Abstract is missing.
- Experimental Study of Chinese POS TaggingXiaofeng Liu. 1-5 [doi]
- HAASD: A dataset of Household Appliances Abnormal Sound DetectionYong Jiang, Chunyang Li, Nan Li, Tao Feng, Meilian Liu. 6-10 [doi]
- Artificial Intelligence Techniques on Real-time Strategy GamesZhen Yang, Wanpeng Zhang, Hongfu Liu. 11-21 [doi]
- Machine Learning with Small Data for User Modeling of Watershed Stakeholders Engaged in Interactive OptimizationAndrew Hoblitzell, Meghna Babbar-Sebens, Snehasis Mukhopadhyay. 22-27 [doi]
- An Indoor Sound Source Localization Dataset for Machine LearningTao Wu, Yong Jiang, Nan Li, Tao Feng. 28-32 [doi]
- Understanding Readers: Conducting Sentiment Analysis of Instagram CaptionsMing Zhan, Ruibo Tu, Qin Yu. 33-40 [doi]
- Explore Machine Learning for Analysis and Prediction of Lung Cancer Related Risk FactorsHaijing Tang, Jing Zhao, Xu Yang 0003. 41-45 [doi]
- A Layered After-sale Quality Evaluation Model Based on Improved Artificial Neural NetworkJichao Li, Haobin Shi, Xinru Li, Meng Xu. 46-51 [doi]
- A Convolutional Neural Network Combined with Color Deconvolution for Mitosis DetectionMengjie Bai, Jiarui Sun, Kaili Cheng, Jingting Luo, Yong Zhao 0010. 52-57 [doi]
- Social Media Text Generation Based on Neural Network ModelJiarun Cao, Chongwen Wang. 58-61 [doi]
- Two-Dimensional PerceptronsJun Ou, Yujian Li. 62-66 [doi]
- Mandarin-Tibetan Cross-Lingual Voice Conversion System Based on Deep Neural NetworkZhenye Gan, Xiaotian Xing, Hongwu Yang, Guangying Zhao. 67-71 [doi]
- Research on the Application of PID Control with Neural Network and Parameter Adjustment Method of PID ControllerJiayu Liu, Wei Pan, RuoPeng Qu, Meng Xu. 72-76 [doi]
- Convolutional Neural Network Protection Method of Lenet-5-Like StructureLei Sun, Yuehan Wang, Leyu Dai. 77-80 [doi]
- Intrusion Detection System for NSL-KDD Dataset Using Convolutional Neural NetworksYalei Ding, Yuqing Zhai. 81-85 [doi]
- An Efficient Malicious Code Detection System Based on Convolutional Neural NetworksDongzhi Cao, Xinglan Zhang, Zhenhu Ning, Jianfeng Zhao, Fei Xue, Yongli Yang. 86-89 [doi]
- Chest X-Ray Analysis of Tuberculosis by Convolutional Neural Networks with Affine TransformsTawansongsang Karnkawinpong, Yachai Limpiyakorn. 90-93 [doi]
- Atrial Fibrillation Detection with Convolutional Neural NetworkJingting Luo, Canmiao Fu, Mengjie Bai, Yong Zhao 0010. 94-98 [doi]
- Combining Gated Recurrent Unit and Attention Pooling for Sentimental ClassificationMingbo Hong, Mantao Wang, Lixin Luo, Xuefeng Tan, Dejun Zhang, Yike Lao. 99-104 [doi]
- Massive GIS Spatio-temporal Data Storage Method in Cloud EnvironmentBin Yu, Chen Zhang, Jiangyan Sun, Yu Zhang. 105-109 [doi]
- Dynamic Data Compression Algorithm Selection for Big Data Processing on Local File SystemFuzong Wang, Helin Guo, Jian Zhao. 110-114 [doi]
- Efficient Processing of Reverse Top-k Dominating QueriesTao Jiang, Bin Zhang, Jun Yang. 115-119 [doi]
- Dynamic Time Interval Data Representation in Scalable Financial Time Series Pattern RecognitionKwan-Hua Sim, Kwan Yong Sim, Nicholas Bong. 120-125 [doi]
- How Deep Is Optimal for Learning Locally on SmartphoneZhenggui Xiang. 126-130 [doi]
- Methodology of Big Data Integration from A Priori Unknown Heterogeneous Data SourcesAlexey Samoylov, Nikolay Sergeev, Margarita Kucherova, Boris Denisov. 131-135 [doi]
- Method for Establishing Handwritten Character Data Set of Traditional Chinese Medicine PrescriptionPeilun Wu, Jianyang Liu, Fayu Wang. 136-139 [doi]
- Load Management for Multiple Datacenters towards Demand Response in the Smart Grid Integrating Renewable EnergyPeicong Luo, Xiaoying Wang, Hailong Jin, Yuling Li, Xuejiao Yang. 140-144 [doi]
- A New Android Malicious Application Detection Method Using Feature Importance ScoreJing-xu Xiao, Zi-cong Lu, Qi-han Xu. 145-150 [doi]
- Slr on Identification & Classification of Non-Functional Requirements Attributes, and Its Representation in Functional RequirementsNurbojatmiko, Eko K. Budiardjo, Wahyu Catur Wibowo. 151-157 [doi]
- QoS-aware Topology Discovery in Decentralized Software Defined Wireless Mesh Network (D-SDWMN) ArchitectureHisham Elzain, Wu Yang. 158-162 [doi]
- Research on a Method of Software Reliability Prediction ModelZhen-Yu Ma, Wei Zhang, Jian-Ping Wang, Fu-Sheng Liu, Kun Han, Fei Gao. 163-167 [doi]
- A Large Scale Analysis of DNS Water Torture AttackXi Luo, Liming Wang, Zhen Xu, Kai Chen, Jing Yang, Tian Tian. 168-173 [doi]
- Reverse Engineering in Software Product Line - A Systematic Literature ReviewMuhamad Hasbi, Eko K. Budiardjo, Wahyu Catur Wibowo. 174-179 [doi]
- A Method of Automatic Code Generation Based on AADL ModelChen Zhang, Xinyi Niu, Bin Yu. 180-184 [doi]
- Exploring Violations of Programming Styles: Insights from Open Source ProjectsChunyu Yang, Yan Liu, Jia Yu. 185-189 [doi]
- Framework Research on the Implementation of Automated Test User RequirementsYiming Xiao, Liang Xiao, Zhu Li. 190-194 [doi]
- An Implement of Smart Contract Based Decentralized Online Crowdsourcing MechanismYonggen Gu, Jiashen Chen, Xiaohong Wu. 195-199 [doi]
- An Overview and Practical Application of Biological Intelligence Algorithm Used in Intelligence ControlJie Chen, Sheng Cheng, Meng Xu. 200-206 [doi]
- An Improved ORB Feature Point Matching AlgorithmYang Zhang, Chao Li, Chuqing Cao, Yunfeng Gao. 207-211 [doi]
- Dynamic Update Upper Bounds Influence Maximization AlgorithmJunying Shang, Kan Li. 212-217 [doi]
- An Improved Collaborative Filtering Algorithm Based on Node2vecLuo Liang, Ruichun Tang. 218-222 [doi]
- Target Tracking based on Kernel Correlative Filters and SIFT features - A Self-Adaptive Scale AlgorithmNanfeng Jiang, Li Guo, Gongde Guo. 223-226 [doi]
- Relative Density-Based Outlier Detection AlgorithmJin Ning, Leiting Chen, Junwei Chen. 227-231 [doi]
- GDSF-Based Low Access Latency Web Proxy Caching Replacement AlgorithmZehua Zhao, Yan Ma, Qun Cong. 232-236 [doi]
- An Algorithm for Learning Regular Expressions Based on Repeated String DetectionGang Lin, Lixiao Zheng, Yuanyang Wang. 237-241 [doi]
- Fuzzy Granularity in the Knowledge-based Dynamic Fuzzy SetsRolly Intan, Siana Halim, Lily Puspa Dewi. 242-246 [doi]
- A Multi-objective Optimization Model for Music StylesDelfina Malandrino, Rocco Zaccagnino, Rosalba Zizza. 247-251 [doi]
- A Method of Multi-attribute Group Decision-making Based on Nearness of Triangular Fuzzy NumbersYao Wang, Wei Pan, An Liu, Meng Xu. 252-257 [doi]
- Flag Detection with Convolutional NetworkMing Gu, Kun Hao, Zhiyi Qu. 258-262 [doi]
- Biometric Authentication via Finger PhotoplethysmogramXiao Zhang, Zheng Qin, Yongqiang Lyu. 263-267 [doi]
- Chinese Named Entity Recognition Based on Rules and Conditional Random FieldWeiming Liu, Bin Yu, Chen Zhang, Han Wang, Ke Pan. 268-272 [doi]
- Multi-layer CNN Features Fusion and Classifier Optimization for Face RecognitionYulin Wu, Mingyan Jiang. 273-276 [doi]
- A New Shadow Detection and Depth Removal Method for 3D Text Recognition in Scene ImagesWencan Zhong, Alex Noel Joseph Raj, Palaiahnakote Shivakumara, Zhemin Zhuang, Tong Lu, Umapada Pal 0001. 277-281 [doi]
- Text Implication Recognition Learning with Gated Recurrent UnitGuo Xianjing, Li Yong. 282-285 [doi]
- Raftnet: Extract Task-aware Features for Pedestrian Attribute RecognitionWuhao Zhang, Lizhuang Ma, Yanhao Ge. 286-290 [doi]
- Mapping Technology in Visual SLAM: A ReviewZhuoyue Yang, Dianxi Shi. 291-295 [doi]
- The Ceprei-Scape Dataset for the Validation of Autonomous DrivingQiangrong Yang, Jianyao Hu. 296-299 [doi]
- Failure Discrimination Mechanism Joint Blocking Training for Target TrackingXun Chen, Siwei Xia, Hu Lu. 300-304 [doi]
- Video Detection System of Traffic Flow toward Urban RoadsHao Chen, Peng Wu, Juan Meng. 305-308 [doi]
- An Unmanned Aerial Vehicle Detection Algorithm Based on Semantic Segmentation and Visual Attention MechanismJiaohao Zhang, Qiang Zhang, Chunlei Shi. 309-313 [doi]
- An Improved Offline Symbolic Execution ApproachXiaolong Liu 0003, Zehui Wu, Qiang Wei. 314-320 [doi]
- EEG-Based Attention Feedback to Improve Focus in E-LearningChaitanya Sethi, Harsh Dabas, Chirag Dua, Mohit Dalawat, Divyashikha Sethia. 321-326 [doi]
- A Contrast Pre-adjusted Defect Detection of Strip Steel Surface by Total Variation-based Image DecompositionKun Liu, Nana Luo, Yafei Ren. 327-333 [doi]
- Non-Parametric Learning-based Depth Estimation from a Single Image in the Fourier DomainHuihui Xu, Mingyan Jiang. 334-338 [doi]
- Multi-view Clustering with Noisy ViewsYongkai Ye, Xinwang Liu, Jianping Yin. 339-344 [doi]
- Depth Estimation in Multi-View Stereo Based on Image PyramidHanfei Xu, Yangang Cai, Ronggang Wang. 345-349 [doi]
- Image-Text Embedding with Hierarchical Knowledge for Cross-Modal RetrievalSanghyun Seo, Juntae Kim. 350-353 [doi]
- Deep Learning Based Non-rigid Device Tracking in Ultrasound ImageShaohan Chen, Shu Wang. 354-358 [doi]
- Research on Construction Technology of 3D Scene Point Cloud Model Based on Improved PMVS AlgorithmYaopu Zhao, Yanchao Yu, Ying Li. 359-363 [doi]
- Fatty Liver Disease Prediction Based on Multi-Layer Random Forest ModelMing Chen, Xudong Zhao. 364-368 [doi]
- Control Divergence Optimization through Partial Warp Regrouping in GPGPUsYaoHua Yang, Shiqing Zhang, Li Shen. 369-374 [doi]
- Selection-Channel-Aware Scale Co-occurrence Matrix Feature to Detect Content-Adaptive JPEG SteganographyXiaoyan Xu, Xiaofeng Song, Rongcai Zhao. 375-379 [doi]
- Emotion Classification Using EEG SignalsHarsh Dabas, Chaitanya Sethi, Chirag Dua, Mohit Dalawat, Divyashikha Sethia. 380-384 [doi]
- Deep Learning based Framework for Underwater Acoustic Signal Recognition and ClassificationHao Wu, Qingzeng Song, Guanghao Jin. 385-388 [doi]
- KUKA Real-Time Control through Angle Estimation of Wrist from sEMG with Support Vector RegressionXiaorong Feng, Qingsong Ai, Wei Meng 0003. 389-393 [doi]
- Recognition Influence of Different Acousitc Characters between Male and Female SpeakersLiying Zhao, Qiuyan Wang, Xin Dang. 394-398 [doi]
- An Extension of MIC for Multivariate Correlation Analysis Based on Interaction InformationZi-Xuan Zhang, Wenning Hao, Gang Chen, Jun-Yue Chen, You-Wei Xu. 399-403 [doi]
- Teamworking Strategies of Scrum Team: A Multi-Agent based SimulationZhe Wang. 404-408 [doi]
- Sentiment Analysis of Network Comments Based on GCNNChen Huang, Gongshen Liu. 409-413 [doi]
- Revealing the Relations between Learning Behaviors and Examination Scores via a Prediction SystemZhenyu Pan, Jie Xue, Yang Gao, Honghao Wang, Guanling Chen. 414-419 [doi]
- Sentiment Analysis Based on Weighted Word2vec and Att-LSTMHuanhuan Yuan, Yongli Wang, Xia Feng, Shurong Sun. 420-424 [doi]
- Research on Recommendation Methods Based on Sentiment Analysis and BTM Topic ModelingDaozhen Min, Lei Huang. 425-430 [doi]
- A Hybrid Approach for Measuring Similarity between Government Documents of ChinaZeyuan Li, Jie He, Dagang Chen, Xin Fang, Yajun Song, Zesong Li. 431-435 [doi]
- Video Editing Stepping Stones: Using Podcasts and Music Videos to Introduce Editing Techniques to Film Studies StudentsAdam L. Miller. 436-440 [doi]
- Digital Cardan Grille: A Modern Approach for Information HidingJia Liu, Tanping Zhou, Zhuo Zhang, Yan Ke, Yu Lei, Minqing Zhang. 441-446 [doi]
- Intelligent Question Answering Model Based on CN-BiLSTMChengfei Li, Li Liu, Fan Jiang. 447-450 [doi]
- Mobile Multimedia-Based Tourism Promotion DevelopmentHadi Sutopo, Ferryal Abadi. 451-454 [doi]
- Design and Programming of the Micromanipulator Network to Study Single Cardiac Cell MechanicsD. A. Volzhaninov, O. N. Lookin, I. N. Antsygin, A. D. Khokhlova. 455-458 [doi]
- A Light Autoencoder Networks for Face SwappingYanzong Guo, Wangpeng He, Juanjuan Zhu, Cheng Li. 459-462 [doi]
- Cybersecurity Vulnerability Scanner for Digital Nuclear Power Plant Instrumentation and Control SystemsJae-Hong Kim, Yang-Seo Choi, Jung-Chan Na. 463-467 [doi]
- Effective Clone Detection Model Based on Compressed Sensing in Clustered WSNsShiqiang Zhang, Zhenhu Ning, Yang Cao. 468-473 [doi]
- A Survey of Kernel-Bypass Techniques in Network StackRuining Chen, Guoao Sun. 474-477 [doi]
- Multi-feature fusion Siamese Network for Real-Time Object TrackingLijun Zhou, Hongyun Li, Jianlin Zhang. 478-481 [doi]
- A Cost and Load Balancing based FiWi Network ONU Planning Method for Multimedia ServicesYing Li, Siya Xu, Wei Deng, Xiangyu Kong, Xujing Peng, Weichun Ge. 482-486 [doi]
- Flexible and Efficient Authentication of IoT Cloud Scheme Using Crypto Hash FunctionBahaa Hussein Taher, Lu Hong Wei, Ali A. Yassin. 487-494 [doi]
- Facilitating Network Functions Virtualization by Exploring Locality in Network Traffic: A ProposalWei Mao, Zhen Shen, Xiaolong Huang. 495-499 [doi]
- An Implicit Smart Interaction Orienting to the Context Semantics of Mobile DeviceLing Zou, Jing Li. 500-505 [doi]
- Virtual Mining Simulation of Cultural Relics Based on Virtual RealitySijia Li, Hongan Zhao, Xinyang Liu. 506-510 [doi]
- SENet for Weakly-Supervised Relation ExtractionJiashu Liu, Guang Chen, Jun Guo 0002. 511-515 [doi]
- A Sensitive Words Filtering Model Based on Web Text FeaturesRui Yao, Yang Cao, Zhiming Ding, Limin Guo 0002. 516-520 [doi]
- Naive Bayes Text Categorization Algorithm Based on TF-IDF Attribute WeightingFeng Jiang, Zhenghao Zhang, Ping Chen, Yongrui Liu. 521-525 [doi]
- Research on the Influencing Factors of Experience Comfort of Virtual Experiential Amusement ProductsShaohua Wang, Zhengqing Jiang. 526-529 [doi]
- Detecting Chinese Domain Name PiracyDan Li, Liming Wang. 530-535 [doi]
- Comparison on Binary MDS Array Codes for Single Disk Failure RecoveryJunrong Ze, Hanxu Hou, Yunghsiang S. Han. 536-541 [doi]
- Steganalysis of Content-Adaptive JPEG Steganography Based on CNN and 2D Gabor FiltersXiaoyan Xu, Linna Fan, Rongcai Zhao. 542-547 [doi]
- A Prediction Model of Wechat Official Account's Article Reading VolumeYue Zhou, Yang Ji, Chujie Tian. 548-555 [doi]
- Deep Learning Using Risk-Reward Function for Stock Market PredictionPisut Oncharoen, Peerapon Vateekul. 556-561 [doi]
- Implementation of a Robotic Arm with 3D Vision for Shoes Glue Spraying SystemChun-Yi Lee, Tsai-Ling Kao, Ko-Shyang Wang. 562-565 [doi]
- Continuous Control in Car Simulator with Deep Reinforcement LearningFan Yang, Ping Wang, Xinhong Wang. 566-570 [doi]
- Application of Deep Learning in Analog Circuit SizingZhenyu Wang, Xiangzhong Luo, Zheng Gong. 571-575 [doi]
- A Sensor Group Selection Mechanism Based on RGB Channels Scenario Sensing MethodBingnan Song, Dianxi Shi, Huiying Wang. 576-582 [doi]
- A Global Constrained Optimization Method for Designing Power Grid with Small DiametersYongxing Teng, Ye Li, Hao Ji, Gang Li. 583-588 [doi]
- Residential Electric Load Forecasting Method Based on Mutual Information and BP Network Combination ModelBaoding Xu, Ruichun Hou, Xiangqian Ding, Ye Tao. 589-593 [doi]
- PartsNet: A Unified Deep Network for Automotive Engine Precision Parts Defect DetectionZhenshen Qu, Jianxiong Shen, Ruikun Li, Junyu Liu, Qiuyu Guan. 594-599 [doi]
- A Dangerous Goods Detection Approach Based on YOLOv3Chenyu Xu, Ning Han, Hongxin Li. 600-603 [doi]
- Development of a Cooperative Automated Driving System via LTE-VYuqi Chen, Fuqiang Liu, Ping Wang, Chao Wang, Jia Hu. 604-608 [doi]
- Semi-online Hierarchical Scheduling for Bag-of-tasks on Two MachinesBingfei Dai, Jianping Li, Weidong Li 0002. 609-614 [doi]
- Design of Dynamic Surveillance System for Port Bulk Cargo Entering and Leaving the Warehouse Based on RFID TechnologyYujian Wu, Lei Huang. 615-619 [doi]
- Research and Design of Reconfigurable Security Resource Pool FrameworkYingxin Xu, Lei Sun, Songhui Guo, Shuai Li, Zewu Wang. 620-626 [doi]