Content 2024
Vol. 43, 2024
This volume contains 52 articles.
Content 5/2024
pp. 1029–1052, doi: 10.31577/cai_2024_5_1029
pp. 1053–1083, doi: 10.31577/cai_2024_5_1053
Secure and Efficient Blockchain Scheme for Resource Optimization in Internet of Things (IoT) Systems
pp. 1084–1110, doi: 10.31577/cai_2024_5_1084
pp. 1111–1136, doi: 10.31577/cai_2024_5_1111
pp. 1137–1160, doi: 10.31577/cai_2024_5_1137
pp. 1161–1184, doi: 10.31577/cai_2024_5_1161
pp. 1185–1218, doi: 10.31577/cai_2024_5_1185
pp. 1219–1233, doi: 10.31577/cai_2024_5_1219
Exploring the Impact of Security-Based Non-Functional Requirements on Early Software Size Estimation
pp. 1234–1255, doi: 10.31577/cai_2024_5_1234
pp. 1256–1284, doi: 10.31577/cai_2024_5_1256
Content 4/2024
pp. 777–796, doi: 10.31577/cai_2024_4_777
Data Mining Algorithm for Web Learning Resource Information Flow Loss Based on Weighted Depth Forest
pp. 797–818, doi: 10.31577/cai_2024_4_797
pp. 819–848, doi: 10.31577/cai_2024_4_819
MIDWRSeg: Acquiring Adaptive Multi-Scale Contextual Information for Road-Scene Semantic Segmentation
pp. 849–873, doi: 10.31577/cai_2024_4_849
pp. 874–899, doi: 10.31577/cai_2024_4_874
pp. 900–925, doi: 10.31577/cai_2024_4_900
pp. 926–943, doi: 10.31577/cai_2024_4_926
pp. 944–973, doi: 10.31577/cai_2024_4_944
pp. 974–992, doi: 10.31577/cai_2024_4_974
pp. 993–1011, doi: 10.31577/cai_2024_4_993
pp. 1012–1028, doi: 10.31577/cai_2024_4_1012
Content 3/2024
pp. 561–582, doi: 10.31577/cai_2024_3_561
pp. 583–610, doi: 10.31577/cai_2024_3_583
pp. 611–632, doi: 10.31577/cai_2024_3_611
pp. 633–666, doi: 10.31577/cai_2024_3_633
pp. 667–686, doi: 10.31577/cai_2024_3_667
MGRF: Multi-Graph Recommendation Framework with Heterogeneous and Homogeneous Graph Iterative Fusion
pp. 687–708, doi: 10.31577/cai_2024_3_687
pp. 709–734, doi: 10.31577/cai_2024_3_709
pp. 735–755, doi: 10.31577/cai_2024_3_735
pp. 756–776, doi: 10.31577/cai_2024_3_756
Content 2/2024
pp. 261–265, doi: 10.31577/cai_2024_2_261
pp. 266–294, doi: 10.31577/cai_2024_2_266
pp. 295–316, doi: 10.31577/cai_2024_2_295
pp. 317–342, doi: 10.31577/cai_2024_2_317
pp. 343–368, doi: 10.31577/cai_2024_2_343
pp. 369–392, doi: 10.31577/cai_2024_2_369
pp. 393–413, doi: 10.31577/cai_2024_2_393
pp. 414–437, doi: 10.31577/cai_2024_2_414
pp. 438–457, doi: 10.31577/cai_2024_2_438
pp. 458–481, doi: 10.31577/cai_2024_2_458
Radical Constraint-Based Generative Adversarial Network for Handwritten Chinese Character Generation
pp. 482–504, doi: 10.31577/cai_2024_2_482
pp. 505–528, doi: 10.31577/cai_2024_2_505
Content 1/2024
pp. 1–37, doi: 10.31577/cai_2024_1_1
pp. 38–63, doi: 10.31577/cai_2024_1_38
pp. 64–93, doi: 10.31577/cai_2024_1_64
pp. 94–125, doi: 10.31577/cai_2024_1_94
pp. 126–148, doi: 10.31577/cai_2024_1_126
pp. 149–180, doi: 10.31577/cai_2024_1_149
pp. 213–239, doi: 10.31577/cai_2024_1_213
pp. 240–260, doi: 10.31577/cai_2024_1_240