Abstract is missing.
- Prediction of Crowdfunding Project Success with Deep LearningPi-Fen Yu, Fu-Ming Huang, Chuan Yang, Yu-Hsin Liu, Zi-Yi Li, Cheng-Rung Tsai. 1-8 [doi]
- Deep Learning Based Image Cognition Platform for IoT ApplicationsYan Sun, Lida Xu, Ling Li, Boyi Xu, Changbao Yin, Hongming Cai. 9-16 [doi]
- Meta-Feature Based Data Mining Service Selection and Recommendation Using Machine Learning ModelsBayan Alghofaily, Chen Ding. 17-24 [doi]
- Mining Emotions of the Public from Social Media for Enhancing Corporate Credit RatingHui Yuan, Raymond Y. K. Lau, Michael C. S. Wong, Chunping Li. 25-30 [doi]
- Solution and Reference Recommendation System Using Knowledge Fusion and RankingYu Zhang, Morteza Saberi, Elizabeth Chang 0001, Alireza Abbasi. 31-38 [doi]
- Research on Governmental Data Sharing Based on Local Differential Privacy ApproachLiping Liu, Chunhui Piao, Xuehong Jiang, Lijuan Zheng. 39-45 [doi]
- Towards a Process Analysis Approach to Adopt Robotic Process AutomationAbderrahmane Leshob, Audrey Bourgouin, Laurent Renard. 46-53 [doi]
- A Survey on Chatbot Implementation in Customer Service Industry through Deep Neural NetworksMohammad Nuruzzaman, Omar Khadeer Hussain. 54-61 [doi]
- A Hybrid Decision Model for Heterogeneous Schemes in "Internet Plus" Hackerspace Product DevelopmentYe Gu, Shu-you Zhang. 62-69 [doi]
- Service Dependency Based Dynamic Load Balancing Algorithm for Container ClustersJianxin Zhang, Rui Ren, Chengxi Huang, Xiang Fei, Wu-qun, Hongming Cai. 70-77 [doi]
- Optimal Evidence Collection for Accountability in the CloudFatma Masmoudi, Mohamed Sellami, Monia Loulou, Ahmed Hadj Kacem. 78-85 [doi]
- A Cross-Age Face Recognition Approach Using Fog Computing Architecture for User Authentication on Mobile DevicesPing Wang 0007, Wen-Hui Lin, Bao-Hua Wu, Kuo-Ming Chao, Chi-Chun Lo. 86-93 [doi]
- Topic Model Based Knowledge Graph for Entity Similarity MeasuringHaoran Sun, Rui Ren, Hongming Cai, Boyi Xu, Yonggang Liu, Tongyu Li. 94-101 [doi]
- Design of Evaluation System for Digital Education Operational Skill Competition Based on BlockchainBin Wu, Yinsheng Li. 102-109 [doi]
- Shapes Similarity and Feature Reconstruction Comparison Based Active Contour ModelNi Bo, Xiantao Cai, Jiaxin Chen. 110-118 [doi]
- Customer Segmentation and Strategy Development Based on User Behavior Analysis, RFM Model and Data Mining Techniques: A Case StudyMohammadReza Tavakoli, Mohammadreza Molavi, Vahid Masoumi, Majid Mobini, Sadegh Etemad, Rouhollah Rahmani. 119-126 [doi]
- Discovery of Rare Key PhrasesYanping Chen, Sha Liu, Qinghua Zheng, Ruizhang Huang, Yongbin Qin, Jiwei Qin, Ping Chen. 127-132 [doi]
- A Case Study of Service-Centric IoT Model for Rural Sewage DisposalZheng Liu, Beibei Yu, Zhibo Chen 0005, Jiqin Peng, Qiang Feng, Qing Liu, Cheng Xie. 133-138 [doi]
- Towards a Software Centric Approach for Ontology Development: Novel Methodology and its ApplicationSanthosh John, Nazaraf Shah, Craig Stewart. 139-146 [doi]
- The Influence Factors of Online Review Quality and Their Mechanism on Trust IntentionCong Cao, Jun Yan, Mengxiang Li. 147-152 [doi]
- Customised Data Dashboard for Contact Centres by Focussing on Customer IdentificationMorteza Saberi, Elizabeth Chang 0001, Mohammad Saffari, Omar Khadeer Hussain. 153-157 [doi]
- Cloud Service Composition with Multiple QoS Constraints for Manufacturing ResourceGuodong Yi, Hangjian Hu, Shuyou Zhang, Longfei Sun. 158-163 [doi]
- Artificial Intelligence and Mobile Phone Sensing Based User Activity RecognitionChia-Liang Chen, Fu-Ming Huang, Yu-Hsin Liu, Dai-En Wu. 164-171 [doi]
- A Traffic Prediction System Based on Traffic Investigation Data and Mobile Phone SignalingHan Feng, Lihong Jiang, Hongming Cai. 172-177 [doi]
- A Blockchain-Based Autonomous Credit SystemYinsheng Li, Xu Liang, Xiao Zhu, Bin Wu. 178-186 [doi]
- Yet Another Blockchain Use Case - The Label ChainThomas Keller, Nik Kessler. 187-194 [doi]
- Automatic Note Recognition and Generation of MDL and MML using FFTHanchao Li, Hongyu You, Xiang Fei, Ming Yang, Kuo-Ming Chao, Chaobo He. 195-200 [doi]
- An Author-Centered Media Blockchain EcosystemSijie Li. 201-206 [doi]
- Personalized Intelligent Push Method of Design Tasks for Designers in the HackerspaceChanglong Cheng, Shuyou Zhang. 207-212 [doi]
- A Data Collection Collar for Vital Signs of Cows on the Grassland Based on LoRaQi Li, Zhanghua Liu, Junsheng Xiao. 213-217 [doi]
- Analysis of Public Opinion Heat Trend in Universities on The Basis of Markov ChainNing Yu, Kun Liu, Kun Ma. 218-222 [doi]
- Is It Beneficial to Provide Historical Price Information Under Social Influence?Mei Xue, Xinyu Sun, Jiayin Wang, Yuqiu Wang. 223-227 [doi]
- A Social Network Model Based on the Community EvolutionsZhenming Liu, Yueting Chai, Yi Liu, Zequn Li. 228-233 [doi]
- Fault Diagnosis of Wind Turbine Gearbox Based on Vibration DataZeyuan Wang, Hongwei Wang, Wei Liu. 234-238 [doi]
- Scenario-Based Microservice Retrieval Using Word2VecShang-Pin Ma, Yen Chuang, Ci-Wei Lan, Hsi-Min Chen, Chun-Ying Huang, Chia-Yu Li. 239-244 [doi]
- Semantic Document Exchange through Mediation of Machine Natural LanguagePeng Qin, Jingzhi Guo, Yiling Xu, Longqi Wang. 245-250 [doi]
- Capital Structure and Firm Performance: Empirical Research Based on Global E-Retailing CompaniesRui She, Jingzhi Guo. 251-256 [doi]
- AutoCOT - AutoEncoder Based Cooperative Training for Sparse RecommendationRong Bai, Haiping Zhu, Yifu Ni, Yan Chen, Qinghua Zheng. 257-262 [doi]
- Linked Open Data-Driven Contrastive Cognitive Subgraph Searching for Understanding Concepts in e-LearningMengge Liu, Feng Tian, Yundong Yao, Yifu Ni, Yan Chen, Haiping Zhu, Qinghua Zheng. 263-268 [doi]
- Toward a Self-Learned Smart ContractsAhmed S. Almasoud, Maged M. Eljazzar, Farookh Hussain. 269-273 [doi]
- Host Overloading Detection Based on EWMA Algorithm in Cloud Computing EnvironmentShin-Li Lu, Jen-Hsiang Chen. 274-279 [doi]
- A Study on the Applications of Big Data in Cross-Border E-CommerceXuesong Zhao. 280-284 [doi]
- Differential Privacy Protection Recommendation Algorithm Based on Student Learning BehaviorPei-feng, Haiping Zhu, Yu Liu, Yan Chen, Qinghua Zheng. 285-288 [doi]
- Intelligent Risk Management Framework for BYODkhoula Al Harthy, Nazaraf Shah, Arun Shankarappa. 289-293 [doi]
- Research on Influence Factors of Micro-Blog Users' Social InfluenceY. I. Su, Wei Qi, Juan Qin. 294-299 [doi]
- Attractor for a Strongly Damped Lattice System with Nonlinear DampingHongyan Li, Rui Zhang. 300-305 [doi]
- Protocol Programming: A Layered Programming ParadigmYanping Chen, Zehua Ding, Qinghua Zheng, Bin Liu, Nazaraf Shah. 306-311 [doi]
- The Concept and Framework of Basic Information Facilities for E-CommerceYueting Chai, Xiao Yu, Xiang Gu. 312-317 [doi]
- Application Layer Challenges and Adoption Barriers to Internet Based Advanced Communication Technologies In SMEN. Kuruwitaarachch. 318-323 [doi]
- Research on the Memory of Online Advertising Based on Eye-Tracking TechnologyYao Lu, Wei Qi, Juan Qin. 324-328 [doi]
- Lattice-Based Universal Designated Verifier SignaturesBaohong Li, Yanzhi Liu, Sai Yang. 329-334 [doi]
- System Framework and Information Model for a Distributed Dance Teaching Resource RepositoryMin Wei, Hongwei Wang, Wei Liu. 335-339 [doi]
- Electronic Human Resource Management Survey Enabled by Big Data AnalysisHongwei Wang, Danmoyi Tan, Wei Liu. 341-346 [doi]