JOURNAL OF COMPUTERS     Vol. 36  No. 2     May 2025

0. Contents and cover

1. A Normalized Failure Detection Model Using Deep Learning for Improving the Outcomes of Industrial Production
Changrui Hou and Xuanming Wan
full article

2. Communication Performance Analysis and Research of UAV Cooperative Non-Orthogonal Multiple Access System
Ying Lin, Kai-Qin Qin, Xing-Bo Gong, Yong-Wei Xiong, Chan-Fei Wang, and Jian-Bin Xue
full article

3. Exploring Key Determinants in the Adoption of Unmanned Retail Stores
Pin-Ju Juan
full article

4. Angular Preference Multi-Objective Optimization Algorithms with Inverse Initialization
Yi Zhong, LanLan Kang, Jiajun Li, Jianxin Li, and Junheng Wei
full article

5. The Role of Information Technology in Industry-Education Integration Policies: Evolutionary Trends and Future Prospects in China's Vocational Education
Xuan Zhu, Hui-Wen Vivian Tang, and Chih-Hsien Hsia
full article

6. A Teaching Effectiveness Evaluation Method Based on Deep Interpretable Learning
Guo-Qiang Zhuang, Fang Li, and Chao Feng
full article

7. Adaptive Spatial Cross-Stage Pooling Network based Yolov7 for Water Level Detection
Chenyang Zhang, Yuangao Ai, Sui Guo, Wentao Zhang, Changming Xu, and Houming Shen
full article

8. Academic Early Warning Model Based on Improved Global K-means Algorithm
Jun-Jie Liu, Yong Yang, and Fu-Heng Qu
full article

9. Resource Management of Connected Vehicles Based on Trust Model in Intersection Scene
Haocheng Lang, Zhenjiang Zhang, Zhaonian Li, Qingyu Zhao, and Qianli Yang
full article

10. A Simulation Method for Underground Water Flow Fields in Coal Mines Based on the Radial Basis Function Collocation Method
Bo-Chao Qu
full article

11. Collaborative Sensing Method for Intelligent Driving of New Energy Vehicles Based on Mobile Edge Computing
Xu Liu
full article

12. A GA-based Self-tuning PID Temperature Controller for Environmental Simulation Tests
Tian-Yuan Hu, Jie Guan, and Shuai Chen
full article

13. Analysis of Abnormal Intrusion Detection Methods and Protection Mechanisms for Cybersecurity in Industrial Internet of Things
Meng-Ying Yang, Xin-Hong Hu, Shao-Ting Liu, Jun-Xia Zhang, and Zhan-Feng Yang
full article

14. Design of Fault Diagnosis and Fault Prediction System for Stacker Traveling Mechanism Based on Digital Twin
Ying Liu, Hao-Sheng Lu, Feng Wang, Jing-Li Lu, Chun-Rong Ma, and Yan Lu
full article

15. Research on the Teaching Promotion Strategy of Accounting Course in Higher Vocational Colleges Based on the Analysis of Emotional Data of Course Feedback
Ya-Ling Yao, Jian-Ning Wang, Wei Gao, and Yu-Zhu Xie
full article

16. Multi Agent System Control and Scheduling Optimization Method Under Adaptive Event Triggering
Jun-Xian Han, Xiao-Yan Jiang, Long-Xue Cheng, Jian-Fang Xue, Kai-Xin Cheng, and Bo Liu
full article

17. Construction and Information Interaction Visualization of Digital City Model Based on UAV Oblique Measurement Technology
Xiao-Ying Wu, Xin-Qian Fan, Qian-Han Zhang, and Bing-Yan Wei
full article

18. Optimization Method for Urban Rail Transit Transportation Organization Mode Based on Virtual Grouping
Xiu-Juan Chang, Fei An, and Dong-Mei Guo
full article

19. Multimodal Emotion Recognition Based on Hierarchical Feature Fusion
Ying-Gang Xie, Nan-Nan Zhou, and Shi-Yin Zhu
full article

20. A Study on the?Mechanisms and Processes?of?Artificial?Intelligence's Impact on Economic Resilience
Qi Li and Lin Zou
full article

21. Lightweight YOLOv8 for Rapid Object Detection
Miao Jin, Jun Zhang, Chuning Peng, Haibin Chen, Xiwen Chen, Bing Lu, and Xu Wang
full article

22. A BPNN Model Based on Genetic Algorithms for Predicting Policyholders' Midway Surrender
Yi-Ching Hsieh, Hsiao-Hui Ho, Fang-Kun Kuo, Chao-Chun Shen, Shun-Nian Luo, and Lipeng Cheng
full article