Abstract is missing.
- 3R: Word and Phoneme Edition based Data Augmentation for Lexical Punctuation PredictionAihua Zheng, Naipeng Ye, Xiao Wang 0014, Xiao Song. 1-5 [doi]
- A multi-critic deep deterministic policy gradient UAV path planningRunjia Wu, Fangqing Gu, Jie Huang. 6-10 [doi]
- Linear Elements Separation via Vision System Feature and Seed Spreading from Topographic MapsFei Xie, Yanning Zhang, Xinming Guo, Wei Zhang, Zhaoyong Zhou, Pengfei Xu 0003. 11-15 [doi]
- Binary Image Geometric Calculation Algorithm Based on SNAM RepresentationCaixu Xu, Guo Hui, He Jie. 16-19 [doi]
- Deep Hashing Using N-pair Loss for Image RetrievalLiefa Liao, Zhiming Li. 20-24 [doi]
- A Flower Classification Method Combining DenseNet Architecture with SVMLiefa Liao, Saisai Zhang. 25-29 [doi]
- A optimized YOLO method for object detectionTianjiao Liang, Hong Bao. 30-34 [doi]
- Generalized orthogonal momentYijian Zhang, Zhou Yuan, Jianwei Yang. 35-39 [doi]
- Panoptic Feature Pyramid Network Applications In Intelligent TrafficChang Lu, Xiaochun Lei, Junlin Xie, Xiaolong Wang, XiangBoge Mu. 40-43 [doi]
- A Modified Contracting BFGS Update for Unconstrained OptimizationYiming Zhang. 44-48 [doi]
- Multi-objective Ant Colony Algorithm Based on Pheromone WeightLei Yang, Xiaotian Jia, Ganming Liu. 49-53 [doi]
- Reliable Routing Design in Predictable Wireless Networks with Unreliable LinksMengmeng Xu, Hai Zhu, Hengzhou Xu, Jiongjiong Song, Zhen Luo. 54-58 [doi]
- The 5G NOMA networks planning based on the multi-objective evolutionary algorithmJinli Zhang, Jiexin Li, Mingjiao Cai, Dining Li, Qiang Wang. 59-62 [doi]
- Electro-optic Combination Coherent Communication System Based On OCDMA TheoryPeng Zhou, Ye Lu, Dong Cheng, Chuanqi Li. 63-67 [doi]
- Prediction of Air Quality in Major Cities of China by Deep LearningChoujun Zhan, Songyan Li, Jianbin Li, Yijing Guo, Quansi Wen, WeiSheng Wen. 68-72 [doi]
- Chinese Coreference Resolution via Bidirectional LSTMs using Word and Token Level RepresentationsKun Ming. 73-76 [doi]
- Technology of Image Steganography and Steganalysis Based on Adversarial TrainingHan Zhang, Zhihua Song, Boyu Feng, Zhongliang Zhou, Fuxian Liu. 77-80 [doi]
- Domain-Specific Chinese Transformer-XL Language Model with Part-of-Speech InformationHuaichang Qu, Haifeng Zhao, Xin Wang. 81-85 [doi]
- The errors analysis of natural language generation - A case study of Topic-to-Essay generationPing Cai, Xingyuan Chen, Hongjun Wang 0002, Peng Jin. 86-89 [doi]
- Graph-based Bayesian Meta Relation ExtractionZhen Wang, Zhenting Zhang. 90-94 [doi]
- Intelligent decision-making based on neural network and simulation in two Islands air defense operationXianguang Liu, Wenfei Wang, Xiaojie Zhang, Han Zhang, Zhihua Song, Zhongliang Zhou. 95-99 [doi]
- A Deep Framework for Cell Mitosis Detection in Microscopy ImagesJian Shi, Yi Xin, Benlian Xu, Mingli Lu, Jinliang Cong. 100-103 [doi]
- Review of Image Classification Method Based on Deep Transfer LearningChuanzi Li, Jining Feng, Li Hu, Junhong Li, Haibin Ma. 104-108 [doi]
- Improved Spatio-Temporal Convolutional Neural Networks for Traffic Police Gestures RecognitionZhixuan Wu, Nan Ma, Yiu-ming Cheung, Jiahong Li, Qin He, Yongqiang Yao, Guoping Zhang. 109-115 [doi]
- Machine Translation Based on Domain Adaptive Language ModelLingling Li, Xianlong Chen, Yiling Xu. 116-120 [doi]
- Ternary Compound Matching of Biomedical Ontologies with Compact Multi-Objective Evolutionary Algorithm Based on Adaptive Objective Space DecompositionXingsi Xue, JiaWei Lu, Junfeng Chen. 121-125 [doi]
- Sliding Mode Control of Truss Bridge Structure with GMMAsYalin Chen, Zhijun Li, Bin Dong, Shuangyang Zuo. 126-130 [doi]
- Research and Application of Multi-Round Dialogue Intent Recognition MethodJie Song, Qifeng Luo, Jichang Nie. 131-135 [doi]
- Meter Recognition And Reading System Based On Machine CarXiaolong Wang, Junyan Chen, Yongqing Tang, Jie Gao, Xingbo Wang, Pufan Zhan. 136-139 [doi]
- Application of the EfficientDet Algorithm in Traffic Flow StatisticsKaihao Lin, Junyan Chen, Aoge Chen, Hu Huang. 140-143 [doi]
- Design and Implementation of the Optimization Algorithm in the Layout of Parking Lot GuidanceZbendong Liu, Yurong Yang, Dongyan Li, Xiaofeng Li, Xinrong Lv, Xi Chen. 144-148 [doi]
- Performance Analysis of Scheduling Algorithms in Apache HadoopYang Li. 149-154 [doi]
- Safety helmet detection method based on YOLO v4Benyang Deng, Xiaochun Lei, Miao Ye. 155-158 [doi]
- A Brief Review of Two Classical Models for Asset AllocatingYa-juan Yang, Liang-Liang Zhang, Yi Niu, Ouan-Ju Zhang. 159-163 [doi]
- Research on the Transformation and Development Strategy of Guangdong Independent College Based on SWOT-AHPHai-Dong Li, Lan Zhang. 164-168 [doi]
- Research on the Dimensions and Influencing Factors of Enterprise Humanism Management - An Empirical Study Based on the Questionnaire of Dongguan EnterprisesCheng-Jun Wang, Han-Ming Xu, Ming-Hua Jiang. 169-173 [doi]
- Analysis on Developing Dongguan's Badminton Training MarketLe Yu, Lun Yu. 174-178 [doi]
- Analysis on the Impact of China's Foreign Trade Pattern in the process of the Reduction of Carbon Emission Intensity in ChinaYong-Ting He, Zhi-Gang Tang. 179-185 [doi]
- Kernel Non-Negative Matrix Factorization Using Self-Constructed Cosine KernelHuihui Qian, Wen-Sheng Chen, Binbin Pan, Bo Chen 0004. 186-190 [doi]
- An Optimization Method for Elasticsearch Index Shard NumberBizhong Wei, Jian Dai, Liqiang Deng, Haiyan Huang. 191-195 [doi]
- A kind of problem for hypermonogenic functions in Clifford analysisZhongwei Si. 196-200 [doi]
- Numerical Analysis of Influence of Medicine Cover Structure on Cutting DepthKai Li, Chang Liu, Yang Hu, Changshuan Wang, Wei Peng, Qiang Gao, Yun Zhang, Tongsheng Shu, Wensheng Wang, Chengwen Lei, Lin Liu, Junfeng Chen. 201-205 [doi]
- Energy Accumulating Cutting Technology in Steel Plate Cutting of Reservoir GateKai Li, Chang Liu, Yang Hu, Changshuan Wang, Wei Peng, Qiang Gao, Yun Zhang, Tongsheng Shu, Wensheng Wang, Chengwen Lei, Lin Liu, Junfeng Chen. 206-209 [doi]
- New Equivalent Circuit of Oil-Paper Insulation and Its Parameters IdentificationDehua He, Ruliang Wang. 210-212 [doi]
- Design of Intelligent Fighting Robot ConstructionQinghua Meng, Youli Long, Ruiyang Wang, Fuxian He, Xuheng Lu, Xin Huang. 213-216 [doi]
- Efficient attribute reduction based on rough sets and differential evolution algorithmSi-Yuan Jing, Jun Yang. 217-222 [doi]
- Fuzzy C-means clustering algorithm for automatically determining the number of clustersZhihe Wang, Shuyan Wang, Hui Du, Hao Guo. 223-227 [doi]
- Enterprise Credit Risk Assessment Using Feature Selection Approach and Ensemble Learning TechniqueDi Wang, Zuoquan Zhang. 228-233 [doi]
- The Improvement on Self-Adaption Select Cluster Centers Based on Fast Search and Find of Density Peaks ClusteringHui Du, Yiyang Ni. 234-237 [doi]
- Emotional Analysis on the Public Sentiment of Students Returning to University under COVID-19Liping Jia, Zhonghua Li. 238-242 [doi]
- A novel additive consistency for intuitionistic fuzzy preference relationsXiao-Yun Lu, He-Cheng Li. 243-247 [doi]
- Data Preprocessing Method For The Analysis Of Incomplete Data On Students In PovertyHaiyan Huang, Bizhong Wei, Jian Dai, Wenlong Ke. 248-252 [doi]
- Beetle Antennae Search Algorithm for Community Detection in Complex NetworkLiefa Liao, Fan Zhang. 253-258 [doi]
- A Novel Hybrid Tabu Search Algorithm With Binary Differential Operator for Knapsack ProblemsJun Hu, Qingfu Zhang 0001, Yong-Chang Jiao. 259-263 [doi]
- A Differential Evolution Algorithm with Adaptive Strategies for Constrained Optimization ProblemCuo Wanma, Hecheng Li, Erping Song. 264-268 [doi]
- An Improved Differential Evolution for Constrained Multi-Objective Optimization ProblemsErping Song, Hecheng Li, Cuo Wanma. 269-273 [doi]
- Order of Servers for Periodic Multi-Installment SchedulingHui Wang, Xiaobo Song, Zhihao Tong, Xiaoli Wang. 274-277 [doi]
- Attacking FPGA-based Dual Complementary AES Implementation Using HD and SD ModelsWenlong Cao, Fan Huang, Mengce Zheng, Honggang Hu. 278-282 [doi]
- The security and privacy of blockchain-enabled EMR storage management schemeGuangfu Wu, Yingjun Wang. 283-287 [doi]
- A Mobile Application of Face Recognition Based on Android PlatformWei Deng, XinLun Zhang, Zhe Jiang. 288-292 [doi]
- Reverse logistics network design model for used power battery under the third-party recovery modeQian Guan, Yuxiang Yang. 293-297 [doi]
- SLFB-CNN: An interpretable neural network privacy protection frameworkDe-li, Yuhang Hu, Jinyan Wang. 298-302 [doi]
- RVBT: A Remote Voting Scheme Based on Three-BallotJun Yang, Siyuan Jing, Liping Jia. 303-307 [doi]
- Full Coverage Detection of Immune Detector for Public Data SetCaiming Liu, Yan Zhang 0015, Qin Li 0019, Luxin Xiao. 308-312 [doi]
- Credit Platform Construction of Vocational Education Group Based on BlockchainJie Chen, Xian Su, WeiSheng Wen, Hao-Tian Wu. 313-317 [doi]
- Unsupervised learning based target localization method for pantograph videoRui Sun, Liming Li, Xingjie Chen, Ji Wang, Xiao-dong Chai, Shubin Zheng. 318-323 [doi]
- Image Super-Resolution Reconstruction Based on Online dictionary learning AlgorithmChunman Yan, Yuyao Zhang. 324-327 [doi]
- The Covariance Matrix Evolution Strategy Algorithm Based On Cloud Model And Cholesky FactorLei Yang, Neng Li, Yitian Chen, Haoran Chen, Zhihao Chen, Decai Liang. 328-332 [doi]
- A differential evolution SAF-DE algorithm which jumps out of local optimalHuChunAn, Wenhao. 333-337 [doi]
- Chinese Sentiment Classification Model of Neural Network Based on Particle Swarm OptimizationYaling Zhang, Jiale Li, Shibo Bai. 338-341 [doi]
- A Neural Network-Based Intelligent Decision-Making in the Air-Offensive Campaign with SimulationGang Hu, Chuhan Zhou, Xiaojie Zhang, Han Zhang, Zhihua Song, Zhongliang Zhou. 342-346 [doi]
- The seismic electromagnet signal recognition using convolutional neural networkWei Ding, Ji Han, Dijin Wang. 347-350 [doi]
- Predicting Algorithms and Complexity in RNA Structure Based on BHGZhendong Liu, Yurong Yang, Xinrong Lv, Dongyan Li, Xi Chen, Xiaofeng Li. 351-355 [doi]
- SM9 Digital Signature with Non-repudiationMeng Wang, Yihong Long 0002. 356-361 [doi]
- A New Feature Selection Method for Intrusion Detection System Dataset - TSDR methodTao Yu, Zhen Liu, Yuaning Liu, Huaibin Wang, Nodir Adilov. 362-365 [doi]
- A Convolutional Encoder Network for Intrusion Detection in Controller Area NetworksXing Zhang, Xiaotong Cui, Kefei Cheng, Liang Zhang. 366-369 [doi]
- Connected Domain Algorithm Based on Asymmetric Square NAMCen Caichun, He Jie, Guo Hui. 370-373 [doi]
- A High Accuracy DNS Tunnel Detection Method Without Feature EngineeringYang Chen, Xiaoyong Li. 374-377 [doi]