


default search action
CECCT 2023: Guilin, China
- Proceedings of the International Conference on Electronics, Computers and Communication Technology, CECCT 2023, Guilin, China, November 17-19, 2023. ACM 2023
- Qi Li
, Wei Xu
, Siyue Chen
, Ziwen Pang
:
Porting and Enhancing the XV6 Kernel for LoongArch ArchitectureElevating Functionality: A Unified Approach to Kernel Porting and Enhancement. 1-5 - Chenggong Zhai
, Xinguang Yuan
, Liyong Zhou
, Yang Huang
, Chaoshan Yang
, Peng Zhou
:
Research on Network Security in Material Support. 6-10 - Chenggong Zhai
, Xinguang Yuan
, Yang Huang
, Liyong Zhou
, Heng Zhang
, Han Qiu
:
Research on Smart Education Platform Based on Big Data Technology. 11-15 - Xiao Lin
, Lin Ma
, Shijie Chen
, Zhanpeng Liang
:
Human behavior recognition algorithm based on improved ST-GCN. 16-21 - Shaojing Song
, Ju Wang
, Siyue Zhu
, Bohao Li
, Yanhua Ma
, Ying Guo
:
Research on Signal Processing of Coherent LiDAR Wind Measurement System. 22-28 - Shuai Ma
, Xiaoguang Wang
, Yushu Huang
, Mingqing Zhang
:
Error Management system with RAS characteristics of the ARMarchitecture. 29-33 - Yuqi Li
, Liquan Xiao
, Jinghua Feng
, Jian Zhang
, Qingzhen Ma
, Yuan Yuan
:
AutoLAD: An Unsupervised Anomaly Detection Method for Supercomputer Logs. 34-37 - Liang Wang
, Wei Guo
, Chengwei Zhang
, Xin Huang
, Xiaomin Chen
:
Design of selective calibration system for protective appliances based on digital modeling technology. 38-43 - Dongping Tian
, Chen Liu
, Zulpiya Gheni
, Bingchun Li
:
Adaptive Particle Swarm Optimization based on Competitive and Balanced Learning Strategy. 44-53 - Xuejiao He
:
Research on Strategies for Enhancing Immersive Synesthetic Experience in 4D New Media Interactive Animation from the Perspective of Embodied Cognition. 54-59 - Wenjuan Bai
, Fengjun Li
, Cheng Lin
, Hu Lin
, Jian Wang
, Qingyu Kong
, Tong Chen
, Xue Wang
, Bo Yu
:
Research on a high-performance domestic intelligent cockpit interaction platform. 60-65 - Xuyang Du
, Beifei Sheng
, Ran Bi
, Ziliang Zhang
, Fengping He
, Rui Hou
, Dongyang Luo
:
A spacecraft harness design system based on closed loop control. 66-70 - Yue Wang
, Hongjuan Wang
, Fang Zhang
, Xuxin Li
:
FDA-CDM : Data Augmentation Framework for Personalized Federated Learning in Non-IID Scenarios. 71-76 - Xuxin Li
, Ge Wang
, Yue Wang
, Qirui Zhou
:
Mixed Knowledge-enhance Empathetic Dialogue Generation. 77-81 - Peng Zeng
, Xianli Meng
, Baojun Dong
, Lin Xu
, Shiqi Jiang
, Tao Jiang, Zihan Zeng
:
Automatic Flange Alignment System Using Multiple Visions. 82-86 - Jianan Wu
, Saikui Zhu
, Zhixin Ma
, Hexiao Wang
, Mingcong Wang
:
Computational Ghost Imaging System Based on Cloud Services. 87-91 - Kehao Li
, Hongbo Gao
, Bo Tang
, Ke Yang
:
Self-clearing Strategy of Container Image in High Performance Job Scheduling. 92-97 - Zixiang Wang
, Jian Yang
, Tongliang Li
, Linzheng Chai
, Jiaheng Liu
, Ying Mo
, Jiaqi Bai
, Zhoujun Li
:
Multilingual Entity and Relation Extraction from Unified to Language-specific Training. 98-105 - Anwei Dong
, Xingwei Wang
, Bo Yi
, Qiang He
:
A Blockchain-based Resource Access Control and Sharing Mechanism in NFV. 106-111 - Bihao You
, Jiahao Qin
, Yitao Xu
, Yize Liu
, Yunfeng Wu
, Sijia Pan
:
Multi-Modal Lightweight Deep Learning Model for Typhoon Prediction. 112-118 - Marjan Kamyab
, Guohua Liu
, Mohammad Hadi Mohammadi
, Jawad Tawhidi
:
Enhancing Sentiment Knowledge in Persian/Dari Language through Bidirectional GRU-CNN Model. 119-125 - Wei Liu
, Rui Xi
, Mengshu Hou
:
Tree-Convolutional-Transformer: A Hybrid Model for Query Plan Representation. 126-133 - Xueliang Tang
, Xu Yang
:
Design and Implementation of Deep Spiking Neural Network Learning Algorithm Based on Feedback Mechanism. 134-138 - Yu Zhang
, Jia Wang
, Xingyu Yu
:
Public Opinion Evolution Analysis of International Mainstream Media based onAdversarial Learning. 139-143 - Zhiwen Xiong
, Ziling Feng
, Zongping Zhong
:
Research based on big data technology to stimulate classroom vitality andcultivate double-high talents. 144-148 - Bo Du
, Jin Zhang
, Weijia Cui
, Bin Ba
, Yuxi Du
, Wei Lin
:
Sparsity-based localization for Mixed Near-Field and Far-Field Sources with unknown Mutual Coupling. 149-158 - Yiran Xiang
, Songting Li
, Lihu Chen
:
Satellite-based DBF ADS-B Payload with Amplitude-phase Mismatch Calibration. 159-163 - Yixiang Zhao
, Wang Jun
, Jiwei Zhang
, Mengzhou Chen
, Siyu Peng
:
A Digital AGC Design for Audio Chip. 164-168 - Yuman Wang
, Lei Fang
, Bo Hu
, Guangkai Ge
, Xiaoming Zhou
, Wenjie Zhang
:
Overview of Research on Cloud-Edge-End Collaboration Technology of Industrial Control System. 169-174 - Jingyi Yang, Yibei Li, Yiwei Lai, Mingzhe Liu
:
Non-Fungible Tokens(NFTs): tokens of digital assets on the blockchain. 175-182 - Qi Song
, Jia Liu
, Caipu Zhang
, Zhen Wang
, Pengcheng Ma
:
Research on High Performance IPSec VPN Technology Based on National Cryptographic Algorithms. 183-187 - Bo Liu
, Bo Yang
, Runyuan Sun
, Zhifeng Liang
, Zhenxiang Sun
, Zhenyu Li
:
Intelligent SDN Routing: A Threshold-Based and LSTM-Enhanced Deep Q-Network Routing Algorithm. 188-195 - Hanjun Gao
, Wei Feng
, Hang Tong
:
Research on Real-time Detection Method of Distributed Setpoint Anomaly in Nuclear Power Industrial Control System Based on Stream Computing. 196-202 - Xiaosong Liu
, Chungen Xu
, Pan Zhang
:
Byzantine-Robust Federated Learning Based on Multi-center Secure Clustering. 203-207 - Hanlin Wang
, Hua Yin
, Qiuran Ren
, Jiajia Zhang
, Kuntian Tang
:
A Dynamic Printing Equipment Production Status Anomaly Detection Model. 208-214 - Ke Zhang
, Xiong Xiao
, Zhenwen Peng
, Minjie Cai
:
MCA: Model Compromise Attacks against Federated Computing Power Networks. 215-220 - Shuai Ren
, Danyang Li
, Liwen Zhang
:
Information Hiding Algorithm Based on Three-dimensional Model Fusion Spherical Analysis. 221-228 - Shuai Ren
, Li Ren
, Liwen Zhang
:
An Information Hiding Algorithm of 3D Model Based on Curvature Radius. 229-235 - Yihe Liu
, Junjie Wang
, Shuang Liu
, Mingyuan Sun
, Kai Tang
, Guohui Ren
, Xindi Zhao
, Mingliang Sun
, Yang Liu
:
A Programmable Logic-in-Memory Architecture Based on 22nm Fully DepletedSilicon on Insulator Technology. 236-240 - Hongzhe Wang
, Kunsong Liu
, Yi'an Liu
, Junjie Wang
, Mingyuan Sun
, Kai Tang
, Guohui Ren
, Xindi Zhao
, Yang Liu
:
FPGA-implemented Memristor-based Transient Chaotic Neural Network for AES Edge Encryption. 241-244 - Wanying Lu
, Wenbin Zhai
, Feng Wang
, Yu Fan
:
A Framework for Moving Target Defense based on Federated Semi-Supervised Learning. 245-250 - Qiuyun Cheng
, Xianwei Zhu
, Zeyu Gu
:
Improved Recommendation Algorithm Based On Knowledge Graph. 251-257

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.