1350 | -- | 1364 | Liang Ding, Guan Wang. A Stable Multi-parameter Thresholding Method for Ill-conditioned Sparse Signal Restoration and Optimal Parameter Choices |
1365 | -- | 1379 | Dongping Tian. EFPSO: An Effective Fuzzy Particle Swarm Optimization and Its Applications |
1380 | -- | 1390 | Chuanwei Zhang, Buyuan Guo, Mengyue Yang, Hongjun Zeng, Jianping Wen. A Study for Moving Object Extraction Method of Intelligent Vehicle Omnidirectional Lidar |
1391 | -- | 1403 | Faiz Ul Islam, Guangjie Liu, Xiangyuan Li. Image Encryption Scheme Based on 4D4W Hyperchaotic System |
1404 | -- | 1413 | Liquan Zhao, Yunfeng Hu, Yulong Liu, Changyin Liu. A Multi-stage and Variable Step Size Sparsity Adaptive Generalized Orthogonal Matching Pursuit Method |
1414 | -- | 1420 | Haiwei Lei, Bin Wang, Hehe Wu, Anhong Wang. Defect Detection for Polymeric Polarizer Based on Faster R-CNN |
1421 | -- | 1429 | Xiaokang Ding, Xiao-Jun Yang, Jin-Yun Jiang, Xiaolei Deng, Jian-Chen Cai, Yingyu Ji. Optimization and Analysis on Fuzzy SVM for Objects Classification |
1430 | -- | 1443 | Fuquan Zhang, Gangyi Ding, Qing Lin, Lin Xu, Zuoyong Li, Lijie Li. Research of Simulation of Creative Stage Scene Based on the 3DGans Technology |
1444 | -- | 1451 | Juan Wang, Xiuyan Sun, Wenmin Song, Linlin Tang. Resource Scheduling Method Based on Bayes for Cloud Computing |
1452 | -- | 1463 | Qiu-yu Zhang, Zi-xian Ge, Si-Bin Qiao. An Efficient Retrieval Method of Encrypted Speech Based on Frequency Band Variance |
1464 | -- | 1478 | Dongping Tian. Support Vector Machine for Content-based Image Retrieval: A Comprehensive Overview |
1479 | -- | 1488 | Yanping Liao, Xinke Lv. SINR Improvement in Space-time Adaptive Processing Systems Based on Meta-heuristic Algorithms |
1489 | -- | 1495 | Chao Chen, Xin-Ling Guo, Wen-hua Ren, Zhe-Ming Lu. The Structural Vulnerability Analysis of Power Grids Based on Laplacian Centrality |
1496 | -- | 1505 | Hao Chao, Liang Dong 0002, Yongli Liu. Two-stage Vocal Effort Detection Based on Spectral Information Entropy for Robust Speech Recognition |
1506 | -- | 1517 | Muhammad Zeeshan Muzaffar, Ijaz Mansoor Qureshi, Atta-ur-Rahman, Fahd Abdulsalam Alhaidari, Mohammad Aftab Alam Khan, Kiran Sultan. Compressed Sensing for Security and Payload Enhancement in Digital Audio Steganography |
1518 | -- | 1527 | Cheng Song, Yadong Zhang, Lei Wang, Zhizhong Liu. An Improved Location Privacy Protection Scheme |
1528 | -- | 1535 | Yue Zhao, Hang Li, Shoulin Yin, Yang Sun. A New Chinese Word Segmentation Method Based on Maximum Matching |
1536 | -- | 1548 | Yan-Jiao Wang, Zhuang Ma. Symbiotic Organisms Search algorithm based on Cloud Model Elite Search |
1549 | -- | 1558 | Hui Xia, Weiji Yang. Secure Cloud Storage Model Based on TPKE and ECE |
1559 | -- | 1576 | Chaur-Heh Hsieh, Tsorng-Lin Chia. Analysis of Evaluation Metrics for Image Segmentation |
1577 | -- | 1584 | Lili Meng, Guina Sun, Jia Zhang, Yanyan Tan, Chunjing Wang, Jingxiu Zong. JND based Multi-description Stereo Image Coding |
1585 | -- | 1594 | Linlin Tang, Xi Zhang, Zuohua Li, Yong Zhang. A New Hybrid Task Scheduling Algorithm Designed Based on ACO and GA |
1595 | -- | 1602 | Chien-Ming Chen 0001, Guangjie Wang, Weicheng Fang, Tsu-Yang Wu. A New Verifier-Based Anonymous Password-Authenticated Key Exchange Protocol |
1603 | -- | 1612 | Lijian Zhou, Zuowei Wang, Han Guo, Siyuan Hao, Zhao Zhuo. Palm-print Recognition based on CNN against Rotation and Noise |
1613 | -- | 1627 | Jingli Yang, Kexin Zheng, Zhen Sun, Na Qi. Link Loss Inference Algorithm with Minimal Cover Set and Compressive Sensing for Unicast Network Measurements |
1628 | -- | 1638 | Chaur-Heh Hsieh, Chung Ming Kuo, Yao-Sheng Hsieh. Bayesian-Based Probabilistic Architecture for Image Categorization Using Macro- and Micro-Sense Visual Vocabulary |