Abstract is missing.
- A Hybrid Improved Lion Swarm Optimization AlgorithmKeqin Jiang, Mingyan Jiang. 1-4 [doi]
- Optimization of Chinese Character Font Recognition Model Based on Incremental LearningDong-Xu Li, Hui Rong Cui, Yi-Jing Wang. 5-14 [doi]
- Research on the Application of Artificial Intelligence Technology in Material SupportChenggong Zhai, Fei Xiang, Yiwei Liu, Hongsi Xu, Liyong Zhou, Xing Zhang. 15-18 [doi]
- Processing Approaches for Functional Magnetic Resonance Imaging Data in a Limited Sample of Deaf IndividualsQiang Li, Yuan Meng, Rui Meng Shi. 19-22 [doi]
- Classification of Brain Functional Connections for Tone Processing in Deaf Children Based on 1D-CNNMengrui Shi, Qiang Li, Yuan Meng. 23-27 [doi]
- CLPLM-EE: Contrastive Learning Pre-training Model for Event Extraction In New DomainZhou Yu Liu, Xin Yan, Long You Luo. 28-34 [doi]
- Navigating the Confluence: Advancements and Trends in Artificial Intelligence-Driven Design Education Based on CiteSpace's Visual AnalyticsRonghui Wu, Younghwan Pan. 35-39 [doi]
- Effects of subsidy and cap-and-trade allocation rules on carbon management of multi-party supply chainAo Qiao, Xia Zhou, Jianing Wang, Siyu Zeng. 40-44 [doi]
- Bayesian Detection for Colocated MIMO Radar with Limited Training DataWeijian Liu, Zhe Zhou, Pengcheng Gong, Yuntao Wu. 45-49 [doi]
- CLIP-M-Cap: CLIP Mean Teacher for Image CaptioningShuo Chen, Juan Zhang. 50-55 [doi]
- Autoencoder-based Malware Analysis: An Imagery Analysis Approach to Enhance the Security of Smart City IoTHuiyao Dong, Igor Kotenko. 56-59 [doi]
- Towards Feature Selection for Detecting LDDoS in SD-IoT of Smart Grids: A Multi-correlation Information EA-based MethodXuanyu Huan, Jianpeng Zhao, Guolin Chen, Xianchao Li, Yunhe Cui, Hongzhen Yang. 60-66 [doi]
- VERY-RL: An Adaptive Image Steganography Algorithm Based on Reinforcement LearningYong Long, Qing Qian, Yunhe Cui. 67-71 [doi]
- Malicious Random-index PIR and its ApplicationHui Ma, Yucong Wei, Xuejun Li, Yuqing Zhang 0001. 72-75 [doi]
- The Design of an Intelligent Security System with Face Recognition and Human Action AnalysisNazgul Zholmagambetova, Aidyn Abirov. 76-81 [doi]
- A Method for Task Offloading based on Multi-agent Deep Deterministic Policy Gradient(MADDPG) and Minimum Cost Maximum Flow(MCMF) in Internet of Vehicles(IoVs)Zhiping Ouyang, Liang Li, Bo Wang. 82-86 [doi]
- Research on Named Entity Recognition in the Steel Industry Based on MacBERTCuilan Liu, Ziyi Yuan, Jingxin Zhao, Jingfeng Rong, Yuqing Zhang 0001. 87-90 [doi]
- HPPython: Extending Python with HPspmd for Data Parallel ProgrammingJudah Josiah Nava, Jaden Jinu Lee, Hanku Lee. 91-94 [doi]
- An Anonymous Authentication and Key Agreement Scheme for Multi-Server EnvironmentsEnqiang Zhu, Yu Zhang, Guanhua Jiang, Jing Wang. 95-101 [doi]
- Hierarchical Large Language Models in Cloud-Edge-End Architecture for Heterogeneous Robot Cluster ControlZhirong Luan, Yujun Lai, Rundong Huang, Yan Yan, Jingwei Wang, Jizhou Lu, Badong Chen. 102-105 [doi]
- Developing a Machine Learning Based Technology for Secure Internet of VehiclesKhalid Alemerien, Ayyam Alkhawaldeh, Aram Al-Ghareeb. 106-111 [doi]