ISSN: 2616-5775 (Print)
Research on Product Recommendation Based on Association Rules and Improved Apriori Algorithm
Jiayi wang1, Mengjia Jiang2
Abstract | References | PDF | HTML | Pub. Date: Apr 20, 2022
DOI: 10.25236/AJCIS.2022.050315 | Downloads: 38 | Views: 993
Design and Implementation of Control System for Submersible AGV
Mingli Sun1, Sen Yang1, Dongyun Wang1, Jinmao Gu2, Hu Cai2
Abstract | References | PDF | HTML | Pub. Date: Apr 20, 2022
DOI: 10.25236/AJCIS.2022.050314 | Downloads: 37 | Views: 1378
Computer Security Issues and Legal Systems Based on Cloud Computing
Rongyu Zhu, Shan Huang, Chengzhi Tan
Abstract | References | PDF | HTML | Pub. Date: Apr 20, 2022
DOI: 10.25236/AJCIS.2022.050313 | Downloads: 28 | Views: 981
Analysis of Stock Data Based on Clustering Method
Tianhao Fu1, Jixin She2, Yuhao Guo3
Abstract | References | PDF | HTML | Pub. Date: Apr 20, 2022
DOI: 10.25236/AJCIS.2022.050312 | Downloads: 46 | Views: 1182
Prediction method of financial market risk behavior based on big data mining algorithm
Haoyu Bi1, Shihao Fang2, Xinyi Bi3
Abstract | References | PDF | HTML | Pub. Date: Apr 20, 2022
DOI: 10.25236/AJCIS.2022.050311 | Downloads: 46 | Views: 1045
Performance Comparison of Irregular Face Inpainting via Deep Learning
Xinyue Zuo, You Yang, Zixian Hao
Abstract | References | PDF | HTML | Pub. Date: Apr 20, 2022
DOI: 10.25236/AJCIS.2022.050310 | Downloads: 41 | Views: 1119
Research on the training mode of informatization leadership based on Internet thinking
Zhiru Guan1,2
Abstract | References | PDF | HTML | Pub. Date: Mar 20, 2022
DOI: 10.25236/AJCIS.2022.050309 | Downloads: 43 | Views: 1137
Analysis on the Core Ideas of Computer Network Information Security Technology
Liu Fan
Abstract | References | PDF | HTML | Pub. Date: Mar 20, 2022
DOI: 10.25236/AJCIS.2022.050308 | Downloads: 38 | Views: 986
Fanzhi Meng
Abstract | References | PDF | HTML | Pub. Date: Mar 20, 2022
DOI: 10.25236/AJCIS.2022.050307 | Downloads: 34 | Views: 865
Ruiyao Yang
Abstract | References | PDF | HTML | Pub. Date: Mar 20, 2022
DOI: 10.25236/AJCIS.2022.050306 | Downloads: 39 | Views: 1183
Rong Luo1, Xianghong Ren1, Haidong Zhu2, Pengcheng Gai1, Ruihui Dong1
Abstract | References | PDF | HTML | Pub. Date: Mar 20, 2022
DOI: 10.25236/AJCIS.2022.050305 | Downloads: 33 | Views: 1047
YOLOv5-based fatigue state detection method
Hekai Zhang1, Sichao Cheng2
Abstract | References | PDF | HTML | Pub. Date: Mar 20, 2022
DOI: 10.25236/AJCIS.2022.050304 | Downloads: 63 | Views: 1237
Wei Yang
Abstract | References | PDF | HTML | Pub. Date: Mar 20, 2022
DOI: 10.25236/AJCIS.2022.050303 | Downloads: 34 | Views: 1023
New Solution of Equation of Degree n with One Unknown
Zhihu Wang1, Cuizhen Du2
Abstract | References | PDF | HTML | Pub. Date: Mar 20, 2022
DOI: 10.25236/AJCIS.2022.050302 | Downloads: 44 | Views: 1002
MOFA/D-URAM for Solving the Air and Missile Defense Problem Based on Uncertainty Theory
Guangjian Li1, Guangjun He1, Yong Zhang1
Abstract | References | PDF | HTML | Pub. Date: Mar 20, 2022
DOI: 10.25236/AJCIS.2022.050301 | Downloads: 38 | Views: 823
Research on the Application of Cloud Computing in Medical Treatment
Na Wu
Abstract | References | PDF | HTML | Pub. Date: Mar 10, 2022
DOI: 10.25236/AJCIS.2022.050215 | Downloads: 47 | Views: 966
Discussion on Blockchain System Attack and Defense Technology
Guorong Chen
Abstract | References | PDF | HTML | Pub. Date: Mar 10, 2022
DOI: 10.25236/AJCIS.2022.050214 | Downloads: 45 | Views: 1053
Wind Turbine Blade Icing Detection Based on Random Forest
Yanlong Zhao1, Liwen Wang2
Abstract | References | PDF | HTML | Pub. Date: Mar 10, 2022
DOI: 10.25236/AJCIS.2022.050213 | Downloads: 37 | Views: 1113
Research on Magic Square Construction Based on Genetic Algorithm
Xintian Cui, Xiangqi Cheng, Guoxuan Bu
Abstract | References | PDF | HTML | Pub. Date: Mar 10, 2022
DOI: 10.25236/AJCIS.2022.050212 | Downloads: 37 | Views: 1054
Meng Wang1, Xinqi Shen2
Abstract | References | PDF | HTML | Pub. Date: Mar 10, 2022
DOI: 10.25236/AJCIS.2022.050211 | Downloads: 35 | Views: 992