Abstract is missing.
- Bugs in Security OnionLifan Xu, Gabriela Mogos. 1-6 [doi]
- An Improved Fuzzy Actor-critic Learning Approach for Path Planning with Position ConstraintsWuyi Luo, Jun Zhang, Xu Huang, Zhaolei Wang, Chenhui Jia. 7-12 [doi]
- VEDA - moVE DAta to balance the grid: research directions and recommendations for exploiting data centers flexibility within the power systemAmin Ziagham Ahwazi, Chiara Bordin, Sambeet Mishra, Phuong Hoai Ha, Alexander Horsch. 13-18 [doi]
- Dynamic Spatial-Temporal Graph Convolutional GRU Network for Traffic ForecastingJinhong Li, Jian Yang, Lei Gao, Lu Wei, Fuqi Mao. 19-24 [doi]
- Optimal control strategy of station load for network-load cooperationXiao Chen, Xuesong Shao, Qixin Cai, Yue Li, Yu Zhou. 25-29 [doi]
- User Click Preference Prediction Using Attention-based LSTM ModelSara Abri, Rayan Abri, Salih Çetin. 30-34 [doi]
- Construction of Hierarchical Knowledge Graph Based on Electromechanical EquipmentYajian Zeng, Xiaorong Hou. 35-40 [doi]
- Design of Non-Destructive Evaluation System for Historical Frescos with New Acoustic-Optical MethodYing Xiang, Jian Dai. 41-47 [doi]
- Non-cooperative Target Relative Navigation Method Based on Vortex Light, Vision and IMU InformationTao Zou, Linfen Wang, Ting Zhu, Xuerui Zhai. 48-53 [doi]
- Research on the monitoring technology for geological disasters by the intelligent video recognition technology based on the optical flowQingjia Meng, Chenhui Wang, Wei Guo. 54-59 [doi]