999精品在线视频,手机成人午夜在线视频,久久不卡国产精品无码,中日无码在线观看,成人av手机在线观看,日韩精品亚洲一区中文字幕,亚洲av无码人妻,四虎国产在线观看 ?

2018年第1期~第12期總目次

2018-03-04 20:50:09
網絡安全與數據管理 2018年12期
關鍵詞:設計研究

題 目

作者期頁

產學一線

一個工控系統病毒的處置及思考

王紹杰,霍朝賓,田曉娜(1)5

新型Android銀行木馬“MoqHao”利用社交網絡隱藏C&C服務器

甘杰,郭山語(1)9

攻擊者對安全體系的預測、繞過、干擾與安全防護應對

肖新光(2)3

基于非線性預處理及邏輯回歸的異常檢測算法

董偉,楊晨,邵俊杰(3)4

基于數據驅動的工業信息安全防護

王弢,崔君榮(6)3

產業互聯網下的企業變革——以元器件分銷企業轉型實踐為例

宋健,周杰(6)6

基于大樣本的隨機森林惡意代碼檢測與分類算法

李雪虎,王發明,戰凱(7)3

交通行業工控系統遭病毒入侵給我國關鍵信息基礎設施安全的啟示

董偉,李致成,馮志(9)1

ITNS主題專欄:網絡空間安全

大規模網絡安全態勢分析系統YHSAS設計與實現

賈焰,韓偉紅,王偉(1)17

構筑工業互聯網安全防護體系為推動先進制造業發展保駕護航

劉仁輝,張尼,吳云峰(1)23

基于JSON的RSA-PKCS#1加密算法的安全性研究

何建,蔣琳,廖清等(1)25

Secure Enclave安全體系技術分析與研究

廖正赟,郭建勝(1)30

ITNS主題專欄:網絡人工智能與智能網絡管理

基于軟件定義網絡技術實現人工智能網絡體系架構

劉惠文,姚海鵬,張培穎(2)7

SDN架構下基于優先級的帶寬保障算法研究

曹紹華,張斌,張培穎(2)11

人工智能集成學習方法在入侵檢測中的運用

金雅晴,丁振興,姬慶慶(2)15

基于AI的LEO衛星網絡資源管理架構設計

王朱偉,徐廣書,買天樂等(2)20

ITNS主題專欄:工業控制系統及信息安全

可編程控制器原生的信息安全設計

朱毅明(3)8

本質安全型抽水蓄能電站計算機監控系統設計探討

彭煜民,吳云峰(3)11

智能工廠新型數據采集系統構建

龔濤,趙赫男(3)15

引調水工程控制系統及信息安全防護設計思考

李連全,李潤偉(3)20

題 目

作者期頁

智能制造帶來的工業信息安全思考

吳吉慶,韋有雙(3)24

工控系統現場控制網絡異常檢測技術淺析

趙貴成,程鵬,王文海(3)28

工業控制系統APT攻擊分析和防御問題探討

許劍新,還約輝,王迎(3)32

電力工控系統網絡入侵和攻擊典型模型研究

郭志民,呂卓,陳岑(3)37

ITNS主題專欄:大數據安全技術

大數據產業現狀和挑戰

顧釗銓,張尼,李樹棟等(4)3

大數據分析關鍵技術與挑戰

韓偉紅,賈焰,周斌(4)7

面向大數據的知識語義建模技術研究綜述

柴瑜晗,劉妍,司亞琪等(4)11

醫療大數據平臺數據高并發方案設計與關鍵技術分析

張偉(4)18

大數據時代網絡涉軍輿情預警的新范式

劉澤睿(4)23

ITNS主題專欄:工控安全技術發展及應用

工業控制系統網絡安全態勢感知框架研究

陶耀東,賈新桐(5)3

長輸天然氣管道工控系統安全防護措施及相關建議

王磊,魏娜(5)7

離散制造行業的工控安全保障體系

趙劍明,尚文利,齊盈盈等(5)12

PLC控制系統在智能制造時代的應用及發展趨勢

韓慶敏,林浩,姜洪朝等(5)18

等保2.0時代下工控安全技術革新

謝云龍,吳得清,姜紅勇(5)22

ITNS主題專欄:匿名與隱私保護

DP2Gsister:差分隱私社交網絡圖發布模型

殷軼平,徐睿峰(6)11

Internet服務可訪問性技術綜述

譚慶豐,時金橋,王學賓等(6)18

基于OT協議的外包隱私集合交集計算協議

廖鵬程,陳小軍,申立艷等(6)28

本地化差分隱私在數據眾包中的應用

方俊斌,蔣千越,李愛平(6)32

基于差分隱私的社交網絡隱私保護

黃茜茜,蔣千越,蔣琳等(6)36

ITNS主題專欄:金融信息安全

金融行業“金融安全3.0”理論與生態

李洋,唐秀江,陳春璐等(7)6

基于軟件定義安全的企業內網威脅誘捕機制

劉文懋,劉威歆(7)9

日志智能分析在銀行業IT安全運維管理中的應用

孫惟皓,凌宗南,陳煒忻(7)13

智慧城市信息安全保障體系研究

李洋,謝晴,邱菁萍等(7)18

ERC20智能合約整數溢出系列漏洞披露

陳力波,殷婷婷,倪遠東等(8)3

基于大數據的互聯網金融安全建設思路

安丙春,張健,陶蓉(8)7

農村金融機構亟需建設新一代網絡安全體系

左英男(8)11

題 目

作者期頁

發布區塊鏈標準應用模型及應用部署技術研究

白杰,李東云,吳先鋒(8)13

ITNS主題專欄:中國電子“網絡安全和信息化”專題

RTD-gated HEMT研究進展

朱長舉(9)5

輕量級插件式Linux圖形桌面環境設計與優化技術

余杰,馬俊,彭歡等(9)9

工控行業自主可控編程編譯工具關鍵技術研究

郭肖旺,陳海,趙德政(9)13

國產辦公信息系統若干關鍵問題研究

郭長國,謝勁松,韓鵬等(9)17

一種基于開放聚合框架的網絡流量安全監測體系設計

王艷偉,鄔江,羅赟騫等(9)22

基于北斗衛星導航系統的安全芯片設計

范長永(9)27

基于RC4算法的流密碼原理與實現

劉程遠(9)31

基于延遲線的超高速SD卡動態相位調整技術

劉艷麗,張璐,馮彥朝等(9)34

基于國產數據庫的電子政務建設安全性初探

姜會林(9)38

ITNS主題專欄:信息安全與密碼技術研究

基于全同態加密的ORAM方案

宋寧寧(11)1

NIST隨機性檢測方法研究

王超,溫濤,段冉陽(11)5

ZUC算法隨機性檢測研究

王超,范國浩,付寶仁(11)9

大整數分解算法綜述

楊江帥(11)12

基于混沌映射的身份認證與密鑰協商方案

國佃利(11)16

簡化版分組密碼KATAN32的相關密鑰立方攻擊

王明興(11)20

輕量級分組密碼算法設計研究

陳懷鳳(11)25

網絡與信息安全

從三種融合角度解讀《網絡安全法》

范赫男,張鐘(1)33

用戶網絡行為模擬技術研究

李晶晶,劉紅日,劉揚等(1)36

聯網工業控制系統主動感知預警技術研究

馬強,殷順堯,羊依銀(1)40

一種基于半監督學習的工控網絡入侵檢測方法

張松清,劉智國(1)44

基于機器學習的輿情傾向性分析研究

羅裕雋(1)48

基于敏感性分級的(k, δ, ai)-匿名模型

劉陽,祝永志,遲玉良(1)52

基于軌道交通控制系統網絡信息安全仿真分析

徐超,莫嘉永,林俊南(1)57

云環境下主客觀協同的信任模型研究

張迪,丁箐(2)23

基于非線性預處理和神經網絡的字符序列單向Hash算法

朱巍(2)29

基于嵌入式平臺的網絡視頻監控系統應用

蔡偉立,卿粼波,滕奇志等(2)33

基于嵌入式的QR二維碼加密系統設計與實現

周佳華,李福山(2)37

SDN網絡流量分類技術研究綜述

蔣海軍,謝鈞,郭小帆等(2)40

工業控制系統信息安全測試平臺研究

盧凱,朱廣宇,王紹杰等(3)40

城市污水處理廠控制系統可信安全防護設計

吳云峰(3)45

題 目

作者期頁

基于alpha疊加的視頻信息隱藏算法

蘇鵬濤,田澤,劉逸涵(3)50

eSIM卡安全架構研究

黃健,黃健文,李俊磊等(3)53

基于BP神經網絡的網絡安全指標體系構建

劉海天,韓偉紅,賈焰(4)26

基于神經網絡模型的網絡入侵檢測的研究

王禹,丁箐,羅弦(4)30

一種面向主動安全的動態采集策略設計與實現

翟友鈞,趙旦譜,臺憲青(4)34

基于云的工業信息安全試驗平臺架構設計

霍朝賓,賀敏超,劉思洋(5)25

基于SVM算法的工業防火墻規則自學習方法

潘峰,王世偉,薛萍(5)29

應用混合核函數支持向量機的網絡安全檢測模型研究

張彥軍(5)34

關鍵信息基礎設施安全保護運營措施分析與建議

高煥新,高永前(5)37

面向未來的網絡靶場體系架構研究

劉智國,于增明,王建等(6)41

一種基于可信嵌入式交互模塊的物聯網遠程管理平臺安全方案

陳波,楊永剛,朱廣宇(6)47

中央企業在國家網絡安全保障中的作用研究

林濤,張向宏(6)52

基于區塊鏈的身份管理研究

陳宇翔,張兆雷,卓見等(7)22

基于方向極化調制的安全可靠傳輸技術研究

齊帥,張邦寧,郭道省等(7)27

深度學習在網絡信息安全中的應用

陳驍(7)33

基于深度學習和半監督學習的webshell檢測方法

吳斌,趙力(8)19

基于SECaaS模式的網絡安全監管服務化研究

張智南,柯賢良,傅愛民(8)23

基于云計算服務的安全體系設計

張偉(9)42

一種基于分布式蜜罐技術的勒索蠕蟲病毒監測方法

秦玉杰(9)45

IEC60870-5-104規約安全性分析及攻擊實驗

江澤鑫(10)1

電廠工控信息安全半實物仿真模型研究

蘇暢,熊申鐸,羅安琴等(10)5

基于深度學習的集成DGA域名檢測方法

羅赟騫,鄔江,王艷偉等(10)10

基于Hadoop的大數據分析管理平臺架構設計

張偉(11)30

基于區塊鏈的智慧云制造系統安全架構

杜蘭,陳琳琳,張麗等(11)34

一種基于STIX信息交互的滲透測試協作方案研究

劉岳,張海峰,張良等(12)1

基于貝葉斯網絡的等級保護風險評估模型研究

趙一鳴,謝炯,王鋼等(12)6

電力企業云百科系統的架構設計

張偉(12)11

信息通信

物聯網平臺及其云化平臺的開放性評估

賈雪琴,胡云,邢宇龍(1)62

大數據平臺安全威脅與防護技術研究

劉明輝,陳湉,王竹欣(1)65

無線傳感器網絡中基于模式頻繁度的異常檢測方法

施曉斌,吳丹萍,程紅舉(1)70

基于增強現實的計算機輔助微創手術導航系統

黃偉萍,韋孟宇,杜民等(1)76

協同通信系統中基于協作干擾的無線安全增強

周錢,臧國珍,彭磊等(1)81

題 目

作者期頁

一種改進的頻偏估計方法及應用

劉凱,周淵平(1)87

TIPC在嵌入式集群系統中的應用與優化

施思,葉建芳,何睿(2)63

車聯網中基于模糊邏輯處理的多跳廣播協議

廖恩瑞,潘燕燕,宋祥(2)68

寬頻帶縫隙饋電雙層貼片微帶天線設計

周兵,鄒傳云(2)72

GLONASS衛星導航信號模擬與接收驗證軟件開發

賁星,宋茂忠,熊駿(3)96

能量均衡的無線傳感器網絡多跳非均勻分簇算法

馬威風,陳桂芬(3)100

基于藍牙通信的IC卡水表遠程付費裝置設計

常興智(3)105

一種用于CDMA2000 1x導頻捕獲的自適應門限算法研究

王文實,夏文龍,郭慶功(4)79

免疫粒子群優化的DV-Hop定位算法

吳珍珍,方旺盛(4)84

波束形成算法研究與改進

劉權,周淵平,徐磊等(4)88

一種改進的碼率兼容QC-LDPC碼構造算法

范仁基,趙旦峰(5)58

WiFi輔助的IMU室內定位方法的研究

袁國良,謝奎(5)62

平移不變小波變換在脈搏波去噪中的應用

王泰琨,張海英,張以濤等(5)66

面向導航星座的混合路由技術研究

張方,周淦,喻瑤瑤等(6)94

CSI誤差下MIMO干擾廣播信道的非線性收發機設計

賈亞平,耿烜(6)99

Ku波段便攜式雷達收發系統設計

蔡暢,楊浩,杜澤保(6)104

一種基于RB-HARQ安全傳輸技術的吞吐量最大化方法

王雷,郭道省,蔣炫佑(7)62

基于GNURadio的CMA盲均衡器和鎖相環組合設計與實現

李曉光,潘克剛(7)67

LTE中SVC視頻層數選擇和資源分配的聯合優化

邢志浩,楊博文,楊堅(7)71

基于Nginx的科普云直播系統研究與實現

馬艾田,耿立宏,王閏強等(8)54

具有射頻監測能力的雷達接收前端技術

張秋艷,王超,陳嚴君(8)58

基于PXI總線多通道矢量信號源的設計與實現

張秋艷,張鵬(9)76

基于坐標變換的交互多模型車載定位研究

焦雨琪,牛蕊,夏志(9)80

基于無人機雙路移動中繼通信的干擾抑制

楊潤豐,駱春波,張依群(9)85

終端換機業務分析研究

路瑋,李軼群,李佳俊等(9)89

基于ZYNQ的高速數據中心接口單元設計

呂俊杰,武杰(10)51

基于期望最大化算法的雙音頻率估計方法研究

袁恩,劉鵬,陳隆亮等(10)55

對支持MEC的SCN蜂窩網絡緩存策略的研究

何驕鴻,潘沛生(11)69

一種RB-HARQ輔助下基于非規則LDPC碼的安全傳輸方案

王雷,丁曉暉(11)74

無線Ad Hoc網絡MAC層中針對FD中繼的高效空間復用機制

宋宇,齊望東,趙衛偉(11)79

衛星通信中干擾極化狀態自適應跟蹤算法

齊帥,郭道省, 張邦寧等(12)48

逼近高斯信道容量的M-APSK調制星座優化設計

蔣炫佑,魏以民,王雷等(12)52

智能算法

基于雙維度云模型的協同過濾推薦算法

劉美博,滿君豐,彭成等(1)92

題 目

作者期頁

基于HALCON的機器人手眼標定精度分析與反演方法

楊厚易(1)97

考慮移動群智感知用戶類型的激勵機制設計

林燁婷,陳忠輝,馮心欣等(1)101

基于奇異值分解和隱Markov模型的動態手勢識別

蔣海軍,謝鈞,段國侖等(1)106

基于多尺度域和能量特征分析的航空圖像增強

劉暢,廖一鵬(1)111

基于灰色新陳代謝和神經網絡的故障預測方法研究

杲玄玄,李長云,雷小葳(1)115

基于Ext JS框架MVC模式的復用技術研究

周玉,聞金華,徐建良(2)46

基于費用函數的測試性指標優化分配方法

王賀,朱智平,王貴騰等(2)51

基于自然語義處理的裁判文書分割系統

鄭少婉,陸培民(2)55

低帶寬條件下機器人探索地圖的傳輸方法

張紅陽,肖宇峰,劉冉(2)58

基于三幀差法與聚類算法的目標識別方法

梁瓊,蔡湧達,路梅梅等(3)57

基于AIHS的遙感影像融合方法及其應用研究

胡佳偉,劉軍清,汪康等(3)61

基于SVM的建筑電氣系統無中心故障診斷算法研究

趙雪辰,邢建春,王平等(3)65

一種基于多元回歸的能見度檢測方法

唐紹恩,李騫,顧大權等(3)70

基于距離變換的PRM路徑規劃算法

李敏,周遠遠,黃魯(3)74

一種基于關聯規則的網絡軟件缺陷預測方法

胡柳,鄧杰,趙正偉等(4)41

基于區域過濾的測序序列比對算法研究

丁勝楠,吳鳴,徐云(4)45

深度森林與人工神經網絡在光伏出力預測的比較

沈文博,孫榮霞,馬少卿等(4)49

一種智能化媒資檢索系統的研究

關力,張向文,張帆等(4)52

基于隱馬爾可夫模型的有向地圖匹配算法研究

陳忠輝,王彪,馮心欣等(4)55

基于自然特征的移動增強現實注冊算法

謝振超,黃俊,張磊等(5)71

基于改進的暗原色先驗圖像去霧算法

楊斌,林志賢,郭太良(5)75

一種改進的加權頻差電阻抗成像算法

張夏婉(5)80

基于MapReduce的分布式貪心EM算法

曹家慶,吳觀茂(5)84

基于模糊C-均值和特征加權法的協同過濾推薦算法

字云飛,李業麗,孫華艷等(6)54

基于粒子濾波的鋰電池SOC二次濾波算法

邢云鳳,趙野(6)59

基于數據敏感度自適應的SDT改進算法

張涵笑,慕福奇,呂欣巖(6)64

變參數深度玻爾茲曼計算模型研究

王娜,陳賢富(6)68

基于Floyd改進加速算法的最短路徑選擇

馬瑩,陳志龍,劉賀等(6)72

基于蝴蝶優化的粒子濾波算法

劉云濤(7)37

面向文件存儲的虛擬網絡映射算法

陳晨,鄭烇,王志臻等(7)42

基于二倍體顯性機制的DNA算法研究

徐凱,陳賢富(7)46

基于混沌擾動PSO算法的云計算任務調度

許向陽,張芳磊(8)27

Landsat 8 OLI多光譜與全色影像融合算法的比較

姜曉晨,鄧正棟,武國瑛等(8)31

基于粒子群優化的模糊C均值聚類算法

王宇鋼(8)36

基于自適應閾值PCA的多目標人臉識別方法研究

郝剛,梁鵬(9)49

題 目

作者期頁

二分查找判定樹的RHC構造法

徐有為,張宏軍,程愷等(9)52

一種基于OpenCV的家用安防多閾值運動目標檢測算法

劉志聰,陳德為,李鴻揚等(9)57

基于LFSR具有并行與串行結果一致的隨機數生成算法

王超,張秋艷,張姍等(10)15

基于支持向量機的格斗評估算法研究

陳澤嘉,曾培峰(10)19

基于Welch和柔性形態學的LPI信號噪聲基底處理

耿常青,楊承志,張志剛等(10)24

一種結合用戶和項目聚類的協同過濾算法

羅弦,丁箐,王禹(10)28

基于自適應相機運動速度的視頻穩像算法

胡琪,羅健欣,胡谷雨等(10)32

基于區域劃分的點云全局配準研究

周建釗,杜文超,顏雨吉等(11)39

網絡用戶自描述標簽向量生成及標簽層次體系構建方法

孫毅,裘杭萍,王沁雪(11)44

面向虛擬現實的A算法的分析與改進

宋健,何小海,王正勇等(11)50

高空懸掛式相機拍攝中的拉索提取方法

何榜耕,吳曉紅,何小海等(11)54

基于改進優先權的對稱相似圖像修復算法

鄭成松,李琦(12)14

一種事件驅動的生物特征識別框架服務的設計與實現

蔣林軒,余杰,劉曉東等(12)18

云計算環境下基于信任主體和效益值的動態任務調度算法研究

吳洲(12)26

基于資源三號衛星與Landsat 8 OLI的水庫庫容估算

姜曉晨,鄧正棟,武國瑛(12)30

人工智能

開放式環境下變電站機器人SLAM算法研究

任杰,宋建濤,李功燕(3)80

基于STM32的運動分析裝置設計與研究

方曉明,蘇凱雄(3)84

流形降維最小二乘回歸子空間分割

林智鵬,黃増裕,簡彩仁(3)88

基于ZYNQ的車載行人檢測系統設計與實現

鄧健峰,謝云(3)91

基于深度神經網絡的說話人自適應方法研究

古典,李輝(4)60

基于優化的并行AlexNet人臉特征點檢測算法

陳東敏,姚劍敏(4)65

基于拉普拉斯卷積網絡和SMM分類器的小麥麥粒識別

康朋新,卿粼波,滕奇志等(4)71

TensorFlow平臺下基于深度學習的數字識別

靳濤,張永愛(4)74

一種快速的車型識別方法

胡鵬,白天,許曉瓏(5)41

改進的卷積神經網絡在答案選擇模塊中的研究

許暢,張琳(5)46

基于EdgeBoxes與旋轉不變特征的車輛檢測

婁玉強,蔣華濤,常琳等(5)50

基于生成對抗網絡的語音增強算法研究

柯健,徐志京(5)54

一種融合多種信息的Web文檔分類方法

段國侖,謝鈞,郭蕾蕾等(6)76

一種基于隔離損失函數的人臉表情識別方法

曾逸琪,關勝曉(6)80

交叉口信號優化控制的深度循環Q學習方法

施賽江,陳鋒(6)85

基于連續幀的在線實時人體行為檢測

周道洋,關勝曉,夏雨薇(6)90

基于深度卷積神經網絡的小尺度行人檢測

郭愛心,殷保群,李運(7)50

一種基于LSTM的視頻車輛檢測算法

李歲纏,陳鋒(7)54

融合多視角信息的RGB-D圖像協同顯著性檢測

吳乾紳(7)58

題 目

作者期頁

基于生成對抗網絡的人臉熱紅外圖像生成

王雅欣,史瀟瀟(8)40

一種基于高級驅動輔助系統快速時空立體匹配方法

朱素杰,王萌(8)45

基于網絡搜索數據的品牌汽車銷量預測研究

謝天保,崔田(8)50

基于CNN-XGBoost的PTA平均粒徑動態軟測量模型

周鵬(9)61

基于深度學習的多條形碼檢測與實現

周勉,劉秉瀚(9)65

基于伴隨文本信息的Web圖像批量標注方法

郭蕾蕾,俞璐,段國侖等(9)70

基于邏輯回歸模型的火焰檢測

官洪運,楊益偉,吳煒等(10)36

基于分布式核的在線AUC最大化算法

劉鑫,潘志松,周星宇等(10)41

基于FSVM算法的TCD醫療數據分類

王志遠,吳成浩,王正等(10)46

基于全卷積神經網絡的地震初至波拾取

劉佳楠,武杰(11)58

基于公路監控視頻的車輛檢測和識別

陳偉星,白天,許曉瓏(11)64

基于頻譜特性和自適應蟲孔定位的小麥識別

王周璞,何小海,吳小強等(12)35

基于KCF的目標遮擋再檢測算法

王德培,謝云(12)39

基于樸素貝葉斯與半樸素貝葉斯圖像識別比較

劉闖(12)44

工業自動化技術

智能制造系統實施方法論在新能源行業的研究與應用

李末軍,韓慶敏,杜軍釗(1)118

多旋翼燃料電池無人機能量管理策略研究

張志祥,肖鐸,王佳斌(1)122

核電站KSN系統操作監控軟件的仿真技術研究

程敏敏,景應剛,張才科等(1)127

基于MC-AHP-FCE系統對瓦斯災害的預警評估

許顥礫,王大慶,鄧正棟等(1)131

基于簡化粒子群優化的高鐵鋼軌智能檢測技術

王曼,王姮,張華(2)77

一種基于智能機器視覺識別的工業探傷技術

牛乾,劉桂華,康含玉(2)81

工業控制中電渦流傳感器位移測量精度研究

宋士蘭,盧文科,左鋒(2)85

基于STM32F4的基板檢測輸送平臺運動控制器設計

張群,陶曉杰,張藍等(2)90

全方位移動平臺運動控制系統的實現

曾令棟,裴東,王全州等(2)95

基于邊緣計算的工業數據采集

馬吉軍,賈雪琴,壽顏波等(4)91

基于PSO-BP預測模型的盾構機密封艙土壓平衡控制

李強,李景軒(4)94

一種下垂控制逆變器與柴油發電機并聯運行控制策略

黃家豪,王金全,徐曄等(4)100

基于電渦流傳感的地面沉降分層監測裝置設計

呂中虎,張青,張曉飛(4)106

導發架主控計算機供配電管理的設計與實現

景德勝,張坤(4)109

基于EtherCAT架構的伺服系統諧振在線檢測

郭高潔,蔣平,李欣等(5)102

基于聲紋識別技術的Android設備聲音功能自動化測試系統

李嘉偉,胡海龍,林志賢(5)106

題 目

作者期頁

主動對象計算模型在工業機器人系統中的應用

殷冰磊,董伯麟(5)110

平板檢測系統人機界面設計

李洋,林曉,汪鑄杰等(6)108

多通道超聲波數據采集傳輸實現方法

丁孝超,楊媛,陳福(6)112

一種芯片電容高精度批量測試設備設計

劉書萌,馮國兵,王龍等(6)117

基于物聯網的煎炸油品質在線檢測系統設計

霍慧清,歐文,莫宏波等(7)77

淺析云計算在電梯行業中的應用

吳祥容(7)82

基于ZigBee網絡的高速公路防霧霾路燈控制系統

何子力,張麗娜,張放心等(7)86

基于有源RFID的牧場定位技術研究

盧圣文,歐文(7)90

基于圖像處理的煙條段搭口寬度測量方法

文韜,韓龍,文一夫(7)95

柴油發電機組帶恒功率脈沖負載運行特性研究

邢鑫,王金全,徐曄等(8)62

基于FPGA的猝發多脈沖產生系統設計與實現

馮傳均,何泱,戴文峰(8)70

控制系統的“四防”

蘇耀東(8)73

基于FPGA的刀具圖像預處理系統研究

溫佳靜,范紅,朱江澤等(9)94

基于改進灰狼算法的最大功率點跟蹤

楊麗麗,孫榮霞,王碩南(9)97

電力機車裝配線智能節拍系統設計

楊晨,孫麗(9)101

儲能電池基于等效電路模型的功率特性研究

劉堯斌,徐曄,李建科等(9)105

遍歷式最大電流點硅光電池追蹤系統設計

薄中亞(10)59

一種便攜式近地告警測試設備的設計與實現

夏小春,王鍵,趙曉晴(10)62

脈沖負載作用下發電機端電壓波動問題研究

劉博,黃克峰,徐曄(10)66

基于物聯網的工業定制化生產系統設計

謝仁栩,陳丹,徐哲壯等(10)72

基于NTSM的伺服電機模糊滑模控制策略研究

黃皓,涂群章,潘明等(11)84

國產PLC系統與OPC UA通信過程的身份認證機制優化

趙悅琪,閔曉霜(12)58

基于ZigBee的智能照明控制系統設計

張斌,侯嚴嚴,趙濤(12)62

計算機硬件

SRD建模及其在無芯片RFID系統中的應用

張精華,郭海燕,鄒傳云(2)100

一種應用于10 MHz 8位SAR ADC的分段式DAC電路設計

徐韋佳,田俊杰,李延標等(2)104

基于電流模電路的通用寬帶電流放大器的設計與仿真

豐豪,趙柏樹,李宣成(3)109

一種低抖動快鎖定的時鐘數據恢復電路設計

胡騰飛,方毅,黃魯(3)113

基于NEO-M8P的RTK定位系統設計與實現

劉煉軍,黃繼偉(3)117

基于ARM9的自動氣象站控制模塊設計

葉楠,劉懷芝,鹿旭(4)112

一種減小紋波電壓的新型電荷泵調節電路

歐陽托日,黃魯(4)116

NFC門禁控制系統研究與設計

曹澤玲,王琪(5)88

題 目

作者期頁

超聲波腐蝕在線監測系統前端信號分析

王潤,孟令雅,劉晶姝(5)93

K波段pHEMT下變頻混頻器的設計與研究

李罡,余凱,李思臻等(5)97

基于i.MX6的雷達顯示終端設計與實現

李紅兵(6)121

脈沖負載下獨立微電網混合儲能的優化控制策略

師萌,王金全,黃克峰等(6)125

基于FPGA的EtherCAT從站控制器FMMU模塊設計

姚旺君,林浩,王永利等(8)77

一種S模式ADS-B前導脈沖檢測方法

王永利,姚旺君,陳嚴君等(8)83

一種防霧霾智能口罩的設計

徐磊,周淵平,黃思遠等(8)88

一種基于Leap Motion的交互全息投影方法

呂寶媛,蔡煜城,林偉達等(10)78

自適應閾值FAST特征點檢測算法的FPGA實現

程彪,黃魯(10)82

便攜式光導聲波滅火器的研究與設計

官洪運,蘇振濤,汪晨(11)92

一種雙波源車輛行車方向識別方法

秦攀,張奔牛,張明輝(11)96

基于過程數據模塊的裝備故障診斷技術研究

蒙立榮,馬永起,程錚等(12)66

基于國產軟硬件平臺的OPC UA服務器設計與實現

閔曉霜,楊鑫(12)71

行業應用

基于相關濾波器的長時艦船目標跟蹤方法

陳威,李決龍,邢建春等(1)135

基于北斗短報文通信的水質監測系統設計

王星星,姜嵐,黃科等(1)139

基于STM32和ZigBee無線通信的實驗室安防系統

朱利娟,云中華,邊巴旺堆等(1)143

運動目標檢測在單兵作戰中的應用

張芝賢,張凱(2)108

一種星載固態功放驅動電源的設計

董碩,陳贊,王正之等(2)112

基于Emotiv的腦機接口研究

陳侃,張勝利,丁凡(2)116

一種大功率重頻充電電流的分析與研制

馮傳均,何泱,戴文峰(2)119

角點和邊緣結合的紅外與可見光圖像匹配

葛雯,何博(2)122

一種改進的雙麥克智能語音前端算法

方賽鴻(2)127

基于STM32和LABVIEW的兩用太陽跟蹤器設計

蘇楊,劉卿卿(2)131

混合迭代學習法在發動機怠速穩速控制中的應用

崔建平,李登科,劉成基(2)135

一種動力電池制造環境監測的智能網關技術

徐勛庭,梅領亮,駱德漢(2)140

虛擬手術中心臟跳動仿真技術研究

劉波,陳國棟,王娜(2)143

程序源代碼中的切片摘要提取及在搜索中的應用

李潤青,曾國蓀(3)122

基于RFID/GIS的城市地下管網監控管理系統

章光旭,陳明智,毛五星等(3)126

基于數據緩沖池技術的二次設備狀態評價數據處理方法

李金,高壽(3)131

負載弱電流遠程監控系統設計

楊峰,童軒,李建奇(3)134

運動目標微弱放射性核素的快速識別方法

王昌龍,張江梅(3)137

交直流配電網及柔性變電站仿真研究

解騰,亢夢婕,王譜宇等(3)140

題 目

作者期頁

采用商業元器件降低航天器成本研究

周劍波,叢彥超,趙鵬飛等(3)144

基于交通一卡通的智能化住宅小區應用模式研究

伍冠樺,余紅玲,吳金成(3)150

體外反搏治療效果自動優化算法與實現

肖前軍(3)154

一種基于6LoWPAN用于土木結構監測的無線數據采集系統設計

陳海燕,陳志聰,周海芳等(4)120

可穿戴脈搏壓力監測系統設計

胡威,吳學洲,朱臣等(4)125

基于PCIE總線的DMA控制器設計與實現

何廣亮(4)131

基于數字化生產車間的郵件系統設計與集成

任凱斌,曾鵬飛,郝永平(4)136

JIRA在生產異常管理實踐中的應用

張克典,范振強,李智皓等(5)115

固體礦產儲量三維輔助評審系統設計與實現

彭斌,陳志曉(5)119

隧道交通智能逃生引導系統設計

姚丹,朱映雪,吳燕等(6)130

基于中間件的開放式基金登記結算系統

陳松楠(6)134

基于壓電信號的兩種心率呼吸率提取算法比較

賈學斌,廖曦文,商春恒等(7)98

基于ANSYS的氣氛燒結爐動態溫度場研究

李強,王璐(7)102

基于ZigBee的教學應答系統軟件設計

陳科,蘇魯陽,楊筆鋒(8)91

基于特征選擇和HMM的股票價格行為研究

喻永生,謝天異丹,劉暢等(8)96

題 目

作者期頁

基于車聯網的物流信息監控平臺的研究與設計

張愛玲,曹磊(9)110

基于NFC手機的跨域交通卡移資應用技術的研究

何建兵,徐鋒,冷夢甜(9)114

霍爾傳感器實時自動定位系統設計

汪遠銀,岳彩銳,李真山等(9)118

基于B/S模式的三維巖心瀏覽系統的設計與實現

陳岑,卿粼波,何小海等(10)87

智能終端運營管理系統之微服務架構改造實踐

王衛國,潘雨(10)91

海洋石油平臺污染物在線監測軟件開發應用

胡斌,楊敏,徐棟等(10)95

MES系統在水產加工車間的應用

鄒佳霖,范寶德,韓兆玉(10)99

基于AM5728的自適應圖像增強算法的研究與實現

郭威,卿粼波,熊淑華等(11)100

基于Canvas的貨車圖像瀏覽及增強系統設計與實現

高斯文,卿粼波,熊淑華等(11)104

區塊鏈技術在民航領域的應用

王天山,楊健,王堯(11)109

基于降維的人臉識別方法研究與應用

簡彩仁,莊凌宇,林智鵬(12)75

基于云計算的企業信息系統集成與安全機制

支艷利(12)79

仿生嗅覺在空氣凈化器氣味識別中的應用研究

馬東旭,駱德漢,徐勛庭等(12)82

XINXIJISHU YU WANGLUOANQUAN

General Contents of Issue1to Issue12,2018

Title

AuthorIssuePage

FrontlineofIndustryandUniversity

The disposal and thinking of an industrial control system virus

Wang Shaojie, Huo Chaobin, et al(1)5

New Android bank Trojan uses social network to hide C&C server

Gan Jie, Guo shanyu(1)9

The prediction, bypassing and interference of the security system and the safety protection

Xiao Xinguang(2)3

An algorithm for anomaly detection based on nonlinear preprocessing and logistic regression

Dong Wei,Yang Chen,Shao Junjie(3)4

Data driven industrial control system cyber security

Wang Tao, Cui Junrong(6)3

Industrial internet impact enterprise transformation

Song Jian,Zhou Jie(6)6

Large sample-based random forest malicious code detection and classification algorithm

Li Xuehu,Wang Faming,Zhan Kai(7)3

Analysis on a virus intrusion of traffic industrial control system and security of critical information infrastructure in China

Dong Wei,Li Zhicheng,Feng Zhi(9)1

ITNSThemeColumn:CyberspaceSecurity

Research and implementation security situation analysis and prediction system for large-scale network

Jia Yan, Han Weihong, Wang Wei(1)17

On thinking of constructing an industrial internet security protection system

Liu Renhui, Zhang Ni, Wu Yunfeng(1)23

The security analysis of RSA-PKCS#1 encryption algorithm in JSON

He Jian,Jiang Lin,Liao Qing,et al(1)25

Analysis and research on secure enclave architecture

Liao Zhengyun,Guo Jiansheng(1)30

ITNSThemeColumn:Networkartificialintelligence

andintelligentnetworkadministration

An artificial intelligence network architecture based on software defined network

Liu Huiwen,Yao Haipeng,Zhang Peiying(2)7

Research of priority-based bandwidth guarantee algorithm on SDN architecture

Cao Shaohua,Zhang Bin,Zhang Peiying(2)11

The use of artificial-intelligence-based ensembles for intrusion detection

Jin Yaqing,Ding Zhenxing,Ji Qingqing(2)15

Design of LEO satellite network resource management architecture based on AI

Wang Zhuwei,Xu Guangshu,Mai Tianle, et al(2)20

Title

AuthorIssuePage

ITNSThemeColumn:IndustrialControl

SystemandInformationSecurity

Native security design in PLC

Zhu Yiming(3)8

Design of the intrinsically-safe CSCS for pumped storage power station

Peng Yumin,Wu Yunfeng(3)11

Construction of new data acquisition system in intelligent factory

Gong Tao,Zhao Henan(3)15

Design of control system and information security protection for water diversion project

Li Lianquan, Li Runwei(3)20

Risk analysis of intelligent manufacturing on industrial information security

Wu Jiqing,Wei Youshuang(3)24

Analysis on the anomaly detection of field control network

Zhao Guicheng,Cheng Peng,Wang Wenhai(3)28

Analysis of APT attack and defense in industrial control systems

Xu Jianxin,Huan Yuehui,Wang Ying(3)32

Research on typical model of network intrusion and attack in power industrial control system

Guo Zhimin, Lv Zhuo, Chen Cen(3)37

ITNSThemeColumn:

BigDataSecurityTechnology

Status and challenges of the big data industry

Gu Zhaoquan, Zhang Ni, Li Shudong, et al(4)3

The key technologies and challenges of big data analysis

Han Weihong, Jia Yan, Zhou Bin(4)7

Research of knowledge semantic modeling technology for bigdata:an overview

Chai Yuhan, Liu Yan, Si Yaqi, et al(4)11

Design and key technology analysis of high concurrency data for medical big data platform

Zhang Wei(4)18

A new paradigm of early warning of network public opinion

Liu Zerui(4)23

ITNSThemeColumn:IndustrialInformation

SecurityTechnologyDevelopmentandApplication

Research on industrial control system cyber security situation awareness framework

Tao Yaodong,Jia Xintong(5)3

Security protection measures and related suggestions for industrial control system of long-distance natural gas transmission pipeline

Wang Lei,Wei Na(5)7

Title

AuthorIssuePage

Industrial control assurance system for discrete manufacturing industry

Zhao Jianming,Shang Wenli ,Qi Yingying, et al(5)12

Application and development trend of PLC control system in age of intelligent manufacturing

Han Qingmin, Lin Hao, Jiang Hongzhao, et al(5)18

Technological change of industrial control security under the age of classified protection 2

Xie Yunlong,Wu Deqing,Jiang Hongyong(5)22

ITNSThemeColumn:

AnonymityandPrivacyProtection

DP2Gsister: differential privacy publishing model for social network graph

Yin Yiping,Xu Ruifeng(6)11

Survey of Internet service accessibility

Tan Qingfeng,Shi Jinqiao,Wang Xuebin, et al(6)18

Outsourcing private set intersection computing protocol based on OT protocol

Liao Pengcheng,Chen Xiaojun,Shen Liyan, et al(6)28

Local differential privacy applications in data crowdsourcing

Fang Junbin,Jiang Qianyue,Li Aiping(6)32

Privacy preserving in social network based on differential privacy

Huang Xixi,Jiang Qianyue,Jiang Lin, et al(6)36

ITNSThemeColumn:

FinancialInformationSecurity

The theory of“Financial Security (Fin Sec) 3.0” and financial security ecosystem

Li Yang, TangXiujiang, Chen chunlu, et al(7)6

A software defined threat trapping mechanism

Liu Wenmao, Liu Weixin(7)9

The application of log intelligent analysis in bank information security operation

Sun Weihao, Ling Zongnan, Chen Weixin(7)13

The system research on information security in smart cities

Li Yang,Xie Qing, Qiu Jingpingi, et al(7)18

Dozens of integer overflow vulnerabilities found in ERC20 smart contracts

Chen Libo, Yin Tingting, Ni Yuandong, et al(8)3

The big-data-based construction thinking for Internet finance

An Bingchun, Zhang Jian, Tao Rong(8)7

The construction of network security systems in rural financial institutions

Zuo Yingnan(8)11

The standard of blockchain applications model publication and deployment technologies research

Bai Jie, Li Dongyun, Wu Xianfeng(8)13

ITNSThemeColumn:

CECNetworkSecurityandInformatization

A survey of RTD-gated HEMT

Zhu Changju(9)5

Design and optimization of a lightweight Linux desktop environment based on pluggable framework

Yu Jie, Ma Jun,Peng Huan, et al(9)9

Title

AuthorIssuePage

Study on the key technology of automatic controlled programming compilation tool in industrial control industry

Guo Xiaowang, Chen Hai, Zhao Dezheng(9)13

Research on several key problems of domestic office information system

Guo Changguo,Xie Jinsong,Han Peng, et al(9)17

Design of network traffic security monitoring system based on open aggregation framework

Wang Yanwei,Wu Jiang,Luo Yunqian, et al(9)22

Security IC design based on the Beidou satellite navigation system

Fan Changyong(9)27

The principle of a stream cipher based on RC4 algorithm and how to realize it

Liu Chengyuan(9)31

Implementing a SD UHS dynamic tuning phase based on delayline

Liu Yanli,Zhang Lu,Feng Yanzhao, et al(9)34

A preliminary study on the security of e-government construction based on domestic database

Jiang huilin(9)38

ITNSThemeColumn:Researchon

informationsecurityandCryptography

ORAM scheme based on fully homomorphic encryption

Song Ningning(11)1

Research of NIST statistical test

Wang Chao,Wen Tao,Duan Ranyang(11)5

Research of ZUC algorithm randomness test

Wang Chao,Fan Guohao,Fu Baoren(11)9

Survey of large integer factorization algorithm

Yang Jiangshuai(11)12

Chaotic map based authenticated key agreement scheme

Guo Dianli(11)16

Related-key cube attack on round-reduced block cipher KATAN32

Wang Mingxing(11)20

The study on design of lightweight block ciphers

Chen Huaifeng(11)25

NetworkandInformationSecurity

The analysis of network security from three kinds of fusion angles

Fan Henan, ZhangZhong(1)33

A survey of user network behavior simulation technology

Li Jingjing, Liu Hongri, Liu Yang, et al(1)36

Research on active awareness warning method for networked industrial control system

Ma Qiang,Yin Shunyao,Yang Yiyin(1)40

An intrusion detection method based on semi-supervised learning for industry control system network

Zhang Songqing, Liu Zhiguo(1)44

Research for public opinion orientation analysis based on machine learning

Luo Yujun(1)48

(k, δ, ai)-anonymity model based on sensitivity hierarchical

Liu Yang, ZhuYongzhi, Chi Yuliang(1)52

The network information security simulation and analysis for rail traffic control system

Xu Chao,Mo Jiayong,Lin Junnan(1)57

Research on trust model of subjective and objective collaboration in Cloud environment

Zhang Di,Ding Qing(2)23

Title

AuthorIssuePage

One-way character sequence hash algorithm based on nonlinear preprocess and neural network

Zhu Wei(2)29

Application of network video monitoring system based on embedded platform

Cai Weili, Qing Linbo, Teng Qizhi, et al(2)33

Design and implementation of QR code encryption system based on embedded platform

Zhou Jiahua, Li Fushan(2)37

A survey of network traffic classification technology based on SDN

Jiang Haijun, Xie Jun, Guo Xiaofan, et al(2)40

Research on information security testing platform of ICS

Lu Kai, Zhu Guangyu, Wang Shaojie, et al(3)40

Security protection design based on trusted computing for control system of urban sewage treatment plant

Wu Yunfeng(3)45

Video information hiding algorithm based on alpha superposition

Su Pengtao,Tian Ze,Liu Yihan(3)50

Research of security architecture oneSIM card

Huang Jian,Huang Jianwen,Li Junlei, et al(3)53

Construction of network security indication-system based on back propagation neural network

Liu Haitian, Han Weihong, Jia Yan(4)26

Research on network intrusion detection based on neural network model

Wang Yu, Ding Qing,Luo Xian(4)30

Design and implementation of a dynamic acquisition strategy for active safety

Zhai Youjun, Zhao Danpu, Tai Xianqing(4)34

Research on future architecture of network range

Liu Zhiguo, Yu Zengming, Wang Jian, et al(6)41

An IoT remote management platform security solution based on trusted embedded interactive module

Chen Bo, Yang Yonggang, Zhu Guangyu(6)47

Research on the role of central enterprises in national network security

Lin Tao,Zhang Xianghong(6)52

Identity management research based on blockchain

Chen Yuxiang,Zhang Zhaolei,Zhuo Jian, et al(7)22

Research on secure and reliable transmission based on directional polarization modulation

Qi Shuai, Zhang Bangning, Guo Daoxing, et al(7)27

Applications of deep learning in network information security

Chen Xiao(7)33

Webshell detection method based on deep learning and semi-supervised learning

Wu Bin,Zhao Li(8)19

Research on servitization of network security supervision based on SECaaS

Zhang Zhinan, Ke Xianliang, Fu Aimin(8)23

Design of security system based on cloud computing services

Zhang wei(9)42

Ransom worm virus monitoring method based on distributed honeypot technology

Qin Yujie(9)45

Cyber security analysis and attack experiment on IEC60870-5-104 SCADA system

Jiang Zexin(10)1

Research on hardware in the loop simulation model based on industrial control system of power plant information security

Su Chang,Xiong Shenduo,Luo Anqin, et al(10)5

DGA domain ensemble detection method based on deep learning

Luo Yunqian,Wu Jiang,Wang Yanwei, et al(10)10

Architecture design of big data analysis and management platform based on Hadoop

Zhang Wei(11)30

Title

AuthorIssuePage

Security architecture based on blockchain for smart Cloud manufacturing

Du Lan,Chen Linlin,Zhang Li, et al(11)34

Research on a collaborative method of penetration testing based on STIX information interaction

Liu Yue,Zhang Haifeng,Zhang Liang, et al(12)1

Research on risk assessment model of grade protection based on Bayesian network

Zhao Yiming,Xie Jiong,Wang Gang, et al(12)6

Architecture design of Cloud encyclopedia system for power enterprises

Zhang Wei(12)11

InformationCommunication

IoT platform and the open evaluation of its Cloud platform

Jia Xueqin, Hu Yun, Xing Yulong(1)62

Research on security and protection technology of big data platform

Liu Minghui,Chen Tian,Wang Zhuxin(1)65

Anomaly detection method based on pattern frequencies in wireless sensor networks

Shi Xiaobin,Wu Danping,Cheng Hongju(1)70

Computer-aided minimally invasive surgical navigation system based on augmented reality

Huang Weiping,Wei Mengyu,Du Min,et al(1)76

Wireless secure enhancement with cooperative jamming in cooperative communication system

Zhou Qian,Zang Guozhen,Peng Lei,et al(1)81

An improved estimation algorithm of frequency offset and its application

Liu Kai, Zhou Yuanping(1)87

Application and optimization of TIPC in embedded cluster system

Shi Si, Ye Jianfang, He Rui(2)63

Multi-hop broadcast protocol in VANET based on fuzzy logic approach

Liao Enrui, Pan Yanyan, Song Xiang(2)68

Design of wide-band aperture-stacked patchmicrostrip antennas

Zhou Bing,Zou Chuanyun(2)72

GLONASS satellite navigation signal simulation and software development of receiving verification

Ben Xing,Song Maozhong,Xiong Jun(3)96

A multi-hop uneven clustering algorithm for wireless sensor networks with energy balance

Ma Weifeng, Chen Guifen(3)100

Design of the remote payment device for IC card water meter based on Bluetooth communication

Chang Xingzhi(3)105

A novel adaptive threshold algorithm used for CDMA2000 1x pilot channel capture

Wang Wenshi, Xia Wenlong, Guo Qinggong(4)79

Immune particle swarm optimization algorithm for DV-Hop localization

Wu Zhenzhen, Fang Wangsheng(4)84

Research and improvement of beamforming algorithm

Liu Quan, Zhou Yuanping, Xu Lei, et al(4)88

An improved construction algorithm for adaptive QC-LDPC codes

Fan Renji, Zhao Danfeng(5)58

Research on WiFi assisted IMU indoor location method

Yuan Guoliang,Xie Kui(5)62

Application of translation invariant wavelet in pulse wave signals de-noising

Wang Taikun,Zhang Haiying,Zhang Yitao,et al(5)66

Research on hybrid routing technology for navigation constellation

Zhang Fang,Zhou Gan,Yu Yaoyao, et al(6)94

Non-linear transceiver design for MIMO interference broadcast channel with CSI error

Jia Yaping,Geng Xuan(6)99

Design of Ku-band portable radar transceiver system

Cai Chang, Yang Hao, Du Zebao, et al(6)104

Title

AuthorIssuePage

A method for the maximum throughput of the RB-HARQ implemented in secure transmission

Wang Lei,Guo Daoxing,Jiang Xuanyou(7)62

Design and implementation of CMA blind equalizer and PLL based on GNURadio

Li Xiaoguang,Pan Kegang(7)67

Joint resource allocation and layer selection for scalable video transmission in long term evolution system

Xing Zhihao,Yang Bowen,Yang Jian(7)71

Research and implementation of the Kepu Cloud Webcast system based on Nginx

Ma Aitian, Geng Lihong, Wang Runqiang,et al(8)54

Radar receiving front-end technology with frequency monitoring capability

Zhang Qiuyan,Wang Chao,Chen Yanjun(8)58

Design and implementation of multi-channel vector signal source based on PXI bus

Zhang Qiuyan, Zhang Peng(9)76

Research on IMM based on coordinate transformation in vehicle positioning

Jiao Yuqi, Niu Rui,Xia Zhi(9)80

Interference suppress method for UAV communications in two-way mobile relays

Yang Runfeng,Luo Chunbo,Zhang Yiqun(9)85

Research and analysis of terminal replacement technology

Lu Wei,Li Yiqun,Li Jiajun,et al(9)89

Design of high speed data center interface unit based on ZYNQ

Lv Junjie,Wu Jie(10)51

Study on dual-tone signal frequency estimation based on expectation maximization algorithm

Yuan En,Liu Peng,Chen Longliang, et al(10)55

Study on cache strategy of small cell networks supporting MEC

He Jiaohong, Pan Peisheng(11)69

Reliability-based HARQ assisted irregular LDPC code in secure transmission

Wang Lei,Ding Xiaohui(11)74

Efficient spatial reuse mechanism for FD relay in MAC layer of wireless Ad Hoc networks

Song Yu,Qi Wangdong,Zhao Weiwei(11)79

Adaptive tracking algorithm of interference polarization state in satellite communication

Qi Shuai, Guo Daoxing, Zhang Bangning, et al(12)48

Optimal design of M-APSK modulation constellation approaching Gaussian channel capacity

Jiang Xuanyou,Wei Yimin,Wang Lei, et al(12)52

IntelligentAlgorithm

A collaborative filtering recommendation algorithm based on double-dimensional cloud model

Liu Meibo,Man Junfeng,Peng Cheng,et al(1)92

Accuracy analysis and inversion method of robot hand-eye calibration based on HALCON

Yang Houyi(1)97

User type-based incentive mechanism design in participatory sensing system

Lin Yeting,Chen Zhonghui,Feng Xinxin,et al(1)101

Dynamic gesture recognition based on SVD feature compression and HMM

Jiang Haijun, Xie Jun, Duan Guolun, et al(1)106

Aerial image enhancement based on multi-scale domain and energy feature

analysis

Liu Chang, LiaoYipeng(1)111

Research on method of fault prediction based on gray metabolism model and neural network

Gao Xuanxuan, Li Changyun, Lei Xiaowei(1)115

Research of reuse technology based on the Ext JS framework MVC model

Zhou Yu,Wen Jinhua,Xu Jianliang(2)46

Optimal allocation method of testability index based on cost function

Wang He,Zhu Zhiping,Wang Guiteng, et al(2)51

Referee document segmentation system based on natural semantic processing

Zheng Shaowan, Lu Peimin(2)55

Title

AuthorIssuePage

Transmission method for robot exploring map under wireless low bandwidth

Zhang Hongyang, Xiao Yufeng, Liu Ran(2)58

Target recognition method based on three frame difference method and clustering algorithm

Liang Qiong, Cai Yongda, Lu Meimei, et al(3)57

The method and its application of remote sensing image fusion based on AIHS

Hu Jiawei, Liu Junqing, Wang Kang, et al(3)61

Research on the decentralized fault diagnosis algorithm for building electrical system based on SVM

Zhao Xuechen,Xing Jianchun,Wang Ping,et al(3)65

A method of visibility detection based on multiple regression

Tang Shaoen, Li Qian, Gu Daquan, et al(3)70

Distance transform based PRM path planning algorithm

Li Min,Zhou Yuanyuan,Huang Lu(3)74

Network software defect prediction method based on association rules

Hu Liu, Deng Jie, Zhao Zhengwei, et al(4)41

Study on the alignment algorithm for sequencing based on region filtering

Ding Shengnan, Wu Ming, Xu Yun(4)45

Comparison of deep forest and artificial neural network in prediction of PV output

Shen Wenbo, Sun Rongxia, Ma Shaoqing, et al(4)49

Research of intelligent searching system of mediums

Guan Li, Zhang Xiangwen, Zhang Fan, et al(4)52

Research of directed map matching based on Hidden Markov Model

Chen Zhonghui, Wang Biao, Feng Xinxin, et al(4)55

Mobile augmented reality registration algorithm based on natural features

Xie Zhenchao,Huang Jun,Zhang Lei,et al(5)71

An improved dehazing algorithm based on dark channel prior

Yang Bin, Lin Zhixian,Guo Tailiang(5)75

An improved weighted frequency differential electrical impedance tomography algorithm

Zhang Xiawan(5)80

Greedy EM algorithm based on MapReduce framework

Cao Jiaqing,Wu Guanmao(5)84

Collaborative filtering algorithm based on fuzzy C-means and weighted method of eigenvalues

Zi Yunfei, Li Yeli, Sun Huayan, et al(6)54

Estimation of lithium battery SOC based on KPDF algorithm

Xing Yunfeng,Zhao Ye(6)59

Improved SDT algorithm based on data sensitivity adaptation

Zhang Hanxiao,Mu Fuqi,Lv Xinyan(6)64

Study on deep Boltzmann model with variable parameter

Wang Na, ChenXianfu(6)68

Study on the shortest path selection based on Floyd improved acceleration algorithm

Ma Ying, Chen Zhilong, Liu He, et al(6)72

Optimizing particle filter algorithm using butterfly algorithm

Liu Yuntao(7)37

Virtual network mapping alogorithm for file storage

Chen Chen,Zheng Quan,Wang Zhizhen, et al(7)42

Study on DNA algorithm based on diploid dominant mechanism

Xu Kai, Chen Xianfu(7)46

Task scheduling based on chaotic disturbance particle swarm optimization algorithm in Cloud computing environment

Xu Xiangyang,Zhang Fanglei(8)27

Comparisons on fusion algorithms of Landsat 8 OLI multi-spectral and panchromatic images

Jiang Xiaochen, Deng Zhengdong, Wu Guoying, et al(8)31

Fuzzy C-means clustering algorithm based on particle swarm optimization

Wang Yugang(8)36

Research on multi-target face recognition based on adaptive threshold PCA

Hao Gang, Liang Peng(9)49

Title

AuthorIssuePage

RHC construction method for binary search decision tree

Xu Youwei,Zhang Hongjun,Cheng Kai, et al(9)52

A multi-threshold moving target detection algorithm for home security based on OpenCV

Liu Zhicong,Chen Dewei,Li Hongyang, et al(9)57

Random number generator based on LFSR supporting both parallel and serial

Wang Chao,Zhang Qiuyan,Zhang Shan, et al(10)15

Research on fighting evaluation algorithm based on SVM

Chen Zejia,Zeng Peifeng(10)19

Noise base processing of LPI signals based on Welch and flexible morphology

Geng Changqing,Yang Chengzhi,Zhang Zhigang, et al(10)24

An improved collaborative filtering algorithm based on user clustering and item clustering

Luo Xian, Ding Qing, Wang Yu(10)28

Video stabilization algorithm based on adaptive camera motion speed

Hu Qi,Luo Jianxin,Hu Guyu, et al(10)32

The research of Point cloud global registration based on region division

Zhou Jianzhao,Du Wenchao,Yan Yuji, et al(11)39

A method to generate hashtag vector and build hierarchy architecture of network users′ self-describing hashtag

Sun Yi,Qiu Hangping,Wang Qinxue(11)44

The analysis and improvement of A*algorithm based on Virtual Reality

Song Jian,He Xiaohai,Wang Zhengyong, et al(11)50

Method for extracting cable in aerial image

He Banggeng,Wu Xiaohong,He Xiaohai, et al(11)54

Symmetric similar image completion based on redefined priority

Zheng Chengsong, Li Qi(12)14

Design and implementation of an event-driven biometric identification framework service

Jiang Linxuan, Yu Jie, Liu Xiaodong, et al(12)18

Research on task scheduling algorithm based on trust subject and benefit value in Cloud computing environment

Wu Zhou(12)26

Estimation of reservoirs capacity based on ZY-3 and Landsat 8 OLI

Jiang Xiaochen, Deng Zhengdong, Wu Guoying(12)30

ArtificialIntelligence

Study on inspection robot SLAM in open environment

Ren Jie,Song Jiantao,Li Gongyan(3)80

Design and research of motion analysis device based on STM32

Fang Xiaoming,Su Kaixiong(3)84

Least-squares regression subspace segmentation using manifold dimensionality reduction method

Lin Zhipeng, Huang Zengyu, Jian Cairen(3)88

Design and realization of vehicle pedestrian detection system based on ZYNQ

Deng Jianfeng,Xie Yun(3)91

Study of speaker adaptation method based on deep neural network

Gu Dian, Li Hui(4)60

Face points detection based on optimized parallel AlexNet model

Chen Dongmin, Yao Jianmin(4)65

Wheat kernel recognition based on Laplacian convolution network and SMM classifier

Kang Pengxin, Qing Linbo, Teng Qizhi, et al(4)71

Digital recognition based on deep learning in TensorFlow platform

Jin Tao, Zhang Yongai(4)74

A fast method of vehicle identification

Hu Peng, Bai Tian, Xu Xiaolong(5)41

Research on improved convolutional neural network in answer selection module

Xu Chang,Zhang Lin(5)46

Title

AuthorIssuePage

Car detection based on EdgeBoxes and rotation-invariant features

Lou Yuqiang, Jiang Huatao, Chang Lin,et al(5)50

Research on speech enhancement algorithm based on generative adversarial networks

Ke Jian, Xu Zhijing(5)54

A method of Web document classification based on fusion of various information

Duan Guolun,Xie Jun,Guo Leilei, et al(6)76

A method of facial expression recognition based on island loss

Zeng Yiqi,Guan Shengxiao(6)80

Deep recurrent Q-learning method for traffic signal optimization control

Shi Saijiang,Chen Feng(6)85

Online real-time human action detection based on continuous frames

Zhou Daoyang, Guan Shengxiao, Xia Yuwei(6)90

Small-size pedestrian detection via deep convolutional neural network

Guo Aixin,Yin Baoqun,Li Yun(7)50

A LSTM-based method for vehicle detection in video

Li Suichan,Chen Feng(7)54

RGB-D co-saliency detection via multi-view information fusion

Wu Qianshen(7)58

Facial thermal infrared image generated on GAN

Wang Yaxin,Shi Xiaoxiao(8)40

A fast time-space stereo matching method based on advanced driving assistance system

Zhu Sujie,Wang Meng(8)45

Research on brand vehicle sales forecasting based on network search data

Xie Tianbao,Cui Tian(8)50

A dynamic soft sensor model of PTA average particle size based on CNN-XGBoost

Zhou Peng(9)61

Multi-barcode detection and implementation based on deep learning

Zhou Mian,Liu Binghan(9)65

A method for batch Web image annotation based on surrounding text information

Guo Leilei,Yu Lu,Duan Guolun, et al(9)70

Flame detection based on logistic regression model

Guan Hongyun,Yang Yiwei,Wu Wei, et al(10)36

Distributed kernel-based online AUC maximization

Liu Xin,Pan Zhisong,Zhou Xingyu, et al(10)41

TCD medical data classification based on FSVM algorithm

Wang Zhiyuan,Wu Chenghao,Wang Zheng, et al(10)46

Seismic first arrival picking based on fully convolutional networks

Liu Jianan,Wu Jie(11)58

Vehicle detection and recognition based on highway monitoring video

Chen Weixing,Bai Tian,Xu Xiaolong(11)64

Wheat recognition method based on spectrum properties and adaptive wormhole positioning

Wang Zhoupu,He Xiaohai,Wu Xiaoqiang, et al(12)35

Target occlusion detection algorithm based on KCF

Wang Depei,Xie Yun(12)39

Image recognition comparison based on Naive Bayes and Semi-Naive Bayes

Liu Chuang(12)44

IndustrialAutomationTechnology

Research and application on smart manufacturing system implementation methodology in new energy Industry

Li Mojun, Han Qingmin, Du Junzhao(1)118

Research of energy management strategy for fuel cell hybrid power system of multi-rotor unmanned aerial vehicle

Zhang Zhixiang,Xiao Duo,Wang Jiabin(1)122

Title

AuthorIssuePage

Simulation technology research of operation monitoring software for KSN system in nuclear power plant

Cheng Minmin,Jing Yinggang,Zhang Caike,et al(1)127

Early-warning assessment of gas disaster based on MC-AHP-FCE system

Xu Haoli, Wang Daqing, Deng Zhengdong, et al(1)131

Intelligent detection technology of high speed rail based on simplified particle swarm optimization

Wang Man, Wang Heng, Zhang Hua(2)77

A kind of industrial flaw detection technology based on intelligent machine vision recognition

Niu Qian,Liu Guihua,Kang Hanyu(2)81

Research on the displacement measurement accuracy of eddy current sensor inindustral control

Song Shilan, Lu Wenke, Zuo Feng(2)85

Design of motion controller in flat-panel detection and conveying platform based on STM32F4

Zhang Qun,Tao Xiaojie,Zhang Lan, et al(2)90

The implementation of control system for omni-directional mobile platform

Zeng Lingdong, Pei Dong, Wang Quanzhou, et al(2)95

Edge computing based industrial data acquisition

Ma Jijun, Jia Xueqin, Shou Yanbo, et al(4)91

Chamber earth pressure balance control for shield machine based on PSO-BP prediction model

Li Qiang, Li Jingxuan(4)94

A control strategy of droop control inverter and diesel generator parallel operation

Huang Jiahao, Wang Jinquan, Xu Ye, et al(4)100

The design of land subsidence layered monitoring device based on eddy current sensor

Lv Zhonghu, Zhang Qing, Zhang Xiaofei(4)106

Design and realization of master control computer’s power supply control management of missile launcher

Jing Desheng, Zhang Kun(4)109

Online detection of servo system resonance based onEtherCAT

Guo Gaojie,Jiang Ping,Li Xin,et al(5)102

An automatic testing system for audio function of Android devices based on the voiceprint recognition technology

Li Jiawei, Hu Hailong, Lin Zhixian(5)106

The application of active object computing model in industry robot system

Yin Binglei,Dong Bolin(5)110

The design of human-machine interface on flat panel display inspection system

Li Yang,Lin Xiao,Wang Zhujie, et al(6)108

Multi-channel ultrasonic excitation and data acquisition and transmission method

Ding Xiaochao,Yang Yuan,Chen Fu(6)112

A design of high precision batch test equipment for chip capacitor

Liu Shumeng, Feng Guobing, Wang Long, et al(6)117

Design of online inspection system for frying oil quality based on Internet of Things

Huo Huiqing, Ou Wen, Mo Hongbo, et al(7)77

Analysis on the application of Cloud computing in elevator industry

Wu Xiangrong(7)82

Anti-haze expressway light control system based on ZigBee network

He Zili, Zhang Lina, Zhang Fangxin, et al(7)86

Research on pasture positioning technology based on active RFID

Lu Shengwen,Ou Wen(7)90

Measuring the width of laps on tobacco rods based on image processing

Wen Tao, Han Long, Wen Yifu(7)95

The research on operating characteristics of diesel generating set with constant power pulse load

Xing Xin,Wang Jinquan,Xu Ye, et al(8)62

Design and realization of a burst pulses generating system based on FPGA

Feng Chuanjun, He Yang, Dai Wenfeng(8)70

Four type of prevention of the process control system

Su Yaodong(8)73

Research on tool image preprocessing system based on FPGA

Wen Jiajing, Fan Hong, Zhu Jiangze, et al(9)94

Title

AuthorIssuePage

Maximum power point tracking based on improved grey wolf algorithm

Yang Lili, Sun Rongxia, Wang Shuonan(9)97

Design of intelligent beat system for electric locomotive assembly line

Yang Chen,Sun Li(9)101

Study on power characteristics of energy storage battery based on equivalentcir cuitmodel

Liu Yaobin, Xu Ye, Li Jianke, et al(9)105

Design of ergodic scanning maximum current point photovoltaic panel tracking system

Bo Zhongya(10)59

Design and implementation of a portable test equipment about ground proximity warningsystem

Xia Xiaochun, Wang Jian, Zhao Xiaoqing(10)62

Research on the problem of voltage fluctuation of generator terminal under pulse load

Liu Bo,Huang Kefeng,Xu Ye(10)66

Design of industrial customization production system based on Internet of Things

Xie Renxu,Chen Dan,Xu Zhezhuang, et al(10)72

Research on fuzzy sliding mode control strategy of servo motor based on NTSM

Huang Hao,Tu Qunzhang,Pan Ming, et al(11)84

Optimization of authentication mechanism for communication process between domestic PLC system and OPC UA

Zhao Yueqi, Min Xiaoshuang(12)58

Design of intelligent lighting control system based on ZigBee

Zhang Bin,Hou Yanyan,Zhao Tao(12)62

ComputerHardware

Modeling of SRD and its application in chipless RFID system

Zhang Jinghua, Guo Haiyan, Zou Chuanyun(2)100

Designing a sectional structure DAC for 10 MHz 8-bit SAR ADC

Xu Weijia, Tian Junjie, Li Yanbiao, et al(2)104

Design and simulation of the universal broadband current amplifier based on current mode circuit

Feng Hao,Zhao Baishu,Li Xuancheng(3)109

Design of a low jitter and fast locking clock and date recovery circuit

Hu Tengfei, Fang Yi, Huang Lu(3)113

The design and implementation of RTK positioning system based on NEO-M8P

Liu Lianjun, Huang Jiwei(3)117

Automatic weather station control module design based on ARM9

Ye Nan, Liu Huazhi, Lu Xu(4)112

A new charge pump regulator with small ripple voltage

Ouyang Tuori, Huang Lu(4)116

Research and design of NFC access control system

Cao Zeling, Wang Qi(5)88

The analysis of front-end signal of ultrasonic corrosion on-line monitoring system

Wang Run,Meng Lingya, Liu Jingshu(5)93

Design and research of K band pHEMT down-conversion mixer

Li Gang, Yu Kai, Li Sizhen,et al(5)97

The design and implementation of i.MX6-based radar display terminal

Li Hongbing(6)121

Optimization control strategy of hybrid energy storage system for isolated microgrid with pulse load

Shi Meng, Wang Jinquan, Huang Kefeng, et al(6)125

The design of FMMU module in EtherCAT slave controller based on FPGA

Yao Wangjun,Lin Hao,Wang Yongli, et al(8)77

A method to detect S mode ADS-B preamble pulse

Wang Yongli,Yao Wangjun,Chen Yanjun, et al(8)83

Design of an anti-fog and haze intelligent mask

Xu Lei,Zhou Yuanping,Huang Siyuan, et al(8)88

Title

AuthorIssuePage

A method of interactive holographic projection using Leap Motion

Lv Baoyuan, Cai Yucheng, Lin Weida, et al(10)78

Hardware implementation of adaptive threshold FAST feature point detection algorithm based on FPGA

Cheng Biao,Huang Lu(10)82

Research and design of portable photoconductive acoustic fire extinguisher

Guan Hongyun,Su Zhentao,Wang Chen(11)92

A method of vehicle direction recognition based on double wave sources

Qin Pan,Zhang Benniu,Zhang Minghui(11)96

Research of interactive fault reasoning based on process data module

Meng Lirong,Ma Yongqi,Cheng Zheng, et al(12)66

Design and development about OPC UA server based on the localization software and hardware platform

Min Xiaoshuang,Yang Xin(12)71

IndustrialApplication

Ship object tracking based on long-term correlation filter

Chen Wei,Li Juelong,Xing Jianchun,et al(1)135

Design of water quality monitoring system based on Beidou short message communication

Wang Xingxing, Jiang Lan, Huang Ke, et al(1)139

Laboratory security system based on STM32 and ZigBee wireless communication

Zhu Lijuan, Yun Zhonghua, Bianbawangdui, et al(1)143

The application of motion target detection in single-soldier combat

Zhang Zhixian, Zhang Kai(2)108

Design of an on-satellite solid-state power amplifier driving power

Dong Shuo, Chen Zan, Wang Zhengzhi, et al(2)112

Research on brain-computer interface system based on Emotiv

Chen Kan, Zhang Shengli, Ding Fan(2)116

Analysis and development of a high power repetetive charging power supply

Feng Chuanjun, He Yang, Dai Wenfeng(2)119

Infrared and visible light images matching based on corner and edge

Ge Wen, He Bo(2)122

An improved dual MAC intelligent speech front-end algorithm

Fang Saihong(2)127

Design of a dual-use solar tracker based on STM32 and LABVIEW

Su Yang,Liu Qingqing(2)131

Application of hybrid iterative learning in vehicles engine idle speed stability control

Cui Jianping, Li Dengke, Liu Chengji(2)135

Intelligent gateway technology for monitoring power battery manufacturing environment

Xu Xunting, Mei Lingliang, Luo Dehan(2)140

Research on heart beat simulation technology in virtual surgery

Liu Bo,Chen Guodong,Wang Na(2)143

Extraction of slice abstraction from program source code and its application in code search

Li Runqing,Zeng Guosun(3)122

Monitoring and management system of urban underground pipe network based on RFID/GIS

Zhang Guangxu,Chen Mingzhi, Mao Wuxing, et al(3)126

Data processing scheme based on data buffer pool technology for secondary device

Li Jin,Gao Shou(3)131

Design of remote monitor system for load weak current

Yang Feng,Tong Xuan,Li Jianqi(3)134

Rapid detection of weak radionuclide in moving target

Wang Changlong, Zhang Jiangmei(3)137

Simulation of AC/DC distribution network and flexible substation

Xie Teng, Kang Mengjie, Wang Puyu, et al(3)140

Using COTS to reduce the cost of spacecraft

Zhou Jianbo, Cong Yanchao, Zhao Pengfei, et al(3)144

Study on the application mode of intelligent residential district based on traffic card

Wu Guanhua, Yu Hongling, Wu Jincheng(3)150

Title

AuthorIssuePage

Automatic optimization algorithm and its implementation of treatment effect of external counterpulsation device

Xiao Qianjun(3)154

Design of a wireless data acquisition system based on 6LoWPAN for civil structural monitoring

Chen Haiyan, Chen Zhicong, Zhou Haifang, et al(4)120

Design of wearable monitoring system for pulse pressure

Hu Wei, Wu Xuezhou, Zhu Chen, et al(4)125

Design and implementation of DMA controller based on PCIE bus

He Guangliang(4)131

Design and integration of e-mail system based on digital production workshop

Ren Kaibin, Zeng Pengfei, Hao Yongping(4)136

Application of JIRA in production abnormal handling practice

Zhang Kedian,Fan Zhenqiang,Li Zhihao,et al(5)115

Design and implementation of the 3D assistant evaluation system of solid mineral reserves

Peng Bin, Chen Zhixiao(5)119

Design of intelligent escape guidance system for tunnel traffic

Yao Dan, Zhu Yingxue, Wu Yan, et al(6)130

Research and application of open-ended fund transfer agent system based on middleware

Chen Songnan(6)134

The comparison of two kinds of heart rate and respiration rate extraction algorithms for piezoelectric signal

Jia Xuebin,Liao Xiwen,Shang Chunheng, et al(7)98

Research on dynamic temperature field of atmosphere sintering furnace based on ANSYS

Li Qiang,Wang Lu(7)102

The program design of teaching response system based on ZigBee

Chen Ke, Su Luyang,Yang Bifeng(8)91

A study of stock price behavior based on feature selection and HMM

Yu Yongsheng,Xie Tianyidan,Liu Chang, et al(8)96

Research and design of logistics information monitoring platform based on vehicle interconnection

Zhang Ailing, Cao Lei(9)110

A study of IC card transfer application technology based on NFC mobile phone

He Jianbing,Xu Feng,Leng Mengtian(9)114

The real-time automatic positioning system design of Hall sensor

Wang Yuanyin,Yue Cairui,Li Zhenshan, et al(9)118

The design and implementation of three-dimensional core image browsing system based on B/S model

Chen Cen,Qing Linbo,He Xiaohai, et al(10)87

Transformation practice of micro service architecture for intelligent terminal operation management system

Wang Weiguo,Pan Yu(10)91

Development and application of offshore oil platform pollutant online monitoring software

Hu Bin,Yang Min,Xu Dong, et al(10)95

Application of MES system in aquaculture workshop

Zou Jialin,Fan Baode,Han Zhaoyu(10)99

Research and implementation of adaptive image enhancement algorithm based on AM5728

Guo Wei,Qing Linbo,Xiong Shuhua, et al(11)100

Design and implementation of browsing and enhancement system for moving freight car images based on Canvas

Gao Siwen,Qing Linbo,Xiong Shuhua, et al(11)104

Application of blockchain technology in civil aviation

Wang Tianshan,Yang Jian,Wang Yao(11)109

Face recognition method based on dimensionality reduction and its application

Jian Cairen, Zhuang Lingyu,Lin Zhipeng(12)75

Research of enterprise information system integration and security mechanism based on cloud computing

Zhi Yanli(12)79

Application research of biomimetic olfactory in odor recognition of air purifier

Ma Dongxu, Luo Dehan, Xu Xunting, et al(12)82

猜你喜歡
設計研究
FMS與YBT相關性的實證研究
2020年國內翻譯研究述評
遼代千人邑研究述論
何為設計的守護之道?
現代裝飾(2020年7期)2020-07-27 01:27:42
《豐收的喜悅展示設計》
流行色(2020年1期)2020-04-28 11:16:38
視錯覺在平面設計中的應用與研究
科技傳播(2019年22期)2020-01-14 03:06:54
EMA伺服控制系統研究
瞞天過海——仿生設計萌到家
藝術啟蒙(2018年7期)2018-08-23 09:14:18
設計秀
海峽姐妹(2017年7期)2017-07-31 19:08:17
新版C-NCAP側面碰撞假人損傷研究
主站蜘蛛池模板: 国产成人一区| 91精品国产自产在线老师啪l| 欧美黄色网站在线看| 亚洲a级在线观看| 夜夜拍夜夜爽| 97国产在线观看| 激情爆乳一区二区| 污网站在线观看视频| 亚洲 欧美 偷自乱 图片| 亚洲综合第一页| 2021精品国产自在现线看| 成AV人片一区二区三区久久| 午夜国产在线观看| 欧美日韩成人在线观看 | 国产精品偷伦视频免费观看国产| 99热这里只有精品免费国产| 欧美成人a∨视频免费观看| 91久久国产综合精品女同我| 五月天在线网站| 黄色网址免费在线| 欧美69视频在线| AV无码无在线观看免费| 91丝袜乱伦| 国产成人久视频免费| 欧美日本二区| 国产亚洲精品资源在线26u| 中美日韩在线网免费毛片视频| 亚洲区一区| 日本欧美在线观看| 久久综合伊人77777| 精品久久久无码专区中文字幕| 无码AV日韩一二三区| 亚洲第一色网站| 久久久久中文字幕精品视频| 亚洲美女视频一区| a毛片免费观看| 一级片一区| 福利视频一区| 91精品小视频| 日本国产在线| 国产正在播放| 成人精品免费视频| 亚洲va欧美va国产综合下载| 亚洲床戏一区| 国产亚洲精久久久久久无码AV| 国产精品亚洲日韩AⅤ在线观看| 国产午夜无码专区喷水| 这里只有精品在线| 热久久综合这里只有精品电影| 国产色图在线观看| 免费人成网站在线观看欧美| 国产精品免费露脸视频| 久久香蕉国产线看观看精品蕉| 婷婷综合色| 99精品国产高清一区二区| 国产成人综合亚洲网址| 美女被躁出白浆视频播放| 综合天天色| 国产精品嫩草影院av | 99伊人精品| 亚洲精品无码AⅤ片青青在线观看| 都市激情亚洲综合久久| 欧美一级视频免费| 日韩中文无码av超清| 找国产毛片看| 亚洲高清免费在线观看| 亚洲黄色视频在线观看一区| 国产性猛交XXXX免费看| 国产9191精品免费观看| 国产毛片不卡| 孕妇高潮太爽了在线观看免费| 亚洲伦理一区二区| 日韩欧美高清视频| 人禽伦免费交视频网页播放| 亚洲欧美天堂网| 丝袜国产一区| Aⅴ无码专区在线观看| 无码国产伊人| 欧美另类视频一区二区三区| 69综合网| 91人妻日韩人妻无码专区精品| 午夜精品久久久久久久无码软件 |