Research on Electric Power 5G Wireless Channel Model and Prediction Method Based on Intelligent Classification and Big Data Analysis

H Su, K Luo, R Tong - 2024 International Conference on …, 2024 - ieeexplore.ieee.org
The wireless channel model of 5G (5th Generation Mobile Communication Technology) can
not only truly reflect the wireless channel characteristics in the power system environment …

Generalized Cross-Correlation Delay Estimation Algorithm Based on Improved LMS Adaptive Filtering

B Liu - 2023 3rd International Conference on Mobile Networks …, 2023 - ieeexplore.ieee.org
The Phase-Sensitive Optical Time Domain Reflectometer (Φ-OTDR) Distributed Acoustic
Sensing (DAS) system is a pioneering technological breakthrough with profound …

An Effective Hybrid Image Watermarking Encrypted and Decrypted Technique for Copyright Protection

HM Al-Jawahry, BV Kumar, NS Chandra… - 2024 International …, 2024 - ieeexplore.ieee.org
Image watermarking serves as a visual deterrent, signaling potential infringers that the
image is protected by copyright. While various watermarking methods have been developed …

Design of College Community Management and Service System Founded on Particle Swarm Optimization Arithmatic in Cloud Platform

K Wang - 2023 3rd International Conference on Mobile …, 2023 - ieeexplore.ieee.org
College student community has increasingly become an important force to promote and
prosper campus culture, and student community has a good appeal among the student …

Risk Assessment of Transmission Line State based on GIS

T Xu - 2024 International Conference on Integrated Circuits …, 2024 - ieeexplore.ieee.org
Frequent typhoon disasters have brought huge economic losses to coastal areas, especially
exposed overhead power lines, which have caused serious damage. This article adopts a …

Embedded Automation Device Based on Trusted Computing

Y Chen, H Wang, A Bi, Y Liu, C Zhuang… - … on Integrated Circuits …, 2024 - ieeexplore.ieee.org
Trusted computing technology, as a new type of information security technology, has been
applied in various fields. In order to ensure the safe and stable operation of industrial and …

Transformer Encoder and Decoder Method for Forest Estimation and Change Detection

KK Kotin, S Kumar, H Alabdeli… - 2024 International …, 2024 - ieeexplore.ieee.org
Forest Change Detection (FCD) is difficult component of natural assess monitoring and
conservation strategy, enabled informing decision-making. Different techniques using …

Image Recognition Algorithm of UAV Inspection under Machine Vision

C Hu, Z Mo, Z Zhang, X Qiu - 2024 International Conference on …, 2024 - ieeexplore.ieee.org
UAVs have the advantages of efficient and automated inspection in life, and have important
application value in industry, construction, energy and other fields. In this paper, an …

IME-MTCSC: A Multi-Typo Chinese Spelling Correction Model by Input Method Editor

R Li, L Jiang, F Zheng, X Zhang… - 2024 International …, 2024 - ieeexplore.ieee.org
Chinese Spelling Checking (CSC) task is to detect and correct spelling typos in Chinese
texts to improve the accuracy and readability. Unlike English text, Chinese text relies on …

Data Leakage Behavior Recognition Based on Cyclical Learning Rate based Long-Short Term Memory

J Wang, C Liu, X Yu, L Tian… - … Conference on Integrated …, 2024 - ieeexplore.ieee.org
The data leakage behavior are malicious activities which considered through an authorized
member inside an organization. The insider threats are a challenging one for public and …