Abstract is missing.
- A novel ranking method for generalized fuzzy numbers based on fuzzy superiority degreeMenghui Xu, Zhiping Qiu. 6-16 [doi]
- A novel type of fuzzy propositional logicShengli Zhang. 17-22 [doi]
- Aggregation operators using einstein operations on intuitionistic trapezoidal fuzzy numberXinye Zhao, Rusheng Ju, Shanliang Yang, Yun Zhou. 23-28 [doi]
- An unsupervised possibilistic c-means clustering algorithm with data reductionYating Hu, Fuheng Qu, Changji Wen. 29-33 [doi]
- An adaptive complexion extraction method based on fuzzy entropy and fuzzy inferenceZhongjiang Zhu, Liquan Zhang. 34-38 [doi]
- An improved fuzzy C-means clustering algorithm based on simulated annealingPeiyu Liu, Linshan Duan, Xuezhi Chi, Zhenfang Zhu. 39-43 [doi]
- Convergence of generalized fuzzy bidirectional associative memory neural networks with thresholdsGuiying Chen, Linshan Wang. 44-48 [doi]
- Decomposition theorems and representation theorems of lattice interval value fuzzy setsXueqiu Zhan. 49-52 [doi]
- Fuzzy continuity of convex fuzzy mapping based on relative interiorYanhong Li, Zhaoyou Tian. 58-62 [doi]
- Fuzzy state feedback robust control for discrete-time fuzzy singularly perturbed systems with time-delayJinxiang Chen. 63-67 [doi]
- Learning sparse Fuzzy Cognitive Maps by Ant Colony OptimizationNan Ye, Ming Gao, Rongwei Zhang, Dehong Wang, Xianhua He, Jun Lu, Zhengyan Wu, Qi Zheng. 68-76 [doi]
- Multi-q extension of Tsallis entropy based fuzzy c-means clusteringMakoto Yasuda, Yasuyuki Orito. 77-82 [doi]
- New fuzzy metric spaces based on gradual numbersCai-Li Zhou, Yin-Ying Zhou, Jun-Yan Bao. 83-87 [doi]
- On B-groupsKankana Chakrabarty. 88-92 [doi]
- Phase unwrapping with Chinese Remainder Theorem for multi-baseline Interferometric Synthetic Aperture RadarHongmin Zhang, Guowang Jin, Qing Xu, Qin Yan. 93-97 [doi]
- Relationship between similarity measure and entropy of interval type-2 fuzzy setsXiang Zhang, Gao Zheng. 98-102 [doi]
- Soft module theoryDajing Xiang. 103-107 [doi]
- Switched control of type-2 polynomial discrete fuzzy systems based on SOSTiechao Wang, Jianqiang Yi, Ding Wang. 108-113 [doi]
- The core and the bargaining set for multi-choice gamesTianwen Li, Feng Ma, Weiyi Liu. 114-119 [doi]
- Universal triple I method with maximum fuzzy entropy employing R-implicationsYiming Tang, Xuezhi Yang, Feng Yue. 125-129 [doi]
- A decision-theoretic rough set approach to spam filteringChunsheng Zhao, Wei Zeng, Mai Jiang, Zhiyong He. 130-134 [doi]
- Dominance-based multi-granulation rough sets and decision rules extraction in incomplete fuzzy information systemsXuelan Zeng, Lisha Wu, Shizhou Weng. 135-139 [doi]
- Generalized intuitionistic fuzzy rough sets based on an intuitionistic fuzzy residual implicatorHaidong Zhang, Yanping He. 140-145 [doi]
- Multi-granulation probabilistic rough set modelYuejin Lv, Qingmei Chen, Lisha Wu. 146-151 [doi]
- Rough formal context based on the soft setsLi Fu. 152-156 [doi]
- Triangular type-2 fuzzy neural networks version of the Stone-Weierstrass theoremSaeed Panahian Fard, Zarita Zainuddin. 157-161 [doi]
- A data-driven health evaluation method for engine test-bedsFengyu Zhu, Zhengguang Shen, Qi Wang. 162-167 [doi]
- A novel Fuzzy C Means algorithm based on distance modification for image segmentationNaixiang Li, Peng Guo. 174-178 [doi]
- Assessing college English teaching based on grey relational analysisYahong Li, Ting She. 179-183 [doi]
- Computer Aided Detection for breast calcification clusters based on improved instance selection and an adaptive neuro-fuzzy networkXiaodong Wang, Jun Feng, Yao-lin Li, Zhan Li, Qiu-ping Wang. 184-189 [doi]
- Fuzzy logic based security region evaluation of the urban rail transit operating systemXinwang Liu, Xiuzhi Sang, Yong Qin. 190-195 [doi]
- Gender recognition using fisherfaces and a fuzzy iterative self-organizing techniqueYijun Du, Xiaobo Lu, Wujun Chen, Qianzhou Xu. 196-200 [doi]
- Unsupervised clustering with the Octave Fuzzy Logic ToolkitLinda Markowsky, Bruce Segee. 201-206 [doi]
- Fuzzy position-force control in training systems with haptic guidanceXun Bi, Bo Li, Hongxuan Wang, Letang Xue, Weiguo Wang. 207-212 [doi]
- Network-based fuzzy adaptive sliding mode controller for the ship steering problemGuoqing Xia, Huiyong Wu, Ang Zhao, Chengcheng Pang. 213-218 [doi]
- Two-dimensional fuzzy PID switching power supply controller based on FPGAShangbin Jiao, Huazhen Wu, Haitao Wang. 219-223 [doi]
- A fuzzy approach to texture suppression by combining edge length analysis with surround suppressionShaobin Chen, Caiquan Xiong, Cailin Li. 224-228 [doi]
- An intelligent fault-tolerant QoS unicast routing mechanism based on the outlook algorithmXin Man, Xingwei Wang, Min Huang. 229-234 [doi]
- Obtaining the biological age of the cardiovascular system using fuzzy logicF. Nuno Almirantearena, F. Clara, P. Burillo Lopez. 235-240 [doi]
- Small target detection under the sea using multi-scale spectral residual and maximum symmetric surroundZhijun Yao. 241-245 [doi]
- Three-dimensional image reconstruction in electrical tomographyShihong Yue, Jianling Gao. 246-250 [doi]
- Visual saliency detection based on mahalanobis distance and feature evaluationZhijun Yao. 251-255 [doi]
- A new solution of multiplicative consistency for incomplete fuzzy preference relation for group decision makingShilian Han, Xinwang Liu. 256-261 [doi]
- A portfolio selection model with interval-valued return ratesWeijie Pang, Shoumei Li. 262-267 [doi]
- Extended GOWA operator in intuitionistic fuzzy setting based group decision making method for scientific research scheme organizationShaohua Wang, Yongchun Wang, Xudong Miao. 268-272 [doi]
- Extending the strategy game from multi-criteria considerations with linguistic variablesChen-Tung Chen, Ping-Feng Pai, Wei-Zhan Hung. 273-278 [doi]
- Fault diagnosis for down-hole conditions in beam pumping units based on an improved fuzzy Iterative Self-Organizing Data Analysis TechniqueKun Li, Xian-wen Gao, Hai-bo Zhou, Zhong-da Tian. 279-284 [doi]
- Pattern recognition methodology for operation task allocation under intuitionistic fuzzy settingHongquan Shi, Yongchun Wang, Xudong Miao, Yongjie Xu. 285-289 [doi]
- A hybrid approach to fuzzy risk analysis in stock marketShigang Liu, Min Gan, Honghua Dai. 295-298 [doi]
- A soft control chart based on weighted measurement of fuzzy dataDabuxilatu Wang. 299-303 [doi]
- Adaptive fuzzy control with backstepping for surface shipsGuoqing Xia, Xingchao Shao. 304-310 [doi]
- Fuzzy comprehensive evaluation for personnel quota control modes in group companiesMinpeng Xiong, Xiuyun Shi. 311-315 [doi]
- Reliability analysis of multidisciplinary systems by using chi-squared distributionsJihong Liu, Xiangnan An. 321-326 [doi]
- TOPSIS based on the triangular fuzzy function and its application in construction scheme optimizationJianwen Huang, Ting Zhang, Xingxia Wang, Zaiyi Liao. 332-337 [doi]
- A region segmentation method on 2-D vessel optical coherence tomography imagesLi-Chang Liu, Jiann-Der Lee, Yu Wei Hsu, Carol T. Liu, Ellen Tseng, Meng-Tsan Tsai. 338-343 [doi]
- Application of adaptive neuro-fuzzy inference system for physical habitat simulationYue Zhao, Jianzhong Zhou, Sheng Bi, Huajie Zhang. 349-353 [doi]
- Classification of road safety based on fuzzy clusteringRenyuan Wang, Yan Chen, Taoying Li, Penghui Li, Junxiong Sun. 354-358 [doi]
- Coalition formation based on fuzzy trust relationship in MASXiang Yin, Yun Li. 359-363 [doi]
- Fuzzy clustering-based prediction of marine sensor dataAidan O'Mara, Md. Sumon Shahriar. 364-368 [doi]
- Fuzzy evaluations in mulberry wine productionLing-Ling Yang. 369-373 [doi]
- Fuzzy risk evaluation of industrial technology innovation strategic alliancesWen Tang, Zhi-Xiang Li. 374-378 [doi]
- Prior information driven design of fuzzy logic controllers with application to the overhead crane controlXiaolu Zhang, Chengdong Li, Jianqiang Yi. 379-384 [doi]
- Satisfaction evaluation for meteorological environment information in sea battlefields based on membership cloudBing Zhao, Wenjun Cai, Fei Luo. 385-389 [doi]
- Three-dimensional localisation for wireless sensor networks using probabilistic fuzzy logicShuang Gu, Yong Yue, Carsten Maple, Beisheng Liu, Chengdong Wu. 396-401 [doi]
- Workflow execution data analysis based on personnel fuzzy evaluationLei Feng, Youda Li, Xin Zhang. 402-406 [doi]
- A rule extraction algorithm based on compound attribute measure in decision systemsWenbin Qian, Bingru Yang, Yonghong Xie, Hui Li. 407-411 [doi]
- Clustering high dimensional data streams based on N-most interesting itemsets miningFujiang Ao, Jing Du, Jingyi Yu, Fuzhi Wang, Qiong Wang. 412-416 [doi]
- A new method for calculating core attributesShunliang Huang, Zongjie Wu, Junmo Cheng, Qi Wang. 417-421 [doi]
- Classification of diffuse large B cell lymphoma gene expression data based on two-layer particle swarm optimizationYajie Liu, Xinling Shi, Guoliang Huang, Baolei Li, Lei Zhao. 422-427 [doi]
- A K-anonymity model with strongly identifiable attributesMei Yu, Yu Du, Tianyi Xu, Jian Yu, Yaqing Liu. 428-432 [doi]
- Multiple Instance Support Vector Machines with latent variable descriptionJianjiang Lu, Wei Li, Jiabao Wang, Yafei Zhang, Yang Li, Lei Bao. 433-438 [doi]
- Training probability transductive classifiers for group probability datasets based on regressionYizhang Jiang, Zhaohong Deng, Shitong Wang, Tongguang Ni. 444-449 [doi]
- A new validity index with K-means algorithm and its applications in electrical tomographyShihong Yue, Chenglong Yu, Ti Huang. 450-455 [doi]
- Convex-Nonnegative Matrix Factorization with structure constraintsXiaobing Pei, Tao Wu. 456-460 [doi]
- Fuzzy equivalence relation clustering with transitive closure, transitive opening and the optimal transitive approximationYanli Jiang, Guannan Deng. 461-465 [doi]
- Granulation-based fuzzy clustering of large-scale time seriesXiao Wang, Fusheng Yu, Huixin Zhang. 466-471 [doi]
- Rough clustering of Korean foods based on adjectives for taste evaluationJoonwhoan Lee, Deepak Ghimire, Jeong-Ok Rho. 472-475 [doi]
- An improved vector space model to retrieval systems for content matching in agricultural informationRu-peng Luan, Qian Zhang, Junfeng Zhang, Feng Yu, TianGang Lu. 476-480 [doi]
- Application on the rate of lightning trip based on the grey modelHua Li, Xunjun Sun, Lingling Li, Fan Wu. 481-485 [doi]
- Financial risk evaluation of chinese commercial banks using projection pursuit clusteringJitong Lou, Wengao Lou. 486-491 [doi]
- A reconstruction method of the design rationale model based on design contextJihong Liu, Hongfei Zhan. 492-497 [doi]
- A study on 3D model based knowledgeJihong Liu, Zhenjie Zhao. 498-502 [doi]
- Consensus-based integration of unordered partitionsWojciech Lorkiewicz, Radoslaw Katarzyniak. 503-509 [doi]
- Interval-based aggregation of fuzzy-linguistic statementsGrzegorz Popek, Radoslaw Katarzyniak. 510-514 [doi]
- Mining a government affairs microblog network on Sina Weibo with social network analysisYihong Rong, Jia Song. 515-519 [doi]
- A new integration mechanism for knowledge map of complex product developmentJihong Liu, Ling-ge. 520-525 [doi]
- A local domain adaptation feature extraction methodJun Gao. 526-530 [doi]
- A new approach to dimensionality reduction based on locality preserving LDADi Zhang, Jiazhong He. 531-535 [doi]
- A new dominance-based rough set model based on interval knowledge granulesYanyong Guan, Hongkai Wang, Fasheng Xu, Hongbing Jiang. 536-540 [doi]
- A random forest model for estimating Canopy Chlorophyll Content in rice using hyperspectral measurementsXuqing Li, Xiangnan Liu, Zhihong Du, Cuicui Wang. 541-546 [doi]
- Nonnegative Matrix Factorization using Class Label InformationIsiuwa Kokoye, Lawrence Oke, Padonou Izogie. 552-556 [doi]
- A new branch and bound algorithm for noncovex quadratic programming with box constraintsWenlong Fu, Tingsong Du. 562-566 [doi]
- A rough set algorithm for attribute reduction via mutual information and conditional entropyJing Tian, Quan Wang, Bing Yu, Dan Yu. 567-571 [doi]
- A semantic query expansion-based patent retrieval approachFeng Wang, Lanfen Lin, Shuai Yang, Xiaowei Zhu. 572-577 [doi]
- An adaptive orthogonal matching pursuit algorithm based on redundancy dictionaryYumin Tian, Zhihui Wang. 578-582 [doi]
- Designing and implementing a highway dispatching command system using knowledge basesJianghong Shu, Yutao Chang, Ranfeng Yu. 583-587 [doi]
- Extending GeNIe for building graphical decision-theoretic modelsYunfei Ge, Lihua Zhou, Sheng-Min Cui, Ming Yang. 588-593 [doi]
- Fuzzy relational learning: A new approach to case-based reasoningNing Xiong, Liangjun Ma, Shouchuan Zhang. 594-599 [doi]
- Fuzzy rule interchange between f-R2ML and f-RIFXing Wang, Ji Chen, Xiangfu Meng, Bing Wang. 600-604 [doi]
- Global path planning for omnidirectional vehicles based on Bezier curve and dynamic constraintsHan Xiong, Huasong Min. 605-610 [doi]
- Measuring domain similarity for statistical machine translationLin Liu, Hailong Cao, Tiejun Zhao. 611-615 [doi]
- Non-revision reasoning with inconsistent ontologyHongwei Wang, Ansheng Deng. 616-620 [doi]
- On consensus of high-order multi-agent systems with directed interactions and asymmetric communication delaysFangCui Jiang. 621-626 [doi]
- Path planning of a four-rotor aircraft based on shortest path algorithm and statistical analysisTianwei Shi, Hong Wang, Fuwang Wang. 627-631 [doi]
- The measure space structure of logical Markov decision processesZhenzhen Wang, Hancheng Xing. 632-636 [doi]
- The parsimonious covering theory applied for communication equipment malfunctionQixue Guan, Yueqiu Jiang. 637-641 [doi]
- The problem of entropy production in the classic rule of combination in the Dezert-Smarandache theoryXinde Li. 642-647 [doi]
- An empirical Bayes test of parameters for a nonexponential distribution family with Negative Quadrant Dependent random samplesMinna Shao. 648-652 [doi]
- Cluster performance oriented characteristics of network simulationsJing Du, Fujiang Ao, Futong Qin, Ying Zhou, Chengdong Huang. 653-657 [doi]
- A knowledge discovery system for detecting and visualizing knowledge evolution of a research fieldWei Sun, Xuefu Zhang, Huai Wang. 658-663 [doi]
- Manifold based fisher method for semi-supervised feature selectionSunzhong Lv, Hongxing Jiang, Li Zhao, Di Wang, Mingyu Fan. 664-668 [doi]
- Opportunities of innovation under challenges of big dataJinsong Zhang, Yan Chen, Taoying Li. 669-673 [doi]
- Controlling in-patient environment by mining sensor dataAzhar Mahmood, Shi Ke, Shaheen Khatoon. 674-679 [doi]
- Prediction about time series based on updated prediction ARMA modelYouqiang Sun, Rujing Wang, Bingyu Sun, Wenbo Li, Feng Jiang. 680-684 [doi]
- A clinic ontology construction method in distributed hospital information systemsBoyi Xu, Hongming Cai, Lihong Jiang. 685-689 [doi]
- A new distance computing method for DNA sequences in phylogenetic analysisJuan Wang, Maozu Guo, Kai Che, Chun-yu Wang, Xiaoyan Liu, Yang Liu. 690-694 [doi]
- A reconstruction algorithm for point-wise sources in a two-dimension electroencephalography modelHongyan Wang, Jiayin Sun, Yuan Li, Zejing Xing, Lixin Feng. 695-699 [doi]
- An efficient projected partition algorithm based on the order among genesZesheng Sun, Yuhai Zhao, Dengke Meng, He Pan. 700-707 [doi]
- An intelligent approach for the automated segmentation and quantification of Immunohistologically stained nucleiR. A. Khorshed, Q. Yousuf, J. Jiang. 708-712 [doi]
- Bisimulation-based consistency checking on Feng-Han-Shi-Bi syndrome for rheumatoid arthritisGuang Zheng, Zekun Ning, Junping Zhan, Kai Cui, Miao Jiang, Cheng Lu, Aiping Lu. 713-717 [doi]
- Effects of amino acid classification on prediction of protein structural classesZhi Mao, Guo-Sheng Han, Ting-ting Wang. 718-723 [doi]
- Functional comparisons of proteins using the wavelet packet transformShaoming Zhu, Shaojuan Zhu. 724-729 [doi]
- Identification of the differential DNA methylation markers among cancersHongbo Liu, Zhe Li 0001, Jing Ding, Jie Liu, Yan Zhang. 730-734 [doi]
- Long intergenic non-coding RNA detection benefited from integrative modeling of (Epi)genomic dataJie Lv, Hongbo Liu, Qiong Wu. 735-740 [doi]
- An efficient method for online detecting abnormal cascading pattern in distributed networksTing Huang, Xiuli Ma, Xiaokang Ji, Shiwei Tang. 741-746 [doi]
- An incremental learning approach to continuous image change detectionLei Song, Shaoning Pang, Gang Chen, Abdolhossein Sarrafzadeh, Tao Ban, Daisuke Inoue. 747-752 [doi]
- Mining both frequent and rare episodes in multiple data streamsZhongYi Hu, Wei Liu, Hongan Wang. 753-761 [doi]
- Smart home services based on event matchingQuanlong Li, Yan Jin, Ting He, Hanchuan Xu. 762-766 [doi]
- F2R: Publishing file systems as Linked DataShaopeng He, Jianhui Li, Zhihong Shen. 767-772 [doi]
- MalayWordNet - A novel lexical database for Malay languageJer-Lang Hong. 773-777 [doi]
- Multi-schema matching based on clustering techniquesGuohui Ding, Tianhe Sun, Yingnan Xu. 778-782 [doi]
- Automatically mining similar warnings and warning combinationsDalin Zhang, Dahai Jin, Ying Xing, Hailong Zhang, Yunzhan Gong. 783-788 [doi]
- Co-training based semi-supervised Web spam detectionWei Wang, Xiao-Dong Lee, An-Lei Hu, Guanggang Geng. 789-793 [doi]
- L-reach: A vertex set cover approach to regular expression-based reachability queriesYifei Zhang, Guoren Wang, Changkuan Zhao, Ende Zhang. 794-798 [doi]
- Retaining all the path information for graph reachability queries based on regular expressionsYifei Zhang, Guoren Wang, Changkuan Zhao, Ende Zhang. 799-804 [doi]
- Combining watersheds and conditional random fields for image classificationYanchai Yang, Guitao Cao. 805-810 [doi]
- Feature extraction of gearbox vibration signals based on EEMD and sample entropyXiaoping Chen, Chunfang Yin, Weixing He. 811-815 [doi]
- Special Sound Detection for emergency phonesHansheng Lei, Oscar Valdez. 816-820 [doi]
- Structural fusion of heterogeneous visual-auditory features for multimedia analysisHong Zhang, Jiamei Nie, Li Chen. 821-825 [doi]
- Video retrieval based on a new distance of histogramsYing Chen, Ou Wu. 826-830 [doi]
- A novel framework for validating dynamic web applicationsChee Sheen Chan, Jer-Lang Hong. 831-836 [doi]
- A SVM-based compound-word recognition method in information securityShixian Li, Lei Zhang, Bo Han, Tingrui Lei, Qing Wang, Tao Peng, Peng Cao. 837-841 [doi]
- A user preference-based top-K ranking approach for XML query resultsXiaoyan Zhang, Xiangfu Meng. 842-846 [doi]
- An on-line adaptive topic evolution model in web discussionsChunming Yang, Hui Zhang, Dawen Shi. 847-852 [doi]
- Automatic extraction of abbreviation definitions based on general textsZhihua Zhou, Guang Chen. 853-857 [doi]
- Competitive intelligence acquisition from websitesLian Hu, Mengzhu Zhu. 858-862 [doi]
- Contextual information for image retrieval systemsChee Sheen Chan, Adel Johar, Jer-Lang Hong. 863-867 [doi]
- Integration of heterogeneous data for real world domainJer-Lang Hong. 868-872 [doi]
- OntoExtract - Automated extraction of records using multiple ontologiesJer-Lang Hong. 878-882 [doi]
- Ontological based webpage segmentationChee Sheen Chan, Adel Johar, Jer-Lang Hong, Wei Wei Goh. 883-887 [doi]
- Personalized recommendation via rank aggregation in social tagging systemsHao Wu, Yu Hua, Bo Li, Yijian Pei. 888-892 [doi]
- Towards recommendation to trust-based user groups in social tagging systemsHao Wu, Yu Hua, Bo Li, Yijian Pei. 893-897 [doi]
- A new Community Detection algorithm based on Distance CentralityLongju Wu, Tian Bai, Zhe Wang, Limei Wang, Yu Hu, Jinchao Ji. 898-902 [doi]
- A spatial data model and its application in 3D geological modelingHua Xu, Qiang Wu, ZiQiang Ma, WenYue Fei, QiuFeng Dong. 903-907 [doi]
- An analytical study on causal inductionHonghua Dai, Sarah Kenbl-Johnson. 908-913 [doi]
- Design and realization of the central heating service inspection system based on Open Source Computer Vision Library and Socket Network ProgrammingJun Cheng, Fenglian Liu. 914-918 [doi]
- An automatic recognition approach of constellation satellites' usability based on clusteringXinyuan An, Jun Chen, Yi Liu, Wei Li, Haibo Chen. 919-923 [doi]
- Human activity recognition based on silhouette analysis using Local Binary PatternsHan Su, Jiayun Zou, Wenjie Wang. 924-929 [doi]
- Remote Sensing object recognition based on transfer learningZhiping Dan, Nong Sang, Yanfei Chen, Xi Chen. 930-934 [doi]
- Robustifying cepstral features by mitigating the outlier effect for noisy speech recognitionHao-Teng Fan, Kuan-wei Hsieh, Chien-Hao Huang, Jeih-Weih Hung. 935-939 [doi]
- A multi-criteria group decision making model for performance evaluation of commercial banksLe Jiang, Hongbin Liu. 940-945 [doi]
- Assessment of uncertainty in the quality of knowledge in the research publication review processFarzad Sabetzadeh, Eric Tsui, W. B. Lee. 946-950 [doi]
- Automated urban location annotation on mobile recordsWenhao Huang, Man Li, Weisong Hu, Guojie Song, Kunqing Xie. 951-956 [doi]
- Cost sensitive GPS-based activity recognitionWenhao Huang, Man Li, Weisong Hu, Guojie Song, Xingxing Xing, Kunqing Xie. 962-966 [doi]
- Dynamic competitive analysis for tourist volume of offshore islands in TaiwanShih-Ching Lo. 967-971 [doi]
- Hierarchical destination prediction based on GPS historyWenhao Huang, Man Li, Weisong Hu, Guojie Song, Kunqing Xie. 972-977 [doi]
- Malicious code forensics based on data miningXiaohua Li, Xiaomei Dong, Yulong Wang. 978-983 [doi]
- Mining opinion and sentiment for stock return prediction based on Web-forum messagesJiangjiao Duan, Jianping Zeng. 984-988 [doi]
- Nitrogen oxide emission modeling for boiler combustion using accurate online support vector regressionJianxin Zhou, Yinxin Ji, Zongliang Qiao, Fengqi Si, Zhigao Xu. 989-993 [doi]
- Probability distribution characteristics at longitudinal time points of wind powerXiaolu Lv, Jun Liang, Feng Zhang, Bohao Sun. 994-998 [doi]
- The algorithms for the bi-level programming location model based on the demand assigningLi Kang, Yinhong Dong. 999-1004 [doi]
- Designing a big data processing platform for algorithm trading strategy evaluationXiongpai Qin, Xiaoyun Zhou. 1005-1009 [doi]
- Study on inferring interwell connectivity of injection-production system based on decision treeMaojun Cao, Fuhua Shang. 1010-1014 [doi]
- A novel bit-level image encryption scheme using hyper-chaotic systemsSuying Sheng, Xinhua Wu. 1015-1019 [doi]
- A novel chaos-based image encryption scheme using coupled map latticesXinhua Wu. 1020-1024 [doi]
- Adaptive detection of point-like targets in environment with orthogonal rejectionLong Cai, Wang Honghua, She Yajun, Luo Tao. 1025-1029 [doi]
- An edge closing method of motion segmentation based on a hybrid field snakeXiaoqing Wu, Xiang Long, Xiong Yang. 1030-1034 [doi]
- Overlapped sub-band modulation spectrum normalization techniques for robust speech recognitionHao-Teng Fan, Wei-Jeih Yeh, Jeih-Weih Hung. 1035-1039 [doi]
- Study on two mode-mixing resistant empirical Mode Decomposition methodsHongying Hu, Wenlong Li, Fengqiang Zhao. 1040-1044 [doi]
- A real-time algorithm for fixed-length short data compressionQin Li, Jin Yang, Caiming Liu. 1045-1049 [doi]
- An energy-efficient QoS routing scheme for many-to-many multicast requests in green multi-granularity transport networksXingwei Wang, Dapeng Qu, Min Huang. 1050-1054 [doi]
- Hot topic detection based on complex networksJingwei Deng, Kaiying Deng, Yongsheng Li, Yingxing Li. 1055-1059 [doi]
- How does the recursive undns algorithm affect the accuracy of an IP geolocation system?Lin Wei, Guoming Ren, Lei Shi, Yongcai Tao, Yangjie Cao. 1060-1064 [doi]
- An applicaton of the extented Kalman filter in servo motors of medical equipmentsYingjian Yang, Yan Xing, Xu Wang, Dan Yang. 1065-1069 [doi]
- A flag simulation strategy based on fusion of semantic trees in binary translationXiaonan Liu, Rongcai Zhao, Jianmin Pang, Meijuan Yin, Lili Bai, Wuping Chen. 1070-1074 [doi]
- A prediction model for Yellow River break-up dates based on extenics data miningZhong Li, Xinfang Chen, Ailing Wang, Guoqing Yu. 1075-1079 [doi]
- A theoretical study on development of Information and Communication Technology (ICT)-supported education systemsFeng Wang, Chunfang Zhou. 1080-1084 [doi]
- Emergency Management System based generation of Incident Action PlansShaobo Zhong, Fei Wang, Cheng Bi, Quanyi Huang. 1085-1089 [doi]
- Operand stack dependence based Java static software birthmarkYong Wang, Fenlin Liu, Zheng Zhao, Bin Lu, Xin Xie. 1090-1095 [doi]
- Rapid and accurate phase matching for 3D measurementHaiqing Huang, Xiangzhong Fang, Xiangyang Li, Qingchun Lu, Hang Ren. 1096-1100 [doi]
- The simulation of the boiler-turbine power system based on VC++6.0Mei Xiong, Rui Ma. 1101-1104 [doi]
- A coupled linguistics/statistical technique for query structure classification and its application to Query ExpansionBhawani Selvaretnam, Mohammed Belkhatir, Christopher H. Messom. 1105-1109 [doi]
- A novel fuzzy group decision making model for building an intelligent rating systemHei-Fong Ho. 1110-1114 [doi]
- An enhanced l-diversity privacy preservationGaoming Yang, Jingzhao Li, Shunxiang Zhang, Li Yu. 1115-1120 [doi]
- Application Camera Links on Xilinx FPGAHuaCai, Huadong Yu, Jinkai Xu, Gang Wang. 1121-1125 [doi]
- Future-oriented technology analysis of technology roadmap based on text miningChunlei Ye, Lu Feng. 1126-1130 [doi]