Abstract is missing.
- A Non-strategic Microeconomic Model for Single-Service Multi-rate Application Layer MulticastMorteza Analoui, Mohammad Hossein Rezvani. 1-8 [doi]
- Importance Measure Method for Dynamic Fault Tree Based on Isomorphic NodeHong-Lin Zhang, Chunyuan Zhang, Dong Liu, Gui-Wu Xie. 9-16 [doi]
- Shortages of the Traditional Calculation of Interference Intensity of the Control RulesZhigang Li, Zhihai Wang, Weijia Guo. 17-24 [doi]
- Dynamic Data Replication Strategy Based on Federation Data Grid SystemsM. Zarina, Mustafa Mat Deris, Ahmad Nazari Mohd Rose, A. M. Isa. 25-32 [doi]
- A Novel Approach for QoS Guided Metascheduler for P2P Grid SystemD. Doreen Hephzibah Miriam, K. S. Easwarakumar. 33-40 [doi]
- Failure Recovery Mechanism in Neighbor Replica Distribution ArchitectureAhmad Shukri Mohd Noor, Mustafa Mat Deris. 41-48 [doi]
- Autonomous Discovery of Subgoals Using Acyclic State TrajectoriesZhao Jin, Jian Jin, Weiyi Liu. 49-56 [doi]
- Numerical Computing and Forecasting to Land Subsidence in Coastal Regions of TangshanJing Tan, Zhigang Tao, Changcun Li. 57-64 [doi]
- Stochastic Newsboy Inventory Control Model and Its Solving on Multivariate Products Order and PricingJixian Xiao, Fangling Lu, Xin Xiao. 65-72 [doi]
- Grey Correlation Analysis on the Influential Factors the Hospital Medical ExpenditureSu-feng Yin, Xiao-Jing Wang, Jian Hui Wu, Guo-li Wang. 73-78 [doi]
- Discrete Construction of order-::::k:::: Voronoi DiagramYe Zhao, Shu-juan Liu, Yi-li Tan. 79-85 [doi]
- Double Verifiably Encrypted Signature-Based Contract Signing ProtocolChaoping Wang, Aimin Yang, Yan Sun. 86-93 [doi]
- Semantic Memory for Pervasive ArchitectureSébastien Dourlens, Amar Ramdane-Cherif. 94-102 [doi]
- Fair E-Payment Protocol Based on Certificateless Signature and Authenticated Key ExchangeMing Chen, Kaigui Wu, Jie Xu. 103-110 [doi]
- Short Signature from the Bilinear PairingLeyou Zhang, Yupu Hu, Qing Wu. 111-118 [doi]
- The Construction of an Individual Credit Risk Assessment Method: Based on the Combination AlgorithmsJiajun Li, Liping Qin, Jia Zhao. 119-126 [doi]
- Method for Evaluating QoS Trustworthiness in the Service CompositionLei Yang, Yu Dai, Bin Zhang. 127-134 [doi]
- Three-Party Password-Based Authenticated Key Exchange Protocol Based on Bilinear PairingsFushan Wei, Chuangui Ma, Qingfeng Cheng. 135-142 [doi]
- Bayesian Network Based on FTA for Safety Evaluation on Coalmine Haulage SystemWensheng Liu, Liwen Guo, Ming Zhu. 143-149 [doi]
- Multi-factor Evaluation Approach for Quality of Web ServiceQibo Sun, Shangguang Wang, Fangchun Yang. 150-157 [doi]
- Execution-Aware Fault Localization Based on the Control Flow AnalysisLei Zhao, Lina Wang, Zuoting Xiong, Dongming Gao. 158-165 [doi]
- An Efficient HybridFlood Searching Algorithm for Unstructured Peer-to-Peer NetworksHassan Barjini, Mohamed Othman, Hamidah Ibrahim. 173-180 [doi]
- Ontology Model for Semantic Web Service MatchingJiaxuan Ji, Fenglin Bu, Hongming Cai, Junye Wang. 181-188 [doi]
- Approaches to Improve the Resources Management in the Simulator CloudSimGhalem Belalem, Fatima Zohra Tayeb, Wieme Zaoui. 189-196 [doi]
- Introducing a New Predicate Network Model Constructed Based on Null Hypothesis Testing for Software Fault LocalizationSaeed Parsa, Azam Peyvandi-Pour, Mojtaba Vahidi-Asl. 197-204 [doi]
- Image Segmentation Based on FCM with Mahalanobis DistanceYong Zhang, Zhuoran Li, Jingying Cai, Jianying Wang. 205-212 [doi]
- A Novel AHP and GRA Based Handover Decision Mechanism in Heterogeneous Wireless NetworksJianqing Fu, Jiyi Wu, Jianlin Zhang, Lingdi Ping, Zhuo Li. 213-220 [doi]
- Annotating Flickr Photos by Manifold-Ranking Based Tag Ranking and Tag ExpandingZheng Liu, Hua Yan. 221-228 [doi]
- Application of Chaos in Network Video SecurityZhenxin Zhang, Jigang Tong, Zengqiang Chen, W. H. Ip, C. Y. Chan, K. L. Yung. 229-236 [doi]
- Integration of Complementary Phone Recognizers for Phonotactic Language RecognitionYan Deng, Weiqiang Zhang, Yanmin Qian, Jia Liu. 237-244 [doi]
- Performance Analysis of IEEE 802.11a Based on Modified Markov Model in Non-saturation ConditionsFeng Gao, Zehua Gao, Liu Wen, Yazhou Wang, Jie Liu, Dahsiung Hsu. 245-252 [doi]
- Soft Set Theory for Feature Selection of Traditional Malay Musical Instrument SoundsNorhalina Senan, Rosziati Ibrahim, Dr. Nazri Mohd Nawi, Iwan Tri Riyadi Yanto, Tutut Herawan. 253-260 [doi]
- ETSA: An Efficient Task Scheduling Algorithm in Wireless Sensor NetworksLiang Dai, Yilin Chang, Zhong Shen. 261-268 [doi]
- Comparing Fuzzy Algorithms on Overlapping Communities in NetworksJian Liu. 269-276 [doi]
- Color Image Segmentation Using Swarm Based Optimisation MethodsSalima Nebti. 277-284 [doi]
- Adaptive Seeded Region Growing for Image Segmentation Based on Edge Detection, Texture Extraction and Cloud ModelGang Li, Youchuan Wan. 285-292 [doi]
- A New Optimization Algorithm for Program ModularizationSaeed Parsa, Amir Mehrabi-Jorshary, Mohammad Hamzei. 293-300 [doi]
- Research on Set Pair Cognitive Map ModelChunying Zhang, Jingfeng Guo. 309-316 [doi]
- The Development of Improved Back-Propagation Neural Networks Algorithm for Predicting Patients with Heart DiseaseDr. Nazri Mohd Nawi, Rozaida Ghazali, Mohd Najib B. Mohd Salleh. 317-324 [doi]
- Two-Stage Damage Detection Method Using the Artificial Neural Networks and Genetic AlgorithmsDan-Guang Pan, Su-Su Lei, Shun-Chuan Wu. 325-332 [doi]
- Designing an Artificial Immune System-Based Machine Learning Classifier for Medical DiagnosisHui-Ping Cheng, Zheng-Sheng Lin, Hsiao-Fen Hsiao, Ming-Lang Tseng. 333-341 [doi]
- Human-Oriented Image Retrieval of Optimized Multi-feature via Genetic AlgorithmMingsheng Liu, Jianhua Li, Hui Liu. 342-349 [doi]
- Genetic Algorithm Based on Activities Resource Competition Relation for the RCPSPShiman Xie, Beifang Bao, Jianwei Chen. 350-356 [doi]
- A New Flatness Pattern Recognition Model Based on Variable Metric Chaos Optimization Neural NetworkRuicheng Zhang, Xin Zheng. 357-364 [doi]
- Comparison between BP Neural Network and Multiple Linear Regression MethodGuoli Wang, Jianhui Wu, Sufeng Yin, Liqun Yu, Jing Wang. 365-370 [doi]
- Research of Granularity Pair and Similar Hierarchical AlgorithmChunfeng Liu, Li Feng. 371-378 [doi]
- The Research and Application of Parallel Generalized Minimal Residual Algorithm Based on Grid MPI Parallel Running FrameworkYun Tang, Junsong Luo, Yajuan Hao. 379-386 [doi]
- A New Family of Methods for Nonlinear EquationsYuxin Zhang, Hengfei Ding, Wansheng He, Xiaoya Yang. 387-394 [doi]
- Convergence of the Semi-implicit Euler Method for Stochastic Age-Dependent Population Equations with Markovian SwitchingWeijun Ma, Qimin Zhang. 407-414 [doi]
- Interior Point Algorithm for Constrained Sequential Max-Min ProblemsXiaona Fan, Qinglun Yan. 415-422 [doi]
- Representations for the Generalized Drazin Inverse of Bounded Linear OperatorsLi Guo, Xiankun Du. 423-430 [doi]
- Uniformity of Improved Versions of ChordJacek Cichon, Rafal Kapelko, Karol Marchwicki. 431-438 [doi]
- Aggregate Homotopy Method for Solving the Nonlinear Complementarity ProblemXiaona Fan, Qinglun Yan. 439-446 [doi]
- A Biomathematic Models for Tuberculosis Using Lyapunov Stability FunctionsShih-Ching Ou, Hung-Yuan Chung, Chun-Yen Chung. 447-453 [doi]
- Construction of Transition Curve between Nonadjacent Cubic T-B Spline CurvesJincai Chang, Zhao Wang, Aimin Yang. 454-461 [doi]
- Finite Element Simulation of Reinforce-concrete Frame Beam to Resist Progressive CollapseJiarui Qi, Youpo Su, Yahui Sun, Yousong Ding, Lihui Ma. 462-469 [doi]
- Recognition of Linkage Curve Based on Mathematical MorphologyLiyan Feng, Teng Liu, Xuegang Li, Mingyu Tian. 470-477 [doi]
- Interval Implicitization of Parametric SurfacesNing Li, Jing Jiang, Wenfeng Wang. 478-485 [doi]
- Calculation Method of Indirect Accident Loss Based on Life ValueShuzhao Chen, Qingxiang Cai, Yanchao Yang, Cangyan Xiao. 486-492 [doi]
- Hazard Source Identification of Mined-Out Area Based on Grey System TheoryHaibo Zhang, Weidong Song. 493-500 [doi]
- Consistency Analysis of Dynamic Evolution of Software Architectures Using Constraint Hypergraph GrammarsHongzhen Xu, Bin Tang, Ying Gui. 501-508 [doi]
- Scalable Model for Mining Critical Least Association RulesZailani Abdullah, Tutut Herawan, Mustafa Mat Deris. 509-516 [doi]
- Research on the Spatial Structure and Landscape Patterns for the Land Use in Beijing Suburb Based on RS & GISYuyuan Wen. 517-524 [doi]
- Adaptive Filter and Morphological Operators Using Binary PSOMuhammad Sharif, Mohsin Bilal, Salabat Khan, M. Arfan Jaffar. 525-532 [doi]
- Driving Factors Identification Based on Derivative Process of Subjective Default Credit RiskJiajun Li, Jia Zhao, Liping Qin. 533-540 [doi]
- Mechanical Behavior Analysis of CDIO Production-Blood Vessel Robot in Curved Blood VesselFan Jiang, Chunliang Zhang, Yijun Wang. 541-548 [doi]
- The Choice of Neuropathological Questionnaires to Diagnose the Alzheimer s Disease Based on Verbal Decision Analysis MethodsIsabelle Tamanini, Plácido Rogério Pinheiro, Mirian Caliope Dantas Pinheiro. 549-556 [doi]
- Applying Verbal Decision Analysis on the Choice of Materials to the Construction Process of Earth DamsPlácido Rogério Pinheiro, Isabelle Tamanini, Francisco Chagas da Silva Filho, Moisés Ângelo de Moura Reis Filho. 557-564 [doi]
- Research on Numerical Analysis of Landslide Cataclysm Mechanism and Reinforcement Treatment Scheme in ShengLi Open-Pit Coal MineYanbo Zhang, Zhiqiang Kang, Chunhua Hou. 565-572 [doi]
- Adaptive Methods for Center Choosing of Radial Basis Function Interpolation: A ReviewDianxuan Gong, Chuanan Wei, Ling Wang, Lichao Feng, Lidong Wang. 573-580 [doi]
- Novel Approach for the Design of Half-Band FilterXiaohong Huang, Zhaohua Wang. 581-588 [doi]
- Key Technique of GMTM for Numerical Analysis Modeling in Geotechnical Engineering: Calculation Region CuttingYongliang Lin, Xinxing Li. 589-596 [doi]
- Pagerank-Based Collaborative Filtering RecommendationFeng Jiang, Zhijun Wang. 597-604 [doi]