1 | -- | 9 | Xiaoyan Guo, Ming Zhang. Image of plant disease segmentation model based on improved pulse-coupled neural network |
10 | -- | 21 | Chin-Chen Chang, Guo-Dong Su, Chia-Chen Lin. An improved Sudoku-based data hiding scheme using greedy method |
22 | -- | 30 | Jing Chen, Xiangyan Tang, Jieren Cheng, Fengkai Wang, Ruomeng Xu. DDoS attack detection method based on network abnormal behaviour in big data environment |
31 | -- | 41 | Wencong Lai, Abdul A. Khan. A parallel adaptive-resolution hydraulic flood inundation model for flood hazard mapping |
42 | -- | 49 | Yuan Chen, Dongmei Han, Lihua Xia. A hidden Markov model to characterise motivation level in MOOCs learning |
50 | -- | 62 | Guo-Hua Qiu, Chin-Feng Lee, Chin-Chen Chang. Greedy algorithm for image quality optimisation based on turtle-shell steganography |
63 | -- | 73 | Yuhui Liu, Hecheng Li, Huafei Chen, Jing Huang. An efficient memetic algorithm using approximation scheme for solving nonlinear integer bilevel programming problems |
74 | -- | 81 | Ze Zheng, Xiangfeng Luo, Hao Wang. MESRG: multi-entity summarisation in RDF graph |
82 | -- | 90 | Xiaoxue Ma, Pengliang Shi. Dynamic multiple copies adaptive audit scheme based on DITS |
91 | -- | 102 | Gustavo Mendes Platt, Fran Sérgio Lobato, Gustavo Barbosa Libotte, Francisco Duarte Moura Neto. Basins of attraction and critical curves for Newton-type methods in a phase equilibrium problem |