Abstract is missing.
- A kind of monotonic similarity measure of interval-valued fuzzy setsGuannan Deng, Lianlian Song, Yanli Jiang, Jingchao Fu. 1-4 [doi]
- A multi-indices based method for fuzzy number comparison and ranking in fuzzy decision makingXibao Zhang, Hepu Deng, Yunxu Zhou. 5-9 [doi]
- (∈, ∈ Vq)-IVIF filter on residuated latticesYi Liu, Liangming Mou, Chunzhen Zhong. 10-13 [doi]
- A study of L-fuzzy prime filters of L-fuzzy sub-latticeYuan-Liang Han, Hai-sheng Liu, Wen-Guang Yang. 14-18 [doi]
- An algorithm research of the rank of fuzzy circuitsYonghong Li, Yingjie Shi, Yanbing Liu. 19-23 [doi]
- An axiomatization of filter clusteringJoseph Muscat. 24-28 [doi]
- An evidential reasoning based multiple attribute decision making approach under fixed attributesMi Zhou, Xinbao Liu, Wen-Jing Xu, Jian-Bo Yang. 29-34 [doi]
- Approximation of fuzzy neural networks based on Choquet integralShan Cao. 35-38 [doi]
- Approximation of regular fuzzy neural networks based on Sugeno integralShan Cao. 39-43 [doi]
- Double-input single-output fuzzy systems based on non-singleton fuzzifiersHua-feng Gu, Xue-hai Yuan. 44-49 [doi]
- Fuzzy clustering algorithm-based classification of daily electrical load patternsYi Sun, Wei Gu, Jun Lu, Zenghui Yang. 50-54 [doi]
- Fuzzy implications based on Abel semigroupsYou-Mei Min, Feng Qin. 55-59 [doi]
- Fuzzy multiset finite automata: Determinism, languages, and pumping lemmaPavel Martinek. 60-64 [doi]
- Generalized local boundedness of induced I(L)-topological vector spacesHua-peng Zhang. 65-66 [doi]
- Hesitant fuzzy information aggregation with a prioritization relationship between attributesJiangang Feng, Cuiping Wei, Xijin Tang, Zhiliang Ren. 67-72 [doi]
- Improved delay-dependent stability analysis for uncertain T-S fuzzy systems with time-varying delayZejian Zhang, Dawei Wang, Xiao Zhi Gao, Kairui Cao. 73-77 [doi]
- Learning fuzzy cognitive maps using decomposed parallel ant colony algorithm and gradient descentNan Ye, Rongwei Zhang, Kena Yu, Dehong Wang. 78-83 [doi]
- Left and right distributivity for semi-t-operatorsLin Yu, Feng Qin. 84-89 [doi]
- Mining television audience rating based on Fuzzy Cognitive MapNan Ma, Hao Wang, Qin He, Tao Yao. 90-95 [doi]
- Modeling and simulations on a fuzzy- PID position controller of electro hydraulic servo systemAmanuel Tadesse, Ma Jungong. 96-103 [doi]
- Non-revision reasoning with beliefs in predicate logicSong Zhang, Ansheng Deng. 104-108 [doi]
- On (m, n)-hyperquasi-ideals of (fuzzy) hypersemigroupsQian-Qian Li, Xiang-Yun Xie. 109-112 [doi]
- On fuzzy filters of CI-algebrasWei Wang, Kuan-kuan Zhao, Yang Xu. 113-117 [doi]
- Optimization of ANFIS using Mine Blast Algorithm for predicting strength of Malaysian small medium enterprisesKashif Hussain, Mohd Najib Mohd Salleh, Abdul Mutalib Leman. 118-123 [doi]
- Optimization of water quality monitoring section based on comprehensive hierarchical clusteringSen Peng, Xiaofeng Lian, Xiaoyi Wang, Jiping Xu. 124-129 [doi]
- Performance evaluation of cloud computing providers using fuzzy multiattribute group decision making modelSrimannarayana Grandhi, Santoso Wibowo. 130-135 [doi]
- Probability fuzzy SVM for image retrievalDeshan Liu, Deqin Yan, Yonghua Tang, Shenglan Liu. 136-141 [doi]
- Pseudo-Henstock integral and its transformation theoremXiaohong Yue. 142-147 [doi]
- Quantitative analyses and development of a q-incrementation algorithm for FCM with Tsallis entropy maximizationMakoto Yasuda. 148-154 [doi]
- Ranking intuitionistic fuzzy values with the Euclidean distanceZhaojun Xing, Wei Xiong. 155-161 [doi]
- Rating alternatives from pairwise comparisons by solving tropical optimization problemsNikolai Krivulin. 162-167 [doi]
- Regularity of fuzzy measures on complete and separable metric spacesShan Cao. 168-172 [doi]
- Selection of initial weights and thresholds based on the Genetic Algorithm with the optimized Back-Propagation neural networkXiaodong Yi. 173-177 [doi]
- Sliding mode control based on the modified fuzzy RBF for uncertain chaotic systemsWenguang Yang, Yuanliang Han, Yunjie Wu, Jianmin Wang. 178-183 [doi]
- Solving fuzzy relation equations with max-continuous t-norm composition graphicallyZhong-Lin Chai. 184-189 [doi]
- The distance between fuzzy sets in fuzzy metric spacesMinxia Luo, Ze Cheng. 190-194 [doi]
- The selection of renewable energy alternative using the fuzzy multiattribute decision making methodSrimannarayana Grandhi, Santoso Wibowo. 195-200 [doi]
- Weighted Turing machines over strong bimonoidsPing Li, Yongming Li, Shengling Geng. 201-205 [doi]
- A rough set model based on Formal Concept Analysis in complex information systemsXiangping Kang, Duoqian Miao. 206-214 [doi]
- Cost minimization attribute reduction based on mutual informationFeifei Xu, Zhongqin Bi, Jingsheng Lei. 215-219 [doi]
- Generalized rough set model based on the intersection of neighborhoodsJianting Shen, Yanyong Guan, Hongkai Wang, Jilin Huang. 220-225 [doi]
- Generalized soft intuitionistic fuzzy rough sets determined by a pair of intuitionistic fuzzy implicatorsWenkai Shao, Yabin Shao. 226-230 [doi]
- Hybrid multi-granulation rough sets of variable precision based on toleranceHe Lin, Qianyi Wang, Xin Lu, Haibo Li. 231-235 [doi]
- Improving on a rapid attribute reduction algorithm based on neighborhood rough setsGongzhen Guo, Zunren Liu, Chang Lou, Xiaoxiao Song. 236-240 [doi]
- Multi-users S-rough sets model based on three-way decisionsLuyun Xu, He Lin, Qianyi Wang, Haibo Li. 241-245 [doi]
- Rough operations and uncertainty measures on R0-algebras (nilpotent minimum algebras)Xia Wu, Xiaoling Liu, Li Zhou, Jialu Zhang. 246-252 [doi]
- Stochastic Processes-based Rough Set Approach Involving Monotonic Variable Consistency MeasuresWenBin Pei, He Lin. 253-258 [doi]
- Upper and lower approximations of general aggregation operators based on fuzzy rough setsSvetlana V. Asmuss, Pavels Orlovs. 259-263 [doi]
- Compositions of generalized fuzzy matrices over inclinesJing Jiang, Xin-an Tian. 264-268 [doi]
- Independent component analysis based blind source separation algorithm and its application in the gravity and magnetic signal processingNian Zhang, Jing Nie. 269-273 [doi]
- Parallelizing abnormal event detection in crowded scenes with GPUMohammadreza Yavari, Maozhen Li, Siguang Li, Man Qi. 274-277 [doi]
- Rough-set rule induction to build fuzzy time series model in forecasting stock priceChing-Hsue Cheng, Jun-He Yang. 278-284 [doi]
- Automatic Brain Tumor Segmentation in multispectral MRI volumes using a fuzzy c-means cascade algorithmLászló Szilágyi, László Lefkovits, Balázs Benyó. 285-291 [doi]
- EEG recognition through Time-varying Vector Autoregressive ModelHuan Wang, Lun Bai, Jianmei Xu, Wanchun Fei. 292-296 [doi]
- Effective handwritten digit recognition based on multi-feature extraction and deep analysisCaiyun Ma, Hong Zhang. 297-301 [doi]
- Fuzzy c-means clustering identification method of urban road traffic stateGuang-Yu Zhu, Jianjun Chen, Peng Zhang. 302-307 [doi]
- Fuzzy Petri net based dynamic risk analysis of complex system considering protection layersJinqiu Hu, Yaqin Cao. 308-312 [doi]
- Network traffic classification for anomaly detection fuzzy clustering based approachJulija Asmuss, Gunars Lauks. 313-318 [doi]
- A GA-fuzzy logic based extended Kalman filter for mobile robot localizationHaijiang Wang, Wenhong Liu, Fugui Zhang, Simon X. Yang, Lin Zhang. 319-323 [doi]
- Direct adaptive fuzzy sliding mode control for a class of non-affine discrete nonlinear systemsXiaoyu Zhang, Wenzhuo Chen, Bin Shen. 324-329 [doi]
- Fuzzy direct torque control of permanent magnet synchronous motorsYimin Zhao, Zhigong Huang. 330-334 [doi]
- Fuzzy inference modeling method of time-varying system based on T-S fuzzy systemXiaoshen Li, Xuehai Yuan, Mingzuo Jiang, Chunling Zhang. 335-339 [doi]
- Indoor path planning for hex-rotor aircraft with landmark-based visual navigationTianwei Shi, Hong Wang, Wenhua Cui, Ling Ren. 340-344 [doi]
- Mamdani and Takagi-Sugeno fuzzy controller design for ship fin stabilizing systemsWen-Jer Chang, Feng-Ling Hsu. 345-350 [doi]
- Stability analysis of T-S fuzzy PD, PI, and PID control systemsKairui Cao, X. Z. Gao, Xing Wang, H. K. Lam, Jing Ma. 351-355 [doi]
- Temperature control system of high-precision electromechanical gyroXiao-tong Zhou, Dong-Mei Li, Rong Zhang. 356-361 [doi]
- The generalized interactive force calculation for the helmet mounted display with the 6URHS parallel manipulatorPeng Li, Dongsu Wu. 362-368 [doi]
- An improved multilevel banded graph cuts method for extracting colon tissueWei He, Liyuan Zhang, Huamin Yang, Zhengang Jiang, Weili Shi, Yu Miao, Fei He, Fei Yan, Huimao Zhang. 369-374 [doi]
- Face occlusion detection based on multi-task convolution neural networkYizhang Xia, Bailing Zhang, Frans Coenen. 375-379 [doi]
- An improved edge detection algorithm based on fuzzy theoryLongtao Zhang, Yuqiu Sun, Fushan Chen. 380-384 [doi]
- Measure of texture dynamics with fuzzy metric entropyTuan D. Pham. 385-390 [doi]
- A class of decentralized bi-level programming with multi-objectives in the upper levelXiaoyang Zhou, Yan Tu, Ruijia Hu, Benjamin Lev. 391-396 [doi]
- A new formulation for multi-modal shortest path problem with fuzzy arc travel timesYan Zhang, Li Wang. 397-401 [doi]
- Accurate similarity analysis and computing of Gaussian membership functions for FNN simplificationWei Li, Junfei Qiao, Xiao-Jun Zeng. 402-409 [doi]
- Adaptive backstepping controller design for hypersonic vehiclesQiang Zhi, Yong Han, Jianying Song, Jie Peng, Yuhao Shen. 410-414 [doi]
- Confidence value prediction of DNA sequencing with fuzzy colored Petri net modelXiaozhong Li, Yong Li, Ying Liu, Long Wang. 415-420 [doi]
- Fuzzy ingredient production operation optimization modelGuoqiang Yuan, Zhengran Zhan, Can Cao. 421-425 [doi]
- Fuzzy logic approach for the prediction of the lifetime of epoxy insulatorsN. Ghamry, L. S. Nasrat. 426-432 [doi]
- Fuzzy setting of cost Index for improved flight managementMario Garcia-Munoz Sanchez-Camacho, Hongying Wu, Carlos Alberto Nunes Cosenza, Fabio Krykhtine, Félix Mora-Camino. 433-438 [doi]
- Group decision method for internet public opinion emergency with linguistic preferenceQiansheng Zhang, Xinmeng Zhang. 439-443 [doi]
- Hierarchical structure and particular spanning trees of edge-bound growing network modelsXiaomin Wang, Bing Yao, Fei Ma, Jing Su, Xiangen Chen, Ming Yao. 444-449 [doi]
- A fuzzy multiple attribute decision making method based on possibility degreeZhi-Ying Lv, Xi-Nong Liang, Xue-Zhang Liang, Li-Wei Zheng. 450-454 [doi]
- An EM approach to blind Kriging with adaptive mean for surrogate modelingHai-Song Deng, Fang Gong, Ju-Hua Shen. 455-459 [doi]
- Virtual Label Constraint Nonnegative Matrix FactorizationXiaobing Pei, Changqing Chen, Weihua Gong. 460-464 [doi]
- Integrating fuzzy AHP and GIS to prioritize sites for the solar plant installationRajiv Guptha, Harish Puppala, Shalini Kanuganti. 465-470 [doi]
- Portfolio selection models in uncertain environmentWei Li, Weiyi Qian, Mingqiang Yin. 471-475 [doi]
- Probabilistic Fuzzy Bayesian NetworkGabriel Moura, Mauro Roisenberg. 476-482 [doi]
- A new representation of statistical language modelZhenjun Yue, Siyuan Gu, Chanzhen Rong, Yuan Wang. 483-488 [doi]
- A risk evaluation method for the scientific cognitive value deviation due to irrational factorsXiangwu He, Wenyong Zhou, Li Shen. 489-495 [doi]
- Applying utility representative function for fuzzy analytic hierarchy processYu-Jie Wang, Chen-Lin Fang, Tzeu-Chen Han, Ming-Tao Chou. 496-500 [doi]
- By using grey system and Neural-Fuzzy Network methods to obtain the threshold voltage of submicron n-MOSFET DUTsShen-Li Chen, Dun-Ying Shu. 501-505 [doi]
- Daily runoff time-series prediction based on the adaptive neural fuzzy inference systemQiaofeng Tan, Xu Wang, Siyu Cai, Xiaohui Lei. 506-512 [doi]
- Energy-efficient cluster-head selection with fuzzy logic for robotic fish swarmYan Shen, Bing Guo. 513-518 [doi]
- False positive elimination in intrusion detection based on clusteringLiang Hu, Taihui Li, Nannan Xie, Jiejun Hu. 519-523 [doi]
- Fuzzy association rules vs fuzzy associative patterns in defending against web service attacksGaik-Yee Chana, Fang-Fang Chuaa, Chien-Sing Leeb. 524-529 [doi]
- Fuzzy comprehensive evaluation on food safety culture level in enterpriseJing Mu, Qing Li. 530-534 [doi]
- Fuzzy measurement considering one-ballot vote and its application to investment project preliminary evaluationsFengcai Ma, Yue Zhang. 535-539 [doi]
- Hesitant fuzzy soft sets and their applications in decision-makingChen Bin, Guan YanYong. 540-546 [doi]
- Invertible singleton fuzzy models: application to petroleum production control systemsMiguel Angel Ramirez Canelón, Eliézer Colina Morles, Mariela Cerrada-Lozada. 547-552 [doi]
- Multi-attribute group decision making for weapon system selection based on intuitionistic fuzzy valuesShanliang Yang, Mei Yang, Rusheng Ju, Kedi Huang. 553-558 [doi]
- Nonlinear feedback control based on ANFISXiujia Chen, Xianku Zhang. 559-563 [doi]
- Reliability evaluation of household appliance protection system based on fuzzy fault tree analysisHung-Lu Wang. 564-569 [doi]
- Route evaluation for outsize cargo highway transportation based on linguistic valuesChuanhua Zeng, Ai Jin. 570-573 [doi]
- Team performance prediction based on an evolutionary algorithmNi Li, Wenqing Huai, Jing Gong, Xiang Li. 574-579 [doi]
- The control method of Acceleration Simulation Mode emissions detection systems based on Fuzzy proportional-integral-derivative controlHongmei Shan, Huanfeng Liu, Libin Zhang, Fuqi Li, Qifeng Liu. 580-584 [doi]
- The core competitiveness analysis of express enterprises based on dynamic fuzzy evaluationWenyong Zhou, Ke Du. 585-589 [doi]
- The stability of a quadratic functional equation over fuzzy normed spaces of non-ArchimedeanSanfu Wang, Chun Qi, Yonghong Shen, Baoli Xie. 590-594 [doi]
- A framework for mining spatial high utility co-location patternsShisheng Yang, Lizhen Wang, Xuguang Bao, Junli Lu. 595-601 [doi]
- An algorithm for extension of clausal beliefsQian Guo, An-sheng Deng. 602-606 [doi]
- An efficient algorithm unifying MHT and Multiple Model approachesWeihua Liu, Yongjia Zhao, Xiaoyong Lei. 607-611 [doi]
- Incremental mining of co-locations from spatial databaseJunli Lu, Lizhen Wang, Qing Xiao, Yu Shang. 612-617 [doi]
- Maintenance of multi-level association rules discovery in dynamic database under a change of support thresholdNophadon Pumjun, Worapoj Kreesuradej. 618-623 [doi]
- A new validation method of fuzzy association rules based on the Structural Equation ModelingImen Mguirris, Hamida Amdouni, Mohamed Mohsen Gammoudi. 624-633 [doi]
- Personalized news recommendation based on consumers' click behaviorYuqi Wang, Wenqian Shang. 634-638 [doi]
- Redundancy rules reduction in rule-based knowledge basesYongjie Zhang, Ansheng Deng. 639-643 [doi]
- A robust radar emitter signals recognition algorithm based on Cauchy random projectionZhiwen Zhou, Gaoming Huang, Jun Gao. 644-648 [doi]
- Analysis of the equipment maintainability qualitative evaluation index based on interpretive structure modelingQin Li, Desuo Huang, Fenmei Wang, Yingying Zheng, Jun Li, Debing Yan. 649-653 [doi]
- AOSA-LogistBoost: Adaptive One-Vs-All LogistBoost for multi-class classification problemsKaiyuan Wu. 654-662 [doi]
- Chinese text sentiment orientation identification based on Chinese-charactersQiujun Lan, Weikang Li, Wenxing Liu. 663-668 [doi]
- Classification of muscle fatigue using surface electromyography signals and multifractalsKiran Marri, Ramakrishnan Swaminathan. 669-674 [doi]
- Content-based SMS spam filtering based on the Scaled Conjugate Gradient backpropagation algorithmWaddah Waheeb, Rozaida Ghazali, Mustafa Mat Deris. 675-680 [doi]
- Feature selection for text classification based on part of speech filter and synonym mergeSijun Qin, Jia Song, Pengzhou Zhang, Yue Tan. 681-685 [doi]
- Feature selection technology based on sample unbiased evaluationHuaiguang Liu, Jianyi Kong, Xingdong Wang, Yuanjiong Liu. 686-691 [doi]
- Minimum Information Quantity Partition based fast semantic feature subset selectionDonglin Cao, Yanping Lv, Dazhen Lin. 692-699 [doi]
- Multiple feature fusion based image classification using a non-biased multi-scale kernel machineHongqiao Wang, Guangyuan Fu, Yan-Ning Cai, Shicheng Wang. 700-704 [doi]
- Remote sensing image feature selection based on rough set theory and multi-agent systemJian Zhao, Xin Pan. 705-709 [doi]
- Short Text Classification based on feature extension using The N-Gram modelXinwei Zhang, Bin Wu. 710-716 [doi]
- The bag-of-visual-words scene classifier combining local and global features for high spatial resolution imageryQiqi Zhu, Yanfei Zhong, Bei Zhao, Gui-Song Xia, Liangpei Zhang. 717-721 [doi]
- The random forest classifier applied in droplet fingerprint recognitionQing Song, Xiaoou Liu, Lu Yang. 722-726 [doi]
- A validity study for Yes/No Angoff standard setting method using cluster analysisFen-Lan Tseng, Jia-Min Chiou, Yao-Ting Sung. 727-731 [doi]
- An algorithm for overlapping community detection in complex networkYongliang Wu, Li He, Guanghui Yan, Fanglin Guo, Weitao Zheng, Abdul Basit Khan. 732-738 [doi]
- An evolutionary clustering method for arbitrary shaped data setsCong Liu, Chunxue Wu. 739-743 [doi]
- Clustering analysis in the evaluation of securities investment fundsJieqiong Zhang, Kongyu Yang. 744-749 [doi]
- Incremental learning based on the nearest neighbor classifierSunfu Liu, Qing Ye, Xiang Liu. 750-754 [doi]
- Semantic facial description via axiomatic Fuzzy Set based clusteringQilin Li, Yan Ren, Wanquan Liu, Ling Li. 755-762 [doi]
- An analysis of anonymity on capacity finite social spots based pseudonym changing for location privacy in VANETsDong Wang, Deshu Li, Xiaohong Li, Zhu Xiao. 763-767 [doi]
- Group representation-based classificationNingbo Zhu, Lei Wei, Ting Xu. 768-772 [doi]
- Preserving network privacy with a hierarchical structure approachLiang Chen, Peidong Zhu. 773-777 [doi]
- Wind power forecasting based on a Markov chain model of variationJingwen Sun, Zhihao Yun, Jun Liang, Ying Feng, Tianbao Zhang. 778-782 [doi]
- Predicting and testing probability of continuous purchasing of online customersBo Hsiao, LihChyun Shu, Shu-Jeng Hsieh. 783-788 [doi]
- An application of undergraduate academic growth path on the credit system based on data miningJun Tao, Gui Wu. 789-794 [doi]
- Ensemble unsupervised feature selection based on permutation and R-valueXiaomei Wang, Xiaohui Lin, Xin Huang, Yuansheng Yang. 795-800 [doi]
- Exploring similarity between academic paper and patent based on Latent Semantic Analysis and Vector Space ModelHongjiao Xu, Wen Zeng, Jie Gui, Peng Qu, Xiaohua Zhu, Lijun Wang. 801-805 [doi]
- Human dynamics in mobile social networks: A study of inter-node relationshipsZhiting Lin, Chunyu Peng, Xiulong Wu, Xiufang Jiang. 806-810 [doi]
- SAPNSP: Select actionable positive and negative sequential patterns based on a contribution metricChuanlu Liu, Xiangjun Dong, Caoyuan Li, Yan Li. 811-815 [doi]
- Using hidden markov model for dynamic malware analysis: First impressionsMohammad Imran, Muhammad Tanvir Afzal, Muhammad Abdul Qadir. 816-821 [doi]
- Correlation-Model-Based Data Aggregation in wireless sensor networksChang Liu, Juan Luo, Yanchao Song. 822-827 [doi]
- Toward a collaborative method for knowledge management of software architectural decisions based on trustMarzie Samghani Nejad, Shahrouz Moaven, Jafar Habibi, Razie Alidousti. 828-834 [doi]
- A content-based image retrieval method based on manifold learningJin Shi, Lukui Shi, Xiaoteng Gong, ShengLi Shi. 835-842 [doi]
- A novel word reordering method for statistical machine translationShuo Zang, Hai Zhao, Chunyang Wu, Rui Wang. 843-848 [doi]
- A quality assessment model for unmanned aerial vehicle path planning based on Bayesian NetworksHong-xia Xia, Yan-en Chen, Yong-fei Miao, Rui-qi Luo. 849-853 [doi]
- An approach to classify visual semantic based on visual encoding with the convolutional neural networkZaizhou Zheng, Haibing Bu, Wenjie He, Li Tong, Bin Yan, Linyuan Wang. 854-858 [doi]
- An improved BP neural network model for estimating Cd stress in rice using remote sensing dataJiale Jiang, Xiangnan Liu, Zhao Xu, Ming Jin, Feng Liu. 859-863 [doi]
- Conditional functional dependency discovery and data repair based on decision treeChunsheng Zhang, Yufeng Diao. 864-868 [doi]
- E-government decision support system based on case-based reasoning and ontologyCong-cong Xiong, Lan-ting Wang, Xin Tao, Ying Deng. 869-873 [doi]
- Exploiting clause boundary information as features for Chinese functional chunk parsingYiou Zhao, Tiejun Zhao. 874-878 [doi]
- Fog computing-based intelligent inference performance evaluation system integrated internet of thing in food cold chainRui-Yang Chen. 879-886 [doi]
- Homomorphisms between the covering information systemsZengtai Gong, Runli Chai, Yongping Guo. 887-891 [doi]
- How to reduce the false alarm rate beyond voting system for financial distress predictionJao-Hong Cheng, Li-Wei Lin, Liang-Chien Lee, Jing-Han Chang. 892-897 [doi]
- Metric learning for image steganalysisGuoming Chen, Qiang Chen, Dong Zhang. 898-902 [doi]
- Multigranulation with different grades rough set in ordered information systemJianhang Yu, Weihua Xu. 903-908 [doi]
- On complex hybrid flexible flowshop scheduling problems based on constraint programmingJinlian Zhou, Ying Guo, Guipeng Li. 909-913 [doi]
- On extending kernel-based interior point algorithms for linear programming to convex quadratic second-order cone programmingYanfang Li, Xibo Duan, Jia Gu. 914-919 [doi]
- Optimal dual frames for uniform frames with erasuresFang Shuai, Jingsong Leng, Qing Gao, Jianbo Li. 920-924 [doi]
- Rapid trajectory planning for hypersonic vehiclesYang Liu, Yu Xie, Jing Chen, Liang Pan, Nan Wang. 925-929 [doi]
- Robust object tracking using color and depth images with a depth based occlusion handling and recoveryPing Ding, Yan Song. 930-935 [doi]
- Robust train timetabling problem with optimized train stop planJianguo Qi, Lixing Yang, Yuan Gao, Shukai Li. 936-940 [doi]
- Optimal scheduling of power system using harmony search algorithmRen Ping, Li Nan. 941-945 [doi]
- Team formation in social networks based on local distance metricBahareh Ashenagar, Negar Foroutan Eghlidi, Ardavan Afshar, Ali Hamzeh. 946-952 [doi]
- Text detection in medical images using local feature extraction and supervised learningYu Ma, Yuanyuan Wang. 953-958 [doi]
- Virtual label constraint Nonnegative Matrix FactorizationXiaobing Pei, Changqing Chen, Weihua Gong. 959-963 [doi]
- A new limited tolerance relation for attribute selection in incomplete information systemsMustafa Mat Deris, Zailani Abdullah, Rabiei Mamat, Youwei Yuan. 964-970 [doi]
- A note on weights vector of ordered weighted averaging aggregationYao Ouyang. 971-975 [doi]
- F̄-ladder knowledge and F̄-hiding knowledge discoveryXiumei Hao, Tongtong Ren, Yanli Zhang. 976-982 [doi]
- PADP: A parallel data possession audit model for cloud storageLei Yang, Kui Xu, Shi Liu. 983-988 [doi]
- A novel rainfall forecast model based on integrated non-linear attributes selection method and support vector regressionJun-He Yang, Ching-Hsue Cheng. 989-994 [doi]
- Connected bit minwise hashing for large-scale linear SVMJingjing Tang, Yingjie Tian, Dalian Liu. 995-1002 [doi]
- Disease risk rule analysis of the New Rural Cooperative Medical SystemHongpu Hu, Tao Dai, Yanli Wan, Chen Quan, Yan Wang. 1003-1008 [doi]
- Fuzzy rule-based analysis of spatio-temporal ATM usage data for fraud detection and preventionBetul Ekizoglu, Ayhan Demiriz. 1009-1014 [doi]
- Well logging curve reconstruction based on Genetic Neural NetworksXiuwen Mo, Qiang Zhang, Xiao Li. 1015-1021 [doi]
- A statistical model for predicting power demand peaks in power systemsXiangdong An, Nick Cercone. 1022-1026 [doi]
- An efficient method for motif discovery in CPU host loadZhuoer Gu, Ligang He, Cheng Chang, Jianhua Sun, Hao Chen, Chenlin Huang. 1027-1034 [doi]
- An improved object tracking based on spatial contextBo Xu, Zhenhai Wang. 1035-1039 [doi]
- Empirical studies on Symbolic Aggregation approximation under statistical perspectives for knowledge discovery in time seriesWei Song, Zhiguang Wang, Yangdong Ye, Ming Fan. 1040-1046 [doi]
- Feature selection and knowledge extraction from buppu 2000 and 2010 censuses using artificial intelligenceSubana Shanmuganathan, Li Yan. 1047-1054 [doi]
- Incorporating temporal smoothness and group structure in learning with incomplete dataXiabing Zhou, Lei Han, Xingxing Xing, Haikun Hong, Wenhao Huang, Kaigui Bian, Kunqing Xie. 1055-1060 [doi]
- Modeling non-stationary stochastic systems with generalized time series modelsJingwen Zhang, Li Chen, Pan Qin. 1061-1067 [doi]
- Predicting the influence of group buying on the restaurant's popularity by online reviewsJiawei Chen, Hongyan Liu, Jun He. 1068-1072 [doi]
- Prediction of road resistance based on historical/real-time information and road qualityQihui Qin, Meiling Feng, Junqing Sun, Bin Sun. 1073-1077 [doi]
- Quantifying temporal-spatial variability of land-surface temperature anomalies using DP-based algorithmNini Wang, Jun Xiaa, Jianchuan Yin. 1078-1084 [doi]
- Statistical analysis and data processing: A case study of employment effects of minimum wagesQiong Wang. 1085-1090 [doi]
- A dictionary-based approach to identify biomedical conceptsLejun Gong, Jie Yan, Jiacheng Feng, Ronggen Yang. 1091-1095 [doi]
- A hybrid prediction model applied to diarrhea time seriesYongming Wang, Junzhong Gu. 1096-1102 [doi]
- A solution to phylogeny assembly for ecologistsZhen Meng, Jianhui Li, Zhiduan Chen. 1103-1107 [doi]
- Age-variation face recognition based on bayes inferenceYa Su, MengYao Wang, Hong Bao. 1108-1112 [doi]
- An image reconstruction strategy for truncated projections of planar object in cone-beam CTFeng Zhang, Bin Yan, Lei Li, Xiaoqi Xi, Hua Jiang, Siyu Chen, Jinxian Cui, Dan Cong, Ying Tian. 1113-1117 [doi]
- Clustering consistency in neuroimaging data analysisChao Liu, Basel Abu-Jamous, Elvira Brattico, Asoke K. Nandi. 1118-1122 [doi]
- Combining SENSE and compressed sensing MRI With a fast iterative contourlet thresholding algorithmJinpeng Zhou, Jianwu Li, Jean Claude Gombaniro. 1123-1127 [doi]
- Discovery of neighborhood relationships and regulatory patterns between breast cancer and inflammatory genes based on human co-expressed regulatory networkYanyan Zhou, Wan Li, Lina Chen, Liangcai Zhang, Yuehan He, Junjie Lv, Ruiqiang Xie, Jing Jiang, Binbin Chen, Hao Huang, Yiran Li. 1128-1135 [doi]
- Dual-tree complex wavelet transform-based feature extraction for brain computer interfacePing Tan, Guanzheng Tan, Zixing Cai. 1136-1140 [doi]
- Effects of phonology and meaning on processing Chinese Sign Language sentencesDengfeng Yao, Minghu Jiang, Abudoukelimu Abulizi. 1141-1145 [doi]
- Genetic or non-genetic prognostic factors in colon cancerJie Zhang, Meng Pan. 1146-1150 [doi]
- Medical image clustering algorithm based on graph entropyYu Zhan, Haiwei Pan, Qilong Han, Xiaoqin Xie, Zhiqiang Zhang, Xiao Zhai. 1151-1157 [doi]
- Optimal thigh dip angle reduction by acceleration and angular velocity sensingZheng Fang, Tao Yu, Luhui Chen, Siyuan Chen, Chao Wang. 1158-1163 [doi]
- Orthogonal bipolar vectors as multilayer perceptron targets for biometric pattern recognitionJosé Ricardo Gonçalves Manzan, Shigueo Nomura, Keiji Yamanaka. 1164-1170 [doi]
- Pathway enrichment analysis of Dang-gui for hematopoiesisGuang Zheng, Juping Chen, Lingru Wang, Ruimin Qin, Xi Zhang, Kanni Gao. 1171-1175 [doi]
- Revealing control mechanism from multifractal analysis on physiological signalsNewman M. L. Lau, Clifford S. T. Choy, Daniel H. K. Chow. 1176-1182 [doi]
- Forecasting stock return using multiple information sources based on rules extractionJiangjiao Duan, Jianping Zeng. 1183-1188 [doi]
- Lotus: A framework for query optimization based on distributed cacheChaoyong Li, Gong Cheng, Jinwen Zhong, Can Ma, Weiping Wang, Dan Meng, Qing Wang, Bo Wang. 1189-1196 [doi]
- The crawling and analysis of agricultural products big data based on JsoupJie Wang, Shuo Yang, Yuezhi Wang, Cheng Han. 1197-1202 [doi]
- Differential snapshot algorithms based on Hadoop MapReduceWei Du, Xianxia Zou. 1203-1208 [doi]
- Improve the effectiveness of keyword search over relational database by node-temperature-based ant colony optimizationZiyu Lin, Yuqian Li, Yongxuan Lai. 1209-1214 [doi]
- The implementation of flash-aware buffer replacement algorithms in PostgreSQLZhengdong Xia, Tianming Bu. 1215-1219 [doi]
- An expert recommendation approach combining project correlation and professional abilityMei Yan, Zhengtao Yu, Yunshan Zhang, Xudong Hong, Hua Lai. 1220-1224 [doi]
- Graph-based prostate extraction in T2-weighted images for prostate cancer detectionWeiwei Du, Shiyang Wang, Aytekin Oto, Yahui Peng. 1225-1229 [doi]
- Keyword search over probabilistic XML dataYue Zhao, Guoren Wang, Ye Yuan, Junxia Wang, Chungang Lin, Ying Yu. 1230-1235 [doi]
- A computational foundation for affective analysis of social imagesXiaohui Wang, Jingyan Qin. 1236-1242 [doi]
- A new effective wearable hand gesture recognition algorithm with 3-axis accelerometerZhe Ji, Zhi-Yi Li, Peng Li, Maobo An. 1243-1247 [doi]
- A novel objective quality assessment method of 3D videoYunong Wei, Yi Qu, Yuan Zhang. 1248-1252 [doi]
- A two-phase method based on virtual test samples and face recognition experimentsTing Xu, Ningbo Zhu. 1253-1257 [doi]
- Adaptive 3D facial deformation based on personal characteristicsJia Li, Yue Zhang, Pin Xu, Shanzhen Lan, Shaobin Li. 1258-1262 [doi]
- Adding the sentiment attribute of nodes to improve link prediction in social networkShaoliang Shi, Yunpeng Li, Yimin Wen, Wu Xie. 1263-1269 [doi]
- An improved algorithm based on texture feature extraction for image retrievalHe Zhang, Xiuhua Jiang. 1270-1274 [doi]
- Computer-aided design bitmap retrieval methods based on shape featuresYuan Yin, Shengxiang Gao, Zhengtao Yu, Yunshan Zhang. 1275-1279 [doi]
- Context-based image semantic similarityValentina Franzoni, Alfredo Milani, Simonetta Pallottelli, Clement H. C. Leung, Yuanxi Li. 1280-1284 [doi]
- Fast image search with deep convolutional neural networks and efficient hashing codesJun-Yi Li, Jian-hua Li. 1285-1290 [doi]
- Fusion of multi-features for Mongolian part of speechCongjiao Xie, Hongxu Hou, Jing Wu. 1291-1295 [doi]
- Investigating the stability of fast iterative shrinkage thresholding algorithm for MR imaging reconstruction using compressed sensingGuishan Zhang, Haitao Deng, Yaowen Chen, Zhiwei Shen, Renhua Wu. 1296-1300 [doi]
- Medical image classification method based on the KAP directed graph modelPing Wu, Haiwei Pan, Linlin Gao, Qilong Han, Xiaoqin Xie, Xiaoning Feng. 1301-1306 [doi]
- Multi-index hashing with repeat-bits in hamming spaceManlin Wang, Xiaokang Feng, JiangTao Cui. 1307-1313 [doi]
- Object recognition with image set based on kernel information entropyAnping Yang, Songqiao Chen. 1314-1318 [doi]
- Query-by-example spoken term detection using bottleneck feature and Hidden Markov modelXue Liu, Wu Guo, Niansong Wang. 1319-1323 [doi]
- Real-time 3D facial expression control based on performanceChen Chen, Yue Zhang, Pin Xu, Shanzhen Lan, Shaobin Li, Yichun Zhang. 1324-1328 [doi]
- The drive fatigue pattern monitor for haul truck drivers in surface mining operationsEnji Sun, Antonio Nieto, Quanming Li. 1329-1334 [doi]
- Traffic sign detection and classification for Advanced Driver Assistant SystemsYanjun Fan, Weigong Zhang. 1335-1339 [doi]
- A deep web query interface discovery methodBo Liu, Zhenxing Li. 1340-1344 [doi]
- A Java-based knowledge mapping modelYajun Song, Tianzhong Zhao. 1345-1349 [doi]
- An approach to automatic summarization for Chinese text based on the combination of spectral clustering and LexRankKang Wu, Ping Shi, Da Pan. 1350-1354 [doi]
- An entity-centric query expansion approach to cumulative citation recommendation in Knowledge Base accelerationChunyan Xie. 1355-1359 [doi]
- An improved method based on the recursive shingling algorithmYong Yao, Lei Peng, Bian Li. 1360-1365 [doi]
- An improved sentiment analysis algorithm for Chinese newsYu Huangfu, Guoshi Wu, Yu Su, Jing Li, Pengfei Sun, Jie Hu. 1366-1371 [doi]
- Automatic term extraction for chinese opera domain ontologyAnqi Guan, Yongbing Wang, Lifang Yang. 1372-1376 [doi]
- Benchmarking Social Responsibility perceptions: A text-based approachJui-Lin Yeh, Pin-Chao Liao. 1377-1381 [doi]
- GDC: An efficient tag recommendation algorithmYing Yin, Yuhai Zhao, Bin Zhang. 1382-1387 [doi]
- Emergency management training: Making sense of rich qualitative dataKnut Ekker. 1388-1393 [doi]
- Emotion recognition for sentences with unknown expressions based on semantic similarity by using Bag of ConceptsKazuyuki Matsumoto, Minoru Yoshida, Qingmei Xiao, Xin Luo, Kenji Kita. 1394-1399 [doi]
- Examining influences of publication dates on citation recommendation systemsZequn Gao. 1400-1405 [doi]
- Fine-grained sentiment analysis of online reviewsYan Wan, Hongzhurui Nie, Tianguang Lan, Zhaohui Wang. 1406-1411 [doi]
- Identifying related users in Weibo platformLin Xu, Xin Xu, ChengLong He, Shiqiang Zong. 1412-1417 [doi]
- Keywords based temporal sentiment analysisNishantha Medagoda, Subana Shanmuganathan. 1418-1425 [doi]
- Lao Named Entity Recognition based on conditional random fields with simple heuristic informationMengjie Yang, Lanjiang Zhou, Zhengtao Yu, Shengxiang Gao, Jianyi Guo. 1426-1431 [doi]
- Mining a microblog network on anti-corruption news with Social Network AnalysisYihong Rong, Eryu Xu, Nan Li. 1432-1436 [doi]
- Mining multiplex power-law distributions and retweeting patterns on twitterBin Jiang, Lei Wang, Chao Yang, Renfa Li. 1437-1443 [doi]
- Pattern-based rule disambiguationJie Zheng, Gang Cheng, Shoushan Li, Fang Kong, Chu-Ren Huang, Guodong Zhou. 1444-1449 [doi]
- Prediction of influenza epidemics at the province level in China using search query from "Haosou"Yuanqiang Zou, Yousong Peng, Li Lu, Taijiao Jiang, Lizong Deng. 1450-1454 [doi]
- Query construction based on concept importance for effective patent retrievalFeng Wang, Lanfen Lin. 1455-1459 [doi]
- Selecting expansion terms based on path-constrained term-relationship graphsBo Zhang, Bin Zhang, Shubo Zhang, Daming Sun. 1460-1464 [doi]
- The follow relationship model of social networks: Construction and visualizationXiaohui Xu, Xiaoyu Yang. 1465-1469 [doi]
- Topical text network construction based on seed word augmentationZhiyuan Zhang, Hengpan Xu, Weigang Huo. 1470-1474 [doi]
- UPCA: An efficient URL-Pattern based algorithm for accurate web page classificationYiming Yang, Lei Zhang, Guiquan Liu, Enhong Chen. 1475-1480 [doi]
- Using link and content to detect social communitiesQiuling Yan, Baoli Li, Dongqing Yang. 1481-1486 [doi]
- Word similarity computation based on HowNetMengjia Fan, Yangsen Zhang, Jiayuan Li. 1487-1492 [doi]
- An improved algorithm for community discovery in social networks based on label propagationRu Zhang, Zongwei Ren. 1493-1497 [doi]
- Comparison of three different measures for curve saliencyXiao-fang Shao, Cui-juan Sun. 1498-1502 [doi]
- SQNR: A System for Querying Nodes and relations in multi-relational social networksZidong Zhang, Lihua Zhou, Lizhen Wang, Hongmei Chen, Peizhong Yang. 1503-1507 [doi]
- Building data warehouses based on mine-production geoontologyXin-rui Liu, Guo-ping Lei, Feng-yu Ren, Hong-Bin Ma. 1508-1513 [doi]
- A high-order sliding mode stator flux observer for asynchronous motor based on feedback linearizationYuedou Pan, Tao Chen. 1514-1518 [doi]
- A highway vehicle detection method based on the improved visual background extractorPeng Wei, Xiaobo Lu, Tao Tang, Cong Li, Jiaji Song. 1519-1524 [doi]
- A solution of anonymous email identification based on writing structural patternYiyun Zhang, Yanhua Liu, Guolong Chen. 1525-1531 [doi]
- Anomaly detection boundary based on the moving averages of Markov chain modelDeqiang Chen. 1532-1536 [doi]
- Bhattacharyya distance and confidence map based feature selection for Common spatial patterns algorithms in brain computer interfaceHongyu Sun, Lijun Bi, Binghui Fan, Bisheng Chen, Yinjing Guo. 1537-1542 [doi]
- Detecting defects on citrus surface based on circularity threshold segmentationJun Lu, Pengfei Wu, Jiwei Xue, Ming Qiu, Fan Peng. 1543-1547 [doi]
- Fault detection in distributed transactions based on extended pi-calculusHui Kang, Xue Xing, Xue Wang, Feng Qiu. 1548-1555 [doi]
- Hearing environment recognition in hearing aidsWeihao Zeng, Ming Liu. 1556-1560 [doi]
- Hierarchical speaker verification: Kernel fisher discriminant plus Mixed-PCA classifier and FCM clusteringPing Tan, Yujuan Xing. 1561-1565 [doi]
- Improving OCR performance with background image eliminationMande Shen, Hansheng Lei. 1566-1570 [doi]
- Joint selection of time and frequency segments for classifying multiclass EEG data in motor imagery based BCIsRenxiang Han, Qingguo Wei. 1571-1576 [doi]
- Kernel optimization strategy based on mean shiftZhiqiang Wen, Zhigao Zeng, Wenqiu Zhu. 1577-1582 [doi]
- Long-term drift compensation algorithms based on the kernel-orthogonal signal correction in electronic nose systemsHang Liu, Renzhi Chu, Jian Ran, Jinhui Xia. 1583-1587 [doi]
- Optimize parameter K in locally linear embedding based on spatial distributionsTao Peng, Xian Yang. 1588-1595 [doi]
- A cabin crew fatigue risk comprehensive evaluation modelWei Li. 1596-1600 [doi]
- The mean shift tracking algorithm with adaptive bandwidth based on affine transformationLixia Lv, Chenghan Yan. 1601-1606 [doi]
- A feature-oriented modeling approach for embedded product line engineeringGuanzhong Yang, Yaru Zhang. 1607-1612 [doi]
- A forensic analysis solution of the email network based on email contentsLili Xie, Yanhua Liu, Guolong Chen. 1613-1619 [doi]
- A new automatic knowledge extraction method for course documents applied in the web-based teaching systemMingya Wang, Jun Zheng, Su Wang. 1620-1625 [doi]
- A new fast nonlinear principal component analysis algorithm for blind source separationXin Wang, Shifeng Ou, Ying Gao, Xiaofeng Guo. 1626-1630 [doi]
- Author cooperation relationship in digital publishing based on social network analysisXueyou Xu, Weiwei Jia, Meng Tang, Qi Feng, Ying Li. 1631-1635 [doi]
- Citing time lag: A new determinant for paper quality? A case study on management journal in ChinaYuandi Wang, Ruifeng Hu, Die Hu. 1636-1641 [doi]
- Collecting, managing and analyzing social networking data effectivelyZhongying Zhao, Zheng Feng, Yong Zhang, Li Ning, Jiancong Fan, Shengzhong Feng. 1642-1646 [doi]
- Graded medical data publishing based on clusteringTong Yi, Minyong Shi, Wenqian Shang, Jianxiang Cao. 1647-1652 [doi]
- Knowledge extraction of agricultural data using artificial immune systemAyodele Lasisi, Rozaida Ghazali, Tutut Herawan, Fola Lasisi, Mustafa Mat Deris. 1653-1658 [doi]
- Relevance Vector Machine with compounded kernels for regression and classification in power systems forecastingQing Duan, Wan-Xing Sheng, Yan Ma. 1659-1664 [doi]
- Semi-supervised clustering with associative-link constraints for 3D modelsShaohong Zhang, Jing Wang, Xiaoqiang Wu, Baoying Zeng, Wenxiao Qiu, Dongqing Xie. 1665-1669 [doi]
- Short-term traffic flow forecasting: Multi-metric KNN with related station discoveryHaikun Hong, Wenhao Huang, Xiabing Zhou, Sizhen Du, Kaigui Bian, Kunqing Xie. 1670-1675 [doi]
- The application of grey relational projection to rank and optimize risk control optionsJingxia Liu, Lidong Wang, Junzhong Bao. 1676-1680 [doi]
- The influence of experimental design method on design space explorationBaiwei Feng, Suzhen Dong, Haichao Chang. 1681-1687 [doi]
- The knowledge map of public safety and healthChunxue Wang, Shuran Lv, Xiao Suo. 1688-1692 [doi]
- The ontology construction approach for the Chinese Tax Knowledge DomainZhiyong Gao, Yongquan Liang. 1693-1697 [doi]
- A new forward secure content extraction signature schemeCaifen Wang, Yahong Li, Shih-Yen Huang, Ting Xu, Chiou-Kou Tung. 1698-1702 [doi]
- Hiding new words in a PDF documentShiru Zhang, Qidi Li, Chen-Chung Liu, Gaoyuan Li. 1703-1707 [doi]
- License plate recognition systemChuin-Mu Wang, Jian-Hong Liu. 1708-1710 [doi]
- Multi-focus image fusion using local structure features with dynamic windowsChen-Chung Liu, Hsin-Lei Lin, Shry-Shen Yu. 1711-1715 [doi]
- Particle swarm optimization for scheduling problems by curve controlling based global communication topologyRuey-Maw Chen, Shih-Che Huang. 1716-1720 [doi]
- The prediction system for data analysis of stock market by using Genetic AlgorithmChing-Te Wang, Yung-Yu Lin. 1721-1725 [doi]
- Tread extraction using skeletonizingShih-Yen Huang, You-Jyun Syu, Wen-Yuan Chen. 1726-1730 [doi]
- A knowledge-based interactive liver segmentation using random walksChunhua Dong, Yen-Wei Chen, Tomoko Tateyama, Xian-Hua Han, Lanfen Lin, Hongjie Hu, Chongwu Jin, Huajun Yu. 1731-1736 [doi]
- Automated assessment of small bowel motility function based on simple linear iterative clustering (SLIC)Yen-Wei Chen, Akira Furukawa, Ayako Taniguchi, Tomoko Tateyama, Shuzo Kanasaki. 1737-1740 [doi]
- Automatic inspection of throw-away tips based on principal component analysisTing Wang, Xian-Hua Han, Rui Xu, Yen-Wei Chen, Yoshitomo Ishizaki, Masaru Miyamoto, Tomohito Hattori. 1741-1746 [doi]
- Base of brain intelligence: Information flow in cultured neuronal networks and its simulation on 2D mesh networkShinichi Tamura, Yoshi Nishitani, Chie Hosokawa, Yuko Mizuno-Matsumoto, Yen-Wei Chen. 1747-1752 [doi]
- Generic and specific impression estimation of clothing fabric images based on machine learningYen-Wei Chen, Dingye Chen, Xian-Hua Han, Xinyin Huang. 1753-1757 [doi]
- Quantitative analysis of facial paralysis based on filters of concentric modulationTruc Hung Ngo, Masataka Seo, Naoki Matsushiro, Yen-Wei Chen. 1758-1763 [doi]
- A boundary filtering based spatial join query processing optimization algorithmBaiyou Qiao, Junhai Zhu, Muchuan Shen, Yang Chen. 1764-1769 [doi]
- Evaluating tag quality for blogger modelling via topic modelsLili Shan, Chengjie Sun, Lei Lin, Ming Liu, Xiaolong Wang, Bingquan Liu. 1770-1776 [doi]
- Extraction of comparative opinionate sentences from product online reviewsPing Ji, Jian Jin. 1777-1785 [doi]
- Methodology for intercloud multicriteria optimizationMartin Bobák, Ladislav Hluchý, Viet D. Tran. 1786-1791 [doi]
- A data quality management and control framework and model for health decision supportTao Dai, Hongpu Hu, Yanli Wan, Quan Chen, Yan Wang. 1792-1796 [doi]
- Uncertain dynamic skyline queries for uncertain databasesZhiBang Yang, Xiaoniu Yang, Xu Zhou. 1797-1802 [doi]
- 3D modeling of small industrial parts based on the structured illuminationGui Wu, Jun Tao. 1803-1808 [doi]
- A 3D model feature extraction method using curvature-based shape distributionKuansheng Zou, Zhaojun Zhang, Jianhua Zhang, Qian Zhang. 1809-1813 [doi]
- A method for extending reverberation time of Dattorro's reverberatorChen-lu Feng, Li-pi Niu, Ping Shi, Zi-he Qiu, Yuan Sha. 1814-1818 [doi]
- A moving object extraction algorithm based on the modified codebook modelTingshu Lu, Zhongxin Qu, XiaoJiong Liu, Mingjiang Wang. 1819-1823 [doi]
- A multi-set approach for direction finding based on spatially displaced electromagnetic vector-sensorsMeijiao Ji, Xiaofeng Gong, Qiuhua Lin. 1824-1828 [doi]
- A new spherical simplex unscented Kalman filter-based jumping and static interacting multiple modelYi Pan, Keke He, Hui Ye. 1829-1833 [doi]
- A super-resolution algorithm based on adaptive sparse representationXin Li, Min Zhu, Ziguan Cui, Xiuchang Zhu. 1834-1838 [doi]
- A unified minimization framework for single/multi-shot nonparametric blind deblurringWenze Shao, Qi Ge, Shi-Peng Xie, Hai-Bo Li, Hai-Song Deng, Zhihui Wei. 1839-1846 [doi]
- An adaptive feature points selection algorithm based on image features of Digital Subtraction AngiographyFan Zhang, Qiaochu Xu. 1847-1851 [doi]
- An efficient revocable certificateless signature schemeJianhong Zhang, Xubing Zhao. 1852-1857 [doi]
- An improved approach for suppressing noise based on empirical mode decompositionBaotong Liu. 1858-1862 [doi]
- An improved gray image representation using overlapping rectangular non-symmetry and anti-packing and extended shading approachYunping Zheng, Mudar Sarem. 1863-1867 [doi]
- An Integrated saliency detection model based on weighted global entropyLili Lin, Junfeng Li, Xiuping Wang, WenHui Zhou, Teng Song. 1868-1874 [doi]
- An novel algorithm of progressive texture feature extraction in the wavelet domain from the compressed bit-streams of imagesXubing Zhang, Shougeng Hu, Caixia Huang, Yuanquan Xu. 1875-1882 [doi]
- Analysis of image stitching error based on scale invariant feature transform and random sample consensusDou Shuang, Hua Cai, Yong Yang, Tailin Han, Menghan Xue. 1883-1887 [doi]
- Application research of Kalman filter in optical atomic magnetometerWenhui Zhao, Yuhui Dong. 1888-1892 [doi]
- Chemical waste water filtration monitoring based on electrical capacitance tomographyXue He, Fan Zhang, Wei Hu, Wei Li, Lixiang Ma. 1893-1897 [doi]
- Computing the color complexity of imagesBing Zhou, Shuang Xu, Xin-xin Yang. 1898-1902 [doi]
- Design for a reconfigurable image fusion system base on All Programmable System on ChipXiujie Qu, Shixin Zhang, Haili Huo, Yue Gu, Yue Sun. 1903-1907 [doi]
- Distributed indexes design to accelerate similarity based images retrieval in airport video monitoring systemsHua Cheng, Wen Yang, Rongsheng Tang, Jian Mao, Qian Luo, Chuan Li, Ang Wang. 1908-1912 [doi]
- Effective lossless compression of fixed-length dataQin Li, Caiming Liu, Jin Yang. 1913-1918 [doi]
- Efficient reduction of artifact effect based on power and entropy measuresMing-Te Wu. 1919-1923 [doi]
- Electro-Magnetic Articulography data stabilization for speech synchronized articulatory animationJun Yu, Chen Jiang, Changwei Luo, Rui Li, Ling-yan Li, Zengfu Wang. 1924-1928 [doi]
- Fast ℓ0-norm-based single image blind deblurring: A comparative studyWenze Shao, Shi-Peng Xie, Qi Ge, Hai-Bo Li, Lili Huang, Zhi-Hui Wei. 1929-1934 [doi]
- Fast Super-Resolution via patchwise Sparse CodingHao Ni, Fanghua Liu, Ruolin Ruan. 1935-1939 [doi]
- Foreground detection based on color and texture featuresBinwen Fan. 1940-1944 [doi]
- Interactive particle filter with occlusion handling for multi-target trackingBo Yang, Ruoyu Yang. 1945-1949 [doi]
- Key frame extraction based on improved frame blocks features and second extractionHuayong Liu, Tao Li. 1950-1955 [doi]
- Speech enhancement based on the Wiener filter and wavelet entropyMingke Jiao, Lin Lou, Xiliang Geng, Zhongming Wang, Peng Zhang, Xijiang Liao, Wenyuan Zhang. 1956-1960 [doi]
- Physical design optimizations for a high-resolution third-order sigma-delta modulatorJin-Hua Hong, Wei-Ling Yi. 1961-1965 [doi]
- Query by humming based on music phrase segmentation and matchingMenglu Li, Zhijun Zhao, Ping Shi. 1966-1970 [doi]
- Robust image dehazing using a duided filterTao Zhang, Yike Yu, Zhangming Sun, Zhichun Lei. 1971-1975 [doi]
- SAR image segmentation by selected principal components and kernel graph cuts ensemblesDongdong Yang, Rong Fei, Lei Wang, Hui Yang. 1976-1980 [doi]
- Signal sorting by combining Bayesian method and Gibbs sampling strategyRui Li, WeiXian Tan, Yaolong Qi, Pingping Huang. 1981-1985 [doi]
- Study of jamming technology to frequency division multiplexing linear frequency modulation MIMO radarsXian-Mao Li, Tian-lin Dong, Xian-Mao Li, Gao-Ming Huang, Xiao-hong Lin. 1986-1990 [doi]
- Automatic target detection in hyperspectral image processing: A review of algorithmsNagesh Poojary, Hasmitha D'Souza, M. R. Puttaswamy, G. Hemanth Kumar. 1991-1996 [doi]
- Time delay estimation based on bandpass sampling theorem and bisection searchingDexiu Hu, Zhen Huang, Jianhua Lu, Kaiqiang Liang. 1997-2001 [doi]
- Video object segmentation using depth and saliency mapAnman Wang, Yuan Zhang, Jian Zhuang. 2002-2007 [doi]
- A bias routing tree avoiding technique based on population-based incremental learning algorithmLiu Ri-Xian, Yuan Li-Yong. 2008-2012 [doi]
- A destruction-resistant on-demand routing protocol for LEO satellite network based on local repairXuezhi Ji, Lixiang Liu, Pei Zhao, Dapeng Wang. 2013-2018 [doi]
- A game-theory based energy-saving grooming algorithm for multi-granularity transport networksLongyan Xue, Xingwei Wang, Fuliang Li, Min Huang. 2019-2023 [doi]
- A high-precision wideband signal generating method for GNSS antenna arraysFeiqiang Chen, Junwei Nie, Yingxue Su, Feixue Wang. 2024-2028 [doi]
- A multi-constrained multicast traffic grooming algorithm in IP over wavelength division multiplexing networksTai Li, Xingwei Wang, Fuliang Li, Min Huang. 2029-2033 [doi]
- A novel method of baseband pool resource allocation in Cloud Radio Access Network systemQiong Jia, Bingbing Li, Min Huang. 2034-2038 [doi]
- A novel QoS evaluation method in electric power communication networksLiangrui Tang, Rongrong Li. 2039-2043 [doi]
- A parallel processing method for Border Gateway Protocol UPDATE messagesLina Ding, Xingwei Wang, Fuliang Li, Min Huang. 2044-2048 [doi]
- A reward-and-punishment aware incentive mechanism in P2P networksKun Lu, Shiyu Wang. 2049-2053 [doi]
- A secret key negotiation scheme for wireless communications over fading channelsNana Zhang, Hongwen Yang. 2054-2058 [doi]
- An adaptive vertical handover algorithm based on the analytic hierarchy process for heterogeneous networksDanni Guo, Xiaobin Li. 2059-2064 [doi]
- An assistance based data transmission scheme in wireless mesh networksHanwu Wang, Tao Yu, Mengxiong Li, Liping Chen. 2065-2069 [doi]
- An intelligent traffic light control approach for reducing vehicles CO2 emissions in VANETZhende Xiao, Zhu Xiao, Dong Wang, Xiaohong Li. 2070-2075 [doi]
- An irregular repeat accumulate coded adaptive cooperation scheme based on Orthogonal Superposition ModulationXiang Chen, Mingxiang Xie, Jing Huang. 2076-2080 [doi]
- An optimized multicast transmission scheme in wireless relay networksHanwu Wang, Huicong Zou, Lian Pan, Beibei Yang. 2081-2085 [doi]
- Characterizing the correlation between video types and user quality of experience in the large-scale internet video serviceXiaoru Wang, Anming Wei, Yingyun Yang, Jinhui Ning. 2086-2092 [doi]
- Credit Distribution and influence maximization in online social networks using node featuresXiaoheng Deng, Yan Pan, You Wu, Jingsong Gui. 2093-2100 [doi]
- Design of a home surveillance system based on the android platformBinwen Fan, Ga Pan, Ming Liu, Chunyang Li. 2101-2105 [doi]
- Detection performance and robustness of segmented replica correlator processors in fast fading distortion channelsZhenhua Quan, Zhigui Liu, Liang Luo, Gen Hu. 2106-2111 [doi]
- Experimental realization of long-haul chaotic optical secure communicationsHongxi Yin, Xiaolei Chen, Hehe Yue, Nan Zhao, Xiaoyong Qi, Wenge Wang, Qingchun Zhao. 2112-2116 [doi]
- Feasibility study of wireless communication for the Double Fed Induction MachineS. Ben Brahim, T. H. Vuong, J. David, R. Bouallegue, Maria Pietrzak-David. 2117-2121 [doi]
- Hybrid content-based publish/subscribe systemQing Zhou, Zhiyong Xiong, Rong Hong, Tao You, Nan Jiang. 2122-2126 [doi]
- Hysteresis automatic configuration for outbound handover in heterogeneous small cell networksZhongfeng Li, Zhu Xiao, Dong Wang, Xiaohong Li. 2127-2131 [doi]
- Image acquisition and transmission in the video telephone based on androidBinwen Fan, Guoyue Sun, Ming Liu, Chunyang Li. 2132-2136 [doi]
- Implementation of anomaly detection algorithms for detecting Transmission Control Protocol Synchronized flooding attacksNenekazi N. P. Mkuzangwe, Andre McDonald, Fulufhelo Vincent Nelwamondo. 2137-2141 [doi]
- Improvement of the multipath routing algorithm and its application in the nursing pigstyChanghua Ma, Weixing Zhu. 2142-2146 [doi]
- Industry 4.0: Towards future industrial opportunities and challengesKeliang Zhou, Taigang Liu, LiFeng Zhou. 2147-2152 [doi]
- Load-balancing routing for wireless sensor networks with multiple sinksChongqing Zhang, Yinglong Wang, Yongquan Liang, Minglei Shu, Changfang Chen, Sheng Fang. 2153-2157 [doi]
- MIMO radar target localization via Markov Chain Monte Carlo optimizationJunli Liang, Yajun Chen, Zhonghua Ye. 2158-2162 [doi]
- Multi-factor web API security for securing Mobile CloudLongji Tang, Liubo Ouyang, Wei-Tek Tsai. 2163-2168 [doi]
- Node Localization based on Convex Optimization in Wireless Sensor NetworksPing Ren, Wu Liu, Donghong Sun, Ke Liu. 2169-2173 [doi]
- PMM-SA: A performance monitor model for the large-scale system area networkLin Chen, Guilin Cai, Yang Nan. 2174-2179 [doi]
- Secure email system based on true IPv6 address accessMeng Sun, Xingwei Wang. 2180-2184 [doi]
- Signal detection for spectrum sensing with uncertain arrivals of trafficsWen-Long Chin, Yin-Je Hwang, Ya-Xuan Lin. 2185-2189 [doi]
- Spanning Multi-Tree Algorithm for node and traffic Balancing in multi-sink wireless sensor networksYeong Kang Sia, Hock Guan Goh, Soung-Yue Liew, Ming-Lee Gan. 2190-2195 [doi]
- Spectrum aggregation strategy in multi-user cooperative relay networksXia Gong, Yifei Wei, Yong Zhang, Da Guo. 2196-2202 [doi]
- Survivability evaluation index systems and evaluation models for Wireless Sensor NetworksHaitao Wang, Shicai Zhu, Li Yan, Lihua Song, Guomin Zhang. 2203-2207 [doi]
- The underlying technologies in WSNs: ZigBee vs. wireless HARTVandana Jindal, A. K. Verma. 2208-2213 [doi]
- Two improved homomorphic MAC schemes in network codingXinran Li, Fang-Wei Fu, Xiufeng Zhao, Guangxia Wang. 2214-2219 [doi]
- Two-hop neighbor table tree routing algorithm for ZigBee networksLeqiang Bai, Yutao Wang. 2220-2224 [doi]
- A contribution to the automation and to the evaluation of open-system software architecturesRiad Belkhatir. 2225-2230 [doi]
- A coupled adaptive PI tuning method for rapid thermal processing systemsXia Su, Xianxia Zhang. 2231-2235 [doi]
- A hybrid-architecture retrieval system based on Web ServicesDajie Cong, Ping Shi, Yang Li, Da Pan, Yuan Sha. 2236-2241 [doi]
- A model driven agent-oriented self-adaptive software development methodYiwei Lei, Kerong Ben, Zhiyong He. 2242-2246 [doi]
- A preliminary research on software reliability model of Reactor Protection System of High Temperature Gas-Cooled Reactor-Pebble bed ModuleCong Cui, Duo Li, Chao Guo. 2247-2252 [doi]
- Context-aware, knowledge-intensive, and patient-centric Mobile Health Care ModelKaiyu Wan, Vangalur S. Alagar. 2253-2260 [doi]
- Design and implementation of target tracking software Development EnvironmentWeihua Liu, Yongjia Zhao, Xiaoyong Lei. 2261-2265 [doi]
- Design of health decision support system with data analysis and mining functionsTao Dai, Hongpu Hu, Yanli Wan. 2266-2270 [doi]
- Design of the logistics integrated business processing system based on open source Service Oriented ArchitectureBing Zhang, Hongbo Liang. 2271-2275 [doi]
- Mining API protocols based on a balanced probabilistic modelDeng Chen, Yanduo Zhang, Rongcun Wang, Wei Wei, Huabing Zhou, Xun Li, Binbin Qu. 2276-2282 [doi]
- Semantics-based memory leak detection for C programsZhiqiang Liu, Bo Xu, Dong Liang, Chang Liu, Zejun Jiang, Chenglie Du. 2283-2287 [doi]
- A design of blind-guide crutch based on multi-sensorsYiting Yi, Lunfu Dong. 2288-2292 [doi]
- A distanced machinery controlling and monitoring guardianShadman Sakib, Maruf Hassan, Yaseer Musharraf, Md. Khalilur Rhaman. 2293-2297 [doi]
- A hybrid sampling strategy with optimized Probabilistic Roadmap MethodFang Yuan, Jia-Hong Liang, Yue-wen Fu, Han-Cheng Xu, Ke Ma. 2298-2302 [doi]
- A real-time 3D hair animation system for human-computer interactionJun Yu, Chen Jiang, Changwei Luo, Rui Li, Zengfu Wang. 2303-2307 [doi]
- A smart map representation for autonomous vehicle navigationLiming Liu, Tao Wu, Yuqiang Fang, Tingbo Hu, Jinze Song. 2308-2313 [doi]
- A smartphone-controlled autonomous robotChristian Bodenstein, Michael Tremer, Jonathan Overhoff, Rolf P. Würtz. 2314-2321 [doi]
- A voltage-mode DC-DC buck converter with digital PID controllerChao-Ying Wang, Yang-Chieh Ou, Chih-Feng Wu, Muh-Tian Shiue. 2322-2326 [doi]
- An automated fire fighting systemRafat Shams, Shafkat Hossain, Shaoni Priyom, Nusrat Fatema, Shifur Rahman Shakil, Md. Khalilur Rhaman. 2327-2331 [doi]
- Automatic Optical Inspection for steel golf clubHsien-Huang P. Wu, Hong-Yi Guo. 2332-2336 [doi]
- Consensus analysis of multiple double-integrator agents with impulsive protocol and time-delaysFangCui Jiang. 2337-2342 [doi]
- Detection and repair faults of sensors in sampled control systemJingzhi Hu, Kai Dong. 2343-2347 [doi]
- Indoor positioning based on hybrid algorithms: Wi-Fi fingerprint and rangingXizhong Lou, Yizhan Jia, Ning Jin, Minzhan Ye. 2348-2352 [doi]
- Online optimal power control of offshore oil-platform power systems based on interior point and fast branch-bound methodsJianliang Zhong, Yingyun Sun, Xiaorong Xie, Jianfeng Wang, Che Wei. 2353-2358 [doi]
- Ontological consideration on Human InterfaceYoshihiko Nitta. 2359-2365 [doi]
- The principle and application of adaptive record shielding technologyWei Wang, Huiyu Deng. 2366-2370 [doi]
- Real-time multi-view face detection based on optical flow segmentation for guiding the robotYutong Gao, Xuewei Lv, Hongyan Jia. 2371-2377 [doi]
- Robust controller design for Nonlinear Uncertain Stochastic Drum-Boiler SystemCheung-Chieh Ku. 2378-2383 [doi]
- Robust controller design for the cloud-based robotic visual servo system with time-delay uncertaintyWei Sun, Yunfeng Lv, Mengyun Hu. 2384-2389 [doi]
- The radio frequency identification technology in the earthquake rescue warehouse managementLanying Zhao. 2390-2394 [doi]
- Traffic regulation algorithm for metro lines with time interval deviationsMinkee Park, Seungwoo Kim, Dong-Min Woo, Joo-Ho Lee. 2395-2399 [doi]
- Traffic sign detection by template matching based on multi-level chain code histogramRongqiang Qian, Bailing Zhang, Yong Yue, Frans Coenen. 2400-2404 [doi]
- Using Zero Moment Point preview control formulation to generate nonlinear trajectories of walking patterns on humanoid robotsYunn-Lin Hwang, Thi-Na Ta, Chien-Hsin Chen, Kun-Nan Chen. 2405-2411 [doi]
- A distributed inverse distance weighted interpolation algorithm based on the cloud computing platform of Hadoop and its implementationZhong Xu, Jihong Guan, Jiaogen Zhou. 2412-2416 [doi]
- Development of an impact tester for measuring dynamic strength of diamond gritZhaoran Chen, Baochang Liu, Shiqi Liu, Yuanling Shi. 2417-2421 [doi]
- Equivalent circuit analysis of a single-phase rotary wedge-wave ultrasonic motorTai-Ho Yu, Yun-Jyun Jhang. 2422-2426 [doi]
- GBFSJ: Bloom Filter Star Join algorithms on GPUsGuoliang Zhou, Guilan Wang. 2427-2431 [doi]
- Investigating the influence of types and parameters of excitation systems on the dynamic reactive power reserve of synchronous generatorsBaorong Zhou, Wenfeng Yao, Tao Xu, Yipeng Dong, Xiaorong Xie. 2432-2436 [doi]
- Parallel algorithm for solving penta-diagonal linear systemsCheng Zhu, Kenli Li, Wangdong Yang, Xu Zhou. 2437-2442 [doi]
- Template-based migration between data centers using distributed hash tablesMian Zheng, Xiaohui Hu. 2443-2447 [doi]
- The performance evaluations for Hadoop in diverse system architecturesYang Liu 0010, Jie Yang, Yuan Huang, Lixiong Xu. 2448-2452 [doi]
- 3D game-based training system for hazard identification on construction siteRen-Jye Dzeng, Hsien-Hui Hsueh, Rui-Na Chang. 2453-2458 [doi]
- A Bezier curve based on path tracking in Computer Generated ForceLu Song, Fengxia Li, Zhongjun Li. 2459-2463 [doi]
- A medical training system for the operation of Heart-lung machineRen Kanehira, Hideo Hori, Kazinori Kawaguchi, Hideo Fujimoto. 2464-2468 [doi]
- A trajectory compression algorithm based on non-uniform quantizationChengjiao Lv, Feng Chen, Yongzhi Xu, Junping Song, Pin Lv. 2469-2474 [doi]
- Alarm thresholds of threaten regions based on triangle mesh voxelizationYongjing Chao, Yingmei Wei, Xiaolei Du, Fang Yuan. 2475-2479 [doi]
- An effective algorithm for location and tracking the ground target based on near space vehicleFulai Liu, Ruiyan Du, Hui Jia. 2480-2485 [doi]
- An efficient skyline maintenance method for data modificationGuanling Lee, Hsiou-Hao Lin. 2486-2491 [doi]
- An intelligent air conditioning control system based on Mobile Communication networksBinwen Fan, Qi Zhang. 2492-2496 [doi]
- Complex terrain effects on wind field around the transmission towerXinwei Zhao, Qiuming Tang, Qiang Gao. 2497-2501 [doi]
- The mapping mechanism between Distributed Integrated Modular Avionics and data distribution serviceQing Zhou, Zhiyong Xiong, Zhijuan Zhan, Tao You, Nan Jiang. 2502-2507 [doi]
- Design and implementation of the web visual information queries and statistics platform for tourism collegesQiaojun Wang, Pan Gong, Yuanrong He, Yuanmao Zheng. 2508-2513 [doi]
- Design of simulation and analysis software for space debrisPengqi Gao, Ming Shen, Xiaozhong Guo, Datao Yang, You-Zhao. 2514-2518 [doi]
- Differential attack on image encryption algorithm using binary bitplaneXin Ge, Bin Lu, Hui Guan, Kai Zhang. 2519-2522 [doi]
- Fuzzy keyword search over probabilistic XML dataYue Zhao, Guoren Wang, Ye Yuan. 2523-2527 [doi]
- Joint Filtering: Enhancing gesture and mouse movement in Microsoft Kinect applicationMichael Adjeisah, Yi Yang, Lian Li. 2528-2532 [doi]
- Micro-scale heat and mass transfer characteristics of sipirulina cells during freezingRunling Peng, Wei Cao, Chenghai Xu, Jianhui Tian. 2533-2538 [doi]
- Nonlinear dynamics and exact travelling wave solutions in the non-Boussinesq wavepacket modelHeng Wang, Longwei Chen, Hongjiang Liu. 2539-2543 [doi]
- Numerical modeling of water level and current in very shallow large Lake PoyangSu-Xiang Zhang, Ming Mei, Xin-Fa Xu, Li-Mo Tang, Nian-Hua Wu, Sha-Sha Fu, Xi Li. 2544-2548 [doi]
- Optimized Selection Sort Algorithm for Two Dimensional arraySultan Ullah, Muhammad A. Khan, Mudasser A. Khan, Habib Akbar, Syed S. Hassan. 2549-2553 [doi]
- The simulation and analysis of a free-flooded ring transducer using the axisymmetric finite element modelZhengyao He, Congcong Ma, Xinyu An, Jianping Yang, Zheyuan Zhou. 2554-2558 [doi]
- Prediction of rice brown planthoppers based on system dynamicsQingren Wang, Youhua Zhang, Fei Xie, Xindong Wu. 2559-2564 [doi]
- Recognizing fleeting facial expressions with different viewpointsXunbing Shen, Wen-Jing Yan, Xiaolan Fu. 2565-2569 [doi]
- Resource prediction based on program granularity combined with data purificationDing Xiao, Bingqing Shang, Bin Wu, Xiuqin Lin, Kesheng Chen. 2570-2576 [doi]
- Sensitivity analysis for transient response of nonuniform coupled transmission linesJiansheng Xia, Jianhua Yin, Hao Zhou, Lina Fan, Jinquan Zhao. 2577-2581 [doi]
- Servers Voice Graphical AuthenticationSyed S. Hassan, Sultan Ullah, Samiullah Afzal, Muhammad A. Khan, Mudasser A. Khan, Habib Akbar. 2582-2586 [doi]
- Simulation of contrast medium propagation in virtual vascular interventional radiologyYi Qin, Jianhuang Wu, Haoyu Wang, Qingmao Hu. 2587-2592 [doi]
- A single-pattern matching algorithm base on twice jumps in the intrusion detection systemsZhongming Yang, Shen Lin. 2593-2597 [doi]
- Slope partition area statistics in Land Development Project zone based on Geographic Information System and grid Digital Elevation ModelJiwei Zhu, Zhaoxia Chen, Xiaoyu Xu, Bin Ma. 2598-2602 [doi]
- The finite element simulation and experimental analysis on magnetic flux leakage field of the irregular defectZhijun Yang, Deshu Chen, Liang Chen, Yanlei Liu, Bing Wang. 2603-2607 [doi]
- A variant of schnorr signature scheme for path-checking in RFID-based supply chainsWei Xin, Meilin Wang, Shuai Shao, Zhao Wang, Tao Zhang. 2608-2613 [doi]
- A self-validating flush air data sensing systemZhengguang Shen, Qinghua Gao, Jingyu Dong, Jingchun Yuan. 2614-2618 [doi]
- An algorithm which can obtain the global walking directionXizhong Lou, Li Zhi, Jun Fang. 2619-2624 [doi]
- An effective obstacle detecting method for soft landing on the moonXiuqin Deng, Hanqun Chen, Xianbin Zhang, Zhenyu Cai, Yuhong Sun, Shujuan Zhang. 2625-2630 [doi]
- Filters of pre-rough algebraShifen Xia, Qi Cheng. 2631-2634 [doi]
- An in-pipe internal defects inspection system based on the active stereo omnidirectional vision sensorTing Wu, Shaohui Lu, Yiping Tang. 2637-2641 [doi]
- Local random Mean-hash classifier based adaptive visual trackingKen Chen, Zhe Liu, Meng Li, Kyoungho Choi. 2642-2647 [doi]
- Mapping the topic evolution using citation-topic model and social network analysisChunlei Ye, Dongmei Liu, Na Chen, Li Lin. 2648-2653 [doi]
- MatchingSem: Online recruitment system based on multiple semantic resourcesAseel B. Kmail, Mohammed Maree, Mohammed Belkhatir. 2654-2659 [doi]
- Ontology-based context-aware model by applying Bayesian networkJinhyuk Mok, Hongki Min. 2660-2664 [doi]
- Shaping identity of being creative Information Technology (IT) Engineers: Why, what and how should educators do?Hui Zhang, Chunfang Zhou. 2665-2669 [doi]
- Short-circuit field tests of Shandong Rongcheng wind farms and measured data analysisChunyi Wang, Xiuqing Yi, Zenggong Cao, Hong Mu, Hongtao Wang. 2670-2675 [doi]
- The implementation of user interface autogenerate for spacecraft automatic tests based on ontologyRui Li, Shilong Ma. 2676-2681 [doi]
- Vulnerabilities of radio frequenciesLeeHur Shing, Jessica Astacio, Alejandro Figueroa, Chen-chi Shing. 2682-2686 [doi]