mirror of
https://github.com/waveletlab-uestc/waveletlab-uestc.github.io.git
synced 2026-04-02 07:51:52 +08:00
1 line
4.7 KiB
JavaScript
1 line
4.7 KiB
JavaScript
(window.webpackJsonp=window.webpackJsonp||[]).push([[10],{50:function(i,n,e){"use strict";e.r(n);var t=e(0),o=function(i){var n,e,t=(e=void 0,{attributes:{slug:"topics",title:"Topics",layout:n="page",excerpt:"<p>The topics of the conference include and not only include:</p>\n",createdAt:new Date(1695107164117),updatedAt:new Date(1695107164117),type:n,permalink:"/topics.html"},internal:e,contentType:"markdown",content:e}),o=i.options.beforeCreate||[];i.options.beforeCreate=[function(){this.$page=t}].concat(o);["layout","transition"].forEach(function(n){var e=i.options.PageComponent;e&&(i.options[n]=e[n]),void 0===i.options[n]&&(i.options[n]=t.attributes[n])}),i.options.name="page-wrapper-"+t.attributes.slug.replace(/[^0-9a-z\-]/i,"-")},a=Object(t.a)({},function(){var i=this,n=i.$createElement,e=i._self._c||n;return e("layout-manager",[e("h2",{attrs:{id:"topic"}},[i._v("Topic")]),i._v(" "),e("p",[i._v("The topics of the conference include and not only include:")]),i._v(" "),e("ol",[e("li",[e("p",[e("strong",[i._v("Theory and Experiment")])]),i._v(" "),e("ul",[e("li",[e("p",[i._v("Fractal geometry")])]),i._v(" "),e("li",[e("p",[i._v("Wavelet algorithm and multi-wavelet")])]),i._v(" "),e("li",[e("p",[i._v("Signal processing")])]),i._v(" "),e("li",[e("p",[i._v("Microwave")])]),i._v(" "),e("li",[e("p",[i._v("Data mining and knowledge discovery")])]),i._v(" "),e("li",[e("p",[i._v("Blockchain technology")])]),i._v(" "),e("li",[e("p",[i._v("Machine learning & Deep learning")])]),i._v(" "),e("li",[e("p",[i._v("Intelligent communication systems")])]),i._v(" "),e("li",[e("p",[i._v("Intelligent algorithms and applications")])]),i._v(" "),e("li",[e("p",[i._v("Intelligent mechatronics")])]),i._v(" "),e("li",[e("p",[i._v("Neural networks, fuzzy systems and soft computing algorithms")])]),i._v(" "),e("li",[e("p",[i._v("Information and cyberspace security")])]),i._v(" "),e("li",[e("p",[i._v("Data privacy")])]),i._v(" "),e("li",[e("p",[i._v("Biomimetics and bio-inspired systems")])]),i._v(" "),e("li",[e("p",[i._v("Cancer Diagnostic Analysis")])]),i._v(" "),e("li",[e("p",[i._v("Computer network and internet modeling")])]),i._v(" "),e("li",[e("p",[i._v("Parallel, distributed computing")])]),i._v(" "),e("li",[e("p",[i._v("Big Data and Cloud Computing")])]),i._v(" "),e("li",[e("p",[i._v("Computational dynamical systems")])])])]),i._v(" "),e("li",[e("p",[e("strong",[i._v("Multimedia Technology")])]),i._v(" "),e("ul",[e("li",[e("p",[i._v("Active media technology")])]),i._v(" "),e("li",[e("p",[i._v("Medical information")])]),i._v(" "),e("li",[e("p",[i._v("Vision and image processing")])])])]),i._v(" "),e("li",[e("p",[e("strong",[i._v("Embedded System and Others")])]),i._v(" "),e("ul",[e("li",[e("p",[i._v("Traffic modeling and congestion control")])]),i._v(" "),e("li",[e("p",[i._v("System modeling, identification and simulation")])]),i._v(" "),e("li",[e("p",[i._v("Intelligent and biological control systems")])]),i._v(" "),e("li",[e("p",[i._v("System control and optimal control")])]),i._v(" "),e("li",[e("p",[i._v("Power system analysis and control")])]),i._v(" "),e("li",[e("p",[i._v("Adaptive and learning control")])]),i._v(" "),e("li",[e("p",[i._v("Process control and industrial automation")])]),i._v(" "),e("li",[e("p",[i._v("Feedback and decentralized control")])]),i._v(" "),e("li",[e("p",[i._v("Collaborative control systems")])]),i._v(" "),e("li",[e("p",[i._v("Robotics and intelligent vehicles")])]),i._v(" "),e("li",[e("p",[i._v("Hybrid control and hybrid dynamical systems")])]),i._v(" "),e("li",[e("p",[i._v("Tele-robotics, haptics, and tele-operated systems")])]),i._v(" "),e("li",[e("p",[i._v("Each layer Design for cognitive radio networks")])]),i._v(" "),e("li",[e("p",[i._v("Spectrum sharing and cognitive networking")])]),i._v(" "),e("li",[e("p",[i._v("Spectrum sensing")])]),i._v(" "),e("li",[e("p",[i._v("Sensing and perception")])]),i._v(" "),e("li",[e("p",[i._v("Applications of game theory in cognitive radio networks")])]),i._v(" "),e("li",[e("p",[i._v("Anti-interference Techniques for cognitive radio networks")])]),i._v(" "),e("li",[e("p",[i._v("Tracking, Telemetering and Command")])]),i._v(" "),e("li",[e("p",[i._v("Sensor networks")])]),i._v(" "),e("li",[e("p",[i._v("Sensors based control and automation")])]),i._v(" "),e("li",[e("p",[i._v("Sensor design, integration and fusion")])]),i._v(" "),e("li",[e("p",[i._v("Sensor data analysis and system diagnosis")])]),i._v(" "),e("li",[e("p",[i._v("Multi-agent systems and applications")])]),i._v(" "),e("li",[e("p",[i._v("Service science, management and engineering")])]),i._v(" "),e("li",[e("p",[i._v("Military-civilian integration")])]),i._v(" "),e("li",[e("p",[i._v("In-memory database")])])])])])])},[],!1,null,null,null);"function"==typeof o&&o(a);n.default=a.exports}}]); |