Abstract is missing.
- Economic Control Based on Four-Element Connection Numbers ControlYang Zhang, Zhongxiong He. 1-5 [doi]
- Design and Implementation of Simulation System for Monitoring Capital Flow Based on AgentJinmao Xu, Yaowen Xue, Huimin Gao, Pengzhu Zhang. 6-9 [doi]
- Observation Reduction for State-Action TablesWei Huang, Hong Peng. 10-14 [doi]
- Configuring Clark-Wilson Integrity Model to Enforce Flexible ProtectionQingui Xu, Guixiong Liu. 15-20 [doi]
- Exploring the Relationship Between Parental Information Literacy and Regulating Rules in Family by Data MiningYuan-Duen Lee, Wen-Chia Tsai, Sheng-Fei Hsu. 21-24 [doi]
- A New Web Service Evaluation Model with Fuzzy C-Means Artificial Immune Network Memory ClassifierLiping Chen, Weitao Ha, Guojun Zhang. 25-29 [doi]
- A Fast Multi-label Classification Algorithm Based on Double Label Support Vector MachineJiayang Li, Jianhua Xu. 30-35 [doi]
- Immune Controller Design for Vertical-Joint Industry RobotDukun Ding, Cunxi Xie, Xuanzi Hu. 36-40 [doi]
- Rank Axioms for Poset GreedoidsYaolong Li, Guojun Zhang. 41-42 [doi]
- Global Rank Axioms of Greedoids on Partially Ordered SetGuojun Zhang, Yaolong Li. 43-44 [doi]
- An IMC-PID Control Method with Set-Point WeightMing-dong Hou, Zhi-Cheng Zhao, Jing-gang Zhang, Jie Tian. 45-49 [doi]
- Reinforcement Learning for Soccer Multi-agents SystemFahimeh Farahnakian, Nasser Mozayani. 50-52 [doi]
- Study of SVM-Based Air-Cargo Demand Forecast ModelHong-jun Heng, Bing-zhong Zheng, Ya-Jing Li. 53-55 [doi]
- Heterogeneous Catalysis Modeling Strategy Integrating Support Vector Regression and Chaotic Particle Swarm Optimization AlgorithmXiaoxia Han, Gang Xie, Keming Xie, Jun Ren. 56-60 [doi]
- Support Vector Regression for Prediction of Housing ValuesYi Zhong, Chunguang Zhou, Lan Huang, Yan Wang, Bin Yang. 61-65 [doi]
- Research and Application of Animal Disease Intelligent Diagnosis Based on Support Vector MachineLong Wan, Wenxing Bao. 66-70 [doi]
- A Novel Graph-based Image Annotation with Two Level Bag GeneratorsXiaohong Hu, Xu Qian. 71-75 [doi]
- The Computer Realization of the QR Decomposition on Matrices with Full Column RankTianxiang Feng, Hongxia Liu. 76-79 [doi]
- A New Population Diversity Model in Intelligence Optimization AlgorithmsJiqiang Feng, Weixin Xie, Chen Xu. 80-83 [doi]
- An Optimization Algorithm Based on Cloud ModelYing Gao. 84-87 [doi]
- A New Hybrid Evolution Genetic Algorithm with Laplace Crossover and Power MutationXinshun Ma. 88-91 [doi]
- An Adaptive Dynamic Ant System Based on Acceleration for TSPHong-biao Mei, Jiang Wang, Zi-hui Ren. 92-96 [doi]
- Hybrid Memetic Algorithm for Uniting Classes of University Timetabling ProblemZan Wang, Jin-lan Liu. 97-101 [doi]
- The Application of Association Rules Algorithm on Web Search EngineNan Lu, Chunguang Zhou, Lai-Zhong Cui. 102-108 [doi]
- Evolutionary Algorithm for the Radio Planning and Coverage Optimization of 3G Cellular NetworksFangqing Gu, Hailin Liu, Ming Li. 109-113 [doi]
- Research on Job-Shop Scheduling Problem Based on Genetic Ant Colony AlgorithmsZhengjia Wu, Liping Zhang, Wen Wang, Kui Wang. 114-118 [doi]
- Integrating PSO and CAM Database for Selecting Cutting ToolsOrlando Duran, Luiz Airton Consalter. 119-124 [doi]
- The Application of an Improved Particle Swarm Optimization (PSO) Algorithm in Pairwise Sequence AlignmentWenjie You, Shanshan Wu, Guoli Ji. 125-128 [doi]
- Particle Swarm Optimization Algorithm with Adaptive Threshold MutationHui-rong Li, Yue-lin Gao. 129-132 [doi]
- The Harmony Search Algorithm in Combination with Particle Swarm Optimization and its Application in the Slope Stability AnalysisLiang Li, Guangming Yu, Xuesong Chu, Shibao Lu. 133-136 [doi]
- A Particle Swarm Optimization Algorithm with Ant Search for Solving Traveling Salesman ProblemYuhong Duan, Sun Ying. 137-141 [doi]
- Accuracy Analysis of a Parallel Robot with Particle Swarm OptimizationHui Zhao, Chun Feng Zhang. 142-145 [doi]
- Integration of Access Control Policy Design into Software DevelopmentJi Cheng. 146-150 [doi]
- Performance Analysis of the Artificial Physics Optimization Algorithm with Simple Neighborhood TopologiesSimin Mo, Jianchao Zeng. 155-160 [doi]
- Neural Network Algorithm for the Simultaneous Extraction of All Roots of Algebraic PolynomialYing Zhang, Zhe-zhao Zeng. 161-164 [doi]
- Early Forecast and Recognition of the Driver Emergency Braking BehaviorJinjian Xiao, Jingyu Liu. 165-168 [doi]
- One Application of CNN in Word-ProcessingXinjian Zhuo, Yongmei Su. 169-172 [doi]
- Comparison of Extreme Learning Machine with Support Vector Regression for Reservoir Permeability PredictionGuo-Jian Cheng, Lei Cai, Hua-Xian Pan. 173-176 [doi]
- A Research on the Function Relationships in the Modularization Immunity Neural Network ModelJiali Hou, Nengshan Feng. 177-181 [doi]
- Intelligent Load Balancing Strategies for Complex Distributed Simulation ApplicationsJun Wang, Jian-Wen Chen, Yongliang Wang, Di Zheng. 182-186 [doi]
- Web Service Community Discovery Based on Spectrum ClusteringXizhe Zhang, Ying Yin, Mingwei Zhang, Bin Zhang. 187-191 [doi]
- Data Encryption Based on Multi-granularity Reversible Cellular AutomataXuewen Xia, Yuanxiang Li, Zhuliang Xia, Rong Wang. 192-196 [doi]
- The Tight Error Linear Complexity of Periodic SequencesJianqin Zhou, Wei Xiong, Zemao Zhao, Lin You. 197-201 [doi]
- A DRM Authentication Scheme Based on Smart-CardYi-Chun Zhang, Lei Yang, Pin Xu, Yong-Song Zhan. 202-207 [doi]
- Provably Secure Certificateless Two-Party Authenticated Key Agreement Protocol without PairingManman Geng, Futai Zhang. 208-212 [doi]
- Research of Security Mobile Payment Protocol in Communication Restrictions ScenariosXueming Wang, Nan Cui. 213-217 [doi]
- The Security Matrix Factorization Agreement with Two PartiesXiaoyan Yang, Zhen Liu. 218-221 [doi]
- An Efficient Fast Authentication ProtocolHui Zhu, Hui Li, YuMin Wang. 222-225 [doi]
- A Hase-based SAKA Protocol AlgorithmYipin Lin, Xiaofeng Wang. 226-228 [doi]
- Relations between Annihilator Immunity of Boolean Functions and Affine SpacesHao Cao, Shimin Wei, Zepeng Zhuo. 229-232 [doi]
- Timing Evaluation of the Known Cryptographic AlgorithmsYan Wang, Ming Hu. 233-237 [doi]
- AOP-Based Attack on Obfuscated Java CodeYuan-Yuan Li. 238-241 [doi]
- Research and Application of Digital Watermark for Video Copyright ProtectionHongru Wei, Zhiyin Kou. 246-250 [doi]
- Authenticated Tree Based Group Key AgreementWeijia Jiang, Jiguo Li. 251-255 [doi]
- Identity Based Proxy Re-Signature Schemes without Random OracleXiaoming Hu, Zhe Zhang, Yinchun Yang. 256-259 [doi]
- Lattice-Based CCA-Secure Cryptosystem from IBE SystemYali Jiang, Xiuling Ju. 260-264 [doi]
- Research of a Digital Image Watermarking Algorithm Resisting Geometrical Attacks in Fourier DomainXiu-mei Wen, Wei Zhao, Fan-xing Meng. 265-268 [doi]
- Implementation and Evaluation of a Novel Audio Watermarking SchemeMingjie Chen, Kefeng Fan, Wei Mo, Subing Zhang. 269-272 [doi]
- An Adaptive Multi-objective Image Watermarking Scheme for QIM Using NSGA-IINa Wang, Xia Li, Lingjun Liu. 273-277 [doi]
- A New Password Authentication Scheme Using Fuzzy Extractor with Smart CardDexin Yang, Bo Yang. 278-282 [doi]
- Research on Role-Based Joint Authorization Administration ModelBaoheng Shan, Bin Zhang. 283-287 [doi]
- Batch Verification for Certificateless Signature SchemesManman Geng, Futai Zhang. 288-292 [doi]
- Performance of Authentication Protocols in LTE EnvironmentsLianfen Huang, Ying Huang, Zhibin Gao, Jianan Lin, Xueyuan Jiang. 293-297 [doi]
- An Extended Method for Obtaining S-Boxes Based on Discrete Chaos Map SystemGang Xu, Geng Zhao, Lequan Min. 298-302 [doi]
- The Necessary Condition of Families of Odd-Periodic Perfect Complementary Sequence PairsHui-long Jin, Guo-dong Liang, Zhi-Hua Liu, Cheng-qian Xu. 303-307 [doi]
- A Hard Disk Encryption System Realized by the Digital Signal ProcessorHuijuan Xiao, Wen Zeng. 312-314 [doi]
- A New Self-Updating Hash Chain Structure SchemeMin-Qing Zhang, Bin Dong, Xiaoyuan Yang. 315-318 [doi]
- The Collision Rate Tests of Two Known Message Digest AlgorithmsHu Ming, Wang Yan. 319-323 [doi]
- BARI: A Distributed Key Management Approach for Wireless Body Area NetworksSyed Muhammad Khaliq-ur-rehman Raazi, Heejo Lee, Sungyoung Lee, Young-Koo Lee. 324-329 [doi]
- Association Analysis and Content-Based Information Hiding Approach with High Hiding CapacityYinan Zhang, Ning Du, Miao Qi, Chengxi Wang, Jun Kong. 330-334 [doi]
- Random Walk-Based Tor Circuit Building ProtocolXin Liu, Neng Wang. 335-340 [doi]
- Digital Watermarking Based on Fast Independent Component Analysis and Discrete Wavelet TransformRen Shijie, Su Xin. 341-343 [doi]
- Computer-Vision-Based Identification of Nail s Surface ShapeJun Gao. 344-347 [doi]
- Secret Sharing System and Secret Sharing MatrixGuangliang Liu, Lingyun Li, Shengxian Xie, Junqing Li. 348-351 [doi]
- A Reputation-Based Trust Model for P2P SystemsPeng Wu, Guoxin Wu. 352-356 [doi]
- The Anti-spoofing Study of Vein Identification SystemBin Qin, Jian-fei Pan, Guang-zhong Cao, Ge-guo Du. 357-360 [doi]
- Modelling and Analysis of an SIRS Model for Worm PropagationQiming Liu, Rui Xu, Shaojie Wang. 361-365 [doi]
- Worm Detection in an IPv6 InternetYangui Xu, Xiangchun Li, Jiachun Zhou, Huanyan Qian. 366-370 [doi]
- An Integrated Approach to Worm Detection and Automatic Signature GenerationLi Yao, Yu Liu, Yuqing Zhang. 371-375 [doi]
- Research and Application of the Transparent Data Encpryption in Intranet Data Leakage PreventionXiaosong Zhang, Fei Liu, Ting Chen, Hua Li. 376-379 [doi]
- Cluster and Recommendation Based Multi-granularity Trust Model in P2P NetworkJianyong Wang, Yuling Li, Yuhua Liu, Xiu Jing. 380-384 [doi]
- A Study on the Security Technology of Enterprise Mobile Information SystemYun Deng, Xiao-hui Cheng. 385-391 [doi]
- New ID-Based and Threshold Key Distribution Protocol in MANET Using a Multi-signcryption SchemeChuanrong Zhang, Yuqing Zhang. 392-396 [doi]
- A DTN Routing Protocol Based on Hierarchy Forwarding and Cluster ControlDaowen Hua, Xuehui Du, Yanbin Qian, Shaoge Yan. 397-401 [doi]
- Network Security Protection Solutions of Electric Power Enterprise Based on VPN TechnologyEnguo Zhu, Guoliang Wu, Gongxun Yang. 402-405 [doi]
- A CPK-Based Security Scheme at Network LayerZhiyuan Xie, Junhui He, Shaohua Tang. 406-410 [doi]
- A Multi-level Trust Evaluation Model Based on D-S Theory for GridKai Wei, Shaohua Tang. 411-415 [doi]
- Anonymous Communication in Wireless Mesh NetworkRu Li, Liaojun Pang, Qingqi Pei, Guozhen Xiao. 416-420 [doi]
- SAODV: A MANET Routing Protocol that can Withstand Black Hole AttackSongbai Lu, Longxuan Li, Kwok-Yan Lam, Lingyan Jia. 421-425 [doi]
- Study on Security of Wireless Sensor Network Based on ZigBee StandardBin Yang. 426-430 [doi]
- A New Hybrid Routing Protocol in Heterogeneous Wireless NetworksYulong Shen, Qingqi Pei, Qijian Xu, Hailin Feng, Jianfeng Ma. 431-435 [doi]
- FIMFS: Failure Inferencing Based IP Multicast Fast Self-Healing ApproachXiaonan Wang, Dongniang Cheng. 436-440 [doi]
- A Routing Algorithm Based on Ant-Colony in Wireless Sensor NetworksYulong Shen, Qingqi Pei, Qijian Xu, Hailin Feng, Jianfeng Ma. 441-445 [doi]
- A Novel Trust Model Based on Temporal Historical Data for Access ControlChangzheng Xu, Yaqi Wang, Qiang Wei, QingXian Wang. 446-449 [doi]
- Full Business Model Oriented Access Control MethodJunhao Geng, Sumei Zhang. 450-454 [doi]
- Role-Based Access Control for Distributed Cooperation EnvironmentSongyun Liu, Hejiao Huang. 455-459 [doi]
- A Formal Method Based Case Study for Access ControlGuoqi Li, Yang Xiao, Minyan Lu, Yuchao Zhang. 460-463 [doi]
- Dimension Reduction in Intrusion Detection Using Manifold LearningKai-mei Zheng, Xu Qian, Pei-chong Wang. 464-468 [doi]
- A Novel Intrusion Detection Scheme for Network-Attached Storage Based on Multi-source Information FusionLi-zhong Geng, Hui-bo Jia. 469-473 [doi]
- Automatic Vulnerability Locating in Binary PatchesYang Song, Yuqing Zhang, Yingfei Sun. 474-477 [doi]
- Applying Dynamic Labels of the Biba Model in Forensic Evidence AnalysisNing Wang, Zhijun Liu, Yuping Huang. 478-482 [doi]
- Creating the Cryptograph Index by Query Frequencies in DAS ModelsDanfeng Zhao, Wei Zhao, Ying Wang, Feng Gao, Qi He, Guohua Liu. 483-487 [doi]
- Character Mapping Cipher Index Scheme for Character Data in Outsourced DatabasesNing Wang, Wei Zhao, Ying Wang, Qi He, Guohua Liu. 488-492 [doi]
- SNS Based Information Authorization Delegation Mechanism and ImplementationJinhong Cui, Xu Wang. 493-497 [doi]
- Nonlinear Regression Based Analysis on Cyanobacteria Blooms and Water Quality in a Beijing Shallow LakeLequan Min, Xiaobo Jiang, Youyan Fu, Yunhao Yi, Yan Meng, Hai Yan. 498-504 [doi]
- Providing Efficient Secure DHTs RoutingXu Xiang. 510-514 [doi]
- Fast Robust Face Detection under a Skin Color Model with Geometry ConstraintsYuanyuan Liu, Haibin Yu, Zhiwei He, Xueyi Ye. 515-519 [doi]
- Touching String Segmentation Using MRFGang Yang, Ziye Yan, Hong Zhao. 520-524 [doi]
- A Hybrid Approach of Hazard Estimation for Chemical Hazard InstallationsRong Guo, Yuhui Wang. 525-528 [doi]
- Vision-Based Human-Computer System Using Hand GesturesYun Liu, Peng Zhang. 529-532 [doi]
- Application of Communication and Remote Control in PLC Based on ZigBeePengfei Li, Jiakun Li. 533-536 [doi]
- Fault Diagnosis of the Gas Turbine Based on Multi-operating Condition Information FusionYong-bao Liu, Mi Zhou, Xing He. 537-540 [doi]
- An Application of Particle Swarm Optimization to Uncapacitated Multilevel Lot-Sizing Problems with Series StructureHan Yi, Kaku Ikou, Gengui Zhou, Jianhu Cai, Huazhen Lin. 541-544 [doi]
- Guaranteeing Maximum Reliability and Minimum Delay QoS Routing Based on WF2QZhou Jia, Guo Yun Fei. 545-549 [doi]
- Application of Fuzzy Data Fusion in Multi-sensor Environment MonitorHongge Sun, Weisheng Wang, Yi Cao, Shenxue He, Xin Yan. 550-553 [doi]
- A New Method of Generating Robot-Used MapsLan Wang, Qian Zhang. 554-557 [doi]
- The Design for Warp Knitting Machine Traversing Control System Based on DSPDe-Jun Li, Le-Ping Xu. 558-562 [doi]
- The Random Thermal Analysis with Universal Grey Number in the ElectronicsXintian Liu, Changhong Liu, Lihui Zhao, Hu Huang. 563-566 [doi]
- Research on the Energy Analysis of Lake Ecological FunctionsLi Ren, Xin-yi Xiang. 567-570 [doi]
- Research on Prediction of Traffic Flow at Non-detector Intersections Based on Ridge Trace and Fuzzy Linear Regression AnalysisYi Liu, Man Sha. 571-575 [doi]
- Research on Temporal and Spatial Data Models Based on GIS for Urban Traffic Planning Information Support SystemYunpeng Wang, Haiyang Yu, Shiwu Li, Yi Chen. 576-579 [doi]
- Some Notes on Password Authenticated Key Exchange Based on RSAShichong Tan, Hui Zhu, YuMin Wang. 580-583 [doi]
- A Hardware-Oriented Fast Encryption Keystream Generator for Digital Rights ManagementYong Zeng, Jianfeng Ma, Qinqi Pei, Lihua Dong. 584-586 [doi]
- Anti-synchronization of Two Different Hyperchaotic Systems with Fully Uncertain ParametersJian-Wen Feng, An-ding Dai, Francis R. Austin, Ling He. 587-591 [doi]
- The Application of Elementary TransformationDingxie He, Hongxia Liu. 592-597 [doi]
- Study of Spectrum Analysis Based on EMD Adaptive FilterZeng-li Liu, Shuang Xu, Hai-yan Quan, Yi-gang Guo. 598-600 [doi]
- Efficiency Measurement of Logistics Public Companies Basing on the Modified DEA ModelBolin Liu, Shaochuan Fu. 601-605 [doi]