343 | -- | 355 | Jia Chen. An identification method of malicious nodes in wireless communication based on dynamic reputation algorithm |
356 | -- | 370 | Hong Song, Zhi Yue. Research on user experience evaluation of man-machine interaction interface based on virtual reality technology |
371 | -- | 390 | Tiebo Sun, Meng Li, Weibing Wang, Chunyue Liu. 3D reconstruction of UAV remote sensing sequence image based on iterative constraint weighting |
391 | -- | 422 | R. S. Ramya, Ganesh Singh T., Sejal Santosh Nimbhorkar, K. R. Venugopal 0001, S. S. Iyengar 0001, L. M. Patnaik. DCLT: retrieving relevant documents using cosine similarity and LDA in text mining |
423 | -- | 431 | Xiaowu Li, Runxin Li, Lianyin Jia, Jiaman Ding, Jinguo You, Hongbo Fan. A novel protocol of RFID tag identification using a single mobile reader |
432 | -- | 448 | Gang Dai, Quanxin Wang, Baomin Xu, Lijun Sun. Community structure detection algorithm based on link prediction |