Abstract is missing.
- Face Recognition Construction Site Access Control System Based on Open Source Computer VisionJiaying Qin, Kun Zhang. 1-4 [doi]
- Time series power anomaly detection based on Light Gradient Boosting MachineMin Lu, Lingyan Que, Xueqi Jin, Jun Liu, Lingling Pan. 5-8 [doi]
- Research on Mobile Caravan Insurance Recommendation Method Based on Machine LearningHongwei Li. 9-15 [doi]
- Application of Deep Learning in Ground Penetrating Radar Image RecognitionJie Yang, Fubin Song, Pengli Zhang, Jiaming Wang, Chao Cui. 16-20 [doi]
- Time Synchronization Accuracy Verification for Multi-Sensor SystemSongyu Yuan, Yuehua Li, Yong Chen, Chenghao Wang. 21-24 [doi]
- Application Practice of Electronic Information Engineering Technology in Communication IntelligenceDan Wu. 25-29 [doi]
- Applications of Smart Energy Integrated Service Platform in Optimization of Energy Utilization of CustomersGuangyao Miao, Bate Jin, Guobin Wang, Lele Wang, Hui Liu, Qiang Zheng, Jun Ma. 30-36 [doi]
- Research on Consensus Mechanism in Microgrid TransactionMing-Hui Deng, Zheng-Yi Tang, Wen-Yu Hu, Yao-Yuan Zhuang. 37-40 [doi]
- Rice Weed detection method on YOLOv4 convolutional neural networkDong Hu, Chao Ma, Zhihui Tian, Guohui Shen, Linyi Li. 41-45 [doi]
- A Survey on Consensus Mechanisms for Blockchain TechnologyWeiwei Gu, Jianan Li, Zekai Tang. 46-49 [doi]
- State-of-Charge Estimation of Lithium Battery Based on Transfer LearningZhenzhen Zhang, Zhaochu Yang, Chengyang Gan, Haakon Karlsen. 50-53 [doi]
- Genome Reconstruction problem : By using De Bruijn graphYutong Li. 54-57 [doi]
- Blockchain-based electric vehicle charging reputation management mechanismDa Huang, Zheng-Yi Tang, Wen-Yu Hu, Qiang-Zhi Wu. 58-61 [doi]
- Broad learning system based on ensemble learningYicheng Yan, Wei Guo, Liwen Wang. 62-67 [doi]
- Research on Information Sharing System of Digital Library in Cloud Computing EnvironmentWenlan Xie, Lingxiao Liang. 68-71 [doi]
- Research on Privacy Protection Method of User Activity Area Trajectory Based on Noise Prefix TreeJinyang Zhang, Jun Lang. 72-75 [doi]
- A Novel Non-binary Associative Memory based on Continuous Recurrent Neural NetworksCaigen Zhou, Jianjiang Yu, Jinsen Hu, Yifan Hu. 76-81 [doi]
- Reinforcement Learning with Deep Deterministic Policy GradientHaining Tan. 82-85 [doi]
- Review and Investigation of Merkle Tree's Technical Principles and Related Application FieldsShimin Jing, Xin Zheng, Zhengwen Chen. 86-90 [doi]
- Chinese short text classification method based on word embedding and Long Short-Term Memory Neural NetworkMingxia Gao, Jiayi Li. 91-95 [doi]
- Android Malware Detection Method Based on Multi-Features FusionHaisheng Yan, Xinqiang Ma, Qiang Li, Quanpeng Ji. 96-100 [doi]
- Research and Application of Iron Ladle Tracking Based on RFID Sensor TechnologyQiang Li, Xinqiang Ma, Haisheng Yan. 101-106 [doi]
- Research on Pedestrian Detection Method Based on Receptive Field ModuleXianyan Kuang, Jianhua Zhang. 107-112 [doi]
- Design and research on mechanism of walking-leg all-terrain robot mobile platformWen Wang, Qian Deng, Sang Peng Deng, Yu Ming Qi. 113-117 [doi]
- Meteor Tail: Octomap Based Multi-sensor Data Fusion MethodFeng Jiang, Yuehua Li, Songyu Yuan, Xinliang Zhong, Wenxuan Chen, Tian Xie. 118-121 [doi]
- News Article Name Disambiguation Model Based on Reinforcement LearningYi Ding. 122-127 [doi]
- Review on the functional form and development trend of energy internetDezhi Li, Qing Zou, Xiaowei Liu, Weizheng Kong, Junxia Meng. 128-132 [doi]
- Key Research on Recommendation Algorithms Based on Spatio-temporal Relationships in Location Social NetworksQingbo Sun. 133-136 [doi]
- News text classification based on Bidirectional Encoder Representation from TransformersDeping Lin, Hongjuan Wang, Mengyang Liu, Pei Li. 137-140 [doi]
- Research and Application of Intersection Similarity Algorithm Based on KNN Classification ModelWei Lv, Hongliang Huang, Weiyu Tang, Tao Chen. 141-144 [doi]
- Parameter prediction of power grid branch based on cross neural networkMin Lu, Lingyan Que, Xueqi Jin, Jun Liu, Lingling Pan. 145-149 [doi]
- Research on the Evolution Path of Sentiment Analysis Technology Based on BibliometricsYuan Ni, Teng Zhang, Lei Xu, Pengfei Han. 150-157 [doi]
- Summary of Data Mining and Analysis of Launch Vehicle Test Based on Small Sample Learning MethodYuwei Li, Linyu Yang, Xiangyu Liu, Long Cheng. 158-161 [doi]
- Research on Big Data Analysis Data Acquisition and Data AnalysisHong Li. 162-165 [doi]
- Safety Risk Management System in Electric Power Engineering Construction under the Background of Big DataCheng Zhao, Haomei Jia, Ran Gao, Shiqi Zheng, Fengzhi Wu, Han Wang. 166-170 [doi]
- Improved lightweight peanut detection algorithm based on YOLO v3Zhichao Shen, Zhiheng Zhao. 171-176 [doi]
- Research on Analysis and Prediction of Big Data of Chinese Medicinal Materials in R+HadoopHongyan Hu, Ying Xin, Xijie Wu, Chengfeng Bao, Lingzhen Yang, Laxinamujila Bai. 177-181 [doi]
- Research on Design of Online Integration System of Multimedia Database Based on Artificial IntelligenceYunguo Hong. 182-186 [doi]
- Prediction of ambient humidity at in-situ thermal desorption sitesHuande Jiang, Cheng Jin, Cun Chang, Huiming Xu. 187-190 [doi]
- Pedestrian Re-identification Method Based on Bilateral Feature Extraction Network and Re-rankingXiaxia Zhang, Ning Li, Ruixin Zhang, Guoqiang Li. 191-197 [doi]
- An intelligent prediction model of settlement deformation for the earth-rock damJie Yang, Guangchen Ma, Pengli Zhang, Chao Cui, Jiaming Wang. 198-201 [doi]
- Analysis of regional differences in scientific research performance of universities based on DEA-BCC model in 2019Qiu Yu, Peng Yan, Liu Chang. 202-205 [doi]
- Blockchain-based node data detection scheme for the Internet of Things systemWu Dandi, Huang Jian. 206-209 [doi]
- An Extracting and Labeling Algorithm for Connected Components in ImagesZhongsheng Li, Shuang Lou. 210-213 [doi]
- An ensemble variable selection method based on conditional mutual informationLei Fan. 214-218 [doi]
- A Log Analysis Technology Based on FP-growth Improved AlgorithmJin-bo Chen, Wenyu Hu, Kanghui Ying, Guo Nong Li. 219-223 [doi]
- Research on Cost-sensitive Classification Methods for Imbalanced DataYou Chen. 224-228 [doi]
- Cryptosystem Recognition Scheme Based on Convolution FeaturesYuan Chuxuan. 229-232 [doi]
- Interpretable Analysis of NARX Neural Network Prediction MPA-AUCDehua Chen, Wei Zhang, Kun Shao, Weiliang Zhao. 233-237 [doi]
- Research on instance-level data cleaning technologyKanghui Ying, Wenyu Hu, Jin-bo Chen, Guo Nong Li. 238-242 [doi]
- Prediction and Analysis of Amazon User Behavior Based on Long Short-Term Memory and Manual FeatureMingyi Li, Huimin Mao, Jiayu Hu, Bin Li. 243-247 [doi]
- Intelligent Optimization Algorithm Based on Big Data in Behavioral Finance of Securities InvestmentXuecong Zhang. 248-253 [doi]
- XRDI: A Database of X-Ray Dangerous ItemsYu Wang, Liming Yang, Zhuo Qing. 254-258 [doi]
- Document Encryption Method with Mechanism of Enigma MachineYuxiang Lin, Xin Xia, Jingyi Yang. 259-262 [doi]
- The Potential Customer's Background of the Chinese Electric Vehicle Market Base on Big DataJiaxuan Zhou, Yuhao Guo, Hui Huang, Ruohan Li, Yuke Gan. 263-268 [doi]