Abstract is missing.
- A Personalized Recommendation Algorithm Based on the Fusion of Trust Relation and Time SeriesHongli Chen. 3-6 [doi]
- Budget-Deadline Constrained Workflow Scheduling for Heterogeneous ResourcesNaqin Zhou, Deyu Qi, Wei Feng, Xinyang Wang, Yang Shen. 7-14 [doi]
- From Top to Down Hierarchical Classification Process with the Candidates' StrategyJianying Lin, Rui Liu, Quanye Jia, Yahui Zhao. 15-22 [doi]
- Cooperation of Improved Hk Networks Based on Prisoner Dilemma GameYunsheng Deng, Ping Miao, Hongyong Yang. 23-27 [doi]
- Research and Analysis about the Length of Vertex-Degree Sequence of Complex Networks with Poisson DistributionZhanying Zhang, Wenjun Xiao, Minfan He, Jianqing Xi, Yijun Mao. 28-31 [doi]
- Vehicular Data Cloud Platform with 5G Support: Architecture, Services, and ChallengesMing Tao, Jiaxing Li, Jie Zhang, Xiaoyu Hong, Chao Qu. 32-37 [doi]
- Wireless Facility Scheduling for Data Center NetworksXianglin Wei, Qin Sun. 38-43 [doi]
- An Improved Random Forest Method Based on RELIEFF for Medical DiagnosisMin Liu, Xiaowei Xu, Ye Tao, Xiaodong Wang. 44-49 [doi]
- Reference Line Guided Pareto Local Search for Bi-Objective Traveling Salesman ProblemChao Xia, Xinye Cai, Zhun Fan, Muhammad Sulaman. 50-56 [doi]
- A Conical Area Evolutionary Algorithm Based on Modularity Q for Community Detection from Signed NetworksYu Wu, Pengfei Chao, Weiqin Ying, LinLin He, Shiyun Chen. 57-62 [doi]
- Consensus of Leader-Following Multi-Agent Systems with Sampling Information under Directed NetworksLi Li, Xianyong Zhang, Zhongsheng Wang, Zhiyong Lin. 63-68 [doi]
- An Improved Method for Detection of the Pedestrian Flow Based on RFIDYuanyuan Fan, Qingzhong Liang. 69-72 [doi]
- An Improved Precoding Method for Blind Separation of Spatially Correlated SignalsLiu Yang, Shaohong Zhang, Zuyuan Yang. 73-76 [doi]
- A Trusted Recommendation Scheme Based on the Improved Slope One AlgorithmLi Yang, Xiaoqin Wang, Yaping Tian. 77-84 [doi]
- A Novel Method for Analysing the Population Dynamic Behavior of Particle Swarm OptimizationGuiping Xu, Gaoyang Li, Jingqing Jiang, Yuqing Lin, Yanchun Liang, Heow Pueh Lee, Xiaohu Shi, Chunguo Wu. 85-92 [doi]
- A Survey of Multiobjective Evolutionary AlgorithmsJiawei Zhang, Lining Xing. 93-100 [doi]
- A Decomposition-Based Multi-Objective Tabu Search Algorithm for Tri-Objective Unconstrained Binary Quadratic Programming ProblemYing Zhou. 101-107 [doi]
- Understanding Soft Skills Requirements for Mobile Applications DevelopersJingdong Jia, Zupeng Chen, Xiaoping Du. 108-115 [doi]
- Gaitsense: A Potential Assistance for Physical Rehabilitation by Means of Wearable SensorsSen Qiu, Long Liu, Jinxiao Li, Zhelong Wang, Kairong Qin, Yongmei Jiang. 116-121 [doi]
- Image Visual Saliency Feature Extraction Based on Multi-Scale Tensor SpaceShimin Wang, Wenyan Jiang, Jihua Ye, Mingwen Wang, Xinyu Zhou. 122-127 [doi]
- Dynamic Step Factor Based Firefly Algorithm for Optimization ProblemsWenjun Wang, Hui Wang, Xinyu Zhou, Jia Zhao, Li Lv, Hui Sun. 128-134 [doi]
- A Dynamic Conditional Random Field Based Framework for Sentence-Level Sentiment Analysis of Chinese MicroblogZhifeng Hao, Ruichu Cai, Yiyang Yang, Wen Wen, Lixin Liang. 135-142 [doi]
- Multi-Classification for Malicious URL Based on Improved Semi-Supervised AlgorithmJun Yang, Pengpeng Yang, Xiaohui Jin, Qian Ma. 143-150 [doi]
- An Estimation of Distribution Algorithm Based Load-Balanced Clustering of Wireless Sensor NetworksDongbin Jiao, Liangjun Ke, Weibo Yang, Jing Li. 151-158 [doi]
- An Improved Spatial-Temporal Correlation Algorithm of Wsns Based on Compressed SensingXin Xie, Jianan Wang, Fengping Hu, Nan Jiang, Songlin Ge. 159-164 [doi]
- Establishment of Data Collection and Transmission Optimization Model Based on TRIZMin Gai, Shanshan Zhao, Yan Li. 165-170 [doi]
- Improved RFID Anti-Collision Algorithm Based on Quad-TreeGuan Hui, Zhang Yan, Bin Zhang, Fahong Yu. 171-175 [doi]
- Name Disambiguation for Chinese Scientific Authors with Multi-Level ClusteringSimeng Sun, Hui Zhang, Ning Li, Yong Chen. 176-182 [doi]
- A Hierarchical Framework with Consistency Trade-off Strategies for Big Data ManagementYingyi Yang, Yi You, Bochuan Gu. 183-190 [doi]
- Developing Mathematics Mobile Game to Enhance Learning for ChildrenHadi Sutopo, Wisnu Pamungkas. 191-197 [doi]
- Segmentation of Pulmonary CT Image by Using Convolutional Neural Network Based on Membership FunctionJun Xu, Hui Liu. 198-203 [doi]
- Adaptive Differential Evolution with Landscape Modality Detection for Global OptimizationChi Shao, Guo Sun, Meng Zhao, Yiqiao Cai. 204-209 [doi]
- An Energy Aware Mass Memory Unit for Small Satellites Using Hybrid ArchitectureAourra Khaled, Quan-Xin Zhang. 210-213 [doi]
- An Anti-Forensics Method against Memory Acquiring for Android DevicesJiamin Zheng, Yu-an Tan, Xiaosong Zhang, Chen Liang, Changyou Zhang, Jun Zheng. 214-218 [doi]
- Design and Implementation of a Unified Mooc Recommendation System for Social Work Major: Experiences and LessonsXiaxu He, Pengfei Liu, Weifeng Zhang. 219-223 [doi]
- The Development of AC Arc Fault Simulation Test Device with Arc Breaking FunctionZibo Qi, Wei Gao, Chen Guo, Kaili Xu. 224-227 [doi]
- Empirical Study on the Construction of a Unified Information System with Big Data Analysis: A Case of Social Work Organizations and Civil Affairs DepartmentsXiaxu He, Pengfei Liu. 228-233 [doi]
- Practical Optimization for Wireless Network with Network Coded Opportunistic Routing and SICHaiping Wang, Sanfeng Zhang, Yunxiao Sun. 234-239 [doi]
- A Donation Heterogeneity Public Goods Game on High Clustering Coefficient and Adjustable Power-Law NetworkPing Miao, Yunsheng Deng, Hongyong Yang. 240-244 [doi]
- Path Self-Deployment Algorithm of Three-Dimensional Space in Directional Sensor NetworksLi Tan, Chaoyu Yang, Minghua Yang, Xiaojiang Tang. 245-250 [doi]
- A Novel Face Recognition Method Based on ICA and Binary Tree SVMTao Wang. 251-254 [doi]
- Swarming Movement of Dynamical Multi-Agent Systems with Modeling ErrorsFu-sheng Wang, Hongyong Yang. 255-259 [doi]
- Human-Machine Conversation Based on Hybrid Neural NetworkXiao Sun, Xiaoqi Peng, Fuji Ren, Yun Xue. 260-266 [doi]
- An Exponential Distribution Complex Network Model Constructed by Degree Sequence Length IterationZhengwen Lai, Wenjun Xiao, Meisheng Li, Zhanying Zhang. 267-271 [doi]
- Real-Time Face Recognition Based on Sparse Illumination LearningWuYang Ding, Bo Liu 0002, Yanshan Xiao. 272-277 [doi]
- Evaluate the Chinese Version of Machine Translation Based on Perplexity AnalysisTianwen He, Hong Wang, Baofang Hu. 278-281 [doi]
- Fuzzy Query over Ontologies Based on Relational DatabasesFu Zhang, Jingwei Cheng. 282-290 [doi]
- Fast Causal Division for Supporting High Dimensional Causal DiscoveryGuizhen Mai, Shiguo Peng, YingHan Hong, Pinghua Chen. 291-296 [doi]
- A Novel Adaptive Resampling Particle Filtering AlgorithmYan Zhang, Zhaobin Liu, Zhang Bin, Yu Fahong. 297-300 [doi]
- ABCGA Algorithm for the Two Echelon Vehicle Routing ProblemXiaoling Zhong, Siyu Jiang, Hengjie Song. 301-308 [doi]
- Global Pareto Optimality of Cone Decomposition of Bi-Objective OptimizationYu Wu, Bin Wu, Weiqin Ying, Yuehong Xie, Weipeng He. 309-314 [doi]
- A Semi-Automatic Annotation Technology for Traffic Scene Image Labeling Based on Deep Learning PreprocessingYuhui Jin, Jianhao Li, Dongyuan Ma, Xi Guo, Haitao Yu. 315-320 [doi]
- Component-Based Distributed Framework for Coherent and Real-Time Video DehazingMeihua Wang, Jiaming Mai, Yun Liang, Ruichu Cai, Tom Zhengjia, Zhenjie Zhang. 321-324 [doi]
- Distributed Extreme Learning Machine with Kernels Based on Mapreduce for Spectral-Spatial Classification of Hyperspectral ImageJunhua Ku, Bing Zheng. 325-332 [doi]
- Research of Rough Set Model under Logical Computing of GranularZiqi Zhou, Xinting Tang, Xiaofeng Zhang, Hongjiang Gao, Kun Liu. 333-336 [doi]
- Handwritten Yi Character Recognition with Density-Based Clustering Algorithm and Convolutional Neural NetworkXiaodong Jia, Wendong Gong, Jie Yuan. 337-341 [doi]
- A Novel Differential Evolution Algorithm for Constrained OptimizationYan Zhang, Zhaobin Liu, Zhang Bin. 342-348 [doi]
- A Multi-Candidate Electronic Voting Scheme with Unlimited ParticipantsXi Zhao, Yong Ding, Quanyu Zhao. 349-353 [doi]
- Development and Design of Micro-Course System Based on Wechat PlatformXiaoxiao Chen, Xiaodong Yan, Arun. 354-357 [doi]
- Rough Set Model under Different Granular ComputingXiaoting Sun, Xinting Tang, Xiaofeng Zhang, Hongjiang Gao, Kun Liu. 358-360 [doi]
- A Chinese Geographic Knowledge Base for GIRJian Li, Rui Liu, Rui Xiong. 361-368 [doi]
- A New Quantum Rotation Angle of Quantum-Inspired Evolutionary Algorithm for TSPJialin Li, Wei Li, Ying Huang. 369-374 [doi]
- Image Classification with Deep Belief Networks and Improved Gradient DescentGang Liu, Liang Xiao, Caiquan Xiong. 375-380 [doi]
- Identity-Based Proxy Signature Multiple-File PDP for Mobile Cloud ComputingYuan Yuan, Fu Xie. 381-387 [doi]
- An Approach for Inferring Causal Directions from Multi-Dimensional NetworksYingHan Hong, Zhifeng Hao, Guizhen Mai, Bingfeng Chen, Rui Xie. 388-392 [doi]
- A Virtual Network Embedding Algorithm Based on RBF Neural NetworkHui Zhang, Xiangwei Zheng, Jie Tian, Qingshui Xue. 393-396 [doi]
- Association Graph Based Jamming Detection in Multi-Hop Wireless NetworksXianglin Wei, Fei Hu, Qin Sun, Tongxiang Wang. 397-402 [doi]
- A Feature Space Learning Model Based on Semi-Supervised ClusteringRenchu Guan, Xu Wang, Maurizio Marchese, Yanchun Liang, Chen Yang. 403-409 [doi]
- GSA-Based Jammer Localization in Multi-Hop Wireless NetworkTongxiang Wang, Xianglin Wei, Qin Sun, Fei Hu. 410-415 [doi]
- Partial Least Squares Regression Based Facial Age EstimationXue-Qiang Zeng, Run Xiang, Hua-Xing Zou. 416-421 [doi]
- A Centralized Service Discovery Algorithm via Multi-Stage Semantic Service Matching in Internet of ThingsBing Jia, Wuyungerile Li, Tao Zhou. 422-427 [doi]
- Design and Implementation of Load Balancing Strategy in Openstack Cloud PlatformDong Li, Zedan Zheng, Yi Li, Yang Xu, Deyou Tang. 428-435 [doi]
- QoS-Based Service Selection Method for Big Data Service CompositionDong Li, Jiechu Wu, Zehang Deng, Zelin Chen, Yang Xu. 436-443 [doi]
- Secure Logging and Public Audit for Operation Behavior in Cloud StorageZhaoyi Chen, Hui Tian, Jing Lu, Fulin Nan, Yiqiao Cai, Tian Wang, Yonghong Chen. 444-450 [doi]
- Developing a Lock-Free Scheduling on Manycore ComputerZhishuo Zheng, Deyu Qi. 451-458 [doi]
- Research on Scene Parsing Algorithm Cascading Object Detection NetworkXi Guo, Yuanzhen Wen, Dongyuan Ma, Yuhui Jin, Haitao Yu. 459-464 [doi]
- Practical Optimization for Wireless Network with Intra-Session Network Coding and SICHaiping Wang, Yunxiao Sun, Sanfeng Zhang. 465-470 [doi]
- Impact Analysis of Air Pollutants on the Air Quality Index in Jinan WinterLiye Song. 471-474 [doi]
- CP-TPS: A Real-Time Transaction Processing Strategy Supporting Compensatory TaskWenle Wang, Yuanlong Cao, Jun Gong, Zhifen Li. 475-482 [doi]
- How Perceived Factors of Review Contents Influence Consumers' Purchase DecisionKang Miao, Qinghong Yang, Xing Wei, Xiaoping Du, Jianwei Zhang. 483-486 [doi]
- Containerized Resource Provisioning Driven by User PreferenceYe Tao, Xiaodong Wang, Xiaowei Xu, Liang Yang. 487-490 [doi]
- Automatic Planning on Sequence of Operations Based on Entity-Flow Model towards Pipelining Manufacturing SystemMincong Yu, Deyu Qi. 491-497 [doi]
- Statistical Model to Validate a Metaprocess-Oriented Methodology Based on RASJavier Dario Fernandez Ledesma. 498-503 [doi]
- A Volumetric Shape Registration Based on Locally Affine-Invariant ConstraintDan Kang, Xiuyang Zhao, Dongmei Niu, Mingjun Liu. 504-511 [doi]
- A Target Tracking Algorithm Based on Path Virtual ForceLi Tan, Chaoyu Yang, Xiaojiang Tang, Yaoyao Jiao. 512-517 [doi]
- A Data Masking Scheme for Sensitive Big Data Based on Format-Preserving EncryptionBaojiang Cui, BaiHui Zhang, Kaiyue Wang. 518-524 [doi]
- Partition ORAMS Combined with Novel Client Eviction MechanismBo Li, Zheli Liu, Ilsun You. 525-530 [doi]
- An Ensemble Random Forest Algorithm for Insurance Big Data AnalysisZiming Wu, Weiwei Lin, Zilong Zhang, Angzhan Wen, Longxin Lin. 531-536 [doi]
- A More Secure and Practical Remote User Authentication Scheme for Multi-Server EnvironmentJianming Cui, Xiaojun Zhang, Yihui Liu, Ning Cao. 537-540 [doi]
- A Replay-Attack Resistant Authentication Scheme for the Internet of ThingsYuxiang Feng, Wenhao Wang, Yukai Weng, Huanming Zhang. 541-547 [doi]
- Privacy-Preserving ID3 Data Mining over Encrypted Data in Outsourced Environments with Multiple KeysYe Li, Zoe L. Jiang, Xuan Wang, S. M. Yiu. 548-555 [doi]
- Attribute-Based Encryption Scheme Supporting Decryption Outsourcing and Attribute Revocation in Cloud StorageHongwei Liu, Ping Zhu, Zehong Chen, Peng Zhang, Zoe L. Jiang. 556-561 [doi]
- Dynamic Data Operations with Deduplication in Privacy-Preserving Public Auditing for Secure Cloud StorageYulin Wu, Zoe L. Jiang, Xuan Wang, S. M. Yiu, Peng Zhang. 562-567 [doi]
- Policy Based on Homomorphic Encryption and Retrieval Scheme in Cloud ComputingYong Ding, Xiumin Li. 568-571 [doi]
- Detecting Type and Size of Road Crack with the SmartphoneYingying Kong, Zhiwen Yu, Huihui Chen, Zhu Wang, Chao Chen, Bin Guo. 572-579 [doi]
- Related Key Chosen IV Attack on Stream Cipher Espresso VariantMing-Xing Wang, Dong Dai Lin. 580-587 [doi]
- Finding Android Malware Trace from Highly Imbalanced Network TrafficYing Pang, Zhenxiang Chen, Xiaomei Li, Shanshan Wang, Chuan Zhao, Lin Wang, Ke-ji, Zicong Li. 588-595 [doi]
- DDOS Attack Detection System Based on Analysis of Users' Behaviors for Application LayerMeng Bi, Andi Wang, Jian Xu, Fucai Zhou. 596-599 [doi]
- Kernel Bilinear Discriminant Analysis for Face RecognitionXiao-Zhang Liu. 603-606 [doi]
- Research on Personalized Hybrid Recommendation Method of Commodity Based on ContextShanguo Lv. 607-610 [doi]
- An Optimized Strategy for Small Files Storing and Accessing in HDFSYanfeng Lyu, Xunli Fan, Kun Liu. 611-614 [doi]
- An Improvement of Distributed Indexing Method Based on the Map/ReduceShuxian Sun, Rui Liu, Junlong Chen, Feng Yang, Jinyu Liu. 615-618 [doi]
- A New Dynamic Energy-Based Clustering Model for Wireless Sensor NetworksZhiping Fan, Musheng Cai, Xie Li, Jianfeng Chen. 619-622 [doi]
- Processed RGB-D Slam Using Open-Source SoftwareYanli Liu, Mengyu Zhu, Heng Zhang. 623-626 [doi]
- Random Walk on Undirected Networks Based on the Neighbor Nodes Degree DistributionMeisheng Li, Wenjun Xiao, Zhengwen Lai, Zhanying Zhang. 627-630 [doi]
- Research and Optimization of Hydraulic Simulation in Gas Pipeline NetworkLei Xiao, Kejiang Liu, Xincai Zhuang. 631-634 [doi]
- Network Intrusion Detection Based on Random Forest and Support Vector MachineYa-Ping Chang, Wei Li, Zhongming Yang. 635-638 [doi]
- Intrusion Detection Using Deep Belief Network and Probabilistic Neural NetworkGuangzhen Zhao, Cuixiao Zhang, Lijuan Zheng. 639-642 [doi]
- Complex-Network-Based Supply Chain Relationships Inference in Cloud Logistics ServicesChijun Zhang, Mingzhe Xu, Chunyan Qiu. 643-646 [doi]
- Multi-Objective Virtual Network Embedding Algorithm Based on Global Resource CapacityZhen Li, Xiangwei Zheng, Yuang Zhang, Qingshui Xue. 647-650 [doi]
- Indoor Pedestrian Trajectory Detection with LSTM NetworkJin Li, Qiang Li, Nanxi Chen, Yingguan Wang. 651-654 [doi]
- An Evolutionary Algorithm Using Multi-Strategy Combination for Single Objective Optimization ProblemJinhui Chen, Junying Chen, HuaQing Min. 655-658 [doi]
- A General Architecture of IoT SystemWeigong Lv, Fanchao Meng, Ce Zhang, Yuefei Lv, Ning Cao, Jianan Jiang. 659-664 [doi]
- Research and Application of Cow Estrus Detection Based on the Internet of ThingsTing Xia, Changqing Song, Junqing Li, Ning Cao, Chunyan Li, Gang Xu, Feifei Xu, Jifeng Liu, Russell Higgs, Gregory M. P. O'Hare, Guofu Chang, Cuinan Yang, Qiang Zhou. 665-667 [doi]
- Implementation of Temperature-Measuring System Based on Zigbee Technology: The Technology Research on Sensor NetworkZizhen Wang. 668-672 [doi]
- Filter Anchor Node Localization Algorithm Based on Rssi for Underground Mine Wireless Sensor NetworksWangsheng Fang, Hui Wang, Zhongdong Hu. 673-676 [doi]
- A High-Speed Network Data Acquisition System Based on Big Data PlatformJingling Zhao, Congxian Yin, Xiaohui Jin, Weiliang Liu. 677-681 [doi]
- Dynamical Resource Allocation Controller Research Based on Flow Aware in Content Distribution NetworksZhou Yong. 682-684 [doi]
- Research on Network Driver Based on Embedded ProcessorYanwu Zhang, Lei Li, Bin Xue, Ning Cao, Yuyan Shen. 685-687 [doi]
- A Code Self-Relocation Method for Embedded SystemXinyu Tang, Changyou Zhang, Chen Liang, Aourra Khaled, Yuanzhang Li. 688-691 [doi]
- Teaching Quality Evaluation System of Part-Time TeachersLixin Pang, Ning Yao, Yue Wang, Zhang Yao, Xinxi Lu. 692-695 [doi]
- The Ethical Dilemmas of Virtual Reality Application in EntertainmentJingdong Jia, Wenchao Chen. 696-699 [doi]
- The Research of Texture Transmission Algorithm Combined with Texture SynthesisXiaoting Sun, Yujuan Sun, Muwei Jian. 700-703 [doi]
- Person Re-Identification with Deep Features and Transfer LearningShengke Wang, Shan Wu, Lianghua Duan, Changyin Yu, Yujuan Sun, Junyu Dong. 704-707 [doi]
- The Node Influence Analysis in Social Networks Based on Structural Holes and Degree CentralityXiaohui Zhao, Sai Guo, Yanlei Wang. 708-711 [doi]
- Analysis on the Internal Control of Enterprise Accounting under Computer Network EnvironmentYan-ling Hu. 712-715 [doi]
- Research on the Frequency Spectrum of Electric Bicycle DC Fault ArcChen Guo, Zhenwei Liu, Zibo Qi, Wei Gao, Ying Wu. 716-719 [doi]
- Optimal Schedule on a Special Home and Away Double-Loop RuleZhenyu Xu, Xicheng Li, Chuanbin Du, Baojian Qiu. 720-723 [doi]
- Digital Image Watermarking Using Dual-Scrambling and Singular Value DecompositionTao Wang. 724-727 [doi]
- Three Dimensional Surface Reconstruction Based on the Reference Object and PMSZhenyu Guo, Yujuan Sun, Muwei Jian. 728-731 [doi]
- Analysis on Computer Automatic Identification of Low-Over Current for Conductor Insulating LaggingXinming Wang, Fang Xu, Sujun Liu, Ying Wu. 732-734 [doi]
- An Energy Efficiency Routing Algorithm for Wireless Sensor NetworkHuili Jia, Xunli Fan, Kun Liu, Yang Qian. 735-739 [doi]
- Research on Recognition of Landslides with Remote Sensing Images Based on Extreme Learning MachineHui Xu, Xiang Li, Wenyin Gong. 740-747 [doi]
- An Improved Weighted LeaderRank Algorithm for Identifying Influential Spreaders in Complex NetworksZhen-Hao Zhang, Guo-Ping Jiang, Yurong Song, Ling-Ling Xia, Qi Chen. 748-751 [doi]
- A Method of Data Obfuscation Based on Monte Carlo Random Monotone FunctionYannan Qin, Lin Li, Yongxin Zhang, Yanhui Ding. 752-755 [doi]
- An Improved Activity Recognition Method Based on Smart Watch DataDengpan Tian, Xiaowei Xu, Ye Tao, Xiaodong Wang. 756-759 [doi]
- Analysis Model for Fire Accidents of Electric Bicycles Based on Principal Component AnalysisYing Wu, YongPing Zhu, Fang Xu, Jian Xu. 760-762 [doi]
- The Application of Dense Storage Integration Technology in Tobacco Logistics Centers Based on the Internet of ThingsJinLong Wang, Zhaochan Li, Russell Higgs. 763-767 [doi]
- The Detection and Recognition of Bridges' Cracks Based on Deep Belief NetworkXuejun Wang, Yan Zhang. 768-771 [doi]
- Research on Technology, Algorithm and Application of Web MiningYeqing Li. 772-775 [doi]
- A Sentiment Analysis Method of Short Texts in MicroblogJie Li, Lirong Qiu. 776-779 [doi]
- Mining Web Access Sequence with Improved Apriori AlgorithmJun Yang, Haoxiang Huang, Xiaohui Jin. 780-784 [doi]
- Password Guessing Based on LSTM Recurrent Neural NetworksLingzhi Xu, Can Ge, Weidong Qiu, Zheng Huang, Zheng Gong, Jie Guo, Huijuan Lian. 785-788 [doi]
- Bernoulli Box-Particle Smoothing for Detection and Tracking under Interval MeasurementSunyong Wu, Qiutiao Xue, Qiaojiao Ning, Congnan Gui, Xingli Gan. 789-792 [doi]
- Malware Detection and Classification Based on N-Grams Attribute SimilarityFuYong Zhang, Tiezhu Zhao. 793-796 [doi]
- Anti-Reverse-Engineering Tool of Executable Files on the Windows PlatformChenke Luo, Feng Yuan, Qiyuan Gao, Jiateng Yang, Jian Xu. 797-800 [doi]
- Optimizing Pharmacy-Based Distribution of Pandemic Influenza Antiviral Drugs Based on Large Urban NetworkChijun Zhang, Yetong Dai, Jialing Han. 801-803 [doi]
- Incident Duration Predication Based on Traffic Boardcasting InformationCuicui Ru, Mao Feng, Jianhao Li, Haitao Yu. 804-807 [doi]
- A Temperature Measure Method Based on Wireless CommunicationZizhen Wang, Chenggang Wang. 808-812 [doi]
- Research on Hotspot Topic Discovery Algorithm Based on Web Mining TechnologyYeqing Li. 813-816 [doi]
- A Transparent Encryption Scheme of Video Data for Android DevicesPengfei Pang, Khaled Aourra, Yuan Xue, Yuanzhang Li, Quan-Xin Zhang. 817-822 [doi]
- A High Efficiency Encryption Scheme of Dual Data Partitions for Android DevicesFanJiao Meng, Jiamin Zheng, Xiao Yu, Changyou Zhang, Yu-an Tan. 823-828 [doi]
- Modeling and Practise of Satellite Communication Systems Using Physical Layer Security: A SurveyYuan Gao, Hong Ao, Zenghui Feng, Weigui Zhou, Su Hu, Xiangyang Li. 829-832 [doi]
- An Efficient and Secure Deduplication Scheme Based on Rabin Fingerprinting in Cloud StorageHaonan Su, Dong Zheng, Yinghui Zhang. 833-836 [doi]
- A Novel Neighborhood-Dependent Mutation Operator for Differential EvolutionGuo Sun, Yiqiao Cai. 837-841 [doi]
- A SDIO-Interface Wi-Fi Packet Capture Scheme Based on Android Kernel ExtensionXiaochun Yang, Hongfei Zhu, Xiaosong Zhang, Aourra Khaled. 842-845 [doi]
- Java Source Code Protection Based on JNI and AES AlgorithmZhao Hong, Guo Nan. 846-849 [doi]
- Comparison of Four Local Invariant Characteristics Based on Palm VeinWei Lu, Wei-qi Yuan. 850-853 [doi]
- Multi-View Action Recognition Method Based on Regularized Extreme Learning MachineWei He, Bo Liu 0002, Yanshan Xiao. 854-857 [doi]
- A Mixed Strategies Differential Evolution Based on Fitness Landscapes FeaturesWei Li, Kangshun Li, Liang Zhong, Ying Huang. 858-861 [doi]
- A Clustering Algorithm Oriented to Intrusion DetectionWei Li, Zhong-Ming Yang, Ya-Ping Chang, Bin Zhang. 862-865 [doi]
- Fault Attack on an Improved CRT-RSA Algorithm with the Modulus Chaining MethodFanyu Kong, Dashui Zhou, Yali Jiang, Jianwei Shang, Jia Yu. 866-869 [doi]
- Anonymous Attribute-Based Encryption with Large Universe and Threshold Access StructuresYinghui Zhang, Dong Zheng. 870-874 [doi]
- Optimization of 3D Reconstruction Technique for CT Image and Analysis of the Derived ModelZhao Jin, Guoqiang Yuan, Hui Liu. 875-878 [doi]
- Chinese-Uyghur-English Semantic Search Based on the Knowledge GraphsLirong Qiu, Na Yang, Maierdan Maolimamuti. 879-882 [doi]
- The Design and Implementation of Chinese-Uighur-English Online Dictionary Based on Knowledge GraphLirong Qiu, Huan Yang, Rong Zhou. 883-886 [doi]
- Research and Analysis of Semantic Search Technology Based on Knowledge GraphYeqing Li. 887-890 [doi]
- Equitable Neighbor Sum Distinguishing Edge Colorings of Some GraphsJihui Wang. 891-893 [doi]
- Review of Development and Construction of Uyghur Knowledge GraphLirong Qiu, Huili Zhang. 894-897 [doi]
- Neighbor Sum Distinguishing Total Colorings of Graphs with Bounded Maximum Degree and Maximum Average DegreeBaojian Qiu, Jihui Wang, Yan Liu, Zhenyu Xu. 898-901 [doi]
- A Specular Reflection Removal Method for Large Scale Ocean Surface ImagesShengke Wang, Changyin Yu, Yujuan Sun, Junyu Dong. 902-907 [doi]
- The Research of Signal Processing of the Control System Based on Electromyography SignalChangsong Li, Yiqi Zhou. 908-911 [doi]
- A Fast Image Matting Method Based on Interval-Line SamplingHu Wang, Zhongming Yang, Congbo Ma, Hongyue Wu, Mingting Ouyang. 912-915 [doi]
- FCM-Based Image Segmentation with Kernel FunctionsXinting Tang, Xiaofeng Zhang, Hongjiang Gao, Kun Liu. 916-919 [doi]