Abstract is missing.
- Parametrical Construction of MDS Based on Block Cyclic ShiftYou Wu, Jin-Bo Wang, Wen-zheng Zhang. 1-5 [doi]
- Determining the Rumour Stance with Ensemble Method Based on BSAF ModelXi Wang, WeiSen Feng, Fei Wang. 6-12 [doi]
- Multi-interest sequence recommendation algorithm based on BERTFei Wang, WeiSen Feng. 13-17 [doi]
- An Image Encryption Method based on Pixel-level Diffusion and Bit FlipShiwei Zhang, Xin Lyu, Yunfei Zhang. 18-24 [doi]
- Location Privacy Protection Method based on Variable-Order Markov Prediction ModelSimin Zhu, Xin Lv, Lin Yu. 25-30 [doi]
- Exploring Support Vector Machines for Big Data AnalysesSiyang Lu, Yihong Chen, Xiaolin Zhu, Ziyi Wang, Yangjun Ou, Yuhang Xie. 31-37 [doi]
- The topic model of voice interactive dialogue based on the localized command and control systemHaiyan Geng, Baoliang Dong. 38-42 [doi]
- A controllable historical message playback method and application of message middlewareZhibo Liu, Baoliang Dong, Fei Tian. 43-48 [doi]
- Research on software service risk uncertainty calculation method based on information entropyTilei Gao, Ming Yang, Xiaohui Jia, Tao Zhang, Bingfu Mou. 49-52 [doi]
- Synthetic Aperture Radar Image Target Recognition Based on Improved Fusion of R-FCN and SRCYutong Liu, Yumei Wang. 53-60 [doi]
- Distant Supervision Relation Extraction via Reinforcement Learning with Potential Energy FunctionTao Zhang, Jun Feng, Jiamin Lu. 61-66 [doi]
- Developing a Suitability Assessment Criteria for Software Developers: Behavioral Assessment Using Psychometric TestJayati Gulati, Bharti Suri, Luiz Capretz, Bimlesh Wadhwa, Anu Singh Lather. 67-70 [doi]
- On Ethically-Sensitive User Story EngineeringPankaj Kamthan, Nazlie Shahmir. 71-79 [doi]
- Safety Modeling and Analysis of Undercarriage System Based on Cross-Verification of FHA and PHAJie Pu, Kangkang Dou, Zhen Li, Zhengqi Jiang. 80-86 [doi]
- Test Sequence Generation Based on Chain Unique Input-Output Sequence in FSM Conformance TestingWeiwei Lin, Hongwei Zeng. 87-92 [doi]
- Chinese Text Similarity Calculation Model Based on Multi-Attention Siamese Bi-LSTMZhongguo Wang, Bao Zhang. 93-98 [doi]
- A Review of Fatigue Driving Detection Based on ElectrooculogramYuanyuan Tian, Kan Wang. 99-102 [doi]
- A new process algebra more suitable for formal specificationWenguang Ju. 103-106 [doi]
- The Implementation of Video DES Encryption Engine in FPGALijun Liu. 107-111 [doi]
- Evaluating machine learning algorithms for intrusion detection systems using the dataset CIDDS-002Quang-Vinh Dang 0001. 112-118 [doi]
- Self-supervised Fine-grained Image Classification via Progressive Global DisturbanceXuebin Yang, Jianguo Hu, Ziming Wang, Fanglei Xu, Lu Zhu. 119-125 [doi]
- Understanding Tail-latency in Sphinx Speech Recognition SystemXiaoyuan Jia. 126-130 [doi]
- Analyzing the Tail Latency in TailBench Image Recognition Application IMG-DNNHangze Wu. 131-134 [doi]
- Refactoring Java Loops to Streams AutomaticallyAlessandro Midolo, Emiliano Tramontana. 135-139 [doi]
- Reflections on Computer Pipeline Technology from an Analytical PerspectiveYunjing Yao. 140-145 [doi]
- A Pilot Study of Requirement Prioritization Techniques in Agile Software DevelopmentYadamanee Kuengjai, Lachana Ramingwong. 146-151 [doi]
- Improving Graph Neural Network by Filter PreprocessingRui Zhang, Xin Li. 152-157 [doi]
- Memory Mountain Experiment AnalysisBo Sun. 158-162 [doi]
- Development of Personalized IoT Mobile Applications Using MIT APP Inventor 2GuangPing Qiu, Zhihao Zheng, YongChuang Xu, Yancong Deng. 163-167 [doi]
- Analysis of Machine Learning techniques for Predicting Student Success in an Educational InstitutionP. Aruna, N. Priya. 168-173 [doi]
- Fast MILP Modelings for SboxesHao Tan, Dong Xu Miao, Bin Shen, Zheng Wen Zhang. 174-177 [doi]
- Model Checking for an HDLC IP Core Transparency Error in an Aerospace Industrial ContextShiyu Liu, Dongfang Li, Jixing Xue, Guang Yang, Wei Shen, ZhiHao Wang. 178-183 [doi]
- Using Contextual Text Mining Algorithm to Analysis Yearly Trend for Population Ageing and Declining Fertility with Government Science and Technology Projects in TaiwanC.-Y. Chuang, M. C. Huang, Y. Y. Lin, Y. H. Hsiao, T.-C. Wang. 184-189 [doi]
- Fuzzy Comprehensive Evaluation of Online Course Based on Learner Profile and User ExperienceWenjing Qi, Weihua Yuan, Li Zhao. 190-194 [doi]
- DRMACert: Certification for Disaster Response Mobile ApplicationsYouna Jung, Tanner Mallari, Emily Hattman. 195-199 [doi]
- RM3: A Risk Management Framework For IT Project SuccessPaulo Roberto Martins de Andrade, Samira Sadaoui. 200-205 [doi]
- Study on linear optimization of activation function of homomorphic encryption neural networkHongquan Li, Yunfei Cao. 206-211 [doi]
- Understanding and Analyzing the Performance Scalability of N-body ProblemJiayu Chen. 212-215 [doi]
- Military Target Recognition Technology based on WGAN-GP and XGBoostKainan Zhao, Baoliang Dong, Cheng Yang. 216-220 [doi]
- The Impact of Financial Service Industry Opening-up on Manufacturing Domestic Value-added ExportsJunyou Wang, Yizhong Fu. 221-232 [doi]
- Research on BER of BPSK signal based on stochastic resonance under Levy noiseTianhao Guo, Fuzhong Wang, Yalin Zhang. 233-237 [doi]
- LCW: A Lightweight Recommendation Framework for Non-profit Crowdfunding ProjectsJinxin Liu, Yingyuan Xiao, Wenguang Zheng. 238-242 [doi]
- Parallel Component Composition and Performance Optimization Based on Agent TechnologyYunfeng Peng, Congming Shi, Guowei Gao, Jianan Wang, Hai Liu. 243-252 [doi]
- Image Hashing Based on SIFT FeaturesPingyuan Li, Xiaoguang Yuan, Suiping Jiang. 253-256 [doi]
- The Assessment Method of Mobile privacy security Based on AHP and Risk MatrixMing Yang, Tao Zhang, Tilei Gao, Di Zhang, Di Yang. 257-261 [doi]
- Graph Attention Network with Dependency Parsing for Aspect-level Sentiment ClassificationLing Gan, Qiao Tang. 262-267 [doi]
- Construction and application of knowledge graph of domestic operating system testingDongsheng Jin, Zhi Wang, Mingyang Li, Xinjie Zhu. 268-273 [doi]
- Design And Implementation of Video Learning Platform Based on B / S ArchitectureJinlan Kong, Qinglei Zhou, Mengfei Lin. 274-278 [doi]
- An optimization algorithm of IPO with forbidden constraintsKangli Chang, Fuchuan Li. 279-284 [doi]
- Technology convergence prediction based on semantic representation of patent classification's textJinzhu Zhang, Yifeng Li. 285-289 [doi]
- Design and Implementation of Intelligent Course Arrangement System in Colleges Based on JSP Technology: Design Intelligent Course Arrangement SystemYuyang Jing. 290-294 [doi]
- Overview of information visualization for business under the background of big data: Overview of information visualizationYan Wang, Zi-hao Zhao, Hang Li. 295-299 [doi]
- Visual Analysis of Heterogenous Air Pollution DataXudong Yang, Hui Peng, Qingming Zhang. 300-306 [doi]
- Monocular Keypoint based Pull-ups Measurement on Strict Pull-ups BenchmarkLehao Wang, Yucheng Chen, Weijun Duan. 307-311 [doi]
- The review of color balance method for UAV image By COMPUTER technologyXiaofan Liu, Jinjin Lu, Rongshan Lu, Shaoshao Xie, Congfang Liu. 312-316 [doi]
- Image Super-Resolution for Arthropod IdentificationDuhita Wani, Tomás Maul. 317-324 [doi]
- End-to-End 3D Facial Shape Reconstruction From an Unconstrained ImageYanghong Han, Xing Qiao, Yan Wu, Zili Zhang. 325-332 [doi]
- Research on Rendering Effect and Frame Rate Analysis of Group Behavior Oriented to VR EnvironmentJian Du, Shengwei Qin, Gengbin Ma, Zilong Wu. 333-337 [doi]
- Landslide Recognition Based on the Improved U-netLinrun Li, Zhangjian Qin, Qin Zhang. 338-345 [doi]
- Development of Virtual Reality Training SystemLai Jiang. 346-350 [doi]
- Adaptive prediction model of gas concentration based on EMD and GPRDingwen Dong. 351-355 [doi]
- A Functional Model of a Designer of Educational Maze GameYavor Dankov. 356-361 [doi]
- GAN Theft Auto: Autonomous Texturing of Procedurally Generated Interactive CitiesOscar Dadfar, Lingdong Huang, Hizal Çelik. 362-366 [doi]