Abstract is missing.
- A Global-Crowding-Distance Based Multi-objective Particle Swarm Optimization AlgorithmJing Zhang, Huanqin Li. 1-6 [doi]
- A New Model for Energy Consumption Optimization under Cloud Computing and its Genetic AlgorithmHai Zhu, Xiaoli Wang, Hongfeng Wang. 7-11 [doi]
- A Two-Stage Approach for Reconstruction of Cross-Cut Shredded Text DocumentsYa Wang, Ding-Cheng Ji. 12-16 [doi]
- Adaptive Central Force Optimization with Variable Population SizeLiu Jie. 17-20 [doi]
- An Adaptive Co-evolutionary Algorithm Based on Genotypic Diversity MeasureMingzhao Wang, Xiaoli Wang, Yuping Wang, Zhen Wei. 21-24 [doi]
- An Improved MULTI-ACS Algorithm for the Waste Collection Vehicle Arc Routing Problem with Turn ConstraintsJie Liu, Yanfeng He, Aiping Zhang. 25-29 [doi]
- Balance Function Analysis in Variable Weight Decision MakingDeqing Li, Wenyi Zeng, Junhong Li, Ping Guo. 30-34 [doi]
- Convergence Analysis of Swarm Intelligence Based on Fuzzy Random VariablesJiqiang Feng, Chen Xu, Weiqiang Zhang. 35-38 [doi]
- Financial Time Series Forecasting Using Support Vector MachineBin Gui, Xianghe Wei, Qiong Shen, Jingshan Qi, Liqiang Guo. 39-43 [doi]
- Improved Adaptive Median FilterZhengyang Guo, Le Zhang. 44-46 [doi]
- Improved Bacterial Foraging Optimization Algorithm with Information Communication MechanismBen Niu, Jing Liu, Ying Bi, Ting Xie, Lijing Tan. 47-51 [doi]
- Improving Metabolic Flux Estimation of Metabolic Networks by QPSO with Penalty FunctionHaixia Long, Shulei Wu, Haiyan Fu. 52-57 [doi]
- Integrating Preferred Weights with Decomposition Based Multi-objective Evolutionary AlgorithmZhenhua Li, Hai-lin Liu. 58-63 [doi]
- Mathematical Models, GRASP Algorithms and Fitness Landscape Analysis for Aircraft Gate Assignment ProblemYajie Pi, Xueyan Song, Jizhou Sun. 64-68 [doi]
- Multi-user Preferences Based Top-k Query Processing AlgorithmYunlong Wu, Guohua Liu, Yuanyuan Liu. 69-73 [doi]
- Parallel Diversity-Controlled Quantum-Behaved Particle Swarm Optimization AlgorithmHaixia Long, Shulei Wu, Haiyan Fu. 74-79 [doi]
- A Feedback-Based Self-Organizing Query Structure Optimization AlgorithmRui-Lin Xu. 80-84 [doi]
- Affinity Propagation-Based Probability Neural Network Structure OptimizationYingjuan Xie, Xinnan Fan, Junfeng Chen. 85-89 [doi]
- An Exemplar-Based Hidden Markov Model with Discriminative Visual Features for LipreadingXin Liu, Yiu-ming Cheung. 90-93 [doi]
- Asymptotical Stability Criteria for Time-Delay Static Neural Networks Subject to Stochastic PerturbationsHuasheng Tan, Mingang Hua. 94-98 [doi]
- Brain Storm Optimization Model Based on Uncertainty InformationJunfeng Chen, Yingjuan Xie, Jianjun Ni. 99-103 [doi]
- Design and Implementation: Adaptive Active Queue Management Algorithm Based on Neural NetworkZhenwei Meng, Junlong Qiao, Lijun Zhang. 104-108 [doi]
- Individual Intelligence Based Optimization and Its Application to ITAE Standard FormsQiwen Yang, Shanshan Fu, Yuncan Xue, Shanna Ruan, Junfeng Chen. 109-113 [doi]
- Modeling Behaviors of Browsing and Buying for Alidata Discovery Using Joint Non-negative Matrix FactorizationBin Ju, Mincao Ye, Yuntao Qian, Rong Ni, Chenxi Zhu. 114-118 [doi]
- Multi-scale Monte Carlo-Based Tracking Method for Abrupt MotionGuang-Hao Zhang, Yao Lu, Mukai Chen. 119-123 [doi]
- The CT Image Reconstruction Algorithm Based on the Least Absolute Criterion by Alternating Direction IterativeWenzhang He, Hongjian Xu, Zhengyang Guo, Jie Liang, Lina Wang. 124-128 [doi]
- Wireless Location on CPN Correction Environmental FactorsZhifeng Lin, Jiechang Wen, Qiling Chen. 129-133 [doi]
- A New Genetic Algorithm for Release-Time Aware Divisible-Load SchedulingXiaoli Wang, Yuping Wang, Kun Meng. 134-138 [doi]
- Analysis of Energy Saving and Performance Characteristics of Library Computer Room Intelligent High Heat Transfer and ExchangerJuntao Chen, Shulei Wu, Lan Lin, Jinmei Zhan. 139-142 [doi]
- Design & Implementation to an RFID Based Conference Management SystemZhihua Jiang, Zhongwei Si, Chi Luo. 143-147 [doi]
- Detecting Driver Use of Mobile Phone Based on In-Car CameraDan Wang, Mingtao Pei, Lan Zhu. 148-151 [doi]
- Failure-Aware Resource Scheduling Policy for Hybrid CloudHong Zhang, Hai Zhu. 152-156 [doi]
- Granular Computing Model Based on Quantum Computing TheoryJun Hu, Chun Guan. 157-160 [doi]
- Improved Feedback Vertex Sets in Kautz Digraphs K (d, n)Xirong Xu, Chun Yin, Sijia Zhang, Yazhen Huang. 161-165 [doi]
- Neuron-MOS-based Dynamic Circuits for Multiple-Valued LogicGuoqiang Hang, Yang Yang, Danyan Zhang, Xiaohua Li. 166-170 [doi]
- A Fast Image Stitching Algorithm Based on Improved SURFLin Zhu, Ying Wang, Bo Zhao, Xiaozheng Zhang 0003. 171-175 [doi]
- A Novel Tracking Method Based on Ensemble Metric LearningQirun Huo, Yao Lu. 176-179 [doi]
- A Study of Deep Belief Network Based Chinese Speech Emotion RecognitionBu Chen, Qian Yin, Ping Guo. 180-184 [doi]
- Action Recognition Using Local Joints Structure and Histograms of 3D JointsYan Liang, Wanxuan Lu, Wei Liang, Yucheng Wang. 185-188 [doi]
- An Improved Bilinear Deep Belief Network Algorithm for Image ClassificationJie Niu, Xiongzhu Bu, ZhongLi, Yao Wang. 189-192 [doi]
- An Improved Median Filter Algorithm Based on VC in Image DenoisingShulei Wu, Huandong Chen, Xiangxiang Xu, Haixia Long, Wenjuan Jiang, Dong Xu. 193-196 [doi]
- An Improved Multi-pattern Matching Algorithm for Large-Scale Pattern SetsZhan Peng, Yuping Wang, Jinfeng Xue. 197-200 [doi]
- An Improved Remote Sensing Image Classification Based on K-Means Using HSV Color FeatureShulei Wu, Huandong Chen, Zhizhong Zhao, Haixia Long, Chunhui Song. 201-204 [doi]
- Bimodal Learning for Multi-concept Image QueryHaijiao Xu, Peng Pan, Yansheng Lu, Chunyan Xu, Deng Chen. 205-209 [doi]
- Design of a Flash Digital Watermarking Application Using MATLAB GUIWen-Juan Jiang, Dong Xu, Shulei Wu, Bin Meng. 210-212 [doi]
- Detecting Circles on Ego Network Based on StructureQiguang Miao, Xing Tang, Yi-Ning Quan, Kai Deng. 213-217 [doi]
- Domain-Specific Product Named Entity Recognition from Chinese MicroblogXianxiang Yang, Heyan Huang, Xin Xin, Quanchao Liu, Xiaochi Wei. 218-222 [doi]
- Experiments with Feature-Prior Hybrid Ensemble Method for ClassificationJunyang Zhao, Zhili Zhang, Chongzhao Han, Lijiang Sun. 223-227 [doi]
- Image Denoising Using Low-Rank Dictionary and Sparse RepresentationTao Li, Weiwei Wang, Long Xu, Xiangchu Feng. 228-232 [doi]
- Image Up-Scaling: Based on Self Similarity and Local InformationXin Zheng, Chenlei Lv, Qingqing Xu, Ping Guo. 233-237 [doi]
- Joint Sequential Shape Classification and Piecewise Elastic Motion EstimationFeng Lv, Huijun Di, Yao Lu. 238-241 [doi]
- Multiview Face Retrieval in Surveillance Video by Active Training Sample CollectionXiao-Ma Xu, Ming-Tao Pei. 242-246 [doi]
- Nonlocal Diffusion Tensor for Visual Saliency DetectionXiujun Zhang, Chen Xu, Min Li. 247-251 [doi]
- Rapid Face Detection in Static Video Using Background SubtractionWencai Zou, Yao Lu, Mukai Chen, Feng Lv. 252-255 [doi]
- Spatio-Temporal Context for More Accurate Dense Point Trajectories EstimationQingxuan Shi, Yao Lu, Tianfei Zhou. 256-259 [doi]
- Tracking Non-rigid Object Using Discriminative FeaturesQian Wang, Qingxuan Shi, Xuedong Tian. 260-263 [doi]
- Vehicle Color Recognition Based on License Plate ColorYanmei Dong, Mingtao Pei, Xiameng Qin. 264-267 [doi]
- A New Biclustering Algorithm for Time-Series Gene Expression Data AnalysisYun Xue, Zhengling Liao, Meihang Li, Jie Luo, Xiaohui Hu, Guiyin Luo, Wen-Sheng Chen. 268-272 [doi]
- A Parallel Algorithm for Datacleansing in Incomplete Information Systems Using MapReduceFei Chen, Lin Jiang. 273-277 [doi]
- Application of Investment Plan Selection Based on Variable Weight Synthesis and Mahalanobis DistanceZhenghai Ai, Zhongwei Si. 278-282 [doi]
- Extracting Hyponymy of Ontology Concepts from Patent DocumentsJunfeng Li, Xueqiang Lv, Kehui Liu. 283-287 [doi]
- Identifying Relevant Messages for Social TVWeibo Li, Chunhong Zhang, Xiaofeng Qiu, Yang Ji. 288-292 [doi]
- N-gram Index Structure Study for Semantic Based Mathematical FormulaYuexia Xu, Wei Su, Ming Cheng, Zhiyi Qu, Hui Li. 293-298 [doi]
- On Modeling and Querying of Text CorporaDingjia Liu, Guohua Liu, Yuanyuan Liu. 299-303 [doi]
- Relative Efficiency of Third-Grade General Public Hospitals in Zhejiang Province, ChinaKai Lin, Rong Ni, Yanhua Shao, Sijing Wu, Xiao-Jiao Ma. 304-307 [doi]
- The Automatic Classification Research to Medical Imaging Disease Based on Naïve Nayesion AlgorithmLuoyong Niu, Jiaming Hong, Hongbo Huo, Bishi He, Zhe Xu. 308-311 [doi]
- A Minimum-Elimination-Escape Function Method for Multimodal Optimization ProblemsLei Fan, Xiyang Liu, Liping Jia. 312-316 [doi]
- An Evolutionary Algorithm Based on a Space-Gridding Scheme for Constrained Multi-objective Optimization ProblemsWen Li, Hecheng Li. 317-320 [doi]
- Combining TOPSIS and Particle Swarm Optimization for a Class of Nonlinear Bilevel Programming ProblemsLiping Jia, Guocheng Zou, Lei Fan. 321-325 [doi]
- Dependence System and its StructureXuejun Huang, Xiaobin Qu. 326-329 [doi]
- On the Field Patterns in Elliptic-Shaped Microshield Lines Loaded with Left-Handed Materials by the Edge-Based Finite Element MethodHai Sun. 330-333 [doi]
- Optimal Pricing with Yield Management in M/M/cLi Xin, Zhaotong Lian. 334-337 [doi]
- Simulation Study on the Keep-Right-Except-to-Pass Rule Model Based on Cellular AutomataXin Yang, Linna Wang, Hongbo Zai, Yanrong Ren. 338-342 [doi]
- The Hilbert Boundary Value Problem for Beltrami Equation in Clifford AnalysisZhongwei Si, Lina Liang, Zhenghai Ai, Zhihua Jiang. 343-347 [doi]
- The Sufficiency of Solution for Multi-objective Semi-infinite ProgrammingXiangyou Li, QingXiang Zhang. 348-351 [doi]
- Variational Image Decomposition in Shearlet Smoothness SpacesMin Li, Xiaoli Sun, Chen Xu. 352-355 [doi]
- A 6 Dimensional Chaotic Generalized Synchronization System and Design of Pseudorandom Number Generator with Application in Image EncryptionLequan Min, Xu Lan, Longjie Hao, Xiuping Yang. 356-362 [doi]
- A Chosen-Plaintext Method of CPA on SM4 Block CipherWeijun Shan, Lihui Wang, Qing Li, Limin Guo, Shanshan Liu, Zhimin Zhang. 363-366 [doi]
- A New Sybil Attack Detection for Wireless Body Sensor NetworkRui-xia Liu, Yinglong Wang. 367-370 [doi]
- A Trust-Role Based Context Aware Access Control ModelLu Chen, Qing Zhou, Gaofeng Huang, Liqiang Zhang. 371-376 [doi]
- A User-Based Document Management Mechanism in CloudGuozhen Shi, Mang Su, FengHua Li, Jiapeng Lou, Qiong Huang. 377-381 [doi]
- Attribute-Based Keyword Search and Data Access Control in CloudJia-Zhi Li, Lei Zhang. 382-386 [doi]
- Design of a Masked S-Box for SM4 Based on Composite FieldHao Liang, Liji Wu, Xiangmin Zhang, Jiabin Wang. 387-391 [doi]
- Detecting Compromised VM via Application-Aware Anomaly DetectionKai Luo, Shouzhong Tu, Chunhe Xia, Dan Zhou. 392-396 [doi]
- IP Traceback Algorithm Based on Deterministic Linear Network CodingQiao Yan, Nan Lu, Tu-Wen Ning, Xi-Yan Yao, Bao-Guang Li. 397-401 [doi]
- Study on the Pass Rate of NIST SP800-22 Statistical Test SuiteLihua Dong, Yong Zeng, Ligang Ji, Xucang Han. 402-404 [doi]
- Wavelet-Based Noise Reduction in Power Analysis AttackWei Liu, Liji Wu, Xiangmin Zhang, an Wang. 405-409 [doi]
- A Countermeasure for DES with Both Rotating Masks and Secured S-BoxesZeleng Zhuang, Jiachao Chen, Haosheng Zhang. 410-414 [doi]
- A Low-Cost PKC-based RFID Authentication Protocol and its ImplementationLili Wei, Zhaotong Luo, Qiang Qu, Qing He, Jingwei Xu. 415-419 [doi]
- A Method of Multiple Encryption and Sectional Encryption Protocol Reverse EngineeringWei Lin, Jin-long Fei, Yuefei Zhu, Xiaolong Shi. 420-424 [doi]
- A Random Sampling Algorithm for SVP Challenge Based on y-Sparse Representations of Short Lattice VectorsDan Ding, Guizhen Zhu. 425-429 [doi]
- A Statistical Model to Predict Success Rate of Ion Fault Injection Attacks for Cryptographic ICsLiang Dai, Huiyun Li, Guoqing Xu, Liying Xiong. 430-434 [doi]
- Algorithm-Based Countermeasures against Power Analysis Attacks for Public-Key Cryptography SM2Xiaowei Han, Beibei Wang, an Wang, Liji Wu, Woogeun Rhee. 435-439 [doi]
- An Efficient Fuzzy Identity-Based Signature Scheme without Bilinear PairingsChangji Wang. 440-444 [doi]
- Application of Grover's Quantum Search Algorithm to Solve the Transcendental Logarithm ProblemYi Tang, Shenghui Su. 445-449 [doi]
- Attribute-Based Encryption for Restricted Circuits from LatticesJian Zhao, Hai-ying Gao. 450-454 [doi]
- Hierarchial Identity-Based Encryption Scheme from Multilinear MapsHao Wang, Zhihua Zheng, Lei Wu. 455-458 [doi]
- Insecurity of an Dynamic User Revocation and Key Refreshing for Attribute-Based Encryption SchemeChang-ji Wang, Hai-Tao Lin, Xi-Lei Xu, Kangjia Zheng, Xiaonan Xia. 459-463 [doi]
- Provably Secure Identity-Based Threshold Decryption on Access StructureHuawang Qin, Xiaohua Zhu, Yuewei Dai. 464-468 [doi]
- Quantum Algorithm for Polynomial Root Finding ProblemGuodong Sun, Shenghui Su, MaoZhi Xu. 469-473 [doi]
- Scalable Lightweight Authentication Protocol with Privacy PreservationYanfei Liu, Sha Feng. 474-478 [doi]
- A Multiple-Level DCT Based Robust DWT-SVD Watermark MethodXueyi Ye, Xueting Chen, Meng Deng, Shuyun Hui, Yunlu Wang. 479-483 [doi]
- A Reliable Supervision Model and Implementation for the Trading of Digital WorksGuozhen Shi, Ying Shen, FengHua Li, Mang Su. 484-488 [doi]
- A Wav-Audio Steganography Algorithm Based on Amplitude ModifyingMingguang Zou, Zhitang Li. 489-493 [doi]
- Adaptive Chosen-Plaintext Correlation Power AnalysisWenjing Hu, Liji Wu, an Wang, Xinjun Xie, Zhihui Zhu, Shun Luo. 494-498 [doi]
- Cryptographic Algorithms Analysis Technology Research Based on Functions Signature RecognitionRui Chang, Liehui Jiang, Hui Shu, Hong-qi He. 499-504 [doi]
- Diversifying Results of Top-k Querys over Bounded RegionsYu Zhou, Guohua Liu, Biying Wang. 505-509 [doi]
- Ensuring Reliability and QoS Optimizing for Web Service CompositionLiping Chen. 510-513 [doi]
- Hardware Design and Implementation of SM3 Hash Algorithm for Financial IC CardYe Hu, Liji Wu, an Wang, Beibei Wang. 514-518 [doi]
- Method of Non-reference Image Quality Assessment of SSIM Based on Regional Weighted EntropyTong Zhang, Shuna Zhao, Xue Li. 519-523 [doi]
- Mixed Obfuscation of Overlapping Instruction and Self-Modify Code Based on Hyper-Chaotic Opaque PredicatesXin Xie, Fenlin Liu, Bin Lu, Fei Xiang. 524-528 [doi]
- Stock Index Futures Basis and Liquidity of Correlation Analysis and Application Based on t-GARCH-Copula ModelSulin Pang, Yuanxiong Chen. 529-533 [doi]
- Verification of Artifact Lifecycle ModelXiaomei Wan, Guohua Liu. 534-538 [doi]
- Visualization of Police Intelligence Data Based on Word CloudsPeng Wei, Tongge Xu, Xi Qin, Chao Wang. 539-543 [doi]
- A Developing Method for Parallel Program Based on System GeneratorWei Han, Jianchun Xie. 544-547 [doi]
- A Feasible Control Strategy for LQG Control Problem with Parameter and Structure UncertaintiesGuo Xie, Dan Zhang, Xinhong Hei 0001, Fucai Qian. 548-552 [doi]
- A Hybrid Task Schedule Algorithm for Real-Time System Employing Trusted Computing TechnologyTingyu Jiang, YaHui Li, Yuan Dong. 553-557 [doi]
- A Modified PSO Algorithm Based on Cache Replacement AlgorithmMingyue Feng, Hua Pan. 558-562 [doi]
- A Multi-users Searchable Encryption Scheme with Proxy Re-encryptionYa-ling Zhang, Kai Liu, Shang-ping Wang, Qin-dong Sun. 563-567 [doi]
- A Parking Guidance Method Based on Parallel Particle Swarm Optimization AlgorithmBin Wang, Ying Liu, Xinhong Hei 0001, Lei Wang, Zhiqiang Zhang. 568-572 [doi]
- A Rendering Algorithm for Function Call Diagram in Software Reliability AssuranceZhoukai Wang, Yikun Zhang, Xinhong Hei, Linjing Sun, Rui Zhou, Ming Zhao. 573-577 [doi]
- A Simple and Real-Time Parallel Compression of Time Series Scientific Simulation Data for Interactive and Cooperative SupercomputingWenjuan Liu, Xinhong Hei 0001, Shinji Fukuma, Shin-ichiro Mori. 578-582 [doi]
- A UML Model to Simulink Model Transformation Method in the Design of Embedded SoftwarePeng Guo, YaHui Li, Peng Li, Shuai Liu, Dongya Sun. 583-587 [doi]
- An Improved Method of Access Control Based on BLP Model in MILSKaiqiang Li, Hao Feng, YaHui Li, Zhiwei Zhang. 588-592 [doi]
- Analysis of Distributed Consensus-Based Spectrum Sensing Algorithm in Cognitive Radio NetworksHongning Li, Xianjun Liu, Leilei Xu. 593-597 [doi]
- Information Flow Control Model and Method in Distribute MILSKaiqiang Li, Hao Feng, YaHui Li, Zhiwei Zhang. 598-602 [doi]
- Secure Networking Protocol with Identity Protection for Cooperation of Unmanned PlatformsYaHui Li, Wen Sheng Niu, Peng Li, Jianfeng Ma, Yulong Shen. 603-607 [doi]
- A New Packet Filter Schema Based on Multi-level Signature Hash and DFA GroupingYumeng Wang, Yuping Wang, Xingsi Xue, Chen Zhang, Yuanliang Huo. 608-614 [doi]
- A Novel Key Pre-distribution Scheme in Wireless Sensor NetworksZhongyuan Qin, Yuying Wang, Hengkang Wang, Jie Huang. 615-619 [doi]
- A Wireless Sensor System for the Training of Hammer ThrowersYe Wang, Shaotsung Chang, Gongbing Shan, Hua Li. 620-623 [doi]
- Application Research on Retrospective Analysis System in Network Intrusion DetectionWei Wu, Nan Cheng, Yubin Wang. 624-627 [doi]
- Internet Security Protection in Personal Sensitive InformationYubin Wang, Chao Li, Nan Cheng. 628-632 [doi]
- Multi-sender Broadcast Authentication in Wireless Sensor NetworksYa Gao, Peng Zeng, Kim-Kwang Raymond Choo. 633-637 [doi]
- Packet Faking Attack: A Novel Attack and Detection Mechanism in OppNetsMajeed Alajeely, Asma'a Ahmad, Robin Doss, Vicky H. Mak-Hau. 638-642 [doi]
- Selection of QoS Support on Artificial Immune Network Classifier for Dynamic Web Service CompositionGuojun Zhang. 643-646 [doi]
- A Diploma Anti-forgery System Based on Lightweight Digital SignaturesYue Dai, Shenghui Su. 647-651 [doi]
- A Key Pre-distribution Scheme Based on Multiple Key Spaces in Wireless Sensor NetworksYuying Wang, Zhongyuan Qin, Qunfang Zhang, Hengkang Wang, Jie Huang. 652-656 [doi]
- A KVM Virtual Machine Memory Forensics Method Based on VMCSShuhui Zhang, Lianhai Wang, Xiaohui Han. 657-661 [doi]
- A Novel Identity-Based Security Scheme for Wireless Sensor NetworksZhongyuan Qin, Kerong Feng, Shuaiqi Hu, Lei Tao, Zunli Hu, Xinshuai Zhang, Jie Huang. 662-666 [doi]
- A Novel Subspace Template Attack Based on Symmetric Cross Entropy CriterionFei Song, Liji Wu, an Wang, Xinyu Zhao. 667-670 [doi]
- A Novel Template Attack on wNAF Algorithm of ECCZhenbin Zhang, Liji Wu, Zhaoli Mu, Xiangmin Zhang. 671-675 [doi]
- An Improved Side-Channel Attack Based on Support Vector MachineZhong Zeng, Dawu Gu, Junrong Liu, Zheng Guo. 676-680 [doi]
- Brief Talk about the Existing Problems in Safety Management in Classification Testing and EvaluationNan Cheng, Wei Wu, Yubin Wang. 681-684 [doi]
- Research on Ground Effect of Shipborne Flying-Wing UAVJie Li, Gang Lei, Yong-xian, Xiaoli Wang. 685-688 [doi]
- Surveying and Analyzing Security Problems in Cloud Computing EnvironmentsMouna Jouini, Latifa Ben Arfa Rabai. 689-693 [doi]
- SymWalker: Symbolic Execution in Routines of Binary CodeJinxin Ma, Guowei Dong, Puhan Zhang, Tao Guo. 694-698 [doi]
- A Bayesian Analysis of Zero-Inflated Count Data: An Application to Youth Fitness SurveyLiying Lu, Yingzi Fu, Peixiao Chu, Xiaolin Zhang. 699-703 [doi]
- A Codebook Based Background Subtraction Method for Image Defects DetectionLianjun Zhang, Yao Lu, Mukai Chen, Wencai Zou. 704-706 [doi]
- A Parallel Method for Rough Entropy Computation Using MapReduceSiyuan Jing, Jin Yang, Kun She. 707-710 [doi]
- A Preconditioned GMRES Method for Elliptic PDE-constrained Optimization ProblemsCong-Yi Zhu, Yu-Mei Huang. 711-713 [doi]
- A Study of the Design and Parameters Optimization of BP Neural Network Using Improved GEPBen-Bo Zha, Ru-Liang Wang, Huan-Long Sun, Lei Wang. 714-719 [doi]
- An Efficient Approximation Scheme for the Multiple QoS Constraints RoutingWeijun Yang, Yan Yang, Xiaodong Wang, Liang Yang. 720-723 [doi]
- An Empirical Study on Determinants of Capital Structure in Chinese Listed CompaniesQian Xu, Chuanguo Li. 724-728 [doi]
- Analysis and Modeling of Learning Behaviors on Intelligent Tutoring WebsitePeng Sun, Ziyan Wu, Yunpeng Zhang, Yang Yang. 729-731 [doi]
- Analysis of Hybrid Feature Research Based on Extraction LPCC and MFCCJianchen Zhu, Zengli Liu. 732-735 [doi]
- Choice of Regularization Parameter in Constrained Total Variational Image Restoration ModelZhibin Chen, Man Wang, You-Wei Wen, Zhining Zhu. 736-740 [doi]
- Cooperative Advertising Analysis within a Supply Chain Based on Game TheoryHong Zhang. 741-745 [doi]
- Design of Detection and Control System for Diesel InjectorWeijun Yang, Yan Yang, Yuanfeng Chen. 746-749 [doi]
- Hesitant Fuzzy Information Aggregation Operators under Confidence LevelsJianhui Yang, Chuanyang Ruan. 750-754 [doi]
- Linear Input Method of Mathematical FormulaMing Cheng, Wei Su, Yuexia Xu, Zhiyi Qu, Xuan Wang. 755-760 [doi]
- Online Group Purchase Research Based on Commodities TradingYu-Feng Zhuang, Da-Song Li. 761-764 [doi]
- Practice and Development of Cloud Computing-Based Mobile Teaching Management and Evaluation System in Vocational CollegesJing Nie. 765-769 [doi]
- Real-Time Simulation in Dynamic Electromagnetic Scenes Using PipelineThread PoolMukai Chen, Yao Lu, Guang-Hao Zhang, Wencai Zou. 770-774 [doi]
- Research and Application of a Stochastic Volatility Model with T-distribution LeveragedJianhui Yang, Jie Wu. 775-779 [doi]
- Statistical Inference of DEA Model of Environmental Efficiency Considering Undesirable OutputsYukun Jian, Lin Dai. 780-784 [doi]
- Study on Effect Evaluation of Enterprise Staff Training Based on Grey Correlation Analysis MethodDongyi He, Fang Luo. 785-788 [doi]
- Triangular Factorization of Strongly Row (Column) Full Rank Linear EquationsHongxia Liu, Tianxiang Feng. 789-793 [doi]
- Two-Phase SVPWM Modulation Method and Its Application in Stepper MotorNa Dong, Zhengfeng Ming, Tao Wen. 794-797 [doi]
- Ways to Train the Statistical Capacity of Grassroots StatisticiansTianxiang Feng. 798-802 [doi]