Abstract is missing.
- Black-Box Universal Adversarial Attack on Text ClassifiersYu Zhang, Kun Shao, Junan Yang, Hui Liu. 1-5 [doi]
- PlantifyAI: A Novel Convolutional Neural Network Based Mobile Application for Efficient Crop Disease Detection and TreatmentSamyak Shrimali. 6-9 [doi]
- QR Code-Based Student Attendance SystemKhang Jie Liew, Tee Hean Tan. 10-14 [doi]
- Research on the Unified Capability Structure System of Software Engineering Undergraduate TalentsDa Shi, Xi Yu, Lei Mou, Junxiao Gui. 15-25 [doi]
- New Automatic EEG Epileptic Seizure Detection Approach Using Sliding Discrete Fourier Transform and Machine Learning TechniquesAmal Salman Abdulhussien, Ahmad T. Abdulsadda, Ali Al Farawn. 26-31 [doi]
- Research on a Technical Scheme for Evaluating the Stickiness of Family Group UsersYinchao Cheng, Zhihong Zhou, Ye Guo, Zhongxian Xu, Lin Lin. 32-38 [doi]
- Using Machine Learning Techniques To Plan A Fully Renewable Energy Systems By The End of 2050: Empirical Evidence From Jerusalem District Electricity CompanyAmmar Almasri, Diaa Salman. 39-44 [doi]
- Apply VR to Carry out Crew Escape TrainingOutong Li, Haiting Han. 45-50 [doi]
- Multi-Feature Integration and Occlusion Detect Mechanism Based Object Tracking AlgorithmQiang Fu, Xuxin Liang, Yuanfa Ji, Fenghua Ren. 51-56 [doi]
- Template Update Based on 3D-Convolutional Siamese Network for Object TrackingXiaofeng Lu, Xuan Wang, Zhengyang Wang, Xinhong Hei 0001. 57-62 [doi]
- Deep Adversarial Image Synthesis for Nuclei Segmentation of Histopathology ImageJijun Cheng, Zimin Wang, Zhenbing Liu, Zhengyun Feng, Huadeng Wang, Xipeng Pan. 63-68 [doi]
- Design and Implementation of Safety Helmet Detection System Based on YOLOv5Yaqi Guan, Wenqiang Li, Tianyu Hu, Qun Hou. 69-73 [doi]
- Super-Resolution Estimation of Signal Direction Based on Unsupervised LearningJiawen He, Peishun Liu, Liang Wang, Ruichun Tang. 74-78 [doi]
- A Deterministic Polynomial Public Key Algorithm over a Prime Galois Field GF(p)Randy Kuang. 79-88 [doi]
- Named Entity Recognition for Chinese Aviation Security Incident Based on BiLSTM and CRFYan Zhao, Hu Liu, Zhen Chen. 89-94 [doi]
- RILL: A RSSI-based Lightweight Positioning Algorithm for Wireless Sensor NetworksRun Ye, Bin Yan 0005, Yuhao Huang. 95-100 [doi]
- Application of Smart Contract Technology in the Construction of Digital Resource Knowledge Management PlatformSun Jianjun. 101-105 [doi]
- Short Video Copyright Protection Based on Blockchain TechnologyYanfang Qi, Junbiao Liu, Fang Dong 0003, Ping Dong, Yanyun Dai, Lurong Jiang. 106-110 [doi]
- Cyber Attacks Detection Based on Generative Adversarial NetworksAining Shi. 111-114 [doi]
- Second-Hand Car Trading Framework Based on Blockchain in Cloud Service EnvironmentYimin Yu, Chuanjia Yao, Yi Zhang, Rong Jiang. 115-121 [doi]
- News Insider: Innovating News Understanding to Improve the Quality of Reading ExperienceZhengkui Wang, Soumyadeb Chowdhury, Malcolm Yoke-Hean Low, Wen Shan. 122-126 [doi]
- Applicability of Manually Crafted Convolutional Neural Network for Classification of Mild Cognitive ImpairmentHarsh Bhasin, R. K. Agrawal 0001. 127-131 [doi]
- Issues Related to EHR Blockchain ApplicationsValerio Mandarino, Giovanni Marotta, Giuseppe Pappalardo, Emiliano Tramontana. 132-137 [doi]
- Arithmetic Circuit Homomorphic Encryption Key Pairing Comparisons and Analysis between Elliptic Curve Diffie Hellman and Supersingular Isogeny Diffie HellmanWen Xin Khoo Joshua, Xin Wei Teoh Justin, Chern Nam Yap. 138-142 [doi]
- PCA Based Hierarchical CNN for the Classification of Mild Cognitive Impairments and the Role of SIREN ActivationsHarsh Bhasin, R. K. Agarwal. 143-148 [doi]
- Adaptive Digital Encounters: An approach for reducing digital impact on outpatient flowFahad Ahmed Satti, TaeChoong Chung, Sungyoung Lee. 149-154 [doi]