Abstract is missing.
- A Hierarchical Automata Based Approach for Anomaly Detection in Smart Home DevicesKai Kang, Lijie Xu, Wei Wang, Guoquan Wu, Jun Wei 0001, Wei Shi, Jizhong Li. 1-8 [doi]
- Behavioral Model based Trust Management design for IoT at ScaleBrennan Huber, Farah Kandah. 9-17 [doi]
- A Stochastic-Based Reliability Calculation Method for RTL CircuitsJie Xiao, Qiou Ji, Jungang Lou, Ziwen Sun, Yujiao Huang. 18-22 [doi]
- Cross-level Feature Aggregation and Fusion Network for Light Field Salient Object DetectionAnzhi Wang, Weihua Ou, Chunhong Ren, Yun Liu. 23-28 [doi]
- Physical-Layer Cooperative Key Generation with Correlated Eavesdropping Channels in IoTPeng Xu 0002, Dongyang Hu, Gaojie Chen. 29-36 [doi]
- Trusted Anonymous Authentication For Vehicular Cyber-Physical SystemsMingyue Zhang, Junlong Zhou, Kun Cao, Shiyan Hu. 37-44 [doi]
- Semantic Descriptor for Intelligence ServicesEdgar Ramos, Timon Schneider, Marie-J. Montpetit, Ben De Meester. 45-53 [doi]
- Industry 4.0 Synoptics Controlled by IoT Applications in Node-REDClaudio Badii, Pierfrancesco Bellini, Daniele Cenni, Nicola Mitolo, Paolo Nesi, Gianni Pantaleo, Mirco Soderi. 54-61 [doi]
- Visual Analysis and Exploration of COVID-19 Based on Multi-source Heterogeneous DataYun Zhou, Hu He, Jieqi Rong, Yun Cheng, Yongchang Li, Wei Zhong, Fu Jiang. 62-69 [doi]
- Driving Intention Oriented Real-time Energy Management Strategy for PHEV in Urban V2X ScenarioJin Xie, Kai Gao, Feng Zhou, Lin Hu, Zhengfa Zhu, RongHua Du. 70-76 [doi]
- A Switching Offloading Mechanism for Path Planning and Localization in Robotic ApplicationsDimitrios Spatharakis, Marios Avgeris, Nikolaos Athanasopoulos, Dimitrios Dechouniotis, Symeon Papavassiliou. 77-84 [doi]
- Independent credible: Secure communication architecture of Android devices based on TrustZoneYichuan Wang, Wen Gao 0014, Xinhong Hei 0001, Irenee Mungwarama, Ju Ren. 85-92 [doi]
- WiFi-based Device-free Vehicle Speed Measurement Using Fast Phase Correction MUSIC AlgorithmShuo Li 0006, Yunfei Ma, Xin Gu, Yunsheng Fan, Pingping Wang, Yao Lu, Bowen Liu. 93-99 [doi]
- Toward Automated Smart Ships: Designing Effective Cyber Risk ManagementKeisuke Furumoto, Antti Kolehmainen, Bilhanan Silverajan, Takeshi Takahashi 0001, Daisuke Inoue, Koji Nakao. 100-105 [doi]
- Attention-based Hierarchical Convolution Neural Network for Fine-grained Crop Image ClassificationJiannan Yang, Fan Zhang, Tiantian Qian. 106-112 [doi]
- A Stack4Things-based Web of Things ArchitectureZakaria Benomar, Francesco Longo 0001, Giovanni Merlino, Antonio Puliafito. 113-120 [doi]
- Anomaly Detection Using Spatio-Temporal Correlation and Information Entropy in Wireless Sensor NetworksLingqiang Chen, Li Xu, Guanghui Li 0001. 121-128 [doi]
- Wheat Yield Forecasting using Regression Algorithms and Neural NetworkCheng Dai, Yinqin Huang, Minghao Ni, Xingang Liu. 129-134 [doi]
- Multicast Traffic Throughput Maximization through Dynamic Modulation and Coding Scheme Assignment in Wireless Sensor NetworksBartlomiej Ostrowski, Michal PiĆ³ro, Artur Tomaszewski. 135-141 [doi]
- Distributed Packets Scheduling Technique for Cognitive Radio Internet of Things Based on Discrete Permutation Particle Swarm OptimizationDina Tarek, Abderrahim Benslimane, M. Darwish, Amira M. Kotb. 142-151 [doi]
- Multi-area Path Planning for Wireless Sensor Networks Based on Double Populations Ant Colony Optimization AlgorithmChenxuan Zhai, Minghua Wang, Kaiwu Jiang, Yan Wang, Bo Fan, Chao Wang. 152-159 [doi]
- An internet of things based transportation cart for smart construction siteAbdelmoumen Norrdine, Christoph Motzko. 160-167 [doi]
- Enhanced Knowledge Inference and Reasoning with New IPLijun Dong, Richard Li. 168-174 [doi]
- Joint Hybrid Precoding Scheme with Low Complexity for Single-user Massive MIMO SystemsShiguo Wang, Mingyue He, Yongjian Zhang, Xinlei Wang. 175-179 [doi]
- Algorithm for Determining Number of Clusters based on DichotomyZhuang Xu, Yue Yin, Haitao Chen, He Xu, Peng Li 0011. 180-185 [doi]
- Anomaly Detection based on Feature Correlation and Influence Degree in SDNJiajia Qin, Xun Zhang, Peng Li. 186-192 [doi]
- Detection Algorithm Based on Deep Learning for the Multi-user MIMO-NOMA SystemWenwu Xie, Jian Xiao, Xin Peng 0002. 193-197 [doi]
- Security, Privacy and Ethical Concerns of IoT Implementations in Hospitality DomainSuat Mercan, Kemal Akkaya, Lisa Cain, John Thomas. 198-203 [doi]
- Prediction of diabetes using Multi-type dataZhengcai Li, Mingtao Guo, He Xu, Peng Li 0011. 204-210 [doi]
- Fast Monte Carlo method to simulate atmospheric backscattering of wireless laser sensor networkYunzhi Xia, Xiao Tang, Chan Wu, Chunbo Ma, Jun Ao. 211-215 [doi]
- MQTT-Based Surveillance System of IoT Using UWB Real Time Location SystemAbdelmoumen Norrdine, Zakaria Kasmi, Kashan Ahmed, Christoph Motzko, Jochen H. Schiller. 216-221 [doi]
- Abnormal Road Surface Detection Based on Smart Phone Acceleration Sensor and CrowdsourcingGang Qiu, RongHua Du, Kai Gao, Lin Hu, Li Liu. 222-227 [doi]
- Blockchain-based Secure and Reliable Manufacturing SystemArpan Bhattacharjee, Shahriar Badsha, Shamik Sengupta. 228-233 [doi]
- Flood Prediction Using IoT and Artificial Neural Networks with Edge ComputingEric Samikwa, Thiemo Voigt, Joakim Eriksson. 234-240 [doi]
- Low-Power Modular Multi-Sensor Node with ZeSCIP Analog FrontendMarcel Jotschke, Harsha Prabakaran, Torsten Reich. 241-245 [doi]
- A Contract-Based Incentive Mechanism for Traffic Offloading in Two-tier Heterogeneous NetworksNan Zhao, Huiwen Tan, Zehua Liu. 246-251 [doi]
- Robust Speaker Identification of IoT based on Stacked Sparse Denoising Auto-encodersZhifeng Wang, Surong Duan, Chunyan Zeng, Xinguo Yu, Yang Yang, Helin Wu. 252-257 [doi]
- Image Reconstruction of IoT based on Parallel CNNChunyan Zeng, Zhenghui Wang, Zhifeng Wang. 258-263 [doi]
- A semi-supervised dynamic ensemble algorithm for IoT anomaly detectionShudong Liu, Xiping Hao, Xu Chen. 264-269 [doi]
- A feature selection algorithm for multilayer perceptron based on simultaneous two-sample representationShudong Liu, Ke Zhang, Xu Chen. 270-275 [doi]
- Internet of Things based Construction and Health Monitoring of High-pier Long-span Continuous Rigid Frame BridgeYuhang Liu, Chan Wu, Hengshan Wu, Yuan Zhang. 276-281 [doi]
- Adversarial Domain Adaptation for Crisis Data Classification on Social MediaQi Chen, Wei Wang 0042, Kaizhu Huang, Suparna De, Frans Coenen. 282-287 [doi]
- On the Development of a Resident Monitoring System: Usability, Privacy and Security aspectsPascal Bruegger, Adriana Wilde, LoĆÆc Guibert. 288-293 [doi]
- Cloud Platform Performance Evaluation Using Multi-level Execution TracingYves J. Bationo, Naser Ezzati Jivan, Evan Galea, Michel R. Dagenais. 294-299 [doi]
- Wi-mix: A pedestrian track tracking method combining PDR and Wi-Fi signalsZhanjun Hao 0001, LiHua Yan, Jianwu Dang, Lei Bai 0009. 300-309 [doi]
- Energy-aware Aperiodic Task Servers for Firm Real-time Energy harvesting SystemsAudrey Queudet, Maryline Chetto. 310-317 [doi]
- A New State Evaluation Algorithm for Rail Transit Power Supply SystemWang Jiajian, Liu Hu, Pan Zhiqun, Weilong Wang, Zhang Lulu, Liu Zilong. 318-322 [doi]
- Energy-efficient Inference Service of Transformer-based Deep Learning Models on GPUsYuxin Wang, Qiang Wang, Xiaowen Chu. 323-331 [doi]
- Integrating Pre-Cooling of Data Center operated with Renewable EnergiesMaƫl Madon, Jean-Marc Pierson. 332-341 [doi]
- Comparative Study of Shortterm Electricity Price Forecasting Models to Optimise Battery ConsumptionVjosa Preniqi, Bhupesh Kumar Mishra, Dhavalkumar Thakker, Erich Feigl, Geev Mokryani, Amr Abdullatif, Savas Konur. 342-349 [doi]
- Decentral load control for data centersFelix Uster, Franz Plocksties, Dirk Timmermann. 350-359 [doi]
- Deep Reinforcement Learning and Blockchain for Peer-to-Peer Energy Trading among MicrogridsYe Xu, Liang Yu, Gang Bi, Meng Zhang, Chao Shen 0001. 360-365 [doi]
- Real-time personalised energy saving recommendationsChristos Sardianos, Christos Chronis, Iraklis Varlamis, George Dimitrakopoulos, Yassine Himeur, Abdullah Alsalemi, Faycal Bensaali, Abbes Amira. 366-371 [doi]
- activIn: A novel Non-Intrusive Activity Inference ToolAsimina Dimara, Stelios Krinidis, Dimitrios Tzovaras. 372-378 [doi]
- Multi-Robot-Assisted Confident Information Coverage Hole Repairing in WSNsKaiwu Jiang, Minghua Wang, Chenxuan Zhai, Yan Wang, Chao Wang, Bo Fan. 379-384 [doi]
- Performance of Cooperative Relayed NOMA with Energy Harvesting Nodes in Underlay NetworksGarima Singhal, Shashi Bhushan Kotwal, Sudhakar Modem, Shankar Prakriya. 385-391 [doi]
- occupI: A novel Non-Intrusive Occupancy Inference ToolAsimina Dimara, Stelios Krinidis, Dimitrios Tzovaras. 392-398 [doi]
- Real-time Vision-Language-Navigation based on a Lite Pre-training ModelJitao Huang, Bo Huang, Liangqi Zhu, Liyuan Ma, Jin Liu, Guohui Zeng, Zhicai Shi. 399-404 [doi]
- Simulation environment of embedded control system for multi-core processor with faster CPU simulatorDaichi Minami, Yukikazu Nakamoto, Yoshitaka Koga, Koji Fukuoka. 405-410 [doi]
- A Novel Scheme for Access Control Policy Generating and Evaluating in IoT based on Machine LearningYinyan Zhao, Mang Su, Jie Wan, Jinpeng Hou, Dong Mei. 411-418 [doi]
- Real-Time Operating Systems for Cyber-Physical Systems: Current Status and Future ResearchAnthony Serino, Liang Cheng. 419-425 [doi]
- A Distributed DBSCAN Algorithm for Massive Data in Cyber Physical and Social ComputingWei Zhang, Xiaohui Chen, Jiajun Sun, Qian Xi. 426-433 [doi]
- An Evaluation of Caching in Nation Scale, Normally Isolated Mobile Ad Hoc NetworksSean Oesch, Max Schuchard. 434-439 [doi]
- Cypher Social Contracts A Novel Protocol Specification for Cyber Physical Smart ContractsLars Creutz, Guido Dartmann. 440-447 [doi]
- RFID-Based WIMEC-LANDMARC Indoor Location AlgorithmYang Li, He Xu, Peng Li. 448-455 [doi]
- Data Aggregation Algorithm based on Autoregressive Model in Wireless Sensor NetworksHanxiao Zhi, He Xu, Peng Li 0011. 456-461 [doi]
- The Research on Control and Dynamic Property of Autonomous Vehicle Adaptive Lidar SystemJing Chen, Hanlin Zhang, Yi Lu, Qingrui Zhang. 462-468 [doi]
- Noise Estimation-based Method for MRI Denoising with Discriminative Perceptual ArchitectureXiaorui Xu, Siyue Li, Shutian Zhao, Taiyu Yan, Chun Ki, Franklin Au, Weitian Chen. 469-473 [doi]
- Extending the CST: The Distributed Cognitive ToolkitWandemberg Gibaut, Ricardo R. Gudwin. 474-481 [doi]
- Toward A Sustainable Cyber-Physical System Architecture for Urban Water Supply System**This work was supported by KLIMAFORSK programme(No. 244147/E10) from Research Council of NorwayDi Wu 0035, Hao Wang 0003, Razak Seidu. 482-489 [doi]
- DeepER: A Deep Learning based Emergency Resolution Time Prediction SystemGissella Bejarano, Adita Kulkarni, Xianzhi Luo, Anand Seetharam, Arti Ramesh. 490-497 [doi]
- Forest Type Classification with Multitemporal Sentinel-2 DataJin Li, Leiguang Wang. 498-504 [doi]
- Automatic Prediction and Insertion of Multiple Emojis in Social Media TextHongyu Jiang, Ao Guo, Jianhua Ma. 505-512 [doi]
- Research and Design of Square Kilometer Array Astronomical Data Management Model Based on FabricJinhua Fu, Jie Xu, Shulin Zhang, Chen Zhang. 513-518 [doi]
- CAMDet: CAM-based objection detection for non-crowded views from moving IoT devicesYuheng Cao, Kwei-Jay Lin, Bo-Lung Tsai, Yu Meng. 519-526 [doi]
- Drug-Drug Interaction Extraction using Pre-training Model of Enhanced Entity InformationAng Wen, Xiaoyan Sun, Kai Yu, Yingfei Wu, Jia Zhang, Zhenming Yuan. 527-532 [doi]
- Leveraging Multi-view Learning for Human Anomaly Detection in Industrial Internet of ThingsSamundra Deep, Yuzhe Tian, Jianchao Lu, Yipeng Zhou, James Xi Zheng. 533-537 [doi]
- Sampling Workloads with Dynamic Time Scale to Promote the Energy Efficiency of DatacentersCheng Hu, Yi Zhou, Ruoyao Ding. 538-543 [doi]
- CNN Network for Head Detection with Depth Images in cyber-physical systemsQi Wang, Hang Lei, Xiangtian Ma, Shihua Xiao, Xupeng Wang. 544-549 [doi]
- Trajectory Outlier Detection Based on DBSCAN and Velocity EntropyWenhan Dai, Chengwei Zhang, Xiaoyan Su, Shuo Cao. 550-557 [doi]
- Random Forest Based Multi-View Fighting Detection with Direction Consistency Feature ExtractionXuehua Wang, Chuang Yao, Xiaoyan Su, Jinghua Dong, Yixuan Li. 558-563 [doi]
- Efficient Reduction on Decision ImplicationCan Wang, Qiang Lin, Chunming Xu, Yu Bo, Yu Wang. 564-570 [doi]
- Infrared and visible image fusion based on local gradient constraintsGuosheng Lu, Chunming He, Lei Xu, Jinlei Ren, Guoxia Xu, Haiming Zhao. 571-575 [doi]
- X-DOG: An Intelligent X-ray-based Dangerous Goods Detection and Automatic Alarm SystemYu Shi, Yige Xu 0003, Lai Wei, Haoran Gao, Xiaolong Xu. 576-582 [doi]
- Gaussian Image Denoiser Based on Deep Convolutional Sparse Coding with Attention MechanismYu Shi, Yingying Hua, Yige Xu 0003, Haoran Gao, Zhenya Wang, Benchang Zheng. 583-589 [doi]
- Misleading Sentiment Analysis: Generating Adversarial Texts by the Ensemble Word Addition AlgorithmYushun Xie, Zhaoquan Gu, Xiaopeng Fu, Le Wang 0008, Weihong Han, Yuexuan Wang. 590-596 [doi]
- Image Tampering Localization Based on Superpixel SegmentationXinhua Tang, Weiwei Zhang, Yurong Chen. 597-602 [doi]
- Research on Reliability-Centered Maintenance Strategy of Container Terminal Shore CraneHanlin Zhang, Yong Li, Lin Zhang, Zelong Chen, Jing Chen. 603-610 [doi]
- Sequential Recommendation with a Pre-trained Module Learning Multi-modal InformationTeng-Yue Han, Yu Tian, Jiwei Zhang, Shaozhang Niu. 611-616 [doi]
- Anti-html Evasion in Intrusion Prevention SystemFeng Dong, Jia Liu, Liang Gu, Min Ma. 617-622 [doi]
- A Vulnerability Mining Model of Java Json Deserialization Based on ASTYahe Kuang, Xianzhe Meng, Weiyi Han, Xiao Wang, Cheng Jiang. 623-627 [doi]
- Reversible Data Hiding Algorithm with High Imperceptibility Based on Histogram ShiftingLinna Zhou, Weijie Shan, Xin Tang, Bingwei Hu, Xiaomei Liu. 628-633 [doi]
- An Assessment of the Usability of Machine Learning Based Tools for the Security Operations CenterSean Oesch, Robert A. Bridges, Jared M. Smith, Justin M. Beaver, John R. Goodall, Kelly M. T. Huffer, Craig Miles, Daniel Scofield. 634-641 [doi]
- Fast Fire Identification Soft-Core Package Design Based on FPGAYongtao Liu, Ruizhi Sun, Tianyi Zhang, Xiangnan Zhang, Li Li, Guoqing Shi. 642-647 [doi]
- An Integrated Platform for Collaborative Data AnalyticsSean Oesch, Rob Gillen, Tom Karnowski. 648-653 [doi]
- Research on a road target detection method based on improved YOLOv3Chen Zhang, Qiao Meng, Zijie Sun, Yuan Zhang, Wenzhi Wang, Shujun Yin. 654-660 [doi]
- Ontology-based Automatic Semantic Annotation Method for IoT Data ResourcesMiao Zhang, Lijing Han, Lingyun Yuan, Nan Chen. 661-667 [doi]
- A High Capacity Text Steganography Utilizing Unicode Zero-Width CharactersHafsat Muhammad Bashir, Qianmu Li, Jun Hou. 668-675 [doi]
- A Free Placement Approach to Upper-Limb Tracking Using Inertial SensorsXueyan Wu, Mingxu Sun, Haiping Mu, Qi Liu 0001, Xuqun Pei, Bin Ning. 676-679 [doi]
- A Fast Classification Approach to Upper-Limb Posture RecognitionXueyan Wu, YingHang Jiang, Qi Liu, Hao Wu, Xiaodong Liu. 680-683 [doi]
- A Selective Model Aggregation Approach in Federated Learning for Online Anomaly DetectionYang Qin, Hiroki Matsutani, Masaaki Kondo. 684-691 [doi]
- Children's Drawing Psychological Analysis using Shallow Convolutional Neural NetworkYue Yuan, Jing Huang 0005, Xiang Ma, Ke Yan 0001. 692-698 [doi]
- Multi-source Meteorological Observation Data Quality Control Algorithm Based on Data MiningTao Li, Lei Wang, Yongjun Ren, Lingyun Wang, Qi Qian. 699-704 [doi]
- Energy- and Time-Efficient Tasks Offloading and Dynamic Resource Allocation in Smart CityBohai Zhao, Kai Peng, Haoqi Zhang, Xiaolong Xu 0001. 705-712 [doi]
- CAUSE: Caching Aided by USer EquipmentMargarita Vitoropoulou, Konstantinos Tsitseklis, Angelos Karakoulias, Vasileios Karyotis, Symeon Papavassiliou. 713-721 [doi]
- Differentially Private Machine Learning Model against Model Extraction AttackZelei Cheng, Zuotian Li, Jiwei Zhang, Shuhan Zhang. 722-728 [doi]
- RPCC: A Replica Placement Method to Alleviate the Replica Consistency under Dynamic CloudShenYao Sun, Xianji Wang, Fang Zuo. 729-734 [doi]
- Research of a Self-adaptive Mixed-Variable Multi-objective Ant Colony Optimization AlgorithmYiguang Gong, Weixue Wang, Siqi Gong. 735-742 [doi]
- Variant transfer learning for wood recognitionPenggui Huang, Fan Zhao, Xiaoping Li, Zhangkang Wu, Zheng Zhu, Yanfeng Zhang. 743-748 [doi]
- A Survey on Blockchain: Architecture, Applications, Challenges, and Future TrendsJinmei Yang, Bi Huang, Zhihong Liang, Hua Zhou, Hongji Yang. 749-754 [doi]
- Edge Computing for Internet of Things: A SurveyHuihui Xue, Bi Huang, Mingming Qin, Hua Zhou, Hongji Yang. 755-760 [doi]
- Empirical Research on Cluster Analysis of Spectral Information of Hyperspectral Remote Sensing DataYueyu Dong, Fei Dai 0002, Xiaolong Xu 0001, Mingming Qin, Zhenping Qiang. 761-766 [doi]
- Application of NER and Association Rules to Traditional Chinese Medicine Patent MiningTianci Chen, Mengfei Luo, Hao Fu, Di Chen, Qianyi Hu, Na Deng. 767-772 [doi]
- Research of Association Rules Based on Improved Ant Colony OptimizationTianci Chen, Na Deng. 773-778 [doi]
- An Ensemble of Random Decision Trees with Personalized Privacy Preservation in Edge-Cloud ComputingXiaotong Wu, Xiaolong Xu 0001, Fei Dai 0002, Jiaquan Gao, Genlin Ji, Lianyong Qi. 779-786 [doi]
- A survey of head pose estimation methodsXiaofeng Shao, Zhenping Qiang, Hong Lin, Yueyu Dong, Xiaorui Wang. 787-796 [doi]
- A Fuzzy Fan Speed Controller for Smart Data Processing DeviceJuntao Ding, Weihong Liu, Zongwei Zhu, Renyu Zhang, Jing Cao, Gangyong Jia. 797-805 [doi]
- Bandwidth-Aware Rescheduling Mechanism in SDN-based Data Center NetworksMing-Chin Chuang, Chiajui Hung, Chao-Lin Chen. 806-811 [doi]
- A Cascade Collaborative Offloading Framework for Video Analytics Based on Online LearningYuanlin Li, Bin Luo, Yuzhe Zhang, Zhenchuan Sun, Yunpeng Liu. 812-820 [doi]
- An optimization method for resource allocation in fog computingChao Yin, Tongfang Li, Xiaoping Qu, Sihao Yuan. 821-828 [doi]
- Fault Detection and Diagnosis of Chillers with S&D Convolutional Neural NetworkXueteng Sun, Ke Yan, Xiaokang Zhou. 829-836 [doi]
- Imbalanced Encrypted Traffic Classification Scheme Using Random ForestFeng Zhang, Tao Shang, Jianwei Liu 0001. 837-842 [doi]
- Improving Load Forecast Accuracy of Households Using Load Disaggregation TechniquesAida Mehdipour Pirbazari, Mina Farmanbar, Antorweep Chakravorty, Chunming Rong. 843-851 [doi]
- Machine Learning Recognition of Gait Identity via Shoe Embedded AccelerometerSilvia Carla Strada, Jacopo Paris, Fabio Piccoli, Davide Pietro Tucci, Patrizia Casali, Sergio M. Savaresi. 852-857 [doi]
- Learning the min-max gait comfort region when wearing shoesSilvia Carla Strada, P. Corovic, C. F. O. da Silva, V. Gabbi, D. Penati, P. Casali, Sergio M. Savaresi. 858-863 [doi]
- Leveraging walking inertial pattern for terrain classificationSilvia Carla Strada, A. Ghezzi, L. Marasco, E. Paracampo, G. Rizzetto, P. Casali, Sergio M. Savaresi. 864-869 [doi]
- Grape Leaf Disease Detection and Classification Using Machine LearningZhaohua Huang, Ally Qin, Jingshu Lu, Aparna Menon, Jerry Gao. 870-877 [doi]
- Hemp Disease Detection and Classification Using Machine LearningJing Zhu, Tianhao Yu, Sen Zheng, Chenguang Niu, Jerry Gao, Jerome Tang. 878-887 [doi]
- Analysing Social Behavioural Patterns of University Students Who Partake in Sports-related Activities using Wi-Fi DataChristopher Gerard Toh Wei Hong, Seanglidet Yean, Bu-Sung Lee, Anthony Yao Wei Koh. 888-895 [doi]
- A Flexible Personalized Topic Query SchemeZhixing Lu, Zongmin Cui, Lihua Wang, Xiao Yang, Xiaolei Lv. 896-900 [doi]
- Deep Reinforcement Learning Based Reliability Pricing Strategy in Electricity Spot MarketMenjun Li, Hua Liu, Teng Luo, Yunpeng Liu, Xiang Li. 901-909 [doi]
- The Evolutionary Deep Learning Model for Electrical Load ForecastingFei Peng, Dan Li, Tianyu An, Hanjun Wang, Changyi Tian, Zhikui Chen. 910-915 [doi]
- Energy Supply Forecasting of Wind Power for Agricultural Integrated Energy SystemFei Peng, Tianyu An, Qingdong Meng, Hanjun Wang, Yong Xiang, Zhikui Chen. 916-920 [doi]
- Breast Cancer Image Classification Based on CNN ClassifierZeduo Yuan, Guoming Chen, Qiang Chen, Wanyi Li, Shun Long. 921-925 [doi]
- An Efficient Hybrid Approach for Brain Tumor Detection in MR Images using Hadoop-MapReducePrabhjot Kaur Chahal, Shreelekha Pandey. 926-931 [doi]