Abstract is missing.
- A Cloud Model Based Computational Intelligence Algorithm for Parameter Identification of Chaotic SystemsJunfeng Chen, Tiejun Wu. 1-5 [doi]
- A Genetic Algorithm Based on a New Fitness Function for Constrained Optimization ProblemDalian Liu, Jinling Du, Xiaohua Chen. 6-9 [doi]
- A Genetic Algorithm Based on Duality for Linear Bilevel Programming ProblemsHecheng Li. 10-14 [doi]
- A Heuristic Genetic Process Mining AlgorithmJiafei Li, Jihong OuYang, Jiafei Li, Jihong OuYang, Mingyong Feng. 15-19 [doi]
- A Hybrid Method for Solving Global Optimization ProblemsJinhua Li, Jie Liu. 20-23 [doi]
- A Hybrid Multiobjective Differential Evolution Algorithm Based on Improved έ-DominanceNing Dong, Yuping Wang. 24-28 [doi]
- A Hybrid Simplex Multi-objective Evolutionary Algorithm Based on Preference Order RankingXiaofang Guo. 29-33 [doi]
- A Line-up Competition Differential Evolution Algorithm for the Generalized Assignment ProblemLixiao Ma, Zhanfang Zhao, Shu-Qing Chen. 34-37 [doi]
- A new filled function algorithm for constrained global optimization problemsLiu Jie. 38-41 [doi]
- A New Improved Particle Swarm Optimization AlgorithmYuhong Duan, Yuelin Gao. 42-46 [doi]
- Application of the PSO-SVM Model for Credit ScoringYun Ling, Qiu-yan Cao, Hua Zhang. 47-51 [doi]
- Approximate Solution of Fuzzy Sylvester Matrix EquationsXiao-Bin Guo. 52-56 [doi]
- Energy-efficient Multi-task Scheduling Based on MapReduce for Cloud ComputingXiaoli Wang, Yuping Wang. 57-62 [doi]
- Exploring Centrality-Lethality Rule from Evolution Constraint on Essential Hub and Nonessential Hub in Yeast Protein-Protein Interaction NetworkYun-yuan Dong, Yang Jun, Qi-jun Liu, Yong-Xian Wang, Zheng-Hua Wang. 63-65 [doi]
- Glowworm swarm optimization algorithm for solving multi-constrained QoS multicast routing problemDeng-Xu He, Hua-Zheng Zhu, Gui-Qing Liu. 66-70 [doi]
- Hybrid Genetic Algorithm for TSPLai Nian, Jinhua Zheng. 71-75 [doi]
- Improved BFO with Adaptive Chemotaxis Step for Global OptimizationBen Niu, Hong Wang, Lijing Tan, Li Li 0004. 76-80 [doi]
- Improved differential evolution algorithm with adaptive mutation and control parametersHui-rong Li, Yue-lin Gao, Li Chao, Peng-Jun Zhao. 81-85 [doi]
- Improvement of the MapReduce Model Based on Message Middleware Oriented Data Intensive ComputingJunwei Ge, Xian Jiang, Yiqiu Fang. 86-89 [doi]
- Inertia Weight Particle Swarm Optimization with Boltzmann ExplorationFeng Chen, Xinxin Sun, Dali Wei. 90-95 [doi]
- MOEA/D with Uniform Design for the Multiobjective 0/1 Knapsack ProblemYan-Yan Tan, Yong-Chang Jiao, Xin-Kuan Wang. 96-100 [doi]
- Monitoring the PSO Process Based on Fuzzy Random VariablesJ. Q. Feng, C. Xu, W. X. Xie. 101-105 [doi]
- Multi-objective Optimization of Bus Dispatching Based on Improved Genetic AlgorithmJinling Du, Chunxiao Wang, Feng Zhang. 106-109 [doi]
- New Heuristic Algorithm of RNA Secondary Structure Prediction with PseudoknotsZhendong Liu, Zhijun Zhang, Zaixue Liu, Daming Zhu. 110-114 [doi]
- Optimality Conditions for Fractional Programming with B (p, r, a) Invex FunctionsXiang You Li, Qing Xiang Zhang. 115-118 [doi]
- Phylogenetic Tree of DNA Sequences Constructed by a New Method-H CurveShulei Wu, Huandong Chen, Dachao Li. 119-122 [doi]
- PSO-BP Neural Network in Reservoir Parameter Dynamic PredictionLiumei Zhang, Jianfeng Ma, Yichuan Wang, ShaoWei Pan. 123-126 [doi]
- Research of Blocking Factor Combined with Improved Ant Colony Algorithm in VRPZhenqiu Liang. 127-130 [doi]
- Research on Nonlinear Predictive Control Rolling Optimization Strategy Based on SAPSOBi-Ying Zhou. 131-134 [doi]
- Researching on the Growth Operator SWFZIRS of Growth Evolution AlgorithmsShengjie Sun, Sheng Zhong, Baihai Zhang. 135-138 [doi]
- Resource Optimization for Uncertain Traffic Demand in Multi-radio Multi-channel Wireless NetworksKai Peng, Jing Xu, Wei Liu, Xiaohui Chen, Jian Wu. 139-143 [doi]
- Sufficient Optimality Conditions and Duality for a Minmax Fractional ProblemJihong Jia. 144-148 [doi]
- The 0/1 Multi-objective Knapsack Problem Based on Regional SearchWeiqi Chen, Zhifeng Hao, Hailin Liu. 149-153 [doi]
- The Overview of Feature Selection Algorithms Based Swarm Intelligence and Rough SetChengmin Sun, Dayou Liu. 154-158 [doi]
- Uniform Design Based Hybrid Genetic Algorithm for Multiobjective Bilevel Convex ProgrammingLiping Jia, Yuping Wang, Lei Fan. 159-163 [doi]
- 3G-based Remote Video Surveillance and Control System for Facility AgricultureFengdan Lao, Guanghui Teng. 164-167 [doi]
- A Cloud Model Approach to the Modification of the Exponential Function Model for Software ReliabilityZiqiang Luo, Peng Cao, Shengquan Ma, Lihua Wu. 168-170 [doi]
- A Comparative Study on Appending Priority Relations of Rules in BDI-Based Agent ModelYou Li, Yuming Lin, Lingzhong Zhao. 171-175 [doi]
- A fuzzy portfolio model considering transaction costsJianhui Yang, Yuan Wang. 176-179 [doi]
- A Human-Computer Interaction Method with Multi-Dimensional Information in the Teleoperation Augmented Reality SystemXin Gao, QingXuan Jia, Huan Hu, Hanxu Sun, Jingzhou Song. 180-184 [doi]
- A Model Driven Approach for Self-Healing Computing SystemWei Lu, Yian Zhu, Chunyan Ma, Longmei Zhang. 185-189 [doi]
- A Model of Emotional Agent Based on Granular ComputingJun Hu, Chun Guan. 190-194 [doi]
- A Modification to the Jelinski-Moranda Software Reliability Growth Model Based on Cloud Model TheoryZiqiang Luo, Peng Cao, Guochun Tang, Lihua Wu. 195-198 [doi]
- A Practical Framework for Agent-Based Hybrid Intelligent SystemsChunsheng Li, Kan Li. 199-203 [doi]
- A QoS-based Self-adaptive Framework for OpenAPILingyan Sun, Shizhan Chen, Qixuan Liang, Zhiyong Feng. 204-208 [doi]
- Action-Seeking Team Coordination for Unmanned Vehicles Team PlanningJiang-feng Luo, Luohao Tang, Cheng Zhu, Wei Ming Zhang. 209-213 [doi]
- Adaptive Evaluation Model of Information System by Triangular Fuzzy NumberLiping Chen. 214-218 [doi]
- Algorithm of Distribution Estimation for Node Localization in Wireless Sensor NetworkFu Cequn, Wu Shulei, Zhong Sheng. 219-221 [doi]
- An Important Property about Vertex Distance of Crossed Cubes CQnXirong Xu, Aihua Deng, Wenhua Zhai. 222-225 [doi]
- An Improvement of Comprehensive Evaluation ModelWenyi Zeng, Shuang Feng. 226-230 [doi]
- An Intelligent Vehicle Monitoring System Based on Internet of ThingsLingling Hu, Haifeng Li, Xu Xu, Jian Li. 231-233 [doi]
- An Optimal Architecture of Middle Agents in Multi-Agent SystemsXiao-Ya Li, Song-sen Yu. 234-238 [doi]
- Belief Base Change on Implicant Sets: How to Give Up Elements of a Belief Based on Literal LevelCamilla Schwind. 239-243 [doi]
- Communities Detection with Applications to Real-World Networks AnalysisBo Yang. 244-248 [doi]
- Cooperative Neural Network Background Model for Multi-Modal Video SurveillanceZhiming Wang, Hong Bao. 249-254 [doi]
- Design of Intelligent Decision-making System in Multi-UUV Formation Control SimulationHong Han, Fengju Kang, Shengjie Wang. 255-257 [doi]
- Discretization Based on Positive Domain and Information EntropyJuan Zhao, Mingchun Wang, Kun Liu, Can Wang. 258-262 [doi]
- Exponentially Synchronization of Stochastic Complex Networks with Time-varying Delays and Switching Topology via Pinning ControlJingyi Wang, Jianwen Feng, Yi Zhao. 263-267 [doi]
- FBctlr - A Novel Approach for Storage Performance VirtualizationLiu Liu, Zhenhan Liu, Lu Xu, Junwei Zhang. 268-272 [doi]
- Global Prefetcher Aggressiveness Control for Chip-MultiprocessorLimin Han, Deyuan Gao, Xiaoya Fan, Liwen Shi, Jianfeng An. 273-277 [doi]
- Iterative Learning Control of Double Servo Valve Controlled Electro Hydraulic Servo SystemShaojuan Yu, Junjun Song. 278-282 [doi]
- Lifeline: Emergency Ad Hoc NetworkSe-Hang Cheong, Kai-Ip Lee, Yain-Whar Si, Leong Hou U. 283-289 [doi]
- Marshmallow: A Content-Based Publish-Subscribe System over Structured P2P NetworksSheng Gao, Guohui Li, Pei Zhao. 290-294 [doi]
- Multi-Agents Model Analysis for the Evolution of Industrial ClustersYajuan Yang, Lian Ren. 295-299 [doi]
- On Cluster Synchronization for Linearly Coupled Complex NetworksYi Zhao, Jianwen Feng, Jingyi Wang. 300-304 [doi]
- Optimization of Vehicle Routing Problem Based on Max-Min Ant System with Parameter AdaptationXia Liu, Chao Yang, Xia Liu. 305-307 [doi]
- Qualitative Modeling for Parallel Software System Reliability EvaluationZiqiang Luo, Peng Cao, Shengquan Ma, Lihua Wu. 308-311 [doi]
- Real-time LOD Algorithm Based on Triangle Collapse OptimizationJun Chen, Xiong Shi. 312-315 [doi]
- Research of Rapid Attention-Information Extraction in Human-Robot InteractionFei Gong, Lun Xie, Nan Li, Zhi Liang Wang. 316-320 [doi]
- Robust Stability for Uncertain Neutral Systems with Time-varying and Distributed DelaysYuan-xin Liang. 321-324 [doi]
- Simulation of Influence of Desired Velocity Distribution and Herd Effect on Pedestrian EvacuationYanfei Yu, Yonglin Min. 325-328 [doi]
- Software Fault Prediction Framework Based on aiNet AlgorithmQian Yin, Ruiyi Luo, Ping Guo. 329-333 [doi]
- Study on Friction Coefficient Mechanism Model of Tandem Cold Mill in Unstable ConditionHao Peifeng. 334-337 [doi]
- The Design of Fuzzy Classifier Based on Sugeno Type Fuzzy Complex-Value IntegralSheng-quan Ma, Fu-chuan Chen, Qiang Wang, Zhi-qing Zhao. 338-342 [doi]
- Voice-based Local Search Using a Language Model Look-ahead Structure for Efficient PruningYao Lu, Gang Liu, Wei Chen 0004, Jesper Ø. Olsen. 343-347 [doi]
- Weak-pseudo-R0 AlgebrasYong Lin Liu, Xiao-bo Cai. 348-352 [doi]
- A Neural Network for a Class of Horizontal Linear Complementary ProblemsXingbao Gao, Jing Wang. 353-357 [doi]
- Adaptive Neural Control for a Class of Perturbed Time-delay Nonlinear SystemsRuliang Wang, Jie Li. 358-361 [doi]
- Application of Evolutionary Neural Networks for Well-logging Recognition in Petroleum ReservoirKai Zhu, Huaguang Song, Jinzhu Gao, Guojian Cheng. 362-366 [doi]
- Artificial Neural System Method for Solving Nonlinear Programming with Linear Equality ConstraintsQuan-ju Zhang. 367-370 [doi]
- Existence and Global Attractivity of Almost Periodic Solution of Hopfield Neural Networks with Time DelaysYanshuang Meng. 371-374 [doi]
- Global Synchronization of Hybrid Coupled Neural Networks with Time-varying DelayXuefei Wu, Chen Xu. 375-380 [doi]
- Minimal Echo State Networks for VisualisationTzai-Der Wang, Xiaochuan Wu, Colin Fyfe. 381-385 [doi]
- Predictions for Coal Spontaneous Combustion Stage Based on an Artificial Neural NetworkGaochang Zhao. 386-389 [doi]
- Search Engine Optimization Based on Algorithm of BP Neural NetworksShuo Wang, Kaiying Xu, Yong Zhang, Fei Li. 390-394 [doi]
- Spares Consumption Prediction Based on BP Neural NetworkFeng Guo, Chen-yu Liu, Su-qin Zhang, Bin Zhou. 395-397 [doi]
- Spares Consumption Quota Model Based on BP Neural NetworkChen-yu Liu, Feng Guo, Yuan-lei Li, Su-qin Zhang. 398-400 [doi]
- Spatial Prediction of Dissolved Organic Carbon Using GIS and ANN Modeling in River NetworksYingchun Fu, Xiantie Zeng, Xueyu Lu. 401-406 [doi]
- Stability Analysis of Neutral-type Fuzzy Neural Networks with Distributed DelaysShujun Long, Liping Jia. 407-411 [doi]
- The Application of Neural Network in the Intelligent Fault Diagnosis SystemMing Chang, Hongwei Chen, Yingying Wang, Yueou Ren, Hao Kang. 412-415 [doi]
- A Maximal Clique Partition Method for Network Based on GranularityYanping Zhang, Xiaoyan Chen, Bo Hua, Yuan Zhang. 416-420 [doi]
- A Spam Filtering Method Based on Multi-modal Features FusionHuamin Feng, Xinghua Yang, Biao Liu, Chao Jiang. 421-426 [doi]
- A Topic Partition Algorithm Based on Average Sentence Similarity for Interactive TextHaiping Zhu, Yan Chen, Yang Yang, Chao Gao. 427-430 [doi]
- An Embedded Software Fusion Power Model Based on Algorithm and Micro-architectural LevelBing Guo, Yan Shen, Xiao Bin Liu, Qi Li, Jihe Wang, Yuan Sheng Wu. 431-435 [doi]
- An Error Bound for Eigenvalues of Graph Laplacian with Bounded Kernel FunctionYong Liu, Shizhong Liao. 436-440 [doi]
- An Improved Software Reliability Model Considering Fault Correction RateZhao Liu, Rui Zhang, Denghua Mei, Xi Zheng. 441-444 [doi]
- Class-Incremental Kernel Discriminative Common VectorsYunhui He. 445-449 [doi]
- Dynamic Fuzzy Semisupervised Multitask LearningMeiyin Dai, Fanzhang Li. 450-454 [doi]
- Feature selection algorithm based on the Community discoveryXiaoqiang Jia. 455-458 [doi]
- Improved Word Similarity Computation for Chinese Using Sub-word InformationPeng Jin, John A. Carroll, Yunfang Wu, Diana McCarthy. 459-462 [doi]
- Multi-Side Multi-Instance AlgorithmShu Zhao, Chao Xu, Yanping Zhang, Jun Ma. 463-467 [doi]
- Probabilistic Trajectory Modeling of Flight Vehicles Based on Parameter DeviationsChangqing Liu, Wencai Luo. 468-471 [doi]
- Reinforcement Learning for the N-Persons Iterated Prisoners' DilemmaJuan Enrique Agudo, Colin Fyfe. 472-476 [doi]
- Relative Local Mean Classifier with Optimized Decision RuleGuihua Wen, Lijun Jiang. 477-481 [doi]
- Research on the Maximum Flow in Large-scale NetworkYanping Zhang, Bo Hua, Juan Jiang, Yuan Zhang, Xiaoyan Chen. 482-486 [doi]
- The Application of Graph Theory in Old Chinese Phonology StudyJiajia Hu, Ning Wang. 487-491 [doi]
- The Estimation Algorithm of Laplacian Eigenvalues for the Tangent BundleMengxuan Dong, Fanzhang Li. 492-496 [doi]
- Time Series Forecasting Method Based on Huang Transform and BP Neural NetworkW. Q. Zhang, C. Xu. 497-502 [doi]
- A Digital Watermarking Algorithm Based on Wavelet Packet Transform and BP Neural NetworkQiao Baoming, Zhang Pulin, Kang Qiao. 503-506 [doi]
- A Markov Chain-based Availability Model of Virtual Cluster NodesJianhua Che, Tao Zhang, Weimin Lin, Houwei Xi. 507-511 [doi]
- A New Scheme for Information Hiding Based on Digital ImagesYanping Zhang, Juan Jiang, Chao Xu, Bo Hua, Xiaoyan Chen. 512-516 [doi]
- A security testing approach for WSN protocols based on object-oriented attack modelYue Qi, Qingqi Pei, Yong Zeng, Chao Yang, Shu-po Bu. 517-520 [doi]
- A Study on IT-security Vocabulary for Domain Document ClassificationLiping Qian, Lidong Wang. 521-525 [doi]
- Achieving Distributed System Information SecuritySalvatore Distefano, Antonio Puliafito. 526-530 [doi]
- An Adaptive Connectivity Data Dissemination Scheme in Vehicular Ad-hoc NetworksKe Wang, Weidong Yang, Ji-Zhao Liu, Dan-tuo Zhang. 531-535 [doi]
- Architecture for Component Library Retrieval on the CloudJunwei Ge, Cong Tao, Yiqiu Fang. 536-539 [doi]
- Construction of Overflow Attacks Based on Attack Element and Attack TemplateNing Zhu, Xingyuan Chen, Yongfu Zhang. 540-544 [doi]
- Distributed Storage Schemes for Controlling Data Availability in Wireless Sensor NetworksYulong Shen, Ning Xi, Qingqi Pei, Jianfeng Ma, Qijian Xu, Zuoshun Wu. 545-549 [doi]
- Fingerprint Composition-Feature Extraction Using Directional Filter BanksChao Rong Li, Ming Qing Huang, Jianping Li. 550-554 [doi]
- Image Scrambling Based on Chaos Theory and Vigenère CipherShanshan Li, Yinghai Zhao. 555-558 [doi]
- Improving Privacy of Property-based Attestation without a Trusted Third PartyXing-lan Zhang, Wei-wei Liu. 559-563 [doi]
- Information Hiding Algorithm Based on Stentiford Visual Attention ModelJie Ling, Ju Liu, Jiande Sun, Jianping Qiao, Feng Wang, Feng Feng. 564-567 [doi]
- Model Composition and Generating Tests for Web ApplicationsBo Song, Shengwen Gong, Shengbo Chen. 568-572 [doi]
- Modeling and Simulating the Propagation of Unstructured Peer-to-Peer WormsXiang Fan, William W. Guo, Mark Looi. 573-577 [doi]
- Optimizing for ArtiFlow and Transform ArtiFlow to ServiceFlowQi He, Huifang Li. 578-582 [doi]
- Orthogonal Test Algorithm on TD-SCDMA Network OptimizationHua Huang, Yuan Ding. 583-587 [doi]
- Privacy Preserving Naïve Bayesian Classifier Based on Transition Probability MatrixXing Yang, Yubao Liu, Zhan Li, Jiajie Mo. 588-592 [doi]
- Researches and Simulations of Information Hiding in Alamouti Transmission SystemLiquan Chen, Miao Lu, Jingbo Chen. 593-597 [doi]
- Testing Anti-denial of Service Attacks Based on Mobile AgentHuimei Wang, Ming-xian, Guoyu Wang. 598-602 [doi]
- The AES Encryption and Decryption Realization Based on FPGALuan Lan. 603-607 [doi]
- The Implementation of Trust Model in the P2P Patch Distribution SystemJihai Huang, Yu Su, Min Cao. 608-611 [doi]
- A Blakley Secret Sharing Scheme without Trusted Share Distributed CenterYisheng Xue, Shulei Wu, Huandong Chen. 612-614 [doi]
- A Rational Secret Sharing Scheme Based on Repeated GameJie Wang, Yongquan Cai. 615-619 [doi]
- A Security Model for Information Systems with Multi-level SecurityChao-Qin Gao, Chuang-Bai Xiao. 620-624 [doi]
- A Trivariate Polynomial-based Dynamic Key Management Scheme for Wireless Sensor NetworksJianting Ning, Xinchun Yin, Ting Yang. 625-629 [doi]
- A Trust-based Dynamic Secure Service Discovery Model for Pervasive ComputingFang Shen, Qingqi Pei, Shu-po Bu. 630-634 [doi]
- AHP-GRAP Based Security Evaluation Method for MILS System within CC FrameworkYameng Cheng, Yulong Shen, Jianfeng Ma, Xining Cui, YaHui Li. 635-639 [doi]
- Analysis and Measurement on the Electromagnetic Compromising Emanations of Computer KeyboardsLitao Wang, Bin Yu. 640-643 [doi]
- Analysis of the Success Rate of the LLL Lattice Basis ReductionHaibo Wu, Shenghui Su. 644-647 [doi]
- Analysis of Wireless Mesh Network Security Based on Node FunctionShuxin Liu, Jianhua Peng, Caixia Liu. 648-652 [doi]
- Design and Implementation of an Electromagnetic Analysis System for Smart CardsKun Gu, Liji Wu, Xiangyu Li, Xiangxin Zhang. 653-656 [doi]
- Modeling the Uncertain Data in the K-anonymity Privacy Protection ModelJiawei Wu, Guohua Liu. 657-661 [doi]
- On the Representation and Querying of Sets of Possible Worlds in the K-anonymity Privacy Protecting ModelJieYuan Li, Guohua Liu. 662-664 [doi]
- Security Analysis of Some Recent Authentication Protocols for RFIDBen Niu, Hui Li, Xiaoyan Zhu, Chao Lv. 665-669 [doi]
- A Bilinear Pairing-Based Key Management Scheme for Wireless Sensor NetworksRongrong Jiang, Tieming Chen. 670-673 [doi]
- A Configurable IPSec Processor for High Performance In-Line Security Network ProcessorYun Niu, Liji Wu, Li Wang, Xiangmin Zhang, Jun Xu. 674-678 [doi]
- A Fast Handoff Method Based on RSSI and LQI in Wireless Sensor NetworkMiao Zhang, Jingying Li. 679-684 [doi]
- A Survey on Methods of Automatic Protocol Reverse EngineeringXiangdong Li, Li Chen. 685-689 [doi]
- A Sybil-resilient Contribution Transaction ProtocolXu Xiang. 690-692 [doi]
- An Automated Black-box Testing Approach for WSN Security ProtocolsShirui Ji, Qingqi Pei, Yong Zeng, Chao Yang, Shu-po Bu. 693-697 [doi]
- An Efficient Closed-form Solution of Synchronization and Channel Estimation in UWBJiongCheng Li, Henghui Xiao, Xibin Lin, YanBo Zhao. 698-702 [doi]
- An Identity-based Secure Routing Protocol in WSNsWeichang Li, Hongning Li, Min Xie 0003, Shupo Bu. 703-706 [doi]
- An Interactive Charge Scheme with Reward and Non-repudiationChunling Wang, Fei Yang. 707-711 [doi]
- Analysis of Abnormal Events in IMS and Research on the Strategy of DetectionXiaolong Xie, Xinsheng Ji, Caixia Liu. 712-716 [doi]
- Design of the DS-UWB Communication System Based on Chaotic Variable Spreading FactorDong Li, Jiang Fei Bo. 717-720 [doi]
- Energy-efficient MAC Protocol Designed for Wireless Sensor Network for IoTJun Hu, Zeng Ma, Chunsheng Sun. 721-725 [doi]
- Joint Synchronization and Channel Estimation Algorithm of FH-OFDM Systems in Aviation Mobile CommunicationsYong-mao Cheng, Wang-da Chen, Hui Qu, Tian-yi Cai. 726-730 [doi]
- Key Management Protocol Based on Finely Granular Multi-level Security Method in Wireless NetworksYa-hui Li, Wen Sheng Niu, Ya Di Zhang, Jian-Feng Ma, Yu Long Shen. 731-735 [doi]
- Multi-jammer Localization in Wireless Sensor NetworksTianzhen Cheng, Ping Li, Sencun Zhu. 736-740 [doi]
- Query-Aware Anonymization in Location-Based ServiceWei Li 0041, Guangye Li, Chunlei Liu. 741-745 [doi]
- Recovering Coverage Holes by Using Mobile Sensors in Wireless Sensor NetworksFei Li, Shuming Xiong, Liangmin Wang. 746-749 [doi]
- Reliability Analysis of System-in-the-Loop Network Platform Based on DelaysYafen Shen, Jiaxi Chen, Jing Yuan, Ning Huang. 750-753 [doi]
- Secure Data Aggregation Scheme for Clustered Wireless Sensor NetworksJiang Hong Guo, Jian-Feng Ma, Xiu Qiang Wu. 754-758 [doi]
- Stochastic Modeling File Population in P2P NetworkFang Qun, Wu Xu, Xu Yong. 759-763 [doi]
- The Design of Cooperative Intrusion Detection SystemGuojun Zhang, Liping Chen, Weitao Ha. 764-766 [doi]
- The Reliable Transmission Research of the Random Data in WSN Earthen Sites Health MonitoringHao Chen, Dingyi Fang, XiaoJiang Chen, Feng Chen, Xiaoqing Gong, Lang Qin. 767-770 [doi]
- A Design and Implement of IPS Based on SnortJianrong Xi. 771-773 [doi]
- A Novel Hash-based RFID Mutual Authentication ProtocolHuixian Li, Ping Yin, Xuan Wang, Liaojun Pang. 774-778 [doi]
- An Application of Justification Logic to Protocol VerificationThomas Studer. 779-783 [doi]
- An Image Encryption and Authentication SchemeJing Qiu, Ping Wang. 784-787 [doi]
- Analysis of the Authentication Protocols Based on Game TheoryXinghua Li, Lingjuan Deng, Yuan Zhang, Dan Yang, Jianfeng Ma. 788-792 [doi]
- Design of a Digital Forensics Evidence Reconstruction System for Complex and Obscure Fragmented File CarvingVrizlynn L. L. Thing, Tong-Wei Chua, Ming-Lee Cheong. 793-797 [doi]
- Evaluating the Effect of Loading Forensic Tools on the Volatile Memory for Digital EvidencesZhen Su, Lian-Hai Wang. 798-802 [doi]
- Hierarchical ID-Based Blind Signature from LatticesLiang Chen, Yongquan Cui, Xueming Tang, Dongping Hu, Xin Wan. 803-807 [doi]
- Identity-based SIP Authentication and Key AgreementWu Shao Bo, Li Cheng-shu. 808-811 [doi]
- Obtaining the Resonant Frequency of the Bubble in the Ship Wake by ANSYSZhang Qun, Yingmin Wang. 812-816 [doi]
- Security Authentication Scheme Based on Certificateless Signature and Fingerprint RecognitionYanqiong Zhu, Hui Xu, Zhan Gao. 817-820 [doi]
- Security Problems and Countermeasures with Commercial Banking Computer NetworksYunCheng Liu, Xingchun Sun, Xiaoqin Mao. 821-825 [doi]
- Synthesis Algorithm of Homologous Detection Based on Analytic Hierarchy ProcessBaojiang Cui, Ce Bian, Tao Guo, Yongle Hao, Jianxin Wang. 826-830 [doi]
- Systematical Vulnerability Detection in Browser Validation MechanismChufeng Zeng, QingXian Wang. 831-836 [doi]
- The Analysis of Influence Factors of the Confidence Level on University Students' Network ShoppingJunfeng He, Hui Sun. 837-841 [doi]
- Traitor Tracing and Revocation Mechanisms with Privacy-PreservingYi Ding, Lei Fan. 842-846 [doi]
- 2-out-of-2 Rational Secret Sharing in Extensive FormYilei Wang, Qiuliang Xu. 847-851 [doi]
- A Construction of Balanced Odd-variable Boolean Function with Optimum Algebraic ImmunityYindong Chen. 852-855 [doi]
- A New Cross-realm Group Password-based Authenticated Key Exchange ProtocolQing Dai, Xiufeng Zhao, Qiuliang Xu, Han Jiang. 856-860 [doi]
- A Novel Group Signature Scheme Based on NTRUJunping Yao, Zefeng Dong, Xinshe Li. 861-864 [doi]
- A Protocol of Privacy-Preserving Closest Pair in Two Dimensional SpaceYonglong Luo, Chao Cheng, Cai-xia Chen, Hong Zhong. 865-869 [doi]
- A Watermarking-based Visual Cryptography Scheme with Meaningful SharesYan-yan Han, Xiao-ni Cheng, Wen-cai He. 870-873 [doi]
- Accelerating Block Cryptography Algorithms in Procedure Level SpeculationYaobin Wang, Hong An, Zhiqin Liu, Kang Xu, Wanli Dong. 874-877 [doi]
- An ID-based (k, t, n) Threshold Group Signature SchemeWei Fu, Guang-liang Liu. 878-881 [doi]
- An Image Encryption Algorithm Based on Scrambling and Substitution Using Hybrid Chaotic SystemsFei Xiang, Xiao-cong Guo. 882-885 [doi]
- An Improved Signcryption with Proxy Re-encryption and its ApplicationCaifen Wang, Xiaojun Cao. 886-890 [doi]
- An Improvement and a New Design of Algorithms for Seeking the Inverse of an NTRU PolynomialNa Zhao, Shenghui Su. 891-895 [doi]
- Attack on the Cryptosystem Based on DLPXiaobo Feng, Mingqiang Wang. 896-899 [doi]
- Attribute-Based Authenticated Key Exchange Protocol with General RelationsHao Wang, Qiuliang Xu, Han Jiang, Rui Li. 900-904 [doi]
- Attribute-based Signcryption with Ciphertext-policy and Claim-predicate MechanismChangji Wang, Jiasen Huang. 905-909 [doi]
- Certificateless Broadcast Signcryption with Forward SecrecyMing Luo, Chun-hua Zou, Jianfeng Xu. 910-914 [doi]
- Co-Z Addition Operation of Hessian CurveLeibo Li, Tao Zhan. 915-919 [doi]
- Concurrent Non-malleable Statistically Hiding CommitmentRui Li, Qiuliang Xu, Hao Wang. 920-924 [doi]
- Cryptoanalysis and Improvement of Verifier-based Key Agreement Protocol in Cross-Realm SettingJing-Feng Li, Wei-feng Guo, Lai-shun Zhang, Yun-peng Li. 925-929 [doi]
- Differential Energy Watermarking Based on Macro-block PredictionQian Zeng, Guorui Feng. 930-933 [doi]
- Efficient Password-Based Authenticated Key Exchange from LatticesYi Ding, Lei Fan. 934-938 [doi]
- Elliptic Curve Isogenies to Resist Differential Side-Channel Analysis AttacksKeke Wu, Huiyun Li, XuCheng Yin, Guoqing Xu. 939-943 [doi]
- Hierarchical Identity-based Broadcast Encryption Scheme on LatticesJinman Zhang, Qin Chen. 944-948 [doi]
- K-times Proxy Re-encryptionXu an Wang, Ziqing Wang, Yi Ding, Shujun Bai. 949-953 [doi]
- Multi-Undeniable Signature SchemesXunxun Shen, MaoZhi Xu, Yanhui Zhao. 954-958 [doi]
- Novel Quantization Watermarking Based on Random Angle ModulationXinshan Zhu, Shuoling Peng. 959-963 [doi]
- Optimized Approach for Computing Multi-base ChainsXinchun Yin, Ting Yang, Jianting Ning. 964-968 [doi]
- Proxy Re-encryption with Keyword Search from Anonymous Conditional Proxy Re-encryptionWeidong Zhong, Xu an Wang, Ziqing Wang, Yi Ding. 969-973 [doi]
- VVCS: Verifiable Visual Cryptography SchemeYanyan Han, Xiaoni Cheng, Dong Yao, Wencai He. 974-977 [doi]
- A Generic Scheme for the Construction of Contextual Signatures with Hash Function in Intrusion DetectionYuxin Meng, Lam-for Kwok. 978-982 [doi]
- A New Approach for Adaptive Intrusion DetectionHassina Bensefia, Nacira Ghoualmi. 983-987 [doi]
- A Security API for Multimodal Multi-biometric Continuous AuthenticationAdriana Esmeraldo de Oliveira, Gustavo Henrique Matos Bezerra Motta. 988-992 [doi]
- A Wavelet-Based Detection Approach to Traffic AnomaliesDingde Jiang, Peng Zhang, Zhengzheng Xu, Cheng Yao, Wenda Qin. 993-997 [doi]
- An Access Control Mode Based on Information Flow GraphWang Chao, Chen Xing Yuan, Li Na. 998-1000 [doi]
- An Enhanced Role-Based Access Control Mechanism for Hospital Information SystemsChen-Guang He, Cun-Zhang Cao, Shu-Di Bao. 1001-1005 [doi]
- Fast Network Traffic Anomaly Detection Based on IterationHua Jiang, Liaojun Pang. 1006-1010 [doi]
- Kernel-based Behavior Analysis for Android Malware DetectionTakamasa Isohara, Keisuke Takemori, Ayumu Kubota. 1011-1015 [doi]
- Methodology for Behavioral-based Malware Analysis and Detection Using Random Projections and K-Nearest Neighbors ClassifiersJozsef Hegedus, Yoan Miche, Alexander Ilin, Amaury Lendasse. 1016-1023 [doi]
- Performance Analysis of the Single Pattern Matching Algorithm Based on Prefix SearchingXi-hong Wu. 1024-1027 [doi]
- Property-Based Remote Attestation Oriented to Cloud ComputingSiyuan Xin, Yong Zhao, Yu Li. 1028-1032 [doi]
- Research and Implementation of DPA-resistant SMS4 Block CipherXiaoyi Duan, Ronglei Hu, Xiu Ying Li. 1033-1036 [doi]
- Research of Access Control in Electronic Medical Record Based on UCONJianGuo Ju, Weihe Chen, Yongzhao Zhan. 1037-1040 [doi]
- Research on Access Control Mechanism for Digital Products TradingFengHua Li, Yinyan Xu, Dongdong Li, Jinghui Zhang. 1041-1045 [doi]
- Study on Role-Based Access Control with Time ConstraintZhenghong Liu, Yuhong Jia, Tieli Sun. 1046-1048 [doi]
- Using a Dynamic K-means Algorithm to Detect Anomaly ActivitiesLi Han. 1049-1052 [doi]
- A New Algorithm for Auto-Exposure Based on the Analogy HistogramHaifeng Zhang, Jianzhong Cao, Linao Tang, Huawei Wang. 1053-1056 [doi]
- A Novel Subspace Discriminant Locality Preserving Projections for Face RecognitionWei He, Wen-Sheng Chen, Bin Fang. 1057-1061 [doi]
- A Saliency Detection Model Based on Multi-feature FusionYang Zheng, Chunping Liu, Zhaohui Wang, Yi Ji, Shengrong Gong. 1062-1066 [doi]
- A secondary image denoising model based on the local energy operatorChen Xu, Xiaoli Sun, Min Li. 1067-1070 [doi]
- Active Contours with Adaptively Normal Biased Gradient Vector Flow External ForceHengbo Zhao, Lixiong Liu. 1071-1075 [doi]
- Adaptive Filter for Color Impulsive Removal Based on the HSI Color SpaceYan-xin Shi, Yong-mei Cheng. 1076-1080 [doi]
- An Efficient Linear Text Segmentation Algorithm Using Hierarchical Agglomerative ClusteringJi-Wei Wu, Judy C. R. Tseng, Wen-Nung Tsai. 1081-1085 [doi]
- Automatic Detection of Lumina in Mouse Liver Immunohistochemical Color Image Using Support Vector Machine and Cellular Neural NetworkWang Hui, Zhou Zhi Guo, Jie Long Mei. 1086-1090 [doi]
- Automatic Parameter Determination Based on a Modified Discriminant Criterion for Face RecognitionTaiquan Huang, Wen-Sheng Chen. 1091-1094 [doi]
- Cell Nuclei Detection in Histopathological Images by Using Multi-curvature Edge CueBaochuan Pang, Long Zhou, Wu Zeng, Xinge You. 1095-1099 [doi]
- Construction of a Bilingual Cognitive Property KnowledgebaseBin Li, Haibo Kuang, Xiaohe Chen, Xuri Tang, Chen Chen. 1100-1103 [doi]
- Contours-Matching in Building Reconstruction from a Single ImageXin Zheng, Xiumin Zhang, Fuqing Duan, Wei Liu. 1104-1108 [doi]
- Efficient e-Discovery Process Utilizing Combination Method of Machine Learning AlgorithmsTae Rim Lee, Bon Min Goo, Hun Kim, Sang Uk Shin. 1109-1113 [doi]
- Face Recognition with Statistical Local Line Binary PatternZheng-Chun Sun, Jian Cheng. 1114-1117 [doi]
- Face Reconstruction from Skull Based on Partial Least Squares RegressionDonghua Huang, Fuqing Duan, Qingqiong Deng, Zhongke Wu, Mingquan Zhou. 1118-1121 [doi]
- Fast and Effectively Identify Pornographic ImagesYanjun Fu, Weiqiang Wang. 1122-1126 [doi]
- Fast Iris Boundary Location Based on Window Mapping MethodYu Li, Zhou Xue. 1127-1130 [doi]
- Image Matching Algorithm Based on Analysis of Reliability in Log-Polar FieldYiping Xu, Jing Tan, Hongping Li, Yan Tian. 1131-1135 [doi]
- Image Quality Assessment Based on Binary Structure InformationChun-Hsien Chou, Yun-Hsiang Hsu. 1136-1140 [doi]
- Improving the Performance of Personalized Recommendation with Ontological User Interest ModelZhenglian Su, Jun Yan, Haisong Chen, Jiaojiao Zhang. 1141-1145 [doi]
- Inducing Chinese Selectional Preference Based on HowNetYuxiang Jia, Hongying Zan, Ming Fan. 1146-1149 [doi]
- Knowledge Discovery Method from Abnormal Monitoring DataShisong Zhu, Liang Chen, Shuhong Cao. 1150-1153 [doi]
- Learning Local Binary Patterns with Enhanced Boosting for Face RecognitionFanyi Xiao, Yixiong Liang, Xiaohui Qu. 1154-1158 [doi]
- Level Set Region Based Image Segmentation Using Lattice Boltzmann MethodSouleymane Balla-Arabe, Bin Wang, Xinbo Gao. 1159-1163 [doi]
- Local Reconstruction Error of l2 Norm for Discriminant Feature ExtractionYu Hou, Caikou Chen. 1164-1168 [doi]
- Multi-Level Kernel Machine for Scene Image ClassificationJunlin Hu, Ping Guo. 1169-1173 [doi]
- Multiresolution Streamline Placement for 2D Flow FieldsWenyao Zhang, Manrui Zhang, Bo Sun. 1174-1178 [doi]
- Parabolic Adjustment of Image Clearness Algorithm Based on Retinex TheoryWenzhang He, Rui Liu, Ruimin Zhao. 1179-1183 [doi]
- Pedestrian Detection Based on HOG-LBP FeatureGuolong Gan, Jian Cheng. 1184-1187 [doi]
- Pedestrian Recognition Based on Saliency Detection and Kalman Filter Algorithm in Aerial VideoXingbao Wang, Chunping Liu, Gong Liu, Long Liu, Shengrong Gong. 1188-1192 [doi]
- Research and Implementation on the Digital Medical Image Enhancement Methods Based on Gradient Smooth and Context SmoothLiu Jing, Xiong Jie. 1193-1196 [doi]
- Research on Improved Greedy Algorithm for Train ReschedulingZhenhuan He. 1197-1200 [doi]
- Saliency-based Adaptive Scaling for Image RetargetingTanchao Zhu, Weiming Wang, Ping Liu, Yongming Xie. 1201-1205 [doi]
- Schistosoma Cercariae Image Recognition via Sparse RepresentationShenhai Yan, Yang Liu, Xiantong Huang. 1206-1210 [doi]
- Soft-Voting Classification using Locally Linear ReconstructionXiaohui Tian, Rong Wang. 1211-1214 [doi]
- Sparse Representation for Multi-Label Image AnnotationBingxin Xu, Ping Guo. 1215-1219 [doi]
- Speech Feature Analysis Using Temporal Linear EmbeddingLifang Xue, XiusHuang Yi. 1220-1223 [doi]
- Streamline-based Visualization of 3D Explosion FieldsYi Wang, Wenyao Zhang, Jianguo Ning. 1224-1228 [doi]
- The Application of Binary Particle Swarm Algorithm in Face RecognitionGuojian Cheng, Caiyun Shi, Kai Zhu, Kevin Gong. 1229-1233 [doi]
- The Iterative Regularization Method Based on Image Decomposition ModelMin Li, Chen Xu, Xiaoli Sun, Weiqiang Zhang. 1234-1237 [doi]
- The Multispectral Image Edge Detection Based on Clifford GradientHui Liu, Chen Xu, Wenming Cao. 1238-1242 [doi]
- Using the Callback Function Realization Touch Screen Gestures Recognition of ComputerShuangCheng Ma. 1243-1245 [doi]
- A Boundary Detection algorithm of clusters based on Dual Threshold SegmentationBaozhi Qiu, Shuang Wang. 1246-1250 [doi]
- A Combined Music Label Propagation ModelJing Cai, Heng Li, Bo Lang. 1251-1255 [doi]
- A Method for New Word Extraction on Chinese Large-scale Query LogsRui Sun, Peng Jin, Juan Lai. 1256-1259 [doi]
- A New Community Structure Detection Method Based on Structural SimilarityQi Luo. 1260-1262 [doi]
- A Real Time Multi-Scale Correlation Analysis Method and its Application on the Data Mining in Thermodynamic ProcessQi Wang, Xin-ping Liu. 1263-1267 [doi]
- A Simple But Effective Stream Maximal Frequent Itemset Mining AlgorithmHaifeng Li, Ning Zhang. 1268-1272 [doi]
- A Weighted K-hyperline Clustering Algorithm for Mixing Matrix Estimation on Bernoulli-Gaussian SourcesJun-Jie Yang, Hai-lin Liu. 1273-1278 [doi]
- An Empirical Study on Credit Scoring Model for Credit Card by Using Data Mining TechnologyWei Li, Jibiao Liao. 1279-1282 [doi]
- An Improved ID3 Based on Weighted Modified Information GainChun Guan, Xiaoqin Zeng. 1283-1285 [doi]
- Analysis on Cloud Computing-based Logistics Information Network ModeXing Wang. 1286-1289 [doi]
- Another View of the Features in Supervised Chinese Word Sense DisambiguationPengyuan Liu. 1290-1293 [doi]
- Application of Cloud Storage in Traffic Video DetectionRu Xue, Zong-Sheng Wu, A.-Ning Bai. 1294-1297 [doi]
- Approximation Kernel 2DPCA by Mixture of Vector and Matrix RepresentationLin Wang, Xiuling Zhou. 1298-1302 [doi]
- Clustering Based Image Denoising Using SURE-LETWu Zeng, Long Zhou, Xiubao Jiang, Xinge You, Mingming Gong. 1303-1307 [doi]
- Data Mining Technique in the Internal Auditing of Enterprise GroupsAijun Yang, Ping Song. 1308-1311 [doi]
- Data Sources of WebometricsLongqing Shi, Qingfeng Zhao. 1312-1315 [doi]
- Measuring Semantic Relatedness between Words Using Lexical ContextWei He, Xiaoping Yang, Dupei Huang. 1316-1320 [doi]
- Methodology for Statistical Distribution Determination of Various Data SourcesChangqing Liu, Wencai Luo. 1321-1324 [doi]
- Neural network in the application of EEG signal classification methodHuaping Jia. 1325-1327 [doi]
- Normalizing Modularity Matrices for Data ClusteringRong Wang. 1328-1330 [doi]
- Pattern Recognition with Spatial Data Mining in Web: An Infrastructure to Engineering of the Urban CadasterAndre Fabiano de Moraes, Lia Caetano Bastos. 1331-1335 [doi]
- Promotion Analysis Based on Fitting in Multi-Level SpaceLi Sun, Ming Zhu, Jiyun Li. 1336-1340 [doi]
- Research on characteristics of plates on Chinese stock marketPeng Lin, Jianhui Yang. 1341-1344 [doi]
- Research on Industrial Building's Reliability Assessment Based on Projection Pursuit ModelZhang Lei, Jie Liu. 1345-1349 [doi]
- Research on Privacy-preserving in Distributed Mining Based on the Attribute SimilarityQiu Lu, Xiao-hui Cheng. 1350-1353 [doi]
- Sequential Bayesian Method for Formulating Uncertainty in Sparse DataChangqing Liu, Wencai Luo. 1354-1356 [doi]
- Similarity Matching over Uncertain Time SeriesYanfei Zuo, Guohua Liu, Xiaoli Yue, Wei Wang, Honghua Wu. 1357-1361 [doi]
- Simplified Business Process Model Mining Based on Structuredness MetricWeidong Zhao, Xi Liu, Anhua Wang. 1362-1366 [doi]
- Spectral Clustering and its Research ProgressChuanyi Fu, Huandong Chen, Jieqing Xing. 1367-1369 [doi]
- SVM Combined with FCM and PSO for Fuzzy ClusteringYifang Yang, Guoqiang Chen, Yanchun Guo. 1370-1373 [doi]
- The Classification of k-anonymity DataBingchun Lin, Guohua Liu. 1374-1378 [doi]
- The Estimation of Mixing Matrix Based on Bernoulli-Gaussian ModelJiechang Wen, Taowen Wang. 1379-1383 [doi]
- The Finite Element Analysis of the Electromagnetic Levitation System Based on the Large Air GapZhengfeng Ming, Rui Wen. 1384-1386 [doi]
- The Problem about Grey Incidence Cluster AnalysisYanping Cao, Chunmei Gong. 1387-1389 [doi]
- TKNN: An Improved KNN Algorithm Based on Tree StructureLi Juan. 1390-1394 [doi]
- A Data Distribution Platform Based on Event-Driven MechanismWang Wei, Tan Enmin, Feng Bing. 1395-1399 [doi]
- A General Edge Detection Method Based on the Shear TransformQiguang Miao, Pengfei Xu, Weisheng Li, Hai Zhu. 1400-1404 [doi]
- A Lower Bound for the Smarandache Function ValueYanchun Guo, Ganglian Ren, Yifang Yang. 1405-1407 [doi]
- A New Method for Interval Multiple Attribute Decision Making Based on Minimum Variance and Approach DegreeZhenhai Ai. 1408-1412 [doi]
- A Novel Two-stage Analysis Method for Customer's RequirementHai Zhu, Zengfa Dou, Wengang Zhou. 1413-1417 [doi]
- A Safety Framework and Alarming Model for Train Operation Environment Based on CPSXinhong Hei, Lining Chang, Weigang Ma, Guo Xie. 1418-1421 [doi]
- Achievement of Proxy Cache System for Streaming Media Based on Patch AlgorithmWeitao Ha. 1422-1424 [doi]
- An Implementation Method for Converting the Erhu Music from Wav to MidZiqing Nie, Shiying Yang. 1425-1429 [doi]
- Analysis of the Impact of Polarization Mode Dispersion on Optical Fiber CommunicationWei Zhao. 1430-1432 [doi]
- Analytical Models for Data Dependence Violation Checking in TLSXin Lai, Cong Liu, Zhiying Wang, Quanyou Feng. 1433-1437 [doi]
- CFD Numerical Simulation of Exhaust MufflerJun Chen, Xiong Shi. 1438-1441 [doi]
- Closed-loop Supply Chain Network Horizontal Integration ProblemYu-xiang Yang, Gen-gui Zhou. 1442-1446 [doi]
- Computer Realization of Quadratic Spline InterpolationTianxiang Feng, Hongxia Liu. 1447-1450 [doi]
- Constructing the Expandability Web Service Based LinuxRong Shan. 1451-1455 [doi]
- Co-op Advertising Analysis within a Supply Chain Based on the Product Life CycleHong Zhang, Sheng Zhong. 1456-1460 [doi]
- Correlation Factor Analysis of FEA Model Simplification Methods of Printed Circuit BoardSu Zou, Chuanri Li, Fei Xu, Liang Qiao. 1461-1465 [doi]
- DBS Application to Chinese AdjectivesQiuxiang Feng, Degen Huang, Xiuying Li, Rongpei Wang. 1466-1470 [doi]
- Design and Implement of SerialPort class on Upper machine SystemChuanyi Fu, Jinmei Zhan, Juntao Chen. 1471-1473 [doi]
- Design and Implementation of Bus Net Routing AlgorithmMin Luo, Haiquan Wang, Chunhe Xia, Lihua Wang, Ya Wang. 1474-1478 [doi]
- Design of Instrument Control System Based on LabViewJianhua Kang, Fangyi She, FangZheng Yang, Tao Wang. 1479-1483 [doi]
- Dynamic risk measurement of futures based on wavelet theoryJianhui Yang, Peng Lin. 1484-1487 [doi]
- Existence of Almost Periodic and Almost Automorphic Solutions for Second Order Differential EquationsLan Li. 1488-1492 [doi]
- Experimental Study the Measurement of Acoustic Wave Flight Time under Strong Noise in the BoilerFeng Tian, Chenghui Zhang. 1493-1496 [doi]
- Fast Verification of Memory Consistency for Chip Multi-ProcessorZheng Lv, Hao Chen, Feng Chen, Yi Lv. 1497-1502 [doi]
- Finite Volume Methods for the Second Order Singular Perturbation ProblemsChongnan He. 1503-1506 [doi]
- FTA Based Runtime Evaluation of System Reliability for Autonomous Unmanned VehicleGuoqi Li. 1507-1509 [doi]
- Geometric Recognitions Models of Fault Characteristics in Mobile Core NetworkSulin Pang, Shouyang Wang. 1510-1514 [doi]
- Multiobjective Interaction Programming for Two-PersonsMin Jiang, Zhiqing Meng, Xinsheng Xu, Rui Shen, Gengui Zhou. 1515-1519 [doi]
- Multi-user Detection Method for MIMO-OFDM Uplink TransmissionYanli Wang. 1520-1523 [doi]
- Off-line Text-independent Writer Identification Using a Mixture of Global and Local FeaturesYiu-ming Cheung, Junping Deng. 1524-1527 [doi]
- Optimization Plan of Using the Arrival and Departure Track in District Station Based on Hybrid AlgorithmFeng Tian, Haiyang Wang, Xiaoping Sun, Jia Liu, Chuanyun Wang. 1528-1531 [doi]
- Qualitative Analysis for a Kind of Predator-Prey Model of Holling III-Function Response with Nonlinear Density DependentWei Wei Zheng, Li-gui Luo, Lei Zhao. 1532-1535 [doi]
- Relative Stability of Solution for Hua's Macroeconomic ModelJing Zhang, Jinjie Zhang. 1536-1538 [doi]
- Robust Adaptive Sliding Mode Control Design for a Class of Uncertain Neutral Systems with Distributed DelaysRuliang Wang, Dongmei Gao, Yanbo Li. 1539-1541 [doi]
- Stock Selection Based on Data Clustering MethodRuizhong Wang. 1542-1545 [doi]
- Structural Health Monitoring via Dynamic VisualizationPeng Sun, Xin Guo. 1546-1548 [doi]
- The Application of the Internet of Things in Hainan Tourism Scenic SpotYuanguai Lin. 1549-1553 [doi]
- The Application Study about Lucene in Document Retrieval for OfficeDaiwen Wu. 1554-1556 [doi]
- The BSC Alarm Management System Based on Rough Set Theory in Mobile CommunicationChao Deng, Sulin Pang. 1557-1561 [doi]
- The Construction and Application of Distance and Open Experimental PlatformJiangfeng Yu, Youju Qi. 1562-1565 [doi]
- The Guidance and Control of Small Net-recovery UAVJiatong Chen, Yong Wang. 1566-1570 [doi]
- The Simulation of Trajectory for Homing Depth Charge Attacking the Submarine with Different Guide OrderlinessZong-ji Li, Shan-Zheng Cheng, Lei Ren. 1571-1575 [doi]
- The Study of Improved Marker-Controlled Watershed Crown Segmentation AlgorithmGuang Deng, Zengyuan Li. 1576-1579 [doi]
- Using Organizational Evolutionary Particle Swarm Techniques to Generate Test Cases for Combinatorial TestingXiaoying Pan, Hao Chen. 1580-1583 [doi]
- VAR Model Analysis on Japan's OFDI and Industrial Structural UpgradingRen Liang. 1584-1588 [doi]