Analysis of Computer Network Security and Prevention Technology
Shuai Yang*, Xianfang Wang
Abstract | References | PDF | HTML | Pub. Date: May 18, 2023
DOI: 10.23977/jeis.2023.080204 | Downloads: 2 | Views: 24
Wenchao He, Chenghui Wan*, Yang Cheng, Ruifan Li, Jundi Zhang
Abstract | References | PDF | HTML | Pub. Date: May 10, 2023
DOI: 10.23977/jeis.2023.080203 | Downloads: 1 | Views: 17
Spatiotemporal Video Data Acquisition and Application for Intelligent Manufacturing
Zheng Shikui*, Cheng Bo, Du Feifei
Abstract | References | PDF | HTML | Pub. Date: May 2, 2023
DOI: 10.23977/jeis.2023.080202 | Downloads: 1 | Views: 40
Application of Network Security Technology Based on Blockchain Technology
Li Ke*
Abstract | References | PDF | HTML | Pub. Date: May 1, 2023
DOI: 10.23977/jeis.2023.080201 | Downloads: 0 | Views: 49
Research on CMAC and PID Compound Control Based on GUI
Zhongqiao Zheng*
Abstract | References | PDF | HTML | Pub. Date: Apr 28, 2023
DOI: 10.23977/jeis.2023.080109 | Downloads: 9 | Views: 37
Wei Ai*, Yuan Chong, Yukun Wang
Abstract | References | PDF | HTML | Pub. Date: Apr 28, 2023
DOI: 10.23977/jeis.2023.080110 | Downloads: 5 | Views: 55
Design of Reconfigurable Power Amplifier Based on Smith Chart Matching
Wang Yuecheng*
Abstract | References | PDF | HTML | Pub. Date: Apr 27, 2023
DOI: 10.23977/jeis.2023.080108 | Downloads: 10 | Views: 94
Image super-resolution reconstruction based on residual compensation combined attention network
Xiyao Li*
Abstract | References | PDF | HTML | Pub. Date: Apr 17, 2023
DOI: 10.23977/jeis.2023.080107 | Downloads: 13 | Views: 84
Baoyi Wang*, Xindong Liang, Shaomin Zhang
Abstract | References | PDF | HTML | Pub. Date: Apr 5, 2023
DOI: 10.23977/jeis.2023.080106 | Downloads: 16 | Views: 124
V2G Blind Signature Privacy Protection Scheme Based on Blockchain
Baoyi Wang*, Yakun Gou, Shaomin Zhang
Abstract | References | PDF | HTML | Pub. Date: Apr 4, 2023
DOI: 10.23977/jeis.2023.080105 | Downloads: 11 | Views: 91