nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A Calibration Method of Phase Error Caused by Target’s Position Error
|
Liu, Fang |
|
|
187 |
C |
p. 188-193 |
artikel |
2 |
A Decentralized Music Copyright Operation Management System Based On Blockchain Technology
|
Li, Yanghuan |
|
|
187 |
C |
p. 458-463 |
artikel |
3 |
A dynamic multi-dimension trust model for information service quality evaluation
|
Xu, Zhicheng |
|
|
187 |
C |
p. 601-606 |
artikel |
4 |
A Large Angle Stability Frequency Selective Surface
|
Lu, Lan |
|
|
187 |
C |
p. 538-541 |
artikel |
5 |
A Methodology for Measuring Flight Speed of Drones in Indoor Environments
|
Ito, Satoshi |
|
|
187 |
C |
p. 322-328 |
artikel |
6 |
Analysis of supply chain finance based on blockchain
|
Zhang, TianLin |
|
|
187 |
C |
p. 1-6 |
artikel |
7 |
Analysis on Online Impression Management of Chinese Teenagers
|
Fang, Zengquan |
|
|
187 |
C |
p. 170-175 |
artikel |
8 |
An Improved Delegated Proof of Stake Consensus Algorithm
|
Hu, Qian |
|
|
187 |
C |
p. 341-346 |
artikel |
9 |
Annealing-behaved 100-Digit challenge problem optimization
|
Wei, Chenglong |
|
|
187 |
C |
p. 592-600 |
artikel |
10 |
A Parameter Transfer Method for HMM-DNN Heterogeneous Model with the Scarce Mongolian Data Set
|
Ma, Zhiqiang |
|
|
187 |
C |
p. 258-263 |
artikel |
11 |
A Review on Assured Deletion of Cloud Data Based on Cryptography
|
Wang, Guan |
|
|
187 |
C |
p. 580-585 |
artikel |
12 |
A Routing Algorithm Based on Network Connectivity Assessment for Maritime Opportunistic Networks
|
Ji, Meiqi |
|
|
187 |
C |
p. 200-205 |
artikel |
13 |
A Skeleton Analysis Based Fall Detection Method Using ToF Camera
|
Kong, Xiangbo |
|
|
187 |
C |
p. 252-257 |
artikel |
14 |
Attack Detection Method based on Bayesian Hypothesis Testing Principle in CPS
|
Han, Ke |
|
|
187 |
C |
p. 474-480 |
artikel |
15 |
attackGAN: Adversarial Attack against Black-box IDS using Generative Adversarial Networks
|
Zhao, Shuang |
|
|
187 |
C |
p. 128-133 |
artikel |
16 |
A Two-Dimensional Mixed Baseline Method for Countering Deceptive Jamming Based on Multi-channel SAR
|
Zeng, Zheng |
|
|
187 |
C |
p. 383-389 |
artikel |
17 |
Biomechanical characteristics of walking and running in children aged 3-6 years
|
Panchao, ZHAO |
|
|
187 |
C |
p. 224-228 |
artikel |
18 |
Block-chain based federated learning for knowledge capital
|
Chen, Xi |
|
|
187 |
C |
p. 426-431 |
artikel |
19 |
CareEdge: A Lightweight Edge Intelligence Framework for ECG-Based Heartbeat Detection
|
Zhen, Penghua |
|
|
187 |
C |
p. 329-334 |
artikel |
20 |
Characteristics of Aerobic Resistance Strength Training With Different Load Intensity Based on Acceleration Sensor
|
Bo, Pang |
|
|
187 |
C |
p. 7-11 |
artikel |
21 |
Clutter suppression method for linear scan indoor near-field RCS measurement based on interferometric SAR
|
Lyu, Ming |
|
|
187 |
C |
p. 559-565 |
artikel |
22 |
Compartmental Models with Application to Pharmacokinetics
|
Chen, Bing |
|
|
187 |
C |
p. 60-70 |
artikel |
23 |
Conference Ranking based on Academic Network Embedding and Bipartite cross voting
|
, |
|
|
187 |
C |
p. 574-579 |
artikel |
24 |
Construction method of secure tunnels in wireless Ad-Hoc Networks
|
Yang, Zhigang |
|
|
187 |
C |
p. 122-127 |
artikel |
25 |
Contents
|
|
|
|
187 |
C |
p. iii-vii |
artikel |
26 |
Cross-device User Tracking via Hybrid Model
|
Liu, Jingwu |
|
|
187 |
C |
p. 83-88 |
artikel |
27 |
Deep Leaning based Medicine Packaging Information Recognition for Medication Use in the Elderly
|
Lyu, Bing |
|
|
187 |
C |
p. 194-199 |
artikel |
28 |
Deep Learning Based MIMO Transmission with Precoding and Radio Transformer Networks
|
Cui, Wenqi |
|
|
187 |
C |
p. 396-401 |
artikel |
29 |
Development of Physical Layer Security Simulation Platform
|
Yang, Wenjun |
|
|
187 |
C |
p. 495-500 |
artikel |
30 |
DF-RBAC: Dynamic and Fine-grained Role-Based Access Control Scheme with Smart Contract
|
Liu, Danyang |
|
|
187 |
C |
p. 359-364 |
artikel |
31 |
Digital Financial Inclusion and Economic Growth: A Cross-country Study
|
Shen, Yan |
|
|
187 |
C |
p. 218-223 |
artikel |
32 |
Digital Transformation of Manufacturing Enterprises
|
Li, Haijia |
|
|
187 |
C |
p. 24-29 |
artikel |
33 |
Does High-Frequency Trading Impede Order Execution in the Stock Market?
|
Li, Kun |
|
|
187 |
C |
p. 501-506 |
artikel |
34 |
DT-DPoS: A Delegated Proof of Stake Consensus Algorithm with Dynamic Trust
|
Sun, Yuanyuan |
|
|
187 |
C |
p. 371-376 |
artikel |
35 |
Dynamic Modification Neural Network Model for Short-term Traffic Prediction
|
Guo, Da |
|
|
187 |
C |
p. 134-139 |
artikel |
36 |
Empirical Study of Consumption Behavior of College Students under the Influence of Internet-based Financing Services
|
Wang, Yang |
|
|
187 |
C |
p. 152-157 |
artikel |
37 |
Estimate the Trend of COVID-19 Outbreak in China: a Statistical and Inferential Analysis on Provincial-level Data
|
Li, Kun |
|
|
187 |
C |
p. 512-517 |
artikel |
38 |
Expected Economic Theory and Its Model Construction
|
Shi, Yufeng |
|
|
187 |
C |
p. 524-529 |
artikel |
39 |
Extracting Keywords from Texts based on Word Frequency and Association Features
|
Xu, Zhenzhen |
|
|
187 |
C |
p. 77-82 |
artikel |
40 |
Financial Feature Embedding with Knowledge Representation Learning for Financial Statement Fraud Detection
|
Shen, Yuming |
|
|
187 |
C |
p. 420-425 |
artikel |
41 |
Game Control of Attack and Defense in Cyber Physical System
|
Cai, Xiaobo |
|
|
187 |
C |
p. 488-494 |
artikel |
42 |
Generating and Optimizing Human-Readable Quantitative Program Trading Strategies through a Genetic Programming Framework
|
Teng, Bin |
|
|
187 |
C |
p. 613-617 |
artikel |
43 |
Heterogeneous ensemble spectral classifiers for hyperspectral images
|
Guo, Dan |
|
|
187 |
C |
p. 229-234 |
artikel |
44 |
High-frequency Statistical Arbitrage Strategy Based on Stationarized Order Flow Imbalance
|
Wang, Qingxue |
|
|
187 |
C |
p. 518-523 |
artikel |
45 |
Hybrid graph-based Sybil detection with user behavior patterns
|
Li, Xiang |
|
|
187 |
C |
p. 607-612 |
artikel |
46 |
Identity-Based Proxy Re-encryption over NTRU Lattices for Cloud Computing
|
Yue, Na |
|
|
187 |
C |
p. 264-269 |
artikel |
47 |
Image Dehazing Using Near-Infrared Information Based on Dark Channel Prior
|
Hua, Zhen |
|
|
187 |
C |
p. 18-23 |
artikel |
48 |
Impact of Online Claims for Investor Protection on Enterprise Capital Structures: Evidence from Big Data in China
|
Yue, Hong |
|
|
187 |
C |
p. 183-187 |
artikel |
49 |
Influence of Noise Level on MSTAR Images Recognition Performance
|
Li, Chao |
|
|
187 |
C |
p. 97-102 |
artikel |
50 |
Intelligent Portfolio Theory and Application in Stock Investment with Multi-Factor Models and Trend Following Trading Strategies
|
Pan, Heping |
|
|
187 |
C |
p. 414-419 |
artikel |
51 |
KCB-BC-SSE: A Keyword Complete Binary Tree Searchable Symmetric Encryption Scheme using Blockchain
|
Liu, Xiru |
|
|
187 |
C |
p. 377-382 |
artikel |
52 |
Machine Learning based Apathy Classification on Doppler Radar Image for the Elderly Person
|
Yue, Xuebin |
|
|
187 |
C |
p. 146-151 |
artikel |
53 |
Mathematical Modelling of Lockdown Policy for COVID-19
|
Fu, Yuting |
|
|
187 |
C |
p. 447-457 |
artikel |
54 |
Measuring Investor Sentiment of Cryptocurrency Market – Using Textual Analytics on Chain Node
|
Sun, Yunchuan |
|
|
187 |
C |
p. 542-548 |
artikel |
55 |
Measuring Investor Sentiment of Cryptocurrency Market – Using Textual Analytics on Chain Node
|
Sun, Yunchuan |
|
|
187 |
C |
p. 549-553 |
artikel |
56 |
Motion Compensation and 3-D Imaging Algorithm in Sparse Flight based Airborne Array SARi
|
Tian, He |
|
|
187 |
C |
p. 464-473 |
artikel |
57 |
Multi-keyword Fuzzy Search over Encrypted Cloud Storage Data
|
Li, Mengmeng |
|
|
187 |
C |
p. 365-370 |
artikel |
58 |
Online Communication and Asset Price Bubbles
|
Zhang, Kun |
|
|
187 |
C |
p. 36-41 |
artikel |
59 |
Online teaching in universities during the Covid-19 epidemic: a study of the situation, effectiveness and countermeasures
|
Li, Jing |
|
|
187 |
C |
p. 566-573 |
artikel |
60 |
Optimal Design of Encryption Module in IoT
|
Han, Ke |
|
|
187 |
C |
p. 481-487 |
artikel |
61 |
Optimization of Underwater Marker Detection Based on YOLOv3
|
Jiang, Ning |
|
|
187 |
C |
p. 52-59 |
artikel |
62 |
Particle filter algorithm optimized by genetic algorithm combined with particle swarm optimization
|
Yang, Jin |
|
|
187 |
C |
p. 206-211 |
artikel |
63 |
Pneumonia Diagnosis on Chest X-Rays with Machine Learning
|
Meng, Zelin |
|
|
187 |
C |
p. 42-51 |
artikel |
64 |
Proof of Random Trust Consensus Mechanism for Power Resource Sharing System
|
Zhang, Yujiao |
|
|
187 |
C |
p. 402-407 |
artikel |
65 |
RCS Frequency Response Analysis of Luneberg Lens Reflector Based on Dielectric Loss
|
Jie, GUO |
|
|
187 |
C |
p. 353-358 |
artikel |
66 |
Research on Coherence Correction of Scattering Center Model
|
Zhang, Lei |
|
|
187 |
C |
p. 235-240 |
artikel |
67 |
Research on gesture image recognition method based on transfer learning
|
Wang, Fei |
|
|
187 |
C |
p. 140-145 |
artikel |
68 |
Research on Knowledge Driven Intelligent Question Answering System for Electric Power Customer Service
|
Tan, Yuanpeng |
|
|
187 |
C |
p. 347-352 |
artikel |
69 |
Research on the Development of Digital Currencies under the COVID-19 Epidemic
|
Tan, Lin |
|
|
187 |
C |
p. 89-96 |
artikel |
70 |
Research on the Influence Mechanism of Epidemic Information Disclosure on Screening Authenticity Information
|
Huang, Xiaohui |
|
|
187 |
C |
p. 109-115 |
artikel |
71 |
Research on the Internal Control Problems Faced by the Financial Sharing Center in the Digital Economy Era1 — An example of Financial Sharing Center of H Co. Ltd.
|
Xiwen, Li |
|
|
187 |
C |
p. 158-163 |
artikel |
72 |
Research on Tools for Health Assessment and Application Scenarios of the Elderly
|
Xinzhu, Xing |
|
|
187 |
C |
p. 618-629 |
artikel |
73 |
Research on Total Factor Productivity Measurement and Influencing Factors of Digital Economy Enterprises
|
Tian, Jinfang |
|
|
187 |
C |
p. 390-395 |
artikel |
74 |
Research on vehicle apparent damage assessment technology based on intelligent regression calculation
|
Feng, CHEN |
|
|
187 |
C |
p. 71-76 |
artikel |
75 |
Research on venture capital based on information entropy, BP neural network and CVaR model of digital currency in Yangtze River Delta
|
Shao, Bo |
|
|
187 |
C |
p. 278-283 |
artikel |
76 |
Retinal Vessel Segmentation based on Convolutional Neural Network and Connection Domain Detection
|
Dou, Quansheng |
|
|
187 |
C |
p. 246-251 |
artikel |
77 |
Risk Taker or Driver: An Empirical Analysis of US Financial Markets during the COVID-19 Pandemic
|
Wang, Dong |
|
|
187 |
C |
p. 554-558 |
artikel |
78 |
Rural Micro Credit Assessment using Machine Learning in a Peruvian microfinance institution
|
Condori-Alejo, Henry Ivan |
|
|
187 |
C |
p. 408-413 |
artikel |
79 |
Secrecy Analysis for Full-Duplex Jamming-Aided Uplink NOMA System
|
Jiang, Kaiwei |
|
|
187 |
C |
p. 116-121 |
artikel |
80 |
Semantic Image Segmentation based on SegNetWithCRFs
|
Guo, Qian |
|
|
187 |
C |
p. 300-306 |
artikel |
81 |
Sensor Based Agility Assessment in Sport
|
Hribernik, Matevž |
|
|
187 |
C |
p. 440-446 |
artikel |
82 |
SFAC:A Smart Contract-Based Fine-Grained Access Control for Internet of Things
|
Chai, Baobao |
|
|
187 |
C |
p. 335-340 |
artikel |
83 |
Space-Partition-Driven Learning Network for Efficient MIMO Detection
|
Xu, Dadan |
|
|
187 |
C |
p. 507-511 |
artikel |
84 |
Study on Absorbing Characteristics of Salisbury Screen Filled with Plasma
|
Liang, MAN |
|
|
187 |
C |
p. 241-245 |
artikel |
85 |
Study on Missing People Search Method on Follow-up of Breast Cancer Cohort
|
Guangcheng, Yang |
|
|
187 |
C |
p. 586-591 |
artikel |
86 |
Study on Optimization Method of Plasma Stealth Application Parameters in Wide Angle Range
|
XueJian, Feng |
|
|
187 |
C |
p. 316-321 |
artikel |
87 |
Supply chain finance based on smart contract
|
Zhang, TianLin |
|
|
187 |
C |
p. 12-17 |
artikel |
88 |
TableRobot: An Automatic Annotation Method for Heterogeneous Tables
|
Wu, Guibin |
|
|
187 |
C |
p. 432-439 |
artikel |
89 |
The comparison of economic impacts of COVID-19 between China and the United States
|
He, Chengying |
|
|
187 |
C |
p. 307-315 |
artikel |
90 |
The Impact of COVID-19 on Chinese Systemic Risk Based on Dynamic Tail-risk Network Model
|
Guo, Yanhong |
|
|
187 |
C |
p. 164-169 |
artikel |
91 |
The Impact of Covid-19 on the Securities Market: Evidence from Chinese Stock and Bond Markets
|
Chen, Xingyi |
|
|
187 |
C |
p. 294-299 |
artikel |
92 |
THE IMPACT OF INSURTECH ON CHINESE INSURANCE INDUSTRY
|
Wang, Qinxin |
|
|
187 |
C |
p. 30-35 |
artikel |
93 |
The Prediction for COVID-19 Outbreak in China by using the Concept of Term Structure for the Turning Period
|
Yuan, George X. |
|
|
187 |
C |
p. 284-293 |
artikel |
94 |
Three-dimensional BP Imaging Algorithm using MIMO System
|
Ren, Qunting |
|
|
187 |
C |
p. 103-108 |
artikel |
95 |
TIMS: A Secure Testing-Machine Information Management System
|
Wang, Haodi |
|
|
187 |
C |
p. 176-182 |
artikel |
96 |
Trust, innovation and M&A value: An empirical study in China
|
Wang, Yan |
|
|
187 |
C |
p. 212-217 |
artikel |
97 |
Validation of MEMS Accelerometer for Rapid Hand Movement Measurement
|
Umek, Anton |
|
|
187 |
C |
p. 530-537 |
artikel |
98 |
Word2vec based deep learning network for DNA N4-methylcytosine sites identification
|
Fang, Guanyun |
|
|
187 |
C |
p. 270-277 |
artikel |