36 | -- | 0 | J. Emilio Quiroz-Ibarra, Guillermo M. Mallén-Fullerton, Guillermo Fernández-Anaya. DNA Paired Fragment Assembly Using Graph Theory |
37 | -- | 0 | Fan Wu 0005, Kun Fu, Yang Wang, Zhibin Xiao, Xingyu Fu. A Spatial-Temporal-Semantic Neural Network Algorithm for Location Prediction on Moving Objects |
38 | -- | 0 | Sayaka Kamei, Hirotsugu Kakugawa. An Asynchronous Message-Passing Distributed Algorithm for the Generalized Local Critical Section Problem |
39 | -- | 0 | Shahid Anwar, Jasni Mohamad Zain, Mohamed Fadli Bin Zolkipli, Zakira Inayat, Suleman khan, Bokolo Anthony, Victor Chang. From Intrusion Detection to an Intrusion Response System: Fundamentals, Requirements, and Future Directions |
40 | -- | 0 | Georgios Drakopoulos, Andreas Kanavos, Konstantinos Tsakalidis. Fuzzy Random Walkers with Second Order Bounds: An Asymmetric Analysis |
41 | -- | 0 | Yunpeng Zhang, Cheng-You Wang, Xiao Zhou. RST Resilient Watermarking Scheme Based on DWT-SVD and Scale-Invariant Feature Transform |
42 | -- | 0 | Ziyan Chen, Yu Huang, Yuexian Liang, Yang Wang, Xingyu Fu, Kun Fu. RGloVe: An Improved Approach of Global Vectors for Distributional Entity Relation Representation |
43 | -- | 0 | Yuan Feng, Li Wang, XinHong Liu. λ Measure Based Approach |
44 | -- | 0 | Danilo Pelusi, Raffaele Mascella, Luca G. Tallini. Revised Gravitational Search Algorithms Based on Evolutionary-Fuzzy Systems |
45 | -- | 0 | Xiaofeng Wang, Yang Li. An Efficient Sixth-Order Newton-Type Method for Solving Nonlinear Systems |
46 | -- | 0 | Chunhua Jia, Hong Zhu. An Improved Multiobjective Particle Swarm Optimization Based on Culture Algorithms |
47 | -- | 0 | Darra Hofman, Luciana Duranti, Elissa How. Trust in the Balance: Data Protection Laws as Tools for Privacy and Security in the Cloud |
48 | -- | 0 | Xi-Guang Li, Shou-Fei Han, Liang Zhao, Chang-qing Gong, Xiao-Jing Liu. Adaptive Mutation Dynamic Search Fireworks Algorithm |
49 | -- | 0 | Khaled Bouzenad, Messaoud Ramdani. Multivariate Statistical Process Control Using Enhanced Bottleneck Neural Network |
50 | -- | 0 | Shmuel T. Klein, Dana Shapira. Hierarchical Parallel Evaluation of a Hamming Code |
51 | -- | 0 | Raffaele Pizzolante, Bruno Carpentieri, Sergio De Agostino. Adaptive Vector Quantization for Lossy Compression of Image Sequences |
52 | -- | 0 | Geong Sen Poh, Vishnu Monn Baskaran, Ji-Jian Chin, Moesfa Soeheila Mohamad, Kay Win Lee, Dharmadharshni Maniam, Muhammad Reza Z'aba. Searchable Data Vault: Encrypted Queries in Secure Distributed Cloud Storage |
53 | -- | 0 | Huiru Zhao, Yuwei Wang, Mingrui Zhao, Chuyu Sun, Qingkun Tan. Application of Gradient Descent Continuous Actor-Critic Algorithm for Bilateral Spot Electricity Market Modeling Considering Renewable Power Penetration |
54 | -- | 0 | Ioannis K. Argyros, Janak Raj Sharma, Deepak Kumar. Extending the Applicability of the MMN-HSS Method for Solving Systems of Nonlinear Equations under Generalized Conditions |
55 | -- | 0 | Fayyaz Ahmad, Toseef Akhter Bhutta, Umar Shoaib, Malik Zaka Ullah, Ali Saleh Alshomrani, Shamshad Ahmad, Shahid Ahmad. Erratum: Ahmad, F., et al. A Preconditioned Iterative Method for Solving Systems of Nonlinear Equations Having Unknown Multiplicity. Algorithms 2017, 10, 17 |
56 | -- | 0 | Qin Li, Bo Liu. Clustering Using an Improved Krill Herd Algorithm |
57 | -- | 0 | Jinglin Du, Yayun Liu, Yanan Yu, Weilan Yan. A Prediction of Precipitation Data Based on Support Vector Machine and Particle Swarm Optimization (PSO-SVM) Algorithms |
58 | -- | 0 | Chun-Liang Lee, Tzu-Hao Yang. A Flexible Pattern-Matching Algorithm for Network Intrusion Detection Systems Using Multi-Core Processors |
59 | -- | 0 | Luyang Li, Bing Qin, Ting Liu. Contradiction Detection with Contradiction-Specific Word Embedding |
60 | -- | 0 | Yan Fu, Shengchun Wang. 9, 87 |
61 | -- | 0 | Elisabetta Stefani, Carlo Ferrari. Design and Implementation of a Multi-Modal Biometric System for Company Access Control |
62 | -- | 0 | Hanbing Liu, Mengsu Zhang, Xianqiang Wang, Shuai Tian, Yubo Jiao. Influence Factors Analysis on the Modal Characteristics of Irregularly-Shaped Bridges Based on a Free-Interface Mode Synthesis Algorithm |
63 | -- | 0 | Prima Dewi Purnamasari, Anak Agung Putri Ratna, Benyamin Kusumoputro. Development of Filtered Bispectrum for EEG Signal Feature Extraction in Automatic Emotion Recognition Using Artificial Neural Networks |
64 | -- | 0 | Sergio Amat, Ioannis K. Argyros, Miguel Ángel Hernández, Natalia Romero Álvarez. Expanding the Applicability of Some High Order Househölder-Like Methods |
65 | -- | 0 | Xin Tian, Song Li. Seismic Signal Compression Using Nonparametric Bayesian Dictionary Learning via Clustering |
66 | -- | 0 | Hamid Hassannejad, Guido Matrella, Paolo Ciampolini, Ilaria De Munari, Monica Mordonini, Stefano Cagnoni. A New Approach to Image-Based Estimation of Food Volume |
67 | -- | 0 | Yancai Xiao, Yujia Wang, Huan Mu, Na Kang. Research on Misalignment Fault Isolation of Wind Turbines Based on the Mixed-Domain Features |
68 | -- | 0 | Radu-Emil Precup, Radu-Codrut David, Alexandra-Iulia Stînean, Emil M. Petriu, Florin Dragan 0002. An Easily Understandable Grey Wolf Optimizer and Its Application to Fuzzy Controller Tuning |
69 | -- | 0 | Anak Agung Putri Ratna, Prima Dewi Purnamasari, Boma Anantasatya Adhi, F. Astha Ekadiyanto, Muhammad Salman, Mardiyah Mardiyah, Darien Jonathan Winata. Cross-Language Plagiarism Detection System Using Latent Semantic Analysis and Learning Vector Quantization |
70 | -- | 0 | Ying Mei, Guanzheng Tan, Zhentao Liu. An Improved Brain-Inspired Emotional Learning Algorithm for Fast Classification |
71 | -- | 0 | Qixuan Bi, Wenhao Gui. Bayesian and Classical Estimation of Stress-Strength Reliability for Inverse Weibull Lifetime Models |