Abstract is missing.
- Unsupervised Anomalous Sound Detection For Machine Condition Using Memory-augmented Deep AutoencoderKun Wang, Zhao Lv. 1-5 [doi]
- A Specific Public Sentiment Clustering Problem Based on Hybrid Bat AlgorithmLiping Jia, Zhonghua Li. 1-5 [doi]
- Analysis of the factors influencing the imbalance of regional economic development in the Pearl River DeltaKong-Yan Chen, Li-Jun Yang, Chao Zhang. 1-5 [doi]
- FA-STDP: Feedback Alignment Learning Algorithm Using Spike Timing Dependent PlasticityTingyu Ren, Xianghong Lin, Xiaofei Yang, Xiangwen Wang. 1-5 [doi]
- Machine Learning based Fitness Landscape Smoothing for Guiding Evolutionary OptimizationChao Lyu, Lijun Sun, Yuhui Shi. 6-10 [doi]
- Feature Selection Method for Automatic Sleep Staging based on Genetic AlgorithmWeilun Yu, Dazhi Jiang, Yu Huang, Jiali Lin. 11-15 [doi]
- A Multi-Objective Decomposition Based Evolutionary Algorithm Using Adaptive Searching MethodXiaofang Guo. 16-20 [doi]
- Active Update of Mutation Matrix Adaptation for Variable Metric Evolution StrategyHuilin Cheng, Zhenhua Li, Detian Yang, Shu-you, Xinye Cai. 21-25 [doi]
- An Improved Neural Network Algorithm for Intelligent Object RecognitionBo Li, Shiwei Wei, Qinghui Hu, Zan Qiu, Jingyi Yan. 26-29 [doi]
- The Short-Time Fourier Transform based WiFi Human Activity Classification AlgorithmYier Lin, Yin Tian. 30-34 [doi]
- An Adaptive Exploratory Q-Learning Algorithm for Multiple Target Path PlanningHaowen Jia, Zijian Cao 0001, Zhenyu Wang, Yanfang Fu. 35-39 [doi]
- A Selective Ensemble Classifier Using Multiobjective Optimization Based Extreme Learning Machine AlgorithmLixia Bai, Hong Li, Weifeng Gao. 40-44 [doi]
- A Novel Projective Nonnegative Matrix Factorization Based on Fisher Discriminant AnalysisZixin Lian, Wen-Sheng Chen, Binbin Pan. 45-49 [doi]
- An Improved ACO Algorithm to Vehicle Routing Problem with Time Windows and UncertaintyHuilin Chen, Xiaoquan Cai, Fangqing Gu, Shengbing Xu. 50-54 [doi]
- RNA Tertiary Structure Prediction Algorithm at Atomic AccuracyYurong Yang, Zhendong Liu, Xinrong Lv, Dongyan Li, Xi Chen, Xiaofeng Li. 55-59 [doi]
- Predicting Methods of Transcription Factor Binding SitesDongyan Li, Zhendong Liu, Xi Chen, Yurong Yang, Xinrong Lv, Xiaofeng Li, Qiuhuan Shi. 60-64 [doi]
- Predicting Algorithm of DNA Recombination Site Based on Machine LearningXi Chen, Zhendong Liu, Yurong Yang, Xinrong Lv, Dongyan Li, Xiaofeng Li. 65-69 [doi]
- Deconvolute Gene Expression Based on Deep Learning in Scrna-SeqXinrong Lv, Zhendong Liu, Dongyan Li, Xi Chen, Yurong Yang, Xiaofeng Li, Qiuhuan Shi. 70-74 [doi]
- Transfer Learning and Attention Mechanism for Breast Cancer ClassificationChenyang Wang, Feng Xiao, Wenjuan Zhang, Shujuan Huang, Wanyu Zhang, Pinrong Zou. 75-79 [doi]
- Label propagation community detection algorithm based on density peak optimizationYan Ma, Guoqiang Chen. 80-84 [doi]
- RelNet: Relevance-Based Punctuation Prediction Network in SpeechHaifeng Zhao, Xing Chen, Xin Wang, Shilei Huang. 85-89 [doi]
- Dropout Token To Improve Neural Language ModelPeng Jin, Lingjiao Xu, Bing Wang, Xingyuan Chen. 90-93 [doi]
- Driving Action Recognition Based on 3D ConvolutionHaoqi Duan, Chao Zhang, Zhao Lv. 94-98 [doi]
- Efficient Audio-Visual Speaker Recognition Via Deep Multi-Modal Feature FusionYufei Wang. 99-103 [doi]
- An Unified Model by Combining Multiple Methods for Integrating Constituent into Chinese Semantic Role LabelingHaoyun Miao. 104-107 [doi]
- Garbage Classification Method Based on YOLOv3Rencao Jin, Hongfei Huang, Shihao Jiang, Hua Zhang, Yifan Wu, Guojun Dai. 108-112 [doi]
- Adversarial Training with Gated Convolutional Neural Networks for Robust Speech RecognitionXudong Lv, Si-Bao Chen 0001, Xin Wang. 113-117 [doi]
- The Out-of-Vocabulary Spelling Correction Model in a New Domain for End-to-End Automatic Speech RecognitionPeng Zhao, Baowei Tang, Chen Liao, Xin Wang. 118-122 [doi]
- Class-Based Deep Non-Negative Matrix Factorization Algorithm for Facial Image RepresentationWen-Sheng Chen, Zihao Zhan, Binbin Pan, Bo Chen 0004. 123-127 [doi]
- Special Object Detection Based On Mask RcnnMiaomiao Chen, Fengshan Bai, Z. Gerile. 128-132 [doi]
- Building Detection in Remote Sensing Image Based on Improved YOLOV5Wei Ding, Li Zhang. 133-136 [doi]
- Gradient-based Dynamic DropoutLimin Ma, Xingyuan Chen, Bin Wang, Peng Jin. 137-140 [doi]
- Human-Machine Collaborative Classification Model for Industrial Product DefectYiyang Liu, Ke Wang, Xinle Cheng. 141-145 [doi]
- DenseNet with Orthogonal Kernel for Infrared and Visible Image FusionXiaohan Jiang, Rencan Nie, Chengchao Wang, Xue Wang, Shishuang Yu. 146-150 [doi]
- CAGU-Net: Category Attention Guidance U-Net for Retinal Blood Vessel SegmentationKexin Sun, Yuelan Xin, Yunliang Qi, Meng Lou, Kai Ye, Yinru Ye. 151-155 [doi]
- A Recommendation Model Based on Heterogeneous Information Network InteractionZongli Jiang, Jingwen Li, Nan Ma. 156-161 [doi]
- Naive Bayesian Classifier Based Semi-supervised Learning for Matching OntologiesXingsi Xue, Dequ Chen, Wenyu Liu 0004. 162-167 [doi]
- Asset Price Prediction via Machine-Learning Method: A ReviewYa-juan Yang, Bing Chen 0001, Liang-Liang Zhang. 168-172 [doi]
- Virtual Training Scheme for Practice Education in "New Business" DisciplinesYa-juan Yang, Chao Zhang, Yu-Wei Tan. 173-177 [doi]
- Construction of The Multi-cooperative Training Model for Skilled Talents - Taking the Guangdong-Hong Kong-Macao Greater Bay Area as an exampleDongyi He. 178-182 [doi]
- Study on MindSpore Deep Learning FrameworkZhihao Tong, Ning Du, Xiaobo Song, Xiaoli Wang. 183-186 [doi]
- A Classification Method Based on Multifactor Dimensionality Reduction for Biosafety Threat Defense Capability EvaluationJunan Chen, Zhiwen Tan, Daqi Guo, Lei Chen. 187-191 [doi]
- A New Classifier by Remixing Features and Adjusting Logits for Long-Tailed Visual DataXiyan Deng, Yuping Wang, Minqi Li. 192-196 [doi]
- An Adaptive MPC Trajectory Tracking Algorithm For Autonomous VehiclesGe Chang, Qian Suqin. 197-201 [doi]
- Double Auction-Based Dynamic Role Assignment AlgorithmFan Liu, Fangzhen Ge, Xiang Li, Longfeng Shen, Xiaocheng Li. 202-206 [doi]
- An individual decision-making method with intuitionistic fuzzy preference relationsXiao-Yun Lu, He-Cheng Li, Qiong Hao. 207-211 [doi]
- Research on Control Method of Self-driving Vehicle Based on Adaptive Fuzzy PIDYongqiang Yao, Nan Ma, Jiahong Li, Zhixuan Wu, Guoping Zhang. 212-216 [doi]
- Gesture Recognition Algorithm Based on Lightweight 3DCNN NetworkGuoping Zhang, Nan Ma, Jiahong Li, Beiyan Jiang, Zhixuan Wu. 217-221 [doi]
- Fast Convergent Consensus of High-order Continuous-time Multi-agent SystemsXin-Lei Feng. 222-226 [doi]
- Solving Complex LR-Trapezoidal Fuzzy Linear SystemsYing Chen, Xiaobin Guo. 227-231 [doi]
- A Feature Selection-Based XGBoost Model for Fault PredictionRan Duan, You Li, Baohua Qiang, Laixin Zhou. 232-236 [doi]
- Design of Vehicle Cooperative localization System Based on Cooperative Communication Switching StrategyJiahong Li, Nan Ma. 237-241 [doi]
- Internal Model Control for Rank Defect Systems based on PSO AlgorithmBeiyan Jiang, Nan Ma. 242-246 [doi]
- An Immune Algorithm for Network Data Security DetectionYan Zhang 0015, Caiming Liu. 247-251 [doi]
- An Automatic Heterogenous-Based MAX-MIN Ant System with Pheromone Reconstruction MechanismCancan Wang, Wei Li, Ying Huang. 252-256 [doi]
- Asymptotically Stable Fault Tolerant Control for Nonlinear Systems Through Differential Game TheoryHongbing Xia, Jinzhou Bao, Ping Guo. 262-266 [doi]
- Design and Implementation of Automatic Sleep Staging based on ECG SignalsWeilun Yu, Dazhi Jiang, Wenxin Zeng, Jiali Lin. 267-271 [doi]
- An Unstructured Array Camera System with Scalable CapabilityShuo Li, Lianshan Yan, Tao Yao. 272-276 [doi]
- Hyperspectral Image High-resolution via Subspace-Based Non-Convex Arctangent-Rank RegularizationManli Niu, Xiaoli Sun, Xiujun Zhang. 277-284 [doi]
- Global Adaptive Optimization Parameters For Robust Pupil LocationYang Wang, Xiaoyi Lu, Wenjun Zhou. 285-289 [doi]
- Construction of Deterministic Compressed Sensing Matrices in Singular Linear SpaceHaixia Guo, Yaping Wang. 290-293 [doi]
- Application of improved Landweber algorithm for ECT image reconstructionXiaomin Liu, Chunman Yan. 294-298 [doi]
- Salient Object Detection Based on Multi-layer Cascade and Fine BoundaryDengdi Sun, Xiangjie Lv, Shilei Huang, Lin Yao, Zhuanlian Ding. 299-303 [doi]
- Development and Application of Facial Makeup TransferFenglu Zhang, Chunman Yan. 304-308 [doi]
- A Novel Contrast Operator for Robust Object SearchingYuhang He, Sheng Xiang, Wenjun Zhou, Bo Peng, Ruohan Wang, Linman Li. 309-313 [doi]
- A Novel Assessment Method of Cracks Width Quantitative Model Based on Computer VisionPeng Sun, Ziyan Wu, Yifan Zhang, Jun Wu. 314-317 [doi]
- Moving Trajectory Based Traffic Police Gesture Recognition Via Time Series ClassificationGuanying Huang, Jun Yang, Siyuan Jing. 318-322 [doi]
- Improved Similarity Based Fuzzy C-Means Clustering AlgorithmNan Gong, Zhihe Wang, Hui Du, Xiaofen Wei. 323-327 [doi]
- Neural Question Generation Using Question Type GuidanceRui Sun, Xingfa Zhou, Fan Fang. 328-332 [doi]
- Bidirectional Information Transfer Scheme for Joint Intent Detection and Slot FillingRui Sun, Lu Rao, Xingfa Zhou. 333-337 [doi]
- Influence Between Music Based on Big Data AnalysisHongxin Wu, Chengqi Zhang. 338-342 [doi]
- Research on learning community construction strategy based on FDP clustering algorithmHui Du, Haopeng Niu, Shiyin Chen, Yiyang Ni, Zhihe Wang. 343-347 [doi]
- Density peak clustering algorithm based on relative density and improved assignment strategyZhihe Wang, Xuyan Cao, Hui Du, Yiyang Ni. 348-352 [doi]
- Estimation of the Pharmacokinetic Parameters of the Anti-rejection Drugs in Lung TransplantationXueyao Qiu, Haosen Liu, Fangqing Gu, Pengjiu Yu. 358-361 [doi]
- Bootstrap test for relevant change in heavy tailed time seriesXiaoyang Wang, Zhanshou Chen, Shouyao Cheng, Maocuo Niang. 362-366 [doi]
- Spectral Ensemble Clustering with LDA-based Co-training for Multi-view Data AnalysisHong Jia, Zhimin Li. 367-371 [doi]
- Application of DBSCAN clustering algorithm in evaluating students' learning statusHui Du, Shiyin Chen, Haopeng Niu, Yongbiao Li. 372-376 [doi]
- Optimality of Multi-Objective Programming Involving $(G-V, \rho)$ - InvexityXiangyou Li. 377-381 [doi]
- Transfer Learning Based Multi-objective Particle Swarm Optimization AlgorithmJiaheng Huang, Lei Chen. 382-386 [doi]
- Multi-objective Particle Swarm Optimization based on Space Decomposition for Feature SelectionMingjie Zhu, Fei Han. 387-391 [doi]
- A novel chaos sparrow search algorithm for TSP problemLi Zheng, Junpeng Cui. 392-396 [doi]
- Decoupling of Direction and Length for Cumulative Step Size AdaptationShuo Zhang, Zhenhua Li, Detian Yang, Shuo Wang, Xinye Cai. 397-401 [doi]
- A Toll-Setting Optimization Approach for Transportation NetworksYu Shen, Hecheng Li, Lijuan Chen. 402-407 [doi]
- A Multi-Objective Bilevel Optimization Evolutionary Algorithm with Local SearchWeizhong Wang, Hai-lin Liu. 408-412 [doi]
- Multi-Objective Preference Optimization Method of Permanent Magnet Assisted Reluctance MotorChaozhi Huang, Hongwei Yuan, Yongmin Geng. 413-419 [doi]
- Optimizing Uncertain Express Delivery Path Planning Problems with Time Window by Ant Colony OptimizationYingrao Yi, Yufei Wang, Fangqing Gu, Xuesong Chen. 420-424 [doi]
- Multi-Objective Optimization of Cloud Resource SchedulingXunzhang Li, Shiwei Wei, Jie Ke. 425-429 [doi]
- General 4-GLV Lattice Reduction AlgorithmsBei Wang, Xianhong Xie, Songsong Li, Yi Ouyang 0004, Honggang Hu. 430-434 [doi]
- Strengthening Profiled Side Channel Attacks on AES via Multi-view Information AggregationShukun An, JianZhao Liu, Xiaolin Duan, Mengce Zheng, Honggang Hu. 435-439 [doi]
- Masking Scheme on AES Against Power Attack Based on Composite FieldJing Wang, Bo Gao, Yingjian Yan. 440-443 [doi]
- Secure Two-party Dilithium Signing ProtocolYu Fu, Xiufeng Zhao. 444-448 [doi]
- A Short Note on the Girth of Tanner (5, 13)-Regular QC-LDPC CodesHengzhou Xu, Hai Zhu, Xiaoxiao Miao, Mengmeng Xu, Zhen Luo, Huaan Li. 449-453 [doi]
- A File Encryption System Based on Attribute Based EncryptionJie Tong, Yihong Long 0002, Quan Liu. 454-458 [doi]
- Probabilistic Grayscale Visual Cryptography Scheme Using Multi-Pixel EncodingHangying Huang, Zhengxin Fu, Bin Yu 0003. 459-463 [doi]
- An Graph Neural Network and Feature Interaction Based Fraud DetectionZongli Jiang, Jieru Liang, Nan Ma. 464-468 [doi]
- Black-Box Adversarial Attack by Evolution Strategy with Binary SearchHuilin Cheng, Zhenhua Li, Xinye Cai. 469-473 [doi]
- A Fast Method of Anomaly Detection based on Adaptive Slide Window (ASW) and Wave Vector Classification (WVC)Qing Ren, Jinpeng Qi, Jinmei Zhong, Yitong Cao, Junjun Zhu. 474-478 [doi]
- A Preliminary Method of Abnormal Pattern Recognition (APR) Based on Adaptive Slide Window (ASW) and Template Matching(TM)Jinmei Zhong, Jin-Peng Qi, Qing Ren, Yitong Cao, Junjun Zhu. 479-483 [doi]
- An Improved LRP-Based Differential Privacy Preserving Deep Learning FrameworkYaling Zhang, Shibo Bai. 484-488 [doi]
- Analysis of Attack Effectiveness Evaluation of AD hoc Networks based on Rough Set TheoryJiahao Dai, Yongqun Chen. 489-492 [doi]
- Improved Detection of Four Attacks Based on Particle MethodTao Yu, Zhen Liu. 493-496 [doi]
- An Intrusion Detection Model Combining Signature-Based Recognition and Two-Round Immune-Based RecognitionCaiming Liu, Yan Zhang 0015. 497-501 [doi]
- Sparsity-enhanced Convolutional Neural Network for IoT Cyberattacks DetectionYingyun Kang, Yongxin Feng, Yongqun Chen, Wei Wang. 502-507 [doi]
- Team Cooperation Strategies Based on Network ModelHongxin Zhang. 508-512 [doi]
- Design and Implementation of Multi-Function Table Wiping Control System Based on NBIoTLijuan Cao, Jianhui Li, Yang-Jing Zhou, Yuan-Hong Lian, Dunhua Zhao, Junjie Chen 0003. 513-518 [doi]
- Remote Monitoring System for Atmospheric EnvironmentChenwei Zhao, Miao Ye, Ruoyu Wei, Qinghao Zhang. 519-523 [doi]
- Design of Intelligent Analysis and Detection System for Electrical Appliance Based on STM32Yuejin Huang, Miao Ye, Yue Cai, Linqiang Huang. 524-528 [doi]
- Research on Webshell Detection Based on Semantic Analysis and Text-CNNKefei Cheng, Huidi Wang, Guangjun Hu, Liang Zhang, Jinghao Chen, Wei Luo. 529-534 [doi]
- Stability and Robust Control for Uncertain Stochastic Time-delay Systems with Two Kinds of DelaysRuliang Wang, Panchao, Geng Wei, Dehua He. 535-538 [doi]
- Research on the Identification of Science and Technology Innovation Policies and its Influence in DongguanXing Wang, Jie Lin. 544-547 [doi]
- Incentive Contract Design for Insurance Agents Based on a Multi-Task Principal-Agent ModelYun Xiao, Pei-Dong Lai. 548-551 [doi]
- Construction and Evaluation of Science and Technology Innovative Cities -Empirical analysis based on DongguanJie Lin, Xing Wang. 552-555 [doi]
- An Empirical Study on the Impact of Herd Effect of China's Open-ended Stock Fund on Stock Market VolatilityShifen Zhou. 556-559 [doi]
- The Big Data-Based Innovation of Business Management ModelXiao-Hong Ju. 560-564 [doi]
- The Analysis of Staff's Belongingness and Life Satisfaction - A Study Based on the Research of Dongguan CityPengju Du. 565-569 [doi]
- Analysis of the causes of employment satisfaction of fresh graduates from colleges and universities - Mediating variables based on school employment servicesPei-Dong Lai, Yun Xiao. 570-574 [doi]
- Research on The Flow of Innovative Talents in the New Energy Automobile Industry from the Perspective of EnterprisesFang Luo. 575-579 [doi]
- An Adaptive Parameter for Max-Min Elite Ant System to Solve CVRP ProblemXiangfang Yan, Wei Li, Ying Huang, Soroosh Mahmoodi. 580-584 [doi]
- Using ICA as a Pre-Processor for CNNs to Efficiently Process High-Dynamic VideosMengyuan Guo, Chao Zhang, Xiaopei Wu. 585-589 [doi]
- Multi-Turn Response Selection Using Business Sequential Relations in Traffic FieldYi Zhu, Zhengzheng Tu, Shilei Huang, Wanli Lv, Lin Yao. 590-593 [doi]
- Single-Channel Speech Enhancement Based on Multi-Scale Gradients Generative Adversarial NetworksXiao-jun Zhu, He-Ming Huang. 594-599 [doi]
- Learning Context-Aware Representation for Event DetectionJiale Yuan. 600-603 [doi]
- Multi-View Clustering Analysis via Density Peak Clustering with Novel Co-Training StrategyZhenghao Qiu, Hong Jia. 604-607 [doi]
- Small Object Detection of Non-standard THT Solder Joints Based on Improved YOLOv3Jinlai Huang, Mingkai Yang, Haoshi Zhi, Leilei Xiang, Hua Zhang, Yifan Wu. 608-611 [doi]
- A Framework for Visual Relation Detection Exploiting Global ContextRui Sun, Xingfa Zhou, Xin Wang, Lan Yang, Huayi Zhan. 612-615 [doi]
- OS-Independent Malware Detection: Applying Machine Learning and Computer Vision in Memory ForensicsAnh Duy Tran, Ngoc-Huy Vo, Quang-Khai Tran, Hai Dang Nguyen, Minh-Triet Tran. 616-620 [doi]
- Research on the trade effect of tax coordination on China ASEAN Free Trade AreaYi Fu, Yong-Ting He. 621-624 [doi]
- Research on Product Pricing Strategy of Two-level Supply Chain under Carbon Trading MechanismShi Lu, Yuxiang Yang. 625-628 [doi]