Abstract is missing.
- The Finite Element Analysis on the Multi-bubble Model in the Ship WakeQun Zhang, Ying Min Wang. 1-5 [doi]
- An Approximation Scheme for RNA Folding Structure Prediction Including PseudoknotsZhendong Liu, Daming Zhu, Wei Cui, Nan Liu. 6-10 [doi]
- Glowworm Swarm Optimization Algorithm for Solving Multi-objective Optimization ProblemDeng-Xu He, Gui-Qing Liu, Hua-Zheng Zhu. 11-15 [doi]
- Artificial Bee Colony Algorithm with Two-Stage Eagle StrategyRuimin Jia, Dengxu He. 16-20 [doi]
- Optimizing Vaccine Distribution for Different Age Groups of Population Using DE AlgorithmXiao-Min Hu, Jun Zhang. 21-25 [doi]
- Dynamic Resource Allocation of TD-LTE System Based on Improved Quantum Evolutionary AlgorithmHong-Chao Yan, Hai-lin Liu, Qiang Wang. 26-30 [doi]
- An Improved Differential Evolution Algorithm for Mixed Integer Programming ProblemsJun Wu, Yuelin Gao, Lina Yan. 31-35 [doi]
- A Middleware-Based Model for Redundant Reader Elimination Using Plant Growth Simulation AlgorithmShilei Lv, Shunzheng Yu. 36-40 [doi]
- An Efficient Genetic Algorithm for Interval Linear Bilevel Programming ProblemsHecheng Li, Lei Fang. 41-44 [doi]
- An Energy-Aware Optimization Model Based on Data Placement and Task SchedulingXiaoli Wang, Yuping Wang, Kun Meng. 45-49 [doi]
- Genetic Algorithm Nested with Simulated Annealing for Big Job Shop Scheduling ProblemsHong-Li Yin. 50-54 [doi]
- A Differential Evolution with Two Mutation Strategies for Linear Bilevel Programming ProblemsHong Li, Li Zhang. 55-60 [doi]
- A Parallel Genetic Algorithm for Solving the Probabilistic Minimum Spanning Tree ProblemZhurong Wang, Changqing Yu, Xinhong Hei, Bin Zhang. 61-65 [doi]
- Evolutionary Algorithm Based on Automatically Designing of Genetic OperatorsDazhi Jiang, Chenfeng Peng, Zhun Fan. 66-70 [doi]
- Research on Related Vehicle Routing Problem for Multiple Depots Basing on Dynamic ConstraintYuqiang Chen, Jianlan Guo, Xuanzi Hu. 71-75 [doi]
- Research on Related Vehicle Routing Problem for Single Distribution Centre Based on Dynamic ConstraintYuqiang Chen, Xuanzi Hu, Guangzai Ye. 76-79 [doi]
- A New Evolutionary Algorithm for Portfolio Optimization and Its ApplicationWeijia Wang, Jie Hu. 80-84 [doi]
- Multi-objective Evolutionary Algorithm for 4G Base Station PlanningWentian Mai, Hai-lin Liu, Lei Chen, JiongCheng Li, Henghui Xiao. 85-89 [doi]
- Multi-objective Portfolio Optimization Based on Fuzzy Genetic AlgorithmHuilin Yi, Jianhui Yang. 90-94 [doi]
- An Enhanced Domination Based Evolutionary Algorithm for Multi-objective ProblemsLei Fan, Xiyang Liu. 95-99 [doi]
- Web-Based Language Model Domain Adaptation for Real World Voice RetrievalMengzhe Chen, Qingqing Zhang, Zhichao Wang, Jielin Pan, YongHong Yan. 100-104 [doi]
- A Petri Net Approach to Reliable Execution for Web Service CompositionLiping Chen, Guojun Zhang. 105-109 [doi]
- TOPSIS with Interval Number and Uncertain Weight Based on Tanimoto MeasureZhenghai Ai. 110-114 [doi]
- A Multi-class Support Vector Data Description Approach for Classification of Medical ImageGuocheng Xie, Yun Jiang, Na Chen. 115-119 [doi]
- Improving Short Text Classification through Better Feature Space SelectionMeng Wang, Lanfen Lin, Feng Wang. 120-124 [doi]
- An Improved Apriori Algorithm Based on FeaturesJun Yang, Zhonghua Li, Wei Xiang, Luxin Xiao. 125-128 [doi]
- Research on Sentiment Tendency Analysis of Microtext Based on Sense GroupBin Gui, Xiaoping Yang. 129-133 [doi]
- Polarity Identification of Sentiment Words Based on EmoticonsShuigui Huang, Wenwen Han, Xirong Que, Wendong Wang. 134-138 [doi]
- Random Walk with Pre-filtering for Social Link PredictionTing Jin, Tong Xu, Enhong Chen, Qi Liu, Haiping Ma, Jingsong Lv, Guoping Hu. 139-143 [doi]
- A Credit Scoring Model Based on Collaborative FilteringXin Zheng. 144-148 [doi]
- A Pragmatical Option Pricing Method Combining Black-Scholes Formula, Time Series Analysis and Artificial Neural NetworkKai Liu, Xiao Wang. 149-153 [doi]
- Comparison of Subsequence Pattern Matching Methods for Financial Time SeriesXueyuan Gong, Yain-Whar Si. 154-158 [doi]
- The Research of Stock Predictive Model Based on the Combination of CART and DBSCANYibu Ma. 159-164 [doi]
- Differential-Algebraic Equations Model for Quadratic ProgrammingYajuan Yang, Quanju Zhang. 165-169 [doi]
- A New Method for Grayscale Image Segmentation Based on Affinity Propagation Clustering AlgorithmHui Du, Yuping Wang, LiLi Duan. 170-173 [doi]
- Application of the Hybrid SVM-KNN Model for Credit ScoringHanhai Zhou, Jinjin Wang, Jiadong Wu, Long Zhang, Peng Lei, Xiaoyun Chen. 174-177 [doi]
- An Application of CUSUM Chart on Financial TradingLing Xin, Philip L. H. Yu, Kin Lam. 178-181 [doi]
- The Superiority Analysis of Linear Frequency Modulation and Barker Code Composite Radar SignalYang Chunhong, Liu Zengli. 182-184 [doi]
- Harmonic Detection of Power System Based on SVD and EMDWang Wei 0009, Liu Zengli, Chen Lin, Sha Weiwei. 185-189 [doi]
- A Greedy Search Algorithm for Resolving the Lowermost C Threshold in SVM ClassificationHuichuan Duan, Naiwen Liu. 190-193 [doi]
- Network Topology Discovery Based on SNMPJun Li, Xuefeng Zhang, Weihong Shen, Qilin Zou. 194-199 [doi]
- Research on Application of Improved Genetic Algorithm in Urban Full Independent Tourist Route PlanningFuhua Song, Shuiqiang Yi. 200-203 [doi]
- The Image Reconstruction Algorithm Based on Wiener FilteringHongjian Xu, Yanjuan Shuai, Wenzhang He. 204-208 [doi]
- Enhanced Algorithm for Exemplar-Based Image InpaintingYe-fei Liu, Fu-Long Wang, Xiang-yan Xi. 209-213 [doi]
- Improved Criminisi Algorithm Based on a New Priority Function with the Gray EntropyXiangyan Xi, Fulong Wang, Yefei Liu. 214-218 [doi]
- A Method of Shot-Boundary Detection Based on HSV SpaceQifan Fu, Yichun Zhang, Liyong Xu, Huixin Li. 219-223 [doi]
- Texture Region Merging with Histogram Feature for Color Image SegmentationHaifeng Sima, Ping Guo. 224-228 [doi]
- Pedestrian Counting for a Large Scene Using a GigaPan Panorama and Exemplar-SVMsShaoming Zhang, Sheng Yu, Qingyu Ma, Pengchao Shang, Popo Gui, Jianmei Wang, TianTian Feng. 229-235 [doi]
- An Improved Kalman Filtering Algorithm for Moving Contact Detecting and TrackingXiuqin Deng, Weijia Cai, Chengyan Fang, Weiqing Kong, Jianqiang Liao. 236-240 [doi]
- Orthogonal Locally Discriminant Projection for Classification of Plant Leaf DiseasesShanwen Zhang, Chuanlei Zhang. 241-245 [doi]
- A Novel Vehicle Flow Detection Algorithm Based on Motion Saliency for Traffic Surveillance SystemRenlong Pan, Xin Lin, Chenquan Huang, Lin Wang 0005. 246-249 [doi]
- Image Restoration Combining Tikhonov with Different Order Nonconvex Nonsmooth RegularizationsXiaoguang Liu, Xingbao Gao, Qiufang Xue. 250-254 [doi]
- Efficient Genetic Algorithm for High-Dimensional Function OptimizationQifeng Lin, Wei Liu, Hongxin Peng, Yuxing Chen. 255-259 [doi]
- Software Defect Prediction Using Dynamic Support Vector MachineBo Shuai, Haifeng Li, Mengjun Li, Quan Zhang, Chaojing Tang. 260-263 [doi]
- A Nearest Prototype Selection Algorithm Using Multi-objective Optimization and PartitionJuan Li, Yuping Wang. 264-268 [doi]
- Analytical Model of Customer Churn Based on Bayesian NetworkPeng Sun, Xin Guo, Yunpeng Zhang, Ziyan Wu. 269-271 [doi]
- QMRCGstab Algorithm for Families of Shifted Linear SystemsJing Meng, Pei-Yong Zhu, Hou-Biao Li. 272-276 [doi]
- Research and Realization of Coordinate Conversion in Radar Video DisplayLi Baiping, Liu Dan. 277-279 [doi]
- A Multiple Chaotic Video Encryption System Based on DM642Xiangzhu Long, Jishen Li, Youjun Hu. 280-283 [doi]
- Differential Evolution Based Parameters Selection for Support Vector MachineJun Li, Lixin Ding, Ying Xing. 284-288 [doi]
- Group Consensus with Switching Topology of Multi-agent SystemsXin-Lei Feng, Xiao-Li Yang, Zhi-He Zhang, Zhongwei Si. 289-293 [doi]
- An Enhanced Dynamic Switch Logic with Floating-Gate MOS TransistorsGuoqiang Hang, Danyan Zhang, XuanChang Zhou, Xiaohu You. 294-297 [doi]
- GA with Special Encoded Chromosome for FJSP with Machine DisruptionsHong-Li Yin. 298-302 [doi]
- Solving Multiobjective Bilevel Transportation-Distribution Planning Problem by Modified NSGA IILiping Jia, Xin-Lei Feng, Guocheng Zou. 303-307 [doi]
- Clustering Analysis of Micro-array Data Based on the SOM AlgorithmXiuming Zou, HuaiJiang Sun. 308-312 [doi]
- Differential Edge-Triggered Flip-Flops Using Neuron-MOS TransistorsGuoqiang Hang, Xiaohui Hu, Hongli Zhu, Xiaohu You. 313-317 [doi]
- A High Reliable and Performance Data Distribution Strategy: A RAID-5 Case StudySaifeng Zeng, Ligu Zhu, Lei Zhang. 318-322 [doi]
- Using CloudSim to Model and Simulate Cloud Computing EnvironmentLong Wang, Yuqing Lan, Qingxin Xia. 323-328 [doi]
- The Application of Fuzzy Comprehensive Evaluation Method for the Evaluation Enterprise Training EffectivenessDongyi He, Jianhua Shuai. 329-333 [doi]
- A Decision Making Model Based on Fuzzy Relation Equations Constraints and Its AlgorithmJinquan Li, Yongchuan Wen. 334-338 [doi]
- Parametric Study of Fuzzy Number Linear ProgrammingYan-Lin Jia, Yan Yang, Yi-hua Zhong. 339-343 [doi]
- Designing a Fuzzy Classifier Using Genetic Algorithm and Application in Chinese Vowel RecognitionWei-xin Ling, Zhen Xing, Zhuo-ming Chen, Da-Jun Tang. 344-348 [doi]
- Automatic Vocal Segments Detection in Popular MusicLiming Song, Ming Li, YongHong Yan. 349-352 [doi]
- A New Method for Supply Chain Optimization with Facility Fail RisksHong-Li Yin. 353-357 [doi]
- MFI Based Interoperability Measurement of Business Models in Service-Based EnterprisesZhao Li, Peng Liang, Yi Zhao, Keqing He. 358-362 [doi]
- Distribution Reduction in Inconsistent Interval Ordered Information Systems Based on Dominance RelationsHong Wang, Minggang Du. 363-367 [doi]
- The Cutting Circle Method and Romberg AlgorithmTianxiang Feng. 368-371 [doi]
- Preconditioned AOR Iterative Method for M-MatrixQiufang Xue, Xingbao Gao, Xiaoguang Liu. 372-376 [doi]
- 3D Reconstruction through Measure Based Image SelectionChao Yang, Fugen Zhou, Xiangzhi Bai. 377-381 [doi]
- L1/2 Regularization Based Low-Rank Image Segmentation ModelXiujun Zhang, Chen Xu. 382-386 [doi]
- A Fusion Algorithm Based on Position Difference Filtering and Least Squares Estimate for Dynamic Scene MatchingZhaohui Xia, Jianyong Wang, Xiaogang Yang. 387-390 [doi]
- Optical Flow Based Urban Road Vehicle TrackingYa Liu, Yao Lu, Qingxuan Shi, Jianhua Ding. 391-395 [doi]
- The Determination of Chinese Pivotal Sentences Based on Semantic EntailmentLu Dong, Likun Qiu, Xiujuan Chen. 396-400 [doi]
- A Word Sense Probabilistic Topic ModelPeng Jin, Xingyuan Chen. 401-404 [doi]
- A Fast Algorithm of Computing Word SimilarityXingyuan Chen, Xia Yang, Bingjun Su. 405-408 [doi]
- Inducing Word Senses for Cross-lingual Document ClusteringGuoyu Tang, Yunqing Xia, Erik Cambria, Peng Jin. 409-414 [doi]
- Chinese Personal Name Recognition in Web Queries via BootstrappingXueqiang Lv, Ruihong Wu, Bin Wen. 415-419 [doi]
- Study on Construction of Semantic Metadata Structure in Professional FieldsJianping Zhang, Yao Liu. 420-423 [doi]
- Chinese Discourse Relation Recognition Using Parallel CorpusYifeng Xu, Yunfang Wu. 424-427 [doi]
- Diversifying Plant Image Retrieval with Dimensionality ReductionSheng-Ping Zhu, Ji-Xiang Du, Chuan-Min Zhai, Zhong-Qiu Zhao. 428-431 [doi]
- An Image Matching Algorithm Based on SIFT and Improved LTPYi-Ming Liu, Li-fang Chen, Yuan Liu, Hao-Tian Wu. 432-436 [doi]
- A Universal Digital Image Steganalysis Method Based on Sparse RepresentationZhuang Zhang, Donghui Hu, Yang Yang, Bin Su. 437-441 [doi]
- A Novel 3 Dimensional Chaotic System and Design of Pseudorandom Number GeneratorLequan Min, Yuqun Zhang, Lijiao Zhang, Kexin Hu. 442-448 [doi]
- A Block Cipher Circuit Design against Power AnalysisYuxiao Ling, Zheng Guo, Zhimin Zhang, Zhigang Mao, Zeleng Zhuang. 449-453 [doi]
- Analysis of Success Rate of Attacking Knapsacks from JUNA Cryptosystem by LLL Lattice Basis ReductionTong Li, Shenghui Su. 454-458 [doi]
- The Improvement of the Commonly Used Linear Polynomial Selection MethodsHao Zhu, Shenghui Su. 459-463 [doi]
- An Improved Block Lanczos Algorithm to Solve Large and Sparse Matrixes on GPUsWenjuan Ying. 464-468 [doi]
- A Secure Threshold Signature Scheme from LatticesKerui Wang, Qiuliang Xu, Guoyan Zhang. 469-473 [doi]
- A Verifiable Proxy Re-encryption with Keyword Search without Random OracleLifeng Guo, Bo Lu, Xiangyu Li, He Xu. 474-478 [doi]
- NISLVMP: Improved Virtual Machine-Based Software ProtectionHuaijun Wang, Dingyi Fang, Guanghui Li, Xiaoyan Yin, Bo Zhang, Yuanxiang Gu. 479-483 [doi]
- GPS Route Decisions Research Based on Network TheoryZhonghua Li, Jin Yang, Jun Yang, De-Ming Wang. 484-488 [doi]
- A Design of Decoded Picture Buffer of H.264 Based on DDR2Dang Xinxin, Chen Li. 489-493 [doi]
- Stability Analysis for a Class of Systems with Time-Varying and Distributed DelaysDongmei Gao, Ruliang Wang. 494-497 [doi]
- The Design of Output Feedback Controller for a Class of Nonlinear Systems with Time-DelayRuliang Wang, Shanshan Zhang, Wen Huang. 498-502 [doi]
- Video Fogging Hiding Algorithm Based on Fog TheoryYi Yang, Sen Bai, Yu Guo, Jian-Bo Tang. 503-507 [doi]
- Reversible Image Watermarking Using a Diagonal Structure for PredictionHao-Tian Wu, Yuan Liu, Yiu-ming Cheung. 508-513 [doi]
- Research on Basic Problems of Cognitive Network Intrusion PreventionHui Xu, Xiang Chen, Jiangmei Zhou, Zhaowen Wang, Huanxiao Xu. 514-517 [doi]
- Enhancing Trust Evaluation Using Intrusion Sensitivity in Collaborative Intrusion Detection Networks: Feasibility and ChallengesWenjuan Li, Yuxin Meng, Lam-for Kwok. 518-522 [doi]
- FENOC: An Ensemble One-Class Learning Framework for Malware DetectionJiachen Liu, Jianfeng Song, Qiguang Miao, Ying Cao. 523-527 [doi]
- Analysis and Improvement of an Efficient and Secure Key Agreement ProtocolJiyun Yang, Rui Zhang, Di Xiao. 528-532 [doi]
- Design on the Real-Time Measurement Method of Molten Metal High Temperature Based on DSPShuqing Jiao. 533-536 [doi]
- Robust Tracking Integrated with Detection and Online LearningBo Zhao, Hong Du, Ying Wang, Xiaozheng Zhang. 537-541 [doi]
- Wormhole CanvasRuimin Lyu, Yuan Liu, Lei Meng, Xinyue Hu. 542-544 [doi]
- Improving Histogram Shifting Reversible Data Hiding by Pixel Pair's Average PredictionsJiajia Zhang, Shuli Zheng, Donghui Hu, Yunling Zhang. 545-549 [doi]
- Secure Architecture and Protocols for Robust Perceptual HashingDonghui Hu, Bin Su, Shuli Zheng, Zhuang Zhang. 550-554 [doi]
- Strongly Password-Based Three-Party Authenticated Key Exchange ProtocolYuanhui Lin, Mengbo Hou, Qiuliang Xu. 555-558 [doi]
- A Two-Party Certificateless Authenticated Key Agreement Protocol with Provable SecurityGuiying Li, Mengbo Hou, Chuan Zhao, Qiuliang Xu. 559-563 [doi]
- Identity-Based Authenticate Key Exchange Protocol from LatticeHao Wang, Chuan Zhao, Qiuliang Xu, Yilei Wang. 564-568 [doi]
- Study on Pseudorandomness of Some Pseudorandom Number Generators with ApplicationLequan Min, Kexin Hu, Lijiao Zhang, Yuqun Zhang. 569-574 [doi]
- Improved Rectangle Attack on SMS4 Reduced to 18 RoundsXianglong Kong, Wei Wang, Qiuliang Xu. 575-578 [doi]
- Security Analysis of Random Phase Encoding Based Image Encryption in Gyrator Transform DomainsJun Sang, Bin Cai, Bing Zhang, Daxiang Hong, Haibo Hu. 579-582 [doi]
- An Intelligent Algorithm for the (1, 2, 2)-Generalized Knight's Tour ProblemSen Bai, Guibin Zhu, Jian Huang. 583-588 [doi]
- Secure Obfuscation for Tightly Structure-Preserving Encrypted Proxy SignaturesXing Wei, Zheng Yuan, Xian Li, Xiao Feng, Jintao Liu. 589-593 [doi]
- A PG-LSH Similarity Search Method for Cloud StorageJie Zheng, Jun Luo. 594-600 [doi]
- An Analysis of Software Supportable Tasks Related with ISO/IEC 15408Ning Zhang, Ahmad Iqbal Hakim Suhaimi, Yuichi Goto, Jingde Cheng. 601-606 [doi]
- The Design Research of Data Security Model Based on Public CloudWeiquan Xian, Houkui Wang. 607-609 [doi]
- The Hopf Bifurcation and Control of a Time-Delayed Dual Model in Internet Congestion ControlYan-ting Ouyang, Hui-Dang Zhang, Yu-yao He. 610-614 [doi]
- Effective Fuzzing Based on Dynamic Taint AnalysisGuangcheng Liang, Lejian Liao, Xin Xu, Jianguang Du, Guoqiang Li 0003, Henglong Zhao. 615-619 [doi]
- Study on Digital Radio Mondiale Signal Monitor System for Wireless Communication SecurityHeng-Zhou Wu, Wang-da Chen, Lin-Yu Fu, Xin Zhang, Hua-Qin Liu. 620-623 [doi]
- A Verification Method of Enterprise Network Reachability Based on Topology PathYazhuo Li, Yang Luo, Zhao Wei, Chunhe Xia, Xiaoyan Liang. 624-629 [doi]
- Colluder Detection Based on Hypergraph DecompositionJicheng Hu, Dongjian Fang, Xiaofeng Wei, Jian Xie. 630-634 [doi]
- Feature Emphasized OLIC for 2D Flow VisualizationBeichen Liu, Wenyao Zhang, Yueguang Wang, Yuezhu Pei. 635-639 [doi]
- A Study of Meta Search Interface for Retrieving Disaster Related EmergenciesShuoming Li, Lan Yin. 640-643 [doi]
- Lite-IDE Based Hierarchical Node Authentication Protocol for Energy Efficient in WSNYoungbok Cho, Sangho Lee. 644-647 [doi]
- A Multiple Metrics Gateway Selection Algorithm for Vehicular Ad Hoc Networks in Fading ChannelsKelei Chen, Lijia Chen, Junyong Mao, Dong Zhao. 648-652 [doi]
- A Botnet-Oriented Collaborative Defense Scheme Description LanguageLiming Huan, Yang Yu, Liangshuang Lv, Shiying Li, Chunhe Xia. 653-657 [doi]
- Reliability Adjustment Weighted Bit-Flipping Decoding for Low-Density Parity-Check CodesShengpei Ding, JiongCheng Li, Henghui Xiao, Haiyi Huang. 658-662 [doi]
- A Survey on the Internet of Things SecurityKai Zhao, Lina Ge. 663-667 [doi]
- Formal Proof of the Security Protocol in Wireless Sensor Network Based on the Petri NetYingjiu Guo, Xuemei Liu, Xiufeng Shao. 668-672 [doi]
- A Distance Interaction Method Based on PenLei Wang, Kuo Gao, Qiaoyong Jiang, Fen Zou. 673-677 [doi]
- Knowledge-Based Cooperative Particle FilterWang Lei, Wang Yanpeng, Jiang Qiaoyong, Zou Fen. 678-682 [doi]
- Coercion: A Distributed Clustering Algorithm for Categorical DataBin Wang, Yang Zhou, Xin-hong Hei. 683-687 [doi]
- A Strategy to Improve the Reliability of Object-Oriented Formal ModelsGuo Xie, Fucai Qian, Xinhong Hei. 688-691 [doi]
- Design of a System for Safe Driving Based on the Internet of Vehicles and the Fusion of Multi-aspects InformationCheng Cheng, Zongxin Wu. 692-696 [doi]
- Evaluable Secure Ranked Keyword Search Scheme over Encrypted Cloud DataZhi-Peng Jia, Ya-ling Zhang, Shang-ping Wang, Qin-dong Sun. 697-701 [doi]
- Bayes-SWRL: A Probabilistic Extension of SWRLYu Liu, Shihong Chen, Shuoming Li, Yunhua Wang. 702-706 [doi]
- Fuzzy D-S Theory Based Fuzzy Ontology Context Modeling and Similarity Based ReasoningHuanyu Zhou, Yongheng Wang, Kening Cao. 707-711 [doi]
- Cloud Model Based Zero-Watermarking Algorithm for Authentication of Text DocumentXitong Qi, Yuling Liu. 712-715 [doi]
- Research on Extracting System Logged-In Password Forensically from Windows Memory Image FileLijuan Xu, Lianhai Wang. 716-720 [doi]
- A Construction of Pooling Designs by Using Dn-MatrixYa-Ping Wang. 721-723 [doi]
- A Symmetric Image Encryption Scheme Using Chaotic Baker Map and Lorenz SystemChong Fu, Wen-Jing Li, Zhao-yu Meng, Tao Wang, Pei-Xuan Li. 724-728 [doi]
- Efficient Countermeasures against Fault Attacks for 3DES Crypto Engine in Bank IC CardQian Wang, Liji Wu, Xiangmin Zhang, Xiangyu Li, Jun Guo. 729-733 [doi]
- A Chaotic Encryption Algorithm for Palette ImageWei Wang, Fenlin Liu, Xin Ge, Zheng Zhao. 734-737 [doi]
- Attribute Based Multi-signature Scheme in the Standard ModelXimeng Liu, Jianfeng Ma, Qi Li, Jinbo Xiong, Faliang Huang. 738-742 [doi]
- A Key Management Scheme between Body Sensor Networks and the Base StationHuawei Zhao, Minglei Shu, Jing Qin, Jiankun Hu. 743-747 [doi]
- A Power Analysis on SMS4 Using the Chosen Plaintext MethodShutong Wang, Dawu Gu, Junrong Liu, Zheng Guo, Weijia Wang, Sigang Bao. 748-752 [doi]
- Research on the Trade Duration of HS300 Index Based on ACD ModelYulin Ma, Yuan Zhao. 753-757 [doi]
- Load Balancing Based on Group Analytic Hierarchy ProcessJian-dong Zhang, Xuan Ma, Jin Yang, Zhonghua Li. 758-762 [doi]
- The Application of Web Log in Collaborative Filtering Recommendation AlgorithmXiaohui Zhang, Longge Wang. 763-765 [doi]
- GreenCloud for Simulating QoS-Based NaaS in Cloud ComputingJiang Zhihua. 766-770 [doi]
- A Novel Approach to IoT Security Based on ImmunologyCaiming Liu, Yan Zhang, Huaqiang Zhang. 771-775 [doi]
- Automatic Allophone Deriving for Korean Speech RecognitionJi Xu, Yujing Si, Jielin Pan, YongHong Yan. 776-779 [doi]
- Optimality Conditions under Generalized Type I InvexityXiangyou Li, QingXiang Zhang. 780-783 [doi]
- Conformance Checking and QoS Optimizing of Web Service CompositionGuojun Zhang. 784-787 [doi]
- A Kind of Hilbert Boundary Value Problem for Generalized Analytic Functions in Clifford AnalysisZhongwei Si, Liang Wang, Xia Zhong, Xin-Lei Feng, Lina Liang. 788-792 [doi]
- Analyzing of Dynamic Friction Model for the Tire and the RunwayLizhuo Liu, Lili Xie, Chenglong Hao, Xinhua Zheng, Bing Sun. 793-797 [doi]
- The Finiteness Conjecture for the Joint Spectral Radius of a Pair of MatricesShuoting Wang, Jiechang Wen. 798-802 [doi]
- The Hilbert Boundary Value Problem for 2-Monogenic Functions in the Unit BallZhongwei Si. 803-806 [doi]
- A Study on the Application Cost of Server VirtualisationJing Nie. 807-811 [doi]
- A New Model of Minimum Variance Hedge Ratio: EGARCH-Copula-EWMAJian-Hui Yang, Ying-Ying Chen. 812-816 [doi]
- Co-op Advertising Analysis within a Supply Chain Based on the Three-Stage Non-cooperate Dynamic Game ModelHong Zhang. 817-821 [doi]
- Analysis on the Grey Correlation between Manufacturing and Logistics Industry in DongguanWang Xing, Li Wei. 822-825 [doi]
- Managing Public Financial Resources in a Changing World: Analyzing a BudgetZiqi Zhu. 826-830 [doi]
- Duality for Multiobjective Semi-Infinite Programming with Uniform K-(Fb, rho)-ConvexityHong Yang. 831-835 [doi]
- Texture Synthesis Using Diagonal Quilting Wang TilesYueran Zu, Huichuan Duan. 836-840 [doi]
- Improved Genetic Algorithm for the Regional Multi-line Bus DispatchingJinling Du, Linzhi Cao. 841-845 [doi]
- Research on the Optimal Configuration of Human Resource in Construction Enterprise Based on Two-Side MatchingJinling Du, Dalian Liu, Meisheng Zhang. 846-850 [doi]