Abstract is missing.
- Combining Explicit and Implicit Semantic Similarity Information for Word EmbeddingsShi Yin, Yaxi Li, Xiaoping Chen. 1-8 [doi]
- Optimization of Contract Distribution Based on Multi-objective Estimation of Distribution AlgorithmLaihong Hu, Xiaogang Yang, Hongdong Fan. 9-12 [doi]
- Improvement on Speech Emotion Recognition Based on Deep Convolutional Neural NetworksYafeng Niu, Dongsheng Zou, Yadong Niu, Zhongshi He, Hua Tan. 13-18 [doi]
- Genetic Algorithms with Local Optima Handling to Solve Sudoku PuzzlesFiras Gerges, Germain Zouein, Danielle Azar. 19-22 [doi]
- A Multi-Layer Neural Network Model Integrating BiLSTM and CNN for Chinese Sentiment RecognitionShanliang Yang, Qi Sun, Huyong Zhou, Zhengjie Gong. 23-29 [doi]
- A Topic Detection Method Based on KeyGraph and Community PartitionShanliang Yang, Qi Sun, Huyong Zhou, Zhengjie Gong, Yangzhi Zhou, Junhong Huang. 30-34 [doi]
- Effective and Explainable Detection of Android Malware Based on Machine Learning AlgorithmsRajesh Kumar 0014, Xiaosong Zhang, Riaz Ullah Khan, Jay Kumar, Ijaz Ahad. 35-40 [doi]
- Statistical Analysis of Extracted Data from Video Site by Using Web CrawlerMd Khalid Hossen, Yong Wang, Hussain Ahmed Tariq, Gabriel Nyame, Raphael Elimeli Nuhoho. 41-46 [doi]
- DeepXSS: Cross Site Scripting Detection Based on Deep LearningYong Fang, Yang Li, Liang Liu, Cheng Huang. 47-51 [doi]
- Detecting Webshell Based on Random Forest with FastTextYong Fang, Yaoyao Qiu, Liang Liu, Cheng Huang. 52-56 [doi]
- Fuzz Testing Based on Virtualization TechnologyLongbin Zhou, Zhoujun Li. 57-61 [doi]
- A Denoising Autoencoder Approach for Credit Risk AnalysisQi Fan, Jiasheng Yang. 62-65 [doi]
- Remote Intelligent Position-Tracking and Control System with MCU/GSM/GPS/IoTJianpei Shi, Liqiang Zhang, Daohan Ge. 66-70 [doi]
- Challenges of 5G Usability in Disaster ManagementDimiter Velev, Plamena Zlateva, Xuejun Zong. 71-75 [doi]
- Attribute-based Face Recognition and Application in Safety Detection of Intelligent FactoryXiangfeng Chen, Wenbai Chen, Peichao Xu, Mengyao Lv. 76-80 [doi]
- Malicious Code Detection based on Image Processing Using Deep LearningRajesh Kumar 0014, Xiaosong Zhang, Riaz Ullah Khan, Ijaz Ahad, Jay Kumar. 81-85 [doi]
- Evaluating the Performance of ResNet Model Based on Image RecognitionRiaz Ullah Khan, Xiaosong Zhang, Rajesh Kumar 0014, Emelia Opoku Aboagye. 86-90 [doi]
- Image Authenticity Decision Based on Random Sample Consensus and Circular Feature SelectionXueyan Li. 91-97 [doi]
- Human Segmentation with Deep Contour-Aware NetworkFiseha B. Tesema, Hong Wu, William Zhu. 98-103 [doi]
- Cloud Based Face Recognition for Google GlassZeeshan Shaukat, Faheem Akhtar, Juan Fang, Saqib Ali, Muhammad Azeem. 104-111 [doi]
- Extended Movement Unit Capable of Moving Rough Terrain for PepperNaoki Igo, Daichi Fujita, Ryusei Yamamoto, Toshifumi Satake, Satoshi Mitsui, Tetsuto Kanno, Kiyoshi Hoshino. 112-117 [doi]
- Probabilistic Time Context Framework for Big Data Collaborative RecommendationEmelia Opoku Aboagye, James C. Gee, Gao Jianbin, Rajesh Kumar 0014, Riaz Ullah Khan. 118-121 [doi]
- Supervised Prediction of China's Seven-Day Interbank Pledged Repo RateYiwu Lin, Liping Shen. 122-126 [doi]
- K-Nearest Neighbor Regression with Principal Component Analysis for Financial Time Series PredictionLi Tang, Heping Pan, Yiyong Yao. 127-131 [doi]
- Thermo-economic Multi-objective Optimization of Adiabatic Compressed Air Energy Storage (A-CAES) SystemWenjing Hong, Longxiang Chen. 132-138 [doi]
- Analysis and Design of Item Bank System Based on Improved Genetic AlgorithmJie Zhang. 139-143 [doi]
- Automatic Clustering of Natural Scene Using Color Spatial Envelope FeatureHaifeng Wang, Xiaoyan Wang, Yuchou Chang. 144-148 [doi]