Study on Practical IoT Applications in Civil Aviation Industry (English)
- New search for: He, Yuanqing
- New search for: He, Yuanqing
In:
Artificial intelligence and security ; Part 2
; 160-169
;
2020
-
ISBN:
- Conference paper / Print
-
Title:Study on Practical IoT Applications in Civil Aviation Industry
-
Contributors:He, Yuanqing ( author )
-
Conference:ICAIS ; 6. ; 2020 ; Hohhot; Online
-
Published in:
-
Publisher:
- New search for: Springer
-
Place of publication:Cham, Switzerland
-
Publication date:2020
-
ISBN:
-
Type of media:Conference paper
-
Type of material:Print
-
Language:English
- New search for: 54.72
- Further information on Basic classification
-
Keywords:
-
Classification:
BKL: 54.72 Künstliche Intelligenz -
Source:
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 3
-
Kernel Fuzzy C Means Clustering with New Spatial ConstraintsWang, Limei / Niu, Sijie / Geng, Leilei et al. | 2020
- 15
-
GSSM: An Integration Model of Heterogeneous Factors for Point-of-Interest RecommendationYang, Qing / Chen, Yiheng / Luo, Peicheng / Zhang, Jingwei et al. | 2020
- 27
-
Contrast Adjustment Forensics Based on Second-Order Statistical and Deep Learning FeaturesWang, Xinyi / Niu, Shaozhang / Wang, He et al. | 2020
- 38
-
Hybrid Low Rank Model Based Deep Neural Network Compression with Application in Data RecoveryXu, Chuanxiang / Sun, Weize / Huang, Lei / xu, Jingxin / Huang, Min et al. | 2020
- 51
-
Research on Rail Traffic Safety Factor Model Based on Deep LearningZhao, Ping / Sun, Lian-ying / Tu, Shuai / Wang, Jin-Feng / Wan, Ying et al. | 2020
- 60
-
Research on Pseudo Code Ranging Technology Using Burst DSSS SignalQi, Jianzhong / Song, Qingping et al. | 2020
- 69
-
A Study on PN Code Phase and Carrier Frequency Fast Estimation Technology for DSSS SignalQi, Jianzhong / Song, Qingping et al. | 2020
- 77
-
Research of Software Information Hiding Algorithm Based on Packing TechnologyTian, Zuwei / Yang, Hengfu et al. | 2020
- 90
-
A Free-Space Quantum Secure Direct Communication Scheme Based on Prefixed-Threshold Real-Time Selection MethodYu, Hao / Hu, Qianqian / Li, Zhenwei / Feng, Bao et al. | 2020
- 101
-
Design of Intelligent Mobile Robot Control System Based on Gesture RecognitionDai, Dong / Zhuang, Wei / Shen, Yixian / Li, Lu / Wang, Haiyan et al. | 2020
- 112
-
Multimodal Biometric Recognition Based on Convolutional Neural NetworkXu, Hui / Kong, Jun / Qi, Miao / Lu, Yinghua et al. | 2020
- 124
-
Multiple Graph Regularized Non-negative Matrix Factorization Based on L2,1 Norm for Face RecognitionYao, Minghai / Li, Jinsong / Zhou, Changyu et al. | 2020
- 136
-
Facial Expression Recognition Method Based on Convolution Neural Network Combining Attention MechanismWen, Peizhi / Ding, Ying / Wen, Yayuan / Deng, Zhenrong / Xu, Zhi et al. | 2020
- 148
-
Behavior Compatibility Analysis for Service Mashup with Model CheckingZhai, Zhongyi / Lai, Guibing / Zhao, Lingzhong / Qian, Junyan et al. | 2020
- 160
-
Study on Practical IoT Applications in Civil Aviation IndustryHe, Yuanqing et al. | 2020
- 170
-
Study on IoT Solutions in Smart AirportsZhang, Huan et al. | 2020
- 180
-
MultiSec: A Bionics Security Architecture of Ad-hoc NetworkWang, Muyao / Yang, Yun / Duan, Zongtao et al. | 2020
- 189
-
A Large-Scale Parallel Network Intrusion Detection Model Based on K-Means in Security Audit SystemQiao, Xueming / Zhang, Yuan / Liu, Yanhong / Hu, Hao / Zhu, Dongjie / Qiu, Zhi / Liu, Chenglin et al. | 2020
- 199
-
Task Offloading Strategy in Cloud Collaborative Edge ComputingWang, Wenli / Bai, Yanfeng / Wang, Suzhen et al. | 2020
- 210
-
A Review of Wireless Sensor Network Simulation ToolsCao, Ning / Yu, Pingping et al. | 2020
- 221
-
Research on Ozone Prediction Based on Genetic Neural Network for Multi-city CollaborationLi, Haichuan / Xu, Haoran / Gao, Qi / Nie, Yaning et al. | 2020
- 232
-
The Shape Classification of Snowflakes Based on BP Neural NetworkLi, Haichuan / Zhang, Xu / Wang, Shuhai / Song, Shikun et al. | 2020
- 243
-
Fabric Hair Ball Pilling Detection Based on Memristive Cell Neural NetworkWang, Jingyun / Yin, Jincan / Duan, Wenjie / Li, Yang et al. | 2020
- 255
-
Propagator Method Based on Virtual Array Manifold Matching Algorithm for 2D DOA EstimationLiu, Sheng / Zhao, Jing / Xiong, Weizhi / Dai, Xiangjun et al. | 2020
- 265
-
Two-Dimensional Seismic Data Reconstruction Method Based on Compressed SensingCheng, Caifeng / Sun, Xiang 'e / Lin, Deshu et al. | 2020
- 278
-
Optimal Location for Electric Vehicles Charging Stations Based on P-Median ModelTian, Daxin / Yan, Huiwen / Duan, Xuting / Cao, Yue / Zhou, Jianshan / Hao, Wei / Long, Kejun / Gu, Jian et al. | 2020
- 290
-
A Succinct Power Management Circuit for Wireless Sensor Network NodesLi, Gang / Zheng, Wenxian / Li, Zhenbing / Huang, Zhong / Yang, Yongjun / Wen, Guangjun et al. | 2020
- 300
-
Survival Analysis of a Stochastic Single-Species System with Diffusion Under the Effect of Environmental Toxins in Polluted EnvironmentsDai, Xiangjun / Wang, Suli / Liu, Sheng / Xiong, Weizhi et al. | 2020
- 312
-
Precipitation Phase Inversion Algorithm for Extremely Unbalanced DataWang, Shengchun / Jiang, Chengcheng / Huang, Jingui / Xu, Jinyu / Deng, Hong / Huang, Long / Yu, Xiaozhong et al. | 2020
- 324
-
Vehicular Trajectory Big Data: Driving Behavior Recognition Algorithm Based on Deep LearningYang, Xiaorun / Ding, Fei / Zhang, Dengyin / Zhang, Min et al. | 2020
- 337
-
Measurement-Device-Independent Quantum Identity Authentication Based on Single PhotonCheng, Yu / Lou, Xiaoping / Tang, Wensheng / Liu, Zehong / Wang, Yu / Huang, Guan et al. | 2020
- 346
-
Quantifying Community Detection Algorithms in Student Networks of Book Borrowing via Demographic CharacteristsKong, Fanjing / Meng, Zhiqiang / Che, Songtian et al. | 2020
- 354
-
Knowledge Extraction and Knowledge Graph Construction Based on Campus Security LogssCao, Songfei / Di, Xiaoqiang / Gong, Yue / Ren, Weiwu / Zhang, Xingxu et al. | 2020
- 365
-
Research on the Influence of Different Network Topologies on Cache Performance for NDNFeng, Min / Ma, Huanqi / Hu, Yong / Yu, Meiju et al. | 2020
- 376
-
Research on Vehicle Network Routing Algorithm Based on Statistical BehaviorLi, Hui / Feng, Jun / Gong, Yanli / Liu, Jialing et al. | 2020
- 384
-
Design of Automatic Fire Extinguishing Device for IoT Transformer BoxWang, Ruihang / Li, Liangliang / Chen, Jianfu / Zhao, Xiaorong et al. | 2020
- 393
-
A Practical Quantum Private Query Protocol Based on Bell States and Single PhotonsLiu, Dong-Mei / Yan, Li-Li / Chang, Yan / Zhang, Shi-Bing et al. | 2020
- 403
-
Improved Analytic Hierarchy Process Based on Fuzzy Synthesis Theory for User Behavior EvaluationGao, Yishan / Zhang, Shibin / Huang, Yuanyuan et al. | 2020
- 412
-
Location Privacy Protection Algorithm Based on the Division Method of Voronoi in the Internet of VehiclesXie, Peng-shou / Han, Xue-ming / Feng, Tao / Yan, Yan / Ma, Guo-qiang et al. | 2020
- 423
-
Safety Helmet Detection Method Based on Faster R-CNNGuo, Shuqiang / Li, Dongxue / Wang, Zhiheng / Zhou, Xinxin et al. | 2020
- 435
-
Transmission Line Galloping Detection Based on SURF Feature and FLANN Matching AlgorithmGuo, Shuqiang / Bai, Qianlong / Yue, Baohai / Li, Xianjin / Zhou, Xinxin et al. | 2020
- 444
-
A Method to Improve Identification Performance of UHF RFID SystemsXu, Jiang et al. | 2020
- 455
-
A New Multi-tree Search Algorithm for RFID Tag IdentificationXu, Jiang et al. | 2020
- 464
-
A Direct Self-adaptive Fuzzy Control System for a Single-Arm ManipulatorWang, Xiaokan / Wang, Qiong et al. | 2020
- 474
-
Research and Design of Intelligent Gas Concentration Monitoring and Alarming Instrument Based on PIC Single Chip MicrocomputerWang, Xiaokan / Wang, Qiong et al. | 2020
- 484
-
A Method to Construct Large Scale Boolean FunctionsZhang, Daxing / Cai, Erguan et al. | 2020
- 493
-
Banknote Infrared Characteristics Discrimination Based on PCA and LDALi, Ruoxi / Zhao, Yinong / Zhang, Xuedong / Cao, Yuhan / Chen, Xiaojing et al. | 2020
- 503
-
A Novel Approach to File Deduplication in Cloud Storage SystemsShi, Aiwu / Liu, Ke / Pei, Denghui / Huang, Qifan et al. | 2020
- 513
-
Cooperative Detection Model for Phishing Websites Based on ApproachWang, He / Lin, Guoyuan / Fang, Menghua et al. | 2020
- 525
-
Associated Hazard Assessment of IoT Vulnerability Based on Risk MatrixYang, Jinglan / Xue, Yatian / Lei, Min / Che, Bichen et al. | 2020
- 536
-
DFDM - A DeepFakes Detection Model Based on Steganography Forensic NetworkZeng, Yang / Guo, Xiaochun / Yang, Yu / Zhan, Rui et al. | 2020
- 546
-
An Image Steganalysis Model Combined with the Directionality of ResidualsJin, Zhujun / Li, Hao / Yang, Yu / Lin, Jialin et al. | 2020
- 557
-
A New Method for Computing the Variety of Saturation Ideal of Triangular SetJi, Zhenyi / Liu, Jiankang / Liu, Cheng / Jiang, Bing et al. | 2020
- 568
-
Impact of Climate Change on Farmland Production Potentialin the Coastal Areas of Jiangsu Province During Nearly 50 YearsLiu, Jing / Yu, Wenzheng et al. | 2020
- 582
-
Network Abnormal Behavior Detection Method Based on Affinity PropagationChen, Junjie / Guo, Shaoyong / Li, Wencui / Shen, Jing / Qiu, Xuesong / Shao, Sujie et al. | 2020
- 592
-
A Multi-blockchain Architecture Supporting Cross-Blockchain CommunicationXiao, Xingtang / Yu, Zhuo / Xie, Ke / Guo, Shaoyong / Xiong, Ao / Yan, Yong et al. | 2020
- 604
-
Blockchain-Based Authentication in Wireless Sensor NetworksZhou, Mingfang / Wang, Xiaojun / Luo, Mingxing et al. | 2020
- 616
-
A Word-Oriented Modular Division Algorithm and Its Efficient Implementation Based on CSAHu, Xiaoting / Qin, Zhongping / Liu, Yali / Yang, Qi et al. | 2020
- 627
-
Defense Against Adversarial Attack Using PCAYang, Jie / Wu, Man / Liu, Xiao-Zhang et al. | 2020
- 637
-
Medical Image Digital Watermarking Algorithm Based on DWT-DFRFTLiu, Yanlin / Li, Jingbing / Liu, Jing / Chen, Yanwei / Li, Hui / Shen, Jian et al. | 2020
- 650
-
A Robust Color Image Zero-Watermarking Based on SURF and DCT FeaturesNawaz, Saqib Ali / Li, Jingbing / Bhatti, Uzair Aslam / Li, Hui / Han, Baoru / Mehmood, Anum / Ahmed, Raza M. / Shoukat, Muhammad Usman / Zhou, Jingjun et al. | 2020
- 661
-
Network Intrusion Detection Based on Data Feature Dynamic Ensemble ModelFeng, Tao / Dou, Manfang / Xie, Pengshou / Fang, Junli et al. | 2020
- 674
-
Current Status and Prospects of Blockchain TechnologyCheng, Jieren / Song, Jinyang / Fan, Dong / Zhang, Yuan / Feng, Wen et al. | 2020
- 685
-
A DDoS Attack Defense Method Based on Blockchain for IoTs DevicesChen, Meizhu / Tang, Xiangyan / Cheng, Jieren / Xiong, Naixue / Li, Jun / Fan, Dong et al. | 2020
- 695
-
A Reputation Incentive Mechanism of Crowd Sensing System Based on BlockchainCheng, Jieren / Long, Hai / Tang, Xiangyan / Li, Jun / Chen, Meizhu / Xiong, Naixue et al. | 2020