Abstract is missing.
- A Hierarchical Artificial Immune Model for Virus DetectionWei Wang, Pengtao Zhang, Ying Tan, Xingui He. 1-5 [doi]
- A Virus Detection System Based on Artificial Immune SystemRui Chao, Ying Tan. 6-10 [doi]
- A Novel Classification Method Based on Artificial Immune System and Quantum Mechanics TheoryLiling Ma, Zhao Zhang, Xiaohang Zhou, Junzheng Wang. 11-14 [doi]
- An Improved Immune-Based Multi-modal Function Optimization AlgorithmXu Zhang, Li Xu. 15-19 [doi]
- A Parallel Artificial Immune Model for OptimizationYutao Qi, Fang Liu, Licheng Jiao. 20-24 [doi]
- A New Algorithm Estimating the Mixing Matrix for the Sparse Component AnalysisSuxian Zhang, Hailin Liu, Jiechang Wen, Weili Chen. 25-29 [doi]
- Factor Sensitivity Analysis for Multivariable Systems Using Bayesian Neural NetworksRunbo Bai, Xiumei Qiu, Maosen Cao. 30-33 [doi]
- Prediction of C3 Concentration in FCCU Using Neural Estimator Based on Dynamic PCARong Guo, Dongchen Shi. 34-37 [doi]
- Wavelet Smoothing Based Multivariate Polynomial for Anchovy Catches ForecastingNibaldo RodrÃguez, Eleuterio Yañez. 38-41 [doi]
- Studying of Data Centre Architecture for Prefecture-level CityXuanzi Hu, Jiafu Wan. 42-47 [doi]
- Classifying Computer Session Data Using Self-Organizing MapsVeronica C. Estrada, Akihiro Nakao, Enrique Carlos Segura. 48-53 [doi]
- Large-Scale Hierarchical Text Classification Based on Path Semantic Vector and Prior InformationFeng Gao, Weiming Fu, YiPing Zhong, Danfeng Zhao. 54-58 [doi]
- Discovering Temporal Similarity Pattern Based on Metamorphosis DataYuan Tian. 59-63 [doi]
- The Application of Improved 3D_Apriori Three-Dimensional Association Rules Algorithm in Reservoir Data MiningXiao-dong Shao. 64-68 [doi]
- A Batch Constructing Method of Weighted Concept Lattice Based on Deviance AnalysisSulan Zhang, Ping Guo, Jifu Zhang, Xinxin Wang. 69-73 [doi]
- Intelligent Security Data AnalysisYun Shen, Trevor P. Martin, Pete Bramhall. 74-78 [doi]
- Research on Answer Extraction Method for Domain Question Answering System(QA)Cunli Mao, Li-Na Li, Zhengtao Yu, Lu Han, Jianyi Guo, Xiong-Li Lei. 79-83 [doi]
- The Implementation of the Web Mining Based on XML TechnologyCheng Zheng, Yong Fang, Yaping Shen. 84-87 [doi]
- Predict Ranking of Object Summaries with Hidden Markov ModelLe Peng, Zhi Cai, Guowen Wu. 88-91 [doi]
- Improved Differential Evolution Algorithm with Random Migration OperatorYuelin Gao, Miaomiao Wang. 92-97 [doi]
- A Genetic Algorithm for Multiobjective Bilevel Convex Optimization ProblemsLiping Jia, Yuping Wang. 98-102 [doi]
- Hybrid Genetic Algorithm with Particle Swarm Optimization TechniqueGuoli Zhang, Mingxin Dou, Siyan Wang. 103-106 [doi]
- Quantum Genetic Algorithm and its Application in Power System Reactive Power OptimizationHongxia Miao, Honghua Wang, Zhixiang Deng. 107-111 [doi]
- Task Scheduling for Heterogeneous Computing Based on Bayesian Optimization AlgorithmJiadong Yang, Hua Xu, Peifa Jia. 112-117 [doi]
- A Clustering-Based Evolutionary Algorithm for Traveling Salesman ProblemDalian Liu, Xinfeng Wang, Jinling Du. 118-122 [doi]
- Multiobjective Differential Evolution Based on Opposite OperationNing Dong, Yuping Wang. 123-127 [doi]
- An Approach for a Class of Bilevel Multiobjective Programming ProblemYulan Liu. 128-132 [doi]
- Optimization of Logistics Nodes in Dynamic Location with a Multi-objective Evolutionary AlgorithmYan Liu, Lei Fan, Yuping Wang, Qianli Dong. 133-137 [doi]
- Study on Dynamic Game Models in a Two-Echelon Supply ChainJian-Hu Cai, Li-Ping Wang. 138-141 [doi]
- EKF-Ah Based State of Charge Online Estimation for Lithium-ion Power BatteryZhiwei He, Mingyu Gao, Jie Xu. 142-145 [doi]
- Neighborhood-Based Weighted Regularization of Video Sequence Super-ResolutionYaozu An, Yao Lu, Hong Zhao. 146-150 [doi]
- The Correction SART Algorithm Based on Circular Symmetrical ObjectDong-jiang Ji, Wen-Zhang He. 151-154 [doi]
- Feature Extraction and Matching for Plant ImagesPeizhen Wang, Lei Shi, Hengzhi Dong. 155-159 [doi]
- Extracting the Coronary Artery in Angiographic Image Based on a Trous Wavelet of Rotary Gaussian with Adaptive Space CoefficientQingzhu Wang, Ke Wang, Donghong An, Bo Chen, Miao Liu, Yingying Ying. 160-164 [doi]
- Object Detection and Tracking Using Spatiotemporal Wavelet Domain Markov Random Field in VideoXuchao Li, Dongsheng Liu. 165-170 [doi]
- Extraction of Limit Streamlines in 2D Flow Field Using Virtual BoundaryWenyao Zhang, Jing Su. 171-175 [doi]
- The Close-Degree of Covering Rough SetsDingjun Chen. 176-179 [doi]
- An Ontology-Based NLP Approach to Semantic Annotation of Annual ReportBaohua Wang, Hejiang Huang, Xiaolong Wang, Wensheng Chen. 180-183 [doi]
- Using SVM to Organize the Image DatabaseBingxin Xu, Qian Yin, Guangjun Lv. 184-187 [doi]
- A New Support Vector Machine Model Based on the Discrete Conditional Value-at-RiskMin Jiang, Zhiqing Meng, Gengui Zhou. 188-192 [doi]
- Web Document Classification Based on Fuzzy k-NN AlgorithmJuan Zhang, Yi Niu, Huabei Nie. 193-196 [doi]
- A New Method for Simultaneous Extraction of All Roots of Algebraic PolynomialYing Zhang, Zhe-zhao Zeng. 197-200 [doi]
- PD-Type Sampled-Data Iterative Learning Control for Nonlinear Systems with Time Delays and Uncertain DisturbancesYang Fan, Shuping He, Fei Liu. 201-205 [doi]
- Trust Relationship Modelling in E-commerce-Based Social NetworkZaobin Gan, Juxia He, Qian Ding, Vijay Varadharajan. 206-210 [doi]
- A Multi-agent and GIS Based Simulation for Emergency Evacuation in Park and Public SquareBo Yang, Yong-gang Wu, Cheng Wang. 211-216 [doi]
- An Intelligent Decision Support System of Lake Water Pollution Control Based on Multi-agent ModelJianjun Ni, Chuanbiao Zhang, Li Ren. 217-221 [doi]
- Lag Synchronization of Uncertain Chaotic Neural Networks with Mixed Time-Varying Delays Based on Adaptive ControlXiaozheng Mou, Wuneng Zhou, Lin Pan, Qingyu Zhu, Jian-An Fang. 222-226 [doi]
- Support Vector Regression Based on Particle Swarm Optimization and Projection Pursuit Technology for Rainfall ForecastingJiansheng Wu, Jie Zhou, Yuelin Gao. 227-233 [doi]
- Image Target Detection Using Morphological Neural NetworkCheng-tian Song, Ke-yong Wang. 234-236 [doi]
- A Novel Control Method Based on Fuzzy Neural NetworkLixin Xing, Shanqing Gao, Yunfei Chen. 237-239 [doi]
- Research on Reduction of Commutation Torque Ripple in Brushless DC Motor Drives Based on Fuzzy Logic ControlSoumah Yaya, Wang Honghua. 240-243 [doi]
- A Topology Optimization for Truss Based on Improved Group Search OptimizerHaobin Xie, Feng Liu, Lijuan Li. 244-248 [doi]
- A Quick Group Search Optimizer with Passive Congregation and its Convergence AnalysisGuang Qin, Feng Liu, Lijuan Li. 249-253 [doi]
- The Analysis and Improvement of Binary Particle Swarm OptimizationJianhua Liu, Xiaoping Fan. 254-258 [doi]
- System Identification Based on Particle Swarm Optimization AlgorithmXiuqin Deng. 259-263 [doi]
- Minimal Merrifield-Simmons Index of 5-leaf-treesChengfu Ye. 264-267 [doi]
- Reliability Polynomials of Networks with Vertex FailureHaixing Zhao, Liang Wei. 268-271 [doi]
- On Orderings of Some Graphs by the Extreme Roots of their Graph PolynomialsHaizhen Ren. 272-276 [doi]
- A Novel Particle Swarm Optimization Based on the Self-Adaptation Strategy of Acceleration CoefficientsLi Guo, Xu Chen. 277-281 [doi]
- The Particle Swarm Optimization Algorithm Based on Dynamic Chaotic Perturbations and its Application to K-MeansJie Zhang, Yajuan Yang, Quanju Zhang. 282-286 [doi]
- Texture Image Retrieval Using Non-separable Wavelets and Local Binary PatternsXin Liu, Xinge You, Yiu-ming Cheung. 287-291 [doi]
- Research on the Evolution of Supply Chain Based on SWARMWenxue Niu, Yajuan Yang, Xiao Luo, Quanju Zhang. 292-295 [doi]
- Measuring the Spread of Fuzzy Variable by L-S IntegralXiao-Li Wu, Yan-Kui Liu. 296-300 [doi]
- PNN Based Motion Detection with Adaptive Learning RateZhiming Wang, Li Zhang, Hong Bao. 301-306 [doi]
- Proof of Two Kinds of Fingerprint Feature Extraction CNNLongMei Jie, Hui Wang, DeRong Li, GuoQiang Shao. 307-310 [doi]
- A Sound Dynamic Resource-Constrained Scheduling SchemeJuyang Zhang, Ningkang Jiang. 311-314 [doi]
- On the Role of Interpolation in the Normalization of Non-ideal Visible Wavelength Iris ImagesGil Melfe Mateus Santos, Hugo Pedro Martins Carrico Proenca. 315-319 [doi]
- Face Recognition Using Modular Locality Preserving ProjectionsPengzhang Liu, Tingzhi Shen, Yu Hu, Sanyuan Zhao. 320-324 [doi]
- Multi-pose Face Detection Based on Adaptive Skin Color and Structure ModelZhao-yi Peng, Yu Zhou, Ping Wang. 325-329 [doi]
- Use of In-Situ Visible and Near-Infrared Spectroscopy for Non-invasive Discrimination of Spirulina PlatensisDi Wu, Tianyun Ma, Pengcheng Nie, Zhiping Wang, Zhengjun Qiu, Yong He. 330-334 [doi]
- Efficient Mean Shift Particle Filter for Sperm Cells TrackingXiuzhuang Zhou, Yao Lu. 335-339 [doi]
- Extraction and Recognition Alphabetic and Digital Characters on Industrial ContainersBingxia Shi, Na Yu, Jia Xu, Quanming Zhao. 340-343 [doi]
- Efficient Object Recognition Using Corner FeaturesJian Cao, Kan Li, Chunxiao Gao, Qiongxin Liu. 344-348 [doi]
- Contour-Shape Recognition and Retrieval Based on Chain CodeSun Junding, Xu Heli. 349-352 [doi]
- An Improved Kernel Fisher Discriminant Analysis for Face RecognitionFulong Wang, Xiaoliang Liu, Cheng Huang. 353-357 [doi]
- Locally Supervised Discriminant Analysis in Kernel SpaceCaikou Chen, Jun Shi, Yiming Yu. 358-362 [doi]
- Pseudo-inverse Locality Preserving ProjectionsRong-Hua Li, Zhiping Luo, Guoqiang Han. 363-367 [doi]
- A Fusion of Face Symmetry of Two-Dimensional Principal Component Analysis and Face RecognitionFulong Wang, Cheng Huang, Xiaoliang Liu. 368-371 [doi]
- Fast Parameter Estimation in Image Restoration Based on Hierarchical Bayesian FrameworkSu Xiao, Guoqiang Han, Yan Wo, Zhan Li, Xiangji Chen. 372-375 [doi]
- A Region-Based Active Contour Model for Image SegmentationYun Tian, Ming-quan Zhou, Zhong-ke Wu, Xing-ce Wang. 376-380 [doi]
- A Locally Gaussian Mixture Based RBF Network for Classification of Chinese Herbal Infrared Spectrum FingerprintTaijun Wang, Yiu-ming Cheung. 381-385 [doi]
- Computing the m-Tight Error Linear Complexity of Periodic Binary SequencesJianqin Zhou, Cheng Shangguan, Zemao Zhao. 386-390 [doi]
- Deterministic Secure Bidirectional Quantum CommunicationDazu Huang, Zhigang Chen, Xin Li, Jianquan Xie. 391-394 [doi]
- Different Authentication Properties and a Signcryption Scheme RevisitedZhengjun Cao, Olivier Markowitch. 395-399 [doi]
- An Efficient Threshold Signature Scheme Without Random OraclesWei Gao, Zhenyou Wang, Fei Li, Li e Chen. 400-404 [doi]
- Analysis of Two Signature Schemes from CIS 2006Lihua Liu, Zhengjun Cao. 405-408 [doi]
- The Walsh Spectrum Property of Resilient Boolean FunctionsJiayao Wang, Bin Hu, Quanlai Wang. 409-413 [doi]
- Cryptanalysis of Short Signature Scheme Without Random Oracles AssumptionHua Shao, Xinglan Zhang, Feng Shao. 414-417 [doi]
- Predators Combat Good Point Set Scanning-Based Self-Learning WormsFangwei Wang, Yunkai Zhang, Changguang Wang, Jianfeng Ma. 418-422 [doi]
- An Improved Identity-Based Group Signature SchemeZuowen Tan. 423-427 [doi]
- ID-Based Proxy Re-Encryption Schemes Without Random OracleXiaoming Hu, Zhe Zhang, Taozhi Si. 428-431 [doi]
- Efficient Certificateless Strong Designated Verifier Signature SchemeBo Yang, Zhengming Hu, Zibi Xiao. 432-436 [doi]
- A Novel Robust Watermarking Algorithm Based on DWT and DCTWang Na, Wang Yunjin, Li Xia. 437-441 [doi]
- Construction of the Initial Structure for Preimage Attack of MD5Ming Mao, Shaohui Chen, Jin Xu. 442-445 [doi]
- Somewhat Secure Mobile Electronic-Voting Systems Based on the Cut-and-Choose MechanismYing Qiu, Huafei Zhu. 446-450 [doi]
- A Note on Twin Diffie-Hellman ProblemMingqiang Wang, Leibo Li. 451-454 [doi]
- Perfect Subliminal Channel in a Paring-Based Digital SignatureZhenyou Wang, Wei Gao, Li e Chen, Fei Li. 455-457 [doi]
- The Dynamic and Double Encryption System Based on Two-Dimensional ImageJiujun Cheng, Fan Zhang, Kuifei Yu, Jian Ma. 458-462 [doi]
- A New S-Box Structure Based on Graph IsomorphismBao Ngoc Tran, Thuc Dinh Nguyen, Thu Dan Tran. 463-467 [doi]
- Reversible Logic Gate Cascade Network Based on Series ConnectionZhijin Guan, Yiqing Zhang, Yanming Lu. 468-472 [doi]
- A New Digital Proxy Signature Scheme Based on ECDLPChengming Qi, Xusheng Chen. 473-477 [doi]
- A Distributed Court System for Intrusion Detection in OLSRDa Zhang, Chai Kiat Yeo. 478-482 [doi]
- An Extensible Intra Access Control Policy Conflict Detection AlgorithmBei Wu, Xing-yuan Chen, Yong-fui Zhang, Xiang-dong Dai. 483-488 [doi]
- A Scenario-Based Test Case Generation Framework for Security PoliciesChen Yan, Wu Dan. 489-493 [doi]
- A Chaos-Based Pseudorandom Number Generator and Performance AnalysisLi Cao, Lequan Min, Hongyan Zang. 494-498 [doi]
- A Normal-Traffic Network Covert ChannelLiping Ji, Haijin Liang, Yitao Song, Xiamu Niu. 499-503 [doi]
- An Image Encryption and Digital Signature Scheme Based on Generalized Synchronization TheoremHongyan Zang, Lequan Min, Li Cao. 504-510 [doi]
- Combine Elliptic Curve Cryptography with Digital Watermark for OWL-Based Ontology EncryptionHongbin Kong, Zhengquan Zeng, Lijun Yan, Jicheng Yang, Shaowen Yao, Nuoya Sheng. 511-515 [doi]
- A DDoS-Aware IDS Model Based on Danger Theory and Mobile AgentsMahdi Zamani, Mahnush Movahedi, Mohammad Ebadzadeh, Hossein Pedram. 516-520 [doi]
- Strict Integrity Policy of Biba Model with Dynamic Characteristics and its CorrectnessMingxi Zhang. 521-525 [doi]
- An Algebra for Composing Access Control Policies in GridXiangran Cheng, Xingyuan Chen, Bin Zhang, Yan Yang. 526-530 [doi]
- VAD: A Detail Investigation into Process s MemoryXudong Li, Chunxia Zhang, Xing Lin, Shuguang Lin. 531-536 [doi]
- A Novel Architecture for Enterprise Network SecurityChao Chen, Ke Wang, Yiqi Dai. 537-541 [doi]
- Reputation Measure for Incentive-Compatible Packet Forwarding in Ad Hoc NetworksKun Yu, Yunyang Yan. 542-546 [doi]
- Hybrid Routing Protocol for Wireless Mesh NetworkKai Yang, Jian-Feng Ma, Zi-hui Miao. 547-551 [doi]
- An Improved Bytecode Verification Algorithm on Java CardYaping Chi, Zhaobin Li, Zhonghua Wang, Yong Fang. 552-555 [doi]
- The Finite Element Method Appling in the Flow FormingXintian Liu, Changhong Liu, Lihui Zhao, Hu Huang, Xiaoyong Zhao, Xinyi Sun. 556-558 [doi]
- A Preliminary Study on Why Using the Nonself Detector Set for Anomaly Detection in Artificial Immune SystemsBaoliang Xu, Wenjian Luo, Xufa Wang. 559-564 [doi]
- Preserving FDs in K-Anonymization by K-MSDs and Association GeneralizationJinling Song, Liming Huang, Qi He, Yan Gao, Xin Liu, Yuxiang Li. 565-569 [doi]
- The Intelligent Reconfigurable Measuring Node Based on Wireless Access NetworkLiming Wu, Junxiu Liu, Ji Zhang, Yuling Luo. 570-573 [doi]
- Mixed Commitments Mediated Transcoders: A Simple Implementation of Mercurial Mediated TranscodersHuafei Zhu, Ying Qiu. 574-577 [doi]
- Example-Based Facial Sketch HallucinationHong Zhao, Yao Lu, Zhengang Zhai. 578-582 [doi]
- Clarity Algorithm of Images in the Fog and ApplicationWenzhang He, Yunfei Ma. 583-586 [doi]
- Computation Model of Machining Mechanics of Glass MicromillingZhi Wei, Jianhua Zhang, Nan Li, Xu Li. 587-591 [doi]
- Topology Control Algorithm Based on Bottleneck Node for Large-Scale WSNsYiming Fan, Qingzhang Chen, Jianjun Yu. 592-597 [doi]
- Stereo Matching with Adaptive Arbitrary Support-Pixel Set and Adaptive Support-WeightZhengang Zhai, Yao Lu, Hong Zhao. 598-602 [doi]
- Error Concealment Method for Embedded Wavelet codecXue-wen Ding, Wen-Zhang He, Zhao-Xuan Yang. 603-607 [doi]
- Propagated Analysis of Airport Delays Based on Timed Petri NetsJianli Ding, Tantan Chen, Tao Xu. 608-614 [doi]
- FEM Based Numerical Analysis on the Temperature Field in Grind-hardeningJianhua Zhang, Hongsheng Xu, Yang Yu, Zhi Wei. 615-618 [doi]
- Contrast Restoration for Fog-Degraded ImagesYishu Zhai, Yong Zhang. 619-623 [doi]
- Time Scale Estimation Method Based on Anisotropic DiffusionHui Shao, Hailin Zou, Yincheng Liang, Wenjun Li, Qian Gao. 624-628 [doi]
- Study and Design of 3D Virtual Scenes of Virtual LaboratoryLixia Zhang, Guangran Liu. 629-633 [doi]
- Design and Simulation of the Longitudinal Autopilot of UAV Based on Self-Adaptive Fuzzy PID ControlShengyi Yang, Kunqin Li, Jiao Shi. 634-638 [doi]
- Predicting Fiber Diameter of Polypropylene (PP) Spunbonding Nonwovens Process: A Comparison Between Physical and Artifical Neural Network MethodsZhao Bo. 639-642 [doi]
- Super Resolution of MRI Using Improved IBPZiye Yan, Yao Lu. 643-647 [doi]
- The Research of Building Logistics Cost Forecast Based on Regression Support Vector MachineJingwen Tian, Meijuan Gao, Shi-Ru Zhou. 648-652 [doi]
- The New Registration Method Used in ARDKZhang Hua, Wang Cheng, Ren Bo. 653-657 [doi]
- The Development and Implementation of Rapid CRC Algorithm on Tandem Welding SystemWeiqing Ge, Shisheng Huang, Kaiyuan Wu. 658-661 [doi]
- Adaptive Synchronization Between Hyperchaotic Lorenz System and Chen SystemChen Xu, Jian-Wen Feng, Francis R. Austin, Weiqiang Zhang. 662-665 [doi]
- Image Denoising and Inpainting Model Based on Taylor ExpansionXiaoli Sun, Chen Xu. 666-670 [doi]