Abstract is missing.
- OMAI Platform Based on Machine LearningQinglong Yao, Yingfei Wu, Zhenming Yuan, Xiaoyan Sun. 1-6 [doi]
- Utilizing VR/AR for Interior Design ProgramMohamad Izani Zainal Izani Abidin, Samad Alkhalidi, Aishah Razak. 7-12 [doi]
- The Systematic Review of K-Means Clustering AlgorithmArdavan Ashabi, Shamsul Bin Sahibuddin, Mehdi Salkhordeh Salkhordeh Haghighi. 13-18 [doi]
- State of Research Based on Essence (A Systematic Mapping Study)Syeda Samar Batool Shirazi, Muhammad Saud Khan. 19-25 [doi]
- Ransomware Detection techniques in the Dawn of Artificial Intelligence: A SurveyMonica Sneha, Arti Arya, Pooja Agarwal. 26-33 [doi]
- Optimal Strategy Selecting Method for Mimic Defense Based on Incomplete Information Dynamic GameZequan Chen, Jifen Sun, Xin Yang, Gang Cui, Hui Li 0022. 34-39 [doi]
- A Survey on Occluded Face recognitionZhifeng Zhang, Xiaohui Ji, Xiao Cui, Junxia Ma. 40-49 [doi]
- Recognition of Signal Modulation Mode Based on Gaussian Filter and Deep LearningHongmei Xie, Xiaobo Yang. 50-56 [doi]
- Prototype of porcelain safety display based on Augmented Reality TechnologyHui Liang 0004, Chao Ge, Yusheng Sun, P. U. Li, Fei Liang, Changhai Wang. 57-64 [doi]
- A Knowledge Graph Embedding Model Based on Node-Relation Fusion PerceptionZuowei Tang, Lixia Du. 65-70 [doi]
- EEG Signals De-Noising with Wavelet by Optimizing Threshold Based on Fruit Fly OptimizationXuefei Zhao, Dong Liu, Li Ma, Qingsong Ai, Quan Liu, Shengquan Xie. 71-77 [doi]
- Detection and Prevention of New Attacks for ID-based Authentication ProtocolsJinyong Chen, Reiner Dojen, Anca Jurcut. 78-86 [doi]
- Robust Corner Detection Using Linear Fitting Error EstimationShan Liu, Qian Zheng, Yuhua Li 0002, Zhifeng Zhang, Baohuan Li, Shizheng Zhang. 87-95 [doi]
- Research on Simulation of Network Attack and Defense situation based on Evolutionary GameWanwei Huang, Bo Yuan, Sunan Wang, Xiaohui Zhang. 96-103 [doi]
- Influence of Network Delay on QoS Control Using Neural Network in Remote Robot Systems with Force FeedbackXianzhi Wang 0004, Pingguo Huang, Yutaka Ishibashi, Takashi Okuda, Hitoshi Watanabe. 104-111 [doi]
- Mode-Locking Techniques of Femtosecond LaserWenyu Liu 0008. 112-117 [doi]
- Pixy: A Privacy-Increasing Group Creation SchemeDavid Mödinger, Nicola Fröhlich, Franz J. Hauck. 118-124 [doi]
- The Sector Cover and Transmission Weighted Greedy Algorithm for Connected Target Coverage in Directional Sensor NetworksYu-Fang Jian, Wei-Fu Lu. 125-130 [doi]
- The Component Carrier Selection Scheduling for Femtocell in Next Generation of Wireless CommunicationYing-Hong Wang. 131-137 [doi]
- Revised Reliable Transmission with Minimal Delay in Wireless Sensor NetworksPrzemyslaw Blaskiewicz, Jacek Cichon, Maciej Gebala, Marcin Zawada. 138-146 [doi]
- A Satellite Overlapping Covert Communication Scheme Based on LDPC-DCSK Transmission TechnologyRui Xue, Yongchao Wang. 147-151 [doi]
- Low-complexity Iterative Detection Algorithm in LDPC-CSK Scheme for High-Speed GNSSRui Xue, Hongying Ruan. 152-157 [doi]