Abstract is missing.
- A Recognition Algorithm for Similar Characters on License Plates Based on Improved CNNShanshan Li, Yimin Li. 1-4 [doi]
- Algorithm for Distance Constrained Aerial Vehicle Routing Problem: Based on Minimum Spanning Tree and Genetic ComputationZhihua Song, Han Zhang, Wanfang Che, Xiaobin Hui. 5-9 [doi]
- An Improvement and Application of Genetic BP Neural NetworkJuan Yang, Li Huang. 10-13 [doi]
- Cost-Efficient Divisible Load Scheduling Using Genetic AlgorithmHejun Xuan, Yuping Wang, Shanshan Hao, Xiaoli Wang. 14-17 [doi]
- Evaluation Model of Web Service Health Level on End-to-End Network Based on Artificial ImmuneLiping Chen, Weitao Ha, Guojun Zhang. 18-21 [doi]
- Intelligence Computing Technology for UAV's AutonomyPengcheng Wen, Yadi Zhang, YaHui Li, Xiaoan Li. 22-25 [doi]
- Interbank Offered Rate Forecasting Using PSO-LS-SVMXin Lin, Yizhou Tang. 26-29 [doi]
- Memory Based Differential Evolution Algorithms for Dynamic Constrained Optimization ProblemsChenggang Cui, Feng Tian, Ning Yang, Junfeng Chen. 30-33 [doi]
- Predicting Algorithm of RNA Folding Structure with PseudoknotsZhendong Liu, Daming Zhu, Qionghai Dai. 34-37 [doi]
- Solving Linear Bilevel Programming Problems Using a Binary Differential EvolutionHong Li, Li Zhang. 38-42 [doi]
- Study on Emergency Relief VRP Based on Clustering and PSOYong He, Jiechang Wen, Meihua Huang. 43-47 [doi]
- Teaching-Learning Based Optimization Algorithm Based on Course by Course ImprovementDapeng Qu, Shuwen Liu, Di Zhang, Jun Wang, Chengxi Gao. 48-52 [doi]
- Waste Electrical Recycling Network Optimum Design under the Carbon Cap ConstraintYushi Guo, Zuqing Huang, Yuxiang Yang. 53-57 [doi]
- A Hybrid Image Feature Descriptor for ClassificationHassan Dawood, Hussain Dawood, Ping Guo. 58-61 [doi]
- A Novel SVM-Based Reduced NN Classification MethodChi-Chun Huang, Hsin-Yun Chang. 62-65 [doi]
- Fault Diagnosis Based on Prior Knowledge for Train Air-Conditioning UnitYu Liu, Xinhong Hei 0001, Jinwei Zhao, Yikun Zhang, Guo Xie. 66-69 [doi]
- Improved Electromagnetism-Like Algorithm for Nonlinear Bilevel Programming ProblemAihong Ren, Xingsi Xue. 70-73 [doi]
- Model of Environmental Reason Analysis and Prevention of Stroke on Linear RegressionTianxiang Feng, Qiujie Zhang. 74-77 [doi]
- Network Traffic Classification with Improved Random ForestChao Wang, Tongge Xu, Xi Qin. 78-81 [doi]
- On Locating All Local Minima of Multidimensional Function for Box ConstrainedJie Liu. 82-85 [doi]
- Recycling BiCG for Families of Shifted Linear SystemsJing Meng, Hou-Biao Li. 86-90 [doi]
- Research on Mobile Learning Platform Construction in Higher Vocational Colleges Based on Cloud ComputingJing Nie. 91-94 [doi]
- Robust Stability of Uncertain Nonlinear Delay Segmentation System Based on DelayShan Sun, Ruliang Wang. 95-99 [doi]
- Study on the Convergence of Solving Linear Equations by Gauss-Seidel and Jacobi MethodHongxia Liu, Tianxiang Feng. 100-103 [doi]
- A 2-Approximation Algorithm for the Single Machine Due Date Assignment Scheduling Problem in Fuzzy Environment to Minimize the Total CostsJinquan Li, Jinhua Zhang. 104-108 [doi]
- A Quantity-Flexibility Contract in Two-Stage Decision with Supply Chain CoordinationXin Li. 109-112 [doi]
- A Robust Quasi-Dense Wide Baseline Matching MethodWei Wang, Hai Zhu, Xiaoli Wang. 113-116 [doi]
- An Effective Energy-Based Multi-view Piecewise Planar Stereo MethodHai Zhu, Wei Wang, Xiali Wang, Fei Wei. 117-120 [doi]
- An Efficient Address Mapping Algorithm for Multichannel Structure SSDXiaole Cai, YaHui Li, Yadi Zhang, Peng Li. 121-124 [doi]
- Design and Implementation of Embedded Remote Control System in High-Precision Time Data AcquisitionZhao Fang, Jianjun Zhao, Haifeng Tang, Guangmin Wu. 125-128 [doi]
- Dynamic Quaternary Circuit with Neuron-MOS TransistorGuoqiang Hang, Yang Yang, XuanChang Zhou, Xiaohui Hu, Danyan Zhang. 129-133 [doi]
- Parallel Large Average Submatrices Biclustering Based on MapReduceQin Lin, Yun Xue, Wensheng Chen, Shuqun Ye, Wanli Li, Jingjing Liu. 134-137 [doi]
- Reconfigurable Computing Availability and Developing TrendsYulin Hai, Xiaodong Zhao, Yongqiang Liu. 138-141 [doi]
- 3D Video Coding Using Just Noticeable Depth Difference Based on H.265/HEVCYuejin Bai, Yang Zhang, Zhaohui Li. 142-145 [doi]
- A Hybrid Approach for Reducing Textual Formal Context Based on ThesaurusWei He, Shuang Li, Xiaoping Yang. 146-149 [doi]
- A Real-Time Sensor Guided Runway Detection Method for Forward-Looking Aerial ImagesJingzhe Wang, Yue Cheng, Jianchun Xie, Wensheng Niu. 150-153 [doi]
- A Retinex Algorithm for Image Enhancement Based on Recursive Bilateral FilteringDi Li, Yadi Zhang, Pengcheng Wen, Linting Bai. 154-157 [doi]
- A Wavelet Image Denoising Based on the New Threshold FunctionGuanghui Deng, Zengli Liu. 158-161 [doi]
- An Improved Image Denoising Method Applied in Resisting Mixed Noise Based on MCA and Median FilterXiangyu Deng, Zengli Liu. 162-166 [doi]
- Application of Image Classification Technology in Mangrove Information ExtractionShulei Wu, Liya Dong, Huandong Chen, Jinmei Zhan. 167-170 [doi]
- Image Denoising Based on the Bivariate Model of Dual Tree Complex Wavelet TransformFuqiang Zhang, Zengli Liu. 171-174 [doi]
- Image Reconstruction Algorithm for Modified SART Based on PM ModelJie Liang, Wenzhang He, Dongjiang Ji, Lina Wang. 175-178 [doi]
- Image Retargeting Based on a New Salient Region Detection MethodJing Li, Weiwei Wang, Xiaoping Li. 179-182 [doi]
- Monitoring the Deformation of the Facade of a Building Based on Terrestrial Laser Point-CloudXu Zhao, Fei Deng, Hua Liang, Long Zhou. 183-186 [doi]
- Multi-direction Edge Detection OperatorPengfei Xu, Qiguang Miao, Tiange Liu, XiaoJiang Chen. 187-190 [doi]
- Nonlinear Nonnegative Matrix Factorization Based on Discriminant Analysis with Application to Face RecognitionWensheng Chen, Yang Zhao, Binbin Pan, Chen Xu. 191-194 [doi]
- PCANet for Blind Image Quality AssessmentHuizhen Jia, Quansen Sun, Tonghan Wang. 195-198 [doi]
- Some Properties of (F-K)-Convex Mapping in Vector SpacesYuhui Liu. 199-202 [doi]
- Study of Edge Detection Based on SQI Algorithm and MorphologyGuanghui Deng, Zengli Liu. 203-205 [doi]
- A Feature Subset Selection Algorithm Based on Feature Activity and Improved GAJuan Li. 206-210 [doi]
- A Method of Circle Curve Fitting Based on the Cumulative Error of the Radius ErrorChunlong Fan, Chang Liu, Guohui Ding, Li Xu. 211-214 [doi]
- Analysis of Sunspot Time Series (1749-2014) by Means of 0-1 Test for Chaos DetectionQingtai Xiao, Shibo Wang, Zhan Zhang, Jianxin Xu. 215-218 [doi]
- Content-Based Image Retrieval for Medical ImageKaimei Zheng. 219-222 [doi]
- Identifying Influential Actors in Social Network PlatformsQin Liu, Zhongwei Ma, Xiaowen Yang, Hongming Zhu. 223-226 [doi]
- Nonconvex Low-Rank Sparse Factorization for Image SegmentationXiaoping Li, Weiwei Wang, Amir Razi, Tao Li. 227-230 [doi]
- Optimizing Ontology Alignment by Using Compact Genetic AlgorithmXingsi Xue, Jianhua Liu, Pei-wei Tsai, Xianyin Zhan, Aihong Ren. 231-234 [doi]
- Research Methods of Sensors Validation Based on Naive Bayesian ClassifierPeng Sun, Ziyan Wu, Haifeng Yang, Zhengfeng Ming, Xin Guo. 235-238 [doi]
- Robust Object Tracking Enhanced by Correction DictionaryYanan Zhang, Yao Lu. 239-242 [doi]
- Saliency Detection via Nonconvex Regularization Based Matrix DecompositionZhixiang He, Xiaoli Sun, Xiujun Zhang, Chen Xu. 243-247 [doi]
- 4G Heterogeneous Networks Base Station Planning Using Evolutionary Multi-objective AlgorithmXueyi Liang, Hai-lin Liu, Qiang Wang. 248-252 [doi]
- A Differential Evolution Algorithm Based on Local Search and Boundary Reflection for Global OptimizationHongwei Lin. 253-257 [doi]
- A Fuzzy Multi-objective Portfolio Selection Model with Transaction Cost and LiquidityWei Yue, Yuping Wang. 258-261 [doi]
- A Hybrid Algorithm for Global OptimizationFei Qin, Jie Liu. 262-265 [doi]
- A Novel Differential Evolution Algorithm with K-Means and Simplex Search Method for Absolute Value EquationsJing Li, Baoming Qiao. 266-269 [doi]
- A Novel Evolutionary Algorithm Based on Decomposition and Adaptive Weight Adjustment for Synthesis Gas ProductionCai Dai, Xiujuan Lei. 270-273 [doi]
- Adaptive Differential Evolution Algorithm Based on Gradient and Polar Coordinates Search StrategiesJun Yang, Jingxuan Wei, Jiang Liu. 274-277 [doi]
- Construction of Pooling Designs with Affine Symplectic SpaceHaixia Guo. 278-281 [doi]
- Cooperative Co-evolution with Formula Based Grouping and CMA for Large Scale OptimizationHaiyan Liu, Shiwei Guan, Fangjie Liu, Yuping Wang. 282-285 [doi]
- Evolutionary Many-Objective Optimization Algorithm Based on Improved K-Dominance and M2M Population DecompositionShuiqin Dai, Hai-lin Liu, Lei Chen. 286-290 [doi]
- MOEA/D with Adaptive Weight Vector DesignXiaofang Guo, Xiaoli Wang, Zhen Wei. 291-294 [doi]
- Target-Vector Based Particle Swarm Optimization for Multi-objective Bilevel Programming ProblemLiping Jia, Guocheng Zou, Zhonghua Li. 295-298 [doi]
- A Novel Detection Algorithm for Ring Oscillator Network Based Hardware Trojan Detection with Tactful FPGA ImplementationKaige Qu, Liji Wu, Xiangmin Zhang. 299-302 [doi]
- A Novel Multi-classification Intrusion Detection Model Based on Relevance Vector MachineJianguo Jiang, Xiang Jing, Bin Lv, Meimei Li. 303-307 [doi]
- A Two-Stage Process Based on Data Mining and Optimization to Identify False Positives and False Negatives Generated by Intrusion Detection SystemsFatma Hachmi, Mohamed Limam. 308-311 [doi]
- Protocol Reverse Engineering Using LDA and Association AnalysisHaifeng Li, Bo Shuai, Jian Wang, Chaojing Tang. 312-316 [doi]
- Software Vulnerability Detection Based on Code Coverage and Test CostBo Shuai, Haifeng Li, Lei Zhang, Quan Zhang, Chaojing Tang. 317-321 [doi]
- A New SPA Attack on ECC with Regular Point MultiplicationLihui Wang, Qing Li, Gang Zhang, Jun Yu, Zhimin Zhang, Limin Guo, David Wei Zhang. 322-325 [doi]
- An Efficient Identity-Based Signature Scheme for Vehicular CommunicationsYaling Zhang, Liang Yang, Shangping Wang. 326-330 [doi]
- Combined Attack on Blinded Fault Resistant Exponentiation Algorithm and Efficient CountermeasureLiangjian Su, Wei Guo, Zheng Guo. 331-334 [doi]
- Design of Parallel Algorithms for Super Long Integer Operation Based on Multi-core CPUsShifeng Zhang, Shenghui Su. 335-339 [doi]
- Further Attacks and Improvement of a Certificateless Signature SchemeBo Yang, Zhao Yang, Nengfei Liu, Shougui Li. 340-344 [doi]
- The Design of a Key Expansion Algorithm Based on Dynamic Dislocation CountsZhouquan Du, Qijian Xu, Jie Zhang, Xudong Zhong. 345-349 [doi]
- A Chosen - Plaintext Differential Power Analysis Attack on HMAC - SM3Limin Guo, Lihui Wang, Dan Liu, Weijun Shan, Zhimin Zhang, Qing Li, Jun Yu. 350-353 [doi]
- Differential Power Analysis on Dynamic Password Token Based on SM3 Algorithm, and CountermeasuresLimin Guo, Lihui Wang, Qing Li, Jun Yu, Peng Luo. 354-357 [doi]
- Dynamic Tracking Reinforcement Based on Simplified Control FlowJiani Li, Donghai Tian, Changzhen Hu. 358-362 [doi]
- Perceptual Audio Hashing Using RT and DCT in Wavelet DomainJinfeng Li, Tao Wu. 363-366 [doi]
- Towards a Built-In Digital Forensics-Aware Framework for Web ServicesAymen Akremi, Hassen Sallay, Mohsen Rouached, Mohamed-Fouad Sriti, Mohamed Abid, Rafik Bouaziz. 367-370 [doi]
- A Circuit Design of SMS4 against Chosen Plaintext AttackJiachao Chen, Qin Wang, Zheng Guo, Junrong Liu, Haihua Gu. 371-374 [doi]
- A Generalized Stability Theorem for Continuous Chaos Systems and Design of Pseudorandom Number GeneratorXue Wang, Lequan Min, Mei Zhang. 375-380 [doi]
- A Template Attack-Resistant Masking Scheme for RC4 Based on FPGAShaohui Zhang, Liji Wu, Xiangmin Zhang, Xingjun Wu, Xiangyu Li, Huajun Fang. 381-384 [doi]
- Concolic Execute Fuzzing Based on Control-Flow AnalysisJingxi Li, Xin Xu, Lejian Liao, Lu Li. 385-389 [doi]
- Dynamic Defense Architecture for the Security of the Internet of ThingsCaiming Liu, Yan Zhang, Zhonghua Li, Jiandong zhang, Hongying Qin, Jinquan Zeng. 390-393 [doi]
- Improving Second-Order DPA Attacks with New Modeled Power LeakagesMiao Yuan, Guoqiang Bai. 394-397 [doi]
- Software Hardware Co-design for Side-Channel Analysis Platform on Security ChipsQian Lei, Liji Wu, Shaohui Zhang, Xiangmin Zhang, Xiangyu Li, Liyang Pan, Zhimeng Dong. 398-401 [doi]
- A Combination of Timing Attack and Statistical Method to Reduce Computational Complexities of SSL/TLS Side-Channel AttacksJing Wang, Ying Yang, Lijuan Chen, Guang Yang, Zhenya Chen, Liqiang Wen. 402-406 [doi]
- An Online Flow-Level Packet Classification Method on Multi-core Network ProcessorWei Li, Xiufen Yu. 407-411 [doi]
- DDoS Attack Detection Using Flow Entropy and Clustering TechniqueXi Qin, Tongge Xu, Chao Wang. 412-415 [doi]
- Exact Physical Layer Security in SIMO Wiretap Channels with Antenna CorrelationJingbo Jiao, Gangcan Sun, Zhuo Han, Zhongyong Wang. 416-419 [doi]
- A New Minimum Exposure Path Problem and Its Solving AlgorithmMiao Ye, Meiling Zhao, Xiaohui Cheng. 420-423 [doi]
- A Software Assessment Method Based on Relevance VulnerabilityXudong Miao, Yongchun Wang, Xingchen Cao, Binbin Qu, Sheng Jiang, Feng Fang. 424-427 [doi]
- An Efficient Trusted Chain Model for Real-Time Embedded SystemsYaHui Li, Yadi Zhang, Peng Li, Peng Guo. 428-432 [doi]
- An Enhanced Reconfiguration Method for the Second Generation Integrated Modular AvionicsLe Wang, Yunmin Sun, Peng Guo, Yadi Zhang. 433-436 [doi]
- Immunity-Based Detection for Large-Scale Behavior of Denial of ServiceYan Zhang, Caiming Liu, Zhonghua Li, Hongying Qin, Qin Li, Jinquan Zeng. 437-440 [doi]
- Strategies for Analysis against Redundant Reused Codes in Safety-Critical SoftwareXiao Liang. 441-445 [doi]
- A Research on the Localization Technology of Wireless Sensor Networks Employing TI's CC2530 InstrumentYingjiu Guo, Xuemei Liu. 446-449 [doi]
- Application of an Improved Method of Wavelet Transform in Image Edge DetectionShulei Wu, Zongan Zhang, Huandong Chen, Jinmei Zhan. 450-453 [doi]
- Data-Based Health State Analysis for the Axle of High Speed TrainGuo Xie, Minying Ye, Xinhong Hei 0001, Jinwei Zhao, Fucai Qian. 454-457 [doi]
- Experimental Analysis on CTT-SP Algorithm for Intermediate Data Storage in Scientific Workflow SystemsLei Fan, Sha Meng, Yanfang Liang, Xiyang Liu. 458-461 [doi]
- Method of Multi-resolution and Effective Singular Value Decomposition in Under-determined Blind Source Separation and Its Application to the Fault Diagnosis of Roller BearingBaitong Zhou, Zengli Liu. 462-465 [doi]
- Research on Rural Population Flow of China's County UrbanizationWenxue Niu, Congmou Yuan, Dansong Zhang. 466-469 [doi]
- Research on Semantic Representation to Promote the Correlation of Instructional Micro VideoMi Wang, Dong Kang. 470-473 [doi]
- Research on Storage and Retrieval Method of Mass Data for High-Speed TrainBin Wang, Fan Li, Xinhong Hei 0001, Weigang Ma, Lei Yu. 474-477 [doi]
- Research on the Influence Factors of Entrepreneurial EnvironmentQian Xu, Yajuan Yang, Quanju Zhang. 478-481 [doi]
- Toward Automatic Calculation of Construction Quantity Based on Building Information ModelingQin Zhao, Yuchao Li, Xinhong Hei, Xiaofan Wang. 482-485 [doi]