Abstract is missing.
- Research on Prediction Method of Auto Insurance Claim Amount Based on Graph Deep LearningJianguang Lu, Pengfei Liu, Bin Xing. 1-9 [doi]
- Analysis of the Relevance Degree of the Influencing Factors of Traffic AccidentsChunyuan Zheng, Xiaoping Zhao. 10-15 [doi]
- Decoding Elevator Accidents: Insights from Trajectory Intersection TheoryTiantian Zhang, Aiyao Liu, Tingjie Zhang, Chao Yu, Hao Zou. 16-21 [doi]
- Extraction method of general attributes of electronic components based on BiLSTM-CRFPeng Yin, YanLi Xu. 22-27 [doi]
- Extractive text summarization based on comparative learningYongxiang Zhou, YanLi Xu. 28-32 [doi]
- LFM radar signal recognition with different SNR based on deep LearningHongyan Wang, Tangchun Liu, Rui Zhou, Xue Hao. 33-38 [doi]
- Sentiment Analysis of Lijiang Ancient Town Attraction Reviews Based on LDAYingying Mei, Alexander A. Hernandez. 39-44 [doi]
- Modeling and Analysis of Telecom User churn WarningYaqi Hu, Sijie Lu. 45-50 [doi]
- A Distributed Logistics Data Security Sharing Model Based on Semantics and CP-ABEXue Zhang, Li Wang, Lianzheng Xu, Deqian Fu. 51-56 [doi]
- Response Plan for Physical Security of Electric Power SubstationNawaraj Kumar Mahato, Jiaxuan Yang, Yue Sun, Shuai Zhang, Gangjun Gong, Jianhong Hao. 57-61 [doi]
- Optimization Control Method of Reservoir Level for Cascaded Hydropower Plants Considering Uncertain Electricity PricesBinbin Zhou, Kai Chen, Mingkai Zhu, Jianjian Shen, Youxiang Wang, Congtong Zhang. 62-67 [doi]
- Research on emergency evacuation of crowds based on the social force model of panicQiming Zhu, Zongmin Ma, Shuangchao Xu, Hongwei Zhuang. 68-74 [doi]
- Research on Air Quality Classification Based on KNN and CARTCuihua Tian, Wulong Liu, Chaoxu Lin, Islam Al Qudah, Weisi Chen. 75-80 [doi]
- Learning to Select Customized Valid Cuts for Joint Pricing and Routing for 'Co-bus'Ruisan Zhang, Maohua Cai, Jiguang Wang, Yilun Zhang. 81-86 [doi]
- Navigating the Data Dilemma: Equilibrium Strategies for Information Protection and Exploitation in E-commerce PlatformsYing Li. 87-91 [doi]
- Research on Methods of Knowledge Graphs and Pre-trained Models in Urban Public Crisis ManagementQing Lei, Haifeng Li. 92-98 [doi]
- An Event Knowledge Graph for Students' Competition level predictionWenxue Men, Peisong Luo. 99-104 [doi]
- Small Fire Detection Algorithm based on Dynamic Image Blocks and FeaturesLina Liu, Xue Wang, Songyan Liu. 105-110 [doi]
- A Unified Identity Authentication Method Based on Face InformationJianfei Xiao, Shu Wang. 111-116 [doi]
- A research on similarity measurement for time series and its application on stock price predictionRui Wang, Zhongliang Xiang. 117-121 [doi]
- Research Hotspots and Trend Analysis of R&D Investment Based on BibliometricsYixuanyu Li, Wei Wei. 122-127 [doi]
- Assessment of Competence of HR Practitioners in Exponential Organizations using Analytic Hierarchy Process (AHP) and Multilayer Perceptron (MLP)Xuming Zhang, Ling Peng, Shilong Wang. 128-133 [doi]
- Generating Chinese Poetry from Images Based on Deep LearningXuelian Ren, Xiaolong Chai, Mingzhi Mao. 134-138 [doi]
- Construction of Financial Conversational Assistant via Large Language ModelsZhenhao Dong, Hongchao Ma, Mengjun Ni, Hang Jiang, Yuefeng Lin, Zhongchen Miao. 139-144 [doi]
- Study on spatial and temporal distribution characteristics of traffic accidents in long downhill tunnels of mountain highwaysWei Liu, Benhui Zou, Zicong Han, Wenke Kuang, Wenzhuo Xie, Long Wang, Lei Zhang, Xiaona Zhang. 145-150 [doi]
- An Application Security Requirements Analysis Method Based on Knowledge GraphChengtao Wang, Fei Chen, Xinjian Li, Xiaohu Chen. 151-154 [doi]
- Spatiotemporal patterns and factors that influence population aging in Zhejiang Province, ChinaYiheng Huang, Qing Luo, Fei Long. 155-164 [doi]
- Information Extraction of Bridge Structure Division and BIM Data-Driven Based on Text MiningCheng Liu, Junwu Mao, Mingze Liu, Shuangke Gou, Changqing Xie, Yun Zhang. 165-170 [doi]
- Security risk propagation and control strategies for complex tasks based on improved multi-signal flow graphXiaodong Tan. 171-175 [doi]
- Research on the Construction Method and Application of Knowledge Graph Based on Electricity Price PolicyRuoyun Hu, Gang Sun 0004, Qingjuan Wang, Xinwei Ding, Zhiwei Chen. 176-182 [doi]
- Instruction fine-tuning based on Llama2-7b for news topic classificationHong Xu, Yulong Xia, Qi Zu. 183-186 [doi]
- An Entity-Relationship Extraction Method for Epidemiological investigation Texts Based on Machine Reading ComprehensionJunjie Lu, Feng Han, Mingfeng Zhou, Yichen Hou. 187-195 [doi]
- A Multi-stage Feature Subset Selection Approach for ClassificationJian Shen, Xiaodong Tan, Yixi Yin. 196-200 [doi]
- Evaluation of digital transformation programs for manufacturing enterprises based on D-S and intuitionistic fuzzy TOPSIS modelZhonghui Dong, Yifan Qin, Wenxuan Yuan. 201-204 [doi]
- An Overview of Smart Healthcare from 2000 to 2023: Bibliometrics, Research Hotspots and Future directionsNan Hong, Lin He, Yixi Yin. 205-211 [doi]
- Joint Optimization Method of Task Sequencing and Assignment for Power Measurement LaboratoryXingyuan Wang, Chunyu Wang, Chunyan Wang, Huaiying Shang. 212-219 [doi]
- Study on learning motivation model based on improved ideal solutionQian Ge, Xuhua Xu. 220-224 [doi]
- Design and Implementation of Secure Hash Function Based on Parallel StructureShengzuo Liu, Manzhi Yang, Zhexue Jin, YongZhen Li. 225-230 [doi]
- An Algorithm Combining Hidden States for Monotonic Value Function FactorisationErshen Wang, Xiaotong Wu, Chen Hong, Jihao Chen. 231-235 [doi]
- Research on Calculation Method and Prediction Model of Carbon Emission from Road Tunnel ConstructionShilong Jia, Mingzhe Zou. 236-241 [doi]
- Applied research on flood forecasting in Qinshui River basin based on HEC-HMS modelingCheng Ma, Guoqing Sang, Jie Zhang. 242-247 [doi]
- Research on Trusted Data Evidence of Bidding and Procurement Based on Block-chain TechnologyXiaolong Wu, Meng Niu. 248-254 [doi]
- Particle Swarm Optimization Hybrid Cloud Computing Resource Scheduling Algorithm Based on Optimized Genetic AlgorithmYuanqing He, Jianzhuo Yin. 255-259 [doi]
- Group recommendation algorithm based on adaptive aggregationYonggui Wang, Wenbo Yang. 260-264 [doi]
- Research on two-level data center transmission path selection method based on link load predictionCong Hu, Zhen Yao, Jiali Sun, Jun Chu, Jiangbo Yin, Gaojie Shi, Jiaheng Li. 265-270 [doi]
- Prediction of Alcohol Consumption Demand Based on A Machine Learning ApproachYaning Sheng. 271-278 [doi]
- Data-driven Fuel Flow Prediction Model for Aircraft EnginesAhmed Salem Ahmed Al-Khanbashi, Cai Jing. 279-283 [doi]
- Departure flight delay predictions based on weather and non-weather data fusionXuezhi Xu, Fan Li, Zijing Dong, Jiayuan Li, Jide Qian. 284-289 [doi]
- Research and Design of Active Security Protection Strategy for Charging Piles Based on Vulnerability MiningChang Liu, Xin Zhou, Hongbiao Wang, Zhou Sun, Zhuoqun Li, Yutong Zhao. 290-295 [doi]
- Bidirectional conversion method of smart port equipment operation data based on element treeZhenyu Xiang, Yingjun Guan, Xuegang Feng. 296-300 [doi]
- Interval Prediction of Tobacco Tax Profit Based on a Hybrid Holt-SVR ModelShiyuan Tong, Minfei Wang, Jian Sun, Jianmin Ge, Qi Pei, Ying Liu. 301-306 [doi]
- Research on the Effectiveness of EMD-GRU Algorithm for Stock ForecastingYuqi Cao. 307-311 [doi]
- A Hybrid Nearest Neighbor Based SMOTE Oversampling AlgorithmMin Li, Pan Chen. 312-316 [doi]
- Prediction of Major Defects in Enterprise Internal Control Based on Machine Learning AlgorithmNa Li. 317-322 [doi]
- Jumping pattern matching algorithm for protecting search contentJianxu Wang. 323-327 [doi]
- Algorithmic-control analysis of improvisational behavior of gig workers based on PSL-SEM methodMingming Chen. 328-336 [doi]
- Machine Learning Prediction of NBA??s MVP Winner and Championship WinnerKinglok Wang. 337-343 [doi]
- Empirical Study on the Factors Influencing Asparagus Prices Based on VAR ModelJie Yang, Chao Zhang 0015, Pingzeng Liu, Junmei Wang. 344-349 [doi]
- Research on Short Tourism Video Recommendation Based on Improved Collaborative Filtering AlgorithmHui Zhang. 350-355 [doi]
- Research and analysis of medium and long term electricity price forecast based on CNN-LSTM-AttentionHuaizhe Xu, Linjian Fan, Yongjia Li, Tongtao Ma, Zongyao Wang, Bofeng Xu, Yaozhen Huang, Sheng Li. 356-361 [doi]
- Research on BiLSTM-Attention short-term electricity price forecasting considering similar daysKexin Wang, Hanxu Cao, Junyu Wang, Tongtao Ma, Bofeng Xu, Zongyao Wang, Ke Luo, Yaozhen Huang. 362-367 [doi]
- Research and Application of Water Balance Method for Flood Routing of Tailings PondYali Wang, Hongjun Zhang, Xiaojun Zhang, Guodong Mei, Yifan Chu. 368-371 [doi]
- A Complex Road Target Detection Algorithm Based on YOLOv5n-SBFGuoyang Lin, Huarong Xu. 372-377 [doi]
- A clustering federated learning algorithm based on three-layer structureJianfei Zhang, Hongyue Li, Shuaishuai Lv. 378-385 [doi]
- AI Algorithm Evaluation and Regulation: Challenges and Countermeasures for Artificial Intelligence Risk ManagementWenyi Xu, Shu Zhou, Guizhen Liu, Zhengxiang Wang. 386-391 [doi]
- Research on the Portfolio Model of Deep Reinforcement Learning Based on Twin Delayed Deep Deterministic Policy Gradient AlgorithmRongyun Zhong. 392-396 [doi]
- Unsupervised Deep Infrared and Visible Homography Estimation Algorithm Based on Content-AwareYanhao Liao, Yinhui Luo, Xingyi Wang. 397-402 [doi]
- A Bimodal RGB-D Semantic Segmentation Algorithm Based on Attention Mechanism: Research and application of dual-mode RGB-D semantic segmentation algorithm based on attention mechanism in deep learningLong Yan, Chao Dong, Fuyang Yu, Zhiyao Li. 403-408 [doi]
- A study of automatic CAM template extraction based on the G-TSSA-RF algorithmChenchen Xie, Shengwen Zhang, Dakun Liu. 409-415 [doi]
- Study on the Carbon and Electricity Relationship of Industrial Enterprises by Sectors Based on Satellite Data Taking Shandong Province as an ExampleXuan Li, Chunfang Guo, Xiang Xie. 416-421 [doi]
- Building a cash advance assessment model based on machine learning approachGuowei Zhao, Ximing Cheng. 422-427 [doi]
- A study of aeromedical emergency scheduling based on a collaborative difference algorithm improved by reinforcement learningLei Song, Sisi Xiao, Longquan Liao, Wenlong Yan, Linjiang Zheng. 428-435 [doi]
- FedBoC: A Weighted Federated Learning Algorithms based on CRITICGuanyu Wang, Jianfei Zhang. 436-440 [doi]
- Research on Improved Algorithm Based on Perceptual Loss for Variational AutoencoderJiadong Yang, Jianfei Zhang. 441-445 [doi]
- Development and application of integrated working platform for cold source safety interception in nuclear power plantsJun Zhu, Wei Meng, Zhaoxu Hua, Zhengchun Hu, Xiaolin Liu, Qingxu Cui, Shuai Wang, Huihui Tian. 446-451 [doi]
- GPT Method Based Traffic Anomaly Detection for Space-ground Integrated NetworkYuqiao Hou, Yuxiang Wang, Jiankai Wang, Liming Wang, Zhen Xu. 452-457 [doi]
- Forecasting Cargo Throughput of Xiamen Port Based on Grey-Markov ModelYanling Jiang, Xin Zhou. 458-463 [doi]
- Research on cooperative game mechanism and profit distribution of agricultural supply chain under information symmetryYijing Li, Xifu Wang, Shaolun Ma, Mengru Shen. 464-469 [doi]
- Application of Ocean Wave Forecasting in Marine NavigationLifang Jiang, Youren Zheng, Yi Yin, Xiaobin Lin, Changxia Liang, Lei Huang. 470-474 [doi]
- Urban expansion analysis and multi-scenario land use simulation based on Markov-PLUS modelNinghao Wang, Jinfeng Yan. 475-481 [doi]
- Seismic Performance Analysis of 110kV Shunt Reactor for Extra High Substation in High Altitude AreaYuhan Sun, Haibo Wang, Yaodong Xue, Xianzheng Meng. 482-486 [doi]
- Research on the Relationship Between Brand Cultural Identity and Customer Stickiness Based on SPSS22.0 Software and AMOS21.0 SoftwareMenghan Si, Xiuxiu Li. 487-491 [doi]
- Research on Time Performance of In-Vehicle Ethernet based on TSNLiyuan Tian, Shuyuan Hou, Peishi Zhao. 492-497 [doi]
- Research on Adaptive Information Behaviors of Elderly Users under the Perspectives of Technology Acceptance and Emotional Perception - - Taking the mini programs of WeChat and Alipay as an exampleZhensen Zhang, Peiyu Wang, Xinyu Diao, Ying Yang. 498-508 [doi]
- Research on the Security of Internet of Things Based on Microservices TechniquesLi Chen, Hai Wang, Fuyuan Hou, Biao Li, Wangli Zhang. 509-516 [doi]
- Research on the development and application effect of the environmental protection ability evaluation system of power grid enterprisesJian Zhang, Fei Shen, Yong Jiao, Zhiyong Xu, Jinwei Hao, Feiyu Zhang. 517-523 [doi]
- Development and design of Hainan extreme weather power training based on VR technologyLingchi Zeng, Yisong Gao, Wenxuan Ni, Zhimin Xu, Yancheng Huang. 524-528 [doi]
- Hardware Trojans: Threats, Detection, and PreventionChaoen Xiao, Xiangze Chang, Jianxin Wang, Lei Zhang, Hongke Xu, Xinwei Wu, Yuzheng Zheng. 529-533 [doi]
- Design and Implementation of a Digital Campus on a Private Cloud PlatformJingfeng Liu, Zhendong Zhao. 534-538 [doi]
- Pilot free trade zones and investment efficiency - - A study based on double machine learning and staggered DIDLiyuan Meng, Zhen Jiang. 539-545 [doi]
- Environmental Risk Identification and Control Strategy of Extra High Voltage AC Transmission and Substation Project Based on AHP-Fuzzy Comprehensive Evaluation MethodYangsen Li, Nengming Jiang, Xianghua Guo, Jiayu Zhao, Xuanbin Hu, Xiaoyu Yu, Chuankai Rao. 546-556 [doi]
- An industrial innovation chain optimisation model considering perturbation risk in the perspective of group decision makingYuxuan He, Benhai Guo, Kunyu Xiang. 557-562 [doi]
- Industrial Internet edge computing security risk analysis and protection researchJian Kong, Yu Zhang, Guangming Sun, Yong Liu, Juan Liu. 563-567 [doi]
- Early Warning and Risk Analysis of Internet Finance Based on Data Mining AlgorithmManhong Wen, Nianjiao Peng, Juan Xiang. 568-573 [doi]
- Driver behavior analysis in diverging area based on driving simulationXiaoduo Gao, Yanhu Li, Zhaoyu Zheng, Tao Zhao, Xiaolei Liu, Jianqing Wu. 574-579 [doi]
- A Method for Formal Model Generation in the Teaching of Software Design and AnalysisXi Wang, Jinhui Lai, Yijia Ouyang, Hui Xu. 580-586 [doi]
- Collaborative Design and Implementation of Inter-provincial and Intra-provincial Power Settlement Business Based on Service MeshBoyang Chen, Zhongyang Chen, Min Wu, Lin Cheng. 587-593 [doi]
- Design of early warning model of electricity charge recovery risk based on clustering data cleaningSheng Yang, Jinming Liu, Chengjun Wang. 594-598 [doi]
- Construction of a Privacy Management Framework for AIoT Enterprises Based on Risk AnalysisPengyu E. 599-608 [doi]
- Trends and Changes of Employment in High-tech Industries After COVID-19Siqi Chen. 609-614 [doi]
- Review on the Applications of Virtual Reality in Civil AviationLingqiao Shui, Fang Wang, Zhe Wei. 615-619 [doi]
- Development And Application of Electronic Tax Declaration Robot for Individual Income Tax Based on UipathYingmin Zhang, Shuqin Hao, Shuo Li. 620-624 [doi]
- Hardware and Software Infrastructure Driven by Big Data: Challenges and ProspectsKangyelin Chen, Fang Wang, Zhe Wei. 625-631 [doi]
- Fake Reviews Identification and Risk ManagementBikai Yuan. 632-636 [doi]
- Supply chain innovation paths and resilience management under sudden social public events: a meta-analysisShengzhu Li, Cong Xiang. 637-643 [doi]
- Research on route selection and speed optimization for carbon intensity indicator (CII) ratingYuan Jiang. 644-649 [doi]
- Building Recognition Based on Improved U-Net ModelYanbin Pan, Haiwen Xu, Hao Yan, Yue Wang, Jide Qian. 650-655 [doi]
- Analysis of Omni-directional Collision and Study of Influence Law of Cable-stayed Bridge BarriersGuangyin Guo, Yuanying Meng, Xin Wang, Botao Zheng, Siyuan Liu. 656-667 [doi]
- Aircraft risk inducement analysis based on small probability featuresJintao Wang, Shilin Jin, Zhaorui Zhang, Depeng Zhao. 668-673 [doi]
- Risk assessment of tanker washing based on AHP-risk matrix methodDi Zhang, Yaping Gong, Hui Chen, Quan Shi, Yanxin Zhang, Shu Wu. 674-680 [doi]
- Research on Risk Management of Road Transportation of Hazardous Chemicals in China Based on AHP-FCE MethodLei Sun, Zexia Yu, Huaqiong Liu. 681-686 [doi]
- Research on Light Pollution Risk Level Assessment Model Based on Big DataGan He, Ruihao Du. 687-691 [doi]
- How to mitigate enterprise safety production risks and government supervision fluctuation: An evolutionary game system simulation approachYingying Ma, Huidong Zhang, Yawei Xue, Wenyan Yao, Ruifang La, Qin Wang. 692-698 [doi]
- Provincial Energy Supply and Demand Risk Assessment Based on GRA-AHP-EWM MethodXianfu Gong, Yilin Huang, Xiaoke Yun, Tianren Zhang, Yaodong Li, Bo Peng. 699-704 [doi]
- A Study of Risk Assessment and Avoidance Strategies in Supplier IntroductionWeijun Wang, Rui Ma, Zhong Yang, Xiaojie Zhang, Zhuowen Li. 705-713 [doi]
- Enterprise Digital Transformation Risk Identification and Dynamic Assessment Model under Big Data PerspectiveWanqing Liu, Wei Le. 714-719 [doi]
- Research on optimization of emergency rescue plan based on risk measurementFanbiao Bu, Xuhao Chen 0005, Ying Lv, Hengrui Xu. 720-725 [doi]
- The unltimate controller, Internal control and Financial risk management of cash holdings: Evidence from Chinese private listed companiesMandan Cao, Zhihua Gan, Huiru Huang. 726-731 [doi]
- Research in Variable Period Flexible Detection Scheduling Problem Based on Risk AssessmentYewei Feng, Liang Ao, Xinxin Li, Xueli Deng. 732-736 [doi]
- Research on carbon management risk of power grid enterprises based on AHP-FCEGuiyuan Xue, Xiaojun Zhu, Wenjuan Niu, Zheng Xu, Chen Chen. 737-742 [doi]
- Implementation of Using AI to Manage Known and Unknown Risks in Risk ManagementWenbo Zhao. 743-749 [doi]
- Considering Safety Risk Prediction and Prevention and Control under the Influence of Heterogeneous Pedestrian EmotionsJiangtao Tian, Qinghua Guo, Xingli Li. 750-755 [doi]
- Risk analysis and selection decision model of family farm entrepreneurial projectsXiaofeng Li, Yu Mou, Jian Pan. 756-760 [doi]
- Evolutionary game research of safety production supervision of chemical enterprisesXiaoyu Zhu, Mingguang Zhang, Tong Liu. 761-766 [doi]
- Risk warning model of road transportation of hazardous chemical tanker based on D-S evidence theoryYuanyuan Liu, Mingguang Zhang, Zhen Xu, Mengcheng Liu. 767-772 [doi]
- Research on building of scientific data security risk governance capability maturity modelMing Jin. 773-780 [doi]
- Empirical analysis based on structural equation modelling About ChatGPT acceptance riskYi Zhang, Cungu Zhou. 781-784 [doi]
- Risk Analysis of Infrastructure Asset-backed Securitization under Big Data EnvironmentLijun Zhang, Junwen Feng, Bo Feng. 785-791 [doi]
- Research on the safety risk assessment method of the external road transport channel of dangerous goods in the chemical park in the cityWenji Fan, Yibin Zhao 0007, Shihui Tian. 792-798 [doi]
- Flotation Industrial Process control based on Model-assisted deep reinforcement learning methodYixuan Chen, Jia Wu, Touseef Ali, Wenyan Tang. 799-804 [doi]
- Research on Railway Network Data Security Risk Assessment Method Based on Attack and Defense Resource AllocationGuangjie Zhu, Yizhuo Wu, Qi Li, Honglei Yao. 805-814 [doi]
- Research on the Agricultural Risk Management in the Era of Big DataXi Zou. 815-820 [doi]
- Navigation Risk Assessment of LNG Ships in Port Waters Based on Bayesian NetworksMeiling Han, Mingxi Li, Lin Cong, Xin Zhang. 821-825 [doi]
- Research on risk assessment of cold chain logistics based on support vector machine modelYulin Cao, Qi Ding. 826-830 [doi]
- The impact of climate change on China's marine strategy and the construction of risk assessment systemXiaofeng Liu, Junyao Luo, Jianguang Ma. 831-839 [doi]
- Early Warning of Listed Companies Financial Risk Based on Hybrid Sampling and Back-propagation Neural Network: Evidence from ChinaChen Gong, Yanhong Wang, Chen Tao. 840-846 [doi]
- Research on status of transmission line inspection technology and Air-Space-Ground Integrated stereo inspection technologyLinfei Xu, Sihang Zhang, Zhi Yang, Linze Bai, Bin Liu, Bin Zhao. 847-851 [doi]
- Research on Methods for Identifying Enterprise Partnerships from the Perspective of Technology ConvergenceDongsheng Zhai, Yongle Guo, Guoqiang Liang. 852-858 [doi]
- Current Status and Prospects of Risk Management Research in the Era of Big Data IntelligenceRenlong Deng, Jiang Jiang, Chaomin Ou, ZhiYu Chen, Huiming Li. 859-864 [doi]
- Evolutionary Strategies for Collaborative Innovation in Artificial Intelligence-Based New Energy Vehicle EnterprisesRu Liu, Hongzhen Lei. 865-869 [doi]
- Analysis on Risk Evolution Mechanism and Emergency Management Ability of Public Health Emergencies in Colleges and Universities under The Background of Risk SocietyYu Dong. 870-876 [doi]
- Risk Assessment of Urban Rainstorm and Flood Disasters from the Perspective of ResilienceXiaotong Sun, Guofeng Wen. 877-882 [doi]
- Research on the Application of Data Governance and Road Network Situation Assessment Technology in Smart HighwayMuhan Deng, Shibei Du, Song Ma, Mo Ling. 883-890 [doi]
- Online Data Monitoring Method for Operation Efficiency of Pump Equipment in Pumped Storage Power StationZengtao Zhao, Yumin Peng, Yan Shen, Fanqi Huang. 891-896 [doi]
- Analysis of the Impact of Train Delays on the Passenger Flow Organization of Double Line Transfer Subway Stations during Peak HoursHuan Li, Hongxu Chen. 897-902 [doi]
- Research on Infrastructure Data Dictionary for Highway Asset ManagementYeran Huang, Jianyang Cao, Jierui Zhu, Huixiang Zhao, Mingying Hu, Sheng Yin. 903-908 [doi]
- Remaining Useful Life Prediction with Missing Data based on Knowledge DistillationBaoping Cheng, Kai Zhang, JunJie Zhao, Sheng Wang, Junjie Yuan. 909-916 [doi]
- Research on the Application of Intelligent Data Analytics in Personalized Customization in the Context of Big DataYing Yu, Zicun Zhao. 917-921 [doi]
- Research on strawberry category detection method based on improved YOLOv7 modelXin Jin, Shenming Gu, Ruixuan Zhang, Jiale Yuan. 922-927 [doi]
- Airport Runway Foreign Object Detection Method Based on Improved YOLOv8Huanshu Gou, Haixia Pan. 928-934 [doi]
- Rapid location technology of power grid around airport based on three-dimensional visualization of clearance area and GISXiang Yin, Yan Zhang, Xingang Wang, Jiansheng He, Liang Zhai, Xiaoti Wang. 935-939 [doi]
- COVID-19 Risk Analysis Based on Population Migration Big Data: A Case Study of WuhanXuepu Zhang, Xin Liu. 940-946 [doi]
- Environmental Quality Assessment in Fujian Province Based on Factor Analysis and Cluster AnalysisMeng Chen. 947-954 [doi]
- Classification Method of Unstructured Data of Massive Hydropower Stations Based on Big Data Processing TechnologyXudong Lu, Qingsong Zhang, Xiaomin Wang, Xuan He, Jun Fu, Yu Wu, Mingliang Tang. 955-959 [doi]
- Exploring the Role of Big Data Analytics on Engineering CostsRuiqi Han. 960-964 [doi]
- A Review of Multi-source Data-driven PV Facilities in Agricultural Regions for Low-Carbon Operation and Decision-makingYueming Ding, Rongxi Cui, Xingwang Lu, Jiayu Xu, Xiangjun Meng, Feng Wang, Guofeng Tian, Zheng Fu. 965-970 [doi]
- A Visual Analysis of the Hotspots of the Nanjing Massacre Research in the Context of Big DataYachun Ge, Xiaobo Liang. 971-975 [doi]
- Analysis of the pricing correlation of new energy vehicles and core spare parts based on big dataTianli Zu, Bing Xue, Shouchen Ding. 976-985 [doi]
- Trusted Non-intrusive Data Exchange based on Ontology in Logistics IndustryLianzheng Xu, Deqian Fu, Jianlong Qiu. 986-991 [doi]
- Research on the Construction of Sensitive Energy Data Identification Model and Technologies for Active Distribution NetworkWeixuan Meng, Chunsheng Chen, Yang Yang, Lei Yang, Xiaona Han, Dongfang Zhang. 992-995 [doi]
- Data Empowerment Research on Building an Innovative Path of Management and Education in the Administrative Departments of Colleges and UniversitiesYang Yang, Xiuxiu Luo. 996-1000 [doi]
- A Research on the Application of Digital Twin in Ship IndustryXinyu Liu, Juntao Zhao, Yingying She. 1001-1006 [doi]
- Numerical simulation study of premixed combustion with hydrogen leakage in fuel cell bus tunnelShuang Li, Xiangzhi Kong, Lijing Zhang, Gang Tao. 1007-1011 [doi]
- Numerical simulation of fire and evacuation in comprehensive experimental office buildingLi Li, Gang Tao, Lijing Zhang. 1012-1016 [doi]
- Research on Dynamic Emergency Decision-Making of Emergencies Considering Group Members Conflicts and Social Network Big DataTaibao Sun. 1017-1030 [doi]
- A Study on Decision Management Between Agriculture-Related Platforms and Farmers in the Context of Big DataYu Yang. 1031-1035 [doi]
- Vigilance Against Autonomous Mining of Trade Secrets During Python-Based Web Crawling of DataJikuan Xu. 1036-1042 [doi]
- The Innovative Application of Big Data in Chinese Media IndustryYanling Lan, Sihang Liu 0008. 1043-1048 [doi]
- Research of Digital Twin Technology Application in Large Sea Reclamation ProjectJinchao Ma, Shufei Mao, Yang Li. 1049-1054 [doi]
- Research on the Development of Digital Business Forecasting in the 'Commerce, Culture, and Tourism Plus' Model Based on Big Data and Predictive ModelsYanyan Li 0002. 1055-1059 [doi]
- Enterprise Credit Rating Model Based on Long and Short-Term Trend of Desensitized Power Load DataYi Wu, Zenghui Xi, Weibin Wang, Qian Li. 1060-1064 [doi]
- Visualization Analysis of Public Opinion Governance Research Based on LDA Model, CiteSpace and VOSviewerWenyan Guo, Nengwu Xu. 1065-1072 [doi]
- Analysis of Hot Spots and Frontier Trends of Adolescent Health Behavior Research Based on Cite SpaceLi Jiang. 1073-1079 [doi]
- Study on Big Data Applications in Civil Aviation Airport Management and ServicesSen Wang, Zhe Wei, Fang Wang. 1080-1086 [doi]
- Privacy Protection and Data Security for Big Data Encryption: A ReviewZhanpeng Zhou, Zhe Wei, Fang Wang. 1087-1091 [doi]
- Research on Aircraft Tracking Technology Based on Improved DeepSORT AlgorithmYanwen Zhang, Miao Wang, Yuwen Fu. 1092-1097 [doi]
- Research based on Mixed Sample Data Augmentation methodHaoyu Li, Dongming Zhou, Changcheng Wang, Qian Zhao. 1098-1104 [doi]
- Sensitivity Analysis of Surface Subsidence Parameters in Connecting ChannelsGuangjie Fu, Zhenlei Chen, Liang Peng. 1105-1110 [doi]
- Evaluation of the Competitiveness of 17 National Tourism Comprehensive Demonstration Zones in Niche Tourism Based on Big DataHuan Li, Xiaoxiao Yang, Jinghui Yin, Xiaoxu Yang. 1111-1119 [doi]
- Backdoor Detection Based on Static Code Analysis and Software Component AnalysisGuanji Yue, Hua Xiao, Jing Chen. 1120-1124 [doi]
- A Detection and Classification Method of Asphalt Pavement Crack based on Vision TransformerYulong Yang, Chen Guo, Chen Zuo, Bingxin Yang. 1125-1131 [doi]
- Research on the Equalization of Public Service for China Based on the Theil Index and K-Means AlgorithmKang Sun, Jingyun Xu, Tongyuan Bai, Ping Xu, Shuai Xue. 1132-1137 [doi]