Abstract is missing.
- An Efficient Algorithm for Parallel Computation of Rough Entropy Using CUDASi-Yuan Jing, Caiming Liu, Gongliang Li, Gaorong Yan, Yan Zhang 0015. 1-5 [doi]
- An alpha-Dominance Expandation Based Algorithm for Many-Objective OptimizationJunhua Liu, Yuping Wang, Xingyin Wang, Xin Sui, Si Guo, Liwen Liu. 6-10 [doi]
- Using Memetic Algorithm For Matching Process ModelsXingsi Xue, Aihong Ren. 11-15 [doi]
- An Effective Solution to Nonlinear Bilevel Programming Problems Using Improved Particle Swarm Optimization AlgorithmZhonghua Li, Liping Jia, Caiming Liu. 16-19 [doi]
- Improving Hybrid Gravitational Search Algorithm for Adaptive Adjustment of ParametersYongchao Han, Ming Li, Jie Liu. 20-24 [doi]
- A Novel Multi-objective Evolutionary Algorithm Based on a Further Decomposition StrategySongbai Liu, Qiuzhen Lin, Jianyong Chen. 25-29 [doi]
- A New Optimization Model and Algorithm for a Network Scheduling Problem in Inter-Datacenters Elastic Optical NetworksHejun Xuan, Yuping Wang, Shiwei Guan, Zhanqi Xu. 30-34 [doi]
- Research on Video Server Placement and Flux Plan Based on GALong Zhao, Jingxuan Wei, Minghan Li. 35-38 [doi]
- A Multi-objective Framework for Location Recommendation Based on User PreferenceShanfeng Wang, Maoguo Gong, Can Qin, Junwei Yang. 39-43 [doi]
- A Memetic Particle Swarm Optimization Algorithm to Solve Multi-objective Optimization ProblemsXin Li, Jingxuan Wei, Yang Liu. 44-48 [doi]
- An Improvement Based Evolutionary Algorithm with Adaptive Weight Adjustment for Many-Objective OptimizationCai Dai, Xiujuan Lei. 49-53 [doi]
- BPSOBDE: A Binary Version of Hybrid Heuristic Algorithm for Multidimensional Knapsack ProblemsLi Zhang, Hong Li. 54-58 [doi]
- A 3-D Structural Components Automatic Modeling Method Based on BIMQin Zhao, Zhaoxi Ma, Xinhong Hei, Yiyun Zhu, Juntao Niu. 59-63 [doi]
- Extrapolation of Discrete Multi-projection Methods for Fredholm Integral Equations of the Second KindGuangqing Long, Lifeng Xuan, Jianjun Chen. 64-68 [doi]
- Kernelised Rényi Distance for Localization and Mapping of Autonomous VehicleGuangjing Li, Hong Bao, Bo Wang, Tao Wu. 69-72 [doi]
- Forward Vehicle Detection Based on Incremental Learning and Fast R-CNNKaijing Shi, Hong Bao, Nan Ma. 73-76 [doi]
- New Protocols on Group Consensus of Continuous-Time Multi-agent SystemsXinlei Feng, Xiaoli Yang. 77-81 [doi]
- The Effect of Feasible Region on Imbalanced Problem in Constrained Multi-objective OptimizationJiabin Lin, Hai-lin Liu, Chaoda Peng. 82-86 [doi]
- Block DGMRES Algorithm for the Drazin-Inverse Solution of Singular Nonsymmetric Linear System with Multiple Right-Hand SidesJing Meng, Yaokun Wu. 87-90 [doi]
- Sensors Validation Based on Bayesian ClassifiersPeng Sun, Ziyan Wu, Haifeng Yang, Xiaoxiao Liu, Kang Chen. 91-96 [doi]
- Local Probabilistic Matrix Factorization for Personal RecommendationWenping Ma, Yue Wu, Maoguo Gong, Can Qin, Shanfeng Wang. 97-101 [doi]
- Cell Image Classification Based on the Support Vector Machine and D-S Evidence TheoryMiao Ye, Hongbing Qiu, Yong Wang, Fan Zhang. 102-106 [doi]
- Research on Flower Image Classification Using Sum-Product NetworksXiaojie Shi. 107-110 [doi]
- Binary Histogram of Oriented Gradients Based Dynamometer Card RecognitionXiaoma Xu, Renbin Gong, Yinghao Li, Jinnuo Li, Qun Li, Zhenzhen Xu. 111-114 [doi]
- Research on Identifying Emotion Sentence Based on Fuzzy Information GranulationQiong Shen, Bin Gui, Jianlin Zhu. 115-119 [doi]
- Salient Object Detection Via Nonconvex Structured Matrix DecompositionXiaoting Zhang, Xiaoli Sun, Xiujun Zhang. 120-124 [doi]
- Image Matching Method Based on Multi-scale Corner DetectionJing Gao, Xing-fu Cai. 125-129 [doi]
- Multi-focus Image Performance Evaluation Method Based on the Extraction and Combination of Multiple MetricsWeitong Li, Yu Cheng, Yuehui Sun, Shaoqiu Xu. 130-134 [doi]
- Extracting Company-Specific Keyphrases from News MediaQiang Pan, Ping Guo, Xin Xin, Junshuai Liu. 135-139 [doi]
- Spark-Based Feature Selection Algorithm of Network Traffic ClassificationWenlong Ke, Yong Wang, Xiaochun Lei, Bizhong Wei. 140-144 [doi]
- Decycling Number of Crossed Cubes CQnXirong Xu, Soomro Pir Dino, Huifeng Zhang, Huijun Jiang, Cong Liu. 145-150 [doi]
- Research on Emotional Word Clustering Based on Affinity PropagationBin Gui, Qiong Shen. 151-154 [doi]
- A Method for Heterogeneity Analysis of Complex Diseases Based on Clustering AlgorithmXiong Li, Che Wang, Liyue Liu, Xuewen Xia. 155-158 [doi]
- On Gradient Weighting Based Fuzzy Clustering for Graph DataShihu Liu, Liping Jia, Fusheng Yu. 159-163 [doi]
- Analysis of Big-Data Based Data Mining EngineXinxin Huang, Shu Gong. 164-168 [doi]
- A New Weight Based Density Peaks Clustering Algorithm for Numerical and Categorical DataWuning Tong, Yuping Wang, Junkun Zhong, Wei Yan. 169-172 [doi]
- Credit Risk Assessment Algorithm Using Deep Neural Networks with Clustering and MergingYing Li, Xianghong Lin, Xiangwen Wang, Fanqi Shen, Zuzheng Gong. 173-176 [doi]
- A Method of Improved CNN Traffic ClassificationHuiyi Zhou, Yong Wang, Xiaochun Lei, Yuming Liu. 177-181 [doi]
- Parameter Estimation of Communication Signal in Alpha-stable Distribution Noise EnvironmentJiai He, Panpan Du, Xing Chen. 182-186 [doi]
- Passivity of Inertial Neural Networks with Delays on Time ScalesQiang Xiao, Lingyu Wang, Tingwen Huang. 187-191 [doi]
- Bayesian Spatial Nonparametric Models for Confounding Manifest Variables with an Application to China Earthquake DataYingzi Fu, DeXin Ren. 192-196 [doi]
- Evolutionary Multi-tasking Single-Objective Optimization Based on Cooperative Co-evolutionary Memetic AlgorithmQunjian Chen, Xiaoliang Ma, Zexuan Zhu, Yiwen Sun. 197-201 [doi]
- Resource Allocation for D2D Underlay Communication Systems Using PSOQiang Wang, Tiejun Chen, Hai-lin Liu. 202-206 [doi]
- An Improved Binary Chicken Swarm Optimization Algorithm for Solving 0-1 Knapsack ProblemMeng Han, Sanyang Liu. 207-210 [doi]
- An Adaptive Artifical Bee Colony Algorithms Based on Global Best GuideJiangshan Liu, Yumei Zhang, Shulin Bai. 211-215 [doi]
- An Algorithm for Global Optimization Based on CFO-BFGSRui Sun. 216-218 [doi]
- A New Filled Function Method for the Non-convex Global OptimizationBaoming Qiao, Le Gao, Fei Wei. 219-223 [doi]
- A Gravitation-Based Chaos Water Cycle Algorithm for Numerical OptimizationJiehao Guo, Xingbao Gao, Mengnan Tian. 224-228 [doi]
- A New Local Searching Strategy for Global Optimization with a Large Number of Local OptimumFei Wei, Shugang Li, Jinfeng Xue. 229-232 [doi]
- A Teaching-Learning-Based Optimization with Uniform Design for Solving Constrained Optimization ProblemsLiping Jia, Zhonghua Li. 233-237 [doi]
- Boolean Matrix Masking for SM4 Block Cipher AlgorithmSihang Pu, Zheng Guo, Junrong Liu, Dawu Gu, Yingxuan Yang, Xiaoke Tang, Jie Gan. 238-242 [doi]
- Analysis and Improvement of True Random Number Generator Based on Autonomous Boolean NetworkLihua Dong, Hui Yang, Yong Zeng. 243-247 [doi]
- Practical Partial-Nonce-Exposure Attack on ECC AlgorithmKaiyu Zhang, Sen Xu, Dawu Gu, Haihua Gu, Junrong Liu, Zheng Guo, Ruitong Liu, Liang Liu, Xiaobo Hu. 248-252 [doi]
- LSSS Matrix-Based Attribute-Based Encryption on LatticesJian Zhao, Hai-ying Gao. 253-257 [doi]
- Social Networks Privacy Preserving Data PublishingSafia Bourahla, Yacine Challal. 258-262 [doi]
- A Kind of Knowledge Metadata Management Model Research Based on Semantic GridChunyan Zhang, Yan Ma, Huili Hu, Miaomiao Ren. 263-267 [doi]
- XGBoost-Based Android Malware DetectionJiong Wang, Boquan Li, Yuwei Zeng. 268-272 [doi]
- Conformance Checking and QoS Selection Based on CPN for Web Service CompositionLiping Chen, Weitao Ha. 273-276 [doi]
- Optimization Design and Realization of Ceph Storage System Based on Software Defined NetworkDuo Wu, Yong Wang, Hao Feng, Yiming Huan. 277-281 [doi]
- Risk-Aware Leakage Resiliency for Wireless Sensor Network NodesChaoqun Yang, Xiangyu Li, Yongchang Liu, Shujuan Yin. 282-286 [doi]
- Traffic Identification of Mobile Apps Based on Variational Autoencoder NetworkDing Li, Yuefei Zhu, Wei Lin. 287-291 [doi]
- Multi-hop Based Centrality of a Path in Complex NetworkLingjie Zhou, Yong Zeng, Yi He, Zhongyuan Jiang, Jianfeng Ma. 292-296 [doi]
- A Survey of Network Reconstruction on Social NetworkLongfei Wang, Yong Zeng, Zhongyuan Jiang, Zhihong Liu, Jianfeng Ma. 297-301 [doi]
- DPETs: A Differentially Private ExtraTreesChunmei Zhang, Yang Li, Zibin Chen. 302-306 [doi]
- Using Searchable Encryption for Privacy-Aware Orchestrated Web Service CompositionImen Khabou, Mohsen Rouached, Alexandre Viejo, David Sánchez 0001. 307-311 [doi]
- A Vision-Based GPS-Spoofing Detection Method for Small UAVsYinrong Qiao, Yuxing Zhang, Xiao Du. 312-316 [doi]
- Enhancing Anonymity of Bitcoin Based on Ring Signature AlgorithmYi Liu, Ruilin Li, Xingtong Liu, Jian Wang, Chaojing Tang, Hongyan Kang. 317-321 [doi]
- Curiosity-Driven Intrinsic Motivation Cognitive Model in Perception-Action LoopJing Chen, Yanan Yu. 322-326 [doi]
- Scaled Context Region for Correlation Filter TrackingBo Zhao, Chao Ji, Lidan Li, Qianya Guo, Qian Liu, Jing Zhou. 327-330 [doi]
- Improving Managerial Efficiency Through Analyzing and Mining Resigned Staff DataLu Jia, Haolan Zhang. 331-335 [doi]
- Implementing a ARM-Based Secure Boot Scheme for the Isolated Execution EnvironmentHang Jiang, Rui Chang, Lu Ren, Weiyu Dong. 336-340 [doi]
- Cost-Sharing Contract of Supply Chain Based on Carbon Emission ControlDan Wu, Yuxiang Yang. 341-345 [doi]
- Unmanned Aerial Vehicles Rapid Delivery Routing of the Emergency Rescue in the Complex Mountain RegionZhihua Song, Han Zhang, Ying Wang, Linghui Zhang. 346-349 [doi]
- Optimal Control Model of Pension Funds Under Continuous TimeHaiyan Zhang, Yajuan Yang. 350-354 [doi]
- Model Analysis for Estimating Optimal Hedging Ratio of Stock Index FuturesYa-juan Yang, Hong Zhang. 355-358 [doi]
- Periodic Multi-installment Load Partition, Distribution and Result CollectionXiaoli Wang, Haiming Ma, Junfan Lai. 359-362 [doi]
- A Widely Linear Affine LMS Adaptive Algorithm with Momentum Acceleration for DS-CDMA MAI SuppressionYuanjian Zhou, Xiaohui Yang. 363-366 [doi]
- Dynamics of a Saturation Incidence SIRS Epidemic Model with Pulses at Different MomentsWentao Huang, Guoqiang Deng, Aimin Tang, Lijie Hao, Guirong Jiang, Wentao Huang. 367-370 [doi]
- Adaptive Fireworks Algorithm Based on Simulated AnnealingWenwen Ye, Jiechang Wen. 371-375 [doi]
- Toward Automatic Review of Bridge Template Turnover Based on Building Information ModelingQin Zhao, Qing Tian, Xinhong Hei, Yuchao Li, Zhaoxi Ma. 376-380 [doi]
- A New Algorithm for Computing All Solutions of an Absolute Value EquationJing Li, Jie Liu, Meili Wang, Fei Wei. 381-384 [doi]
- The Asymptotic Growth Behavior of Entire Solutions to Higher Dimensional Polynomial Cauchy-Riemann EquationsZhongwei Si. 385-389 [doi]
- A Predictive Control Algorithm Based on Driving Behavior Data ModelXiangmin Han, Hong Bao, Zuxing Xuan, Feng Pan. 390-394 [doi]
- Possible Transitions Between Types of Pseudoknots of RNA StructureQingxia Kong, Yaoyao Fu, Zhendong Liu. 395-399 [doi]
- The Method of Integrated Pipeline Intelligent Conversion of BIM Design Model into Fine BIM Construction ModelShaoxiong Ma, Qin Zhao, Xinhong Hei, Cunli Chen. 400-404 [doi]
- An Algorithm of Curved Path Tracking with Prediction Model for Autonomous VehicleJun Yang, Hong Bao, Nan Ma, Zuxing Xuan. 405-408 [doi]
- Motion Segmentation Using Collaborative Low-Rank and Sparse Subspace ClusteringYao Zhang, Min Li. 409-414 [doi]
- Regression Model of Autonomous Lateral Rectification with Driver PerceptionLiang Qiao, Hong Bao, Zuxing Xuan, Qing Yang. 415-418 [doi]
- Segmental Offset-Mapping Parallel Coordinates for Multidimensional Integer DatasetHui Li, Qin He, Hong Bao, Nan Ma, Guilin Pang. 419-422 [doi]
- Research on the Pricing Strategy of Manufacturer's Dual Channel under the Closed-Loop Supply ChainXiaohao Liang, Zuqing Huang. 423-426 [doi]
- Pedestrian Detection Method Based on Faster R-CNNHui Zhang, Yu Du, Shurong Ning, Yonghua Zhang, Shuo Yang, Chen Du. 427-430 [doi]
- Agent-Based Simulation of Evacuation Considering Extreme Weather in Tourist AreasLei Li, Lindi Xiao, Meng Zhang, Jingyi Kong, Hui Sun. 431-434 [doi]
- Dynamics of a Stochastic SIS Epidemic Model with Birth Pulses and Pulse TreatmentsGuoqiang Deng, Aimin Tang, Miaomiao Xing, Lin Ling, Guirong Jiang, Wentao Huang. 435-438 [doi]
- A New Difference Scheme for Hyperbolic Partial Differential EquationsGaochang Zhao, Kewei Jie, Jie Liu. 439-441 [doi]
- Research on Information Propagation Method Based on Individual User CharacteristicsLejun Zhang, Weijie Zhao, Chunhui Zhao. 442-446 [doi]
- A KNN Match Based Tracking-Learning-Detection Method with Adjustment of Surveyed AreasYumin Tian, Lin Deng, Qiang Li. 447-451 [doi]
- A Review of Sentiment Semantic Analysis Technology and ProgressYiming Wang, Yuan Rao, Lianwei Wu. 452-455 [doi]
- View-Normalized Gait Recognition Based on Gait Frame Difference Entropy ImageZhanli Li, Pengrui Yuan, Fang Yang, Hong-an Li. 456-459 [doi]
- A Weighted Error Compensation Algorithm for Image Denoising Based on Noise Variance EstimationBin Zhou, Xuemei Duan, Jun Feng. 460-464 [doi]
- Unsupervised Off-Topic Essay Detection Based on Target and Reference PromptsXia Li, Qifan Wen, Kongxin Pan. 465-468 [doi]
- The Algorithm and Scheme of Prediction in RNA Folding Structure with PseudoknotsZhendong Liu, Qingxia Kong, Yaoyao Fu, Hongchao Ye, Shimin Zhao, Xinhong Su, Kai Jiang, Hui Wang, Kunle Dong, Zhenxiong Song, Yujie Wang. 469-474 [doi]
- Waveform Compensation of ECG Data Using Segment Fitting Functions for Individual IdentificationChenguang He, Wei Li, David Chik. 475-479 [doi]
- Performance Analysis of Classification Algorithms for Activity Recognition Using Micro-Doppler FeatureYier Lin, Julien Le Kernec. 480-483 [doi]
- A Comprehensive Study of Blind and Non-blind Deconvolution Methods Applied to Spectrum ExtractionHang Yu, Zhen Wang, Qian Yin, Ping Guo. 484-487 [doi]
- Modified Binary Cuckoo Search for Feature Selection: A Hybrid Filter-Wrapper ApproachYun Jiang, Xi Liu, Guolei Yan, Jize Xiao. 488-491 [doi]
- A Research on the Improvement of Dual Optimization on BP Neural NetworkRuliang Wang, Yang Xuan. 492-495 [doi]
- A Convolutional Neural Network with Dynamic Correlation PoolingJunfeng Chen, Zhoudong Hua, Jingyu Wang, Shi Cheng. 496-499 [doi]
- Student Behavior Clustering Method Based on Campus Big DataDong Ding, Junhuai Li, Huaijun Wang, Zhu Liang. 500-503 [doi]
- Modified Particle Swarm Optimization Algorithm for Engineering Structural Optimization ProblemYanzhi Ren, Sanyang Liu. 504-507 [doi]
- Solution Strategy for Bilevel Linear Programming in Fuzzy Random CircumstancesAihong Ren, Xingsi Xue. 508-511 [doi]
- A New Filled Function Method with Unconstrained Global OptimizationXiaolin Yang, Bin Zhou, Jun Feng. 512-515 [doi]
- Gravitational Search Algorithm with a New TechniqueJuan Li, Ning Dong. 516-519 [doi]
- A Mixed Conjugate Gradient Method for Unconstrained Optimization ProblemBaoming Qiao, Liping Yang, Jie Liu, Yanru Yao. 520-523 [doi]
- Efficient and Constant Time Modular Inversions Over Prime FieldsSen Xu, Haihua Gu, Lingyun Wang, Zheng Guo, Junrong Liu, Xiangjun Lu, Dawu Gu. 524-528 [doi]
- Side Channel Attack on SM4 Algorithm with Ensemble MethodMengmeng Xu, Liji Wu, Xiangmin Zhang. 529-532 [doi]
- Ciphertext Number Full Operations Based on Paillier AlgorithmGaofeng Yang, Yihong Long. 533-536 [doi]
- Document Sensitivity Classification for Data Leakage Prevention with Twitter-Based Document Embedding and Query ExpansionLap Q. Trieu, Trung-Nguyen Tran, Mai-Khiem Tran, Minh-Triet Tran. 537-542 [doi]
- Improving the Cooperation of Fuzzing and Symbolic Execution by Test-cases PrioritizingJiaxi Ye, Bin Zhang, Ziqing Ye, Chao Feng, Chaojing Tang. 543-547 [doi]
- S2F: Discover Hard-to-Reach Vulnerabilities by Semi-Symbolic Fuzz TestingBin Zhang, Jiaxi Ye, Chao Feng, Chaojing Tang. 548-552 [doi]
- G-FQZip: Lossless Reference-Based Compression of FASTQ Files Using GPUsCong Peng, Qingjin Deng, Zhi-an Huang, Yiwen Sun, Zexuan Zhu. 553-556 [doi]
- CombinedPWD: A New Password Authentication Mechanism Using Separators Between KeystrokesWantong Zheng, Chunfu Jia. 557-560 [doi]
- Secure System Logon Based on IBC and Mobile TerminalYing Liu, Yihong Long, Xu Zhou, Fengli Li. 561-565 [doi]
- An Implementation of Trojan Side-Channel with a Masking SchemeWenlin Meng, Wenfeng Zhu, Chi Zhang, Junrong Liu, Zheng Guo, Dawu Gu, Wei Fan, Haifeng Zhang, Yidong Yuan. 566-569 [doi]
- Reliability Prediction for Web Service CompositionWeitao Ha. 570-573 [doi]
- Centrality Based Privacy Preserving for Weighted Social NetworksMengli Liu, Yong Zeng, Zhongyuan Jiang, Zhihong Liu, Jianfeng Ma. 574-577 [doi]
- A Secure Web Email System Based on IBCBo Huo, Yihong Long, Jinglin Wu. 578-581 [doi]
- An Approach to Verifying Data Integrity for Cloud StorageYindong Chen, LiPing Li, Ziran Chen. 582-585 [doi]
- Challenges for the Comprehensive and Integrated Information Security ManagementJuhani Anttila, Kari Jussila. 586-589 [doi]
- A Frequency-Based Leakage Assessment Methodology for Side-Channel EvaluationsWan Lei, Lihui Wang, Weijun Shan, Kun Jiang, Qing Li. 590-593 [doi]
- DeepSense-Inception: Gait Identification from Inertial Sensors with Inception-like Architecture and Recurrent NetworkHa V. Hoang, Minh-Triet Tran. 594-598 [doi]
- Prediction of Stock Market by Principal Component AnalysisMuhammad Waqar, Hassan Dawood, Ping Guo, Muhammad Bilal Shahnawaz, Mustansar Ali Ghazanfar. 599-602 [doi]
- Evaluation of Fiber Tracking Results from UKF Tractography MethodsNa Wang, Wenyao Zhang, Wen Zhao. 603-606 [doi]
- Predicting the Change on Stock Market Index Using Emotions of Market Participants with Regularization MethodsYu Li, Rui Ma, Honghao Zhao, Shi Qiu, Ziyang Hu. 607-610 [doi]
- Construction of 'One-Two-Six-Two' Practical Teaching System of Human Resource Management SpecialtyDongyi He, Xing Wang. 611-614 [doi]
- Optimal Allocation of Water Resources Based on Central Force OptimizationJie Liu, Fei Liang. 615-618 [doi]
- Research on Field Patterns in Circular-Shaped Microshield LinesHai Sun. 619-621 [doi]