Abstract is missing.
- Electricity Price Forecast using Meteorology data: A study in Australian Energy MarketMing Zhao, Yangyang Shu, Shaowu Liu, Guandong Xu. 1-2 [doi]
- Computer-based Large-scale Construction Project Health Diagnosis SystemHui Tang, Wei Shi, Haiyan Xu, Chunwei Yang, Yi Guo, Lin Sheng. 1-4 [doi]
- Comparative study of Bitcoin price prediction using WaveNets, Recurrent Neural Networks and other Machine Learning MethodsLeonardo Felizardo, Roberth Oliveira, Emilio Del Moral Hernandez, Fabio Cozman. 1-6 [doi]
- Research on Social Network Inference Method Based on ConNIe AlgorithmHailiang Chen, Bin Chen 0003, Jian Dong, Lingnan He. 1-6 [doi]
- Object-based Image Discrimination Relationship RecognitionYan Li, Baopeng Zhang, Jiajie Tian, Rui Li, Sibo Wang 0006, Jianping Fan 0001. 1-6 [doi]
- Research on the Influence of Distributed Accounting Technology on AccountingYuan Zhang, Hai Liu, Jie Luo, Cao Zheng, Sijia Wang. 1-6 [doi]
- A Case Study of Predicting Banking Customers Behaviour by Using Data MiningXujuan Zhou, Ghazal Bargshady, Moloud Abdar, Xiaohui Tao, Raj Gururajan, Ka C. Chan. 1-6 [doi]
- Word Sense Guessing: A Knowledge Graph based ApproachYiming Wei, Zhikun Peng, Tan Dai. 1-2 [doi]
- Domain-Camera Adaptation for Unsupervised Person Re-IdentificationJiajie Tian, Zhu Teng, Yan Li, Rui Li, Yi Wu, Jianping Fan 0001. 1-4 [doi]
- A Preliminary Study for The Risk of Probabilistic Blockchain ProtocolsButi Sello, Xiaohui Tao, Jianming Yong. 1-4 [doi]
- AI-Tutor: Generating Tailored Remedial Questions and Answers Based on Cognitive Diagnostic AssessmentWenbin Gan, Yuan Sun, Shiwei Ye, Ye Fan, Yi Sun. 1-6 [doi]
- WeaGAN: Generative Adversarial Network for Weather Translation of Image among Multi-domainYating Lin, Yidong Li, Haidong Cui, Zheng Feng. 1-5 [doi]
- UHF RFID Information Security Transmission Technology and Application Based on Domestic Cryptographic AlgorithmMengfan Tian, Junpeng Qi, Rui Ma. 1-4 [doi]
- An Efficient Location Privacy Preserving Model based on GeohashWei Xiang. 1-5 [doi]
- The Multi-product Newsvendor Problem: Review and ExtensionsMengting Mu, JunLin Chen, Yu Yang, Jian Guo. 1-4 [doi]
- Evaluating Connection Quality between Two Individuals in Social NetworksYi Chen, Peihuang Huang, Longkun Guo. 1-6 [doi]
- Kubestorage: A Cloud Native Storage Engine for Massive Small FilesFuxin Liu, Jingwei Li, Yihong Wang, Lin Li. 1-4 [doi]
- Research progress and Application of Behavior Tree TechnologyRuifeng Liu, Jiasheng Wang, Haolong Zhang, Mengfan Tian. 1-4 [doi]
- The Effect of Urbanization Quality on Resident Consumption in ChinaMiao Wei, Xiqin Hu, Wenwen Oin, Kai Xu. 1-4 [doi]
- Research on the Optimization of Train-set Rostering Plan of Intercity RailwayLinchai Zhou, Yixiang Yue. 1-4 [doi]
- Prediction and Analysis of Rumour's Impact on Social MediaJun Yin, Shaowu Liu, Qian Li, Guandong Xu. 1-6 [doi]
- Procrastination on Social Networks: Types and TriggersAbdulaziz Alblwi, Angelos Stefanidis, Keith Phalp, Raian Ali. 1-7 [doi]
- The Dynamic Factors of Guangdong's Economic Growth from the Perspective of Supply-side ReformZiyu Xu, Jin Wu. 1-4 [doi]
- An Extraction-Abstraction Hybrid Approach for Long Document SummarizationSi Huang, Rui Wang, Qing Xie 0002, Lin Li 0001, Yongjian Liu. 1-6 [doi]
- he Innovative Education of "Smart Finance" under the Promotion of Educational InformationizationYuan Zhang, Yi Wu, Murong Zheng, Xinyi Lin, Yutong Zhang. 1-8 [doi]
- How do the personality traits affect observational behaviors when judging whether smiles are genuine or not?Kuangzhe Xu, Hiyori Tagami, Toshihiko Matsuka. 1-6 [doi]
- Adaptive Multi-Threshold Energy-Aware Virtual Machine Consolidation in Cloud Data CenterYingyue Hu, Ding Ding, Kaixuan Kang, Tingting Li. 1-6 [doi]
- Big Data Analysis of Financial Risk and Avoidance Strategy - Based on Futures IndustryYuan Zhang, Cao Zheng, Yutong Zhang, Murong Zheng, Xinyi Lin, Sijia Wang. 1-6 [doi]
- Single Image Dehazing Algorithm Based on Sky SegmentationYuan Tang, Teng Huang, Chuanming Song 0001. 1-4 [doi]
- Sentence-Level Sign Language Recognition Using RF signalsXianjia Meng, Lin Feng, Xiao Yin, Huanting Zhou, Chang Sheng, Chongyang Wang, Anxun Du, Linzhi Xu. 1-6 [doi]
- Fear of Missing Out (FoMO) as Really Lived: Five Classifications and one EcologyAarif Alutaybi, John McAlaney, Emily Arden-Close, Angelos Stefanidis, Keith Phalp, Raian Ali. 1-6 [doi]
- A Comparative Analysis of the Characteristics of International Entrepreneurship in Emerging EconomiesJin Wu, Zivu Xu, Linze Wu. 1-4 [doi]
- Research and Analysis of User Behavior Fingerprint on Security Situational Awareness Based on DNS LogZhuosheng Jia, Zhen Han. 1-4 [doi]
- Deep neural network-based classification model for Sentiment AnalysisDonghang Pan, Jingling Yuan, Lin Li, Deming Sheng. 1-4 [doi]
- Combining Q&A Pair Quality and Question Relevance Features on Community-based Question RetrievalDong Li, Lin Li, Dong Zhou. 1-4 [doi]
- The Social Mentality of Netizens in the Guangdong-Hong Kong-Macao Greater Bay Area: Big Data Monitoring of Social MediaZhongxuan Lin, Lingnan He, Kaisheng Lai. 1-4 [doi]
- An Item Recommendation Approach by Fusing Images based on Neural NetworksWeibin Lin, Lin Li, Dong Li. 1-4 [doi]
- How Patent Protection Policies and Collectivism Culture Together Impact National Innovation?Ting Xue, Yantong Di. 1-4 [doi]
- A New Signcryption Scheme without Hash or Redundant functionsWenjun Cui, Mingsheng Hu, Zhijuan Jia, Lipeng Wang. 1-4 [doi]
- Efficient Semantic Enrichment Process for Human Trajectories in Surveillance VideosFangzhou Bao, Xiaoyu Sun, Weilan Luo, Xintao Liu, Genlin Ji, Bin Zhao. 1-4 [doi]
- Learning Structural Similarity with Evolutionary-GAN: A New Face De-identification MethodJuan Song, Yi Jin, Yidong Li, Congyan Lang. 1-6 [doi]
- An Integration Method Of Classifiers For Abnormal Phone DetectionYahan Yuan, Ke-ji, Runyuan Sun, Kun Ma, Zhenxiang Chen, Lin Wang. 1-6 [doi]
- Makeup based on segmentation and local transferYuanhan Zhang, Haidong Cui, Yidong Li, Zheng Feng. 1-6 [doi]
- Improved Biclustering Algorithm Based on Weighted Mean Square ResidualWenhua Liu, Yaxin Hou, Yidong Li, Hongwei Zhao. 1-5 [doi]
- TPM: A GPS-based Trajectory Pattern Mining SystemYang Cao, Jingling Yuan, Song Xiao, Qing Xie. 1-4 [doi]
- Personalized Recommendation Method of POI Based on Deep Neural NetworkYuan Gao, Zhizhou Duan, Weifeng Shi, Jun Feng 0003, Yao-Yi Chiang. 1-6 [doi]
- Technologies of Production with Society 5.0Keishi Matsuda, Shiro Uesugi, Kazuaki Naruse, Masahiro Morita. 1-4 [doi]
- Effect of Doctor's Reputation on Patient Appointment in Online Health CommunitiesQiuju Yin, Yijie Wang, Guofeng Zhan, Lun Li. 1-6 [doi]
- Corruption and enterprise innovation under the background of transition in ChinaQibo Jiang, Oinamei Tan. 1-5 [doi]
- Dynamic evolution of sentiments in Never Let Me Go: Insights from quantitative analysis and implicationsQiyue Hu, Bin Liu, Mads Rosendahl Thomsen, Jianbo Gao, Kristoffer L. Nielbo. 1-6 [doi]
- Research on Train Formation Plan Optimization in Railway Network Based on Branch-and-Price AlgorithmWei Xiao, Yixiang Yue, Feng Chen. 1-4 [doi]
- The hypergraph matching based on CCRPJun Zhou, Tao Wang, Yi Jin. 1-6 [doi]
- Protecting Privacy in Digital Era on Cloud Architecture for Banking and Financial Services IndustryAbhishek Mahalle, Jianming Yong, Xiaohui Tao. 1-6 [doi]
- GA for QoS Satisfaction Degree Optimal Web Service Composition Selection ModelMinghua Chen, Qingjun Wang, Wei Sun, Xiaoying Song, Na Chu. 1-4 [doi]
- Vehicle Detection in Distorted Driving Video Based on Metric Learning and Single Shot MultiBox DetectorFanghui Zhang, Yi Jin, Shichao Kan, Linna Zhang, Yigang Cen, Jin Wen. 1-6 [doi]
- 3D-Mask-GAN: Unsupervised Single-View 3D Object ReconstructionQun Wan, Yidong Li, Haidong Cui, Zheng Feng. 1-6 [doi]
- The Effect of Online Reviews on E-book Pricing: A Text Analytics ApproachKang Li, Lunchuan Zhang, Wei Xu 0008, Dinglu Pan, Wenping Zhang. 1-6 [doi]
- †Kai Liu, Tianjiao Wang, Jun Wu, Yidong Li. 1-7 [doi]
- User Behavior Redibility Evaluation Model Based on AHP and Rough Set and Game TheoryHaidong Cui, Zheng Feng, Dongfang Ma. 1-6 [doi]
- Entropy-Based Model Selection Using Monte Carlo MethodMasaki Satoh, Takao Miura. 1-4 [doi]
- Twitter Analysis for Depression on Social Networks based on Sentiment and StressXiaohui Tao, Ravi Dharmalingam, Ji Zhang 0001, Xujuan Zhou, Lin Li, Raj Gururajan. 1-4 [doi]
- Content Characteristics and Transmission Strategies of Social Media Rumors in China: Big Data Analysis of WeChat RumorsLingnan He, Jing Gu, Dan Li, Kaisheng Lai. 1-5 [doi]
- Micro-blog User Profiling: A Supervised Clustering based Approach for Age and Gender ClassificationJing Qiu, Lin Li, Yunpei Zheng. 1-4 [doi]
- Identification of epileptic discharge based on statistical analysis and fractal analysisQiong Li, Ziwen Zhang, Qi Huang, Yuan Wu, Jianbo Gao. 1-6 [doi]
- Multi-Attribute Data Visualization Analysis Model for MultimediaJun Wu, Yaoxin Chen. 1-4 [doi]
- Social Transparency in Enterprise Information Systems: Peculiarities and Assessment FactorsTahani Alsaedi, Angelos Stefanidis, Keith Phalp, Raian Ali. 1-4 [doi]
- The Importance of Data Assets and Its Accounting Confirmation and Measurement MethodsYuan Zhang, Yuanxin Huang, Dingqing Zhang, Yuxiao Qian. 1-8 [doi]
- Actively Semi-Supervised Collaborative FilteringWei Cui, Jun Wu. 1-6 [doi]