Abstract is missing.
- Combinatorial model based on extreme learning machine for network traffic predictionJiating Li, Juan Zou, Hu Sheng, Yichen Wang, Youkang Chen. 1-4 [doi]
- Survey on Chinese Word SegmentationYing Liu, Danping Li, Xiaolu Zhou, Shuai Xu. 5-8 [doi]
- Research on Rock Powder Coating Ratio based on Artificial Neural NetworkFei Wu, Song Yang, Yuanxun Xie, Yang Liu. 9-12 [doi]
- Optimization of maritime intelligence facilities based on big data algorithmsZiying Wang. 13-17 [doi]
- Instance Discrimination for Improving Chinese Text ClassificationHe Hu 0006, Yujue Chen. 18-23 [doi]
- Failure Prediction of Bolted Composite Connections Using Continuum Damage ModelBoling He, Yupeng Liu, Wei Ma, Wentao Tang, Hongting Zhao. 24-28 [doi]
- Prediction Study of Slope Displacement using CGA-BP Neural NetworkWei Liu, Huarong Xu. 29-33 [doi]
- Research on the knowledge embedding vector method based on TF-IDF and Auto-EncoderGuiyu Tian. 34-37 [doi]
- MCN: Magnitude-Continuity Network for Video Anomaly Detection under Weak SupervisionXiaohu Luan, Hongmin Zhang. 38-42 [doi]
- Research on Network Security Situation Assessment Technology Based on Correlation AnalysisWenyong Du, Chenfei Wang, Wei Han, Ziqian Li. 43-46 [doi]
- Improving Team Strategy in Football Competition Based on Graph Theory Model and Algorithm AnalysisXinyan Zhang, Shangnan Zhou, Tongtong Wang. 47-50 [doi]
- Optimization of credit scoring models combination based on quantum annealingXinyu Zheng, Yonghong Ma, Zhigang Song. 51-56 [doi]
- Exploration of House Price Prediction Based on ICS-BP Neural NetworkDong Luo. 57-62 [doi]
- Fault diagnosis of Marine power station based on optimized GA-BPHao Ran, Ning Chen, Yi Zhang. 63-68 [doi]
- Transmission Optimization Based on Industrial Internet Information ModelHaiwen Feng, Hao Tian, Ting Wang, Jingyang Zhu, Xintong Wang. 69-73 [doi]
- Aesthetic Evaluation Method for Car Styling Based on BP Neural Network and Perceptual Imagery Style A Case Study with the Z Generation Customer GroupYanlong Li, Yuting Zhong, Na Zhang. 74-81 [doi]
- Enhancing Bitcoin Log-return Prediction through TimesNet and Sentiment Analysis IntegrationZhaoji Zhang, Qingbing Sang. 82-91 [doi]
- A Dive into Lexical Simplification with Pre-trained ModelChengxue Yang, Zhijuan Wang, Yu Zhang, Xiaobing Zhao. 92-95 [doi]
- A Novel Network Service Design Method Providing the Foundation for Network AutonomyDasheng Chen, Qi Song, Yinbin Zhang, Qi Yu, Ling Li, Zhiming Yang. 96-100 [doi]
- Self-Paced Self-Training Based on K-Nearest NeighborsYongzheng Ma, Zhengkai Sun, Yintong Zhang, Hongjiao Guan, Xinxiao Qiao. 101-107 [doi]
- Fairness Evaluation Within Large Language Models through the Lens of DepressionYuchen Han. 108-112 [doi]
- Research on Deep Neural Network Testing TechniquesQianchao Hu, Feng Wang, Binglin Liu, Haitian Liu. 113-119 [doi]
- A hybrid sleep staging model based on heart rate variabilityLiwu Xing, Shufeng Xia, Yongzhong Lin, Yubing Sun, Yanzhi Liu, Xiaoting Chang, Wenlong Liu. 120-124 [doi]
- Research on Animation Sentiment Analysis based on Deep Neural NetworkQiang Zhang. 125-129 [doi]
- Analysis and Prospects of Knowledge Graph-based Research on Public Transportation for the ElderlyYanmin Xue, Chengxin He. 130-137 [doi]
- Research on Abnormal Network Traffic Detection Method Based on Stacked Capsule AutoencoderQinglin Chen, HaiLaTi KeZiErBieKe, Yue Wang, Yuyuan Chang. 138-146 [doi]
- A Robust Sparse Nonnegative Matrix Factorization with Low Rank representation for clusteringXue Li, Xinxin Liu, Yiwei Li, Shuo Zhang. 147-153 [doi]
- Prediction of terrorism development trend in Pakistan based on grey -BP neural network modelShenhao Su, Yiteng Zhang. 154-160 [doi]
- Hot Technology Analysis Method Based on Text Mining and Social NetworksYunzeng Lin, Weijun Wang, Yongfang Wang. 161-167 [doi]
- Knowledge Graph Analysis of Chinese Higher Education Policy Research in the Last DecadeWeining Huang, Ping Xu, Na Dong, Xiaoyan Sun. 168-173 [doi]
- Research on evaluation methods of news hotspots based on media attention and user attentionYize Wei, Hui Guo, Xiaoxu Shi. 174-179 [doi]
- Research on Negative Transfer Problem Caused by Cascading Auxiliary Tasks in Ad RankingKai Wang. 180-185 [doi]
- Optimized solution of Chinese traveler problem based on genetic algorithmKun Yang, Kui Jiang. 186-191 [doi]
- Enterprise Talent Demand Prediction Model Based on Optimized Generalized Regression Neural NetworkShengyi Lin. 192-196 [doi]
- Design and Implementation of VRRP and BFD Linkage Technology in Campus Information Service Platform NetworkYu Niu, Xiandong Li. 197-201 [doi]
- Research on coupling coordination development based on neural network weight analysisYazhou Zhou, Yong Huang, Wenyuan Liu. 202-206 [doi]
- The Improved Maneuvering Model Algorithm Based on Dynamic Feedback Neural Networks for Online LearningShuyi Jia, Liqiang Ren, Haipeng Wang, Tiantian Tang. 207-211 [doi]
- Leveraging multi-modal knowledge graph for operation and maintenance knowledge management and application: a case study of bridge cranesTianyu Chang, Yongming Chen, Wei Shao, Meixi Song, Xinyu Li. 212-220 [doi]
- Human Keypoint-Guided Fall Detection: An Attention-Integrated GRU ApproachYi Zheng, Ruifeng Xiao, Qiang He. 221-226 [doi]
- M-TBQA: Multimodal Table-Based Question AnsweringJingwen Zeng, Zhidong Wu, Rongrong Zheng, Wenting Xue, Chenhui Wang, Xiaoyang Yu, Tao Zhang, Shaozu Yuan, Tiangang Zhu. 227-231 [doi]
- A Network Application Fault Repair Method Based on Reinforcement LearningWenbo Liu, Yan Gao, Ming Chen. 232-238 [doi]
- Ethylene production prediction using Attention-LSTM model based on Golden jackal optimizationZhi Wang, Yayun Li, Fuwei Liang, Hui Xu, Xinwei Shi. 239-244 [doi]
- A survey of gradient normalization adversarial attack methodsJun Chen, Qidong Huang, Yunpeng Zhang. 245-250 [doi]
- Frequency-based Adversarial Privacy Protection Strategy Against Face Recognition Neural NetworksFrequency-based Adversarial Privacy Protection StrategyWei Zheng, Han Hai, Fandi Zhou. 251-255 [doi]
- Leveraging Transformer Neural Networks for Enhanced Sentiment Analysis on Online Platform CommentsJiayi Tang. 256-260 [doi]
- Research on Automatic Classification of Chinese Traditional Settlement Residential Buildings Based on Convolutional Neural NetworkYong Fan, Wenjie Xiao, Xuan Li. 261-266 [doi]
- Trusted access method of power financing terminal based on zero trust architecture under optimization algorithmHong Xu, Leichun Gu, Shuhan Liu, Zhiwei Hua, Xin Li. 267-271 [doi]
- Research on Hybrid Encryption Algorithm Based on Data Transmission of Oil-Water Control SystemShiqi Han, Jian Lan, Haitao Wang. 272-276 [doi]
- Design and Implementation of Cloud Automobile Trading CenterTingting Mao. 277-281 [doi]
- Research on the Optimization Model of Standard System Architecture Based on the FAST Method for Complex Business SystemsYanfeng Wang, Xianghua Zhu, Gang Li, Zixia Feng, Haiyu Yu, Kai Meng. 282-286 [doi]
- Magic Weapon for Wordle: Modeling and Analysis based on Word's AttributesMingchen Liu, Jinheng Jiang, Chun Huang. 287-292 [doi]
- "Research of the Smart \"Farmer\" System and Rural Land Risk Prediction"Haotian Zhu, Yujun Yang, Yimei Yang. 293-299 [doi]
- Semi-global Bipartite Consensus of Discrete-time Linear Multi-agent Systems with Input Saturation via Asynchronous Intermittent ControlDan Zhang, Bo Xu, Huipeng Li, Cui Li. 300-304 [doi]
- Wordle the Puzzle: A Prediction and Classification Model based on Com-prehensive RNNZixu Shen, Yong Pan, Anbo Wang. 305-309 [doi]
- A Study on the GAN-Stacking Model Framework for Fraud DatasetWeifeng Zhang, Gejian Ding. 310-315 [doi]
- Periodic Attention Networks for Air Quality Index PredictionJiaqing Wu, Yinzhi Wu, Cheng Chen. 316-320 [doi]
- Optimization Strategy for Computer Color Schemes in Opaque ProductsZidong Ni, Yawen Xu, Mengwei Ma. 321-326 [doi]
- Modeling and Quantification of Online and Offline Coupled Information Dissemination NetworksZhiqiang Zhang, Yanjing Huang, Xinyu Xia, Yuwei She, Xinyi Jiang, Fulian Yin. 327-332 [doi]
- A Secure Storage System for High-Speed Railway Monitoring Data Based on Blockchain TechnologyLifeng Ni, Rui Zhang. 333-338 [doi]
- Production quality early warning method for firearms components based on cloud edge collaborationJiawei Sun, Jia Hao, Xiaoning Zhang. 339-343 [doi]
- An approach for detecting phishing websites by using search engineShaoming Chen, Yiyang Wang, Xingkai Cheng. 344-347 [doi]
- Application of an Adjoint Assimilation Model in Simulating National-scale Spacial Distribution of PM10 Concentrations in ChinaYang Chen, Ning Li. 348-351 [doi]
- A Contrastive Acoustic Aanalysis of High Vowels in Reciting and Singing of Hezhou Hua'erLi Ma, Yonghong Li. 352-357 [doi]
- Analysis of Cavitation Characteristics of DN40 Control Valve and Optimization of Valve Body StructureKang Huang, Yi Hu, Zhihua Bai, Xudong Cao. 358-366 [doi]
- Rethinking on Misleading of Machine Learning in Bank Risk Warning SystemYan Xiao, Zehao He, Yuyang Liu. 367-373 [doi]
- Failure analysis of hydraulic system of armored assault vehicle based on Apriori algorithmZining Kong, Xiaowei Zhang, Wentao Dong, Yucai Dong. 374-378 [doi]
- Compilation of Axle Stress Block SpectraTian Lv. 379-385 [doi]
- Research and Application of a Tourism Recommendation System Based on Emotional AnalysisWenmiao Yang, Dongmei Wei, Wenjin Huang, Xiaoou Huang. 386-391 [doi]
- Research on the impact of Gem5-based cache capacity on cache performanceRuqing Wang, Lixin Yu, Wei Zhuang. 392-395 [doi]
- The Application of Intelligent Computing and Machine Learning in the Security Guarantee and Information Security Scheme DesignRuifeng Cao, Zhichun Fang, Shaowa Lin, Jian Wu, Ting Yuan. 396-400 [doi]
- GUFAD: A Graph-based Unsupervised Fraud Account Detection FrameworkWei Zhang, Yufei Zhang, Yilin Huang, Fangshu Chen, Jiahui Wang, Xiaoming Hu. 401-406 [doi]
- Design of multi-point positioning system based on LabVIEWCong Xiao. 407-412 [doi]
- Transformer-based a Automatic Scoring Model for Translation JobsYiqing Lin. 413-417 [doi]
- Research on IPFS resource retrieval system based on inverted indexLin Shi, Jun Lu. 418-422 [doi]
- Research on dynamic pricing strategy of ride-hailing platformShuJing Wan, Wei Zhang. 423-427 [doi]
- Research on Endogenous Safety and Security TrustJunli Guo, Shiyu Yang. 428-434 [doi]
- Evaluation of drilling model of deep extended reach well in Jinzhou based on learning curveLijun Geng, Shaolong Jiang, Yulei Zhu, Qiang Tan, Zhuo Chen, Xiaopeng Wang, Bojia Li. 435-441 [doi]
- Research on path planning algorithm of partially observable penetration test based on reinforcement learningQinrui Sun, Hui Ge, Xiao Jin. 442-448 [doi]
- Automatic Generating Test Data Based on Improved Particle Swarm Optimization AlgorithmMingde Liu, Qi Song. 449-453 [doi]
- Analysis and Research on College Students' Physical Fitness Test Data Based on K-means Clustering AlgorithmLei Zhang, Yuping Jiao. 454-460 [doi]
- Design of translation error correction model based on differential fusion of syntactic featuresXueqiu Peng, Linchun Tan. 461-465 [doi]
- Food Processing Ecological Chain Traceability Management System with Decision SupportYanping Duan, Yali Wu, Feng Zou. 466-472 [doi]
- Client Selection for Mobile Edge Computing-Assisted Hierarchical Federated Learning with Non-Independent and Identically Distributed DataYi Su, Qingguo Chi, Binbin Shen, Bo Zhang, Jie Zhao, Liang Chen. 473-478 [doi]
- Comprehensive Teacher Teaching Posture Evaluation Model: Based on OpenPose Posture Recognition in the Context of Digitalization and Intelligence IntegrationZengyi Yu, Zhou Jin, Qinda Xue, Yingchun Liu. 479-483 [doi]
- A computational Method for Evaluating Research Impact in the Field of Computer ScienceJie Wang, Qian Liu, Yuyue Hu, Yajie Li. 484-491 [doi]
- Intelligent wardrobe based on machine vision technology and new rotary guide railRui Zhang, Haoyu Wu, Yekang Jie, Qihan Wang, Jiahua Lu, Hao Hu. 492-497 [doi]
- Customer Segment Classification Prediction in the Australian Retail Based on Machine Learning AlgorithmsYiming Luo, Rui Zhang, Fei Wang, Tao Wei. 498-503 [doi]
- Intelligent agricultural greenhouse system based on the Internet of ThingsYang Yu, Rui Zhang, Wen Ren, Haotian Shi, Tonghui Qu, Hongzhen Yu, Shiqin Liu, Shenshuo Zhang, Dehao Yang. 504-508 [doi]
- Modelling Coarse- and Fine-grained User Representation for News RecommendationXin Zhang, Jie Yu, Wenya Kong. 509-515 [doi]
- Interactive Home Product Design Method Using Augmented Reality TechnologyYuwen Ma, Guangbo Chen, Huayun Gao. 516-520 [doi]
- â–³logR quantitative identification of high frequency sequences of fine sediment - A case study of the Chaoyanggou Terrace in the Songliao BasinLinru Yao. 521-525 [doi]
- Numerical simulation of lid driven flow based on finite volume methodLishan Jia, Qingyi Mo. 526-530 [doi]
- Deep Learning-Based Modulation Recognition for Imbalanced ClassificationRunqing Luo, Jian Sun, Yanan Guo. 531-535 [doi]
- Secondhand Sailboat Listing Price Prediction Model Based on GBDT AlgorithmHaoyu Zhu, Jiaying Cui. 536-540 [doi]
- Research on Personalized Recommendation Algorithm for Housing Rental Based on Data MiningYingzhuo Xu, Yu Bai. 541-545 [doi]
- Numerical Simulation Study of Charge Size on Warhead Environmental Temperature TestHao Chen, Pu Song. 546-549 [doi]
- Multi-attribute decision-making method based on 3-parameter interval number of relative distanceYan Wang. 550-554 [doi]
- A visual analysis of domestic county medical community research based on clustering algorithmsGuoqin Zhang, Haiyang Nie. 555-561 [doi]
- Big data statistical analysis of preset and response values of tunnel excavation parametersYuxin Cao, Haohan Xiao, Maozhou He, Quanbin Xu, Litao Fan. 562-567 [doi]
- On site excavation experiments and big data statistical verification of torque penetration indexYuxin Cao, Haohan Xiao, Maozhou He, Quanbin Xu, Litao Fan. 568-572 [doi]
- Analyze and identify the composition of glass products based on statistical analysis methodsHuilin Zhu, Jiaqing Wu, Shiji Zhou. 573-576 [doi]
- Fine Grained Access Control Algorithm for Sensitive Data Based on Deep Learning and Security DomainBei Wang, Jing Liu, Yanlei Liu. 577-580 [doi]
- Population Prediction Research in Xi'an: Based on a GM-Markov-BP combined modelZhuyu Wang, Xiaoling Xu, Lu Zhang, Zhe Hu. 581-585 [doi]
- Research and Application of an Improved Apriori Algorithm in Market Basket DataXuexian Qiu, Shiyong Ning, Shihui Zhang, Zhuorui Yang. 586-592 [doi]
- Exploring the Role of Plant Species Diversity in Drought Adaptation: Mathematical Modeling of Community Dynamics and Competitive InteractionsJi Miao. 593-597 [doi]
- Tobacco Quality Prediction in Tobacco Machine Drying Based on Data-Driven Deep Reinforcement LearningShuang Dai, Zhengping Zhou, Jiawei Fan, Huancheng Guo. 598-605 [doi]
- An Adaptive Speech Speed Algorithm for Improving Continuous Speech RecognitionJinwei Zhu, Huan Chen, Xing Wen, Zhenlin Huang, Liuqi Zhao. 606-610 [doi]
- Research on Building Energy Consumption Prediction Based on Extreme Time Series PredictionSen Zhou, Ruping Shao, Jing Yang, Yiming Zhang, Pengchun Li. 611-615 [doi]
- A novel hybrid model Informer-LSTM based on beluga whale optimization algorithm for stock price predictionYuer Chen, Yafei Wu, Zhiyong An. 616-621 [doi]
- Land Use Classification of Shenyang Based on Spatial DataRuizhao Liu, Zhiwei Xie 0003, Xinyv Lv, Bo Peng. 622-627 [doi]
- Research on Financial Fraud Identification Model Based on Privacy-Preserving Machine LearningLi Jiao, Hui Li. 628-632 [doi]
- Research on Data storage Security based on Blockchain technology and distributed storage technologyShanqi Zheng, Yushi Zhang, Xiaobo Huang, Wei Sun, Jingxin Zhang 0012. 633-638 [doi]
- Visual analysis of research areas in China's pharmaceutical industry based on clustering algorithmZiwei Zhao, Yuxin Fu, Changjuan Han, Shikui Cao. 639-645 [doi]
- Urea price prediction based on encoder-decoder network: Improving encoder-decoder networks for urea price predictionHongwei Lyu, Xiumei Wang, Shaomin Mu. 646-651 [doi]
- Neural Machine Translation Research Progress and Its Implications for Education Technology: A Bibliometric AnalysisQingbo Jiang, Yong Huang. 652-657 [doi]
- Grouped Federated Learning Algorithm Based on Non-IID DataZhongxin Li, Jianfei Zhang. 658-663 [doi]
- Research on coal supply chain dispatch optimization algorithms in marine airclosures scenariosHua Geng, Rongjie Liu, Liang Miao. 664-670 [doi]
- Technical Overview of Greenhouse Environment Parameters Forecast ResearchYingqi Jiang, Yue Zhou, Xiuyuan Peng. 671-675 [doi]
- Study on No-load Numerical Simulation of Urban Road CollapseSitong Lu, Ruirui Sun, Siping Zeng, Wenyi Gu, Rui Qiu. 676-681 [doi]
- Traffic Data Governance: Method and ApplicationSong Ma, Muhan Deng, Shibei Du, Yinbo Li, Siyu Zhang. 682-691 [doi]
- Quantitative trading prediction model based on Long Short-Term MemoryChangfeng Xiao, Fanyi Tang. 692-696 [doi]
- Research on Blockchain-based Direct Transaction Model of Distributed Power SupplyTianxu Sun, Yuhui Xing, Bangcan Wang, Wenjiao Ding, Xiangrui Liu, Xuan Yang. 697-702 [doi]
- Existence of multiple results to a Class p-Kirchhoff type equationsBeibei Wang. 703-706 [doi]
- Underwater Fish Target Detection Based on YOLOv5 Fusion CBAMAihua Zhang, Thelma D. Palaoag. 707-711 [doi]
- Comparison and analysis of accuracy of traditional random forest machine learning model and XGBoost model on music emotion classification datasetJiulin Song. 712-716 [doi]
- Investigation the Impact of Features on Malicious Traffic Identification Based on Different Machine Learning Algorithms Combined with Dimensionality ReductionRunze Wang. 717-721 [doi]
- A Survey of Behavioral Biometric Authentication on SmartphonesJingyuan Zhang, Yan Wang. 722-729 [doi]
- Research on Plant Crop Sales Prediction Based on Correlation Clustering and Product AttributesHang Zhao, Lingxian Bai, Ying Yang, Yikang Li. 730-735 [doi]
- Application of telemedicine technology in cardiac rehabilitation: A Bibliometric AnalysisXiajing Lou, Shihua Cao, Qiong Zhang, Jiani Yao, Yankai Shi, Bingsheng Wang. 736-742 [doi]
- Securities Price Movement Prediction Based on Graph Neural NetworksYangshuowen Zhao, Lei Ge, Jinchao Ye. 743-750 [doi]
- Patch and Cluster-based Domain Adaptation for Person Re-identificationMinhui Hu, Jianhua Fan, Guanwu Wang, Yongyang Hu. 751-756 [doi]
- A Binary Function Name Prediction Method Based on Variable Alignment and Translation ModelBing Xia, JiaBin Yin, Yunxiang Ge, Ruinan Yang. 757-761 [doi]
- Research hotspots and trends of monitoring technologies in dementia: A Scientometric analysisWenhao Qi, Shihua Cao, Bingsheng Wang, Xiaohong Zhu, Danni He, Bin Wang, Chaoqun Dong, Yankai Shi, Yanfei Chen, Jiani Yao, Xiajing Lou. 762-767 [doi]
- How mHealth plays the role in Caregivers? A Bibliometric Visualization AnalysisXiaohong Zhu, Shihua Cao, Bin Wang, Chaoqun Dong, Wenhao Qi, Bingsheng Wang, Xiajing Lou, Jiani Yao, Yankai Shi, Yanfei Chen, Danni He. 768-772 [doi]
- Virtual Reality Technology in Cognitive Impairment Application: Bibliometric AnalysisChaoqun Dong, Shihua Cao, Xiaohong Zhu, Bin Wang, Wenhao Qi, Danni He, Yanfei Chen, Yankai Shi, Jiani Yao, Bingsheng Wang, Xiajing Lou. 773-779 [doi]
- The detection of rice canopy planting density based on CNNKeyin Chen, Jinzhen Xie. 780-785 [doi]
- Effective and Efficient Training for Sequential Recommendation Using Cumulative Cross-Entropy LossFangyu Li, Hong Peng, Shenbao Yu, Fan Yang. 786-792 [doi]
- Price Prediction of HS 300 Consumer Index Based on PSO-SVM and Futures Market InformationJin Wang. 793-797 [doi]
- A Railway Passenger Flow Prediction Model Based on Improved ProphetJiahao Chang, Xiaoyu Song. 798-804 [doi]
- IO Behaviour Analysis Based on Machine LearningWeibo Pan, Fei Li, Sheng Li, Yongcai Zhao, Jun Zhang, Di Yang, Xiang Wan. 805-808 [doi]
- Algorithmic Loan Risk Prediction Method Based on PSO-GWO-CatboostSuihai Chen, Bong Chih How, Po-Chan Chiu. 809-814 [doi]
- Recyclable garbage detection algorithm under occlusion conditionsJunshen Zhang, Li Kang, Xuan Xie. 815-819 [doi]
- Study on eccentric compression performance of carbon fiber reinforced concrete columns based on machine learningTianbei Kang, Qingxin Lai, Jiaxin Zhang, Jinghai Zhou. 820-824 [doi]
- Study of soil-spade interaction based on FEM-SPHBotao Zhang, Jun Zhu, Le Fan. 825-828 [doi]
- Application research of association rule based on Apriori algorithmXuemei Li. 829-833 [doi]
- Comparative research of lifting equipment fatigue life prediction based on different cumulative damage modelsLi Chen, Yanpeng Feng, Keqin Ding. 834-839 [doi]
- A novel portfolio strategy approach using deep reinforcement learningXu Yang, Chunyu Liu, Jiapeng Liu, Han Yue. 840-844 [doi]
- A CNN-AHP fusion algorithm for evaluating integration of industry and educationLili Dong, Ruishuang Qi, Tiantian Yang, Chunmei Liu. 845-849 [doi]
- Research on performance prediction of asphalt pavement based on PSO-SVR modelXi He, Qicheng Xu, Xilong Li. 850-854 [doi]
- A Comprehensive Study on Algorithm-Based Music GenerationXinwan Wang. 855-861 [doi]
- Research on the relationship between Marine Physical Elements in the Makassar StraitGanmeng Zhang. 862-865 [doi]
- MDCYOLO: Improved YOLOv5 Algorithm with Modified Deformable ConvolutionKun Chen, Hongqiang Wang. 866-872 [doi]
- Research on regional icing risk assessment based on icing influence factorsQiang Fan, Jianrong Wu, Shuzhou Xiao, Qi Yang, Qili Zhang, Jiyulei Dai, Xiaoqiang Zheng. 873-877 [doi]
- Research on Intelligent Detection Technology of Bridge Surface Defects Based on UAVsJie Lin, Sida Lei, Silu Huang, Mingpeng Li, Qiang Xiao, Yubing Huang. 878-887 [doi]
- Assessing the Performance of PINN and CNN Approaches in Solving the 1D Burgers' Equation with Deep Learning ArchitecturesCheng Li. 888-892 [doi]
- "Failure mechanism and failure prediction of crack propagation of drill pipe \"punctured leakage\" phenomenon"Wenhui Dang, Xinniu Xu, Wei Zhang, Shanchuan Tian, Zhongxi Zhu, Changjian Xiao. 893-897 [doi]
- Simulation study of spiral type tools for cleaning rock cutting bedsXinniu Xu, Shanchuan Tian, Wenhui Dang, Zhen Zhong, Zhongxi Zhu, Hong Liu. 898-902 [doi]
- Research on intelligent safety evaluation method of miter gate based on improved D-S evidence theoryWenqing Huang, Yabin Liu, Liaojun Zhang, Diandian Ding. 903-907 [doi]
- A ML-combined closed-loop identification method for thermodynamic processJuecen Mao, Qi Yin, Lei Pan. 908-912 [doi]
- Research on rolling bearing fault diagnosis based on Ensemble Empirical Mode Decomposition and Hilbert envelope spectrum analysisYe Yuan, Zhenxing Liu, Naifa Gong, Yingjie Liu, Peng Hang. 913-916 [doi]
- Research on low-carbon planning methods for large-scale shipping parts production workshopsLei Jia, Wenyuan Hu, Antong Ge, Tong Wan, Junyan Fan. 917-920 [doi]
- The Application of Simplified Strassen Algorithm to Snow Simulation with Material Point MethodMingrui Wang. 921-925 [doi]
- An evaluation method for the prediction effect of classification models based on deep learningTao Zhang, Yifei Xu, Ling Tan, Faling Li, Miao Song 0009, Shiyu Zhu. 926-930 [doi]
- Artificial Intelligent Player for Bullet Hell Games Based on Deep Q-NetworksDongxin Tian. 931-935 [doi]
- Automatic Protein Sequences Classification Using Machine Learning Methods based on N-Gram ModelChengen Zou. 936-940 [doi]
- Research on NFC Anti-Counterfeit Traceability Based on Signcryption AlgorithmResearch on NFC Anti-Counterfeit TraceabilityBingbing Liu. 941-949 [doi]
- Feature learning model based on Feature space constraints and Self-Attention learningChangming Xu, Yichuan Wang, Qilei Zhou, Dongnian Wang, Hechao Dong, Junwei Wang. 950-954 [doi]
- A component search method by feature Mixing based Continual LearningXiaoyu Fang, Liu Yuan. 955-960 [doi]
- Knowledge Base Enhanced ChatGLM for RPA Robot Code GenerationBo Zhang, Yang Xiang. 961-965 [doi]
- Research on Prediction of Open-pit Slope Stability Based on Improved FA-SVRWei Liu, Huarong Xu. 966-972 [doi]
- Crowd Flow Prediction Model based-on Adaptive Flow Attention for Smart LibraryYi Yang, Jiaxing Chen, Shuya Zhang. 973-978 [doi]
- Prediction of O3 Concentration Based on CEEMDAN-RCMSE-LSTM ModelLan Yang, Shen Li, Wenqi Liu. 979-985 [doi]
- A white wine fermentation experiment based on VR virtual simulationYang Yu, Zihao Ge, Huiyan Zhang, Feilong Chen, Hang Qi, Ruohan Li, Shaoqin Ren. 986-990 [doi]
- Research on the prediction method of vehicle trajectory based on Trasnsformer modelingWenshun Sun. 991-995 [doi]
- Assessment of Armor Detachment Operational Capability Based on Comprehensive Assessment AlgorithmsXiaowei Zhang, Wentao Dong, Yuanyuan Lin, Wei Cui, Zining Kong, Yucai Dong. 996-1001 [doi]
- Trajectory Tracking Control of Heavy Vehicles Based on Adaptive Model Predictive Control AlgorithmXianchen Liu. 1002-1007 [doi]
- The application of artificial intelligence to Alzheimer45s disease: A new research hotspots and associated challengesBin Wang, Shihua Cao, Xiaohong Zhu, Chaoqun Dong, Wenhao Qi, Danni He, Yanfei Chen, Yankai Shi, Jiani Yao, Bingsheng Wang, Xiajing Lou. 1008-1014 [doi]
- Research on cooperative UAV countermeasure strategy based on interception triangleShuyu Liu, Ting Chen, Tiantian Zhao, Shanshan Liu, Chao Ma 0019. 1015-1020 [doi]
- Epidemic Prediction Algorithm Based on Deep Learning and Epidemic DynamicsBing Xu, Xingyuan Chen, Yuan A, Zhenting Chen. 1021-1026 [doi]
- Intelligent control of air conditioning in exhibition halls based on edge computingHexuan Su, Wenhong Yu, Songling Zou, Kuan Wang. 1027-1031 [doi]
- Analysis of Machine Learning Methods for Water Quality Evaluation of Penaeus VannameiXiaohong Peng, Zixin Li, Zebin Ma, Ying Zhang. 1032-1041 [doi]
- Research on Construction of Dual Channel Model Based on Elderly GaitHongjun Chen, Junlian Xiang, Fuqiang Luo, Liheng Zhao, Lei Ma. 1042-1046 [doi]