34
基于国产数据库的电子政务建设安全性初探
姜会林(9)38
ITNS主题专栏:信息安全与密码技术研究
基于全同态加密的ORAM方案
宋宁宁(11)1
NIST随机性检测方法研究
王超,温涛,段冉阳(11)5
ZUC算法随机性检测研究
王超,范国浩,付宝仁(11)9
大整数分解算法综述
杨江帅(11)12
基于混沌映射的身份认证与密钥协商方案
国佃利(11)16
简化版分组密码KATAN32的相关密钥立方攻击
王明兴(11)20
轻量级分组密码算法设计研究
陈怀凤(11)25
网络与信息安全
从三种融合角度解读《网络安全法》
范赫男,张钟(1)33
用户网络行为模拟技术研究
李晶晶,刘红日,刘扬等(1)36
联网工业控制系统主动感知预警技术研究
马强,殷顺尧,羊依银(1)40
一种基于半监督学习的工控网络入侵检测方法
张松清,刘智国(1)44
基于机器学习的舆情倾向性分析研究
罗裕隽(1)48
基于敏感性分级的(k, δ, ai)-匿名模型
刘阳,祝永志,迟玉良(1)52
基于轨道交通控制系统网络信息安全仿真分析
徐超,莫嘉永,林俊南(1)57
云环境下主客观协同的信任模型研究
张迪,丁箐(2)23
基于非线性预处理和神经网络的字符序列单向Hash算法
朱巍(2)29
基于嵌入式平台的网络视频监控系统应用
蔡伟立,卿粼波,滕奇志等(2)33
基于嵌入式的QR二维码加密系统设计与实现
周佳华,李福山(2)37
SDN网络流量分类技术研究综述
蒋海军,谢钧,郭小帆等(2)40
工业控制系统信息安全测试平台研究
卢凯,朱广宇,王绍杰等(3)40
城市污水处理厂控制系统可信安全防护设计
吴云峰(3)45
题 目
作者期页
基于alpha叠加的视频信息隐藏算法
苏鹏涛,田泽,刘逸涵(3)50
eSIM卡安全架构研究
黄健,黄健文,李俊磊等(3)53
基于BP神经网络的网络安全指标体系构建
刘海天,韩伟红,贾焰(4)26
基于神经网络模型的网络入侵检测的研究
王禹,丁箐,罗弦(4)30
一种面向主动安全的动态采集策略设计与实现
翟友钧,赵旦谱,台宪青(4)34
基于云的工业信息安全试验平台架构设计
霍朝宾,贺敏超,刘思洋(5)25
基于SVM算法的工业防火墙规则自学习方法
潘峰,王世伟,薛萍(5)29
应用混合核函数支持向量机的网络安全检测模型研究
张彦军(5)34
关键信息基础设施安全保护运营措施分析与建议
高焕新,高永前(5)37
面向未来的网络靶场体系架构研究
刘智国,于增明,王建等(6)41
一种基于可信嵌入式交互模块的物联网远程管理平台安全方案
陈波,杨永刚,朱广宇(6)47
中央企业在国家网络安全保障中的作用研究
林涛,张向宏(6)52
基于区块链的身份管理研究
陈宇翔,张兆雷,卓见等(7)22
基于方向极化调制的安全可靠传输技术研究
齐帅,张邦宁,郭道省等(7)27
深度学习在网络信息安全中的应用
陈骁(7)33
基于深度学习和半监督学习的webshell检测方法
吴斌,赵力(8)19
基于SECaaS模式的网络安全监管服务化研究
张智南,柯贤良,傅爱民(8)23
基于云计算服务的安全体系设计
张伟(9)42
一种基于分布式蜜罐技术的勒索蠕虫病毒监测方法
秦玉杰(9)45
IEC60870-5-104规约安全性分析及攻击实验
江泽鑫(10)1
电厂工控信息安全半实物仿真模型研究
苏畅,熊申铎,罗安琴等(10)5
基于深度学习的集成DGA域名检测方法
罗赟骞,邬江,王艳伟等(10)10
基于Hadoop的大数据分析管理平台架构设计
张伟(11)30
基于区块链的智慧云制造系统安全架构
杜兰,陈琳琳,张丽等(11)34
一种基于STIX信息交互的渗透测试协作方案研究
刘岳,张海峰,张良等(12)1
基于贝叶斯网络的等级保护风险评估模型研究
赵一鸣,谢炯,王钢等(12)6
电力企业云百科系统的架构设计
张伟(12)11
信息通信
物联网平台及其云化平台的开放性评估
贾雪琴,胡云,邢宇龙(1)62
大数据平台安全威胁与防护技术研究
刘明辉,陈湉,王竹欣(1)65
无线传感器网络中基于模式频繁度的异常检测方法
施晓斌,吴丹萍,程红举(1)70
基于增强现实的计算机辅助微创手术导航系统
黄伟萍,韦孟宇,杜民等(1)76
协同通信系统中基于协作干扰的无线安全增强
周钱,臧国珍,彭磊等(1)81
题 目
作者期页
一种改进的频偏估计方法及应用
刘凯,周渊平(1)87
TIPC在嵌入式集群系统中的应用与优化
施思,叶建芳,何睿(2)63
车联网中基于模糊逻辑处理的多跳广播协议
廖恩瑞,潘燕燕,宋祥(2)68
宽频带缝隙馈电双层贴片微带天线设计
周兵,邹传云(2)72
GLONASS卫星导航信号模拟与接收验证软件开发
贲星,宋茂忠,熊骏(3)96
能量均衡的无线传感器网络多跳非均匀分簇算法
马威风,陈桂芬(3)100
基于蓝牙通信的IC卡水表远程付费装置设计
常兴智(3)105
一种用于CDMA2000 1x导频捕获的自适应门限算法研究
王文实,夏文龙,郭庆功(4)79
免疫粒子群优化的DV-Hop定位算法
吴珍珍,方旺盛(4)84
波束形成算法研究与改进
刘权,周渊平,徐磊等(4)88
一种改进的码率兼容QC-LDPC码构造算法
范仁基,赵旦峰(5)58
WiFi辅助的IMU室内定位方法的研究
袁国良,谢奎(5)62
平移不变小波变换在脉搏波去噪中的应用
王泰琨,张海英,张以涛等(5)66
面向导航星座的混合路由技术研究
张方,周淦,喻瑶瑶等(6)94
CSI误差下MIMO干扰广播信道的非线性收发机设计
贾亚平,耿烜(6)99
Ku波段便携式雷达收发系统设计
蔡畅,杨浩,杜泽保(6)104
一种基于RB-HARQ安全传输技术的吞吐量最大化方法
王雷,郭道省,蒋炫佑(7)62
基于GNURadio的CMA盲均衡器和锁相环组合设计与实现
李晓光,潘克刚(7)67
LTE中SVC视频层数选择和资源分配的联合优化
邢志浩,杨博文,杨坚(7)71
基于Nginx的科普云直播系统研究与实现
马艾田,耿立宏,王闰强等(8)54
具有射频监测能力的雷达接收前端技术
张秋艳,王超,陈严君(8)58
基于PXI总线多通道矢量信号源的设计与实现
张秋艳,张鹏(9)76
基于坐标变换的交互多模型车载定位研究
焦雨琪,牛蕊,夏志(9)80
基于无人机双路移动中继通信的干扰抑制
杨润丰,骆春波,张依群(9)85
终端换机业务分析研究
路玮,李轶群,李佳俊等(9)89
基于ZYNQ的高速数据中心接口单元设计
吕俊杰,武杰(10)51
基于期望最大化算法的双音频率估计方法研究
袁恩,刘鹏,陈隆亮等(10)55
对支持MEC的SCN蜂窝网络缓存策略的研究
何骄鸿,潘沛生(11)69
一种RB-HARQ辅助下基于非规则LDPC码的安全传输方案
王雷,丁晓晖(11)74
无线Ad Hoc网络MAC层中针对FD中继的高效空间复用机制
宋宇,齐望东,赵卫伟(11)79
卫星通信中干扰极化状态自适应跟踪算法
齐帅,郭道省, 张邦宁等(12)48
逼近高斯信道容量的M-APSK调制星座优化设计
蒋炫佑,魏以民,王雷等(12)52
智能算法
基于双维度云模型的协同过滤推荐算法
刘美博,满君丰,彭成等(1)92
题 目
作者期页
基于HALCON的机器人手眼标定精度分析与反演方法
杨厚易(1)97
考虑移动群智感知用户类型的激励机制设计
林烨婷,陈忠辉,冯心欣等(1)101
基于奇异值分解和隐Markov模型的动态手势识别
蒋海军,谢钧,段国仑等(1)106
基于多尺度域和能量特征分析的航空图像增强
刘畅,廖一鹏(1)111
基于灰色新陈代谢和神经网络的故障预测方法研究
杲玄玄,李长云,雷小葳(1)115
基于Ext JS框架MVC模式的复用技术研究
周玉,闻金华,徐建良(2)46
基于费用函数的测试性指标优化分配方法
王贺,朱智平,王贵腾等(2)51
基于自然语义处理的裁判文书分割系统
郑少婉,陆培民(2)55
低带宽条件下机器人探索地图的传输方法
张红阳,肖宇峰,刘冉(2)58
基于三帧差法与聚类算法的目标识别方法
梁琼,蔡湧达,路梅梅等(3)57
基于AIHS的遥感影像融合方法及其应用研究
胡佳伟,刘军清,汪康等(3)61
基于SVM的建筑电气系统无中心故障诊断算法研究
赵雪辰,邢建春,王平等(3)65
一种基于多元回归的能见度检测方法
唐绍恩,李骞,顾大权等(3)70
基于距离变换的PRM路径规划算法
李敏,周远远,黄鲁(3)74
一种基于关联规则的网络软件缺陷预测方法
胡柳,邓杰,赵正伟等(4)41
基于区域过滤的测序序列比对算法研究
丁胜楠,吴鸣,徐云(4)45
深度森林与人工神经网络在光伏出力预测的比较
沈文博,孙荣霞,马少卿等(4)49
一种智能化媒资检索系统的研究
关力,张向文,张帆等(4)52
基于隐马尔可夫模型的有向地图匹配算法研究
陈忠辉,王彪,冯心欣等(4)55
基于自然特征的移动增强现实注册算法
谢振超,黄俊,张磊等(5)71
基于改进的暗原色先验图像去雾算法
杨斌,林志贤,郭太良(5)75
一种改进的加权频差电阻抗成像算法
张夏婉(5)80
基于MapReduce的分布式贪心EM算法
曹家庆,吴观茂(5)84
基于模糊C-均值和特征加权法的协同过滤推荐算法
字云飞,李业丽,孙华艳等(6)54
基于粒子滤波的锂电池SOC二次滤波算法
邢云凤,赵野(6)59
基于数据敏感度自适应的SDT改进算法
张涵笑,慕福奇,吕欣岩(6)64
变参数深度玻尔兹曼计算模型研究
王娜,陈贤富(6)68
基于Floyd改进加速算法的最短路径选择
马莹,陈志龙,刘贺等(6)72
基于蝴蝶优化的粒子滤波算法
刘云涛(7)37
面向文件存储的虚拟网络映射算法
陈晨,郑烇,王志臻等(7)42
基于二倍体显性机制的DNA算法研究
徐凯,陈贤富(7)46
基于混沌扰动PSO算法的云计算任务调度
许向阳,张芳磊(8)27
Landsat 8 OLI多光谱与全色影像融合算法的比较
姜晓晨,邓正栋,武国瑛等(8)31
基于粒子群优化的模糊C均值聚类算法
王宇钢(8)36
基于自适应阈值PCA的多目标人脸识别方法研究
郝刚,梁鹏(9)49
题 目
作者期页
二分查找判定树的RHC构造法
徐有为,张宏军,程恺等(9)52
一种基于OpenCV的家用安防多阈值运动目标检测算法
刘志聪,陈德为,李鸿扬等(9)57
基于LFSR具有并行与串行结果一致的随机数生成算法
王超,张秋艳,张姗等(10)15
基于支持向量机的格斗评估算法研究
陈泽嘉,曾培峰(10)19
基于Welch和柔性形态学的LPI信号噪声基底处理
耿常青,杨承志,张志刚等(10)24
一种结合用户和项目聚类的协同过滤算法
罗弦,丁箐,王禹(10)28
基于自适应相机运动速度的视频稳像算法
胡琪,罗健欣,胡谷雨等(10)32
基于区域划分的点云全局配准研究
周建钊,杜文超,颜雨吉等(11)39
网络用户自描述标签向量生成及标签层次体系构建方法
孙毅,裘杭萍,王沁雪(11)44
面向虚拟现实的A算法的分析与改进
宋健,何小海,王正勇等(11)50
高空悬挂式相机拍摄中的拉索提取方法
何榜耕,吴晓红,何小海等(11)54
基于改进优先权的对称相似图像修复算法
郑成松,李琦(12)14
一种事件驱动的生物特征识别框架服务的设计与实现
蒋林轩,余杰,刘晓东等(12)18
云计算环境下基于信任主体和效益值的动态任务调度算法研究
吴洲(12)26
基于资源三号卫星与Landsat 8 OLI的水库库容估算
姜晓晨,邓正栋,武国瑛(12)30
人工智能
开放式环境下变电站机器人SLAM算法研究
任杰,宋建涛,李功燕(3)80
基于STM32的运动分析装置设计与研究
方晓明,苏凯雄(3)84
流形降维最小二乘回归子空间分割
林智鹏,黄増裕,简彩仁(3)88
基于ZYNQ的车载行人检测系统设计与实现
邓健峰,谢云(3)91
基于深度神经网络的说话人自适应方法研究
古典,李辉(4)60
基于优化的并行AlexNet人脸特征点检测算法
陈东敏,姚剑敏(4)65
基于拉普拉斯卷积网络和SMM分类器的小麦麦粒识别
康朋新,卿粼波,滕奇志等(4)71
TensorFlow平台下基于深度学习的数字识别
靳涛,张永爱(4)74
一种快速的车型识别方法
胡鹏,白天,许晓珑(5)41
改进的卷积神经网络在答案选择模块中的研究
许畅,张琳(5)46
基于EdgeBoxes与旋转不变特征的车辆检测
娄玉强,蒋华涛,常琳等(5)50
基于生成对抗网络的语音增强算法研究
柯健,徐志京(5)54
一种融合多种信息的Web文档分类方法
段国仑,谢钧,郭蕾蕾等(6)76
一种基于隔离损失函数的人脸表情识别方法
曾逸琪,关胜晓(6)80
交叉口信号优化控制的深度循环Q学习方法
施赛江,陈锋(6)85
基于连续帧的在线实时人体行为检测
周道洋,关胜晓,夏雨薇(6)90
基于深度卷积神经网络的小尺度行人检测
郭爱心,殷保群,李运(7)50
一种基于LSTM的视频车辆检测算法
李岁缠,陈锋(7)54
融合多视角信息的RGB-D图像协同显著性检测
吴乾绅(7)58
题 目
作者期页
基于生成对抗网络的人脸热红外图像生成
王雅欣,史潇潇(8)40
一种基于高级驱动辅助系统快速时空立体匹配方法
朱素杰,王萌(8)45
基于网络搜索数据的品牌汽车销量预测研究
谢天保,崔田(8)50
基于CNN-XGBoost的PTA平均粒径动态软测量模型
周鹏(9)61
基于深度学习的多条形码检测与实现
周勉,刘秉瀚(9)65
基于伴随文本信息的Web图像批量标注方法
郭蕾蕾,俞璐,段国仑等(9)70
基于逻辑回归模型的火焰检测
官洪运,杨益伟,吴炜等(10)36
基于分布式核的在线AUC最大化算法
刘鑫,潘志松,周星宇等(10)41
基于FSVM算法的TCD医疗数据分类
王志远,吴成浩,王正等(10)46
基于全卷积神经网络的地震初至波拾取
刘佳楠,武杰(11)58
基于公路监控视频的车辆检测和识别
陈伟星,白天,许晓珑(11)64
基于频谱特性和自适应虫孔定位的小麦识别
王周璞,何小海,吴小强等(12)35
基于KCF的目标遮挡再检测算法
王德培,谢云(12)39
基于朴素贝叶斯与半朴素贝叶斯图像识别比较
刘闯(12)44
工业自动化技术
智能制造系统实施方法论在新能源行业的研究与应用
李末军,韩庆敏,杜军钊(1)118
多旋翼燃料电池无人机能量管理策略研究
张志祥,肖铎,王佳斌(1)122
核电站KSN系统操作监控软件的仿真技术研究
程敏敏,景应刚,张才科等(1)127
基于MC-AHP-FCE系统对瓦斯灾害的预警评估
许颢砾,王大庆,邓正栋等(1)131
基于简化粒子群优化的高铁钢轨智能检测技术
王曼,王姮,张华(2)77
一种基于智能机器视觉识别的工业探伤技术
牛乾,刘桂华,康含玉(2)81
工业控制中电涡流传感器位移测量精度研究
宋士兰,卢文科,左锋(2)85
基于STM32F4的基板检测输送平台运动控制器设计
张群,陶晓杰,张蓝等(2)90
全方位移动平台运动控制系统的实现
曾令栋,裴东,王全州等(2)95
基于边缘计算的工业数据采集
马吉军,贾雪琴,寿颜波等(4)91
基于PSO-BP预测模型的盾构机密封舱土压平衡控制
李强,李景轩(4)94
一种下垂控制逆变器与柴油发电机并联运行控制策略
黄家豪,王金全,徐晔等(4)100
基于电涡流传感的地面沉降分层监测装置设计
吕中虎,张青,张晓飞(4)106
导发架主控计算机供配电管理的设计与实现
景德胜,张坤(4)109
基于EtherCAT架构的伺服系统谐振在线检测
郭高洁,蒋平,李欣等(5)102
基于声纹识别技术的Android设备声音功能自动化测试系统
李嘉伟,胡海龙,林志贤(5)106
题 目
作者期页
主动对象计算模型在工业机器人系统中的应用
殷冰磊,董伯麟(5)110
平板检测系统人机界面设计
李洋,林晓,汪铸杰等(6)108
多通道超声波数据采集传输实现方法
丁孝超,杨媛,陈福(6)112
一种芯片电容高精度批量测试设备设计
刘书萌,冯国兵,王龙等(6)117
基于物联网的煎炸油品质在线检测系统设计
霍慧清,欧文,莫宏波等(7)77
浅析云计算在电梯行业中的应用
吴祥容(7)82
基于ZigBee网络的高速公路防雾霾路灯控制系统
何子力,张丽娜,张放心等(7)86
基于有源RFID的牧场定位技术研究
卢圣文,欧文(7)90
基于图像处理的烟条段搭口宽度测量方法
文韬,韩龙,文一夫(7)95
柴油发电机组带恒功率脉冲负载运行特性研究
邢鑫,王金全,徐晔等(8)62
基于FPGA的猝发多脉冲产生系统设计与实现
冯传均,何泱,戴文峰(8)70
控制系统的“四防”
苏耀东(8)73
基于FPGA的刀具图像预处理系统研究
温佳静,范红,朱江泽等(9)94
基于改进灰狼算法的最大功率点跟踪
杨丽丽,孙荣霞,王硕南(9)97
电力机车装配线智能节拍系统设计
杨晨,孙丽(9)101
储能电池基于等效电路模型的功率特性研究
刘尧斌,徐晔,李建科等(9)105
遍历式最大电流点硅光电池追踪系统设计
薄中亚(10)59
一种便携式近地告警测试设备的设计与实现
夏小春,王键,赵晓晴(10)62
脉冲负载作用下发电机端电压波动问题研究
刘博,黄克峰,徐晔(10)66
基于物联网的工业定制化生产系统设计
谢仁栩,陈丹,徐哲壮等(10)72
基于NTSM的伺服电机模糊滑模控制策略研究
黄皓,涂群章,潘明等(11)84
国产PLC系统与OPC UA通信过程的身份认证机制优化
赵悦琪,闵晓霜(12)58
基于ZigBee的智能照明控制系统设计
张斌,侯严严,赵涛(12)62
计算机硬件
SRD建模及其在无芯片RFID系统中的应用
张精华,郭海燕,邹传云(2)100
一种应用于10 MHz 8位SAR ADC的分段式DAC电路设计
徐韦佳,田俊杰,李延标等(2)104
基于电流模电路的通用宽带电流放大器的设计与仿真
丰豪,赵柏树,李宣成(3)109
一种低抖动快锁定的时钟数据恢复电路设计
胡腾飞,方毅,黄鲁(3)113
基于NEO-M8P的RTK定位系统设计与实现
刘炼军,黄继伟(3)117
基于ARM9的自动气象站控制模块设计
叶楠,刘怀芝,鹿旭(4)112
一种减小纹波电压的新型电荷泵调节电路
欧阳托日,黄鲁(4)116
NFC门禁控制系统研究与设计
曹泽玲,王琪(5)88
题 目
作者期页
超声波腐蚀在线监测系统前端信号分析
王润,孟令雅,刘晶姝(5)93
K波段pHEMT下变频混频器的设计与研究
李罡,余凯,李思臻等(5)97
基于i.MX6的雷达显示终端设计与实现
李红兵(6)121
脉冲负载下独立微电网混合储能的优化控制策略
师萌,王金全,黄克峰等(6)125
基于FPGA的EtherCAT从站控制器FMMU模块设计
姚旺君,林浩,王永利等(8)77
一种S模式ADS-B前导脉冲检测方法
王永利,姚旺君,陈严君等(8)83
一种防雾霾智能口罩的设计
徐磊,周渊平,黄思远等(8)88
一种基于Leap Motion的交互全息投影方法
吕宝媛,蔡煜城,林伟达等(10)78
自适应阈值FAST特征点检测算法的FPGA实现
程彪,黄鲁(10)82
便携式光导声波灭火器的研究与设计
官洪运,苏振涛,汪晨(11)92
一种双波源车辆行车方向识别方法
秦攀,张奔牛,张明辉(11)96
基于过程数据模块的装备故障诊断技术研究
蒙立荣,马永起,程铮等(12)66
基于国产软硬件平台的OPC UA服务器设计与实现
闵晓霜,杨鑫(12)71
行业应用
基于相关滤波器的长时舰船目标跟踪方法
陈威,李决龙,邢建春等(1)135
基于北斗短报文通信的水质监测系统设计
王星星,姜岚,黄科等(1)139
基于STM32和ZigBee无线通信的实验室安防系统
朱利娟,云中华,边巴旺堆等(1)143
运动目标检测在单兵作战中的应用
张芝贤,张凯(2)108
一种星载固态功放驱动电源的设计
董硕,陈赞,王正之等(2)112
基于Emotiv的脑机接口研究
陈侃,张胜利,丁凡(2)116
一种大功率重频充电电流的分析与研制
冯传均,何泱,戴文峰(2)119
角点和边缘结合的红外与可见光图像匹配
葛雯,何博(2)122
一种改进的双麦克智能语音前端算法
方赛鸿(2)127
基于STM32和LABVIEW的两用太阳跟踪器设计
苏杨,刘卿卿(2)131
混合迭代学习法在发动机怠速稳速控制中的应用
崔建平,李登科,刘成基(2)135
一种动力电池制造环境监测的智能网关技术
徐勋庭,梅领亮,骆德汉(2)140
虚拟手术中心脏跳动仿真技术研究
刘波,陈国栋,王娜(2)143
程序源代码中的切片摘要提取及在搜索中的应用
李润青,曾国荪(3)122
基于RFID/GIS的城市地下管网监控管理系统
章光旭,陈明智,毛五星等(3)126
基于数据缓冲池技术的二次设备状态评价数据处理方法
李金,高寿(3)131
负载弱电流远程监控系统设计
杨峰,童轩,李建奇(3)134
运动目标微弱放射性核素的快速识别方法
王昌龙,张江梅(3)137
交直流配电网及柔性变电站仿真研究
解腾,亢梦婕,王谱宇等(3)140
题 目
作者期页
采用商业元器件降低航天器成本研究
周剑波,丛彦超,赵鹏飞等(3)144
基于交通一卡通的智能化住宅小区应用模式研究
伍冠桦,余红玲,吴金成(3)150
体外反搏治疗效果自动优化算法与实现
肖前军(3)154
一种基于6LoWPAN用于土木结构监测的无线数据采集系统设计
陈海燕,陈志聪,周海芳等(4)120
可穿戴脉搏压力监测系统设计
胡威,吴学洲,朱臣等(4)125
基于PCIE总线的DMA控制器设计与实现
何广亮(4)131
基于数字化生产车间的邮件系统设计与集成
任凯斌,曾鹏飞,郝永平(4)136
JIRA在生产异常管理实践中的应用
张克典,范振强,李智皓等(5)115
固体矿产储量三维辅助评审系统设计与实现
彭斌,陈志晓(5)119
隧道交通智能逃生引导系统设计
姚丹,朱映雪,吴燕等(6)130
基于中间件的开放式基金登记结算系统
陈松楠(6)134
基于压电信号的两种心率呼吸率提取算法比较
贾学斌,廖曦文,商春恒等(7)98
基于ANSYS的气氛烧结炉动态温度场研究
李强,王璐(7)102
基于ZigBee的教学应答系统软件设计
陈科,苏鲁阳,杨笔锋(8)91
基于特征选择和HMM的股票价格行为研究
喻永生,谢天异丹,刘畅等(8)96
题 目
作者期页
基于车联网的物流信息监控平台的研究与设计
张爱玲,曹磊(9)110
基于NFC手机的跨域交通卡移资应用技术的研究
何建兵,徐锋,冷梦甜(9)114
霍尔传感器实时自动定位系统设计
汪远银,岳彩锐,李真山等(9)118
基于B/S模式的三维岩心浏览系统的设计与实现
陈岑,卿粼波,何小海等(10)87
智能终端运营管理系统之微服务架构改造实践
王卫国,潘雨(10)91
海洋石油平台污染物在线监测软件开发应用
胡斌,杨敏,徐栋等(10)95
MES系统在水产加工车间的应用
邹佳霖,范宝德,韩兆玉(10)99
基于AM5728的自适应图像增强算法的研究与实现
郭威,卿粼波,熊淑华等(11)100
基于Canvas的货车图像浏览及增强系统设计与实现
高斯文,卿粼波,熊淑华等(11)104
区块链技术在民航领域的应用
王天山,杨健,王尧(11)109
基于降维的人脸识别方法研究与应用
简彩仁,庄凌宇,林智鹏(12)75
基于云计算的企业信息系统集成与安全机制
支艳利(12)79
仿生嗅觉在空气净化器气味识别中的应用研究
马东旭,骆德汉,徐勋庭等(12)82
XINXIJISHU YU WANGLUOANQUAN
General Contents of Issue1to Issue12,2018
Title
AuthorIssuePage
FrontlineofIndustryandUniversity
The disposal and thinking of an industrial control system virus
Wang Shaojie, Huo Chaobin, et al(1)5
New Android bank Trojan uses social network to hide C&C server
Gan Jie, Guo shanyu(1)9
The prediction, bypassing and interference of the security system and the safety protection
Xiao Xinguang(2)3
An algorithm for anomaly detection based on nonlinear preprocessing and logistic regression
Dong Wei,Yang Chen,Shao Junjie(3)4
Data driven industrial control system cyber security
Wang Tao, Cui Junrong(6)3
Industrial internet impact enterprise transformation
Song Jian,Zhou Jie(6)6
Large sample-based random forest malicious code detection and classification algorithm
Li Xuehu,Wang Faming,Zhan Kai(7)3
Analysis on a virus intrusion of traffic industrial control system and security of critical information infrastructure in China
Dong Wei,Li Zhicheng,Feng Zhi(9)1
ITNSThemeColumn:CyberspaceSecurity
Research and implementation security situation analysis and prediction system for large-scale network
Jia Yan, Han Weihong, Wang Wei(1)17
On thinking of constructing an industrial internet security protection system
Liu Renhui, Zhang Ni, Wu Yunfeng(1)23
The security analysis of RSA-PKCS#1 encryption algorithm in JSON
He Jian,Jiang Lin,Liao Qing,et al(1)25
Analysis and research on secure enclave architecture
Liao Zhengyun,Guo Jiansheng(1)30
ITNSThemeColumn:Networkartificialintelligence
andintelligentnetworkadministration
An artificial intelligence network architecture based on software defined network
Liu Huiwen,Yao Haipeng,Zhang Peiying(2)7
Research of priority-based bandwidth guarantee algorithm on SDN architecture
Cao Shaohua,Zhang Bin,Zhang Peiying(2)11
The use of artificial-intelligence-based ensembles for intrusion detection
Jin Yaqing,Ding Zhenxing,Ji Qingqing(2)15
Design of LEO satellite network resource management architecture based on AI
Wang Zhuwei,Xu Guangshu,Mai Tianle, et al(2)20
Title
AuthorIssuePage
ITNSThemeColumn:IndustrialControl
SystemandInformationSecurity
Native security design in PLC
Zhu Yiming(3)8
Design of the intrinsically-safe CSCS for pumped storage power station
Peng Yumin,Wu Yunfeng(3)11
Construction of new data acquisition system in intelligent factory
Gong Tao,Zhao Henan(3)15
Design of control system and information security protection for water diversion project
Li Lianquan, Li Runwei(3)20
Risk analysis of intelligent manufacturing on industrial information security
Wu Jiqing,Wei Youshuang(3)24
Analysis on the anomaly detection of field control network
Zhao Guicheng,Cheng Peng,Wang Wenhai(3)28
Analysis of APT attack and defense in industrial control systems
Xu Jianxin,Huan Yuehui,Wang Ying(3)32
Research on typical model of network intrusion and attack in power industrial control system
Guo Zhimin, Lv Zhuo, Chen Cen(3)37
ITNSThemeColumn:
BigDataSecurityTechnology
Status and challenges of the big data industry
Gu Zhaoquan, Zhang Ni, Li Shudong, et al(4)3
The key technologies and challenges of big data analysis
Han Weihong, Jia Yan, Zhou Bin(4)7
Research of knowledge semantic modeling technology for bigdata:an overview
Chai Yuhan, Liu Yan, Si Yaqi, et al(4)11
Design and key technology analysis of high concurrency data for medical big data platform
Zhang Wei(4)18
A new paradigm of early warning of network public opinion
Liu Zerui(4)23
ITNSThemeColumn:IndustrialInformation
SecurityTechnologyDevelopmentandApplication
Research on industrial control system cyber security situation awareness framework
Tao Yaodong,Jia Xintong(5)3
Security protection measures and related suggestions for industrial control system of long-distance natural gas transmission pipeline
Wang Lei,Wei Na(5)7
Title
AuthorIssuePage
Industrial control assurance system for discrete manufacturing industry
Zhao Jianming,Shang Wenli ,Qi Yingying, et al(5)12
Application and development trend of PLC control system in age of intelligent manufacturing
Han Qingmin, Lin Hao, Jiang Hongzhao, et al(5)18
Technological change of industrial control security under the age of classified protection 2
Xie Yunlong,Wu Deqing,Jiang Hongyong(5)22
ITNSThemeColumn:
AnonymityandPrivacyProtection
DP2Gsister: differential privacy publishing model for social network graph
Yin Yiping,Xu Ruifeng(6)11
Survey of Internet service accessibility
Tan Qingfeng,Shi Jinqiao,Wang Xuebin, et al(6)18
Outsourcing private set intersection computing protocol based on OT protocol
Liao Pengcheng,Chen Xiaojun,Shen Liyan, et al(6)28
Local differential privacy applications in data crowdsourcing
Fang Junbin,Jiang Qianyue,Li Aiping(6)32
Privacy preserving in social network based on differential privacy
Huang Xixi,Jiang Qianyue,Jiang Lin, et al(6)36
ITNSThemeColumn:
FinancialInformationSecurity
The theory of“Financial Security (Fin Sec) 3.0” and financial security ecosystem
Li Yang, TangXiujiang, Chen chunlu, et al(7)6
A software defined threat trapping mechanism
Liu Wenmao, Liu Weixin(7)9
The application of log intelligent analysis in bank information security operation
Sun Weihao, Ling Zongnan, Chen Weixin(7)13
The system research on information security in smart cities
Li Yang,Xie Qing, Qiu Jingpingi, et al(7)18
Dozens of integer overflow vulnerabilities found in ERC20 smart contracts
Chen Libo, Yin Tingting, Ni Yuandong, et al(8)3
The big-data-based construction thinking for Internet finance
An Bingchun, Zhang Jian, Tao Rong(8)7
The construction of network security systems in rural financial institutions
Zuo Yingnan(8)11
The standard of blockchain applications model publication and deployment technologies research
Bai Jie, Li Dongyun, Wu Xianfeng(8)13
ITNSThemeColumn:
CECNetworkSecurityandInformatization
A survey of RTD-gated HEMT
Zhu Changju(9)5
Design and optimization of a lightweight Linux desktop environment based on pluggable framework
Yu Jie, Ma Jun,Peng Huan, et al(9)9
Title
AuthorIssuePage
Study on the key technology of automatic controlled programming compilation tool in industrial control industry
Guo Xiaowang, Chen Hai, Zhao Dezheng(9)13
Research on several key problems of domestic office information system
Guo Changguo,Xie Jinsong,Han Peng, et al(9)17
Design of network traffic security monitoring system based on open aggregation framework
Wang Yanwei,Wu Jiang,Luo Yunqian, et al(9)22
Security IC design based on the Beidou satellite navigation system
Fan Changyong(9)27
The principle of a stream cipher based on RC4 algorithm and how to realize it
Liu Chengyuan(9)31
Implementing a SD UHS dynamic tuning phase based on delayline
Liu Yanli,Zhang Lu,Feng Yanzhao, et al(9)34
A preliminary study on the security of e-government construction based on domestic database
Jiang huilin(9)38
ITNSThemeColumn:Researchon
informationsecurityandCryptography
ORAM scheme based on fully homomorphic encryption
Song Ningning(11)1
Research of NIST statistical test
Wang Chao,Wen Tao,Duan Ranyang(11)5
Research of ZUC algorithm randomness test
Wang Chao,Fan Guohao,Fu Baoren(11)9
Survey of large integer factorization algorithm
Yang Jiangshuai(11)12
Chaotic map based authenticated key agreement scheme
Guo Dianli(11)16
Related-key cube attack on round-reduced block cipher KATAN32
Wang Mingxing(11)20
The study on design of lightweight block ciphers
Chen Huaifeng(11)25
NetworkandInformationSecurity
The analysis of network security from three kinds of fusion angles
Fan Henan, ZhangZhong(1)33
A survey of user network behavior simulation technology
Li Jingjing, Liu Hongri, Liu Yang, et al(1)36
Research on active awareness warning method for networked industrial control system
Ma Qiang,Yin Shunyao,Yang Yiyin(1)40
An intrusion detection method based on semi-supervised learning for industry control system network
Zhang Songqing, Liu Zhiguo(1)44
Research for public opinion orientation analysis based on machine learning
Luo Yujun(1)48
(k, δ, ai)-anonymity model based on sensitivity hierarchical
Liu Yang, ZhuYongzhi, Chi Yuliang(1)52
The network information security simulation and analysis for rail traffic control system
Xu Chao,Mo Jiayong,Lin Junnan(1)57
Research on trust model of subjective and objective collaboration in Cloud environment
Zhang Di,Ding Qing(2)23
Title
AuthorIssuePage
One-way character sequence hash algorithm based on nonlinear preprocess and neural network
Zhu Wei(2)29
Application of network video monitoring system based on embedded platform
Cai Weili, Qing Linbo, Teng Qizhi, et al(2)33
Design and implementation of QR code encryption system based on embedded platform
Zhou Jiahua, Li Fushan(2)37
A survey of network traffic classification technology based on SDN
Jiang Haijun, Xie Jun, Guo Xiaofan, et al(2)40
Research on information security testing platform of ICS
Lu Kai, Zhu Guangyu, Wang Shaojie, et al(3)40
Security protection design based on trusted computing for control system of urban sewage treatment plant
Wu Yunfeng(3)45
Video information hiding algorithm based on alpha superposition
Su Pengtao,Tian Ze,Liu Yihan(3)50
Research of security architecture oneSIM card
Huang Jian,Huang Jianwen,Li Junlei, et al(3)53
Construction of network security indication-system based on back propagation neural network
Liu Haitian, Han Weihong, Jia Yan(4)26
Research on network intrusion detection based on neural network model
Wang Yu, Ding Qing,Luo Xian(4)30
Design and implementation of a dynamic acquisition strategy for active safety
Zhai Youjun, Zhao Danpu, Tai Xianqing(4)34
Research on future architecture of network range
Liu Zhiguo, Yu Zengming, Wang Jian, et al(6)41
An IoT remote management platform security solution based on trusted embedded interactive module
Chen Bo, Yang Yonggang, Zhu Guangyu(6)47
Research on the role of central enterprises in national network security
Lin Tao,Zhang Xianghong(6)52
Identity management research based on blockchain
Chen Yuxiang,Zhang Zhaolei,Zhuo Jian, et al(7)22
Research on secure and reliable transmission based on directional polarization modulation
Qi Shuai, Zhang Bangning, Guo Daoxing, et al(7)27
Applications of deep learning in network information security
Chen Xiao(7)33
Webshell detection method based on deep learning and semi-supervised learning
Wu Bin,Zhao Li(8)19
Research on servitization of network security supervision based on SECaaS
Zhang Zhinan, Ke Xianliang, Fu Aimin(8)23
Design of security system based on cloud computing services
Zhang wei(9)42
Ransom worm virus monitoring method based on distributed honeypot technology
Qin Yujie(9)45
Cyber security analysis and attack experiment on IEC60870-5-104 SCADA system
Jiang Zexin(10)1
Research on hardware in the loop simulation model based on industrial control system of power plant information security
Su Chang,Xiong Shenduo,Luo Anqin, et al(10)5
DGA domain ensemble detection method based on deep learning
Luo Yunqian,Wu Jiang,Wang Yanwei, et al(10)10
Architecture design of big data analysis and management platform based on Hadoop
Zhang Wei(11)30
Title
AuthorIssuePage
Security architecture based on blockchain for smart Cloud manufacturing
Du Lan,Chen Linlin,Zhang Li, et al(11)34
Research on a collaborative method of penetration testing based on STIX information interaction
Liu Yue,Zhang Haifeng,Zhang Liang, et al(12)1
Research on risk assessment model of grade protection based on Bayesian network
Zhao Yiming,Xie Jiong,Wang Gang, et al(12)6
Architecture design of Cloud encyclopedia system for power enterprises
Zhang Wei(12)11
InformationCommunication
IoT platform and the open evaluation of its Cloud platform
Jia Xueqin, Hu Yun, Xing Yulong(1)62
Research on security and protection technology of big data platform
Liu Minghui,Chen Tian,Wang Zhuxin(1)65
Anomaly detection method based on pattern frequencies in wireless sensor networks
Shi Xiaobin,Wu Danping,Cheng Hongju(1)70
Computer-aided minimally invasive surgical navigation system based on augmented reality
Huang Weiping,Wei Mengyu,Du Min,et al(1)76
Wireless secure enhancement with cooperative jamming in cooperative communication system
Zhou Qian,Zang Guozhen,Peng Lei,et al(1)81
An improved estimation algorithm of frequency offset and its application
Liu Kai, Zhou Yuanping(1)87
Application and optimization of TIPC in embedded cluster system
Shi Si, Ye Jianfang, He Rui(2)63
Multi-hop broadcast protocol in VANET based on fuzzy logic approach
Liao Enrui, Pan Yanyan, Song Xiang(2)68
Design of wide-band aperture-stacked patchmicrostrip antennas
Zhou Bing,Zou Chuanyun(2)72
GLONASS satellite navigation signal simulation and software development of receiving verification
Ben Xing,Song Maozhong,Xiong Jun(3)96
A multi-hop uneven clustering algorithm for wireless sensor networks with energy balance
Ma Weifeng, Chen Guifen(3)100
Design of the remote payment device for IC card water meter based on Bluetooth communication
Chang Xingzhi(3)105
A novel adaptive threshold algorithm used for CDMA2000 1x pilot channel capture
Wang Wenshi, Xia Wenlong, Guo Qinggong(4)79
Immune particle swarm optimization algorithm for DV-Hop localization
Wu Zhenzhen, Fang Wangsheng(4)84
Research and improvement of beamforming algorithm
Liu Quan, Zhou Yuanping, Xu Lei, et al(4)88
An improved construction algorithm for adaptive QC-LDPC codes
Fan Renji, Zhao Danfeng(5)58
Research on WiFi assisted IMU indoor location method
Yuan Guoliang,Xie Kui(5)62
Application of translation invariant wavelet in pulse wave signals de-noising
Wang Taikun,Zhang Haiying,Zhang Yitao,et al(5)66
Research on hybrid routing technology for navigation constellation
Zhang Fang,Zhou Gan,Yu Yaoyao, et al(6)94
Non-linear transceiver design for MIMO interference broadcast channel with CSI error
Jia Yaping,Geng Xuan(6)99
Design of Ku-band portable radar transceiver system
Cai Chang, Yang Hao, Du Zebao, et al(6)104
Title
AuthorIssuePage
A method for the maximum throughput of the RB-HARQ implemented in secure transmission
Wang Lei,Guo Daoxing,Jiang Xuanyou(7)62
Design and implementation of CMA blind equalizer and PLL based on GNURadio
Li Xiaoguang,Pan Kegang(7)67
Joint resource allocation and layer selection for scalable video transmission in long term evolution system
Xing Zhihao,Yang Bowen,Yang Jian(7)71
Research and implementation of the Kepu Cloud Webcast system based on Nginx
Ma Aitian, Geng Lihong, Wang Runqiang,et al(8)54
Radar receiving front-end technology with frequency monitoring capability
Zhang Qiuyan,Wang Chao,Chen Yanjun(8)58
Design and implementation of multi-channel vector signal source based on PXI bus
Zhang Qiuyan, Zhang Peng(9)76
Research on IMM based on coordinate transformation in vehicle positioning
Jiao Yuqi, Niu Rui,Xia Zhi(9)80
Interference suppress method for UAV communications in two-way mobile relays
Yang Runfeng,Luo Chunbo,Zhang Yiqun(9)85
Research and analysis of terminal replacement technology
Lu Wei,Li Yiqun,Li Jiajun,et al(9)89
Design of high speed data center interface unit based on ZYNQ
Lv Junjie,Wu Jie(10)51
Study on dual-tone signal frequency estimation based on expectation maximization algorithm
Yuan En,Liu Peng,Chen Longliang, et al(10)55
Study on cache strategy of small cell networks supporting MEC
He Jiaohong, Pan Peisheng(11)69
Reliability-based HARQ assisted irregular LDPC code in secure transmission
Wang Lei,Ding Xiaohui(11)74
Efficient spatial reuse mechanism for FD relay in MAC layer of wireless Ad Hoc networks
Song Yu,Qi Wangdong,Zhao Weiwei(11)79
Adaptive tracking algorithm of interference polarization state in satellite communication
Qi Shuai, Guo Daoxing, Zhang Bangning, et al(12)48
Optimal design of M-APSK modulation constellation approaching Gaussian channel capacity
Jiang Xuanyou,Wei Yimin,Wang Lei, et al(12)52
IntelligentAlgorithm
A collaborative filtering recommendation algorithm based on double-dimensional cloud model
Liu Meibo,Man Junfeng,Peng Cheng,et al(1)92
Accuracy analysis and inversion method of robot hand-eye calibration based on HALCON
Yang Houyi(1)97
User type-based incentive mechanism design in participatory sensing system
Lin Yeting,Chen Zhonghui,Feng Xinxin,et al(1)101
Dynamic gesture recognition based on SVD feature compression and HMM
Jiang Haijun, Xie Jun, Duan Guolun, et al(1)106
Aerial image enhancement based on multi-scale domain and energy feature
analysis
Liu Chang, LiaoYipeng(1)111
Research on method of fault prediction based on gray metabolism model and neural network
Gao Xuanxuan, Li Changyun, Lei Xiaowei(1)115
Research of reuse technology based on the Ext JS framework MVC model
Zhou Yu,Wen Jinhua,Xu Jianliang(2)46
Optimal allocation method of testability index based on cost function
Wang He,Zhu Zhiping,Wang Guiteng, et al(2)51
Referee document segmentation system based on natural semantic processing
Zheng Shaowan, Lu Peimin(2)55
Title
AuthorIssuePage
Transmission method for robot exploring map under wireless low bandwidth
Zhang Hongyang, Xiao Yufeng, Liu Ran(2)58
Target recognition method based on three frame difference method and clustering algorithm
Liang Qiong, Cai Yongda, Lu Meimei, et al(3)57
The method and its application of remote sensing image fusion based on AIHS
Hu Jiawei, Liu Junqing, Wang Kang, et al(3)61
Research on the decentralized fault diagnosis algorithm for building electrical system based on SVM
Zhao Xuechen,Xing Jianchun,Wang Ping,et al(3)65
A method of visibility detection based on multiple regression
Tang Shaoen, Li Qian, Gu Daquan, et al(3)70
Distance transform based PRM path planning algorithm
Li Min,Zhou Yuanyuan,Huang Lu(3)74
Network software defect prediction method based on association rules
Hu Liu, Deng Jie, Zhao Zhengwei, et al(4)41
Study on the alignment algorithm for sequencing based on region filtering
Ding Shengnan, Wu Ming, Xu Yun(4)45
Comparison of deep forest and artificial neural network in prediction of PV output
Shen Wenbo, Sun Rongxia, Ma Shaoqing, et al(4)49
Research of intelligent searching system of mediums
Guan Li, Zhang Xiangwen, Zhang Fan, et al(4)52
Research of directed map matching based on Hidden Markov Model
Chen Zhonghui, Wang Biao, Feng Xinxin, et al(4)55
Mobile augmented reality registration algorithm based on natural features
Xie Zhenchao,Huang Jun,Zhang Lei,et al(5)71
An improved dehazing algorithm based on dark channel prior
Yang Bin, Lin Zhixian,Guo Tailiang(5)75
An improved weighted frequency differential electrical impedance tomography algorithm
Zhang Xiawan(5)80
Greedy EM algorithm based on MapReduce framework
Cao Jiaqing,Wu Guanmao(5)84
Collaborative filtering algorithm based on fuzzy C-means and weighted method of eigenvalues
Zi Yunfei, Li Yeli, Sun Huayan, et al(6)54
Estimation of lithium battery SOC based on KPDF algorithm
Xing Yunfeng,Zhao Ye(6)59
Improved SDT algorithm based on data sensitivity adaptation
Zhang Hanxiao,Mu Fuqi,Lv Xinyan(6)64
Study on deep Boltzmann model with variable parameter
Wang Na, ChenXianfu(6)68
Study on the shortest path selection based on Floyd improved acceleration algorithm
Ma Ying, Chen Zhilong, Liu He, et al(6)72
Optimizing particle filter algorithm using butterfly algorithm
Liu Yuntao(7)37
Virtual network mapping alogorithm for file storage
Chen Chen,Zheng Quan,Wang Zhizhen, et al(7)42
Study on DNA algorithm based on diploid dominant mechanism
Xu Kai, Chen Xianfu(7)46
Task scheduling based on chaotic disturbance particle swarm optimization algorithm in Cloud computing environment
Xu Xiangyang,Zhang Fanglei(8)27
Comparisons on fusion algorithms of Landsat 8 OLI multi-spectral and panchromatic images
Jiang Xiaochen, Deng Zhengdong, Wu Guoying, et al(8)31
Fuzzy C-means clustering algorithm based on particle swarm optimization
Wang Yugang(8)36
Research on multi-target face recognition based on adaptive threshold PCA
Hao Gang, Liang Peng(9)49
Title
AuthorIssuePage
RHC construction method for binary search decision tree
Xu Youwei,Zhang Hongjun,Cheng Kai, et al(9)52
A multi-threshold moving target detection algorithm for home security based on OpenCV
Liu Zhicong,Chen Dewei,Li Hongyang, et al(9)57
Random number generator based on LFSR supporting both parallel and serial
Wang Chao,Zhang Qiuyan,Zhang Shan, et al(10)15
Research on fighting evaluation algorithm based on SVM
Chen Zejia,Zeng Peifeng(10)19
Noise base processing of LPI signals based on Welch and flexible morphology
Geng Changqing,Yang Chengzhi,Zhang Zhigang, et al(10)24
An improved collaborative filtering algorithm based on user clustering and item clustering
Luo Xian, Ding Qing, Wang Yu(10)28
Video stabilization algorithm based on adaptive camera motion speed
Hu Qi,Luo Jianxin,Hu Guyu, et al(10)32
The research of Point cloud global registration based on region division
Zhou Jianzhao,Du Wenchao,Yan Yuji, et al(11)39
A method to generate hashtag vector and build hierarchy architecture of network users′ self-describing hashtag
Sun Yi,Qiu Hangping,Wang Qinxue(11)44
The analysis and improvement of A*algorithm based on Virtual Reality
Song Jian,He Xiaohai,Wang Zhengyong, et al(11)50
Method for extracting cable in aerial image
He Banggeng,Wu Xiaohong,He Xiaohai, et al(11)54
Symmetric similar image completion based on redefined priority
Zheng Chengsong, Li Qi(12)14
Design and implementation of an event-driven biometric identification framework service
Jiang Linxuan, Yu Jie, Liu Xiaodong, et al(12)18
Research on task scheduling algorithm based on trust subject and benefit value in Cloud computing environment
Wu Zhou(12)26
Estimation of reservoirs capacity based on ZY-3 and Landsat 8 OLI
Jiang Xiaochen, Deng Zhengdong, Wu Guoying(12)30
ArtificialIntelligence
Study on inspection robot SLAM in open environment
Ren Jie,Song Jiantao,Li Gongyan(3)80
Design and research of motion analysis device based on STM32
Fang Xiaoming,Su Kaixiong(3)84
Least-squares regression subspace segmentation using manifold dimensionality reduction method
Lin Zhipeng, Huang Zengyu, Jian Cairen(3)88
Design and realization of vehicle pedestrian detection system based on ZYNQ
Deng Jianfeng,Xie Yun(3)91
Study of speaker adaptation method based on deep neural network
Gu Dian, Li Hui(4)60
Face points detection based on optimized parallel AlexNet model
Chen Dongmin, Yao Jianmin(4)65
Wheat kernel recognition based on Laplacian convolution network and SMM classifier
Kang Pengxin, Qing Linbo, Teng Qizhi, et al(4)71
Digital recognition based on deep learning in TensorFlow platform
Jin Tao, Zhang Yongai(4)74
A fast method of vehicle identification
Hu Peng, Bai Tian, Xu Xiaolong(5)41
Research on improved convolutional neural network in answer selection module
Xu Chang,Zhang Lin(5)46
Title
AuthorIssuePage
Car detection based on EdgeBoxes and rotation-invariant features
Lou Yuqiang, Jiang Huatao, Chang Lin,et al(5)50
Research on speech enhancement algorithm based on generative adversarial networks
Ke Jian, Xu Zhijing(5)54
A method of Web document classification based on fusion of various information
Duan Guolun,Xie Jun,Guo Leilei, et al(6)76
A method of facial expression recognition based on island loss
Zeng Yiqi,Guan Shengxiao(6)80
Deep recurrent Q-learning method for traffic signal optimization control
Shi Saijiang,Chen Feng(6)85
Online real-time human action detection based on continuous frames
Zhou Daoyang, Guan Shengxiao, Xia Yuwei(6)90
Small-size pedestrian detection via deep convolutional neural network
Guo Aixin,Yin Baoqun,Li Yun(7)50
A LSTM-based method for vehicle detection in video
Li Suichan,Chen Feng(7)54
RGB-D co-saliency detection via multi-view information fusion
Wu Qianshen(7)58
Facial thermal infrared image generated on GAN
Wang Yaxin,Shi Xiaoxiao(8)40
A fast time-space stereo matching method based on advanced driving assistance system
Zhu Sujie,Wang Meng(8)45
Research on brand vehicle sales forecasting based on network search data
Xie Tianbao,Cui Tian(8)50
A dynamic soft sensor model of PTA average particle size based on CNN-XGBoost
Zhou Peng(9)61
Multi-barcode detection and implementation based on deep learning
Zhou Mian,Liu Binghan(9)65
A method for batch Web image annotation based on surrounding text information
Guo Leilei,Yu Lu,Duan Guolun, et al(9)70
Flame detection based on logistic regression model
Guan Hongyun,Yang Yiwei,Wu Wei, et al(10)36
Distributed kernel-based online AUC maximization
Liu Xin,Pan Zhisong,Zhou Xingyu, et al(10)41
TCD medical data classification based on FSVM algorithm
Wang Zhiyuan,Wu Chenghao,Wang Zheng, et al(10)46
Seismic first arrival picking based on fully convolutional networks
Liu Jianan,Wu Jie(11)58
Vehicle detection and recognition based on highway monitoring video
Chen Weixing,Bai Tian,Xu Xiaolong(11)64
Wheat recognition method based on spectrum properties and adaptive wormhole positioning
Wang Zhoupu,He Xiaohai,Wu Xiaoqiang, et al(12)35
Target occlusion detection algorithm based on KCF
Wang Depei,Xie Yun(12)39
Image recognition comparison based on Naive Bayes and Semi-Naive Bayes
Liu Chuang(12)44
IndustrialAutomationTechnology
Research and application on smart manufacturing system implementation methodology in new energy Industry
Li Mojun, Han Qingmin, Du Junzhao(1)118
Research of energy management strategy for fuel cell hybrid power system of multi-rotor unmanned aerial vehicle
Zhang Zhixiang,Xiao Duo,Wang Jiabin(1)122
Title
AuthorIssuePage
Simulation technology research of operation monitoring software for KSN system in nuclear power plant
Cheng Minmin,Jing Yinggang,Zhang Caike,et al(1)127
Early-warning assessment of gas disaster based on MC-AHP-FCE system
Xu Haoli, Wang Daqing, Deng Zhengdong, et al(1)131
Intelligent detection technology of high speed rail based on simplified particle swarm optimization
Wang Man, Wang Heng, Zhang Hua(2)77
A kind of industrial flaw detection technology based on intelligent machine vision recognition
Niu Qian,Liu Guihua,Kang Hanyu(2)81
Research on the displacement measurement accuracy of eddy current sensor inindustral control
Song Shilan, Lu Wenke, Zuo Feng(2)85
Design of motion controller in flat-panel detection and conveying platform based on STM32F4
Zhang Qun,Tao Xiaojie,Zhang Lan, et al(2)90
The implementation of control system for omni-directional mobile platform
Zeng Lingdong, Pei Dong, Wang Quanzhou, et al(2)95
Edge computing based industrial data acquisition
Ma Jijun, Jia Xueqin, Shou Yanbo, et al(4)91
Chamber earth pressure balance control for shield machine based on PSO-BP prediction model
Li Qiang, Li Jingxuan(4)94
A control strategy of droop control inverter and diesel generator parallel operation
Huang Jiahao, Wang Jinquan, Xu Ye, et al(4)100
The design of land subsidence layered monitoring device based on eddy current sensor
Lv Zhonghu, Zhang Qing, Zhang Xiaofei(4)106
Design and realization of master control computer’s power supply control management of missile launcher
Jing Desheng, Zhang Kun(4)109
Online detection of servo system resonance based onEtherCAT
Guo Gaojie,Jiang Ping,Li Xin,et al(5)102
An automatic testing system for audio function of Android devices based on the voiceprint recognition technology
Li Jiawei, Hu Hailong, Lin Zhixian(5)106
The application of active object computing model in industry robot system
Yin Binglei,Dong Bolin(5)110
The design of human-machine interface on flat panel display inspection system
Li Yang,Lin Xiao,Wang Zhujie, et al(6)108
Multi-channel ultrasonic excitation and data acquisition and transmission method
Ding Xiaochao,Yang Yuan,Chen Fu(6)112
A design of high precision batch test equipment for chip capacitor
Liu Shumeng, Feng Guobing, Wang Long, et al(6)117
Design of online inspection system for frying oil quality based on Internet of Things
Huo Huiqing, Ou Wen, Mo Hongbo, et al(7)77
Analysis on the application of Cloud computing in elevator industry
Wu Xiangrong(7)82
Anti-haze expressway light control system based on ZigBee network
He Zili, Zhang Lina, Zhang Fangxin, et al(7)86
Research on pasture positioning technology based on active RFID
Lu Shengwen,Ou Wen(7)90
Measuring the width of laps on tobacco rods based on image processing
Wen Tao, Han Long, Wen Yifu(7)95
The research on operating characteristics of diesel generating set with constant power pulse load
Xing Xin,Wang Jinquan,Xu Ye, et al(8)62
Design and realization of a burst pulses generating system based on FPGA
Feng Chuanjun, He Yang, Dai Wenfeng(8)70
Four type of prevention of the process control system
Su Yaodong(8)73
Research on tool image preprocessing system based on FPGA
Wen Jiajing, Fan Hong, Zhu Jiangze, et al(9)94
Title
AuthorIssuePage
Maximum power point tracking based on improved grey wolf algorithm
Yang Lili, Sun Rongxia, Wang Shuonan(9)97
Design of intelligent beat system for electric locomotive assembly line
Yang Chen,Sun Li(9)101
Study on power characteristics of energy storage battery based on equivalentcir cuitmodel
Liu Yaobin, Xu Ye, Li Jianke, et al(9)105
Design of ergodic scanning maximum current point photovoltaic panel tracking system
Bo Zhongya(10)59
Design and implementation of a portable test equipment about ground proximity warningsystem
Xia Xiaochun, Wang Jian, Zhao Xiaoqing(10)62
Research on the problem of voltage fluctuation of generator terminal under pulse load
Liu Bo,Huang Kefeng,Xu Ye(10)66
Design of industrial customization production system based on Internet of Things
Xie Renxu,Chen Dan,Xu Zhezhuang, et al(10)72
Research on fuzzy sliding mode control strategy of servo motor based on NTSM
Huang Hao,Tu Qunzhang,Pan Ming, et al(11)84
Optimization of authentication mechanism for communication process between domestic PLC system and OPC UA
Zhao Yueqi, Min Xiaoshuang(12)58
Design of intelligent lighting control system based on ZigBee
Zhang Bin,Hou Yanyan,Zhao Tao(12)62
ComputerHardware
Modeling of SRD and its application in chipless RFID system
Zhang Jinghua, Guo Haiyan, Zou Chuanyun(2)100
Designing a sectional structure DAC for 10 MHz 8-bit SAR ADC
Xu Weijia, Tian Junjie, Li Yanbiao, et al(2)104
Design and simulation of the universal broadband current amplifier based on current mode circuit
Feng Hao,Zhao Baishu,Li Xuancheng(3)109
Design of a low jitter and fast locking clock and date recovery circuit
Hu Tengfei, Fang Yi, Huang Lu(3)113
The design and implementation of RTK positioning system based on NEO-M8P
Liu Lianjun, Huang Jiwei(3)117
Automatic weather station control module design based on ARM9
Ye Nan, Liu Huazhi, Lu Xu(4)112
A new charge pump regulator with small ripple voltage
Ouyang Tuori, Huang Lu(4)116
Research and design of NFC access control system
Cao Zeling, Wang Qi(5)88
The analysis of front-end signal of ultrasonic corrosion on-line monitoring system
Wang Run,Meng Lingya, Liu Jingshu(5)93
Design and research of K band pHEMT down-conversion mixer
Li Gang, Yu Kai, Li Sizhen,et al(5)97
The design and implementation of i.MX6-based radar display terminal
Li Hongbing(6)121
Optimization control strategy of hybrid energy storage system for isolated microgrid with pulse load
Shi Meng, Wang Jinquan, Huang Kefeng, et al(6)125
The design of FMMU module in EtherCAT slave controller based on FPGA
Yao Wangjun,Lin Hao,Wang Yongli, et al(8)77
A method to detect S mode ADS-B preamble pulse
Wang Yongli,Yao Wangjun,Chen Yanjun, et al(8)83
Design of an anti-fog and haze intelligent mask
Xu Lei,Zhou Yuanping,Huang Siyuan, et al(8)88
Title
AuthorIssuePage
A method of interactive holographic projection using Leap Motion
Lv Baoyuan, Cai Yucheng, Lin Weida, et al(10)78
Hardware implementation of adaptive threshold FAST feature point detection algorithm based on FPGA
Cheng Biao,Huang Lu(10)82
Research and design of portable photoconductive acoustic fire extinguisher
Guan Hongyun,Su Zhentao,Wang Chen(11)92
A method of vehicle direction recognition based on double wave sources
Qin Pan,Zhang Benniu,Zhang Minghui(11)96
Research of interactive fault reasoning based on process data module
Meng Lirong,Ma Yongqi,Cheng Zheng, et al(12)66
Design and development about OPC UA server based on the localization software and hardware platform
Min Xiaoshuang,Yang Xin(12)71
IndustrialApplication
Ship object tracking based on long-term correlation filter
Chen Wei,Li Juelong,Xing Jianchun,et al(1)135
Design of water quality monitoring system based on Beidou short message communication
Wang Xingxing, Jiang Lan, Huang Ke, et al(1)139
Laboratory security system based on STM32 and ZigBee wireless communication
Zhu Lijuan, Yun Zhonghua, Bianbawangdui, et al(1)143
The application of motion target detection in single-soldier combat
Zhang Zhixian, Zhang Kai(2)108
Design of an on-satellite solid-state power amplifier driving power
Dong Shuo, Chen Zan, Wang Zhengzhi, et al(2)112
Research on brain-computer interface system based on Emotiv
Chen Kan, Zhang Shengli, Ding Fan(2)116
Analysis and development of a high power repetetive charging power supply
Feng Chuanjun, He Yang, Dai Wenfeng(2)119
Infrared and visible light images matching based on corner and edge
Ge Wen, He Bo(2)122
An improved dual MAC intelligent speech front-end algorithm
Fang Saihong(2)127
Design of a dual-use solar tracker based on STM32 and LABVIEW
Su Yang,Liu Qingqing(2)131
Application of hybrid iterative learning in vehicles engine idle speed stability control
Cui Jianping, Li Dengke, Liu Chengji(2)135
Intelligent gateway technology for monitoring power battery manufacturing environment
Xu Xunting, Mei Lingliang, Luo Dehan(2)140
Research on heart beat simulation technology in virtual surgery
Liu Bo,Chen Guodong,Wang Na(2)143
Extraction of slice abstraction from program source code and its application in code search
Li Runqing,Zeng Guosun(3)122
Monitoring and management system of urban underground pipe network based on RFID/GIS
Zhang Guangxu,Chen Mingzhi, Mao Wuxing, et al(3)126
Data processing scheme based on data buffer pool technology for secondary device
Li Jin,Gao Shou(3)131
Design of remote monitor system for load weak current
Yang Feng,Tong Xuan,Li Jianqi(3)134
Rapid detection of weak radionuclide in moving target
Wang Changlong, Zhang Jiangmei(3)137
Simulation of AC/DC distribution network and flexible substation
Xie Teng, Kang Mengjie, Wang Puyu, et al(3)140
Using COTS to reduce the cost of spacecraft
Zhou Jianbo, Cong Yanchao, Zhao Pengfei, et al(3)144
Study on the application mode of intelligent residential district based on traffic card
Wu Guanhua, Yu Hongling, Wu Jincheng(3)150
Title
AuthorIssuePage
Automatic optimization algorithm and its implementation of treatment effect of external counterpulsation device
Xiao Qianjun(3)154
Design of a wireless data acquisition system based on 6LoWPAN for civil structural monitoring
Chen Haiyan, Chen Zhicong, Zhou Haifang, et al(4)120
Design of wearable monitoring system for pulse pressure
Hu Wei, Wu Xuezhou, Zhu Chen, et al(4)125
Design and implementation of DMA controller based on PCIE bus
He Guangliang(4)131
Design and integration of e-mail system based on digital production workshop
Ren Kaibin, Zeng Pengfei, Hao Yongping(4)136
Application of JIRA in production abnormal handling practice
Zhang Kedian,Fan Zhenqiang,Li Zhihao,et al(5)115
Design and implementation of the 3D assistant evaluation system of solid mineral reserves
Peng Bin, Chen Zhixiao(5)119
Design of intelligent escape guidance system for tunnel traffic
Yao Dan, Zhu Yingxue, Wu Yan, et al(6)130
Research and application of open-ended fund transfer agent system based on middleware
Chen Songnan(6)134
The comparison of two kinds of heart rate and respiration rate extraction algorithms for piezoelectric signal
Jia Xuebin,Liao Xiwen,Shang Chunheng, et al(7)98
Research on dynamic temperature field of atmosphere sintering furnace based on ANSYS
Li Qiang,Wang Lu(7)102
The program design of teaching response system based on ZigBee
Chen Ke, Su Luyang,Yang Bifeng(8)91
A study of stock price behavior based on feature selection and HMM
Yu Yongsheng,Xie Tianyidan,Liu Chang, et al(8)96
Research and design of logistics information monitoring platform based on vehicle interconnection
Zhang Ailing, Cao Lei(9)110
A study of IC card transfer application technology based on NFC mobile phone
He Jianbing,Xu Feng,Leng Mengtian(9)114
The real-time automatic positioning system design of Hall sensor
Wang Yuanyin,Yue Cairui,Li Zhenshan, et al(9)118
The design and implementation of three-dimensional core image browsing system based on B/S model
Chen Cen,Qing Linbo,He Xiaohai, et al(10)87
Transformation practice of micro service architecture for intelligent terminal operation management system
Wang Weiguo,Pan Yu(10)91
Development and application of offshore oil platform pollutant online monitoring software
Hu Bin,Yang Min,Xu Dong, et al(10)95
Application of MES system in aquaculture workshop
Zou Jialin,Fan Baode,Han Zhaoyu(10)99
Research and implementation of adaptive image enhancement algorithm based on AM5728
Guo Wei,Qing Linbo,Xiong Shuhua, et al(11)100
Design and implementation of browsing and enhancement system for moving freight car images based on Canvas
Gao Siwen,Qing Linbo,Xiong Shuhua, et al(11)104
Application of blockchain technology in civil aviation
Wang Tianshan,Yang Jian,Wang Yao(11)109
Face recognition method based on dimensionality reduction and its application
Jian Cairen, Zhuang Lingyu,Lin Zhipeng(12)75
Research of enterprise information system integration and security mechanism based on cloud computing
Zhi Yanli(12)79
Application research of biomimetic olfactory in odor recognition of air purifier
Ma Dongxu, Luo Dehan, Xu Xunting, et al(12)82