Abstract is missing.
- Fuzzy Clustering: A New Clustering Method in Heterogeneous Medical Records SearchingZhenyu Zhang, Wencheng Sun, Zhiping Cai, Ningzheng Luo, Ming Wang. 3-15 [doi]
- NOAA-LSTM: A New Method of Dialect IdentificationShuai Ye, Cuixia Li, Ruoyan Zhao, Weidong Wu. 16-26 [doi]
- Evaluation Method of Teachers' Teaching Ability Based on BP Neural NetworkPengchao Niu, Yuan Sun, Wei Song, Shijiao Zhang. 27-38 [doi]
- Research on the Promotion of Tibetan New Words and Platform DesignHao Li, Yuan Sun, Wei Song, Jie Qin. 39-50 [doi]
- A Classification Model for Drug Addicts Based on Improved Random Forests AlgorithmTianyue Chen, Haiyan Gu. 51-62 [doi]
- Studying L-Diversity and K-Anonymity Over Datasets with Sensitive FieldsFranck Seigneur Nininahazwe. 63-73 [doi]
- Power System Transient Stability Prediction Algorithm Based on ReliefF and LSTMBo Li, Ting Wen, Chao Hu, Bo Zhou. 74-84 [doi]
- A No-Pairing Proxy Re-Encryption Scheme for Data Sharing in Untrusted CloudXin Qian, Zhen Yang, Shihui Wang, Yongfeng Huang. 85-96 [doi]
- E-Sports Ban/Pick Prediction Based on Bi-LSTM Meta Learning NetworkCheng Yu, Wan-ning Zhu, Yu-meng Sun. 97-105 [doi]
- Bottlenecks and Feasible Solutions of Data Field Clustering in Impact Factor, Time Resolution, Selecting Core Objects and Merging ProcessHong Zhang, Hanshuo Wei, Youchen Shen, Hui Wang, Qiumei Pu. 106-120 [doi]
- Detection of Microblog Overlapping Community Based on Multidimensional Information and Edge Distance MatrixChunhui Deng, Huifang Deng, Youjun Liu. 121-136 [doi]
- Research on Settlement Deformation of Asphalt Pavement Structure in Soft Soil Zone Based on Pavement Settlement TheoryCongrong Tang, Xin Xu, Haiyan Ding. 137-147 [doi]
- Legal Case Inspection: An Analogy-Based Approach to Judgment EvaluationShang Li, Bin Guo, Yilei Cai, Lin Ye, Hongli Zhang, Binxing Fang. 148-158 [doi]
- A Novel Noise Filter Based on Multiple VotingWeiwei Zhu, Hao Yuan, Liang Wang, Ming Wan, Xing Li, Jingbin Ren. 159-170 [doi]
- Fuzzy Control Method for Path Tracking System of Combine HarvesterNan Qiao, Li-Hui Wang, Yue-xin Zhang, Xinhua Tang. 171-181 [doi]
- Research on Opinion Spam Detection by Time Series Anomaly DetectionYe Wang, WanLi Zuo, Ying Wang 0009. 182-193 [doi]
- Application of Machine Learning Methods for Material Classification with Multi-energy X-Ray Transmission ImagesQingqing Chang, Weijiao Li, Jiamin Chen. 194-204 [doi]
- Intra-class Classification of Architectural Styles Using Visualization of CNNRui Wang, Donghao Gu, Zhaojing Wen, Kai Yang, Shaohui Liu, Feng Jiang. 205-216 [doi]
- MSE-Net: Pedestrian Attribute Recognition Using MLSC and SE-BlocksMiaomiao Lou, Zhenxia Yu, Feng Guo, Xiaoqiang Zheng. 217-226 [doi]
- CBAM-GAN: Generative Adversarial Networks Based on Convolutional Block Attention ModuleBing Ma, Xiaoru Wang, Heng Zhang, Fu Li, Jiawang Dan. 227-236 [doi]
- A Novel Distributed Knowledge Reasoning ModelYashen Wang, Yifeng Liu, Haiyong Xie 0001. 237-247 [doi]
- Research on Detection Method of Abnormal Traffic in SDNYabin Xu, Chenxiao Cui, Ting Xu, Yangyang Li. 248-259 [doi]
- Research on Constructing Technology of Implicit Hierarchical Topic Network Based on FP-GrowthWentao Yu, Mianzhu Yi, Zhufeng Li. 260-272 [doi]
- PPD-DL: Privacy-Preserving Decentralized Deep LearningLei Song, Chunguang Ma, Peng Wu, Yun Zhang 0009. 273-282 [doi]
- Towards Edge Computing Based Distributed Data Analytics Framework in Smart GridsChunhe Song, Tong Li, Xu Huang, Zhongfeng Wang, Peng Zeng 0001. 283-292 [doi]
- Android Malware Identification Based on Traffic AnalysisRong Chen, Yangyang Li, Weiwei Fang. 293-303 [doi]
- Unsupervised Traditional Chinese Medicine Text Segmentation Combined with Domain DictionaryQi Jia, Yonghong Xie, Cong Xu, Yue Zhou, Dezheng Zhang. 304-314 [doi]
- Research on the Efficiency and Application of Ship-Helicopter Cooperative SearchYan Xu, Yan-jie Niu, Wei-gang Fang, Ting-ting Zhang. 315-326 [doi]
- Cellular Neural Network Based Contour Detection for Seismic ImageJiangang Xie, Guiying He, Xiaohong Xiao. 327-337 [doi]
- Discovering New Sensitive Words Based on Sensitive Information CategorizationPanyu Liu, Yangyang Li, Zhiping Cai, Shuhui Chen. 338-346 [doi]
- A Dynamic Event Region Tracking Approach Based on Node CalibrationXiang Yu, Hui Lu, Le Wang, Dapeng Man. 347-357 [doi]
- A Graph Updating Method of Data Theft Detection Based on Rough SetXiang Yu, Le Wang, Shuang Chen, Yanbo Li. 358-367 [doi]
- A Tutorial of Graph RepresentationYuanyuan Chen, Hui Lu, Jing Qiu, Le Wang. 368-378 [doi]
- Ground-Based Cloud Images Recognition Based on GAN and PCANetLiling Zhao, Yi Lin, Zelin Zhang, Siqi Wang. 379-390 [doi]
- Sparse Representation-Based Radiomics in the Diagnosis of Thyroid NodulesYunhua Cao, Ying Fu, Guang Yang. 391-401 [doi]
- Local Smoothing Constraint in Convolutional Neural Network for Image DenoisingYonghong Guo, Feng Jiang, Dongyang Zhao, Zhaojing Wen, Shaohui Liu. 402-410 [doi]
- Perceptual Loss Based Super-Resolution Reconstruction from Single Magnetic Resonance ImagingGuang Yang, Yunhua Cao, Xiaoyang Xing, Min Wei. 411-424 [doi]
- DWI Fiber Tracking with Functional MRI of White MatterXiaofeng Dong, Dan Xiao, Zhipeng Yang. 425-433 [doi]
- Multi-objective Investment Decision Making Based on an Improved SPEA2 AlgorithmXi Liu, Dan Zhang. 434-443 [doi]
- Power Load Forecasting Based on Adaptive Deep Long Short-Term Memory NetworkJunbo Wu, Ping Zhang, Zheng Zheng, Min Xia. 444-453 [doi]
- Optimized White Matter Fiber Reconstruction Using Combination of Diffusion and Functional MRIDan Xiao, Xiaofeng Dong, Zhipeng Yang. 454-462 [doi]
- Convolutional Neural Networks for Scene Image RecognitionYulian Li, Chao Luo, Hao Yang, Tao Wu. 463-474 [doi]
- A Classification Model of Power Equipment Defect Texts Based on Convolutional Neural NetworkJunyu Zhou, Guoming Luo, Chao Hu, Yiguo Chen. 475-487 [doi]
- Research on Artificial Intelligence Technology in Computer Network TechnologyTingting Yang, Shuwen Jia. 488-496 [doi]
- Research on Detection Method of Unhealthy Message in Social NetworkYabin Xu, Yongqing Jiao, Shujuan Chen, Yangyang Li. 497-508 [doi]
- Image Authentication by Single Target Region DetectionHuanrong Tang, Zhuosong Fu, Jian-quan Ouyang, Yunhua Song. 509-515 [doi]
- Security Approaches and Crypto Algorithms in Mobile Cloud Storage Environment to Ensure Data SecurityMicheal Ernest Taylor, David Aboagye-Darko. 516-524 [doi]
- Probe-Polling: A Polling Based MAC Protocol for Energy Harvesting Wireless Sensor NetworksYu Han, Guangjun Wen, Chu Chu, Jian Su. 525-536 [doi]
- An Dynamic Protocol for the Quantum Secure Multi-party Summation Based On Commutative EncryptionWen Liu, Min-Yao Ma. 537-547 [doi]
- Optimal Resource Allocation for Energy Harvesting Cognitive Radio Network with Q LearningXiaoli He, Hong Jiang, Yu Song, Xiufeng Yang, He Xiao. 548-560 [doi]
- Facial Expression Recognition Based on Complete Local Binary Pattern and Convolutional Neural NetworkPingping Yu, Yaning Nie, Ning Cao 0002, Russell Higgs. 561-572 [doi]
- A Novel Malware Detection and Classification Method Based on Capsule NetworkShu-Wei Wang, Gang Zhou, Ji-cang Lu, Feng-juan Zhang. 573-584 [doi]
- Application of Gradient Boosting Decision Tree in Wind Turbine Drivetrain RecognitionQiang Cheng, Aidong Deng, Jing Li, Yimeng Zhai. 585-594 [doi]
- Implementation of MD5 Collision Attack in ProgramYuying Li, Xiaohan Helu, Mohan Li, Yanbin Sun, Le Wang. 595-604 [doi]
- Automatic Discovery Mechanism of Blockchain Nodes Based on the Kademlia AlgorithmLiwen Zheng, Xiaohan Helu, Mohan Li, Hui Lu. 605-616 [doi]
- Monochromatic Mutual Nearest Neighbor Queries Over Uncertain DataYifei Chen, Liling Zhao, Pengjiang Mei. 617-629 [doi]
- Network-Embedding Based Storage Location Assignment in Mobile Rack WarehouseJing Qiu, Yaqi Si, Yuhan Chai, Yan Liu, Dongwen Zhang, Hao Han, Le Wang. 630-639 [doi]
- Efficient PatchMatch-Based Image Registration and Retargeting for Cartoon AnimationChuanyan Hao, Bo Jiang, Weiming Wu, Sijiang Liu, Liping He. 640-651 [doi]