Table of Contents
Improved Generative Adversarial Network and Particle Swarm Optimization Support Vector Machine for Tennis Serving Behavior Analysis | |
Haibo Cao |
Optimizing Fuzzy Logic Control-Based Weather Forecasting through Optimal Antecedent Selection Using the Fuzzy Analytical Hierarchy Process Model | |
Alaa Sahl Gaafar, Jasim Mohammed Dahr, Alaa Khalaf Hamoud |
Dynamic Detection Method for Spatiotemporal Data Based on Hybrid Model and Singular Spectrum Analysis | |
Sheng Li, Mingguang Duan, Xiaodan Zhou |
Fusion CNN-Transformer Model for Target Counting in Complex Scenarios | |
Xingyuan He, Ruiying Wang, Ting Cao, Weiyu Liang, Yimin Fan |
Advanced Optimal Cross-Modal Fusion Mechanism for Audio-Video Based Artificial Emotion Recognition | |
Himanshu Kumar, Martin Aruldoss |
Deep Learning-Based Involution Feature Extraction for Human Posture Recognition in Martial Arts | |
Desheng Chen, Sifang Zhang |
Optimization of Elman Neural Network Using Genetic Algorithm for Construction Cost Estimation and Overspending Risk Analysis | |
Qian Wu |
Comparison of Machine Learning Algorithms for Predicting Thyroid Disorders in Diabetic Patients | |
Hiba Oudah Sayyid, Salma A. Mahmood, Saad S. Hamadi |
Motor Imagery Detection in ECG Signals Using Wavelet Packet Decomposition and Multiscale Convolutional Neural Networks | |
Khawla Hussein Ali |
Online Criminal Behavior Recognition Based on CNNH and MCNN-LSTM | |
Jingwei Hu |
Design and Implementation of an Optimized Career Planning System for College Students Using a Hybrid Dijkstra-Genetic Algorithm | |
Zhenhuan Zhou, Ruohan Chen, Li Yan, Haijian Zhong |
Congestion Control of Large-Scale Elevator Terminal Data Access in Large Metro Stations Based on The Internet of Things | |
Juanjuan Shi, Mention Jiao |
CM-OOA:An Energy-Efficient Clustering Algorithm for Wireless Sensor Networks Using Chaotic Mapping and Osprey Optimization | |
Songhao Jia, Wenqian Shao, Cai Yang, Shuya Jia, Yaohui Yuan, Huiyuan Chen, Haiyu Zhang |
An Integrated Framework for Data Security Using Advanced Machine Learning Classification and Best Practices | |
Peng Wang, Ningping Yuan, Yong Li |
Dynamic Anti-Mapping Network Security Using Hidden Markov Models and LSTM Networks Against Illegal Scanning | |
Min Guo, Dongjuan Ma, Feng Jing, Xueqin Zhang, Hengwang Liu |