Proceedings of the International Conference on Computer Networks and Communication Technology (CNCT 2016)
393 authors
- KONG, Jie
- The Improved LEACH-C Protocol with the Cuckoo Search Algorithm
- KOWALSKI, Piotr A.
- Methods of Collective Intelligence in Exploratory Data Analysis: A Research Survey
- KULCZYCKI, Piotr
- Methods of Collective Intelligence in Exploratory Data Analysis: A Research Survey
- LAI, Xue-jia
- A New Method for Construction of Orthomorphic Permutations with the Highest Degree
- LEE, Dah-Jye
- Decision Support Systems for Predicting Erectile Dysfunction
- LEE, Ming-Huei
- Decision Support Systems for Predicting Erectile Dysfunction
- LEI, Lei
- A Cross-Layer Routing Protocol Based on Location Information for Multi-hop Wireless Ad hoc Networks with Directional Antenna
- LEI, Lei
- A Concurrent MAC Protocol based on Local Synchronization for Wireless Ad Hoc Networks with Directional Antennas
- LEI, Qian
- Image Super-resolution Reconstruction based on Deep Learning and Sparse Representation
- LEI, Xu
- Research on Vehicle Classification Algorithm Based on Information Fusion of Dual Reluctance Sensor
- LENG, Xue-dong
- Delay Estimation Based on Compressed Sensing Subspace Pursuit Algorithm
- LI, Cai-mao
- Trusted Software Monitoring Research Based on Dynamic Proxy
- LI, Feng-rong
- A Novel CPW Fed Dual-band Microstrip Antenna
- LI, Hao
- Research on High Speed Parallel Blind Equalization Algorithm
- LI, Hong-ru
- Remote Monitoring and Control System for Wisdom Agricultural Greenhouse Based on Internet of Things Technology
- LI, Jin-dong
- A Broadband Multi-layer Dual-polarization Slot Antenna Based on Differential-feed
- LI, Kai
- An Application of Mobile Crowdsensing Techniques: Multiple Physiological Parameters Detection System
- LI, Liu-bin
- An Application of Mobile Crowdsensing Techniques: Multiple Physiological Parameters Detection System
- LI, Meng-qing
- Research on Integration of Quality Testing based on Communication Technology
- LI, Ming
- Research on the Cyberspace Security Evaluation Model of Smart City based on the Big Data Analysis Technology
- LI, Ming-jian
- A SQLite Recovery Method for Various Primary Key and B+tree Reorganization
- LI, Shu-Yun
- An Improved Algorithm of Narrow-Band Interference Rejection Based on Time-Domain Adaptive Filtering in DSSS System
- LI, Shu-dong
- Users Connection across Social Media Sites Based On Users'Relationship Vector
- LI, Si
- Impact of the Amount of RF Self-interference Cancellation on Digital Self-interference Cancellation in Full Duplex Communications
- LI, Song
- Effects of Different Attaching Positions of Human Body on Wearable Tag Antenna
- LI, Wei
- MIMO Radar Transmit Beampattern Design with PAR constraint in a Spectrally Crowded Environment
- LI, Wei
- Pattern Recognition Method of PD Signals Based on Fuzzy Clustering
- LI, Wei
- Research on Optimization of Feature Extracting Based on PD Fingerprints in Pattern Recognition
- LI, Wei-gang
- Authoring of Personalized Web Page from Heterogeneous Web Pages by Content Extraction and Integration
- LI, Xi-gao
- Get Rid of Data Disaster: An Active-active Model with VRN Network for Smart Grid DFS
- LI, Xian-bin
- Broadband Dual-Polarized Stacked Patch Antenna with High Isolation
- LI, Xiao-Bai
- Remote Monitoring and Control System for Wisdom Agricultural Greenhouse Based on Internet of Things Technology
- LI, Yi-peng
- Customized Service's Empirical Analysis And Exploration In LifeBased On Double O2O Mode-A Case Study Of 'Suning V Purchase'
- LI, Yi-peng
- Goods Logistics Management Based on the Line Of Transport Operators
- LI, Yihui
- Band Coverage in Wireless Sensor Networks: A Preliminary Study
- LI, Ying
- Extraction and Feature Analysis of Mouse Trabecular with Active Contour Model Based on Micro-CT Images
- LI, Zhan-rong
- The Improvement of Network Performance by Using the Technique of PF-RING Zero-copy to Optimize Spark Streaming
- LI, Zhi-yong
- A Simple Deniable Authentication Protocol Based on Quantum Key Distribution
- LIANG, Yuan-zhi
- Pre-Warning System for Sudden Events in Public Based on Pedestrian Behavior's Understanding from Surveillance Video
- LIAO, Su-hua
- A Simple Deniable Authentication Protocol Based on Quantum Key Distribution
- LIAO, Zhu-hua
- An NDN-based Query Processing Framework for Networked Databases
- LIN, Bin
- Tri-frequency Microcosmic Fractal Dipole Antenna with PBG Structure Used for 2G, 3G and 4G Systems
- LIN, Hsuan-Hung
- Decision Support Systems for Predicting Erectile Dysfunction
- LIN, Ming-tuan
- Design and Experiment of Adaptive Anti-saturation and Anti-jamming Modules for GPS Receiver Based on 4-antenna Array
- LIN, Zhao-wen
- Design and Implementation of a Security Control Architecture for Software-Defined NetworkingDesign and Implementation of a Security Control Architecture for Software-Defined Networking
- LIU, Feng
- The Improvement of Network Performance by Using the Technique of PF-RING Zero-copy to Optimize Spark Streaming
- LIU, Hai-lin
- An Adaptive Algorithm of Data Network Traverse Based on Node Analysis
- LIU, Hong-Jing
- Research on Optimization of Feature Extracting Based on PD Fingerprints in Pattern Recognition
- LIU, Hong-zhe
- Effects of Different Attaching Positions of Human Body on Wearable Tag Antenna
- LIU, Hui
- An Adaptive Algorithm of Data Network Traverse Based on Node Analysis
- LIU, Hui-tong
- Power Communication Optical Network Traffic Grooming Algorithm Based on Differentiated Services
- LIU, Ji-bin
- A Broadband Multi-layer Dual-polarization Slot Antenna Based on Differential-feed
- LIU, Ji-bin
- Design and Experiment of Adaptive Anti-saturation and Anti-jamming Modules for GPS Receiver Based on 4-antenna Array
- LIU, Meng-meng
- The Design of MLX90621 Based Intelligent Lighting Control System
- LIU, Pei-guo
- Design and Experiment of Adaptive Anti-saturation and Anti-jamming Modules for GPS Receiver Based on 4-antenna Array
- LIU, Peng-fei
- Using Immune Genetic Algorithm to Optimize BP Neural Network and Its Application
- LIU, Peng-fei
- Research on Improved IPSO-LSSVM Method and Its Application
- LIU, Tie-jun
- Design and Implementation of a Security Control Architecture for Software-Defined NetworkingDesign and Implementation of a Security Control Architecture for Software-Defined Networking
- LIU, Wen-Jun
- The Study of Consumer Purchase and Forward Intention in WeChat E-Commerce Marketing
- LIU, Wen-hong
- Mathematical Modeling and Experimental Study of Inverse Heat Conduction Problems of Heavy Plate Laminar Cooling Process
- LIU, Xiang
- Radiation Analysis of Antenna Array with Synthetic Functions
- LIU, Xiang
- Broadband Dual-Polarized Stacked Patch Antenna with High Isolation
- LIU, Ya-Shu
- An Application Based on Regular Expression
- LIU, Yan
- Efficient Content Delivery and Caching Scheme Using Network Coding in CCN
- LIU, Yi-zhi
- An NDN-based Query Processing Framework for Networked Databases
- LIU, Zhao
- A Secure Message Transmission Scheme in an Extended Network of Crossed Cubes
- LIU, Zhi-hui
- Power Splitting and Power Allocation for Energy Harvesting Multi-antenna Relay Networks in the Presence of CSI Errors
- LU, Fan
- Effects of Different Attaching Positions of Human Body on Wearable Tag Antenna
- LU, Hong-tao
- Impact of the Amount of RF Self-interference Cancellation on Digital Self-interference Cancellation in Full Duplex Communications
- LU, Jian-feng
- Simulation Oriented OWL-S Extension and Cloud Interaction
- LU, Zi-dong
- A New Method for Construction of Orthomorphic Permutations with the Highest Degree
- LUO, Sheng-si
- The Improvement of Network Performance by Using the Technique of PF-RING Zero-copy to Optimize Spark Streaming
- Li, Rong
- Analysis of students' e-learning behavior based on Bik-Means clustering algorithm
- Liang, Yuan-zhi
- A New Method for Feature Extraction and Image Classification Based on PCNN and Image Quality
- Lukasik, Szymon
- Methods of Collective Intelligence in Exploratory Data Analysis: A Research Survey
- Luo, Da-xiong
- Analysis of students' e-learning behavior based on Bik-Means clustering algorithm
- Lš, Jian-bing
- Damage Identification of Space Trusses Based on the Modal Strain Energy and Wavelet Transformation
- MA, Fei
- The Characteristics of Compound Models Designed for Internet of Things
- MA, Fei
- The Relations Between Classic and Geometric Probability and Scale-Free Feature In Social Networks
- MA, Hai-bo
- A Configurable Tool for Generating and Managing Reusable Simulation Model
- MA, Hong-Jiao
- Application of Algorithm of Smoothing Pseudo-range with Carrier Phase to DRTS System
- MA, Jian
- Effects of Different Attaching Positions of Human Body on Wearable Tag Antenna
- MA, Li-wang
- Charging Operation Management System of New Energy Vehicle
- MA, Li-wang
- Research on Vehicle Classification Algorithm Based on Information Fusion of Dual Reluctance Sensor
- MA, Song
- An Application of Mobile Crowdsensing Techniques: Multiple Physiological Parameters Detection System
- MA, Wen-rui
- Research on the Cyberspace Security Evaluation Model of Smart City based on the Big Data Analysis Technology
- MA, Yu-feng
- Dynamic Routing Mechanism in Network Simulation Based on Topology Perception Time Series
- MENG, Jia-Jia
- The Study of Consumer Purchase and Forward Intention in WeChat E-Commerce Marketing
- MENG, Xiang-xu
- SDNForensics: A Comprehensive Forensics Framework for Software Defined Network
- MIAO, Ye
- Power Splitting and Power Allocation for Energy Harvesting Multi-antenna Relay Networks in the Presence of CSI Errors
- Ma, Rong
- A New Method for Feature Extraction and Image Classification Based on PCNN and Image Quality
- Men, Kai
- A Cross-Coupled Ka-Band GaAs-pHEMT Based VCO
- NI, Ming-fang
- A New Generalized Assignment Problem Model and Its Method
- NIU, Shao-qing
- Vector Deviation for Recognition of Radar Target Intention
- NIU, Zhong-yuan
- An Improved Matrix Perturbation Method for Modified Structures
- Nguyen, N.Y.
- The Impact of Population Growth on the Future Air Traffic Demand in Singapore
- Ni, Xiu-hui
- Ultra-low Noise Differential Pre-amplifier Design and Its Noise Floor Measurement
- PAN, Ping
- Speaker Authentication Method Based on Quantum Tunnelling Effect
- PAN, Ting
- A Secure Message Transmission Scheme in an Extended Network of Crossed Cubes
- PANG, Heng-mao
- Get Rid of Data Disaster: An Active-active Model with VRN Network for Smart Grid DFS