Skip to main content

previous disabled Page of 8
and
  1. No Access

    Article

    The Robust Communication Method Against Dependent Jamming Based on Convex Hull in Communication Countermeasures

    This paper proposes a robust communication method against dependent jamming based on convex hull to counteract the jamming signal that is dependent with the source signals. The proposed method develops the obj...

    Qiao Su, **ongwei Zhang, Nan Sha, Kui Xu, Mingxi Guo in Wireless Personal Communications (2024)

  2. No Access

    Article

    Multiscale image denoising algorithm based on UNet3+

    To fully exploit the multiscale information for image denoising, we introduce the idea of full-scale skip connections in the image segmentation network UNet3+. However, existing UNet3+ networks aggregate multi...

    Kui Liu, Yu Liu, Benyue Su, Hui** Tang in Multimedia Systems (2024)

  3. Article

    Open Access

    A microservice regression testing selection approach based on belief propagation

    Regression testing is required to assure the quality of each iteration of microservice systems. Test case selection is one of main techniques to optimize regression testing. Existing techniques mainly involve ...

    Li-zhe Chen, Ji Wu, Hai-yan Yang, Kui Zhang in Journal of Cloud Computing (2023)

  4. No Access

    Chapter and Conference Paper

    Global Path Planning for Unmanned Ships Based on Improved Particle Swarm Algorithm

    In this paper, the global path planning research is carried out using particle swarm algorithm in combination with the characteristics of unmanned boat navigation environment. To address the problem that the p...

    Chang Liu, Kui Liu in Bio-Inspired Computing: Theories and Applications (2023)

  5. No Access

    Chapter and Conference Paper

    An Autoencoder-Based Feature Extraction Method Applied to the Detection of Lateral Walking Gait Phase

    The traditional method of extracting time-domain features is subjective and cumbersome. An autoencoder-based feature extraction method is proposed to overcome these shortcomings. Experiments were conducted to ...

    Lijun Yang, Kui **ang, Muye Pang, Mingxiang Luo in Intelligent Robotics and Applications (2023)

  6. No Access

    Chapter and Conference Paper

    Simulation Analysis of Synchronous Walking Control for Centaur System

    Carrying heavy loads while walking is a physically demanding activity that often results in fatigue and even injury. Therefore, to alleviate this extra burden, wearable exoskeleton robots have been widely rese...

    Qigao Cheng, Haoyun Yan, Kui **ang, **g Luo in Intelligent Robotics and Applications (2023)

  7. No Access

    Chapter and Conference Paper

    Multi-sensor Tightly Coupled SLAM Algorithm Based on Feature Planes in Indoor Scenes

    A tightly coupled multi-sensor SLAM algorithm based on feature planes in indoor scenes is proposed for laser SLAM algorithms in indoor environments affected by glass and mirrors and with few feature points. Fi...

    Wenxue Hu, Zehua Wang, Kui Yang, Jiahui Zhu in Intelligent Robotics and Applications (2023)

  8. No Access

    Chapter and Conference Paper

    Endemic Oblivious Transfer via Random Oracles, Revisited

    The notion of Endemic Oblivious Transfer (EOT) was introduced by Masny and Rindal (CCS’19). EOT offers a weaker security guarantee than the conventional random OT; namely, the malicious parties can fix their o...

    Zhelei Zhou, Bingsheng Zhang, Hong-Sheng Zhou in Advances in Cryptology – EUROCRYPT 2023 (2023)

  9. No Access

    Chapter and Conference Paper

    Education Quality Evaluation Method Based on CIPP Theory

    Quality evaluation is not only a necessary guarantee for the effectiveness of higher education, but also an important task for the further promotion of higher education. At present, there are some problems in ...

    Huang Kui in Frontier Computing (2023)

  10. No Access

    Article

    Weighted hybrid order total variation model using structure tensor for image denoising

    A total variation filter has the characteristic of edge protection and has been widely used in image denoising for many years. In this study, our aim was to eliminate the staircase effect generated by the tota...

    Kui Liu, Wanru Xu, Haifeng Wu, Ali Abdullah Yahya in Multimedia Tools and Applications (2023)

  11. No Access

    Chapter and Conference Paper

    Reliability Improvement Algorithm of Service Function Chain Based on Resource Bearing Characteristics

    In the network virtualization environment, the reliability of the service function chain is low. To solve this problem, this paper proposes a service function chain reliability improvement algorithm based on r...

    Qi Wang, Weijian Zhang, Li Di, **g Shen in Proceedings of the 12th International Conf… (2022)

  12. No Access

    Chapter and Conference Paper

    A LEO Satellite Network QoS Routing Scheme Based on Reinforcement-Learning

    Low earth orbit (LEO) satellite communication networks will provide a huge coverage network to carry the global communication traffic. However, the huge architecture brings a great challenge to the QoS routing...

    Kui He, **g Shen, Yi Yang, Yu**g Zhao in Proceedings of the 12th International Conf… (2022)

  13. No Access

    Chapter and Conference Paper

    Application of Partial Least Squares Method Based on Big Data Analysis Technology in Sensor Error Compensation

    In practice, uncertainties such as humidity and temperature cause unavoidable random errors in the sensor data. In order to reduce the error, a quick and easy way to deal with it is to use the least squares me...

    **aoli Wang, Fang Wang, Kui Su in Frontier Computing (2022)

  14. No Access

    Chapter and Conference Paper

    A Hip Active Lower Limb Support Exoskeleton for Load Bearing Sit-To-Stand Transfer

    Sit-to-stand (STS) transfer is a basic and important motion function in daily living. Most currently-existing studies focus on movement assistance for patients who lost mobility or have impaired their muscle s...

    **long Zhou, Qiuyan Zeng, Biwei Tang, **g Luo in Intelligent Robotics and Applications (2022)

  15. No Access

    Chapter and Conference Paper

    GUC-Secure Commitments via Random Oracles: New Impossibility and Feasibility

    In the UC framework, protocols must be subroutine respecting; therefore, shared trusted setup might cause security issues. To address this drawback, Generalized UC (GUC) framework is introduced by Canetti et al. ...

    Zhelei Zhou, Bingsheng Zhang, Hong-Sheng Zhou in Advances in Cryptology – ASIACRYPT 2022 (2022)

  16. No Access

    Chapter and Conference Paper

    X-band Radar Detection Target Tracking Method Based on Internet of Things Sensing Technology

    If echo data of civil aviation wake scattering can be obtained by Aircraft wake X-band radar detection, which can provide reference data for the stable operation of aircraft. However, the existing target track...

    Fengshuo Yan, Kui **ong, Mingyang Gao in IoT and Big Data Technologies for Health C… (2022)

  17. No Access

    Article

    Design and simulation of an electro-optic even parity bit error detection system

    In the present day, optical communication technology is proving to be one of the potential replacements to the current electronic-based systems due to its much higher data transmission rate with low loss and e...

    Mohammad Rakib Uddin, Foo Kui Law, Ahmaed Hasnain Jalal in Optical and Quantum Electronics (2021)

  18. No Access

    Article

    Blockchain-based trust establishment mechanism in the internet of multimedia things

    Through the application of powerful semiconductors and high-speed communication technologies such as 5G, large-scale or even ultra-large-scale Internet of Multimedia Things (IoMT) will soon appear. Secure comm...

    Yongjun Ren, Fujian Zhu, Kui Zhu, Pradip Kumar Sharma in Multimedia Tools and Applications (2021)

  19. No Access

    Article

    Improving the classification of call center service dialogue with key utterences

    In the field of customer service management, classifying service dialogues to different business labels is beneficial for managers to improve their service quality. However, the size of labeled service dialogu...

    Yuqi Liu, Bin Cao, Kui Ma, **g Fan in Wireless Networks (2021)

  20. No Access

    Article

    Performance analysis of bit error rate of data link system under pulse LFM interference in time-varying rayleigh channel

    In such mobile platforms as ships and aircraft, the detection and reconnaissance devices are near to the communication facilities. When working at the same time, they will create interference or jamming themse...

    Kui Zhao, Fangmin He, ** Meng, Hao Wu, Lei Zhang in Wireless Networks (2021)

previous disabled Page of 8