Abstract is missing.
- The use of machine learning methods for fast estimation of CO2-brine interfacial tension: A comparative studyJiyuan Zhang, Qihong Feng, Xianmin Zhang. 1-5 [doi]
- Efficient Logistic Regression with L2 Regularization using ADMM on SparkXiaoDong Su. 6-10 [doi]
- Comparative Analysis Using Supervised Learning Methods for Anti-Money Laundering in BitcoinIsmail Alarab, Simant Prakoonwit, Mohamed Ikbal Nacer. 11-17 [doi]
- An intelligent teaching assistant system using deep learning technologiesZheyu Zhou. 18-22 [doi]
- Competence of Graph Convolutional Networks for Anti-Money Laundering in Bitcoin BlockchainIsmail Alarab, Simant Prakoonwit, Mohamed Ikbal Nacer. 23-27 [doi]
- Method for Detecting Android Malware Based on Ensemble LearningCongyi Deng, Guangshun Shi. 28-31 [doi]
- Performance Evaluation and Machine Learning based Thermal Modeling of Tilted Active Tiles in Data CentersZeeshan Rasheed, Wei Xiong, Gaoxiang Cong, Hongxun Niu, Jianxiong Wan, Yongsheng Wang, Lixiao Li. 32-38 [doi]
- An LSTM-Based Method for Detection and Classification of Sensor AnomaliesAlexander Verner, Sumitra Mukherjee. 39-45 [doi]
- A method of intrusion detection based on Attention-LSTM neural networkShuaichuang Yang, Minsheng Tan, Shiying Xia, Fangju Liu. 46-50 [doi]
- Prediction of Soybean Yield using Self-normalizing Neural NetworksKaki Shu. 51-55 [doi]
- Speeding Up Deep Convolutional Neural Networks Based on Tucker-CP DecompositionDechun Song, Peiyong Zhang, Feiteng Li. 56-61 [doi]
- Data Assimilation by Artificial Neural Network using Conventional Observation for WRF ModelShijin Yuan, Bo Shi, Bin Mu. 62-67 [doi]
- YU-net Lung Segment Image Preprocess Methods Used for Common Chest Diseases PredictionHaoxiong Yu, Xianbo Xu, Ziqi Zhao, Dancheng Li. 68-71 [doi]
- Top-down Feature Aggregation Block Fusion Network for Salient Object DetectionMeiyi Li, Lide Zhou. 72-78 [doi]
- Domain Adaptation Based Person-Specific Face Anti-spoofing Using Color Texture FeaturesJunwei Zhou, Ke Shu, Dongdong Zhao 0001, Zhe Xia. 79-85 [doi]
- Meta Learning for Few-Shot Joint Intent Detection and Slot-FillingHemanthage S. Bhathiya, Uthayasanker Thayasivam. 86-92 [doi]
- Application of Analytic Hierarchy Process-Fuzzy Comprehensive Evaluation in Public Transport of Ulaanbaatar City, MongoliaKhaliun Nasanjargal, Jing Lu. 93-102 [doi]
- On the Application of Computer War Chess Technology in the Support of Military SuppliesChenggong Zhai, Yong Kang, Min Luo. 103-108 [doi]
- Application of virtual machine in Quartermaster trainingChenggong Zhai, Zhaofan Yang, Xinpeng Lin. 109-113 [doi]
- A Trajectory-based Deep Sequential Method for Customer Churn PredictionBing Zhu, Cheng Qian, Xin Pan, Hao Chen. 114-118 [doi]
- Solar Power Prediction in IoT Devices using Environmental and Location FactorsArnan Mindang, Peerapon Siripongwutikorn. 119-123 [doi]
- An artificial immune based dynamic forensics model for distributed anonymous networkHongli Deng, Tao Yang. 124-128 [doi]
- A Short Text Classification Approach with Event Detection and Conceptual InformationWei Yin, Liping Shen. 129-135 [doi]
- Byte Visualization Method for Malware ClassificationZhuojun Ren, Guang Chen, Wenke Lu. 136-140 [doi]