Default Cover Image

2023 3rd International Conference on Frontiers of Electronics, Information and Computation Technologies (ICFEICT)

May 26 2023 to May 29 2023

Yangzhou, China

ISBN: 979-8-3503-0235-6

Table of Contents

Title Page iFreely available from IEEE.pp. 1-1
Title Page iiiFreely available from IEEE.pp. 3-3
Copyright PageFreely available from IEEE.pp. 4-4
Table of ContentsFreely available from IEEE.pp. 5-16
PrefaceFreely available from IEEE.pp. 17-18
Conference CommitteeFreely available from IEEE.pp. 19-20
Human-Object Interaction DetectionFreely available from IEEE.pp. xxii-xxii
Image Security Attribute Inference Method Based on Class Attribute PortraitFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
Epilepsy Seizure classification based on ConvGru-CNN NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 10-14
A Touchscreen Force Detection Scheme Based on Transfer LearningFull-text access may be available. Sign in or learn about subscription options.pp. 15-20
Analysis of Forest Height Change in Helan Mountain Based on Multi-Band InSARFull-text access may be available. Sign in or learn about subscription options.pp. 21-27
Design of a Stable LDO Over the Full Load RangeFull-text access may be available. Sign in or learn about subscription options.pp. 28-32
Residual Life Prediction Method of CFRP Based on ALSTM-CNNFull-text access may be available. Sign in or learn about subscription options.pp. 33-39
WCA-Based Antenna Design via Joint HFSS-Matlab OptimizationFull-text access may be available. Sign in or learn about subscription options.pp. 40-44
Paragraph-Level Interaction Discourse Relation Recognition Model via Neural Tensor NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 45-50
An Accountable Anonymous Voting Scheme Based on One-time Ring SignatureFull-text access may be available. Sign in or learn about subscription options.pp. 51-57
Polarity Correction-based Synchronization Algorithm for DSSS CommunicationFull-text access may be available. Sign in or learn about subscription options.pp. 58-62
Unified Model and Performance Analysis of Airborne Radar Reduced-rank STAP MethodFull-text access may be available. Sign in or learn about subscription options.pp. 63-69
Online Optimization Algorithms for Edge Computing-based Cloud Gaming User ExperienceFull-text access may be available. Sign in or learn about subscription options.pp. 70-75
Research on Small Visible Light Underwater Communication SystemFull-text access may be available. Sign in or learn about subscription options.pp. 76-80
Eff2CaNet:Convolutional Neural Networks Based on Coordinated Attention for COVID-19 ClassificationFull-text access may be available. Sign in or learn about subscription options.pp. 86-90
Three-dimensional EIT of Pulmonary Edema Based on TV AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 104-108
A study on Channel correction of the radar receiver and the digital quadrature sampling techniqueFull-text access may be available. Sign in or learn about subscription options.pp. 109-115
Leveraging feature fusion for improved NER for tourism fieldFull-text access may be available. Sign in or learn about subscription options.pp. 124-128
An OTA-oriented Protocol for Security ProtectionFull-text access may be available. Sign in or learn about subscription options.pp. 129-134
Design of adaptive Kalman consensus filters (a-KCF)Full-text access may be available. Sign in or learn about subscription options.pp. 142-148
A New Way of the Wideband Coherent Signals DOA Estimation on the Uniform Circular ArrayFull-text access may be available. Sign in or learn about subscription options.pp. 149-153
License Plate Recognition Method based on Convolutional Neural NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 154-160
A Literature Review on Face Clustering in China: Based on CNKI Database(1997-2022)Full-text access may be available. Sign in or learn about subscription options.pp. 161-167
An Adaptive Load Balancing Strategy for Distributed Machine LearningFull-text access may be available. Sign in or learn about subscription options.pp. 168-175
Vision Transformer for Cell Tumor Image ClassificationFull-text access may be available. Sign in or learn about subscription options.pp. 176-180
A Fine-Grained Word-level Translation Quality Estimation Method based on Deep LearningFull-text access may be available. Sign in or learn about subscription options.pp. 181-189
Human thermal sensation model based on somatosensory temperature under different activitiesFull-text access may be available. Sign in or learn about subscription options.pp. 190-196
Classification Model of Depression Based on the CNN-LSTM NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 210-214
A kidney staining transfer model based on CycleGan using Spade as the normalization layerFull-text access may be available. Sign in or learn about subscription options.pp. 215-223
Depression Classification Using log-Mel energy based on EEGFull-text access may be available. Sign in or learn about subscription options.pp. 224-229
An Accurate PTRS Calculation Method for Wide-beam Multi-receiver SASFull-text access may be available. Sign in or learn about subscription options.pp. 230-234
Data Access Loss Detection Method for data platforms-LDLD ModelFull-text access may be available. Sign in or learn about subscription options.pp. 235-241
A Study on Welding Penetration Depth Detection Based on Battery Pack Tab SamplesFull-text access may be available. Sign in or learn about subscription options.pp. 242-247
A Distributed Authentication Protocol for 5G Satellite Converged NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 248-252
FPGA Based Memory Security and Error Correction System for RISC-V ProcessorFull-text access may be available. Sign in or learn about subscription options.pp. 253-259
Research on Target Recognition and Location Algorithm Based on Camera and LidarFull-text access may be available. Sign in or learn about subscription options.pp. 260-268
Research on Reliability Analysis of the Voting System of Heterogeneous UnitFull-text access may be available. Sign in or learn about subscription options.pp. 269-274
Multimodal substorm recognition using UVI, SuperDARN and space physical parametersFull-text access may be available. Sign in or learn about subscription options.pp. 275-282
Nested perceptron model and its learning algorithmFull-text access may be available. Sign in or learn about subscription options.pp. 288-293
Alzheimer’s Disease Classification Detection Based on Brain Electrical Signal Graph StructureFull-text access may be available. Sign in or learn about subscription options.pp. 294-300
Research on Low-power Schemes based on Large GPU ChipFull-text access may be available. Sign in or learn about subscription options.pp. 301-309
Research on waterlogging early warning system based on adaptive urban flooding modelFull-text access may be available. Sign in or learn about subscription options.pp. 310-317
Application of WOA-based Interval Type-2 Fuzzy Logic System in Wind Power PredictionFull-text access may be available. Sign in or learn about subscription options.pp. 318-323
Tinker Board Based Multi-functional Identity Verification System DesignFull-text access may be available. Sign in or learn about subscription options.pp. 324-329
A color style fusion design method based on generative adversarial networksFull-text access may be available. Sign in or learn about subscription options.pp. 338-343
Intrusion Detection Classification Method based on Generative Adversarial NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 344-349
A Novel Estimation Method in FDA-MIMO Radar Using Matrix Pencil MethodFull-text access may be available. Sign in or learn about subscription options.pp. 358-362
Text Detection And Recognition Algorithm For Arbitrary Shapes In Natural ScenesFull-text access may be available. Sign in or learn about subscription options.pp. 363-369
Short-Term Photovoltaic Power Forecasting Via Sparse Coding and Dictionary Based TechniquesFull-text access may be available. Sign in or learn about subscription options.pp. 370-375
A Data Selection Method for Domain-specific Machine TranslationFull-text access may be available. Sign in or learn about subscription options.pp. 376-383
Research on Cooperative Positioning Based on Convex Optimization in LOS/NLOS EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 384-387
Hybrid Genetic-Based Traffic Scheduling Algorithm in In-Vehicle Time Sensitive NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 388-394
Wasserstein Distributionally Robust Optimization in Multivariate Ridge RegressionFull-text access may be available. Sign in or learn about subscription options.pp. 395-399
A Study on Adaptive User Equipment Aggregation Mechanism for Future Internet of Things NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 400-406
Implicit Discourse Relation Recognition by Scoring Special TokensFull-text access may be available. Sign in or learn about subscription options.pp. 407-413
Wideband Dual-polarized Programmable Metasurface for Tunable RCS ReductionFull-text access may be available. Sign in or learn about subscription options.pp. 414-418
Reentry Guidance for Hypersonic Vehicle based on Reinforcement LearningFull-text access may be available. Sign in or learn about subscription options.pp. 419-430
An Improved UKF and Its Application in Maneuvering Target TrackingFull-text access may be available. Sign in or learn about subscription options.pp. 431-435
Joint Graph Convolutional Network and Convolutional Neural Network for RecommendationFull-text access may be available. Sign in or learn about subscription options.pp. 436-442
Sequence Matching and Genealogy Tree Drawing Based on Edit Distance AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 443-448
Research on Zero Trust Evaluation Method for Network SecurityFull-text access may be available. Sign in or learn about subscription options.pp. 449-454
Cross-Domain Trust Remote Attestation Scheme in the Internet of ThingsFull-text access may be available. Sign in or learn about subscription options.pp. 455-460
Progressively Coding the Human Visual Information for Auroral Substorm RecognitionFull-text access may be available. Sign in or learn about subscription options.pp. 461-467
AI-Driven Depression Detection Algorithms from Visual and Audio CuesFull-text access may be available. Sign in or learn about subscription options.pp. 468-475
A Multi-Level Interactive Intelligent Fault Diagnosis Method for Aviation Electronic SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 476-481
Main-Lobe Jamming Rejection within one PRI of Bistatic Radar SystemFull-text access may be available. Sign in or learn about subscription options.pp. 482-488
Non-line-of-sight Human Vital Sign Detection Method Based on Multipath Signals FusionFull-text access may be available. Sign in or learn about subscription options.pp. 489-496
ARIMA Time Series Modeling and Forecasting of Enterprise Electric Energy ConsumptionFull-text access may be available. Sign in or learn about subscription options.pp. 497-500
Networked Radar System: A More Advanced Radar Detection PlatformFull-text access may be available. Sign in or learn about subscription options.pp. 506-512
A New Heuristic Algorithm Based on Nearby Measures for Shortest Path CalculationFull-text access may be available. Sign in or learn about subscription options.pp. 513-518
Twin Data Correlation Analysis Based on GCN-LSTM model and Its Sharing with Blockchain TechnologyFull-text access may be available. Sign in or learn about subscription options.pp. 519-524
NLOS Target Localization Method in Long L-shaped Scenario with SISO UWB RadarFull-text access may be available. Sign in or learn about subscription options.pp. 525-530
Maneuvering Target Tracking with Modified IMM Algorithm Based on Array RadarsFull-text access may be available. Sign in or learn about subscription options.pp. 531-535
Intelligent Monitoring and Scheduling of Real-time Dynamic Data Based on Digital TwinFull-text access may be available. Sign in or learn about subscription options.pp. 536-541
Study on array principle of solid-state power amplifierFull-text access may be available. Sign in or learn about subscription options.pp. 542-546
A Multi-dimensional Sparsity Nested Winograd Convolutional Neural Networks AcceleratorFull-text access may be available. Sign in or learn about subscription options.pp. 547-553
Research and implementation of garbage classification recognition algorithmFull-text access may be available. Sign in or learn about subscription options.pp. 554-558
Low Sidelobe Integrated Radar and Communication Shared Waveform DesignFull-text access may be available. Sign in or learn about subscription options.pp. 559-563
Research progress based on FBG burst pressure detectionFull-text access may be available. Sign in or learn about subscription options.pp. 564-570
PGN: A High Quality Proposal Generation Network for Object DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 571-577
A Subarray Processing Approach to GNSS Spoofing Detection based on Double Difference MeasurementsFull-text access may be available. Sign in or learn about subscription options.pp. 578-583
Showing 100 out of 108