Abstract is missing.
- Facial Expression Recognition Algorithm Based on Swin TransformerShumin Han, Heming Chang, Zhiguo Shi, Siquan Hu. 1-6 [doi]
- Exploration and Reflection on Precise Recommendation in Complex Information Environments: Boundaries, Challenges, and Future ProspectsXin Ma, Mingyue Li. 1-6 [doi]
- Mask R-CNN assisted diagnosis of spinal tuberculosisWenjun Li, Yanfan Li, Huan Peng, Yongjie Yang, Weijun Liang. 1-6 [doi]
- Adaptive Ensemble with Density Peak and Random Forest for Class-Imbalance LearningQiangkui Leng, Zeqi Zhang, Xiangfu Meng. 1-6 [doi]
- Internet Financial Risk Assessment Based on Hybrid Neural Network AlgorithmMenghan Fu, Zhuo Jiang, Jie Su, Ling Zhou. 1-6 [doi]
- An Anomaly Detection Method for Nonlinear Industrial Process Using Sparse Stacked Denoising AutoencoderMingWei Yang, Yanhua Liu, Hong Chen, Jiefei Lin, Haoqiang Lin. 1-6 [doi]
- Reinforcement Learning based End-to-End Control of Bimanual Robotic CoordinationBoran Wang, Yue Xiao. 1-7 [doi]
- Year and Confidence-Interval Prediction of Possible GRCT (Global Reserve Currency Transition) via Table Pattern Calculations (TPC) MethodYunong Zhang, Jiawei Chen, Ting Qiu. 1-8 [doi]
- Optimal Scheduling of Integrated Community Energy System Considering Carbon Emission Reduction and Economic ViabilityLe Li, Hao Han, Ying Zhang, Zhe Liu, Jingfei Xue, Xuan Liu, Jingjiao Liang. 1-9 [doi]
- A Radial-Based Mixed sampling method for imbalanced data classificationQiangkui Leng, Xuezi Sun, Xiangfu Meng. 1-6 [doi]
- Unsupervised Log Anomaly Detection Based on Pre-trainingShiming He, Zesheng Qu, Bowen Chen. 1-6 [doi]
- Limited Resources Multi-Object Tracking by Utilizing Motion Cue from the Meanshift AlgorithmHeming Chang, Shumin Han, Zhiguo Shi, Siquan Hu. 1-6 [doi]
- Spectral Clustering Augmentation Pseudo-Label Conditional Generation Adversarial Imputation Networks for Multivariate Time-Series Missing DataQiangkui Leng, Wei Liu, Xiangfu Meng. 1-6 [doi]
- Beginning and Ending Years of Technological Revolutions Estimated by Tabular Pattern Calculations as well as Further ThinkingYunong Zhang, Yuhao Fang. 1-8 [doi]
- A New Closeness Centrality Measure based on Minimum Weight Spanning TreeReggie Davidrajuh. 1-6 [doi]
- A Few-shot Classification Algorithm Based on Two-stream Frequency-Domain Information NetworksSiquan Hu, Jun Jia, Zhiguo Shi, Jun Zhao. 1-6 [doi]
- Dynamic Residual Illuminating Network for Low-Light Image EnhancementXueyang Zhong, Haihui Wang, Yanpu Chen. 1-6 [doi]
- Detection Of Bronchial Tuberculosis Using ASFF-Yolov5S ModelWenjun Li, Shen Xu, Huan Peng, Weijun Liang. 1-6 [doi]
- Analysis of Blockchain Technology to Enhance Logistics Supply Chain in the Context of InternetHan Xiao, Jinting Wang. 1-6 [doi]
- Optimizing Real-Time Trichiasis Object Detection: A Comparative Analysis of YOLOv5 and YOLOv8 Performance MetricsMini Han Wang, Yang Yu, Zhiyuan Lin, Peijin Zeng, Haoyang Liu, Yunxiao Liu, Wenhan Hu, Xiaoxiao Fang, Xudong Jiang, Guangshun Chen, Guanghui Hou, Kelvin Kl Chong, Xiangrong Yu. 1-5 [doi]
- Cuckoo Search Algorithm with Normal Distribution and Its Application in Lychee Image SegmentationYuanfei Yuan, Liangying Wang, Qi Zhou, Wen Xiao, Lijin Wang, Yiwen Zhong. 1-7 [doi]
- Optimal Dispatching of Power System Considering Source-load Uncertainty and Pricing of Flexible Ramping ProductsNaichao Chang, Hui Cui, Wenjin Xie. 1-6 [doi]
- Factuality Analysis of SNS Posts Containing Diverse Symptom Expressions for Public Health SurveillanceTatsuki Ando, Kazuaki Ando. 1-5 [doi]
- Adaptive Opinion Control Based on Two-stage Community DetectionJianbo Yuan, Guoyi Li, Yitai Xu, Wen Zhou, Miao Yu, Xiaomin Sun. 1-10 [doi]
- A Portfolio Competency Assessment Approach: Case Study, an Engineering DegreeMarcos A. LĂ©vano, Billy Peralta, Juan Cid. 1-6 [doi]
- Mobile Fighter Plane Game Manipulation: Touch-based Method vs. Camera-Based MethodLiang Chen. 1-5 [doi]
- Implementation and Evaluation of Smart Agriculture System based on Big Data AnalyticsGuanyu Zhu, Thelma Domingo Palaoag. 1-4 [doi]
- A Discriminative Feature Learning Approach for Remote Sensing Image Scene ClassificationLihua Ye. 1-5 [doi]
- Graph Neural Networks for Drug Response PredictionJiehuang Zhu, Xianfeng Liu, Jin Zhang, Sheng Wu. 1-6 [doi]
- Biological Template Protection Based on Multikey Cryptographic Decomposition FeaturesJing Wang, Haowen Jiang, Yuqi Yang, Rundong Xin. 1-6 [doi]
- Application Analysis of Data Mining technology in Internet Information RetrievalHan Xiao, Jinting Wang. 1-6 [doi]
- Emotion Detection and Adjustment in Emails: A Solution for Teenagers in Mountainous RegionsYingbo Zhai. 1-4 [doi]
- Scheduling System for Spinning Workshop Based on Improved Particle Swarm Optimization AlgorithmJiming Sa, Hui Xu. 1-6 [doi]
- Liver Tumor Segmentation From Computed Tomography Images Through Convolutional Neural NetworksDelia Mitrea, Vlad Timu, Cristinel Mihai Mocan, Sergiu Nedevschi, Andrei Vlad Florian, Mihai Adrian Socaciu, Radu Badea. 1-6 [doi]
- A Reliability Prediction Method for Power Communication Network Based on Node ImportanceZeke Li, Haiwei Fan, Jiuyu Guo, Genyuan Dong, Shaokang Xu, Qiu Zhang, Yanhua Liu. 1-6 [doi]
- An Augmented Two-stage Robust Adaptive Filtering Algorithm Based on GMWM for PPP/SINSLuodi Zhao, Long Zhao 0004. 1-6 [doi]
- An Integrated Long Short-Term Memory Based Online Log Anomaly DetectionShiming He, Sikai Zeng. 1-6 [doi]
- Research on the Evaluation System for Train Service Plan in High-speed Railway based on Operation Efficiency and EffectivenessZhenhuan He, Luxi Xue, Wenbin Yang. 1-6 [doi]
- Eight Points Geometric Constraint for Stereo MatchingYuanbin Wang. 1-6 [doi]
- Defect Detection in Computer Motherboard Assembly through Fusion of Multi-Scale Features and Attention MechanismsZhaoyang Li, Junying Chen, Hantao Huang, Xuze Dong. 1-7 [doi]
- Research on the characteristic modeling of substation equipment of power Internet of thingsWenfeng Tian, Hui Deng, Zhen Jing, Congcong Li. 1-5 [doi]
- Generating Random Petri Nets for GPenSIM environmentReggie Davidrajuh. 1-6 [doi]
- An optimization method for improving the production efficiency of the pressure surface machineShen JingBo, Liu Bo, Shen Yue. 1-5 [doi]
- Improved Job Scam Detection Methods Using Machine Learning and Resampling TechniquesYang Yang, Yi Zhang, Chengli Zhu. 1-5 [doi]
- An Abnormal Event Classification Model for Big Data Platforms Based on Semi-supervised LearningWentao Deng, Lilin Chen, Yonglu Hong, Yanhua Liu. 1-6 [doi]
- Gradient-Zhang (GZ) Dynamics Coping with UDSTDLE (Under-Determined System of Temporally-Dependent Linear Equations)Yunong Zhang, Rifeng Yang. 1-8 [doi]
- Prediction of Pulmonary Tuberculosis with Hemoptysis based on Deep LearningWenjun Li, Jiazhi Liu, Huan Peng, Weijun Liang. 1-6 [doi]
- Reinforcement Learning Methods for Fixed-Wing Aircraft ControlLun Li, Xuebo Zhang, Yang Wang, Chenxu Qian, Minghui Zhao. 1-8 [doi]
- CALP-FD: Cross Attention-Based Facial Landmarks Prompt for Face De-MorphingMin Long, Qihuan Wang, Le-Bing Zhang, Jun Zhou. 1-6 [doi]
- Optimizing Blockchain Broadcast with Node-Cluster Tree RoutingYan Zhao, Qiang Wang 0051, Xiaofeng Chen. 1-6 [doi]
- An Improved Algorithm for Foreign Objects Detection on Power Transmission LinesDa-Ming Zou, Yangkai Liu, Hang Lin, Zhen Qiu. 1-6 [doi]
- Point Cloud Pose Alignment Based on Improved Nearest Point IterationJiming Sa, Xuecheng Zhang, Chi Zhang, Yuyan Song, Liwei Ding, Yechen Huang. 1-6 [doi]
- A Method for Constructing an Olfactory Dataset Based on fNIRSWei Li, Haobo He, Guang Li, Lidan Kuang, Jin Zhang. 1-6 [doi]
- WZ Algorithms from AS Kind to MD One Attempted to Predict Solar MinimumYunong Zhang, Yuhao Fang. 1-7 [doi]
- Design and Development of a Log Management System Based on Cloud Native ArchitectureYuChen Sun, Yanpiao Chen, Haotian Zhao, Shan Peng. 1-6 [doi]
- A Temporal Action Detection Model Based on Deep Reinforcement LearningZhaojia Han, Kan Li, Shaojie Qu. 1-7 [doi]
- Privacy-Preserving Arbitrary Hollow Polygon Geometric Range Query Scheme in Fog Computing-Based IoVsDongdong Chen, Luyao Jiang, Yi Wang, Ke Gu. 1-6 [doi]
- An Improved Gaussian-Mapping Algorithm for Edge Detection Based on FPGADihong Xie, Jin Wu, Bo Zhao, Wenting Pang. 1-6 [doi]
- Traffic Sign Recognition Based on Improved YOLOv5sJin Zhang, Fan Cao, Jianming Zhang, Ying Li, Sheng Wu 0001. 1-6 [doi]
- Queue Length Prediction Method of Short-linked Intersections Based on Long Short-Term MemoryKang Shi, Jun Yang, Zi Jun Liang, Yu Qi Li, Rui Han Wang. 1-6 [doi]
- FpRE:Front-prompt based dependency enhanced Few-shot Relation ExtractionYijun Tan, Yini Zhou, Xi Cheng. 1-5 [doi]
- Using machine learning models to predict win rate of NBA teamsJieyu Han. 1-4 [doi]
- Meta Learning Framework for Improved Long-tail Item RecommendationBingjun Qin, Zhenhua Huang, Guibing Guo. 1-6 [doi]
- Agile development research based on software engineering to software testingQiaoLi Chen, Liwen Guo, YunChen Feng. 1-3 [doi]
- Credit default prediction based on genetic algorithm improved neural networkZhuo Jiang, Jie Su, Ling Zhou. 1-5 [doi]
- Convolutional Neural Network Compression Method Based on Multi-Factor Channel PruningZihan Zhang, Xuesong Xie, Xiaoling Zhang. 1-6 [doi]