Abstract is missing.
- CDQA: An ontology-based question answering system for Chinese delicacyWenke Yin, Weiyi Ge, Heng Wang. 1-7 [doi]
- Incremental clustering in short text streams based on BM25Lixin Xu, Guang Chen, Lei Yang. 8-12 [doi]
- Automatic image annotation combining SVMS and KNN algorithmGuanglei Chu, Kai Niu, Baoyu Tian. 13-17 [doi]
- Link prediction in Sina Microblog using comprehensive features and improved SVM algorithmYun Li, Kai Niu, Baoyu Tian. 18-22 [doi]
- Comparison of SVM classification method and semantic similarity method for sentiment classificationChangqin Quan, Xiquan Wei, Fuji Ren. 23-28 [doi]
- Mining the impact of social news on the emotions of users based on deep modelXiao Sun, Fei Gao, Fuji Ren. 29-32 [doi]
- Water quality prediction based on a novel hybrid model of ARIMA and RBF neural networkWeihui Deng, Guoyin Wang, Xuerui Zhang, Yishuai Guo, Guangdi Li. 33-40 [doi]
- A self-learning algorithm for predicting the running vehicle attitudeLi Wang, Mingzhi Liang, Huaikun Xiang. 41-45 [doi]
- Sentiment Analysis of Microblog text based on joint sentiment-topic modelHui Zhang, Yiqun Liu, Shaoping Ma. 46-54 [doi]
- Remote sensing image enhancement based on wavelet analysis and histogram specificationLiang Xie, Guoyin Wang, Xuerui Zhang, Bin Xiao, Botian Zhou, Fan Zhang. 55-59 [doi]
- Cross-domain sentiment classification using deep learning approachMiao Sun, Qi Tan, Runwei Ding, Hong Liu. 60-64 [doi]
- Robust hand tracking with posture recognition via online learningHuasong Huang, Yulong Zhou, Pengjin Chen, Runwei Ding. 65-70 [doi]
- Improved minimum squared error method for robust classificationFangzhi Zhu, Rui Yan, Yong Sun. 71-75 [doi]
- A simulation knowledge management system with the application of semantic matching algorithm based on ontologyBowen Li, Lin Zhang, Anrui Hu, Yifan Mai. 76-80 [doi]
- Facial age estimation using bio-inspired features and cost-sensitive ordinal hyperplane rankXiaohu Sun, Pingping Wu, Hong Liu. 81-85 [doi]
- An improved deep log analysis method based on data reconstructionChaofei Wang, Jing Chen, Xiaopeng Liu, Jinwei Zhao. 86-90 [doi]
- Joined cepstral distance features two-stage multi-class classification for emotional speechChangqin Quan, Bin Zhang, Fuji Ren. 91-96 [doi]
- Face recognition based on double complementary space and multi-decision classificationFuji Ren, Yanqiu Li, Liangfeng Xu, Min Hu, Xiaohua Wang. 97-102 [doi]
- Age estimation and gender classification of facial images based on Local Directional PatternMin Hu, Yaona Zheng, Fuji Ren, He Jiang. 103-107 [doi]
- Adaptive facial expression recognition method based on MBP and HMOG featureMin Hu, Xiaoyin Huang, Xiaohua Wang, Kun Li, Fuji Ren, Liangfeng Xu. 108-112 [doi]
- Fruit recognition based on multi-feature and multi-decisionXiaohua Wang, Wei Huang, Chao Jin, Min Hu, Fuji Ren. 113-117 [doi]
- New word detection and emotional tendency judgment based on mixed modelXiao Sun, Chongyuan Sun, Fuji Ren. 118-123 [doi]
- Image restoration method self-adaptive to the dielectric layer colorTian Chen, Xin Yi, Dandan Shen, Fuji Ren, Wei Wang, Bingdong Yang. 124-129 [doi]
- Modeling blog user for Chinese micro-blog sentiment classification with fuzzy SVMXiao Sun, Chengcheng Li, Fuji Ren. 130-134 [doi]
- A hierarchical intention recognition model for situated dialogue systemYongbin Liu, Xiaojie Wang. 135-139 [doi]
- Hadoop-based network traffic anomaly detection in backboneJishen Yu, Feng Liu, Wenli Zhou, Hua Yu. 140-145 [doi]
- Study on building library personalized subject service platform in big data environment - Lib 2.0 solutions based on Hadoop frameworkXia Wang, Hongxin Cao. 146-149 [doi]
- Analyzing traffic characteristics between backbone networks based on HadoopDong Peng, Yuanyuan Qiao, Jie Yang. 149-153 [doi]
- Research on the analytic factor neuron model based on cloud generator and its application in oil&gas SCADA security defenseYong Qin, Xiedong Cao, Peng Liang, Qichao Hu, Weiwei Zhang. 155-159 [doi]
- A real-time top-k query algorithm and parallelized implementationYao Lu, Jun Liu. 160-164 [doi]
- Group strategy for remaining tags in anti-collision algorithm for RFID systemYong Wang, Xiaohu Tang, Lijuan Zhang. 165-169 [doi]
- Prefix-maximized query-tree anti-collision algorithm with robust estimation for RFID systemYong Wang, Xiaohu Tang, Lijuan Zhang. 170-174 [doi]
- An improved k-subset algorithm for load balance problems in Cloud ComputingLin-Lin Tang, Pingfei Ren, Jeng-Shyang Pan. 175-179 [doi]
- Performance modeling and optimization of MapReduce programsJinsong Yin, Yuanyuan Qiao. 180-186 [doi]
- Real-time anomaly traffic monitoring based on dynamic k-NN cumulative-distance abnormal detection algorithmRuoning Song, Fang Liu. 187-192 [doi]
- Analysis of network node behavior based on MapReduceGang He, Peng Yang, Xiaochun Wu. 193-197 [doi]
- A finer-grained resource management model oriented to role-based access controlHouren Xiong, Xingyuan Chen, Bin Zhang 0015, Guangxia Wang. 198-206 [doi]
- HFA: Novel naming and routing design for future Internet architectureMeng Zhang, Jianfeng Guan, Wei Quan, Changqiao Xu, Hongke Zhang. 207-211 [doi]
- CANR: Cache-Aware Name-based RoutingXiaoyan Hu, Jian Gong. 212-217 [doi]
- Design and research of Multi-Agent Control system for central cooling systemYumang Shao, Ying Wu, Yutao Chen. 218-221 [doi]
- A 3D-beamforming scheme for throughput optimization in Heterogeneous NetworkMinghuan Tang, Gaofeng Cui, Xun Zou, Weidong Wang, Yinghai Zhang. 222-227 [doi]
- User grouping method for downlink beamforming in massive MIMO systemXun Zou, Gaofeng Cui, Minghuan Tang, Songsong Xiao, Weidong Wang. 228-233 [doi]
- Method for detecting the obfuscated malicious code based on behavior connectionWenwu Li, Chao Li, MiYi Duan. 234-240 [doi]
- A study on the software Test Case Reuse Model of feature orientedWenwu Li, MiYi Duan. 241-246 [doi]
- Robust eye tracking and location method based on Particle filtering algorithmFengyi Zhou, Wenjie Chen, Hao Fang. 247-252 [doi]
- Lyapunov-based output feedback control of hypersonic vehicleHaijing Xu, Yingmin Jia. 253-258 [doi]
- Face recognition based on adaptive weighting and fuzzy fusion with single training sampleXiaohua Wang, Chao Jin, Wei Liu, Min Hu, Fuji Ren. 259-264 [doi]
- WeWatch: Bi-screen video watching experience on smart devicesFuji Ren, Mengni Chen, Yu Gu 0003. 265-270 [doi]
- Finite-time consensus of multi-agent systems with double integrator dynamics using only relative position measurementsHaochong Zhou, Yingmin Jia. 271-276 [doi]
- The digital protection and inheritance of Chinese woodblock new year printsHongyuan Lei. 277-281 [doi]
- Speaker age recognition based on isolated words by using SVMMengdi Yue, Ling Chen, Jie Zhang, Hong Liu. 282-286 [doi]
- Binaural sound localization based on time-delay compensation and spatial grid matchingBaolong Zhao, Zhuo Fu, Jie Zhang, Yuezhao Chen, Runwei Ding. 287-291 [doi]
- The comparison and performance analysis of CCN under mobile environmentsJianfeng Guan, Wei Quan, Changqiao Xu, Hongke Zhang. 292-296 [doi]
- Composite classification methods on composition identificationKun Niu, Shubo Zhang, Ran He, Shufan Zhang. 297-301 [doi]
- Universalization of narrow methods: Case study on autoencodersAlexey Potapov, Vita Batishcheva, Shuchao Pang. 302-304 [doi]
- An incremental community mining method in dynamic social networksYing Xia, Linglin Tuo. 305-309 [doi]
- Keyword extraction of web pages based on domain thesaurusGuowan He, Jie Wang, Yafeng Zhang, Yan Peng. 310-314 [doi]
- Generalized additive models of hospital admissions with respiratory disease and meteorologyLei An, Hongyu Kang, Yi Xin, Xiaoming Hu, Qin Li, Yin Ling, Heng Gu. 315-318 [doi]
- Prevalence and risk factors associated with chronic disease in New Rural Cooperative Medical System: County in central ChinaHongyu Kang, Lei An, Yi Xin, Xiaoming Hu, Qin Li, Ling Yin, Siyue Zhang. 319-322 [doi]
- Catlinks - a category clustering algorithm based on multi-class regressionRui Liu, Lixin Ding, Lan Xie. 323-326 [doi]
- SAR image change detection using regularized dictionary learning and fuzzy clusteringChujian Bi, Haoxiang Wang, Rui-bao. 327-330 [doi]
- Research of users' viewing habits based on clustering methodXi Jiang, Yan Wang, Jianping Chai. 331-335 [doi]
- Identification of reordering mark "de" in Chinese-English patent machine translationJing Liu, Dongmei Zhang, Yaohong Jin. 336-340 [doi]
- A new time-frequency method for EEG artifacts removingJiawei Wang, Fei Su. 341-346 [doi]
- Finding the optimal sequence of features selection based on reinforcement learningSong Bi, Lei Liu, Cunwu Han, Dehui Sun. 347-350 [doi]
- Building diverse and optimized ensembles of gradient boosted trees for high-dimensional dataTarek Abdunabi, Otman A. Basir. 351-356 [doi]
- The application of text similarity computing in the Clinical Decision Support SystemTengfei Xue, Yuyu Yuan, Qunchao Fu, Heng Gu, Siyue Zhang, Cong Wang. 357-361 [doi]
- Study on HCPV power forecasting model based on grey neural network and Markov chainZhengqiu Yang, Zeping Li, Jiapeng Xiu. 362-365 [doi]
- Prediction of solar power generation based on the principal components analysis and the BP neural networkJiapeng Xiu, Chenchen Zhu, Zhengqiu Yang. 366-369 [doi]
- A system for web page sensitive keywords detectionHeng Gu, Weiguang Wang, Peng Liu, Siyue Zhang, Jianyi Liu, Cong Wang. 370-374 [doi]
- Reordering adverbial chunks in Chinese-English patent machine translationHongzheng Li, Yun Zhu, Yang Yang, Yaohong Jin. 375-379 [doi]
- Power generation forecasting model for photovoltaic array based on generic algorithm and BP neural networkZhengqiu Yang, Yapei Cao, Jiapeng Xiu. 380-383 [doi]
- A high concentrated photovoltaic output power predictive model based on Fuzzy Clustering and RBF neural networkCheng Yan, Jiapeng Xiu, Chen Liu, Zhengqiu Yang. 384-388 [doi]
- Word distributed representation based text clusteringShan Feng, Ruifang Liu, Qinlong Wang, Ruisheng Shi. 389-393 [doi]
- A web page malicious script detection systemSiyue Zhang, Weiguang Wang, Zhao Chen, Heng Gu, Jianyi Liu, Cong Wang. 394-399 [doi]
- Prediction of soil moisture based on Extreme Learning Machine for an apple orchardYue Liu, Long Mei, Su Ki Ooi. 400-404 [doi]
- Image semantic segmentation with a novel stochastic modelTao Liu, Anni Cai. 405-409 [doi]
- Station passenger flow forecast for urban rail transit based on station attributesZhiying He, Bo Wang, JianLing Huang, Yong Du. 410-414 [doi]
- Semi-supervised Chinese Open Entity Relation ExtractionMingyin Wang, Lei Li, Fang Huang. 415-420 [doi]
- Micro blog topic propagation modeling based on timed Petri-NetKun Li, Liping Chen, Yidong Cui, Yuehui Jin. 421-426 [doi]
- Emotion predicting method based on emotion state change of personae according to the other's utterancesKazuyuki Matsumoto, Fuji Ren, Qingmei Xiao, Minoru Yoshida, Kenji Kita. 427-432 [doi]
- Using hybrid Neural Network to address Chinese Named Entity RecognitionGuoyu Wang, Yongquan Cai, Fujiang Ge. 433-438 [doi]
- Parallelization of ontology construction and fusion based on MapReduceQian Zhang, Bin Wu, Juan Yang. 439-443 [doi]
- Research on Chinese multi-document hierarchical topic modeling automatic evaluation methodsYu Liu, Lei Li, Shuhong Wan, Zhiqiao Gao. 444-449 [doi]
- Improved chart parsing applied Kazakh graph analysisNiu Na, Gulila Altenbek. 450-455 [doi]
- Exploring the speed limit of SM2Zhenwei Zhao, Guoqiang Bai. 456-460 [doi]
- Cloud computing model based on multiservice access dynamic detectionZhenyu Zhu, Hui Chen, Lianguo Wu. 461-464 [doi]
- Designing of authentication protocol for multi-level security virtual desktopsYanbing Liu, Haijun Zhang, Jing Ma, Yunpeng Xiao. 465-469 [doi]
- Cloud storage and search for mass spatio-temporal data through Proxmox VE and Elasticsearch clusterYicheng Zheng, Feng Deng, Qingmeng Zhu, Yong Deng. 470-474 [doi]
- A probe system for analyzing transmission and playback quality of online videosDi Wu, Yuehui Jin, Tan Yang. 475-480 [doi]
- Autonomous Agent Enhanced Workspace (AAEW) for Extended Enterprise (E2) collaborationMigar M. C. Tam, K. S. Li, Spencer K. C. Yung, Ericson K. W. Yuen. 481-486 [doi]
- A privacy preserving scheme for change increment of electricity big data base on symmetric cryptographyYiwen Nie, Wei Yang, Liusheng Huang, Xiaorong Lu. 487-490 [doi]
- Enacting Personal Knowledge Management & learning with web services interoperability toolsEric Tsui, W. M. Wang, Farzad Sabetzadeh. 491-494 [doi]
- Research of image information hiding algorithm based on quadrilateral partitionQing Xue, Guifang Zhang, Xiaochun Wang. 495-498 [doi]
- A quantitative quality control method of big data in cancer patients using artificial neural networkHong Shen, Jinglei Meng, Licheng Yu, Xuefeng Fang, Tianzhou Chen, Hui Yan, Honglun Hou. 499-504 [doi]
- A highly effective security model for privacy preserving on cloud storageSupachai Tangwongsan, Vuthinant Itthisombat. 505-509 [doi]
- Design of a comprehensive virtual machine monitoring systemJiangyong Shi, Yuexiang Yang, Jie He, Chuan Tang, Qiang Li. 510-513 [doi]
- Detecting the run time attacks in the cloud with an evidence collection based approachJie Lin, Chuanyi Liu, Zhichun Ning, Binxing Fang. 514-518 [doi]
- Study on the data integration platform of multi-regional SCADA system based on cloud computingChen Liu, Mengxin Liu, Zhengqiu Yang, Jiangpeng Xiu. 519-522 [doi]
- A new feature selection method for text categorization based on information gain and particle swarm optimizationFerruh Yigit, Ömer Kaan Baykan. 523-529 [doi]
- A fast big data collection system using MapReduce frameworkBing Li, Keith C. C. Chan. 530-535 [doi]
- MARS: Scheduling non-local tasks in mapreduceMingxing Tang, Changjian Wang, Yuxing Peng. 536-540 [doi]
- Research and design of intelligent navigation data platformYiming Shen, Yu Wu, Rui Wan. 541-546 [doi]
- Desgn and implementation of mobile payment system for intelligent travelChuang Ruan, Fang Xiao, Jianping Luo. 547-552 [doi]
- Design and implementation of vehicle fault diagnosis system for intelligent travelYiming Shen, Jianping Luo. 553-558 [doi]
- Map navigation system based on optimal Dijkstra algorithmChuang Ruan, Jianping Luo, Yu Wu. 559-564 [doi]
- Parking guidance system based on intelligent terminalYi Huang, Fang Xiao, Yiming Shen. 565-570 [doi]
- A big data processing methods for visualizationQunchao Fu, Wanheng Liu, Tengfei Xue, Heng Gu, Siyue Zhang, Cong Wang. 571-575 [doi]
- Research on UCL-based trusted computing model of webpage contentCong Liu, Xinyu Zhang, Yigang Diao. 576-581 [doi]
- Purchase decision of cloud computing services under different instance utilizationGuohua Deng, Donglin Chen, Yanjun Gui, Ling Chen. 582-586 [doi]
- A distributed video share system based on HadoopChen Liu, Kun Fan, Zengqiu Yang, Jiapeng Xiu. 587-590 [doi]
- Analysis on meteorological conditions and health factors based on C4.5 algorithmXu Han, Han Jiang, Yanfeng Jiang, Heng Gu, Siyue Zhang, Tao Lv, Cong Wang. 591-596 [doi]
- MF-PDP: Multi-function provable data possession scheme in cloud computingXiaojun Yu, Qiaoyan Wen. 597-603 [doi]
- A model for website anomaly detection based on log analysisXu Han, Tao Lv, Lin Wei, Yanyan Wu, Jianyi Liu, Cong Wang. 604-608 [doi]
- Detection methods for micro-cracked defects of photovoltaic modules based on machine visionPeng Xu, Wenju Zhou, Minrui Fei. 609-613 [doi]
- A cognitive method for melody stream transcriptionJiayin Sun, Hongyan Wang, Jiahui Liu. 614-618 [doi]
- Visual feature-based violent video detectionXin Ji, Ou Wu, Chenlong Wang, Jinfeng Yang. 619-623 [doi]
- Multi-source motion images fusion based on 3D sparse representationZhenhong Zhang, Junping Du, Liang Xu, Qingping Li. 624-629 [doi]
- Time-interleaved pipelined ADC design for computational intelligence and cloud computing applicationWen Cheng Lai, Jhin-Fang Huang, Wei-Jian Lin, Ta Chen Chiu. 630-633 [doi]
- Continues target tracking based on NCC and Kalman algorithmJun Zhou, Junping Du, Suguo Zhu. 634-638 [doi]
- Low illumination image Retinex enhancement algorithm based on guided filteringJingcao Yin, Hongbo Li, Junping Du, Pengcheng He. 639-644 [doi]
- High dynamic range motion image sequences reconstructionShouxin Cao, Junping Du, MeiYu Liang. 645-650 [doi]
- Sliding mode and active disturbance rejection compound synchronization for Hindmarsh-Rose neural networksWei Wei, Yingcai Dong, Tingli Su, Min Zuo, Junping Du. 651-655 [doi]
- Research on visualization of communication network in social topicBoxin Mao, Xin Jin, Shan Liu, Jianping Chai. 656-661 [doi]
- SDN-based load balancing strategy for server clusterHailong Zhang, Xiao Guo. 662-667 [doi]
- A ROP prediction approach based on improved BP neural networkJinan Duan, Jinhai Zhao, Li Xiao, Chuanshu Yang, Huinian Chen. 668-671 [doi]
- Path planning algorithm regarding rapid parking based on static optimizationHongbo Gao, Yuchao Liu, Xinyu Zhang, Guisheng Chen, Deyi Li. 672-678 [doi]
- Online unsupervised anomaly detection in large information systems using copula theoryBenoit Huyot, Yves Mabiala, Jean-François Marcotorchino. 679-684 [doi]
- An intelligent video streaming delivery of SVC based on rateless UEP convolutional codeJing Liu, Yun Shen, Yitong Liu, Nanxi Li, Dacheng Yang. 685-690 [doi]
- Cache for Flow Content: Solution to dependent packet processing in FPGADazhong He, Yun Xie, Hua Yu. 691-694 [doi]
- A novel clustering-based spectrum sensing in cognitive radio wireless sensor networksZhaowei Qu, Yang Xu, Sixing Yin. 695-699 [doi]
- A multi-stage data compression and transmission method for bulk data in low speed networkChao Chen, Yuehui Jin, Tan Yang. 700-705 [doi]
- Delay measurement and analysis of network performance on PlanetLabGuanlin Bian, Yuehui Jin, Tan Yang. 706-711 [doi]
- A novel network based on TD-LTE for counter-terrorism emergency communication in urban areaXue Liu, Xiaojun Jing, Songlin Sun, Hai Huang 0001. 712-716 [doi]
- A real-time bus arrival prediction method based on energy-efficient cell-tower positioningYidan Fan, Kun Niu, Nanjie Deng. 717-721 [doi]
- A three-layer distributed measurement system for cloud service networkLiren Xu, Xiaohong Huang, Zichao Li. 722-727 [doi]
- Housing intelligent lighting control strategy researchYansong Liang, Zhouding Jia, Huanzhong Yao, Jing Chen. 728-731 [doi]
- Research on modeling and development process for passive interoperability testingYahong Guo, Xiaohong Huang, Ming Di, Yan Ma. 732-737 [doi]
- Research on conformance testing method for 6LoWPAN neighbor discovery protocol and system implementationMin Xu, Xiaohong Huang. 738-743 [doi]