Abstract is missing.
- Self-Tuning Semi-Supervised Spectral ClusteringChun Yang, Xiangrong Zhang, Licheng Jiao, Gaimei Wang. 1-5 [doi]
- A Novel Example-Based Super-Resolution Approach Based on Patch Classification and the KPCA Prior ModelYu Hu, Tingzhi Shen, Kin-Man Lam, Sanyuan Zhao. 6-11 [doi]
- Modified Generalized Discriminant Analysis Using Orthogonalization in Feature Space and Difference SpaceYunhui He. 12-15 [doi]
- A Novel Algorithm for Solving Nonlinear EquationsWenli Xie, Zhezhao Zeng. 16-19 [doi]
- A Neural-Network Algorithm for Solving Nonlinear Equation SystemsGuimei Li, Zhezhao Zeng. 20-23 [doi]
- Cooperation Controlled Competitive Learning Approach for Data ClusteringTao Li, Wenjiang Pei, Shao-ping Wang, Yiu-ming Cheung. 24-29 [doi]
- A Neural-Network Algorithm for the Simultaneous Inclusion of Polynomial ZerosChuangxin Wang, Zhezhao Zeng. 30-34 [doi]
- Mobility Enhancement in Nanorobots by Using Particle Swarm Optimization AlgorithmKhin Haymar Saw Hla, YoungSik Choi, Jong Sou Park. 35-40 [doi]
- Performance Comparison of Nonlinear Dimensionality Reduction Methods for Image Data Using Different Distance MeasuresMudasser Naseer, Shi-Yin Qin. 41-46 [doi]
- Optimization for Multi-Resource Allocation and Leveling Based on a Self-Adaptive Ant Colony AlgorithmZhengjia Wu, Liping Zhang, Ying Wang, Kui Wang. 47-51 [doi]
- An Efficient Deterministic Secure Quantum Communication Scheme with W StateWenjie Liu, Hanwu Chen, Tinghuai Ma, Wei Tian. 52-55 [doi]
- Tabu Artificial Fish Swarm Algorithm Based Intelligent QoS Multicast Routing AlgorithmJunwei Wang, Xingwei Wang, Min Huang. 56-60 [doi]
- A Particle Swarm Optimization Algorithm with Logarithm Decreasing Inertia Weight and Chaos MutationYue-lin Gao, Xiao-hui An, Jun-min Liu. 61-65 [doi]
- Information Management System of Automobile Chassis Dynamometer Based on Multi Agent Web ServeLong Guo, Hongli Wang. 66-70 [doi]
- Multi-Agent Model for Fatigue Control in Large Offshore Wind FarmRongyong Zhao, Yongqing Su, Torben Knudsen, Thomas Bak, WenZhong Shen. 71-75 [doi]
- Study on the Core Algorithm of Access Control System Based on Face RecognitionLiying Lang, Yue Hong. 76-79 [doi]
- Object Tracking Based on Genetic Algorithm and Kalman FilterHuan Wang, Mingwu Ren, Jingyu Yang. 80-85 [doi]
- Multi-Strategy to Improve Reading ComprehensionYongping Du, Ming He. 86-89 [doi]
- A New Feature Extraction Approach Based on Sentence Element AnalysisChuangxin Yang, Hong Peng, Jiabing Wang. 90-95 [doi]
- Membership Functions Generation Based on Density FunctionImen Derbel, Narjes Hachani, Habib Ounelli. 96-101 [doi]
- An Algorithm for Spatial Outlier Detection Based on Delaunay TriangulationMin-qi Zheng, Chongcheng Chen, Jiaxiang Lin, Ming-hui Fan, Tamas Jansco. 102-107 [doi]
- Evolutionary Personal Information PartnersJingde Cheng. 108-113 [doi]
- A Measurement and Modeling Study of P2P IPTV ApplicationsFeng Liu, Zhitang Li. 114-119 [doi]
- Discrete Fourier Transform Computation Using Neural NetworksRosemarie Velik. 120-123 [doi]
- Robust Designs for Fingerprint Feature Extraction CNN with Von Neumann NeighborhoodHui Wang, Lequan Min, Jinzhu Liu. 124-128 [doi]
- Local Stability Analysis of CNNs with Delay and ImpulsesJianjun Wang, Zhonghua Li. 129-133 [doi]
- Control of Time Varying Nonlinear System Based on RBFNN-DMC AlgorithmLou Haichuan, Dai Wenzhan, Su Jie. 134-138 [doi]
- The Operations and Properties of Reproducibility of the Empty MarkingJianHong Ye, Shixin Sun, Wen Song, Lijie Wen. 139-144 [doi]
- A GA-Based Approach on a Repair Logistics Network Design with M/M/s ModelGengui Zhou, Zhenyu Cao, Zhiqing Meng, Qi Xu. 145-149 [doi]
- Multi-Objective Evolutionary Algorithm Based on Dynamical Crossover and MutationHai-lin Liu, Xueqiang Li, Yuqing Chen. 150-155 [doi]
- Joint Optimization of Age Replacement and Spare Ordering Policy Based on Genetic AlgorithmRongbing Hu, Chaoyuan Yue, Jun Xie. 156-161 [doi]
- A Novel Multi-Objective Evolutionary Algorithm Based on External Dominated ClusteringLei Fan, Yuping Wang. 162-167 [doi]
- One MOEA Uniformity Measurement Based on Generalized Spherical TransformationXueqiang Li, Hai-lin Liu. 168-173 [doi]
- A Touching Pattern-Oriented Strategy for Handwritten Digits SegmentationRui Ma, Yingnan Zhao, Yongquan Xia, Yunyang Yan. 174-179 [doi]
- New H infinity Approach for Face TrackingSiew Wen Chin, Kah Phooi Seng, Li-minn Ang. 180-184 [doi]
- Automatic Detection and Tracking of Maneuverable Birds in VideosXiao-yan Zhang, Xiao-Juan Wu, Xin Zhou, Xiao-Gang Wang, Yuan-Yuan Zhang. 185-189 [doi]
- An Effective Method for Mammograph Image RetrievalJunding Sun, Zhaosheng Zhang. 190-193 [doi]
- Kernel Subspace LDA with Self-Constructed Mercer Kernel for Face RecognitionXuehui Xie, Wen-Sheng Chen, Bo Chen, Hui Liu. 194-199 [doi]
- A New Method for Discriminative Model Combination in Speech RecognitionYahui Wu, Gang Liu, Jun Guo. 200-203 [doi]
- Experimental Study of Discriminant Method with Application to Fault-Prone Module DetectionGege Guo, Ping Guo. 204-209 [doi]
- Semi-Supervised Dimensionality Reduction with Pairwise Constraints Using Graph Embedding for Face AnalysisNa Wang, Xia Li, Yingjie Cui. 210-214 [doi]
- Face Feature Extraction Based on Uncorrelated Locality Information ProjectionLin Kezheng, Wang Huixin, Lin Sheng. 215-219 [doi]
- 3-D Reconstruction from Medical Images with Improved GVF Snake ModelJinyong Cheng, Yihui Liu, Li Bai. 220-224 [doi]
- Illumination Invariant Using DT-CWT and EMD for Face RecognitionYuehui Sun. 225-230 [doi]
- Chattering-Free Support Vector Regression Sliding Mode ControlLinsheng Li, Jianning Li. 231-234 [doi]
- Weighted Margin Multi-Class Core Vector MachinesYuan Yuan, Bing Chen, Jiandong Wang, Liming Fang, Tao Xu. 235-239 [doi]
- Posterior Probability Reconstruction for Multi-Class Support Vector MachinesXiaoh Wang. 240-243 [doi]
- Modeling of Oil and Water Migration Based on Support Vector MachineJingwen Tian, Qian Feng. 244-248 [doi]
- Fast SVM Incremental Learning Based on the Convex Hulls AlgorithmChongming Wu, Xiaodan Wang, Dongying Bai, Hongda Zhang. 249-252 [doi]
- Gray S-Box for Advanced Encryption StandardMinh-Triet Tran, Doan Khanh Bui, Anh Duc Duong. 253-258 [doi]
- Research of WaveCluster Algorithm in Intrusion Detection SystemMingwei Zhao, Yang Liu, Rongan Jiang. 259-263 [doi]
- A Novel Generation Key Scheme Based on DNAXin-she Li, Lei Zhang, Yu-pu Hu. 264-266 [doi]
- On the k-error Linear Complexity of SequencesJianqin Zhou, Cheng Shangguan. 267-271 [doi]
- Analysis of Offline Fair Exchange Protocols in Strand SpacesXiangdong Li, Qingpu Guo, QingXian Wang. 272-276 [doi]
- Image Encryption Algorithm Based on Rijndael S-boxesJiping Niu. 277-280 [doi]
- Dynamic Integrity Measurement Model Based on Trusted ComputingChangping Liu, Mingyu Fan, Yong Feng, Guangwei Wang. 281-284 [doi]
- Semi-Fragile Watermarking Based on Image GradientJun Xiao, Ying Wang. 285-289 [doi]
- Counting Evolving Data Stream Based on Hierarchical Counting Bloom FilterZhijian Yuan, Yingwen Chen, Yan Jia, Shuqiang Yang. 290-294 [doi]
- Reversible Data Hiding for Electrocardiogram Signal Based on Wavelet TransformsKai-mei Zheng, Xu Qian. 295-299 [doi]
- Research of Multiple Watermarks Algorithm in E-commerce Copyright Protection and TrackingXiang-wei Zhu, Liang Xiao. 300-304 [doi]
- Robust Hashing Based on Persistent Points for Video Copy DetectionYu-xin Zhao, Guang-jie Liu, Yue-wei Dai, Zhi Quan Wang. 305-308 [doi]
- Application of CLIPS Expert System to Malware Detection SystemRuili Zhou, Jianfeng Pan, Xiaobin Tan, Hongsheng Xi. 309-314 [doi]
- An Evaluation of API Calls Hooking PerformanceMohd Fadzli Marhusin, Henry Larkin, Chris Lokan, David Cornforth. 315-319 [doi]
- Exploring Malware Behaviors Based on Environment ConstitutionPurui Su, Lingyun Ying, Dengguo Feng. 320-325 [doi]
- Chosen-Ciphertext Secure Multi-Authority Fuzzy Identity-Based Key Encapsulation without ROMLiming Fang, Jiandong Wang, Yongjun Ren, Jinyue Xia, Shizhu Bian. 326-330 [doi]
- Generating High Quality Pseudo Random Number Using Evolutionary methodsAlireza Poorghanad, Ali Sadr, Alireza Kashanipour. 331-335 [doi]
- An Enhanced Deniable Authentication ProtocolLi Gang, Xin Xiangjun, Li Wei. 336-339 [doi]
- Sharing Multi-Secret Based on Circle PropertiesLina Ge, Shaohua Tang. 340-344 [doi]
- Research on Evaluation of Trust ModelMo Yang, Lina Wang, Yuandong Lei. 345-349 [doi]
- A New Measure of Image Scrambling Degree Based on Grey Level Difference and Information EntropyXiongjun Li. 350-354 [doi]
- Research on Disaster Tolerance System Based on Network DataflowLin Guo, Hua Huang, Lejun Zhang, Yongtian Yang, Jianpei Zhang. 355-360 [doi]
- A Novel Motion Based Lip Feature Extraction for Lip-ReadingMeng Li, Yiu-ming Cheung. 361-365 [doi]
- Visual Cryptographic Scheme with High Image QualityLin Kezheng, Fan Bo, Zhao Hong. 366-370 [doi]
- Modified BP Decoding Algorithms Combined with GA for Low-Density Parity Check CodesZerong Deng, Xingcheng Liu, Man Teng. 371-375 [doi]
- Improved BP Decoding Algorithm for Nonbinary LDPC Codes Based on Bit-flipping MethodMan Teng, Xingcheng Liu, Zerong Deng. 376-380 [doi]
- A Practical Electronic Voting Protocol Based upon Oblivious Signature SchemeChunlai Song, Xinchun Yin, Yali Liu. 381-384 [doi]
- An Efficient Audio Watermark Algorithm with Strong RobustnessTong Ming, Yan Tao, Hongbing Ji. 385-389 [doi]
- Efficienct ID-Based Proxy Blind Signature Schemes from PairingsHeng Pan, Ke Ke, Chunxiang Gu. 390-393 [doi]
- Construction of a Dynamic Trust Ontology ModelQiuyu Zhang, Fengman Miao, Zhanting Yuan, Qikun Zhang, Zhi Fan. 394-398 [doi]
- Cross-Domain Grid Authentication and Authorization Scheme Based on Trust Management and DelegationSunan Shen, Shaohua Tang. 399-404 [doi]
- A Fast Suffix Matching Method in Network ProcessorZhenyu Liu, Shengli Xie, Yue Lai. 405-410 [doi]
- A Near-Optimal Redundancy Allocation Strategy that Minimizes a System s Vulnerability to Hazardous Events and Malicious AttacksFrank Yeong-Sung Lin, Po-Hao Tsang, Kun-Dao Jiang. 411-416 [doi]
- Towards Provably Secure On-Demand Distance Vector Routing in MANETLiqiang Mao, Jianfeng Ma. 417-420 [doi]
- A Simulation Platform of DDoS Attack Based on Network ProcessorXin-lei Li, Kang-feng Zheng, Yi Xian Yang. 421-426 [doi]
- An Efficient Gradient Mechanism of Directed Diffusion in Wireless Sensor NetworkJian Wan, Jianrong Wu, Xianghua Xu, Yanna Yan. 427-431 [doi]
- Study on the Internet Behavior s Activity Oriented to Network SurvivabilityChi Guo, Lina Wang, Lainv Huang, Lei Zhao. 432-435 [doi]
- A Secure Routing Scheme Based on Multi-Objective Optimization in Wireless Sensor NetworksXuanxia Yao, Xuefeng Zheng. 436-441 [doi]
- Detecting the Sybil Attack Cooperatively in Wireless Sensor NetworksShaohe Lv, Xiaodong Wang, Xin Zhao, Xingming Zhou. 442-446 [doi]
- An Improved Approach to Access Graph GenerationXiaochun Xiao, Tiange Zhang, Gendu Zhang. 447-452 [doi]
- Security Scheme for Cross-Domain Grid: Integrating WS-Trust and Grid Security MechanismYongkai Cai, Shaohua Tang. 453-457 [doi]
- Application of Radial Function Neural Network in Network SecurityYi Niu, Yi Chun Peng. 458-463 [doi]
- A New Intelligent Security Structure for Host SystemJiali Hou, Nengshan Feng, Jinzhi Xiong. 464-469 [doi]
- Blind Deconvolution Algorithm for MIMO ChannelMin Zhao, Zhaoshui He, Shengli Xie. 470-474 [doi]
- Using Genetic Algorithm to Improve Fuzzy k-NNJuan Zhang, Yi Niu, Wenbin He. 475-479 [doi]
- Contours Location Based on Fisher Discrimination AnalysisWeibin Zhao, Zhiheng Zhou. 480-483 [doi]
- Application of Data Warehouse Technology in Data Center DesignXuanzi Hu, Kuanfu Wang. 484-488 [doi]
- Neurodynamic Analysis for a Class of Nonlinear Fractional ProgrammingQuanju Zhang, Jie Zhang, Junhong Feng, Yajuan Yang. 489-494 [doi]
- Towards a Component-Based Model Integration Approach for Embedded Computer Control SystemFang Li, Di Li, Jiafu Wan, Xin Huang. 495-499 [doi]
- A Trust Evaluation Model for P2P E-Commerce SystemsCao Hui, Qin Zheng. 500-505 [doi]
- Analysis of Signal Transmission with Temperature-Dependent Electrical Parameters Using FDTDXiuhua Men, Shunming Li, Zemin Zuo. 506-510 [doi]
- Controlling Mechanism for the Hubs in Peer-to-Peer NetworksYuhua Liu, Chun Yang, Kaihua Xu, Hongcai Chen. 511-515 [doi]
- A Novel Complex Event Mining Network for RFID-Enable Supply Chain Information SecurityTao Ku, Yunlong Zhu, Kunyuan Hu. 516-521 [doi]
- The Impacts of Government Policies on the Efficiency of Australian Universities: A Multi-Period Data Envelopment AnalysisXiaoxia Duan, Hepu Deng, Brian Corbit. 522-527 [doi]
- An Improved Alternating-Projection Demosaicing AlgorithmWei-Jiang Wang, Ting-zhi Shen, Xue-mei Yan. 528-533 [doi]
- A Run-Length Coding Based Dynamic Trust Model in P2P NetworkQun Fang, Yi Ji, Guo-Xin Wu. 534-539 [doi]
- A Study on the Application of GA-BP Neural Network in the Bridge Reliability AssessmentJianxi Yang, Jianting Zhou, Fan Wang. 540-545 [doi]
- Some Notes on Blind Source Separation Using Generalized EigenvaluesJie-Chang Wen, Chun-lan He. 546-549 [doi]
- A Novel Multiple Description Video Coding AlgorithmMengmeng Zhang, Wenkai Liu, Ruobin Wang, Huihui Bai. 550-553 [doi]
- Multiple Feature Fusion for Tracking of Moving Objects in Video SurveillanceHuibin Wang, Chaoying Liu, Lizhong Xu, Min Tang, Xuewen Wu. 554-559 [doi]
- Shape Constraint Incorporated Geometric Flows for Blood Vessels SegmentationJu-tao Hao, Jing-jing Zhao. 560-563 [doi]