Skip to main content

previous disabled Page of 3
and
  1. No Access

    Article

    Remote Pulmonary Nodule Detection Based on 6G Network Information System and 3D Visual Transformation

    Slight growth in the lung that can be either round or oval is called a pulmonary nodule. Imaging examinations, such as CT scans or chest X-rays, performed for other reasons often discover these nodules as an i...

    Huanrong Qu, Zheng Yang, Liang Liu, QingBin Wu in Wireless Personal Communications (2024)

  2. No Access

    Article

    Prediction and evaluation of wireless network data transmission security risk based on machine learning

    The security of wireless network transmission data is an important technical index to ensure the reliable transmission of information in local areas, in this paper, there are a lot of personal privacy in wirel...

    Bo Huang, Huidong Yao, Qing Bin Wu in Wireless Networks (2024)

  3. No Access

    Chapter and Conference Paper

    Fast Autonomous Exploration with Sparse Topological Graphs in Large-Scale Environments

    Exploring large-scale environments autonomously poses a significant challenge. As the size of environments increases, the computational cost becomes a hindrance to real-time operation. Additionally, while fron...

    Jianbin Wu, Shuang Jiang, Changyun Wei in Proceedings of 3rd 2023 International Conf… (2024)

  4. No Access

    Chapter and Conference Paper

    A Multi-band Frequency Conversion Scheme Based on Single Optical Frequency Comb for High-Throughput Satellite Applications

    A flexible and efficient multi-band frequency conversion scheme is proposed and demonstrated based on single optical frequency comb. The simulation results indicate that the scheme can realize up and down cros...

    Bin Wu, Chaoyue Zheng, Qingchun Zhao in Communications, Signal Processing, and Systems (2023)

  5. No Access

    Chapter and Conference Paper

    Cost-Benefit Analysis of VPP Considering Environmental Value Under EV Access

    VPPs can effectively promote new energy consumption and reduce environmental pollution by gathering a large number of distributed energy sources and other load-side resources such as demand response. EVs have ...

    Yingying Hu, Di Wu, Jianbin Wu, Wei Song, Peng Wang in Frontier Computing (2022)

  6. No Access

    Chapter and Conference Paper

    Artificial Intelligence VR Technology Cultivates College Students’ Entrepreneurship Ability

    Although the country vigorously promotes and encourages contemporary college students (CS) to actively innovate and start businesses, there are still many problems in the process of CS’ innovation and entrepre...

    Wenbin Wu, Bixi Wang, Isabella Sabet in Signal and Information Processing, Network… (2022)

  7. No Access

    Chapter and Conference Paper

    The On-line Filtering Technology of INS/CNS Composite Navigation

    The INS/CNS (Inertial Navigation System/Celestial Navigation System) composite navigation system error models and different error filtering estimation methods are studied in the paper. To avoid the difficult p...

    Zhenxi Guo, Jia **e, Zhigang Chen, Bin Wu in Advances in Guidance, Navigation and Contr… (2022)

  8. No Access

    Chapter and Conference Paper

    Compensation Method of Dynamic Angle Measurement for Missile-Borne Star Sensor

    An information combination of star sensor-based angle measurement and inertial devices is used to improve the accuracy of the autonomous navigation system. The missile-borne environment has high dynamic moveme...

    Bin Wu, Zhen** Guo, Denggao Ji, Fang Chen in Advances in Guidance, Navigation and Contr… (2022)

  9. Chapter and Conference Paper

    Orchard Energy Management to Improve Fruit Quality Based on the Internet of Things

    The crop growth is an energy conversion process, and energy management has an important impact on the quality and yield of crop products. As IoT (the Internet of Things) is widely used in agriculture, for exam...

    **chuan Zhang, Sijie Wang, in Proceeding of 2021 International Conferenc… (2022)

  10. No Access

    Chapter and Conference Paper

    Online Compensation Method of Gravity Anomaly for Near-Space Long Time Navigation

    The gravitational anomaly has a strong influence on navigation errors especially for entire near-space cruise. In this study, an online compensation method of gravity anomaly has been developed from gravitatio...

    Denggao Ji, Fang Chen, Bin Wu, Jianfei Zhang in Advances in Guidance, Navigation and Contr… (2022)

  11. No Access

    Chapter and Conference Paper

    Spatial-Temporal Adaptive Graph Convolution with Attention Network for Traffic Forecasting

    Traffic forecasting is one canonical example of spatial-temporal learning task in Intelligent Traffic System. Existing approaches capture spatial dependency with a pre-determined matrix in graph convolution ne...

    Weikang Chen, Yawen Li, Zhe Xue, Ang Li, Guobin Wu in Intelligent Networked Things (2022)

  12. No Access

    Chapter and Conference Paper

    Power Communication Multi-service Carrying Method Based on Wi-Fi6 Resource Scheduling

    With the development of power grid technology and scale, the demand of power multi service transmission is gradually increasing. The emergence of Wi-Fi6 solves the shortcomings of high cost and low speed of tr...

    Cheng Zhong, Yuebin Wu, Juntao Zheng in Proceedings of the 11th International Conf… (2022)

  13. No Access

    Article

    Stochastic Value Formation

    We propose a simple model of value formation in two societies (communities). When forming values, individuals face conformity pressure within their own society and they are intolerant toward the other society....

    Jiabin Wu in Dynamic Games and Applications (2021)

  14. No Access

    Article

    A certificateless linearly homomorphic signature scheme for network coding and its application in the IoT

    Network coding is an effective method to optimize network throughput and improve routing reliability, and has been widely used in a decentralized Internet of Things system. However, the packet-mixing property ...

    Bin Wu, Caifen Wang, Hailong Yao in Peer-to-Peer Networking and Applications (2021)

  15. No Access

    Chapter and Conference Paper

    Performance Analysis of Multi-user Chaos Measurement and Control System

    In order to solve the problem of multiple access interference in spread spectrum measurement and control, the advantages of chaotic sequence as spread spectrum sequence are discussed, and the performance of ch...

    Lili **ao, Guixin Xuan, Yongbin Wu in Proceedings of the 9th International Confe… (2021)

  16. No Access

    Chapter and Conference Paper

    Adaptive Fading Factor Unscented Kalman Filter with Application to Target Tracking

    One purpose of target tracking is to estimate the states of targets, and Unscented Kalman filter(UKF) is one of the effective algorithms for estimating in the nonlinear tracking problem. Considering the charac...

    Peng Gu, Zhongliang **g, Liangbin Wu in Proceedings of the International Conferenc… (2021)

  17. No Access

    Chapter and Conference Paper

    Numerical Implementation of a Wideband Chaotic Light Based Ring-and-Spur Long-Reach Passive Optical Network: Architectures and Real-Time Secure Communications

    In this paper, a wideband chaotic light based ring-and-spur long-reach passive optical network (ring-and-spur LR-PON) is proposed and numerically demonstrated. The bidirectional long-haul secure communication ...

    **nyu Dou, Hongxi Yin, Bin Wu in Communications, Signal Processing, and Systems (2020)

  18. No Access

    Article

    Vector quantization: a review

    Vector quantization (VQ) is a very effective way to save bandwidth and storage for speech coding and image coding. Traditional vector quantization methods can be divided into mainly seven types, tree-structure...

    Ze-bin Wu, Jun-qing Yu in Frontiers of Information Technology & Electronic Engineering (2019)

  19. No Access

    Article

    Mining Association Rules Based on Deep Pruning Strategies

    Today mobile network and various smart devices flourish rapidly. Data collected from the mobile devices and network can bring us huge opportunities to understand some significant characteristics of the users w...

    Lei Li, Qi Li, Yabin Wu, Yihang Ou, Daoxin Chen in Wireless Personal Communications (2018)

  20. No Access

    Chapter and Conference Paper

    A Routing Based on Geographical Location Information for Wireless Ad Hoc Networks

    This paper Propose the location-based routing algorithm forwarding with alternative copies. This routing algorithm considers both the location information and the velocity vector to establish the utility func...

    Yongqiang Li, Zhong Wang, Qinggang Fan in Advances in Internetworking, Data & Web Te… (2018)

previous disabled Page of 3