Abstract is missing.
- A New Algorithm on 94 GHz Asymmetric Antenna Bio-radar Conducted Speech EnhancementFuming Chen, Chuantao Li, Fulai Liang, Jianqi Wang. 1-4 [doi]
- Time Analysis of IoT Node Based on Ambient RF Energy Harvesting for Ultra-low Power ApplicationHaipeng Zhang, Ningning Lu, Jie Li, Ruiliang Song. 5-8 [doi]
- A Temporal RDF Model for Multi-grained Time Information ModelingHaixia Li, Li Yan. 9-14 [doi]
- An Iterative Deviation-based Ranking Method to Evaluate User Reputation in Online Rating Systems✱Jia-Tao Huang, Hong-liang Sun, Xiao-Fei Chen, Xiao Lin Liu, Jie Cao. 15-21 [doi]
- Dynamic user needs modeling based on social support in online health communitiesZhenni Ni, Zhizhen Yao, Yunmei Liu, Yuxing Qian. 22-27 [doi]
- A novel detection algorithm for radar signal under non-Gaussian clutterBin Sun, Jing Xu, Wei Hong, Xiaocong Li. 28-31 [doi]
- Human Fall Detection Algorithm Based on Mixed Attention MechanismWei Ge, Xin Luo, Ran Tao 0005, Youqun Shi. 32-37 [doi]
- Leaky Training: A Robustness Improvement Scheme for Autoencoder Based Network Intrusion Detection System under Online LearningZheng Song, Jianguo Yu, Yue He, Jikai He. 38-43 [doi]
- Surface Defect Detection of Aluminum Material Based on HRNet Feature ExtractionBeini Jia, Xin Luo, Ran Tao 0005, Youqun Shi. 44-48 [doi]
- Cantonese speaker recognition system based on EM algorithm in noisy environmentsYu Fan, Chin-Ta Chen, Chih-Chung Yang. 49-54 [doi]
- Product Recommendation Algorithm for Score Prediction Based on Joint Feature Vector ExtractionJian-hua Li, Chen-xi Zhang, Chun-li Lei, Hong Zhang, Lin-long Chen. 55-61 [doi]
- Research on 3D Visualization technology of Dual-polarization Weather Radar ProductsHaiwen Wei, Na Liu, Qian Zhang, Chuanfeng Yang, Junjian Guo, Shuo Wang. 62-68 [doi]
- Research on Horizontal Integration Scheme for Mass Customization Data Quantity and Quality Problem: Horizontal Integration Scheme for MCYiming Fei, Xiaoyue Yuan, Mengmeng Ren, Shuhai Fan. 69-73 [doi]
- A LSTM-cBiGAN based hybrid sampling method for time series customer classificationXin Pan, Bing Zhu, Yanbing Liu, Feijie Huang. 74-77 [doi]
- Topic Mining of Modern Poetry For Digital Humanities: Case Study of Gu Cheng PoetryZhu Fu, Weike Ding, Peng Guan, Xuhui Ding. 78-83 [doi]
- Structural Analysis of Collaboration Network in OSS Communities∗Peng Liu, Liang Gui. 84-91 [doi]
- Research on Network Security Issues from the Perspective of Multilayer NetworksQiuyun Cheng, Guozheng Yang, Jingju Liu, Yongheng Zhang. 92-97 [doi]
- Detection of small objects in complex long-distance scenes based on Yolov3Bin Lu, Lijuan Zhou, Shudong Zhang, Xin Chen, Weidong Feng. 98-102 [doi]
- Research on Traffic Data Resource Sharing Model Based on BlockchainZichen Zhang, Yong Shao, Yuliang Shi, Changshun Yan. 103-108 [doi]
- Technical Analysis of Twitter Data in Preparation of Prediction using Multilayer Perceptron AlgorithmPilita A. Amahan, Mia V. Villarica, Albert A. Vinluan. 109-113 [doi]
- Analysis of Membership Function in the Implementation of Neuro-Fuzzy System for Prediction of Depressive LexiconsPilita A. Amahan, Mia V. Villarica, Albert A. Vinluan. 114-118 [doi]
- Comparison of Defense Effectiveness between Moving Target Defense and Cyber Deception DefenseChungang Gao, YongJie Wang, Xinli Xiong. 119-124 [doi]
- Collaborative filtering algorithm based on optimized clustering and fusion of user attribute featuresQingyang Wu, Xu Cheng, Erxin Sun, Chengpeng Deng. 125-129 [doi]
- Genetic Algorithm based Edge Computing Scheduling StrategyChang Su, Yining Gang, Chengming Jin. 130-134 [doi]
- Ship identity authentication security model based on BlockchainQing Hu, Wenshuo Han, Hao Zhang. 135-142 [doi]
- Prediction of Steel Production Based on the Combination of XGBOOST and LassoLarsZanyu Hou, Xinting Cui, Qiushuang Shi. 143-147 [doi]
- Detection Technology of Satellite Navigation Spoofing SignalGuangjie Li, JiaJun Ma, Qiang Zhan, Dandan Wu, Xiong Wei, Xu Wang, Jiancun Zuo. 148-153 [doi]
- Research on dynamic evolution method of software service based on trusted agentTilei Gao, Jinyu He, Tengyang Fan, Feng Ma. 154-158 [doi]
- Adversarial Text Generation for Personality Privacy ProtectionZhe Wang 0031, Kangfeng Zheng, Qingbiao Li, Maonan Wang, Xiujuan Wang. 159-165 [doi]
- A new method of similarity measure for Vague SetsFeng Ma, Ying Yang, Tilei Gao. 166-169 [doi]
- Towards an automatic interior design system using GANQuang-Vinh Dang 0001, Thai-Ha Pham, My-Linh Tran, Minh-Hung Dang, Quoc Khanh Nguyen, Anh-Nguyen Nguyen. 170-172 [doi]
- Model Compression with NAS and Knowledge Distillation for Medical Image SegmentationZhong Zheng, Guixia Kang. 173-176 [doi]
- Sa-HarDNeSt: A Self-Attention Network for Polyp SegmentationYaoduo Zhang. 177-182 [doi]
- PLEAS: A Decision Support System for Personnel Evaluation and SelectionJiting Li, Yu Cheng, Tao Wang, Hao Wang. 183-190 [doi]
- Load Balancing RPL Routing Protocol Based on Non-uniform ClusteringHaoyuan Zheng, Yonghui Zhang, Daxiang Huang. 191-195 [doi]
- Surface roughness detection based on image analysisJiaJun Ma, Guangjie Li, Qiang Zhan, Dandan Wu, Xiong Wei, Xu Wang, Qiang Zhao, Jiancun Zuo. 196-200 [doi]
- Reverse Engineering on Planar Contours: An Algorithmic ReviewRabranea Bqa, Samia Asloob Qureshi, Tanzeela Shakeel, Ateeqa Naseer. 201-207 [doi]
- Research on Image Feature Extraction Method Fusing HOG and Canny AlgorithmLi Wang, Taijun Li. 208-211 [doi]
- Text recognition technology for natural scenesDandan Wu, Yue Peng, Qiang Zhan, JiaJun Ma, Guangjie Li, Xiong Wei, Xu Wang, Jiancun Zuo. 212-217 [doi]
- DSCT: A Damage Strategy for Inter-domain Routing System Considering Cost and Based on TOPSISWendian Zhao, YongJie Wang, Xinli Xiong, Mingzhi Wang. 218-225 [doi]
- A Vulnerability of Dynamic Network Address Translation to Denial-of-Service AttacksShigeo Akashi, Yao Tong. 226-230 [doi]
- Detection method for individual pig based on improved YOLOv4 Convolutional Neural NetworkShudong Li, Xi Kang, Yankun Feng, Gang Liu. 231-235 [doi]
- Research on AGV Path Based on Optimal PlanningJiajun Hu, Weijie Shang, Hanqi Lou. 236-240 [doi]
- Research and Implementation of Emotion Recognition Platform Based on Multiple Physiological SignalsChun-yan Nie, Hui-Yu Wang, Ru-jun Fan, Xin-lei Ruan, Cheng-jin Yang, Min-shi Che. 241-245 [doi]
- Pervasive Activity Logging for Indoor Localization in Smart HomesNirmalya Thakur, Chia Y. Han. 246-255 [doi]
- Research on the development trend of China's integrated circuit industry based on patent measurement∗Qian Cao. 256-259 [doi]
- Study on Temperature Control Model and Algorithm for the Discharge Cavity of Excimer LaserYan He, Longwei Sun, Xiaoping Li, Hongfei Nie. 260-267 [doi]
- Short text similarity computation method based on feature expansion and Siamese networkXinyuan Niu, Wenguang Zheng, Yingyuan Xiao, Qian Wang. 268-272 [doi]
- Research on Transferable Patent Recognition Based on Machine LearningYifei Hu, Shiwei Yang, Anjie Shi. 273-278 [doi]
- A Study to Investigate the Characteristics and Influencing Factors of the Leisure Life of Females: - - Based on Survey Data of Beijing Residents' Social LivesLing Xu, Song Chen, Yue Liu. 279-285 [doi]
- NOR Flash test system based on FPGAQin Qin, Bing Lu, Xin Wang. 286-290 [doi]
- Method of Improving Semantic Representation of Word EmbeddingKe Jia. 291-294 [doi]
- Machine Learning on Mining Potential Adverse Drug Reactions for PharmacovigilanceKe Jia. 295-298 [doi]
- Binary Tree-Based Interest Flooding Attack Detection and Mitigation in NDNsHuiying Jiang, Maode Ma. 299-304 [doi]
- A Simple Algorithm for Quickly Estimating the Sharpness of Mobile Phone ImagesYongkang Zhang, Peng Cao. 305-309 [doi]
- A study on the cognitive efficiency of visual attention in pop-up ads based on eye-movement experimentsYanhui Chen. 310-316 [doi]
- Research on the design of chopsticks for dining reminders based on HSI color space recognitionHui Wang, Yu Zhang. 317-322 [doi]
- An evolutionary adaptive clustering algorithmPeng Li, Haibin Xie, Zhiyong Ding. 323-327 [doi]
- Decision-making Method of Futures Trading Using Dictionary-based Early Classification of Time SeriesZehong Zheng, Shangping Zhong, Kaizhi Chen. 328-333 [doi]
- MaxRI: A method for discovering maximal rare itemsetsSadeq Darrab, David Broneske, Gunter Saake. 334-341 [doi]
- The mechanism of brand reputation on consumer purchase intention in live bandingHong-wei Wu, Hui Guan. 342-347 [doi]
- Analysis of Literature Big Data on Factors Influencing Corporate Annuity Participation Decision and Its Logic in ChinaMeijun Ning, Hui Lv, Dongxu Zhang, Luoru Ma. 348-354 [doi]
- A Change-point Wavelet Method to Hard Drives Running StatusXiaojian Li, Hailan Wang, Jiajia Zhang, Huang Liang, Fu Liao, Yiyi Jiang. 355-360 [doi]
- Research on Prediction Algorithm of Vehicle Trajectory in Front Based on Driving Intention ClassificationWenda Ma, Hui Xie. 361-367 [doi]
- High utility pattern mining based on historical data table over data streamsXinru Chen, Pengjun Zhai, Yu Fang. 368-376 [doi]
- Research on Data Consistency Detection Method Based on Interactive MatchingFachao Li, Shijie Ma, Chenxia Jin. 377-382 [doi]
- Feature Extraction and Classification Recognition of Electroencephalogram Signals Based on Convolutional Neural NetworkJunmin Jia, Fangyuan Cheng. 383-388 [doi]
- Comparison between Calculation Methods for Semantic Text Similarity based on Siamese NetworksKeyang Wang, Yiping Zeng, Fanyu Meng, Feiyu, Lili Yang. 389-395 [doi]
- Quantitative interactive investment algorithm based on machine learning and data miningFangyuan Cheng, Junmin Jia. 396-401 [doi]
- Location Prediction for Indoor Spaces based on Trajectory SimilarityPeng Wang, Jing Yang, Jianpei Zhang. 402-407 [doi]
- Tracking and decision of outsourcing service for auto partsJun Wang, Wei Zhang, Jinghong Tian, Mingtong Liu, Shengda Zhang. 408-413 [doi]
- Early detection of fake news based on multiple information featuresHao Huang, Lihua Zhou, Yiting Jiang. 414-419 [doi]
- Algorithm for Mining Structural Holes in Weighted NetworksBiao Ning, Bing Kong, Lihua Zhou, Chongming Bao, Chongyun Wang. 420-426 [doi]
- Can AI Teach Humans? Humans AI Collaboration for Lifelong Machine LearningXianbin Hong, Sheng Uei Guan, Prudence W. H. Wong, Nian Xue, Ka Lok Man, Dawei Liu. 427-432 [doi]
- Minimization of Dynamic Programming Algorithm by Three-dimension Model Collison Test FittingZhongming Yang, Xiaohui Lu, Lilong Huang, Jun Yu, Jianhui Yang. 433-437 [doi]
- Ensemble Transfer Learning for Lung Cancer DetectionManop Phankokkruad. 438-442 [doi]
- The Shortest Path Application of the Logistics System in Production WorkshopJiajun Hu, Weijie Shang, Jian Rong. 443-447 [doi]
- Research on Publisher Topic Selection Based on Data MiningYongliang Huang, Shulin Yang, Xiang Li, Jiao Peng, Meiqi Zhou. 448-452 [doi]
- Intelligent Document Analysis in the Insurance MarketNikolaos Fournogerakis, Spyridon Poulos, Athanasios Petsakos, Dimitrios Vogiatzis. 453-457 [doi]
- Absolute Redundancy Analysis Based on Features SelectionGinel Dorleon, Nathalie Bricon-Souf, Imen Megdiche, Olivier Teste. 458-461 [doi]
- Multi-malicious nodes double-spending attack blacklist management modelQiang Liu, Song Yan, Jie Wan, Ruiqiang Ma, Jianhang Xu. 462-467 [doi]
- A Modified Decision Tree and its Application to Assess Variable ImportanceFrancis Fuller Bbosa, Ronald Wesonga, Peter Nabende, Josephine Nabukenya. 468-475 [doi]
- Random Response and Extreme Value Response Analysis of Vortex Rod and Blade for Wire FeederRuchun Cen. 476-481 [doi]