nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A calibration data curve fitting method based on matrix orthogonal triangulation
|
Wang, Ningming |
|
|
174 |
C |
p. 89-94 |
artikel |
2 |
A Ciphertext-Policy Attribute-based Encryption Scheme with Public Verification for an IoT-Fog-Cloud Architecture
|
Li, Hui |
|
|
174 |
C |
p. 243-251 |
artikel |
3 |
A Comparative Assessment of Credit Risk Model Based on Machine Learning ——a case study of bank loan data
|
Wang, Yuelin |
|
|
174 |
C |
p. 141-149 |
artikel |
4 |
A Correction of Random Medium Motion Correlation Imaging Method
|
Liu, Xue-Dong |
|
|
174 |
C |
p. 631-637 |
artikel |
5 |
A Data Distribution Algorithm Based on Neighbors’ Locations in VANET
|
Wu, Di |
|
|
174 |
C |
p. 530-534 |
artikel |
6 |
A double-threshold target detection method in detecting low slow small target
|
Yu, Jie |
|
|
174 |
C |
p. 616-624 |
artikel |
7 |
A Fast Teacher Pose Estimation Framework Base on Kernelized Correlation Filter and Spatial Transformed High-Resolution Network
|
Xu, Tianyou |
|
|
174 |
C |
p. 393-399 |
artikel |
8 |
Agricultural Fruit Prediction Using Deep Neural Networks
|
Khan, Tamoor |
|
|
174 |
C |
p. 72-78 |
artikel |
9 |
A Heterogeneous Processor Design for CNN-Based AI Applications on IoT Devices
|
Liu, Zhiqiang |
|
|
174 |
C |
p. 2-8 |
artikel |
10 |
A Method based on Modified PageRank-Algorithm for Measuring and Rating Android Malwares
|
Shen, Zhidong |
|
|
174 |
C |
p. 252-255 |
artikel |
11 |
A Method for Company-specific Risk Factors Analysis in the View of Cross Analysis
|
Yingfan, Gao |
|
|
174 |
C |
p. 375-381 |
artikel |
12 |
A Method of Japanese Ancient Text Recognition by Deep Learning
|
Chen, Lehan |
|
|
174 |
C |
p. 276-279 |
artikel |
13 |
An airborne inverse synthetic aperture ladar imaging method based on sparse sampling
|
Tian, He |
|
|
174 |
C |
p. 694-699 |
artikel |
14 |
An Algorithm to Construct Minimum Velocity Based Stable Connected Dominating Sets for MANETs using Strong Neighborhoods
|
Zheng, Haili |
|
|
174 |
C |
p. 591-596 |
artikel |
15 |
An Attributed Network Representation Learning Method Based on Biased Random Walk
|
Dou, Wei |
|
|
174 |
C |
p. 291-298 |
artikel |
16 |
An Edge Computing Based Fall Detection System for Elderly Persons
|
Chen, Yuxi |
|
|
174 |
C |
p. 9-14 |
artikel |
17 |
An Encoding Mechanism for Seq2Seq based Multi-Turn Sentimental Dialogue Generation Model
|
Ma, Zhiqiang |
|
|
174 |
C |
p. 412-418 |
artikel |
18 |
An End to End Deep Neural Network for Iris Recognition
|
Hu, Qingqiao |
|
|
174 |
C |
p. 505-517 |
artikel |
19 |
An Enhanced Algorithm for Dynamic Data Release Based on Differential Privacy
|
Kang, H.Y. |
|
|
174 |
C |
p. 15-21 |
artikel |
20 |
A network intrusion detection method based on deep learning with higher accuracy
|
Zhang, Yuening |
|
|
174 |
C |
p. 50-54 |
artikel |
21 |
An Improved Off-grid Channel Estimation Scheme for Lens Antenna Arrays in mmWave Systems
|
Zhang, Yihui |
|
|
174 |
C |
p. 555-560 |
artikel |
22 |
A Numerical Simulation Method for Thermodynamic Characteristics of Phase Transition of Rocket Plume Particles
|
Ran, Duan |
|
|
174 |
C |
p. 658-666 |
artikel |
23 |
A Privacy Data Aggregation Scheme for Wireless Sensor Networks
|
Qi, Xiaohan |
|
|
174 |
C |
p. 578-583 |
artikel |
24 |
A Real-time Interactive Tai Chi Learning System Based on VR and Motion Capture Technology
|
Liu, Juan |
|
|
174 |
C |
p. 712-719 |
artikel |
25 |
A Region Generation based Model for Occluded Face Detection
|
Jin, Qi |
|
|
174 |
C |
p. 454-462 |
artikel |
26 |
A robust intelligent fault diagnosis method for rolling bearings based on Deep convolutional neural network and Domain Adaptation
|
Xu, Juan |
|
|
174 |
C |
p. 400-405 |
artikel |
27 |
A security routing algorithm against selective forwarding attacks in scale-free networks
|
Yin, Rongrong |
|
|
174 |
C |
p. 543-548 |
artikel |
28 |
A Spectral Efficient Hybrid Precoding Algorithm for MmWave MIMO Systems
|
Li, Tingting |
|
|
174 |
C |
p. 584-590 |
artikel |
29 |
A Target 3D Reconstruction Method based on Electro-optical Features Fusion
|
Xiao-yu, Xing |
|
|
174 |
C |
p. 682-688 |
artikel |
30 |
A Trust-based Dynamic Slicing Mechanism for Wireless Sensor Networks
|
Zhang, Qiang |
|
|
174 |
C |
p. 572-577 |
artikel |
31 |
Attention Mechanism in Radiologist-Level Thorax Diseases Detection
|
Yang, Xiaoyilei |
|
|
174 |
C |
p. 524-529 |
artikel |
32 |
Attribute-Based Access Control Using Smart Contracts for the Internet of Things
|
Song, Lihua |
|
|
174 |
C |
p. 231-242 |
artikel |
33 |
A Two-Dimensional Mixed Baseline Method for Recognizing Deceptive Jamming Based on MIMO-SAR
|
Zeng, Zheng |
|
|
174 |
C |
p. 700-705 |
artikel |
34 |
A Unique Perspective on Viral Propagation--Social Attributes
|
Li, Li |
|
|
174 |
C |
p. 256-262 |
artikel |
35 |
A Window Detection Algorithm for Remote Laser Gas Leakage Detection System
|
Dong, Xiaozhou |
|
|
174 |
C |
p. 720-728 |
artikel |
36 |
Camera motion estimation algorithm for IoT devices based on optimized feature tracking method
|
Meng, Zelin |
|
|
174 |
C |
p. 22-26 |
artikel |
37 |
Computation and Comparison of Cloud Infrared Radiation Characteristics
|
xingrun, Liu |
|
|
174 |
C |
p. 689-693 |
artikel |
38 |
Contents
|
|
|
|
174 |
C |
p. iii-viii |
artikel |
39 |
Continuous Route Planning over a Dynamic Graph in Real-Time
|
Dai, Tianlun |
|
|
174 |
C |
p. 111-114 |
artikel |
40 |
Cooperative content downloading in vehicular ad hoc networks
|
Tang, Xiaolan |
|
|
174 |
C |
p. 224-230 |
artikel |
41 |
Cotton Appearance Grade Classification Based on Machine Learning
|
Lv, Yan |
|
|
174 |
C |
p. 729-734 |
artikel |
42 |
Credit Risk Assessment based on Gradient Boosting Decision Tree
|
Tian, Zhenya |
|
|
174 |
C |
p. 150-160 |
artikel |
43 |
Crowdsourced Traffic Event Reporting: A Driving Simulator Study
|
Mihelj, Jernej |
|
|
174 |
C |
p. 309-314 |
artikel |
44 |
Design Method of Absorbing Electromagnetic Window Structure
|
Li, Haotong |
|
|
174 |
C |
p. 315-320 |
artikel |
45 |
Distance-Aware Power Allocation for Multi-user MIMO-NOMA Systems Based on Grouped Zero-Forcing Beamforming
|
Wang, Lihui |
|
|
174 |
C |
p. 299-303 |
artikel |
46 |
EEG-based emotion classification based on Bidirectional Long Short-Term Memory Network
|
Yang, Jinru |
|
|
174 |
C |
p. 491-504 |
artikel |
47 |
Efficient THz radiation source from spoof surface plasmons modes on a dielectric-filled metallic grating by electron beam
|
Liu, Yong-Qiang |
|
|
174 |
C |
p. 106-110 |
artikel |
48 |
Emotional Monitoring of Learners Based on EEG Signal Recognition
|
Bai, Ludi |
|
|
174 |
C |
p. 364-368 |
artikel |
49 |
Empirical Modeling of Carbon Dioxide volume mixing ratio for infrared radiance simulation in the near space
|
Dong, Liu |
|
|
174 |
C |
p. 625-630 |
artikel |
50 |
Energy-Efficient Data Aggregation Through the Collaboration of Cloud and Edge Computing in Internet of Thing’s Networks
|
Du, Xinxin |
|
|
174 |
C |
p. 269-275 |
artikel |
51 |
eQuilibrium: A Prototype of a Sensor-Based Balance Training and Monitoring System
|
Pustišek, Matevž |
|
|
174 |
C |
p. 340-346 |
artikel |
52 |
Exer-Learning: A New Genre Combines Learning, Exercise and Fun for Children
|
Wang, Yulin |
|
|
174 |
C |
p. 735-745 |
artikel |
53 |
Facial Expression Recognition via a CBAM Embedded Network
|
Cao, Wenhao |
|
|
174 |
C |
p. 463-477 |
artikel |
54 |
Feasibility of Identity Authentication for IoT Based on Blockchain
|
Tian, Zongqing |
|
|
174 |
C |
p. 328-332 |
artikel |
55 |
Function Virtualization in High Performance Computing: Opportunities and Challenges
|
Jiang, Yujuan |
|
|
174 |
C |
p. 210-215 |
artikel |
56 |
Generating High-Resolution Climate Prediction through Generative Adversarial Network
|
Cheng, Jianxin |
|
|
174 |
C |
p. 123-127 |
artikel |
57 |
Housing Price Prediction via Improved Machine Learning Techniques
|
Truong, Quang |
|
|
174 |
C |
p. 433-442 |
artikel |
58 |
Impact of News on the Trend of Stock Price Change: an Analysis based on the Deep Bidirectiona LSTM Model
|
Ren, Yinghao |
|
|
174 |
C |
p. 128-140 |
artikel |
59 |
Innovation Efficiency Evaluation of Listed Companies Based on the DEA Method
|
Xiang, Ma |
|
|
174 |
C |
p. 382-386 |
artikel |
60 |
Intelligent Fault Diagnosis with a Deep Transfer Network based on Wasserstein Distance
|
Xu, Juan |
|
|
174 |
C |
p. 406-411 |
artikel |
61 |
Joint edge offloading and caching for cooperation scheme reasearch
|
Chen, Yaojia |
|
|
174 |
C |
p. 280-285 |
artikel |
62 |
Joint Event Extraction Model based on Multi-feature Fusion
|
Shuo, Wang |
|
|
174 |
C |
p. 115-122 |
artikel |
63 |
Line Array Time Delay Integral CCD Sweep Image Non-Uniformity Correction Method
|
Shuang, Song |
|
|
174 |
C |
p. 216-223 |
artikel |
64 |
Machine Learning based Accuracy Prediction Model for Augmented Biofeedback in Precision Shooting
|
Yang, Lan |
|
|
174 |
C |
p. 358-363 |
artikel |
65 |
Machine Learning Based Approach on Food Recognition and Nutrition Estimation
|
Shen, Zhidong |
|
|
174 |
C |
p. 448-453 |
artikel |
66 |
Machine Learning Based Features Matching for Fatigue Crack Detection
|
Kong, Xiangbo |
|
|
174 |
C |
p. 101-105 |
artikel |
67 |
Majority can earn more: A new coin mining strategy for miner with superior computing power in blockchain
|
Luo, Yuxin |
|
|
174 |
C |
p. 172-180 |
artikel |
68 |
Many-to-Many Data Trading Algorithm Based on Double Auction Theory
|
Mao, Jianqiao |
|
|
174 |
C |
p. 200-209 |
artikel |
69 |
Maximizing the network lifetime of rechargeable sensor networks with a mobile charger
|
Ding, Xingjian |
|
|
174 |
C |
p. 549-554 |
artikel |
70 |
Medical Named Entity Recognition Based on Overlapping Neural Networks
|
Zhang, Ruoyu |
|
|
174 |
C |
p. 27-31 |
artikel |
71 |
Micromanagement in StarCraft Game AI: a case study
|
Lu, Mingjian |
|
|
174 |
C |
p. 518-523 |
artikel |
72 |
Microscopic Characteristic and Transmittance Measurement of Infrared Smoke Combustion Product
|
Xijuan, Zhu |
|
|
174 |
C |
p. 651-657 |
artikel |
73 |
Numerical Investigation on Flow and Radiation Characteristics of Solid Rocket Motor Plume Near the Ground
|
Xing-dong, Bao |
|
|
174 |
C |
p. 645-650 |
artikel |
74 |
Object-oriented Vegetation Classification Method based on UAV and Satellite Image Fusion
|
Zhao, Fuchao |
|
|
174 |
C |
p. 609-615 |
artikel |
75 |
Observing the formation of zero-mean circular Gaussian statistics in two-dimensional random media
|
Li, Liangsheng |
|
|
174 |
C |
p. 638-644 |
artikel |
76 |
Ontology Guided Sparse Tensor Factorization for Joint Recommendation with Hierarchical Relationships
|
Shi, Xiutao |
|
|
174 |
C |
p. 263-268 |
artikel |
77 |
Optimal Distributed Leader Election without Decoding
|
Yu, Dongxiao |
|
|
174 |
C |
p. 535-542 |
artikel |
78 |
Optimizing Wireless Sensor Networks Based on Collaborative Beamforming
|
Shi, Lei |
|
|
174 |
C |
p. 561-571 |
artikel |
79 |
Predicting Bus Arrival Time Using BP Neural Network and Dynamic Transfer
|
Fei, Jia |
|
|
174 |
C |
p. 95-100 |
artikel |
80 |
Preface
|
Bie, Rongfang |
|
|
174 |
C |
p. 1 |
artikel |
81 |
Pre-trained Language Embedding-based Contextual Summary and Multi-scale Transmission Network for Aspect Extraction
|
Feng, Cong |
|
|
174 |
C |
p. 40-49 |
artikel |
82 |
Privacy-Preserving Spectrum Allocation in Cognitive Radio Networks Based on Truthful Online Double Auction Mechanism
|
Yan, Yue |
|
|
174 |
C |
p. 304-308 |
artikel |
83 |
Relay and Jammer Selection Scheme in Wireless Networks with the Statistical Information of Multiple Eavesdropping Channels
|
Liu, Mengling |
|
|
174 |
C |
p. 597-603 |
artikel |
84 |
Reliable Communication Protocol for Coach Based Augmented Biofeedback Applications in Swimming
|
Kos, Anton |
|
|
174 |
C |
p. 351-357 |
artikel |
85 |
Research on Dermoscopic Segmentation based on Multi-scale Convolutional Neural Network
|
Wang, Junyao |
|
|
174 |
C |
p. 443-447 |
artikel |
86 |
Research on Sea Surface Optical Characteristic Detection Based on Spectrum Model
|
Lin, Juan |
|
|
174 |
C |
p. 286-290 |
artikel |
87 |
Research on Ship Target Radar Scatttering Characteric Measurement in Sea Battlefield
|
Lu, Yongge |
|
|
174 |
C |
p. 84-88 |
artikel |
88 |
Road-Condition-Aware Dynamic Path Planning for Intelligent Vehicles
|
Chen, Yan |
|
|
174 |
C |
p. 419-423 |
artikel |
89 |
Secure Electronic Medical Records Storage and Sharing Using Blockchain Technology
|
Usman, Muhammad |
|
|
174 |
C |
p. 321-327 |
artikel |
90 |
Selection of Jammer and Analysis on Secrecy Outage Probability for WANETs
|
Li, Yajing |
|
|
174 |
C |
p. 604-608 |
artikel |
91 |
Sensor system for augmented feedback applications in volleyball
|
Umek, Anton |
|
|
174 |
C |
p. 369-374 |
artikel |
92 |
Sentiment Analysis of Sina Weibo Users Under the Impact of Super Typhoon Lekima Using Natural Language Processing Tools: A Multi-Tags Case Study
|
Zhang, Yiming |
|
|
174 |
C |
p. 478-490 |
artikel |
93 |
Skeleton Based Abnormal Behavior Recognition Using Spatio-Temporal Convolution and Attention-Based LSTM
|
Zhou, Kai |
|
|
174 |
C |
p. 424-432 |
artikel |
94 |
SLBCNN: A Improved Deep Learning Model for Few-Shot Charge Prediction
|
Li, Xue |
|
|
174 |
C |
p. 32-39 |
artikel |
95 |
Study of Turbulent Motion Compensation for Airborne SAR
|
Xu, Zhiming |
|
|
174 |
C |
p. 79-83 |
artikel |
96 |
Study on Data Valuation Oriented to Identification of Scientific and Technological Frontier
|
Zeng, Wen |
|
|
174 |
C |
p. 66-71 |
artikel |
97 |
Study on the Effect of Engine Characteristics on Exhaust Plume Radiation
|
Wu, Kaifeng |
|
|
174 |
C |
p. 347-350 |
artikel |
98 |
Target dynamic radar echo simulation based on sensor
|
Liang, Man |
|
|
174 |
C |
p. 706-711 |
artikel |
99 |
Teenager Health Oriented Data Security and Privacy Protection Research for Smart Wearable Device
|
Yang, Minghui |
|
|
174 |
C |
p. 333-339 |
artikel |
100 |
Temperature dependence on dielectric properties of CdTe and ZnTe using first-principles method and experimental data
|
Li, Jin-Chun |
|
|
174 |
C |
p. 673-681 |
artikel |
101 |
The Existence of Consensus Equilibria for Data Trading under the Framework of Internet of Things (IoT) with Blockchain Ecosystems
|
Di, Lan |
|
|
174 |
C |
p. 55-65 |
artikel |
102 |
Theoretical and Experimental Study on Dielectric Constant of Cadmium Telluride in Terahertz Band
|
Sun, Wang |
|
|
174 |
C |
p. 667-672 |
artikel |
103 |
Trends Prediction of Big Data: A Case Study based on Fusion Data
|
Tang, Jinxuan |
|
|
174 |
C |
p. 181-190 |
artikel |
104 |
Unknown Network Attack Detection Based on Open Set Recognition
|
Zhang, Yong |
|
|
174 |
C |
p. 387-392 |
artikel |
105 |
Use GBDT to Predict the Stock Market
|
Yang, JinShan |
|
|
174 |
C |
p. 161-171 |
artikel |
106 |
Using News to Predict Investor Sentiment: Based on SVM Model
|
Wang, Diya |
|
|
174 |
C |
p. 191-199 |
artikel |