Abstract is missing.
- UEBCS: Software Development Technology Based on Component SelectionYingnan Zhao, Xuezhao Qi, Jian Li, Dan Lu. 3-13 [doi]
- A Data Security Protection Method for Deep Neural Network Model Based on Mobility and SharingXinjian Zhao, Qianmu Li, Qi Wang, Shi Chen, Tengfei Li, Nianzhe Li. 14-29 [doi]
- A Method for Small Object Contamination Detection of Lentinula Edodes Logs Integrating SPD-Conv and Structural ReparameterizationQiulan Wu, Xuefei Chen, Suya Shang, Feng Zhang 0010, Wenhui Tan. 30-46 [doi]
- A Study of Sketch Drawing Process Comparation with Different Painting Experience via Eye Movements AnalysisJun Wang, Kiminori Sato, Bo Wu 0007. 47-60 [doi]
- Review of Deep Learning-Based Entity Alignment MethodsDan Lu, Guoyu Han, Yingnan Zhao, Qilong Han. 61-71 [doi]
- VMD-AC-LSTM: An Accurate Prediction Method for Solar IrradianceJianwei Wang, Ke Yan, Xiang Ma. 72-87 [doi]
- Anomaly Detection of Industrial Data Based on Multivariate Multi Scale AnalysisDan Lu, Siao Li, Yingnan Zhao, Qilong Han. 88-100 [doi]
- Research on Script-Based Software Component DevelopmentYingnan Zhao, Yang Sun, Bin Fan, Dan Lu. 101-112 [doi]
- Integration Model of Deep Forgery Video Detection Based on rPPG and Spatiotemporal SignalLujia Yang, Wenye Shu, Yongjia Wang, Zhichao Lian. 113-127 [doi]
- A Design of Hybrid Transactional and Analytical Processing Database for Energy Efficient Big Data QueriesWenmin Lin. 128-138 [doi]
- Chinese Medical Named Entity Recognition Based on Pre-training ModelFang Dong, Shaowu Yang, Cheng Zeng, Yongjun Zhang 0006, Dianxi Shi. 139-155 [doi]
- A Function Fitting System Based on Genetic AlgorithmQiuhong Sun, Jiaqi Wang, Xiaokang Zhou. 156-168 [doi]
- A Rumor Detection Model Fused with User Feature InformationWenqian Shang, Kang Song, Yong Zhang, Tong Yi, Xuan Wang. 169-176 [doi]
- Design and Implementation of a Green Credit Risk Control Model Based on SecureBoost and Improved-TCA AlgorithmMaoguang Wang, Jiaqi Yan, Yuxiao Chen. 177-191 [doi]
- Unsupervised Concept Drift Detection Based on Stacked Autoencoder and Page-Hinckley TestShu Zhan, Yang Li, Chunyan Liu, Yunlong Zhao. 192-208 [doi]
- An Industrial Robot Path Planning Method Based on Improved Whale Optimization AlgorithmPeixin Huang, Chen Dong 0002, Zhenyi Chen, Zihang Zhen, Lei Jiang. 209-222 [doi]
- Intrusion Detection System Based on Adversarial Domain Adaptation AlgorithmJiahui Fei, Yunpeng Sun, Yuejin Wang, Zhichao Lian. 223-237 [doi]
- Small-Sample Coal-Rock Recognition Model Based on MFSC and Siamese Neural NetworkGuangshuo Li, Lingling Cui, Yue Song, Xiaoxia Chen, Lingxiao Zheng. 238-247 [doi]
- Elemental Attention Mechanism-Guided Progressive Rain Removal AlgorithmXingzhi Chen, Ruiqiang Ma, Shanjun Zhang, Xiaokang Zhou. 248-261 [doi]