Abstract is missing.
- A Quantitative Evaluation Method for Cryptography Applications in Industrial Control SystemsDinghua Zhang, Quan Pan 0001, Yang Li. 1-7 [doi]
- Mobile Application SDK Version Detection and Security Alert Based on Multi-partition LSHSiyu Gao, Yuanying Xiao, Ye He, Jianfeng Wen. 8-12 [doi]
- Design of AI-Based TCM Prescription Analysis AppletTing-Ting Huang, Xue-fei Wang, Chen-Di Yuan, Fei Wang, Xin-Yue Wang, Zhen-Liang Huang, Jian-hua Li, Ze-Guo Shao. 13-18 [doi]
- AASH: A Lightweight and Efficient Static IoT Malware Detection Technique at Source Code LevelYasir Glani, Luo Ping, Syed Asad Shah. 19-23 [doi]
- Research on Test Task Management Scheduling of Integrated Test Platform Based on Improved Genetic AlgorithmDandan Guo, Luohui Xia, Yongjun Wang, Lili Liang, Cuiya Qin, Tongle Fan. 24-28 [doi]
- Improved SEIR Model Based on Recovery Rate Optimization to Predict COVID-19Shanzhi Yu, Fucheng Yang, Rongjia Han, Haiping Duan, Feifei Li, Peishun Liu. 29-34 [doi]
- Flight Arrival Delay Time Prediction Based on Machine LearningZiyu Wang, Hu Liu, Fengguo Chu. 35-39 [doi]
- An Intelligent Security Operation Method for Cloud-network Integration Services in Multi-cloud ScenesNishui Cai, Zhuxiang Deng, Hao Wu. 40-46 [doi]
- AYAT: A Lightweight and Efficient Code Clone Detection TechniqueYasir Giani, Luo Ping, Syed Asad Shah. 47-52 [doi]
- BiLSTM-CNN Text Emotion Analysis Based on Self Attention Mechanism and Dense ConnectionJianjun Sun. 53-58 [doi]
- Research on A Three-Dimensional Attention ModuleYance Fang, Yucheng Xie, Peishun Liu. 59-64 [doi]
- Some Blockchain Design Patterns for Overcoming Immutability, Chain-Boundedness, and Gas FeesValerio Mandarino, Giuseppe Pappalardo, Emiliano Tramontana. 65-71 [doi]
- An Integrated Neutrosophic SNA-MABAC Approach for Blockchain Applicability Evaluation in Sustainable Supply ChainsPeiwen Wang, Yan Lin, Zhiping Wang. 72-77 [doi]
- Research on the Application of Blockchain Smart Contract in Software Supply Chain ManagementShuaijianni Xu, Yaodong You, Yuanying Xiao. 78-83 [doi]
- Weather China: A 5G RCS Solution for Meteorological ServiceHanhua Qu, Wei Tang, Yanpeng Li, Siyuan Sun, Shibo Tang, Xiaoran Zhao. 84-92 [doi]
- Analysis to Mitigate Risks in Information Security for Management in Higher Education InstitutionsSegundo Moisés Toapanta T, Eriannys Zharayth Gómez Díaz, Carmita Ines Suarez, Angel Ernesto Huerta Vélez, Carmen Inés Huerta Suarez, Marcelo Zambrano Vizuete. 93-96 [doi]
- Classification of Diabetic Retinopathy via Vascular RemovalYingao Duan, Shiwen Wang, Hui Chen. 97-102 [doi]
- Semantic Segmentation Algorithm for Night Traffic Scene Based on Visible and Infrared ImagesXiaona Xie, Zhiyong Xu, Jiang Tao, Jianying Yuan, Sidong Wu. 103-108 [doi]
- SVC-based and Flow Assignment Strategy for Multi-path Concurrent Video Transmission with Low-LatencyJiling Cai, Feng Chen 0041, Daoping Zhu, Pingping Chen. 109-115 [doi]
- An Access Middleware for Sensor Traffic ControlXuejun Liang, Yunfeng Bian, Ting Lin, Gang Liu. 116-120 [doi]
- Using the Relationship between the Theory of Algebraic Fields and Number Theory for Developing Promising Methods of Digital Signal ProcessingIbragim E. Suleimenov, Dinara K. Matrassulova. 121-125 [doi]
- Hybrid Number Systems: Application for Calculations in Galois FieldsIbragim E. Suleimenov, Yelizaveta S. Vitulyova, Akhat S. Bakirov. 126-130 [doi]
- Deep Reinforcement Learning based Mobile Video Concurrent Multipath Transmission over Heterogeneous Wireless NetworksHaobin Mao, Feng Chen 0041, Sheng Zhang, Pingping Chen. 131-136 [doi]
- Optimal Load Scheduling Based on Mobile Edge Computing Technology in 5G Dense NetworkingLuohui Xia, Dandan Guo, Yongjun Wang, Dandan Sun, Weijing Zhen, Congrui Jing. 137-142 [doi]