Abstract is missing.
- Computationally Efficient Low Power Neuron Model for Digital BrainAsif Mehmood, Muhammad Javed Iqbal, Hassan Dawood, Ping Guo. 1-5 [doi]
- The Computation of the Barrier Tree for BHG of RNA Folding StructureQingxia Kong, Zhendong Liu, Xiaobing Tang, Zhaohui Yang, Yaoyao Fu, Hengfei Li. 6-9 [doi]
- Speech Recognition Method Based on Normalized Simplified Artificial Fish Swarm AlgorithmXiaofeng Li, Baoming Qiao, Jie Liu. 10-14 [doi]
- An Improvement Evolutionary Algorithm Based on Grid-Based Pareto Dominance for Many-Objective OptimizationCai Dai, Yanjun Ji, Juan Li. 15-19 [doi]
- Two-Archive Based Evolutionary Algorithm Using Adaptive Reference Direction and Decomposition for Many-Objective OptimizationXingyin Wang, Yuping Wang, Junhua Liu, Si Guo, Liwen Liu. 20-24 [doi]
- GIMI: A New Evaluation Index for 3D Multimodal Medical Image FusionNa Wang, Wenyao Zhang, Dawei Li. 25-29 [doi]
- An Evolutionary Multi- and Many-Objective Optimization Algorithm Based on ISDE + and Region DecompositionZixian Lin, Hailin Liu, Fangqing Gu. 30-34 [doi]
- An Encoding Algorithm Based on the Shortest Path ProblemFanghan Liu, Xiaobing Tang, Zhaohui Yang. 35-39 [doi]
- A Genetic Algorithm for Solving Linear Integer Bilevel Programming ProblemsYuhui Liu, Hecheng Li, Huafei Chen. 40-44 [doi]
- A Smoothing Penalty Function Algorithm for Two-Cardinality Sparse Constrained Optimization ProblemsMin Jiang, Zhiqing Meng, Gengui Zhou, Rui Shen. 45-49 [doi]
- A New Solving Method for Fuzzy Bilevel Optimization with Triangular Fuzzy CoefficientsAihong Ren, Xingsi Xue. 50-53 [doi]
- The Comparing Analysis of Drosophila Optimization and Gravitational Search AlgorithmXiaohua Li. 54-56 [doi]
- Gene Selection for Single-Cell RNA-Seq Data Based on Information Gain and Genetic AlgorithmJie Zhang, Junhong Feng. 57-61 [doi]
- Multi-Installment Scheduling for Networked Computing Systems with Server Release and Offline TimesXiaobo Song, Ning Du, Xiaoli Wang. 62-65 [doi]
- An Inter-Domain Transmission Path Selection Approach of Multi-Controller SDN Network Based on FPGAYunhui Deng, Yong Wang, Xiongsen He, Hao Feng. 66-70 [doi]
- Analysis on Convergence of Stochastic Processes in Cloud Computing ModelsJunhong Nie, Hanlin Tang, Jingxuan Wei. 71-76 [doi]
- Weighted Dual Hesitant Fuzzy Sets and Its Application in Group Decision MakingWenyi Zeng, Yue Xi, Qian Yin, Ping Guo. 77-82 [doi]
- A Method of Detect Traffic Police in Complex ScenesYing Zheng, Hong Bao, Xin-Kai Xu, Nan Ma, Jialei Zhao, Dawei Luo. 83-87 [doi]
- Force Calculation for Hybrid Magnetic Levitation SystemHaokuan Qin, Zhengfeng Ming, Tao Wen, Yuhu Zhao. 88-92 [doi]
- An Optical Fiber Warning System Based on Vibration SensingJie Guo, Yibin Chen. 93-95 [doi]
- A Comparative Study of Various Edge Detection MethodsRehan Mehmood Yousaf, Hafiz Adnan Habib, Hussain Dawood, Sidra Shafiq. 96-99 [doi]
- Hyperspectral Image Denoising Based on Low Rank and Expected Patch Log LikelihoodXiaoqiao Zhang, Xiuling Zhou, Ping Guo. 100-105 [doi]
- Occlusion Face Detection Technology Based on Facial PhysiologyZhuohao Guo, Weixing Zhou, Luwei Xiao, Xiaohui Hu, Zehao Zhang, Zhou Hong. 106-109 [doi]
- Siamese Networks with Discriminant Correlation Filters and Channel AttentionSi Chen, Dehui Qiu, Qirun Huo. 110-114 [doi]
- Research of X Ray Image Recognition Based on Neural NetworkMiaomiao Chen, Fengshan Bai. 115-119 [doi]
- Class-Cone Based Nonnegative Matrix Factorization for Face RecognitionYang Li, Wensheng Chen, Binbin Pan, Bo Chen. 120-124 [doi]
- Joint Collaborative Representation and Discriminative Projection for Pattern ClassificationJunyu Li, Haoliang Yuan, Loi Lei Lai, Yiu-ming Cheung. 125-129 [doi]
- Real-Time Network Traffic Classification Based on CDH Pattern MatchingXunzhang Li, Yong Wang, Wenlong Ke, Hao Feng. 130-134 [doi]
- Multi-Feature Fusion Method Applied in Texture Image SegmentationHui Du, Zhihe Wang, Dan Wang, Xiaoli Wang. 135-139 [doi]
- Acceleration of Feature Subset Selection Using CUDAJun Yang, Siyuan Jing. 140-144 [doi]
- A Clustering Algorithm Based on FDP and DBSCANZhihe Wang, Mengying Huang, Hui Du, Hongwu Qin. 145-149 [doi]
- A Novel Subgraph Querying Method on Directed Weighted GraphsWei Wang, Yanni Yao, Lei Zhu, Xinhong Hei 0001, Yichuan Wang. 150-154 [doi]
- Ensemble Clustering with Novel Weighting StrategyYao Sun, Hong Jia, Jiwu Huang. 155-159 [doi]
- Off-Topic Text Detection Based on Neural Networks Combined with Text FeaturesZhanyuan Yang, Hanfeng Liu, Minping Chen, Xia Li. 160-163 [doi]
- Object Detection Based on Multi-Channel Deep CNNBo Zhao, Lin Zhu, Zhiyang Ma, Juyan Ni, Qing Lin, Qian Liu. 164-168 [doi]
- Image of Plant Disease Segmentation Model Based on Pulse Coupled Neural Network with Shuffle Frog Leap AlgorithmXiaoyan Guo, Ming Zhang, Yongqiang Dai. 169-173 [doi]
- Network Traffic Classification Method Based on Improved Capsule Neural NetworkFan Zhang, Yong Wang, Miao Ye. 174-178 [doi]
- A SVM and Co-seMLP Integrated Method for Document-Based Question AnsweringXiaoan Liu, Tao Peng. 179-182 [doi]
- Optimization of Supply Chain Network Based on Uncertainty DemandXing Wang, Minghua Jiang, Quanju Zhang. 183-186 [doi]
- Improved Sine Cosine Algorithm with Reverse-Learning and Adaptive Tent Chaos SearchJie Liu. 187-190 [doi]
- An Evolutionary Tabu Search Algorithm for Matching Biomedical OntologiesXingsi Xue, Aihong Ren, Dongxu Chen. 191-195 [doi]
- Algorithm and Scheme in RNA Structure Prediction Including PseudoknotsZhendong Liu, Fanghan Liu, Qingxia Kong, Fanchang Hao, Hongluan Zhao. 196-200 [doi]
- A Multi-Objective Evolutionary Algorithm Based on Principal Component Analysis and Grid DivisionMei Ma, Hecheng Li, Jing Huang. 201-204 [doi]
- Study on Secret Sharing for SM2 Digital Signature and Its ApplicationFan Ding, Yihong Long 0002, Peili Wu. 205-209 [doi]
- Girth Analysis of Tanner (5, 11) Quasi-Cyclic LDPC CodesHengzhou Xu, Hai Zhu, Mengmeng Xu, Bo Zhang, SiFeng Zhu. 210-214 [doi]
- Robust Stability Analysis for Uncertain Time-Varying Delay Neutral SystemsRuliang Wang, Xiaoli Pei. 215-218 [doi]
- Research of S50 Based Electronic Label Authentication AlgorithmChao Deng. 219-222 [doi]
- A Data Validation Method Based on IP Covert Channel Packet OrderingTianwen Huang, Lejun Zhang, Xiaoyan Hu, Xiaoying Lei. 223-227 [doi]
- A Security Evaluation Method for Voice-over-IP Streaming Media Information HidingXiaoyan Hu, Lejun Zhang, Tianwen Huang, Xiaoying Lei. 228-232 [doi]
- Improved Extended Polynomial-Based Secret Image Sharing Scheme Using QR CodeZhengxin Fu, Sijia Liu, Kun Xia, Bin Yu. 233-237 [doi]
- Node Identification in Wireless Network Based on Convolutional Neural NetworkWeiguo Shen, Wei Wang. 238-241 [doi]
- Cloud Service Risk in the Smart GridLiping Chen, Jun Liu, Weitao Ha. 242-244 [doi]
- Automotive ECU Functional Test System Based on PXIChanghong Zhu, Xiaoping Liang, Wei Deng. 245-249 [doi]
- An Improved Dynamic Clonal Selection Algorithm Using Network Intrusion DetectionLi Ma, Jingjing Qu, Yan Chen, Shiwei Wei. 250-253 [doi]
- PN Code Diversification Based Spread Spectrum Flow Watermarking TechnologyXinzhong Xu, Liancheng Zhang, Juwei Yan. 254-258 [doi]
- Joint Optimization of Packet Length and Transmission Energy in Amplify-and-Forward Relay NetworksMengmeng Xu, Hai Zhu, Hengzhou Xu, Baofeng Wang, SiFeng Zhu. 259-263 [doi]
- Cloud Service Selection with Fuzzy C-Means Artificial Immune Network Memory ClassifierWeitao Ha. 264-268 [doi]
- Reliability Simulation of Mobile Wireless Sensor Networks Based on Support Vector MachinesRong Shan, Tao Li. 269-272 [doi]
- Forest Fire Monitoring System and Energy Saving AlgorithmYanli Wang, Guogang Dang. 273-276 [doi]
- A RMM Based Word Segmentation Method for Chinese Design Specifications of Building StairsJie Zhang, Yi Chen, Xinhong Hei 0001, Lei Zhu, Qin Zhao, Yichuan Wang. 277-280 [doi]
- An Improved Location Algorithm Based on Mobile Anchor NodeLiwei Tian, Yong Fan. 281-285 [doi]
- Hybrid Classification of WEB Trojan Exploiting Small Volume of Labeled Data VectorsShichang Xuan, Dapeng Man, Wei Wang 0076, Kaiyue Qin, Wu Yang 0001. 286-290 [doi]
- A Real-Time Location Privacy Protection Method Based on Space TransformationYingle Li, Shuyu Li. 291-295 [doi]
- A CUSUM Tests for Stable Index Changes under Heavy-Tailed SequencesHao Jin, Yanru Yao, Liping Yang. 296-300 [doi]
- A Parallel Host Log Analysis Approach Based on SparkXinpeng Li, Yong Wang, Hao Feng, Wenlong Ke. 301-305 [doi]
- Optimization Model and Algorithm for Routing and Spectrum Assignment in Elastic Optical NetworksJiading Wang, Hejun Xuan, Yuping Wang, Yuanchao Yang, Sen Liu. 306-310 [doi]
- Constructing Business Simulation Training Platform Based on Workflow Management SystemsYajuan Yang, LiangLiang Zhang, Quanju Zhang. 311-315 [doi]
- The Quality Analysis and Reform of Professional Construction - Illustrated by the Case of Dongguan PolytechnicTianxiang Feng, Hongxia Liu, Zhonglin Wan. 316-320 [doi]
- An Algorithm of Segmentation Positioning Analysis Based on CSSHaiye Qiao. 321-324 [doi]
- Design and Implementation of Tracing Shopping Guide System Based on Two Dimensional Code LightingKangshun Li, Xiaoling Huang, Yueyi Li, Ying Feng. 325-329 [doi]
- Internal Control Measure of Administrative Institutions Based on AHP and Fuzzy Comprehensive EvaluationCancan Zhang. 330-334 [doi]
- Implementation of Vehicle Mobile Sales Cloud Management System Based on Intelligent CommunityCaiHua Qiu. 341-344 [doi]
- A Novel Multi-Objective Evolutionary Algorithm Based on Linear ProgrammingZhicang Wang, Hecheng Li. 345-348 [doi]
- FIR Digital Filter Design Based on Evolutionary Multi-Objective AlgorithmTiejun Chen, Qiang Wang 0008, Hai-lin Liu. 349-352 [doi]
- Smart Construct High Girth LDPC Codes Based on Permutation GroupsQiang Wang 0008, Tingting Lan. 353-356 [doi]
- Influence of Distributed Generation Connection on Dynamic Characteristics of Power GridKangshun Li, Yi Wang. 357-361 [doi]
- CFO Algorithm Using Niche and Opposition-Based LearningMin Li, Fei Liang, Jie Liu. 362-365 [doi]
- A New Hybrid Global Optimization AlgorithmDing Wang. 366-368 [doi]
- A Novel Hybrid Active Contour Model for Medical Image Segmentation Driven by Legendre PolynomialsBo Chen, Shan Huang, Wensheng Chen, Zhengrong Liang. 369-373 [doi]
- Filtering Out Infrequent Events by Expectation from Business Process Event LogsYing Huang, Yingxu Wang, Yiwang Huang. 374-377 [doi]
- An Improved Weighted Local Linear Embedding AlgorithmQing Wu, Zongxian Qi, Zhicang Wang, Yu Zhang. 378-381 [doi]
- A Class of Fuzzy Smooth Piecewise Twin Support Vector MachineQing Wu, Haoyi Zhang, Rongrong Jing, Zhicang Wang. 382-385 [doi]
- Parametric Estimation of Affine Deformations in Terms of Generic Weighted CentroidMuhan Ma, Yao Yun, Jianwei Yang, Yunjie Chen. 386-389 [doi]
- A Method of CNN Traffic Classification Based on SppnetHuiyi Zhou, Yong Wang, Miao Ye. 390-394 [doi]
- Image Reconstruction Algorithm Based on Guided Image Filtering in Parallel-Beam CTXuening Quan, Wenzhang He. 395-398 [doi]
- A Novel Rician Noise Removal Algorithm Based on Energy Function Minimization MethodBo Chen, Feifei Xie, Wensheng Chen, Binbin Pan. 399-403 [doi]
- A Novel Enhanced Nonnegative Feature Extraction ApproachHaitao Chen, Wen-Sheng Chen, Binbin Pan, Bo Chen. 404-407 [doi]
- Massive Data Storage Algorithm Based on Node Performance EvaluationQiang Chen. 408-411 [doi]
- Efficient Collusion-Tolerable Secure Multiparty Computation of Weighted AverageHongwei Duan, Runmeng Du, Qiong Wei, Wenli Wang, Xin Liu. 412-415 [doi]
- Cryptanalysis of Kumar's Remote User Authentication Scheme with Smart CardMin-Shiang Hwang, Eko Fajar Cahyadi, Yuen-Cheng Chou, Cheng-Ying Yang. 416-420 [doi]
- Verifiable and Authenticated Searchable Encryption Scheme with Aggregate Key in Cloud StorageZhenhua Liu, Yaohui Liu. 421-425 [doi]
- Certificateless Proxy Signcryption Using Cyclic Multiplication GroupsHuifang Yu. 426-429 [doi]
- Feedback Numbers of Balanced Hypercubes BH_nSijia Zhang, Xinyue Zhang, Yijin Wang. 434-438 [doi]
- Modified RSA Encryption Algorithm Based on Chaos and Its Application in Voice Encryption SystemYi Wang, Zhiping Tan. 439-444 [doi]
- Research on Domain Binding Information Environment System of Flower with GPRSLongqing Zhang, Xinwei Zhang, Liping Bai, Yanghong Zhang, ShengFu Lan. 445-448 [doi]
- Information Security Protection in Software TestingYubin Wang, Jinyu Yao, Xiaoxue Yu. 449-452 [doi]
- Design of Information System for Fire Risk EvaluationYanfei Yu. 453-456 [doi]
- Application of Virtualization Platform in Informationization of Higher Vocational CollegesJing Nie. 457-460 [doi]
- Option Pricing under Stochastic Interest RatesXiuni Yang, Yunfeng Yang. 461-464 [doi]
- Optimal Consumption and Investment Strategies in a Jump-Diffusion ModelYunfeng Yang, Huihui Bai, Yinchun Zheng. 465-468 [doi]
- A Privacy Analysis Method to Anonymous Graph Based on Bayes Rule in Social NetworksGe Wen, Hai Liu, Jun Yan, Zhenqiang Wu. 469-472 [doi]
- Logistics Tracking Management System Based on Wireless Sensor NetworkLei Yang, Longqing Zhang. 473-475 [doi]
- A Two-Dimensional Sky Background Model for LAMOST Based on Improved KICAPeng Wu, Qian Yin, Ping Guo. 476-480 [doi]
- Study on Standardization of Detection Data of Atmospheric Microparticle Lidar Based on MetadataJie Zhang, Hao Chen, Kai Wang. 481-484 [doi]
- Planning and Design of the Plant Growth Model Based on Internet of ThingsLongqing Zhang, Liping Bai, Xinwei Zhang, Yanghong Zhang, Feng Sun. 485-487 [doi]
- An Improved Small File Storage Strategy in Ceph File SystemYa Fan, Yong Wang, Miao Ye. 488-491 [doi]
- Acquiring the Distance Data with Inertial Measurement Unit in a Wearable Device for the Training of Hammer ThrowersYe Wang, Hua Li, Gongbing Shan. 492-495 [doi]
- Research on the Practical Teaching Mode Based on Human Resources Professional CompetitionDongyi He, Wenxue Niu. 496-499 [doi]
- Inhibitory Effect of Radial Force to Switched Reluctance Motor with Stator Pole SlotChaozhi Huang, Guobin Yang, Haidong Chen, Xiping Liu. 500-503 [doi]