column
Resource Allocation Mechanism for NOMA-enabled Underwater Visible Light Communication Systems
XIAO Tao, TANG Rui, ZHANG Ruizhi, LIU Jia, MA Liao, LIU Chuan
2025, 54(5): 673-685. DOI: 10.13976/j.cnki.xk.2024.3271
PDF
Semi-supervised Intrusion Detection Method in Industrial Cyber-Physical System with Deep Contractive Autoencoder
ZHANG Rui, SUN Ziwen
2025, 54(5): 686-695. DOI: 10.13976/j.cnki.xk.2024.1991
PDF
Integrated Diagnosis Model and Optimization Algorithm for Beam Pumping Unit Faults
ZHANG Qiang, LI Qing, XUE Bing, HU Yue
2025, 54(5): 696-709. DOI: 10.13976/j.cnki.xk.2024.2222
PDF
Image Semantic Labeling Method Based on ViBe
FAN Longwei, QIN Dongwen, ZHONG Weisheng, XIONG Jian, ZHENG Yuting, ZHANG Qiang
2025, 54(5): 710-718. DOI: 10.13976/j.cnki.xk.2024.1962
PDF
Heterogeneous Motion Mapping Method for Upper-Limb Rehabilitation Robot
LI Zhenzhu, GUO Bingjing, XU Haotian, LI Xiangpan, HAN Jianhai, HE Kui
2025, 54(5): 719-732. DOI: 10.13976/j.cnki.xk.2024.2951
PDF
Application of Geofence Buffer Zones in UAV Path Following
DI Lingsong, XIAO Zhicai, SUN Defeng, LI Shangcong, LIU Siqi, TANG Guangning
2025, 54(5): 733-745, 771. DOI: 10.13976/j.cnki.xk.2024.2862
PDF
Trajectory Smoothing Method Considering the Dynamics Characteristics of the End Actuator
ZHANG Sheng, LI Shanhu, TAO Yourui, JIA Haipeng
2025, 54(5): 746-758, 771. DOI: 10.13976/j.cnki.xk.2024.3211
PDF
Parameter Tuning Method of Active Disturbance Rejection Control for Unstable Time Delay System Based on Plant Reconstruction
WEI Hongxuan, CHEN Zhuo, SU Zhigang
2025, 54(5): 759-771. DOI: 10.13976/j.cnki.xk.2024.2671
PDF
Network Security Situation Prediction Method via EVMD-Informer
WANG Na, CHANG Yaming, ZHANG Xinhai
2025, 54(5): 772-786, 800. DOI: 10.13976/j.cnki.xk.2024.3052
PDF
A U-Net Segmentation Model for Skin Cancer Based on Multi-scale Channel Fusion Attention
LU Liwei, WANG Yang, LIU Yang, CHEN Guang
2025, 54(5): 787-800. DOI: 10.13976/j.cnki.xk.2024.3231
PDF