Abstract is missing.
- Automatic Classifications and Recognition for Recycled Garbage by Utilizing Deep Learning TechnologyHuiyu Liu, Owolabi Ganiyat O., Sung-Ho Kim. 1-4 [doi]
- Open-Domain Dialogue Generation: Presence, Limitation and Future DirectionsHaodong Yang, Wenge Rong, Zhang Xiong. 5-12 [doi]
- A Damage Identification System Based on Deep LearningYao Wu, Zuochang Ye, Yan Wang. 13-17 [doi]
- Deep Metric Learning for Sensor-based Human Activity RecognitionMakoto Mizuno, Tatsuhito Hasegawa. 18-23 [doi]
- Gas Leak Segmentation Comparison Using Different Activation Function on Fully Convolutional NetworkMarshall, Jang Sik Park, Jong-Kwan Song. 24-28 [doi]
- A Study on the Establishment of a User's Product Attribute Requirement Data Verification ModelXiaohong Yu, Yu-Che Huang, Yu-Ling Chang. 29-33 [doi]
- How Big Data Analytics Impacts Agility: The Moderation Effect of Orientation of Interactive Team CognitionQinxian Liu, Youyung Hyun, Ryuichi Hosoya, Taro Kamioka. 34-39 [doi]
- Multi-level Data Filter for Speaker Recognition on Imbalanced DatasetsChen Sun, Yunjie Zhang, Yiwei Liu. 40-44 [doi]
- Analyzing Online Transaction Data using Association Rule Mining: Misumi Philippines Market Basket AnalysisJeanie R. Delos Arcos, Alexander A. Hernandez. 45-49 [doi]
- Research on Customer Deposit Order Based on Data Mining TechnologyAiting Xu, Yingying Zhou, Hui Chen. 50-53 [doi]
- Design of Integrated Platform for Clothing and Accouterment Support Based on Big DataChenggong Zhai, Xiande Fei, Zhiwei Yang. 54-58 [doi]
- Text Analysis of Enterprise Financial Report Based on Semantic PerceptionDing Pan, Zhuoqian Liang, Yuan Deng. 59-64 [doi]
- Component Deformation Measurement Based on Point CloudGuangkun Zhai, Yue Zhou. 65-69 [doi]
- Knowledge-Based Ontology Development for Folk MedicineSalintip Ratsamano, Supaporn Chairungsee. 70-74 [doi]
- Domain Neural Chinese Word Segmentation with Mutual Information and EntropyJun Wang, Bin Ge, Chunhui He. 75-79 [doi]
- Aggregating Filter Feature Selection Methods to Enhance Multiclass Text ClassificationRhodessa J. Cascaro, Bobby D. Gerardo, Ruji P. Medina. 80-84 [doi]
- Algorithm for Palindrome Detection by Suffix HeapSurangkanang Charoenrak, Supaporn Chairungsee. 85-88 [doi]
- Research on User Comments of Douban Animation Made in China Based on Text Mining TechnologySiyu Sun, Yingjie Gai, Yingying Zhou, Aiting Xu. 89-93 [doi]
- Research of Cross-domain Cloud Trust Model and its Defense Abilities AnalysisMinghui Yang, Linlin Zhang. 94-97 [doi]
- An Effective Verifiable Symmetric Searchable Encryption Scheme in Cloud ComputingKangle Wang, Xiaolei Dong, Jiachen Shen, Zhenfu Cao. 98-102 [doi]
- Extracting Structured Data from Unstructured Text Using Conditional Random Field and Jaccard SimilaritySarun Wiriyapistan, Sukree Sinthupinyo. 103-106 [doi]
- A Survey on Computation Offloading for Vehicular Edge ComputingShuang Yuan, Yanfang Fan, Ying Cai. 107-112 [doi]
- Load Forecasting model of Mobile Cloud Computing Based on Glowworm Swarm Optimization LSTM NetworkZhenhua Zhang, Wei Zhu, Wei Zhong, Yi Zhuang 0002. 113-119 [doi]
- Distributed Deep Neural Network Training with Important Gradient Filtering, Delayed Update and Static FilteringKairu Li, Yongyu Wu, Jia Tian, Wentao Tian, Zuochang Ye. 120-125 [doi]
- Applying LSTM to Enable Cache Prefetching to Optimize Flow Table Update Efficiency in SDN SwitchesLiangding Li, Jiapeng Chi, Jun Wang. 126-130 [doi]
- Movie genre classification using TF-IDF and SVMNing Fei, Yangyang Zhang. 131-136 [doi]
- Semi-supervised Community Detection: A SurveyMingwei Leng, Tao Ma. 137-140 [doi]
- Session-based Recommendation with Context-Aware Attention NetworkJinsheng Wu, Zhonghong Ou, Meina Song. 141-146 [doi]
- Research on Improving the User Experience and Usability Evaluation of Tomato Work Method App-Using Forest AppChung-Shun Feng, Tsu-Wu Hu, Yi-Ru Chen, Chu-Yin Tsai. 147-151 [doi]
- Key Success of Technology Acceptance to Develop Mobile ApplicationSupparang Ruangvanich, Pallop Piriyasurawong. 152-157 [doi]
- Malware Detection Method based on Control Flow AnalysisPeng Shan, QingBao Li, Ping Zhang, Yanyang Gu. 158-164 [doi]
- Research on Interface Improvement of English Vocabulary Learning APPTsu-Wu Hu, Chung-Shun Feng, Chia-Cheng Hsu, Cheng-Yu Liu. 165-169 [doi]
- Java Session Language: A Session-Based Language for Cloud Service CompositionDongming Jiang, Yuan Jiang. 170-174 [doi]
- Design of Beverage Packaging Identification and Recycling System Based on ZedboardShaoting Li, Kai Sun, Meijing Qi, Jiahui Liu. 175-180 [doi]
- WiNum: A WIFI Finger Gesture Recognition System Based on CSIYong Zhang, Kangle Xu, Yujie Wang. 181-186 [doi]
- Exclusion-Net: Accurate Detection Algorithm for Crowd ObjectsZhiming Liu, Ming Shao, Jin Wang, Kaide Li, YaoNong Wang, Miao Cheng. 187-191 [doi]
- Implementation of Dairy Cows Individual Identification Based on ZYNQ SoCZhenyu Dai, Kai Sun, Jin Li, Wei Huang. 192-196 [doi]
- A New Approach for IoT-based Fall Detection System using Commodity mmWave SensorsKai Wang, Guanyi Zhan, Wai Chen. 197-201 [doi]
- High Accuracy Time Difference Measurement of the Periodic Pulse Signal with the Stochastic Resonance FilteringZhi Xia, Qi Li, Lu Ma, Haodong Han. 202-205 [doi]
- Edge Assisted Object Detection for Mobile ApplicationWenbo Cheng, Qibo Sun, Yasheng Zhang. 206-211 [doi]
- An Efficient Non-local Attention Network for Video-based Person Re-identificationZhen Wang, Shixian Luo, He Sun, Huadong Pan, Jun Yin. 212-217 [doi]
- Implementation of Biometrics Recognition System Based on Zynq SoC Platform and Cloud ServerJin Li, Wei Huang, Zhenyu Dai, Xiaowen Bian. 218-222 [doi]
- The Influence of Light Environment on Eye-Control Human-Computer InteractionDeqiang Fu, Ning Li, Yingwei Zhou. 223-227 [doi]
- Aerial Visual Information Acquisition System Based on EEG ControlJialiang Zhang, Wenting Fu, Jianying Wang, Ling Guo. 228-233 [doi]
- Germplasm Selection Based on Machine VisionWu Yin, Chen Zhao, Yutian Chen. 234-237 [doi]
- Video Dynamic Target Processing Method Based on FPGAMeijing Qi, Wei Huang, Shaoting Li, Pei Zhou. 238-242 [doi]
- Watermark Embedding and Extraction Based on LSB and Four-Step Phase Shift MethodXin Kuang, Wang An Ling, Li Shi Ke, Guo Lei, Pang Jian Ping, Liu Zhi Yue, Liu Fu Ping. 243-247 [doi]
- Research on the Influence of Kmeans Cluster Preprocessing on Adversarial ImagesGuilin Chen, Guanwu Wang, Jian Ju, Xianglin Wei. 248-252 [doi]
- A Fast Real-time Map-Matching for Unstable Sampling-rate GPS TrajectoriesJieli Peng, Yang Cao, Zhiming Ding, Jin Yan. 253-258 [doi]
- An Unsupervised Approach for 3D Medical Image RegistrationYingjun Ma, Jinshuo Zhang, Dongmei Niu, Muhammad Umair Hassan, Xiuyang Zhao. 259-263 [doi]
- Computational Holographic Image Watermarking Algorithm Based on Discrete Cosine TransformZhiyue Liu, Anling Wang, Xiaofeng Zhu 0009, Fuping Liu. 264-269 [doi]
- Multi-Layer 3D MIMO Precoding Algorithm Based on Partitioned RegionsWanping Liu. 270-274 [doi]
- Securing 5G HetNets Using Mutual Physical Layer AuthenticationTing Ma, Feng Hu, Maode Ma. 275-278 [doi]
- Design of Intelligent Container Terminal Communication System Based on 5G TechnologyJiemin Yang, Xiangqian Ding, Liangang Zhang, Jiancheng Lin. 279-282 [doi]
- An Animal Respiration Monitoring System Based on Channel State Information of Wi-Fi NetworkYusheng Hao, Jincheng Li, Weilan Wang, Qiang Lin. 283-289 [doi]
- Improvement of Congestion Control Algorithms for Streaming Media TFRCHui Guo, Song-bo Ji. 290-293 [doi]
- Pseudonymous Mobile Node Reauthentication Scheme for Mobile Wireless Sensor NetworksBo-Sung Kim, JooSeok Song. 294-299 [doi]
- Heuristic Routing with Infrastructure Nodes for Data Dissemination in Vehicular NetworksLongdy Torn, Ammar Hawbani, Xingfu Wang, Omar Busaileh, Muhammad Umar Farooq. 300-304 [doi]
- Super-peer Selection Algorithm Based on AHP in Mobile Peer-to-Peer NetworkLi Qing, Fu Xuan-li, Hou Yu-ke, He Wan-jie. 305-309 [doi]
- Joint Optimization QoS and Security of Wireless Communication NetworksXiaochun Su, Yanheng Liu, Jian Wan. 310-316 [doi]
- Optimized Handover Algorithm for Vehicular Ad hoc NetworkGbenga Oladosu, Chunling Tu, Pius Adewale Owolawi. 317-321 [doi]
- Double Mix-Zone for Location Privacy in VANETYuye Zhou, Dongmei Zhang. 322-327 [doi]
- A Novel Dynamic Energy Model for the Energy-Harvesting IoT NodeHaipeng Zhang, Ningning Lu, Hucheng Sun, Jie Li, Ruiliang Song. 328-333 [doi]
- NSIIC: A Novel Framework for Nodes' Smart Connection Oriented to Collaborative IoTWentong Zhang, Chi Cheng, Sheng Zhang. 334-337 [doi]
- Formalizing Railway Network Using Hierarchical Timed Coloured Petri NetsLalita Thampibal, Wiwat Vatanawood. 338-343 [doi]
- An IoT Botnet Prediction Model Using Frequency based Dependency Graph: Proof-of-conceptWarusia Yassin, Raihana Abdullah, Mohd Faizal Abdollah, Mohd Zaki Mas'ud, Farah Adeliena Bakhari. 344-352 [doi]
- Identity Authentication Chain based on Encrypted Database in Heterogeneous Alliance NetworkLinlin Zhang, Xiang Zou, Minghui Yang. 353-356 [doi]
- A Study on Function for Grasping Location of Device in an IoT Device List Visualization SystemYuto Egawa, Yoshiaki Taniguchi, Nobukazu Iguchi. 357-361 [doi]
- Awareness and Settlement of IT Field Key Challenges for Next Generation Development in WorldMuhammad Bilal 0006, Zhi Yu, Abid Bashir, Muhammad Ali Hussain. 362-368 [doi]
- An Adaptive Network Concurrent Service Scheme in Single-machine ScenarioXuwang Teng, Jingyang Lyu. 369-372 [doi]
- City Services Management Methodology Based on Socio-Cyber-Physical ApproachSerge Volkov. 373-376 [doi]
- BI&A Capability: A Discussion on the Mechanism of Enterprise's Performance ImprovementXueliang Han, Huifang Wu. 377-382 [doi]
- A Multi-Objective Optimization Model for Bike-SharingYu Shan, Dejun Xie, Rui Zhang. 383-387 [doi]
- An Analysis of IPOs Short and Long-Term Effect of E-commerce Companies among China A-share, Hong Kong, and U.S. MarketFang-Cih Lin, Tzh-Han Weng, Hai-Yen Chang, Fu-Ming Lai, Wei-Ling Kung, Yi-Hsien Wang. 388-392 [doi]
- Overview of Cashier-Free Stores and a Virtual SimulatorJixuan Leng, Yunfei Feng, Jiaxuan Wu, Junteng Li. 393-399 [doi]
- Retailer's Ordering Decision with Overconfident ConsumersYing Li, Guihang Guo. 400-403 [doi]
- Textual Information Extraction Model of Financial ReportsDing Pan, Zhuoqian Liang, Yuan Deng. 404-408 [doi]
- Application of Crime Related Index Model in Violence Related CasesQilu Wu, Yonglu Zhang, Fan Xu. 409-413 [doi]
- Analysis of Research Hotspots in the Field of Sharing Economy in China: Based on Co-word Analysis and Social Network AnalysisTao Huang, Ran Tian, Lifang Niu, Shujian Xiang. 414-418 [doi]
- Factors Influencing University Students' Intention to Redeem Digital Takeaway Coupons - Analysis Based on A Survey in ChinaGuihang Guo, Ying Li, Siqi Zheng. 419-425 [doi]
- A Linear Time Algorithm for Finding Tandem Repeat in DNA SequencesTida Butrak, Supaporn Chairungsee. 426-429 [doi]
- Motion Monitoring for Limb ExerciseZiqi Li, Xiao Ma, Meizhen Liu. 430-434 [doi]
- Multi-task Learning for Animal Species and Group Category ClassificationDonghyeon Kim, Younglo Lee, Hanseok Ko. 435-438 [doi]
- Time Series Analysis of Dengue Fever Cases in Thailand Utilizing the SARIMA ModelPatsaraporn Somboonsak. 439-444 [doi]
- The Effectiveness of Music Therapy System for the Elderly with Mild Cognitive ImpairmentHong-In Cheng, Rizky Alifa, Haegoo Lee. 445-448 [doi]
- Nonlinear Discriminant Analysis for MR Brain Images Classification via Kernel FunctionFarzaneh Elahifasaee, Manhua Liu, Ming Yang. 449-452 [doi]
- Security Threat Assessment of Aircraft System using FSSDharmendra Singh Rajput, Rajesh Kaluri, Harshita Patel. 453-457 [doi]
- Available Discharge Capacity Estimation According to C-rate Variation of Second-Used BatteryChungu Lee, Taesic Kim, Jonghoon Kim, Jounghu Park. 458-462 [doi]
- A High-Resolution Model for Simulation of Flexible Residential Electricity DemandJiawei Zhu, Qiang Liao, Yishuai Lin, Weidong Lei, Jingjie Gao. 463-467 [doi]
- Wind Power Prediction Based on Back Propagation Algorithm with Numerical Weather PredictionGuo Peng, Wang Cun. 468-471 [doi]
- Design and Implementation of Distributed Time-Triggered System Based on RT-ThreadChunmeng Zhong, Haifeng Zhang, Yidong Yuan, Sukun Zhang, Hai Wan. 472-476 [doi]
- Anomaly Detection of Wind Turbine Generator Based on Temporal InformationNa Song, Xiangzhi Hu, Ning Li. 477-482 [doi]
- A Master-Slave Chain Architecture Model for Cross-Domain Trusted and Authentication of Power ServicesZhengwen Zhang, Cheng Zhong, Shaoyong Guo, Fengning Wang. 483-487 [doi]
- Smart City Concepts and DimensionsWeihua Duan, Rouhollah Nasiri, Sasan Karamizadeh. 488-492 [doi]
- Design and Implementation of Intelligent Home Power Control Systems by Using Raspberry Pi and AWS Cloud ServiceYichen Pan, Jaesoo Kim. 493-496 [doi]
- Estimation of Sidewalk Surface Type with a SmartphoneSatoshi Kobayashi, Ren Katsurada, Tatsuhito Hasegawa. 497-502 [doi]
- SoCo-ITS: Service Oriented Context Ontology for Intelligent Transport SystemSantosh Pattar, C. R. Sandhya, Darshil Vala, Rajkumar Buyya, K. R. Venugopal, S. S. Iyenger, L. M. Patnaik. 503-508 [doi]
- The Taxonomy of Smart City Core FactorsHemalata Vasudavan, Sumathi Balakrishnan. 509-513 [doi]
- An Experimental Study on the Modeling System of the Public Bus Traffic Delay IndexGilJong Song, SeocHo Kim, UiYong Jung, Namhyun Yoo. 514-520 [doi]
- Research on Automatic Wharf Unmanned Gate System Based on Artificial IntelligenceJiemin Yang, Xiangqian Ding, Yongcui Li, Jiancheng Lin. 521-524 [doi]
- Design and Development of Smart Home Sensing Supported by Blockchain TechnologyMaode Ma, Zhaozheng He, Quanqing Xu, Xue Jun Li. 525-530 [doi]
- The Research and Practice of Teaching Model of Electronics and Information Practice Courses Based on Moodle PlatformJianying Wang, Shi Fei, Juan Chen. 531-535 [doi]
- An Efficient Surface Remeshing Algorithm Based on Centroidal Power DiagramMinfeng Xu, Shiqing Xin, Changhe Tu. 536-542 [doi]
- Dynamic Pricing of Edge Cooperative Offloading Using a Simple HeuristicBo Huang, Yaling Sun, Dapeng Li 0001. 543-547 [doi]
- Construction of Driving Conditions Based on Multi-segment Clustering AlgorithmYanxiong Sun, Yeli Li, Qingtao Zeng, Yuning Bian, Xinyu Sun, Linxuan Yu. 548-553 [doi]
- The Constructing and Application Case of Online Virtual Exhibits Arrangement System for Museum LearningYuhui Yang, Yue Hu. 554-558 [doi]
- Food safety Knowledge Graph and Question Answering SystemLi Qin, Zhigang Hao, Liang Zhao. 559-564 [doi]
- Interaction to Support the Learning of Typing for Beginners on Physical Keyboard by Projection MappingChikako Sono, Tatsuhito Hasegawa. 565-569 [doi]
- The Information Security Risk Assessment Model Based on Improved Electre MethodTongjuan Wang. 570-574 [doi]
- Traffic Flow Prediction Based on Self-attention Mechanism and Deep Packet Residual NetworkXuebin Jia, Tong Li, Rui Zhu, Zhan Wang, Zehui Zhang, Jiawei Wang. 575-580 [doi]
- User Needs-driven Enrichment of Ontology: A case study in Sri Lankan AgricultureR. S. I. Wilson, Athula Ginige, Jeevani S. Goonetillake, Anusha Indika Walisadeera. 581-586 [doi]