Table of Contents
Table of Contents
Rate-adaptive Polar Codes Design for MLC NAND Flash Memory .............................................................. 11
Energy Efficiency Optimization of Generalized Spatial Modulation with Sub-Connected Hybrid Precoding 17
Kai Chen, Jing Yang, Xiaohu Ge, Yonghui Li, Lin Tian, Jinglin Shi
Polar Code in FSO Communication System for Sea Surface Scenario ....................................................... 28
Jianming Cui, Zuowen Zhang, Xiaojun Zhang, Hengzhong Li and Qingtian Zeng
Haifeng Fang, Rong Tan, Yuanbin Han, Xiangguo Chen, Jijun Zhao
μcos-II Porting and Low Power Mode Design Based on STM32L ............................................................... 65
Guangyi Cao
Improved Calibration Procedure of Block Error Rate Estimation for Fast Link Adaptation .......................... 89
Soft Demapping Based Receiver for Asymmetrically Clipped Optical OFDM .............................................. 94
Throughput Analysis in Collaborative Communication Based on Relay Energy Harvesting ...................... 104
Kunheng Wu, Jun Wu, Dian Liu, Xianghuang Chen, Zhifeng Zhang
Iterative Rank-Two Transmit Beamforming Design for QoS-Diffserv Multi-group Multicasting Systems..... 114
Fault Diagnosis Application of Short Wave Transmitter Based on Stacked Auto-Encoder ......................... 119
Hybrid Beamforming Based on Minimum Mean Square Error for Multi-user Multi-Data Stream System .. 124
Clock Skew Elimination Using Robust Regression in Time Triggered Communication ............................. 129
Stepwise Noncoherent Accumulation Acquisition for High-Dynamic DSSS Communications ................... 135
iv
JRAS and LRAS Strategies for Two-Way Full-Duplex Amplify-and-Forward Relaying .............................. 141
Performance Analysis of Hybrid Protocol Based Two-Way Decode-and-Forward Relay Networks ........... 146
Ruyi Xiao, Yingting Liu, Hongwu Yang, Jianmei Shen, Chunman Yan
Arifa Anwar, Syed Tariq Shah, Syed Faraz Hasan, Dong Ryeol Shin
Cooperative Beamforming for UAV-Assisted Cognitive Relay Networks with Partial Channel State
Information ................................................................................................................................................ 158
DGPA-Based Tone Reservation for PAPR Reduction in OFDM Systems .................................................. 163
Jun Li, Renjie Zhang, Yajun Wang, Tingting Liu, Ran Ding
Impact of Frequency Offset on the Performance of Uplink OFDM-NOMA Systems .................................. 168
Musyyab Yousufi, Muhammad Amir, Umer Javed, Muhammad Tayyib, Suheel Abdullah
ABC Algorithm Based Multiuser Detector for TDRSS Forward Link MA Service ....................................... 179
Road-Map Aided VSIMM-GMPHD Filter for Ground Moving Target Tracking............................................ 190
Kernelized Correlation Filter Tracking with Scale Adaptive Filter and Feature Integration ........................ 201
Hammerstein Subband Spline Adaptive Filter for Nonlinear System Identification .................................... 207
v
Median Based Wiener Filtering Interpolation Method for Progressive Display Using Local Homogeneous
Area Selector............................................................................................................................................. 213
Joint Sparse Channel Estimation and Data Transmission for Many Access MIMO System ...................... 219
Henglei Jin, Kaizhi Huang, Liang Jin, Zhou Zhong, Yajun Chen
Weighted lp Minimization for Compressive Channel Estimation in FDD Massive MIMO ........................... 232
Wei Lu, Yongliang Wang, Xiaoqiang Hua, Xiaoqiao Wen, Shixin Peng, Liang Zhong
Road Map Extraction Using GMPHD Filter and Linear Regression Method for Ground Target Tracking .. 237
Joint Channel-Encryption Coding Based on Interleaver and Multiplexer in Turbo Codes .......................... 248
An Opportunistic Routing Protocol based on Link Quality and Local Topology in Mobile Ad hoc Networks
.................................................................................................................................................................. 260
Research on Simulation of Cluster Routing Protocol for Industrial Wireless Sensor Networks ................. 265
An Overlay Routing Algorithm Based on QoS for Internet of Things ......................................................... 270
Youbing Hu, Xia Hu, Jinjiang Wang, Kun Wang, Kaidong Wang
QEBR: Q-Learning Based Routing Protocol for Energy Balance in Wireless Mesh Networks .................. 280
Mingxi Yin, Jialing Chen, Xiaohui Duan, Bingli Jiao_ and Yiming Lei
vi
FD-SP: A Method for Predicting Cascading Failures of Inter-domain Routing System .............................. 290
Unequal Clustering and Routing Algorithm Based on Dynamic Topology for WSN .................................... 311
A Low-Loss Broadband One-Way Transmission Structure Based on Nonreciprocal Coupling .................. 321
Hailin Cao, Xiaodong Wu, Tao Chen, Jianmei Lei, Linhua Yang and Xiaoheng Tan
Enabling Work-Conserving Bandwidth Guarantees for Multi-tenant Datacenters with Network Support .. 331
Research on Congestion Control Algorithms for Real-time Audio and Video Stream ................................ 351
A Panoramic Video Transmission System Design Based on LTE Network ............................................... 357
Predicting Micro-blog Individual Retweet Behavior Based on User's Interest Drift .................................... 364
vii
MIMO System and Performance Optimization
Power Optimization in Cell-Free Massive MIMO with Short-Term Power Constraints ............................... 370
Yao Zhang, Haotong Cao, Chang Qi, Peng Zhong, Longxiang Yang
An Adaptive Energy Consumption Optimization for Massive MIMO Systems with Imperfect CSI ............. 377
Improved Joint Unitary ESPRIT Target Tracking Algorithm for Bistatic MIMO Radar ................................ 382
Hailiang Xiong, Shu Gong, Meixuan Peng, Xuewen Ding, Junyu Shi
Iterative MIMO Detection Algorithm Based on Successive Interference Cancellation in Multi-cell Scenario
.................................................................................................................................................................. 387
Location-Based Greedy Pilot Assignment for Cell-Free Massive MIMO Systems ................................... 392
Yao Zhang, Haotong Cao, Peng Zhong, Chang Qi and Longxiang Yang
Sparsely Connected Neural Network for Massive MIMO Detection .......................................................... 397
Maximizing Minimum Phase Difference Based Hybrid Beamforming for Multiuser mmWave Massive MIMO
Systems..................................................................................................................................................... 403
Multi-user Grouping Based Scheduling Algorithm in Massive MIMO Uplink Networks .............................. 409
Supervised Learning Method for Link Adaptation Algorithm in Coded MIMOOFDM Systems ................... 414
Conjugate Gradient Method Based Linear Precoding with Low-Complexity for Massive MIMO Systems . 420
Topological Interference Management for Three-Cell MIMO-NOMA with Alternating Connectivity ............ 425
Phase Noise Compensation for DFT-s-OFDM Waveforms in MIMO System ............................................ 430
viii
A Frame Prioritization Based on Classified Contentions in Multi-hop Wireless Ad hoc Networks.............. 435
An All-to-All Broadcast Algorithm with Variable Length Packets in Ad Hoc Networks Using Directional
Antennas ................................................................................................................................................... 440
Yichen Zhang, Laixian Peng, Renhui Xu, Wendong Zhao, Zhengqin Xu, Jun Zhu
A New Distributed Coalition Formation Algorithm for Cooperation in Ad Hoc Networks ............................ 446
Toshihiko Kato, Ngo Quang Minh, Ryo Yamamoto, and Satoshi Ohzahata
A Modified TDMA Algorithm Based on Adaptive Timeslot Exchange in Ad Hoc Network........................... 457
Yao Lu, Zixuan Qiu, Yue Luo, Lu Wei, Shuisheng Lin, Xinchun Liu
Detection Efficiency Analysis of Cooperative Spectrum Sensing in Cognitive Radio Networks................. 462
Design of Spectral Line Agile Observation and Analysis Platform ............................................................. 468
Statistical Max-SINR Beamforming for Wireless Powered Communications in Airborne Massive MIMO
System ...................................................................................................................................................... 483
Research on Parallel Encryption Technology in the Emergency Platform of High Speed Railway in China
.................................................................................................................................................................. 488
Path Loss and Blockage Modeling for Vehicle to Vehicle Channel above 6 GHz ...................................... 494
Research on Polling Based Traffic signal Control Strategy with Fuzzy Control ......................................... 500
ix
A Useful Decision Support Model for Road Owners to Select ETC tags Based on C4.5 Algorithm ........... 505
An Improved Fusion Algorithm of Path Planning for Automated Guided Vehicle in Storage System ......... 510
Forward Vehicle Deceleration Detection System for Motorcycle at Nighttime ........................................... 515
Jian-Kai Feng, Meng-Lin Chiang, Shih-Hsien Chuang, Chiung-Yao Fang, Sei-Wang Chen
Railway Network Modeling Using Building Block of Timed Coloured Petri Nets ........................................ 528
Detecting Anomalies in Distributed Control Systems by Modeling Traffic Behaviors ................................. 534
Research on TD-LTE Uplink Frequency Offset Estimation Algorithm for High- Speed Railway................. 539
Roadside Units Non-full Coverage Optimization Deployment Based on Simulated Annealing Particle Swarm
Optimization Algorithm .............................................................................................................................. 544
The Reliability Mapping Monitoring Method of Network Function Virtualization ........................................ 555
A TCP Decoupling Based SDN Architecture for Asymmetric Networks ..................................................... 560
Hailun Liu, Ting Zhu, Yanbing Liu, Huarui Yin, Xiaohui Chen, Guo Wei
An NFV Framework for Supporting Elastic Scaling of Service Function Chain ......................................... 566
Optimized Deployment of Network Function for Resource Pooling Switch ............................................... 572
A Network Slicing Deployment Method for Guaranteeing Service Performance ....................................... 579
x
The Application of Reliability in the Information Hypernetworks Optimization ........................................... 585
Chuting Wang, Ruifeng Guo, Yi Hu, Haoyu Yu, Haotian Wu, Azhen Peng
A New Particle Swarm Optimization Algorithm Based on Local-World Evolving Network Model ............... 598
Hongwei Kang, Jian Peng, Yong Shen, Xingping Sun, Qingyi Chen, Yibing Li,Yan Li, Tao Chen
Forensics on Twitter and WeChat Using a Customised Android Emulator ................................................ 602
Refactoring Orchestrated Web Services into Microservices Using Decomposition Pattern....................... 609
A Robust Authentication Protocol for Multi-server RFID System Applications ........................................... 614
Ken Raffenetti, Neelima Bayyapu, Dmitry Durnov, Masamichi Takagi, Pavan Balaji
Multiple Access Protocol for ad-hoc networks in VHF Data Exchange System ......................................... 629
Uplink User Power Control for Low-Orbit Satellite Communication Systems ............................................ 634
Hangyu Song, Shuaijun Liu, Xin Hu, Xiuhua Li, Weidong Wang
Joint Energy-efficient Power Control of Full-Duplex Ultra-Dense Heterogeneous Networks ..................... 646
Dileep Kumar Sajnani, Abdul Rasheed Mahesar, Abdullah Lakhan, Irfan Ali Jamali, Rakhshanda Lodhi,
and Muhammad Aamir
xi
Efficient Bandwidth Management (EBM) Algorithm for NG-EPON ............................................................ 663
Power Allocation for Uplink Cognitive Heterogeneous Network with Nonorthogonal Multiple Access ....... 668
Cluster Formation and Power Control for M2M-Enabled Two-Tier Cellular Network ................................. 673
Power Allocation for NOMA Based Layered Multicast Transmission ......................................................... 678
Resource Allocation in Cognitive Wireless Powered Communication Networks under Outage Constraint
.................................................................................................................................................................. 683
Resource Allocation for IoT Devices in FeD2D Communication Networks ................................................ 688
Ting Zhang, Yuehong Gao, Zhidu Li, Pengxiang Li, Mingyang Dong
Computing Resource Allocation of Mobile Edge Computing Networks Based on Potential Game Theory
.................................................................................................................................................................. 693
Heng Liu, Haoming Jia, Jiaqi Chen, Xiaohu Ge, Yonghui Li, Lin Tian, Jinglin Shi
Resource Allocation for Delay QoS-Driven Multicarrier Relay Networks with Energy Harvesting Nodes .. 700
Joint Computation Offloading and Wireless Resource Allocation in Mobile Edge Computing ................... 705
Hybrid Resource Allocation Algorithm Based on Spectrum Sharing and Separation in Ultra-dense Networks
.................................................................................................................................................................. 712
Dynamic Computation and Radio Resource Allocation in Downlink Green C-RAN Systems .................... 719
Resource Allocation for Downlink SCMA System Based on Coalitional Game.......................................... 726
Jingshu Zhang, Mengchen Zhang, Dou Li, Yanjun Yang, Yuping Zhao
Yi Liu, Le Yang, Ji Li
Design of the Indoor Positioning Glasses for the Blind Based on the LiFi Technology .............................. 744
Comparison of Fingerprint Matching Methods for Wi-Fi Indoor Positioning ............................................... 748
CSI-Based Device-Free Indoor Localization Using Convolutional Neural Networks ................................. 753
Error Elimination Method for TOA Based Wireless Cooperative Localization Networks in NLOS Case .... 758
Meixuan Peng, Hailiang Xiong, Shu Gong, Zhenzhen Mai, Junyu Shi
Joint TOA and DOA Estimation Based on Improved Matrix Pencil Method ............................................... 763
Fake Access Point Localization Based on Optimal Reference Points ....................................................... 784
Uplink Interference Analysis between LEO and GEO Systems in Ka Band .............................................. 789
Pin Xu, Cheng Wang, Jun Yuan, Yuan Zhao, Rui Ding, Weidong Wang
Open-Loop Precoding Scheme for Multi-beam Mobile Satellite Communication Systems ........................ 795
Max-Min User Throughput in Emergency Situations with a Master-Slave UAV Model .............................. 800
Design and Implementation of NS3-Based Simulation System of LEO Satellite Constellation for IoTs ..... 806
Zheng Wang, Gaofeng Cui, Pengxu Li, Weidong Wang, Yinghai Zhang
xiii
Deployment of Edge-Computing in 5G NFV Environment and Future Service-Based Architecture ........... 811
An Energy Efficiency Optimization Algorithm Based on the Factor for Portion of Time Division in
Backhaul-Constrained Ultra Dense HetNets ............................................................................................. 817
Performance Evaluation of Interference Coexistence in Dense Urban Scenario for 5G NR System......... 823
Hanwei Li, Xin Zhang, Lei Cao, Xuanguang Hu, Dacheng Yang
Performance Analysis of LoRa Modulation with Residual Frequency Offset ............................................. 835
A Study of the Collision Probability for R-FTMA Ultra-Narrowband IoT Networks ..................................... 845
Distributed Probability Random Access Scheme in Satellite IoT System .................................................. 852
LPDC: Mobility- and Deadline-Aware Task Scheduling in Tiered IoT ........................................................ 857
A Fuzzy Logic Based Warning Scheme of Monitoring Systems for IoT Cloud Services ............................ 864
LVChain: A Lightweight and Vote-based Blockchain for Access Control in the IoT .................................... 870
Research on Smart Household Appliance System Based on NB-IoT and Cloud Platform ........................ 875
Zhen Jiang, Zheng Wang, Jing Hu, Tiecheng Song, Zhongqiang Cao
Design and Implementation of the NB-IoT Downlink System on OpenAirInterface Platform ..................... 880
Xinyu Wang, Cheng Wang, Xiuhua Li, Weidong Wang, Yinghai Zhang
Power-Grid Services Oriented Coordinated and Unified Control Technology of IP and Optical Networks
.................................................................................................................................................................. 885
xiv
Wireless Sensor Network Design and Sensing Technology
Design and Analysis of Dual-Channel Structure for Software-Defined Wireless Sensor Networks ........... 889
Network-Balanced Algorithm Based on Hierarchical Subnet Space for Software-Defined Wireless Sensor
Networks ................................................................................................................................................... 894
Coverage Optimization Based on Improved Firefly Algorithm for Mobile Wireless Sensor Networks ........ 899
Xiaolin Lu, Wei Cheng, Qiang He, JunHua Yang, Xiaolong Xie
Modeling Wireless Sensor Networks on FPGA Platform: A Stochastic Network Calculus Approach ......... 904
Jincheng Yang, Lu Wang, Xueliang Wang, Qingyang Liu, Lin Pang, Haiyang Liu
Balancing Energy Consumption Algorithm Based-on Controller Handover for Software-Defined Wireless
Sensor Network ......................................................................................................................................... 909
Design and Analysis of Software-Defined Wireless Sensor Network Based on Mobile Agent Topology
Discovery................................................................................................................................................... 916
An Effective Cluster Heads Selection Method for Wireless Sensor Networks ........................................... 928
MAC Protocol Analysis Based on Adaptive Wireless Sensor Network ...................................................... 934
Exploiting an Unmanned Aerial Vehicle for Energy Efficient Data Collection in Wireless Sensor Networks
.................................................................................................................................................................. 939
A Sliding Window Based Efficient Transmission for Underwater Sensor Networks ................................... 944
xv
Processing of Multireceiver Sonar Data with Failed Receivers ................................................................. 954
A New Tracking Technique with the Memory Discriminator for High SensitivityGNSS Receivers .............. 959
Securing UAV-Enabled Millimeter Wave Communication via Trajectory and Power Optimization Author Index
.................................................................................................................................................................. 970
Social-Aware and Payment Incentivized Caching for D2D Communications ............................................ 976
Internet of Building Equipment System Based on Thread Network and Methods for Managing End Devices.
.................................................................................................................................................................. 987
Secure Beamformer Design for Cognitive Satellite Terrestrial Networks ................................................... 997
Chunyan Yin, Zhi Lin, Xiangshuai Tao, Jian Ouyang, Min Lin, and Athanasios D. Panagopoulos
Application of Spoof Surface Plasmon Polariton in Reducing Radiation Loss of Asymmetric Microstrip Lines
with Small Radius Bends ......................................................................................................................... 1003
Research on Digital Instantaneous Frequency Measurement Based on Passive Positioning System .... 1008
A Modified UWB Antipodal Vivaldi Antenna with Elliptical Lens ............................................................... 1013
xvi
An Improved Cuckoo Search Algorithm for Optimizing the Beam Patterns of the Random Antenna Arrays
................................................................................................................................................................ 1018
Qianyu Zhou, Yong Zhang, Yulin Zhang, Geng Sun, Dehuai Zou, Yuxuan Chen, Yanheng Liu
High-Gain Lens Antenna Using Transmissive Phase Gradient Metasurface ........................................... 1032
Wideband Magnetoelectric Dipole Antenna with Stable Wide E-plane Beamwidth ................................. 1042
Yaru Dong, Weijun Hong, Shufang Li, Shahab Uddin, Hongjie Liu, Deken Chen
Design of an 3-Element Arc Array of Microstrip Antenna for Widen Bandwidth and Adjusting Beam Direction
................................................................................................................................................................ 1052
Ying Kang, Chao Liu, Yan-shi Li, Hua-ning Wu, Heng-feng Wang, Gan-lai Dai
Extended Generalised Spatial Modulation with Variable Number of Activated Transmit Antennas .......... 1057
A Dual-Band and Dual-Circularly-Polarized Array Antenna with A Single Element .................................. 1062
PAPR Reduction via Degree of Freedom from Multiple Antennas in Large-Scale MIMO-OFDM Systems
................................................................................................................................................................ 1067
Joint Antenna Selection and User Scheduling in Downlink Multi-user MIMO Systems ........................... 1072
Haojin Li, Haijun Zhang, Dong Li, Yupei Liu Arumugam Nallanathan
Modeling and Accessment of the Regional Energy Internet Based on Multi-agent ................................. 1077
xvii
A New Data Packet Transfer Strategy for Opportunistic Mobile Network ................................................ 1083
Bitao Peng
Research on the Positioning Precision of Ranging Methods in VHF Data Exchange System ................. 1088
Wenjun An
Adapting Block-sized Captures for Faster Network Flow Analysis on the Hadoop Ecosystem................ 1097
Alberto H. Medalla, Miguel Zenon Nicanor L. Saavedra, Patricia Angela R. Abu, William Emmanuel S.
Yu
Oversampling for Imbalanced Time Series Classification Based on Generative Adversarial Networks .... 1104
Chengbao Liu, Xuelei Wang, Ke Wu, Jie Tan, Fulin Li, Wenfa Liu
Research on Network Traffic Prediction Based on Long Short-Term Memory Neural Network ................ 1109
An Anti-jamming Approach for Infrared Target Tracking Using Trajectory Prediction and Network Flow .. 1114
LSTM-Based Traffic Prediction in Support of Periodically Light Path Reconfiguration in Hybrid Data Center
Network .................................................................................................................................................... 1124
Tactical Internet Communication Traffic Characteristics and Modeling Methods ...................................... 1129
Cyber Security
Kien Trung Ngo, Mika Hoppari, Jani Suomalainen, and Marko Höyhtyä
Automatic Reverse Engineering of Unknown Security Protocols from Network Traces ........................... 1139
xviii
Malicious Hidden Redirect Attack Web Page Detection Based on CSS Features .................................... 1155
Research on Security Isolation Method for Wireless Public Network Oriented to Smart Power Distribution
Service ..................................................................................................................................................... 1160
Security Assessment of Dynamic Networks with an Approach of Integrating Semantic Reasoning and Attack
Graphs...................................................................................................................................................... 1166
Democratic Supervision Makes Controls in Software-Defined Networks More Secure ............................ 1175
Vulnerability of Complex Networks under Neighbor Nodes Attack Strategies .......................................... 1193
ISAR False Target Array Generated by Sub-Nyquist Sampling Jamming in Fast and Slow Time ............ 1198
Jiyuan Chen, Xiaoyi Pan, Zhaoyu Gu, Shunping Xiao, Guangjun Liu
Epilepsy EEG Classification and Visualization using Linear Discriminate Analysis ................................. 1202
Jeng-Wei Lin
Seismic Signal Detection Algorithm Based on GS Transform Filtering and EMD Denoising ................... 1213
Ruonan Han, Jian Li, Gaofeng Cui, Xiaoming Wang, Weidong Wang, Xiuhua Li
Blind Extraction for PCMA Downlink Mixed Signals Using Guided Signature.......................................... 1218
xix
Huimin Zhong, Fei Wang, Jianjiang Zhou
Frequency Offset Estimation Algorithm of VDES Signals Based on Cross-Correlation ........................... 1234
A TE Process Fault Diagnosis Method Based on Improved Wavelet Threshold Denoising and Principal
Component Analysis ................................................................................................................................ 1247
A Novel Throat Microphone Speech Enhancement Framework based on Deep BLSTM Recurrent Neural
Networks ................................................................................................................................................. 1258
Changyan Zheng, Xiongwei Zhang, Meng Sun, Jibin Yang, Yibo Xing
Speech Enhancement Based on Cepstral Mapping and Deep Neural Networks .................................... 1263
M-ary Orthogonal Signal and BER Performance in Wireless Communication Systems .......................... 1268
Xuewen Ding, Hailiang Xiong, Shu Gong, Meixuan Peng, and Juan Tang
Voice Intonation Transformation Using Segmental Linear Mapping of Pitch Contours ............................ 1278
Blind Identification of Signals with Stochastic Frequency Offset in Non-cooperative Environment ......... 1283
Matching Pursuit Based Sparse Time-Frequency Analysis for Seismic Signal ........................................ 1288
An Optimized Window Length based Time-Frequency Representation for Non- Linear Frequency Modulated
Signals..................................................................................................................................................... 1293
xx
An Improved IMCRA Algorithm for Sleep Signal Denoising ..................................................................... 1298
Signal Processing
Xintao Jiao
Research on Co-frequency Interference of CBTC Signal Based on IEEE 802.11 ................................... 1309
Xin He, Jianfeng Li, Ying Wang, Xuetao Yang, Wei Wang, Tao Luo
Method of Time Sampling Error of Time-Interleaved ADC Based on Statistical Rule .............................. 1314
Research on Multipath Mitigation Method for BOC Signal Based on CCRW Technology ....................... 1319
Array Configuration for Distributed Spaceborne Coherent Aperture Radar ............................................. 1326
Joint Data/Pilot Tracking Techniques for the Modern Beidou B1C Signal................................................ 1331
Simulation and Implementation of Spectrum Synthesis Method for Linear Modulated Stepped Frequency
Signal Based on Spectral Extraction ....................................................................................................... 1336
The Impact of Bathtub Water Temperature on Personal Identification with ECG Signal Based on
Convolutional Neural Network ................................................................................................................. 1341
Secure Transmission Based on Differential Spatial Modulation with Artificial Noise ................................ 1346
Yong Wang and Weiwei Yang, Tao Zhang, Lei Cheng and Houyong Jia
An Optimized Anti-Noise Receiving Method Based on Spreading Spectrum Audio Watermarking System
................................................................................................................................................................ 1351
Research on Scrapy-Based Distributed Crawler System for Crawling Semi-Structure Information at High
Speed ...................................................................................................................................................... 1356
xxi
A Click Fraud Detection Scheme Based on Cost sensitive BPNN and ABC in Mobile Advertising .......... 1360
DPDA: A Moving Target Defense System Based on Detection and Prediction Mechanism..................... 1371
The Attack Surface Shifting in the Mimic Defense System ...................................................................... 1377
Design of Bluetooth DOS Attacks Detection and Defense Mechanism ................................................... 1382
Analyzing Core Structure and Role Transition Features of Terrorist Organizations Based on Meta-Network
Take Al Qaida as an Example.................................................................................................................. 1392
Pattern Recognition
A Robust Algorithm for Go Image Recognition in Go Game .................................................................... 1397
Multidimensional Particle Swarm Optimization Based Long Short-Term Memory Method for Human Activity
Recognition ............................................................................................................................................. 1407
Research on Regional Traffic State Identification Method Based on MRGA-FCM .................................. 1424
xxii
Shaodong Shi, Qing F. Zhou, M. Peng, Xusheng Cheng
Accelerometer-based Gesture Recognition Using MFCC and HMM ....................................................... 1435
A Vision-Based Human Action Recognition System for Companion Robots and Human Interaction ...... 1445
Meng-Lin Chiang, Jian-Kai Feng, Wen-Lin Zeng, Chiung-Yao Fang, Sei-Wang Chen
Facial Expression Recognition Based on Spatial Transformer Siamese Networks ................................. 1453
Multimodal Biometric Authentication System for Smartphone Based on Face and Voice Using Matching
Level Fusion ............................................................................................................................................ 1468
Wenbo Zheng, Xin Jin, Shaocong Mo, Yili Qu, Zeyu Fan, Yuntao Yang, Tianyu Liu, Sijie Long,
Chengfeng Zheng, Tianyi Qi, Zefeng Xie, Jia Shuai, Zhongyuan Chen
Integrating GAN with CNN for Face Sketch Synthesis ............................................................................ 1483
Yufeng Zhao, Fan Shi, Meng Zhao, Chen Jia, Shengyong Chen
Target Detection
A Fast Object Proposal Assessment Method Based on Edge Directions ................................................ 1493
Traffic Sign Detection Method of Improved SSD Based on Deep Learning ............................................. 1516
Crack Detection Using Fast Spectral Clustering Considering Graph Connectivity .................................. 1521
Small Object Detection Using Context Information Fusion in Faster R-CNN........................................... 1537
RPN with the Attention-based Multi-Scale Method and the Adaptive Non-Maximum Suppression for
Billboard Detection .................................................................................................................................. 1541
Automatic Classification and Detection of Oranges Based on Computer Vision ..................................... 1551
Yanmin Xiong, Zhiqiang He, Kai Niu, Hongyan Zhang, Hongxin Song
Fuzzy C-means Thresholding for a Brain MRI Image Based on Edge Detection .................................... 1562
Ismail Yaqub Maolood, Yahya Eneid Abdulridh, Al-Salhi, Shayem ALresheedi, Mahmut Ince,Tong Li,
Song Feng Lu
Segmentation of Lesions in Skin Image Based on Salient Object Detection with Deeply Supervised Learning
................................................................................................................................................................ 1567
Weijia Ji, Lizhi Cai, Wei Chen, Mingang Chen, Gang Chai
xxiv
Detection of Hepatolithiasis in CT Images for Image-Guided Surgery .................................................... 1574
Brain CT and MRI Medical Image Fusion Scheme Using NSST and Dictionary Learning ...................... 1579
Yanyu Liu, Dongming Zhou, Rencan Nie, Ruichao Hou, Zhaisheng Ding, Rusheng Xie
Capsule Endoscopy Image Classification with Deep Convolutional Neural Networks ............................. 1584
Yaxing Cao, Wenming Yang, Kaiquan Chen, Yong Ren, Qingmin Liao
A New Feature Extraction Method for Medical Images Integrity Verification............................................ 1589
Pengliang Hou
The Combinations of Loss Functions and Schemes for Mammographic Classification ........................... 1594
An Automatic Brain Tumor Image Segmentation Method Based on the U-net ........................................ 1600
Human Classification Based on Micro-Doppler Features of Walking Using Deep Learning Algorithm .... 1605
Improving Comprehensive Sampling Sets Matting Using Texture Feature .............................................. 1617
Multi-focus Image Fusion Framework Using Total Variation and Phase Congruency .............................. 1633
Baofeng Guo, Lin Shi, Huiyan Zeng, Guanjun Chen, Lei Deng
xxv
Affine and Magnitude Transforms Based Data Augmentation Comparison for SAR Automatic Target
Recognition ............................................................................................................................................. 1649
Image Deblurring Algorithm Using ACCELERATED Gradient Descent Method ...................................... 1660
Double Weighted RPCA Denoising Algorithm for Color Images .............................................................. 1670
RGB-D Image Enhancement by Prior Guided Weighted Nonlocal Laplacian .......................................... 1675
Comparing and Combining MLPs and CNNs for Image Denoising ......................................................... 1680
An Improved Visual Tracking Algorithm Based on Efficient Convolution Operators ................................ 1685
Yi Liang
Design of a Large Area Array CMOS of Camera System that can Automatically Zoom .......................... 1690
Scatter Inpainting Algorithm for Rain or Snow Removal in a Single Image ............................................. 1700
Jianyu Hao, Murong Jiang, Yaqun Huang, Yuan Bai, Yuanhang Wang
Enabling Multiview- and Light Field-Video for Veridical Visual Experiences ............................................ 1705
ISAR Imaging Algorithm of Maneuvering Target Based on Matching Flourier Transform ........................ 1710
Baofeng Guo, Huixian Sun, Wenlong Yin, Huiyan Zeng, Guanjun Chen, Lei Deng
xxvi
Developing a Framework for the University-Wide Implementation of Micro-Credentials and Digital Badges: A
Case Study from a Malaysian Private University ..................................................................................... 1715
Chee Leong Lim, Pradeep Kumar Nair, Michael James Keppell, Nurhanim Hassan, Enna Ayub
Magnetic Ring Detection System Based on Multi-camera Vision Technology ......................................... 1725
Analysis and Fusion Algorithm of Weak Target Based on Infrared Dual-Band ........................................ 1730
A Pyramid Image Matching Algorithm for Chang’E-2 CCD Images of the Moon ..................................... 1741
Enterprise Lean Catering Material Management Information System Based on Sequence Pattern Data
Mining ...................................................................................................................................................... 1757
Janusz R. Getta
Research on Data Filling Algorithm Based on Improved k-means and Information Entropy ................... 1774
A Data Processing Method for Fault Prediction of Industrial Pipeline Time Series Data ......................... 1779
xxvii
Parallel Processing of Top-k Dominating Queries on Incomplete Data.................................................... 1785
Miku VMD: Special Motion Data and Predictive Methods for Choreography Model ................................ 1792
Memory-Compact Membership Lookup for Multiple Data Sets by a Single Bloom Filter ......................... 1798
Web Evaluation Analysis of Tourism Destinations Based on Data Mining—Taking Scenic Spots of Hainan
Province as an Example .......................................................................................................................... 1803
A Survey of Gene Selection and Classification Techniques Based on Cancer Microarray Data Analysis
................................................................................................................................................................ 1809
Xinman Zhang, Tingting He, Liwei Ouyang, Xuebin Xu, Sushing Chen
An Improved Weighted KNN Algorithm for Imbalanced Data Classification ............................................ 1814
Truth Discovery on categorical Multi-Valued Attributes with source relations .......................................... 1820
Research on LSTM-Based Load Prediction for Edge Data Centers ........................................................ 1825
Qianying Guo, Ru Huo, Hao Meng, Xinhua E, Jiang Liu, Tao Huang, Yunjie Liu
Transmission Line Evaluation of Smart Grid Based on Big Data Mining ................................................. 1830
Shunjiang Wang, Zhengnan Gao, Yuefeng Sun, Hui Sun, Shubo Hu, Zhong Liu, Anlong Su, Kai Gao,
Weichun Ge
Inferring Land Use Type in Urban Area with Mobile Big Data .................................................................. 1835
Zhizhuang Xing, Wenhui Lin, Yuanyuan Qiao, Hao Zhang, Kewu Sun, Jie Yang
Design of Manufacturing Big Data Access Platform Based on SOA ........................................................ 1841
Design and Implementation of Air Quality Data Processing System Based on Big Data Technology ...... 1846
Xin Zhu, Shuqin Geng, Yupeng Hou, Xiaohong Peng, Ligang Hou, Mingming Zhang, Menghao Chu
Application of Big Data Technology in Evaluation of Operating State of High-Pressure Hydrogenation Heat
Exchanger ............................................................................................................................................... 1851
xxviii
Research on Automatic Classification for Driving Scenarios Based on Big Data and Ontology .............. 1857
Shuai Zhao, Yinan Wu, Xianglei Zhu, Bolin Zhou, Hepeng Bao, and Lu Zhang
Research on Big Data Storage Model of Oilfield Assay Data Based on MongoDB ................................. 1863
Xuesong Zhao
An Improvement of the Remote Authentication Scheme for Anonymous Users Using an Elliptic Curve
Cryptosystem .......................................................................................................................................... 1872
A Novel Image Encryption Algorithm Based on Cellular Neural Networks Hyper Chaotic System .......... 1878
A Color Image Encryption Scheme Using Inverse Fractal Interpolation Function.................................... 1883
The Attribute-weight Cache Replacement Algorithm for Encrypted Files ................................................ 1888
Research on Key Management Scheme for Dynamic Revocable Key-Aggregate Cryptosystem ........... 1904
Improved Randomness of Visual Cryptography Scheme Based on Basis Matrix .................................... 1909
Yang Gao, Wenjun Wu, Tianqi Zhou, Jinyu Na, Meng Li, Yang Sun
Competition and Cooperation between Edge and Remote Clouds: A Stackelberg Game Approach ....... 1919
Incomplete Contract-Based Ownership Allocation for Operator in Mobile Edge Computing.................... 1924
Jun Li, Ran Ding, Tingting Liu, Yu Du, and Zhu Han
xxix
Minimum Completion Time Offloading Algorithm for Mobile Edge Computing ......................................... 1929
Research on Cloud Computing Security Evaluation Model Based on Trust Management ...................... 1934
Zihuan Yu
Dynamic Access Control Model Based on FAHP in Cloud Environment ................................................. 1938
Research on Awareness Method of Cloud User Abnormal Behavior Based on Log Audit ....................... 1944
A Cloud Based Four-Tier Architecture for Early Detection of Heart Disease with Machine Learning
Algorithms ............................................................................................................................................... 1951
Md. Razu Ahmed, S M Hasan Mahmud, Md Altab Hossin, Hosney Jahan, Sheak Rashed Haider Noori
Performance Prediction for CSR-Based SpMV on GPUs Using Machine Learning ................................ 1956
Xinfeng Ye
An SDN/NFV Proof-of-Concept Test-Bed for Machine Learning-Based Network Management .............. 1966
Wei Jiang, Mathias Strufe, Michael Gundall, and Hans Dieter Schotten
Application of Machine Learning and Emotional Fluctuation System in Game Quality Evaluation and
Prospective Players Prediction ................................................................................................................ 1977
Incremental Learning of Single-stage Detectors with Mining Memory Neurons ...................................... 1981
Fei Han, Jiong Mu, Long Tian, Mengting Luo, Zirui Qiu, Dejun Zhang
An Efficient Method to Transform a SAT problem to a Mixed Integer Linear Programming Problem....... 1992
Wenxia Guo, Jin Wang, Majun He, Xiaoqin Ren, Qingxian Wang, Wenhong Tian
xxx
A Non-Parametric Method for Curve Smoothing ..................................................................................... 1997
EasiSMR: Recognizing Non-Specific Low Back Pain Symptomatic Muscles Using Multi-Muscles Fusion
Based Machine Learning ......................................................................................................................... 2002
Clustering Algorithm
Lianjing Wang, Jie Tan, Chuntao Man, Xiwei Bai, Xuelei Wang, Chengbao Liu
Multi-swarm Particle Swarm Optimization Algorithm Based on Clustering Dynamic Grouping................ 2012
Yong Shen, Yan Li, Hongwei Kang, Yuhao Zhang, Xingping Sun, Qingyi Chen, Jian Peng, Haoyu Wang
An Improved Algorithm for Multi-Swarm Particle Swarm Optimization Based on Clustering Algorithm ... 2017
Xingping Sun, Ping Hu, Yan Li, Hongwei Kang and Qingyi Chen, Qingyi Chen, Yong Shen
Perceptual Hash Algorithm Based on Scale-Invariant Feature Transform and Cluster Analysis ............. 2022
Wenbo Zheng, Shaocong Mo, Xin Jin, Yili Qu, Zeyu Fan, Rui Zou, Fei Deng, Yuntao Yang, Tianyu Liu,
Chengfeng Zheng, Sijie Long, Canliu Wu, Zefeng Xie and Jia Shuai
Research on Improved LEACH Clustering Protocol in Energy Inhomogeneity between Clusters in Network
................................................................................................................................................................ 2027
Research and Application of Tobacco Slice Feeding Based on Semi-supervised Learning .................... 2032
Wang Xuejun, Wang Guangchao, Li Lin, Zheng Heng, Zhao Meng, He Wei
Xing Yafei, Dieter Mitsche, Konstantin Avratchenkov, Dominique Torre, Michela Chessa, Arnaud
Persenda
Research on Random Source Points Aggregation Method of Urban Logistics Based on Hierarchical
Clustering ................................................................................................................................................ 2040
xxxi
A Short Text Spectrum Clustering Method Based on Frequent Itemsets ................................................. 2057
Nan Luo, Ping Zhang, Qingbao Li, Zhifeng Chen, Peijun Feng, Tianxiao Xue
Multi-dimensional Speaker Information Recognition with Multi-task Neural Network .............................. 2064
Recognition of Access Control Role Based on Convolutional Neural Network ........................................ 2069
The Method for Single Well Operational Cost Prediction Combining RBF Neural Network and Improved PSO
Algorithm ................................................................................................................................................. 2081
Modeling of Synchronous Behaviors of Excitatory and Inhibitory Neurons in Complex Neuronal Networks
................................................................................................................................................................ 2086
Convolutional Neural Network-based Simple Online Multiple Object Tracking ........................................ 2091
Distant Supervision for Relation Extraction via Retrieval-based Neural Networks .................................. 2100
Fan Yang
Analysis for Influence of Training Data Sequence on CNN-Based Steganalysis ...................................... 2110
A RBF-DBN Composite Neural Network Model for the Datasets with Few Input Dimensions .................. 2115
Jianjun Jiang, Jing Zhang, Yifan Wu, Xiaomin Ran, Jun Jiang
Yue Luo, Yang Li, Yao Lu, Shuisheng Lin, Xinchun Liu
xxxii
Discharge Voltage Time Series Classification of Lithium-ion Cells Based on Deep Neural Networks ..... 2128
Chengbao Liu, Xuelei Wang, Jie Tan, Lianjing Wang, Wei Sun, Wenxiang He
Incorporating Forward and Backward Instances in a Bi-LSTM-CNN Model for Relation Classification ... 2133
Research on Chinese Named Entity Recognition Based on Neural Network .......................................... 2142
End-to-End Chinese Dialect Identification Using Deep Feature Model of Recurrent Neural Network ..... 2148
Zhaodi Qi, Yong Ma, Mingliang Gu, Yun Jin, Shidang Li, Qiuxian Zhang, Yingli Shen
A Research on Deep Neural Network Based Airline Market Share Prediction Model in Aviation Market
Network Evaluation ................................................................................................................................. 2158
Fan Yang
How Do HPC Programmers Mix MPC and SMC in Distributed Computing Environment? .................... 2170
Design and Implementation of Business Processes Efficiency Analysis System .................................... 2175
STACKEEPER: A Static Source Code Analyzer to Detect Stack-based Uninitialized Use Vulnerabilities 2180
An Adaptive Malicious Punishment over Secure Distributed Estimation under Attacks ........................... 2195
xxxiii
Algorithm Design and High Performance Computing
Xin Meng, Shan Wang, Ping Nie, Zun Niu, Bocheng Zhu
Gas Emission Prediction in Coal Mining Faces Based on GA-SM-SVR .................................................. 2212
Use FCN to Accurately Judge the Frontal Face or Side Face ................................................................. 2218
Correction for Energy Level Transition under the Constraint of Elite Rate in Multiscale Quantum Harmonic
Oscillator Algorithm ................................................................................................................................. 2223
Optimization Strategy of SDN Control Deployment Based on Simulated Annealing-Genetic Hybrid Algorithm
................................................................................................................................................................ 2238
Research on Swarm Size of Multi-swarm Particle Swarm Optimization Algorithm .................................. 2243
Yong Shen, Yan Li, Hongwei Kang, Yuhao Zhang, Xingping Sun, Qingyi Chen, Jian Peng, Haoyu Wang
Collaborative Filtering Service Recommendation Algorithm Based on Trusted User and Recommendation
Evaluation................................................................................................................................................ 2248
Dong Liu
On Six Directions Chain Code and Its Application of Bead Weaving ....................................................... 2262
xxxiv
Supporting Movie Production: A Recommender Approach ...................................................................... 2273
Qiong Jia, Jing Zhou, Yajie Gu, Shouxun Liu, and Jiguang Wu
Improved Dynamic Programming for the Shortest Path Problem with Resource Constraints in DAG ..... 2278
Research on Highlight Snippets Identification Technology Based on Sentiment Analysis of Bullet Curtain
................................................................................................................................................................ 2289
Lyric Emotion Estimation Using Word Embedding Learned from Lyric Corpus ....................................... 2295
Cross-domain Sentiment Classification Based on Transfer Learning and Adversarial Network .............. 2302
Xiuyu Duan, Yanquan Zhouy, Chunzhen Jingz, Liujie Zhang, Ruiqi Chen
User and Product Attention Model Based on Recommendation Algorithm for Sentiment Classification.. 2307
Yingli Shen, Yong Ma, Mingliang Gu, Shidang Li, Yun Jin, Chaojin Zhang, Yabo Shen, Zhaodi Qi
Mobile Phone Spam Text Classification Based on Prior Knowledge ....................................................... 2327
Research on Stylistic Features in Translation Based on Supervised Learning Algorithms ...................... 2332
Qing Liu, Jing Wang, Dehai Zhang, Yun Yang, NaiYao Wang
Word-Level and Character-Level Mixed Features for Chinese Short Text Classification ......................... 2344
................................................................................................................................................................ 2349
Xiaoqiang Xia, Dehai Zhang, Qing Liu, Yanpeng Wang, Menglong Cui
Yunyan Zhou, Haili Li, Yinglong Liu, Futong Qin, Xuejun Yuan, Bo Li
A Signature Scheme Applying on Blockchain Voting Scene Based on the Asmuth-Bloom Algorithm ...... 2372
Lipeng Wang, Mingsheng Hu, Zhijuan Jia, Bei Gong, Yanfang Lei
A Method to Improve the Teaching Effect of Mobile Communication Course by Establishing Propagation
Loss Model .............................................................................................................................................. 2392
Feature Analysis and Optimisation for Computational Personality Recognition ...................................... 2410
A Novel Comprehensive Quality Index QoX and the Corresponding Context-aware System Framework
................................................................................................................................................................ 2415
Hongji Xu, Min Chen, Yingming Zhou, Baozhen Du, Lingling Pan
Lulu Shao, Jihong Han, Xiaohu Liu, Lin Yuan, Xirui Zhang
A Full Life Cycle Monitoring Information System for Cigarette Equipments ............................................. 2425
xxxvi
Research on Entity Relationship Extraction in Financial and Economic Field Based on Deep Learning . 2430
Estimating Target Situation Based on 77GHz Radar Sensor for ACC System ........................................ 2436
Research on Agricultural Environment Information Collection System Based on LoRa .......................... 2441
Zheng Wang, Zhen Jiang, Jing Hu, Tiecheng Song, Zhongqiang Cao
Secure Medical Data Collection via Local Differential Privacy ................................................................. 2446
Zhiqiang Wang, Pingchuan Ma, Ruming Wang, Jianyi Zhang, Yaping Chi, Yanzhe Ma, Tao Yang
Protecting Hidden Location Visit Privacy with High Trajectory Data Utility .............................................. 2451
Xiangyu Liu, Zhufeng Liu, Xiufeng Xia, Jiajia Li, Chuanyu Zong, Rui Zhu
Research on the Determination of Privacy Concerns Degree of Micro-blog Users ................................. 2457
Security-Reliability Tradeoff Analysis for Artificial Noise Aided MISO Transmission System ................... 2465
Sheng Huang, Yuanyuan Gao, Shijie Wang, Xiaochen Liu, Lei Peng, Xiaoyu Wang
Multi-modal Adaptive Steganography Algorithm with Variable Parity Check Matrix ................................. 2472
Distance-Based Outlier Mining for Time Series of Police Calls for Service ............................................. 2484
Functional Safety Assessment and Security Protection Framework of Cyber Physical Machine Tool System
................................................................................................................................................................ 2489
Joint Encoding/Decoding Algorithm Design Based on Hidden Information for Short-Length LT Codes... 2495
xxxvii
Design and Implementation of Production Planning Management System Based on SSH ..................... 2505
Xiang Da-fang
A Column Generation Based Algorithm for Airline Cabin Crew Rostering Problem .................................. 2511
A Low Power Consumption Period Task Scheduling Algorithm in Real-Time System ............................. 2516
The Vector Scheduling Game on Two Hierarchical Identical Machines ................................................... 2520
Li Guan, Jianping Li
Usability Evaluation of Mobile Applications: An Empirical Analysis of Supply Chain Management Systems
................................................................................................................................................................ 2525
Md Alamgir Kabir, Md Altab Hossin, S M Hasan Mahmud, Sheak Rashed Haider Noori, Touhid Bhuiyan
Dynamic Partitioning and Task Scheduling for Complex Workflow Healthcare Application in Mobile Edge
Cloud Architecture ................................................................................................................................... 2532
Abdullah, Xiaoping Li
A PSO-Based Energy-Efficient Fault-Tolerant Static Scheduling Algorithm for Real-Time Tasks in Clouds
................................................................................................................................................................ 2537
Interleaver-Aided Successive Cancellation Flip Decoding Algorithm for Polar Codes ............................. 2559
A DHR-Based Security-Critical Task Scheduling Algorithm for Heterogeneous Processing System ....... 2564
xxxviii
Energy-Efficient Phase-Aware Load Balancing on Asymmetric Multicore Processors ............................ 2575
A Model-driven Approach for Formal Verification of Embedded Systems Using Timed Colored Petri Nets
................................................................................................................................................................ 2580
A Divide and Conquer Approach to All Solutions Satisfiability Problem ................................................... 2590
Real-Time Simulation of Brush Behaviors in Chinese Calligraphy with the Sense of Immersion ............ 2596
Research on Chinese Spam Comments Detection Based on Chinese Characteristics .......................... 2608
Efficient Frequency-Domain Equalization Scheme for High-Order Faster-Than-Nyquist System ........... 2613
Challenges and Statues of Rectifier for Far Field Wireless Energy Harvester in Power Variation of Input
RF/microwave Signal .............................................................................................................................. 2625
Soft Computing Detection Method for Remaining Capacity of Lead-Acid Battery ................................... 2631
Yingying Su, Hao Zhou, Nengyang Zhou, Cuiying Li, Xiaofeng Wang, Debiao Wang
Lianjing Wang, Jie Tan, Chuntao Man, Xiwei Bai, Xuelei Wang, Chengbao Liu
Hybrid Kernel LSSVM Model for Prediction of Short-Term Wind Speed .................................................. 2641
Yuan Zhou, Wenping Xiao, Mingshan Liu, Yuanyuan Zhang, Helin Li, Qingyi Liu, Ying Wang
xxxix
Research on Centralized Control Architecture Deployment of Power Optical Network Based on Network
Perception ............................................................................................................................................... 2645
Research on Business Recognition Perception for Active Early Warning of Power Optical Network ...... 2652
Network Recovery for Large-scale Failures in Smart Grid by Reinforcement Learning ........................... 2658
Bad Data Identification in Power System Based on Improved GSA Algorithm ........................................ 2664
Structural Design of Operational Analysis and State Modeling for Power Secondary System ................ 2671
Lingyun Wu, Chengjiang Liu, Peng Yang, Yan Wang, Yuan Zhou
Design of Stand-Alone Photovoltaic System Based on Maximum Power Point Tracking ........................ 2681
Tao Wang
Fault Detecting and Excluding upon S-RANCO and Lagrange Interpolation ........................................... 2686
Zun Niu, Shan Wang, Bocheng Zhu, Xiaoying Gu, Junren Sun, Xin Meng
EHTC: An Enhanced Huffman Tree Coding Algorithm and its FPGA Implementation ............................. 2692
A Discretization Method for Floating-Point Number in FPGA-based Decision Tree Accelerator .............. 2698
Research and FPGA Implementation of Security Control System Based on High Alphabet Modulation
................................................................................................................................................................ 2710
Event-Triggered Feedback Control for Piecewise-Affine Systems via Convex Combination ................... 2715
xl
Design and Realization of Covers Monitoring and Controlling System .................................................... 2721
Research of Feed Forward Control of a Sewage Treatment Process Fuzzy Control System.................. 2726
An Improved On-line Strategy for Exploring a Simple Grid Polygon ........................................................ 2736
Author Index
xli