Abstract is missing.
- Research on User Authentication Scheme against the Man-in-the-Middle AttackXiancun Zhou, Yan Xiong, Renjin Liu. 1-8 [doi]
- Study on Network Security Proactive Defense Model Based on Honey Pot TechnologyHaicheng Zhang. 9-14 [doi]
- Framework of Server and Storage VirtualizationYibing Song, Jian Cheng. 15-20 [doi]
- Efficient Management Scheme of Campus InformationJun Zheng, Fukai Cao, Jiansheng Gao. 21-26 [doi]
- Web Service Technology in College Financial Information Service SystemJun Zheng, Jundong Tang, Luyang Gao. 27-33 [doi]
- Efficient Network Monitoring SystemJiantao Gu, Yan Wu, Zhao Gu. 34-40 [doi]
- Software Design for Network Monitoring SystemJiantao Gu, Benluo Xiao, Zhao Gu. 41-46 [doi]
- Network Content Safety Design of Monitoring SystemJiantao Gu, Benluo Xiao, Zhao Gu. 47-52 [doi]
- Improvement Intrusion Detection Based on SVMJian-Hua Zhao, Wei-Hua Li. 53-60 [doi]
- Research on Subject Information Service Platform of University LibraryLian Lijun. 61-66 [doi]
- Networks Intrusion Behavior Prediction Based on Threat ModelDong Ma, Yongjun Wang, Feng Huang, Zhenlong Fu. 67-75 [doi]
- An Requirement-Aware Approach for Composing Web ServicesXiangbing Zhou, Hongjiang Ma, Fang Mao. 76-84 [doi]
- Efficient Modeling Scheme Based on Smart Neural NetworkYaping Yu, Jian Zhang, Ying Li. 85-91 [doi]
- Programming Design of Device Driver Based on Windows CE.NetQiuhong Fan, Hao Zhang, Peng Li, Jiongzhao Yang. 92-97 [doi]
- Contourlet-Based Fusion Method for Video Surveillance Using the Pulse Coupled Neural Networks ModelXi Cai, Guang Han, Jinkuan Wang. 98-105 [doi]
- Consensus-Based Detection Method for Visible and Thermal VideosGuang Han, Xi Cai, Jinkuan Wang. 106-111 [doi]
- M-Learning English Course Design in Chinese Local UniversityLin Hu. 112-118 [doi]
- Multi-objective Optimization for Data Placement Strategy in Cloud ComputingLizheng Guo, Zongyao He, Shuguang Zhao, Na Zhang, Junhao Wang, Changyun Jiang. 119-126 [doi]
- Web-Based Teaching System of Tourism EnglishXiaohua Zhu. 127-132 [doi]
- Explore Sharing Platform of Medical Educational Teaching Resources with IT TechnologyDeliang Wen, Xiaodan Ma. 133-137 [doi]
- Groundwater Prediction Based on Time Series Model and Wavelet De-nosingYongxia Wei, Mingyang Qu, Xiaoyan Wang. 138-145 [doi]
- Efficient Image Watermarking Algorithm Using Non-negative Matrix Factorization and Discrete Wavelet TransformSong Liang, Jinhui Lai, Delong Cui. 146-151 [doi]
- Study on Sleep Quality and Learning Outcomes of College StudentsJia-Li Tian, Ji-Lin Li, Jian-Zhao Niu. 152-157 [doi]
- Study on Digital Library and User Interaction PlatformNan Pang. 158-163 [doi]
- Extracurricular Reading of College Students Based on StatisticsJianying Miao. 164-170 [doi]
- Code-Controlled Hardware Trojan HorseHongbo Gao, QingBao Li, Yu Zhu, Yong Liu. 171-178 [doi]
- Support Vector Machine Classification Algorithm and Its ApplicationYongli Zhang. 179-186 [doi]
- A Flatness Pattern Recognition Model Based on Wavelet Transform and Probabilistic Neural NetworkJiawei Wang, Ruicheng Zhang, Wentao Song. 187-194 [doi]
- Research on EEG Classification with Neural Networks Based on the Levenberg-Marquardt AlgorithmYue Chen, Shaobai Zhang. 195-202 [doi]
- Research on Reduction Algorithm Based on Variable Precision Rough SetZongjiang Wang. 203-210 [doi]
- SOA Based MRO Planning System with Knowledge RepositoryMinglun Ren, Panpan Yang. 211-218 [doi]
- A Modified Group Search Optimizer Algorithm for High Dimensional Function OptimizationLijin Wang, Xinxin Hu, Jing Ning, Lin Jing. 219-226 [doi]
- Research on Intelligence Optimization of Web Service Composition for QoSJianjun Li, Bin Yu, Wuping Chen. 227-235 [doi]
- Decision-Making Scheme Based on LIOWADMeihua Cheng, Shouzhen Zeng. 236-242 [doi]
- Intuitionistic Fuzzy Decision Making Based on OWA and Distance MeasuresShouzhen Zeng, Jiaqin Chen. 243-248 [doi]
- Research on Fingerprint Identification in Mobile TelephoneFukai Cao, Zheng Zheng, Yao Zhao. 249-253 [doi]
- Autonomous Vision-Based Safe Area Selection Algorithm for UAV Emergency Forced LandingAiying Lu, Wenrui Ding, Jiaxing Wang, Hongguang Li. 254-261 [doi]
- Non-extensive Statistical Mechanics and Statistical Distribution for Completely Open SystemsBin Yang, Heling Li, Ying Xiong. 262-271 [doi]
- The Convergence Theorems of Fixed Points for Nearly Uniformly L-Lipschitz MappingsJian Zhang, Yaping Yu, Yanli Liu. 272-279 [doi]
- Explicit Iteration Scheme with Perturbed Mapping for Common Xed Points of a Nite Family of I -Asymptotically Nonexpansive MappingsLingmin Zhang, Suhong Li, Xin Xiao, Huijuan Zhao. 280-287 [doi]
- On Distance Regular Graph of Valency 10 and a1=1Junhong Ma, Nan Ji. 288-292 [doi]
- Lie Symmetry Analysis for the Degasperis-Procesi Equation Based on MapleQing Wang, Tao Wang. 293-299 [doi]
- Oscillation Criteria for Nonlinear Neutral Perturbed Dynamic Equations on Time ScalesXiuping Yu, Hongkai Sun, Hongyu Yang, Haibin Jing. 300-308 [doi]
- An Analytical Method for Parameter Estimation ErrorsQiuhong Fan, Qun Wei, Peng Li, Baoxiang Liu. 309-314 [doi]
- Inverse Signed Total Domination Numbers of Some Kinds of GraphsZhongsheng Huang, Zhifang Feng, Huaming Xing. 315-321 [doi]
- Dynamic Construction of Additively Weighted Network Voronoi DiagramXin Liu, Yili Tan, Hongmei Yang. 322-327 [doi]
- (k, d)*-Choosability of K 5-Minor-Free GraphsWenjing Miao. 328-333 [doi]
- Approximation Theoretic Aspects of Probabilistic Representations for Bi-continuous SemigroupsDingbang Cang, Shigang Ge. 334-340 [doi]
- Ruin Probability of Double Type Insurance Compound Negative Binomial Risk ModelJing Wei, Haisheng Liu, Wenyong Gui. 341-347 [doi]
- On a Class of Locally Dually Flat Isotropic Berwald MetricsWenjing Zhao, Bochao Qu, Li Li, Linan Shi. 348-355 [doi]
- PDEs Solution Based on Two-Stage MFS-MPS and One-Stage MFS-MPSXiaolei Wang, Tongsong Jiang, Ziwu Jiang. 356-363 [doi]
- On Explicit Determinants of RFPLR and RFPLL Circulant Matrices Involving Pell Numbers in Information TheoryZhao-Lin Jiang, Juan Li, Nuo Shen. 364-370 [doi]
- Solutions for One-Dimensional Time-Dependent Schrödinger EquationsTongsong Jiang, Xiaolei Wang, Zhaozhong Zhang. 371-378 [doi]
- Contact Relation and Way-Below Relation in Fuzzy SettingXueyou Chen. 379-386 [doi]
- Integrated Model of Support Vector Machine Based on Optimization of Artificial Fish AlgorithmYong Ye, Lichuan Gu, Shaowen Li. 387-395 [doi]
- Improved Strategies of Ant Colony Optimization AlgorithmsPing Guo, Zhujin Liu, Lin Zhu. 396-403 [doi]
- Improved Ant Colony Optimization for Detecting Functional Modules in Protein-Protein Interaction NetworksJunzhong Ji, Zhijun Liu, Aidong Zhang, Lang Jiao, Chunnian Liu. 404-413 [doi]
- Trimmed Estimator of Multiple Linear Errors in Variables Model Based on Decimal Integer Encoding Genetic AlgorithmHuirong Cao, Mengtian Yue. 414-421 [doi]
- Cryptanalysis of Wang's Auditing Protocol for Data Storage Security in Cloud ComputingChunxiang Xu, Xiaohu He, Daniel Abraha-Weldemariam. 422-428 [doi]
- ADRC of Displacement Delayed Feedback System for the Rolling Mill Main Drive SystemRuicheng Zhang, Pingping Yang, Peipei Wang, Mingduo Li. 429-437 [doi]
- Intrusion Detection Based on BP Neural Network and Genetic AlgorithmJian-Hua Zhao, Wei-Hua Li. 438-444 [doi]
- Township Health Center Information System Based on Cloud ComputingHuaiyong Nie, Lina Yue. 445-450 [doi]
- Heuristic Algorithms of Single-Machine Multi-criteria SchedulingShuming Guan, Junhong Ma, Xiaoqing Lu, Wenyi Zhang. 451-456 [doi]
- AIB-SPMDM: A Smartphone Malware Detection Model Based on Artificial ImmunologyMin Zhao, Tao Zhang, Jinshuang Wang, Zhijian Yuan. 457-465 [doi]
- Local Stable Mechanism for Particle Swarm Optimization AlgorithmBo Wei, Yuanxiang Li, Dingcai Shen, Fei Yu, Xing Xu. 466-473 [doi]
- Mode of Regional Library Alliance under Cloud Computing EnvironmentSuping Ye, Jing Yang. 474-479 [doi]
- Research of Grid Resource Scheduling Based on Improved Ant Colony AlgorithmDan Liu, Shixia Ma, Zuhua Guo, Xiulan Wang. 480-487 [doi]
- Network Security Evaluation Model Based on Cloud ComputingJin Yang, Cilin Wang, Le Yu, Caiming Liu, Lingxi Peng. 488-495 [doi]
- A Quantum Potential Strategy by Quantum Genetic AlgorithmBing Han, Shujun Wang, Junhong Ma. 496-501 [doi]
- Circle-Based Improvement Strategy of Simulated Annealing Genetic AlgorithmBing Han, Junna Jiang, Xinchun Wang. 502-507 [doi]
- Experimental Platform Based on Cloud ComputingLina Yue, Huaiyong Nie, Lu Dong. 508-513 [doi]
- Alliance Mechanism Based on Cloud ComputingJing Xu, Shuangqi Yang, Kui Yu. 514-520 [doi]
- High-Speed Multi-hop AMCP Algorithm in MWSNDengyuan Xu, Hong Wang. 521-527 [doi]
- Prediction of Rheumatoid Arthritis-Associated Antigen Peptides Using a Novel Mixed AlgorithmTao Liu, Jiuyun Zhang, Tianyu Lei. 528-535 [doi]
- Numerical Simulation Method for the SIV Epidemic Model with Impulsive Vaccination and Infection-AgeWei Wei. 536-543 [doi]
- Dynamics and Simulations of Impulsive Semi-Ratio-Dependent Predator-Prey System with Functional ResponsesWenxiang Zhang, Zhanji Gui, Kaihua Wang. 544-551 [doi]
- Orthogonal Design of Pharmaceutical Experiment Based on SPSSJi Zhou, Ran An, Heng Zhang, Yongqiong Liu. 552-560 [doi]
- Optimization of Corn Furrow Irrigation Modes Based on RAGA-PPC ModelYongxia Wei, Yuyu Zhao, Xiaoyan Wang. 561-566 [doi]
- Research on Chinese Medicine Syndrome of Sleep Disorders of College StudentsJia-Li Tian, Huiqin Zhao, Cheng Li. 567-574 [doi]
- Study on Treatment for Subhealth-Induced Insomnia among Student Patients by Self Point MassageJia-Li Tian, Ye-qing Zhang, Jian Han. 575-582 [doi]
- Evaluating System of Treatment of Quercetin and Resveratrol Mixture in Type 2 Diabetic RatsYan Jiang, Zhilu Wang, Jinxiu Chu, Hong Yu, Ting Han, Xin Zhao, Shuying Han. 583-589 [doi]
- Medical Image Analysis in Treatment of Quercetin and Resveratrol Mixture on Type 2 Diabetic Cardiomyopathy RatsYan Jiang, Jian Chang, Jing Bai, Hong Yu, Jinxiu Chu, Ting Han, Xin Zhao, Shuying Han. 590-595 [doi]
- Progressive Relaxation Training Assisted Cognitive Therapy of InsomniaJia-Li Tian, Hui-qin Zhao, Yan-mei Xu. 596-603 [doi]
- TCM Dyspnea Syndrome Experience Mining Based on Rough Set TheoryHuixia Ma, Ya Wang, Wenjing Gong, Jutai Bao. 604-610 [doi]
- Fault Diagnosis of NPC Inverter Based on Multi-layer SVMDanjiang Chen, Yinzhong Ye, Rong Hua. 611-621 [doi]
- Study on Cashier Work of the Information AgeYinqiu Wang. 622-627 [doi]
- Human-Computer Interaction in Ubiquitous Computing EnvironmentsXianquan Zeng, Hongwen Pei. 628-634 [doi]
- Research on Collaborative Decision TheoryAimin Wang, Xia Zheng, Ruihong Zhang, Jie Li. 635-642 [doi]
- Research on Knowledge Discovery Service System in the University LibraryZhijiang Liao, Min Gao. 643-650 [doi]
- A TNC Protocol for 3GPP-WLAN Integrated EnvironmentJun Ma, Yuanbo Guo. 651-657 [doi]
- Risk Information Management of Complex Weapons System Development Based on Interpretative Structure ModelingShanqing Gao, Xiaoyun Wu, Lixin Xing, Qiang Wang. 658-664 [doi]
- Demand Forecast of Regional Tourism Based on Variable Weight Combination ModelLijuan Liu. 665-670 [doi]
- Optimal Algorithm for Maintaining Equipment LoadingSu Yan, Pengcheng Yan, Jiangsheng Sun, Lianwu Zhang, Shaoguang Wang. 671-677 [doi]
- Document Modeling of PDM Based on STEP in Integrated EnvironmentQun Wei, Qiuhong Fan, Hao Zhang. 678-684 [doi]
- Research on Copper Electroforming Based on Using of Nano-La2O3Zhiyong Li, Zhipeng Duan, Hongli Liu. 685-692 [doi]
- A Memetic Algorithm Applied to Allocation Problem of the Concrete Mixing PlantsZhifeng Hao, Ai-Jing Wang, Han Huang. 693-700 [doi]
- Research on Gascut-While-Drilling Volume Caculation Model during Underbalanced DrillingJun He, Jing Li, Zhaoming Zhou, Dong Zhang. 701-708 [doi]
- Abhesion Mechanics Model of Horizontal Well Cement-Formation InterfaceJinan Zhang, Yinlong Wang, Chi Ai, Jindan Yin, Fuping Feng. 709-716 [doi]
- Mechanical Behaviors of Shape Memory Alloys Concerning Small-Strain and Large-Strain MethodsJie Yao, Yong-hong Zhu, Yun-zhang Wu. 717-723 [doi]
- Orebody Model Compression Research Based on Decimal Morton CodeYajing Liu, Mei Li. 724-729 [doi]
- Performance Analysis of Transcritical CO2 Compression CycleHongli Wang, Jingrui Tian, Huiqin Liu. 730-736 [doi]
- Research on Speed Estimation of PMSM Based on Radial Basis Function and MARSWei Gao, Xiaojun Hua, Zhirong Guo. 737-744 [doi]
- Research on EEG Based on SVM and EMDXinxin Wang, Jianlin Zhao. 745-751 [doi]
- Digital and Analog Compatible TV Transmitter Power MeasurementSujuan Zhang, Yanli Zhang, Yongchang Liu, Jun Ma. 752-758 [doi]
- Evidence Theory-Based Safety Evaluation in CoalmineWensheng Liu. 759-765 [doi]
- Study on Hopf Bifurcation of Displacement Delayed Feedback System for the Rolling Mill Main Drive SystemRuicheng Zhang, Pingping Yang, Mingduo Li, Xulei Hu. 766-774 [doi]
- Quantitative and Spatial Layout Evolvement Model of Land Use Based on Fuzzy SystemZuohua Miao, Yong Chen, Xiangyang Zeng. 775-782 [doi]
- Research on Web Text MiningRuan Guangce. 783-790 [doi]
- The Algorithmic Complexity of Reverse Signed Domination in GraphsWensheng Li, Zhongsheng Huang, Zhifang Feng, Huaming Xing, Yuejing Fang. 791-796 [doi]
- SVM Classification Algorithm in ECG ClassificationYanwei Zhu. 797-803 [doi]
- Research on Flexible Management of Business ProcessJiangjing Wang, Jiulei Jiang. 804-811 [doi]
- The Research of Matrix Converter Space Vector ModulationXu Zhuo, Zhao Shan, Chen Rui Min, Xiao Yong. 812-820 [doi]
- Optimization of Wheel Positioning Parameters of Automotive Front Suspension Based on ADAMSLijun Qian, Qin Shi. 821-827 [doi]
- Research on Equipment Failure Risk Control System Based on the Knowledge IntegrationYan-guang Chen. 828-833 [doi]
- Flow Control System Performance Optimization Base-On Zero-CopySujuan Zhang, Wei Li, Yanli Zhang, Tao Wu. 834-839 [doi]