Analysis of Computer Network Security and Prevention Technology
Shuai Yang*, Xianfang Wang
Abstract | References | PDF | HTML | Pub. Date: May 18, 2023
DOI: 10.23977/jeis.2023.080204 | Downloads: 126 | Views: 1954
Wenchao He, Chenghui Wan*, Yang Cheng, Ruifan Li, Jundi Zhang
Abstract | References | PDF | HTML | Pub. Date: May 10, 2023
DOI: 10.23977/jeis.2023.080203 | Downloads: 21 | Views: 936
Spatiotemporal Video Data Acquisition and Application for Intelligent Manufacturing
Zheng Shikui*, Cheng Bo, Du Feifei
Abstract | References | PDF | HTML | Pub. Date: May 2, 2023
DOI: 10.23977/jeis.2023.080202 | Downloads: 16 | Views: 882
Application of Network Security Technology Based on Blockchain Technology
Li Ke*
Abstract | References | PDF | HTML | Pub. Date: May 1, 2023
DOI: 10.23977/jeis.2023.080201 | Downloads: 45 | Views: 1089
Research on CMAC and PID Compound Control Based on GUI
Zhongqiao Zheng*
Abstract | References | PDF | HTML | Pub. Date: Apr 28, 2023
DOI: 10.23977/jeis.2023.080109 | Downloads: 18 | Views: 801
Wei Ai*, Yuan Chong, Yukun Wang
Abstract | References | PDF | HTML | Pub. Date: Apr 28, 2023
DOI: 10.23977/jeis.2023.080110 | Downloads: 34 | Views: 909
Design of Reconfigurable Power Amplifier Based on Smith Chart Matching
Wang Yuecheng*
Abstract | References | PDF | HTML | Pub. Date: Apr 27, 2023
DOI: 10.23977/jeis.2023.080108 | Downloads: 36 | Views: 1095
Image super-resolution reconstruction based on residual compensation combined attention network
Xiyao Li*
Abstract | References | PDF | HTML | Pub. Date: Apr 17, 2023
DOI: 10.23977/jeis.2023.080107 | Downloads: 39 | Views: 1122
Baoyi Wang*, Xindong Liang, Shaomin Zhang
Abstract | References | PDF | HTML | Pub. Date: Apr 5, 2023
DOI: 10.23977/jeis.2023.080106 | Downloads: 28 | Views: 956
V2G Blind Signature Privacy Protection Scheme Based on Blockchain
Baoyi Wang*, Yakun Gou, Shaomin Zhang
Abstract | References | PDF | HTML | Pub. Date: Apr 4, 2023
DOI: 10.23977/jeis.2023.080105 | Downloads: 22 | Views: 909