Abstract is missing.
- Attention in Character-Based BiLSTM-CRF for Chinese Named Entity RecognitionYaozong Jia, Xiaopan Ma. 1-4 [doi]
- Gesture Recognition Based on Multi-Channel Convolutional Neural NetworkDongdong Li, Limin Zhang, Xiangyang Deng. 5-9 [doi]
- An Effective Method for Complex Network Community Detection Based on Hierarchical SplittingKunhe Yang, Yushen Xu. 10-14 [doi]
- Analysis of Spatial Distribution of China's station-free bike-sharing by Clustering AlgorithmsYiBo Zhao, Lingfei Dai, Lei Peng, Yitong Song, Zhengchen Zhou. 15-19 [doi]
- Concept Clustering Algorithm Based on the Factor Space TheoryTiantian Wang, Qifeng Cheng, Xueyan An. 20-26 [doi]
- Research on Matching Accuracy of Underwater Terrain Matching Algorithm Based on Unscented Kalman FilterXiong Lu, Shen Jian, Xiaowen Bi. 27-31 [doi]
- A Novel Deep Learning Approach for Lung Cancer Recognition Based on 1-D Deep Convolutional Neural NetworkMuhammad Mubashir, Md Rishad Ahmed, Maqsood Ahmad 0004, Sarah Ali Siddiqui, Mudaser Ahmad. 32-38 [doi]
- A Gesture Interaction System Based on Improved Finger Feature and WE-KNNFeifei Li, Yujun Li, Baozhen Du, Hongji Xu, Hailiang Xiong, Min Chen. 39-43 [doi]
- MFBN: An Efficient Base Model For Person Re-IdentificationShengyi He, Junmin Wu, Yuqian Li. 44-50 [doi]
- An AETA Geo-sound Anomaly Detection Method Based on Baer OperatorYaxuan Lyu, Xin'an Wang, Shanshan Yong, Jipan Huang. 51-55 [doi]
- Extraction of Transitional Relations in Healthcare Processes from Chinese Medical Text based on Deep LearningFangwen Ren, Song Yuan, Feng Gao. 56-60 [doi]
- SOM Clustering Collaborative Filtering Algorithm Based on Singular Value DecompositionXiaopan Ma, Dong Guo, Lixin Cui, Xiaojing Li, Xuru Jiang, Xin Chen. 61-65 [doi]
- Deep Reinforcement Learning Based Delay-Sensitive Task Scheduling and Resource Management Algorithm for Multi-User Mobile-Edge Computing SystemsHao Meng, Daichong Chao, Ru Huo, Qianying Guo, Xiaowei Li, Tao Huang 0005. 66-70 [doi]
- Self-Attention for Deep Reinforcement LearningXiangxiang Shen, Chuanhuan Yin, Xinwen Hou. 71-75 [doi]
- Research on Financial Network Loan Risk Control Model based on Prior Rule and Machine Learning AlgorithmMaoguang Wang, Pengwei Jian, Yize Li. 76-79 [doi]
- Probabilistic Long-term Load Forecasting Based on Stacked LSTMChunming Yuan, Tian Xiu, Tianyue Lou. 80-84 [doi]
- Wind Power Generation Prediction Based on LSTMJinxia Zhang, Xuru Jiang, Xin Chen, Xiaojing Li, Dong Guo, Lixin Cui. 85-89 [doi]
- Deep Reinforcement Learning Based Task Offloading Algorithm for Mobile-edge Computing SystemsHao Meng, Daichong Chao, Qianying Guo. 90-94 [doi]
- Recommendation Model Based on Asymmetric Neural Matrix FactorizationHangyu Yan, Yan Tang, Lei Yan. 95-100 [doi]
- Stock Price Reversal Point Prediction Based on ICA and SVMQian Qiao, Xiaoxia Wang. 101-104 [doi]
- A Complex Image Restoration Method Based on Generating Adversarial Neural NetworksZhenfeng Liu, Jun Wu. 105-109 [doi]
- A Modified Multi-size Convolution Neural Network for Winner Prediction Based on Time Serial DatasetsWeilong Yang, Jie Huang, Yue Hu. 110-114 [doi]
- A Novel and Fine-grained Heap Randomization Allocation Strategy for Effectively Alleviating Heap Buffer Overflow VulnerabilitiesZhiyong Jin, Yongfu Chen, Tian Liu, Kai Li, Zhenting Wang, Jiongzhi Zheng. 115-122 [doi]
- General Image Segmentation by Deeper Residual U-NetYuxin Duan, Siyuan He, Dong Guo, XuruJiang, Fengkui Liu. 123-127 [doi]
- A Metaheuristic to Solve a Robotic Cell Job-shop Scheduling Problem with Time Window ConstraintsXiaohui Li, Yi Zhao, Xi Yang, Yuan Dong. 128-132 [doi]
- A New Modeling of Cooperative Agents from Game-theoretic PerspectiveChanjuan Liu, Enqiang Zhu. 133-136 [doi]
- Association Analysis of Serial Cases Based on Apriori AlgorithmChenglong Li, Ning Ding, Gesheng Zhang, Lihua Li. 137-140 [doi]
- Research on Formal Analysis Method of Computational Soundness Based on Strand SpaceMeng-meng Yao, Ye Zhu, Li Tang. 141-145 [doi]
- SOTagRec: A Combined Tag Recommendation Approach for Stack OverflowHaoyu Wang, Bei Wang, Can Li, Ling Xu, Jianjun He, Mengning Yang. 146-152 [doi]
- Deciphering and Analyzing Software Requirements employing the techniques of Natural Language ProcessingKamran Ali Memon, XiaoLing Xia. 153-156 [doi]
- Android Malicious Application Detection Method Based on Multi-class CharacteristicsWenzhao Li, Zhao Liu. 157-161 [doi]
- A hybridization of Memetic Algorithm with SVND for Solving a Hybrid Vehicle Routing ProblemXiaohui Li, Yi Zhao, Xuemin Shi, Tiantian Shi. 162-166 [doi]
- Methodology of Calculating Concepts of the Cognitive Map of the Regional Labor Market in the Context of Economy DigitizationOlga A. Astafurova, Anna S. Borisova, Irina I. Kulagina. 167-171 [doi]
- A New Approach to Multiplayer Virtual Reality GamesAlice J. Lin, Charles B. Chen, Fuhua (Frank) Cheng. 172-175 [doi]
- A Review of Domain Knowledge Representation for Robot Task PlanningXiaolei Sun, Yu Zhang. 176-183 [doi]
- Female Students' Future Engagement in STEM: Analyzing Factors from Students ThemselvesJun Lu. 184-188 [doi]
- Optimal Control of Obstacle ProblemXuan Zheng, Qin Gao. 189-194 [doi]
- The Data Mining of Strong Earthquakes' Occurring Time based on the Traditional Chinese CalendarJipan Huang, Xin'an Wang, Shanshan Yong. 195-198 [doi]
- A Recurrent Model with Self-attention for Product Repurchase RecommendationPengda Chen, Jian Li. 199-203 [doi]
- The Research on Fractal Dimension of Diabetic Patients Based on ECG SignalHao Ma, Xin'an Wang, Tianxia Zhao, He Sun, Zhong Liu. 204-208 [doi]
- Maximum Profit of Viral Marketing: An Optimal Control ApproachJuan Zhao 0011, Lu-Xing Yang, Xiaofan Yang. 209-214 [doi]
- A Feature Extraction Method for Daily-periodic Time Series Based on AETA Electromagnetic Disturbance DataBohang Li, Xing Zhang, Xin'an Wang, Shanshan Yong, Jiyan Zhang, Jipan Huang. 215-219 [doi]
- A Study of Gridding Scatter Plot for Heart Rate Variability in the Sleep Onset LatencyHe Sun, Xin'an Wang, Tianxia Zhao, Hao Ma, Zhong Liu. 220-224 [doi]