Abstract is missing.
- DDQO: An Algorithm for Distributed Database Query OptimizationLiang Dong, Ankang Chu, Fengkui Liu. 1-5 [doi]
- Optimized Speculative Execution Strategy for Different Workload Levels in Heterogeneous Spark ClusterXiaohan Huang, Chunlin Li 0001, Youlong Luo. 6-10 [doi]
- IPGOD: An Integrated Visualization Platform Based on Big Data Mining and Cloud ComputingWei-Yu Chen, Peggy Joy Lu, Steven Shiau. 11-16 [doi]
- Intermediate Data Placement Strategy for Different Data Skew Levels Based on Random Sampling in SparkXueqian Gong, Chunlin Li 0001, Youlong Luo. 17-23 [doi]
- Learning Partial-Value Variable AssociationsNong Ye, Ting Yan Fok. 24-28 [doi]
- Multi-join Query in Database Based on Genetic and Ant Colony Algorithm OptimizationLingling Shi, Dongzhi He. 29-33 [doi]
- Secure Deduplication on Public Cloud StorageHendrik Graupner, Kennedy A. Torkura, Muhammad I. H. Sukmana, Christoph Meinel. 34-41 [doi]
- Developing a Minimum Viable Product for Big Data and AI Education: Action Research Based on a Two-Year Reform of an Undergraduate Program of Internet and New MediaHan-Teng Liao, Zijia Wang, Xue Wu. 42-47 [doi]
- DeepJS: Job Scheduling Based on Deep Reinforcement Learning in Cloud Data CenterFengcun Li, Bo Hu. 48-53 [doi]
- Incremental Electricity Consumer Behavior Learning Using Smart Meter DataZigui Jiang, Rongheng Lin, Fangchun Yang. 54-59 [doi]
- Data Analytics for Engagement In Stem EducationSwee Shu Luing Nikalus, Sim Ee Kee, Guan Hin Chau, Pei Ling Ooi. 60-63 [doi]
- Green Optical Networking for Big Data TransferZilong Ye. 64-67 [doi]
- Prediction and Evaluation of Urban Eco-sports Tourism Behavior Using Data Mining TechnologyFan Zhang. 68-71 [doi]
- Evaluation of Large-scale Complex Systems Effectiveness Based on Big DataSun Zhi-peng, Chen Gui-ming, Zhang Hui. 72-76 [doi]
- Identity Credibility Evaluation Method Based on User Behavior Analysis in Cloud EnvironmentJianjiang Jin, Long Chen. 77-82 [doi]
- The Container Scheduling Method Based on the Min-Min in Edge ComputingFeifei Chen, Xiaofeng Zhou, Chao Shi. 83-90 [doi]
- Scheduling Strategy of Space-based Satellite Based on Fireworks Algorithm under Cloud ComputingGuilin Tian, Changyun Liu, Haobo Jiang. 91-96 [doi]
- SMHC: A Synthetic Metric for Heterogeneous Resources in Cloud ComputingLele Li, Zhibin Yu 0001. 97-101 [doi]
- Service Structure Mechanism Based on Edge Computing in Emergency Disaster Recovery ScenarioTing Xing, Kang Lu, Mengyu Li, Xushan Chen. 102-106 [doi]
- Online Scheduling Strategy to Minimize Penalty of Tardiness for Real-Time Tasks in Mobile Edge Computing SystemsXi Chen, Hongli Xu, Liusheng Huang. 107-114 [doi]
- Research on Optimization of Course Selection System Based on Micro service and Dynamic Resource ExtensionPingrong Lin, Zheyuan Lin, Xiaoquan Shi. 115-119 [doi]
- On the Performance of the r-k Class Estimator in Partial Linear ModelYong Li, Jibo Wu. 120-124 [doi]
- Intrusion Detection Based on Approximate Information Entropy for Random Forest ClassificationLe Yang, Manchun Cai, Yongcheng Duan, Xue Yang. 125-129 [doi]
- The Stock Classification Based on Entropy Weight Method and Improved Fuzzy C-means AlgorithmZhenyu Wu, Guangda Chen, Jingjing Yao. 130-134 [doi]
- A Model Selection Method for Machine Learning by Differential EvolutionYi-Chuan Chiu, Hsing-Hung Lin, Yung-Tsan Jou. 135-139 [doi]
- Bot-like Behavior Detection in Online BankingYuan Wang, Liming Wang. 140-144 [doi]
- Application of ELM in Key Impact Factors Identification of Rail Transit System CostHaolin Chen, Jihong Yang, Gang Xu, Guofei Gao, Quan Yuan, Zhouxin Li, Ziqi Wang, Yanfei Li, Hui Liu. 145-150 [doi]
- An Efficient Anomaly Detection Framework for Electromagnetic Streaming DataDegang Sun, Yulan Hu, Zhixin Shi, Guokun Xu, Wei Zhou. 151-155 [doi]
- Research on KNN Algorithm in Malicious PDF Files Classification under Adversarial EnvironmentKunming Li, Yijun Gu, Peijing Zhang, an Wang, Wenzheng Li. 156-159 [doi]
- A Comparison of MFCC and LPCC with Deep Learning for Speaker RecognitionHaiyan Yang, Yanrong Deng, Hua-An Zhao. 160-164 [doi]
- An AR Based Edge Maintenance Architecture and Maintenance Knowledge Push Algorithm for Communication NetworksRuide Li, Guohua Gao, Yingjie Liang, Xin Zhang, Yongqiang Liao. 165-168 [doi]
- Research on Collaborative Filtering Recommendation Algorithm Based on Sentiment Analysis and Topic ModelPing Sun, Jinshan Li, Guohui Li. 169-178 [doi]
- An Embedded Model XG-FwFMs for Click-Through RateXiujin Shi, Tian Zhang, Wenbin Dong, Zhixiang Deng. 179-184 [doi]
- Foreign Commodity Sales Forecast Based on Model FusionDoudou Dong, Rui He, Guixi Xiong. 185-188 [doi]
- A Geo-weighted Grey Theory Model on the Opioid CrisisRui Liang, Danxuan Liu. 189-193 [doi]
- Network Security Situation Factor Extraction Based on Random Forest of Information GainYongcheng Duan, Xin Li, Xue Yang, Le Yang. 194-197 [doi]
- Adoption of Information Technology in Public Accounting FirmRindang Widuri, Bambang Leo Handoko, Ilham Condro Prabowo. 198-202 [doi]
- New Cryptographic Algorithm Based on CFAMuhammad Azhar Mushtaq, Abid Sultan, Asad Razzaq, Ehsaan-ur-Rehman, Muhammad Inaam-ur-Rehman. 203-208 [doi]
- Research on the Consumer Reviews of JD Bookstore Based on Text Mining TechnologyAiting Xu, Pingting Ying, Fangyan Wang. 209-214 [doi]
- A Modified Hash Based Least Significant Bits Algorithm for SteganographyStella D. Muyco, Alexander A. Hernandez. 215-220 [doi]
- Xiaomi Brand Appraisal Research Based on Zhihu by Text Mining TechnologyAiting Xu, Fangyan Wang, Pingting Ying. 221-225 [doi]
- An Index with Caching Mechanism for Real-time Processing SystemShiming Sun, Yuanhe Tang, Fu Zhou. 226-230 [doi]
- Factors Influencing Purchase Intention in the Smartphone Selection Context in Millennials GenerationHaryadi Sarjono, Celinsky Brenda Sasmita, Bambang Leo Handoko. 231-236 [doi]
- Research on Online Publicity Effect Evaluation of Significant SubjectYanyan Wang, Ruixue Zhang, Fulian Yin. 237-241 [doi]
- New Cryptographic Algorithm Using ASCII Values and Gray Code (AGC)Muhammad Azhar Mushtaq, Abid Sultan, Muhammad Afrasayab, Taimoor Zubair, Abid-bin-Shakir. 242-246 [doi]
- Data Mining of Students' Course Selection Based on Currency Rules and Decision TreeYu Liang, Xuliang Duan, Yuanjun Ding, Xifeng Kou, Jingcheng Huang. 247-252 [doi]
- Multi-level Container Checkpoint Performance Optimization Strategy in SDDCHanlin Zhang, Ningjiang Chen, Yusi Tang, Birui Liang. 253-259 [doi]
- Optimization of Computing Time for Sequential MapReduce JobsDetian Li, Tao Gu, Qun Liao, Yulu Yang. 260-264 [doi]
- Improved Three-point Correction Model for Inertial Navigation System Based on Measurement Error and Dynamic Detuning AngleWei-xing Xia, Yu-hao Shan. 265-270 [doi]
- Technology Acceptance Model on Micro Business Owner in Grogol Petamburan DistrictBambang Leo Handoko, Gatot Soepriyanto, Ang Swat Lin Lindawati. 271-276 [doi]
- Margin-based Sampling in Deep Metric LearningShangwei Zhou, Qingsong Yu, Jun Sun. 277-280 [doi]
- Accelerated Proximal Gradient Method with Line Search for Large-Scale Nonconvex Penalty ProblemsZhongming Wu, Kai Wang, Zhangjin Zhou. 281-286 [doi]
- Sensitivity Analysis of Cost Elements in Rail Transit System Using EO-FNNHengxin Yin, Senhua Lai, Gang Xu, Quan Yuan, Guofei Gao, Zhu Duan, Chao Chen, Yanfei Li, Hui Liu. 287-292 [doi]
- Revelation of a High-order Arithmetic Sequence with the Same First Term and Common DifferenceYang Li. 293-298 [doi]
- Research of Motor Skills Performance Evaluation Decision Support System Based on Data Mining AlgorithmFan Zhang. 299-303 [doi]
- 3D Dense Dilated Hierarchical Architecture for Brain Tumor SegmentationParvez Ahmad, Hai Jin 0001, Saqib Qamar, Ran Zheng, Wenbin Jiang, Belal Ahmad, Mohd Usama. 304-307 [doi]
- SLFAG: Scan Line Fill Algorithm for PCB Image Rasterization Based on GPGPULingfeng Lin, Dengji Gao, Zhibin Yu 0001. 308-312 [doi]
- High Dynamic Range Imaging with Multiexposure Image fusion: A Variational Frame workSujatha K, Gaurav Gupta. 313-321 [doi]
- Design of Asynchronous Non-block Server for Agricultural IOTLei Yu, Han Qiu, Junhuai Li, Yong Chang. 322-327 [doi]
- Cognitive Ability Evaluation Model for Network TeachingMinyu Xu, Jun Shen. 328-332 [doi]
- Hybrid Position Forecasting Method for Mobile Robot Transportation in Smart Indoor EnvironmentZhu Duan, Hui Liu 0023, Xinwei Lv, Zhiren Ren, Steffen Junginger. 333-338 [doi]
- A Node Backup Algorithm for Fault Cascade Degradation in Virtualization Power Communication NetworkHuifeng Sun, Xushan Chen, Zhen Xia, Mengyu Li. 339-343 [doi]