Abstract is missing.
- A De-Theoretical Experimental Modal Analysis Method Using Data Mining-Symbol RegressionHai Lin, Yingjie Chen, Xuchu Jiang, Xinyong Mao. 3-13 [doi]
- Quantitative Assessments of Haze Research Based on Co-Citation NetworksYujun Li, Wuzhen Peng. 14-23 [doi]
- Semantic Recognition and Classification Method of Chinese AbstractsWen Hao. 24-35 [doi]
- Fuzzy Probabilities of Fuzzy EventsOleksandr Provotar. 36-41 [doi]
- PPSNN: Prediction of Protein Structure with Neural NetworkHong-Xuan Hua. 42-47 [doi]
- Sentiment Classification Regarding the Negative Brand Affect of Enterprise Weibo CommentsXin Wang, Guang Yu, Yong-tian Yu. 48-54 [doi]
- An Optimization Algorithm for Missing Value Imputation in Microarray Based on Integrated InformationFeng Liu, Yiding Zhang, Zeming Liu, Meng Gao. 55-64 [doi]
- Technique for Annotation of Fuzzy Models: A Semantic Fuzzy Mining ApproachKingsley Okoye. 65-75 [doi]
- Iterative Optimization of Orbital Dynamics Based on Model PredictionYuhao Hu, Gang Li, Aimin Hu. 76-86 [doi]
- Detection of Outside Historical Routes for Radar Maritime TargetsNguyen Van Loi, Nguyen Duc Duong, Tran Trung Kien, Nguyen Xuan Thang, Nguyen Xuan Chung, Tran Vu Hop. 87-98 [doi]
- Improve-Center: A Deep Learning Face Representation ApproachFeihu Huang, Menglong Yang, Xuebin Lyu, Fangrui Wu. 99-105 [doi]
- Research on Delay Prediction Compensation of Teleoperation Robot Network Control SystemLanyong Zhang, Kun Meng, Keqing Wang. 106-115 [doi]
- User-Based Collaborative Filtering Using Fuzzy ClusteringSoojung Lee. 116-121 [doi]
- The Extension Principle for Probabilistic Linguistic Term SetsLisheng Jiang, Huchang Liao, Abdullah Al-Barakati. 122-129 [doi]
- Principle Component Analysis Study of Coffee/Tea NutritionMason Chen, Anna Wu. 130-136 [doi]
- Applying Machine Learning and AI on Self Automated Personalized Online LearningChetneti Srisa-An, Karn Yongsiriwit. 137-145 [doi]
- Object-Based Storage System Architecture ModelHuiqi Qiu. 146-151 [doi]
- Hypergraph Clustering by Generating Large Pure Hyperedges Using Greedy Neighborhood SearchXingcheng Ran, Yonggang Lu, Xiangwen Wang, Zhenyu Lu. 152-159 [doi]
- New Entropy on the Interval-Valued Neutrosophic SetTruong Thi Thuy Duong. 160-169 [doi]
- Internet User Perception on Data Privacy Protection: Big Data Analytics on TwitterNuanwan Soonthornphisaj, Sarach Tuomchomtam. 170-180 [doi]
- Fuzzy Control of Microwave Dryer for Drying Chinese JujubeShujie Song, Yufang Liu, Wuqi Zhao. 181-190 [doi]
- FDG-SD: A New Hybrid Technique for Solving Subgroup Discovery ProblemLydia W. Rizkallah, Sally Hamouda, Nevin M. Darwish. 191-197 [doi]
- Automatic Demographic and Personality Extraction from Anonymous Social MediaSarach Tuomchomtam, Nuanwan Soonthornphisaj. 198-204 [doi]
- Propagation of Uncertainty Expressed in Intervals on the Confidence of Fuzzy Association RulesMichal Burda, Viktor Pavliska. 205-211 [doi]
- Computation of Virtual Training Samples and the Experiments on Face RecognitionWei Huang, Liming Miao. 212-217 [doi]
- Classification-Based Data Mining Applied in Vehicle Accident PredictionChienHsing Wu 0001, ShangWei Kuo, Shu-Chen Kao. 218-223 [doi]
- A Rapid Hybrid Method for Powered Reentry Trajectory Planning with Uncertain No-Fly Zone ConstraintsMuyin Tian, Zuojun Shen. 224-236 [doi]
- Semantic Data Mining Based on Ranking in Internet-Enabled Information SystemsDmitry G. Korzun, Anatoly V. Voronin, Ilya Shegelman. 237-242 [doi]
- Adaptive Fuzzy Sliding Mode-Based Steering Control of Agricultural Tracked RobotJun Jiao, Wenzhou Wang, Yutong He, Yawen Wu, Feng Zhang, Lichuan Gu. 243-254 [doi]
- Speed Up the Process of Reinforcement Learning for Robot GraspingFengkai Ke, Daxing Zhao, Guodong Sun, Wei Feng. 255-260 [doi]
- Feature Reduction Based on Modified Dominance Soft SetJothi Ganesan, Hannah Inbarani H, Ahmad Taher Azar, Khaled Mohamad Almustafa. 261-272 [doi]
- A Smart Weighted-Louvain Algorithm for Community Detection in Large-Scale NetworksDongming Chen, Ye Yuan, Ruikai Zhang, Xinyu Huang, Dongqi Wang. 273-281 [doi]
- Physical Experimentation Using Waterjet for Animal Skin IncisionGeorge Abdou, Nadi Atalla. 282-288 [doi]
- On Axiomatic Characterizations of Positive-Negative Region Covering-Based Rough SetsLirun Su, Yan Lin, Xiao Zhao. 289-295 [doi]
- Image Enhancement of Palm Veins Based on Adaptive Fusion and Gabor FilterMengying Lou, Yaqin Liu, Feng Yang, Jing Huang. 296-304 [doi]
- Variational Autoencoders for Baseball Player EvaluationGeoffrey A. Converse, Brooke Arnold, Mariana Curi, Suely Oliveira. 305-311 [doi]
- A Conflict Style Large Group Dynamic Emergency Decision-Making Method Based on Time SeriesXuanhua Xu, Zhao Yang, Shanglong Liu, Yuzhou Hou. 312-330 [doi]
- Local Metropolis Move in Variable Dimension Model for Finance. A Bayesian Markov Chain Monte Carlo ApproachWantanee Poonvoralak. 331-336 [doi]
- The Degree of Arity ≤ n About M-Fuzzifying Convex SpaceDan Wang, Shao-Jun Yang, Xinyi Huang. 337-343 [doi]
- Public Opinion Monitoring and Analysis System Based on LocalizationDingguo Yu, Xiaoyu Miao, Jiefang Zhang. 344-350 [doi]
- Learning Coefficients and Information CriteriaMiki Aoyagi. 351-362 [doi]
- 21 NormGuowang Du, Lihua Zhou, Lizhen Wang, Qing Xiao, Hongmei Chen. 363-370 [doi]
- Facial Expression Recognition Based on PCA-SIFT and Fuzzy-Edge DetectionShuang Chen, Tao Ren, Puqing Dong. 371-378 [doi]
- Joint Scheduling of Tasks and VM Migrations with Multi-Objectives in SaaS CloudYanping Xiao, Puheng Zhang, Kai Tang. 379-389 [doi]
- Definitive Screen Design Optimization of Jeep Performance on Countryside Terrain with a Video Game ModelJulianne M. Chiu, Mason Chen. 390-398 [doi]
- Application of Clustering in Modeling User Preference for LeisureAliaksei Miniukovich, Marcelo Rodas Britez, Maurizio Marchese. 399-411 [doi]
- Possible Architecture and Some Neuro-Fuzzy Algorithms of an Intelligent Control System for Open Pit Mines Transport FacilitiesIgor O. Temkin, Sergey A. Deryabin, Iliya Konov, Maxwell Kim. 412-420 [doi]
- Comparing Neural and Regression Models to Predict NBA Team RecordsAlan Yao. 421-428 [doi]
- Idea Development from Consumers' Complaint Messages Using Data MiningShu-Chen Kao, Shun-Wei Syu. 429-434 [doi]
- Regret Decision-Making Based on Basic Probability Assignment FunctionLipeng Pan, Yong Deng 0001. 435-442 [doi]
- Celebrity Influence on Traditional Festival Analysis Based on Social Network Data MiningYufan Song, Jianlu Hu, Haijun Qian, Huilin Yuan. 443-449 [doi]
- Exploring the Big Pictorial Data for Tourists' Perception Analysis Through Three Deep Learning ModelsKun Zhang, Hui Li, Jinyi Zhang, ChunLin Li. 450-456 [doi]
- Incremental Collaborative Clustering Using Information Theory and Information CompressionJérémie Sublime. 457-464 [doi]
- Genetic Algorithm Based Optimization of Deep Neural Network Ensemble for Personal Identification with Face and Voice FeaturesXuanang Feng, Jianing Zhao, Bate He, Eisuke Kita. 465-474 [doi]
- Bridge Apparent Damage Detection System Based on Deep LearningWenying Song, Shuri Cai, Hongxiang Guo, Feng Gao, Jinquan Zhang, Gang Liu, Han Wei. 475-480 [doi]
- Bridge Moving Load Recognition Based on Deep LearningFeng Gao, Shuri Cai, Hongxiang Guo, Wenying Song, Jinquan Zhang, Gang Liu, Han Wei. 481-486 [doi]
- A Novel Chinese Character Recognition Method Based on Multi-Modal FusionJin Liu, Shiqi Lyu, Chao Yu, Yihe Yang, Cuiju Luan. 487-492 [doi]
- Iterative Solution of Multi-Shifted Linear Systems with Multiple Right-Hand SidesDong-Lin Sun, Bruno Carpentieri, Ting-Zhu Huang, Yan-Fei Jing. 493-500 [doi]
- Applications of Financing Optimization Algorithms in Internet Financial SystemChunhui Chen, Siqi An, Handun Xiang. 501-510 [doi]
- A Novel Framework for Anomaly Detection via Feature Selection and Dimensionality ReductionHaotian Chang, Jing Feng, Chaofan Duan, Chao Yan, Min Yin, Yi Li. 511-522 [doi]
- A Stock Decision Model Based on Optimized Neural Network AlgorithmQiansheng Zhang, Jingru Zhang, Zisheng Chen, Miao Zhang, Songying Li. 523-533 [doi]
- Generating Data to Alleviate Data Imbalance Problems in Machine LearningAyahiko Niimi, Kosuke Sakamoto. 534-541 [doi]
- Road Crack Classification Based on Improved VGG Convolutional Neural NetworkHua Cui, Xingwang Liu, Lixin Han, Zefa Wei. 542-547 [doi]
- Trajectory Tracking of Electrical Mobility Aids Using L2 Robust Controller MethodsDianchun Bai, Pengfei Yu, Junyou Yang. 548-557 [doi]
- Research on Pavement Skid Resistance Performance Prediction Model Based on Big Data Analysis and XGBoost AlgorithmSili Li, Qianli Shang, Bo Tian. 558-563 [doi]
- Research on Management Decision Based on Machine Learning: Taking the Decision of Location Selection of a Pharmaceutical Retail Enterprise as an ExampleZhemin Shan, Hang Song. 564-574 [doi]
- Multi-Factor Model Optimization Based on Machine LearningChenwei Ren, Hang Song, Wei Liu. 575-582 [doi]
- Discovering Spatial Co-Location Patterns by Automatically Determining the Instance NeighborVanha Tran, Lizhen Wang, Hongmei Chen. 583-590 [doi]
- Intelligent CFAR Detector Based on Histogram and Bagged CARTTran Thi Thanh, Tran Quoc Tuan, Nguyen Xuan Thang, Tran Vu Hop. 591-599 [doi]
- Discovering Spatial Co-Location Patterns Under Considering the Distribution of Spatial FeaturesTaizhou Hu, Lizhen Wang, Qing Xiao. 600-612 [doi]
- A Multi-Objective Approach to Solve an Optimal Control Problem Applied to a Simplified Activated Sludge System ModelIsabel A. Espírito-Santo, Lino A. Costa, M. Teresa T. Monteiro. 613-618 [doi]
- Loss Function Optimization Based on Adversarial NetworksWei Liu, Fan-Yang Meng, Yong-Sheng Liang, Huo-Xiang Yang, Chang-Wei Wang. 619-634 [doi]
- An Approach for Conversion of Japanese Emoticons into Emoji Based on Character-Level Neural AutoencoderAkira Fujisawa, Kazuyuki Matsumoto, Minoru Yoshida, Kenji Kita. 635-644 [doi]
- Active Learning of Predefined Models for Information Extraction: Selecting Regular Expressions from ExamplesAlberto Bartoli, Andrea De Lorenzo, Eric Medvet, Fabiano Tarlao. 645-651 [doi]
- Incremental Mining of Spatial Co-Location Patterns Based on the Fuzzy Neighborhood RelationshipMeiJiao Wang, Lizhen Wang, Yanjun Qian, Dianwu Fang. 652-660 [doi]
- A Controller Design Based on Affine T-S Fuzzy Model via Coordinate TransformationHugang Han, Daisuke Hamasaki. 661-666 [doi]
- Jumping Fuzzy General Finite Automata and Their Simplified DescriptionPavel Martinek. 667-672 [doi]
- Clustering Based on Covariance Matrix for Pollution Areas Identification in ERT Monitoring of Contaminated SitesMengxiao Liu, Zhixun Liu, Yuling Wang, Ming Wang, Jianrong Cao, Bo Zhang. 673-679 [doi]
- Study on Asymmetric Deflection Control Scheme of SDR for Flying Wing AircraftJingping Shi, Ziwei Shi, Yongxi Lyu, Xiaobo Qu. 680-687 [doi]
- Student Modeling Using Convex Factorization MachinesShinichi Oeda, Daiki Shimizu, Hikaru Yamashita. 688-693 [doi]
- Fuzzy Logic Based Unsteady Aerodynamics Modeling and Analysis of Advanced AircraftYongxi Lyu, Yuyan Cao, Jingping Shi, Huakun Chen. 694-704 [doi]
- Interval Type-2 Fuzzy Control Using Distending FunctionJózsef Dombi, Abrar Hussain. 705-714 [doi]
- An Empirical Mode Decomposition (EMD) Enabled Long Sort Term Memory (LSTM) Based Time Series Forecasting Framework for Web Services RecommendationVijendra Pratap Singh, Manish Kumar Pandey, Pangambam Sendash Singh, Karthikeyan Subbiah. 715-723 [doi]
- A Deep Learning Approach for Traffic Condition Prediction with Dependency Extraction and TransferYi Ren, Xu Chen, Kaigui Bian, Kunqing Xie. 724-731 [doi]
- A Research on Solving Multi-Objective Service Selection Problem Based on Service Request FlowLiping Huang, Xun Yuan, Yan Gao, Jun Na, Bin Zhang. 732-738 [doi]
- Research on Experimental Teaching of Virtual and Real Welding Technology and Engineering SpecialtyHaifeng Yang, Fa Liu, Wei Jia Zhou, Hongyun Zhao, Bo Zhong. 739-745 [doi]
- A Novel Borehole Video Expansion and Mosaic Algorithm for Un-Aligned Hole and Camera CentersHongmei Xie, He Qiu, Xiaobo Yang. 746-759 [doi]
- Predicting Chronic Diseases Based on Split and Merge Method and Streaming Feature Causal Structure Learning AlgorithmSensen Lu, Jing Yang, Yu Chen. 760-766 [doi]
- Discussion on the Application of Virtual Experiment Technology in Experimental Teaching in UniversityHaifeng Yang, Wei Jia Zhou, Fa Liu, Bo Zhong, Hongyun Zhao. 767-773 [doi]
- Operating Performance Assessment for Smart Electric Meter Based on Improved Evidence TheorySiqi Zhang, Tian Li, Yuxin Yang, Ziwei Guo, Yungang Zhu. 774-779 [doi]
- Comparison of Accuracy Estimation for Weighted k-Nearest Neighbor ClassifiersMing Zhao, Jingchao Chen, Mengyao Xu. 783-791 [doi]
- Video Content Features Based Fast Intra Prediction Algorithm on HEVCGuanxiong Feng, Bo Huang, Jian Chen, Linhuang Wu, Deshan Zhuo. 792-797 [doi]
- Technical Architecture and Security Design of Ex-Post Supervision Systems of Commercial BanksXiaohui Wang. 798-804 [doi]
- Cooperative Navigation and Positioning for Multi-AUVs Considering the Effect of Ocean CurrentKang Luo, Haiying Cui, Jing Zhou, Xiaokang Li. 805-813 [doi]
- The Waveform Generator and Monitor Based on FPGA&DSP for the Pulsed Power SupplyLi Shen, Guozhong Zhou, Jun Zhai, Haibo Li. 814-820 [doi]
- Multi-Obstacle Tracking Algorithm Based on Depth Image of LidarChengshun Jiang, Han Yang, Yegang Chen. 821-833 [doi]
- An On-Line Self-Routing Scheme for Bio-Inspired Self-Repairing HardwareXiangli Feng, Xiubin Liu, Yanling Qian, Long Wang, Yue Li. 834-843 [doi]
- m)Qingjun Cai, Yuli Zhang. 844-854 [doi]
- Consideration of Some Aspects of Designing with the Digital to Analogue ConverterBernard Tonderayi Mangara. 855-860 [doi]
- Convex Programming for Nonideal Antenna Array Synthesis Based on Interval AnalysisYing Zhang 0024, Weirong Sun, Lin Kuang, Jian Feng, Xiaofeng Shen. 861-869 [doi]
- Research on a Security Chip Power-Down Test Method Based on MP300 DeviceQingqin Fu, Jun Liu, Rui Nie, Zhengquan Ang, Jia Liu, Zheng Li, Ling Yi, Pingjiang Xu, Yujie Shi, Zhaoqing Liang, Jiahui Yuan. 870-875 [doi]
- Relative Wireless Positioning for Multiple Client Devices Using Delta TriangulationMarat Zhanikeev. 876-883 [doi]
- Experimental Analysis of Creep Performance of Rubber Conveyor BeltMeili Dai. 884-888 [doi]
- A Novel Secondary User Selection-Based Cooperative Spectrum Sensing Scheme for Cognitive Radio NetworksLin Hu, Yijiu Zhao, Houjun Wang. 889-895 [doi]
- Indoor RadioFrequency Signal Propagation and Attenuation Prediction Hybrid Modelling and Wireless Local Area Network Case Study SimulationA. A. Geraldo, M. G. Almeida. 896-907 [doi]
- Dynamic Magnetic Resonance Image Reconstruction Based on Rosette Sampling and Tensor Singular Value DecompositionWen Xu, Xiaomei Yang, Jiaying Deng. 908-920 [doi]
- An Information Security Management Approach for an Electoral Process in EcuadorSegundo Moisés Toapanta Toapanta, Andrea Paola Valero Carrillo, Bertha Alice Naranjo Sánchez, Luis Enrique Mafla Gallegos. 921-932 [doi]
- Methodology to Ensure Information Security in a Distributed Architecture for a Public Organization of EcuadorSegundo Moisés Toapanta Toapanta, Felix Gustavo Mendoza Quimi, Kevin Eduardo Ortiz Pazmiño, Rocío Maciel Arrellano, Luis Enrique Mafla Gallegos. 933-944 [doi]
- Design of Multiple-Valued Logic Unit by Using R-HBT-NDR-Based MemristorMi Lin, Qiao Wu, Weifeng Lyu, Lanye Wang, Luping Li. 945-950 [doi]
- Low Complexity SLM Method Based on Threshold Classification for PAPR Reduction in OFDM SystemsZhuang Zhou, Lingyin Wang, Chi Hu. 951-957 [doi]
- Cognitive CAPTCHA Based on Perceptual AbilitiesLidia Ogiela, Urszula Ogiela, Marek R. Ogiela. 958-962 [doi]
- Time Sensitive Network Fault Detection and Location Method Based on Segment RoutingXiangli Zhang, Tiantian Xu, Kun Yan, Hongmei Zhang. 963-968 [doi]
- Design of Network Slicing System Based on SDN/NFVXiangli Zhang, Di Wang, Kun Yan, Hongmei Zhang. 969-974 [doi]
- Energy Consumption Balancing Algorithms on Optimizing Dynamic Topology in WsnsDongMei Xing. 975-983 [doi]
- An Outlier Detection Algorithm Based on Differential PrivacyZhaoyu Shou, Ye Yan, Fengbo Zou. 984-990 [doi]
- RFID Localization Based on Optimized Path Loss Propagation ModelLicai Zhu, Hao Yang 0002. 991-996 [doi]
- Authentication and Key Distribution Scheme for Two-Tiered IoT Based on PUFYanan Liu, Shuo Qiu, Ruchan Dong, Zhiguo Bian. 997-1003 [doi]
- A Fast-Settling Fractional-N PLL with Presetting Frequency and Dynamic Bandwidth ControlYao Li, Bo Zhou, Fuyuan Zhao. 1004-1011 [doi]
- Design of a Novel Fractional Order Sliding Mode Controller for Hypersonic Vehicle Attitude ControlWeijie Bai, Yongzhi Sheng, Hao Huang. 1012-1018 [doi]
- Research on Radar Pulse Flow Signal Formation Algorithm Based on Hash AlgorithmHua Zhang, YunTao Chen, Chunyong Han, Yi Wang. 1019-1025 [doi]
- Orthogonal Low Rank Tucker Decomposition for 2D+3D Facial Expression RecognitionYunfang Fu, Qiuqi Ruan, Yi Jin, GaoYun An. 1026-1037 [doi]
- Security Technologies to Improve Risk Management Against Natural or Anthropic Disasters in EcuadorSegundo Moisés Toapanta Toapanta, Javier Gonzalo Ortiz Rojas, Katherine Natalie Arévalo Loor, Luis Enrique Mafla Gallegos. 1038-1044 [doi]
- A Feature Point Matching Algorithm Based on Space Geometrical CharacteristicsFeng Jin, Yican Liang. 1045-1050 [doi]
- Evolution of the Internet Architecture, from Network Model to Internet Brain ModelFeng Liu, Ying Liu, Yong Shi. 1051-1056 [doi]
- Analysis and Comparison of Multi-Source Information Fusion TechnologiesYang Li, Ming Zhao, Mengyao Xu, Yunfei Liu, Yuchen Qian. 1057-1063 [doi]
- Prediction of High Frequency Trading Financial Data Using Stacked LSTMs for Algorithmic TradingJun Liu, Qingqin Fu, Onur Yilmaz. 1064-1070 [doi]
- Design and Analysis of a Multiple-Valued Hysteretic Characteristic Unit Based on RTDLanye Wang, Mi Lin, Qiao Wu, Weifeng Lyu, Luping Li. 1071-1076 [doi]
- The Environment Quality Evaluation and Prediction Algorithm Based on WSNQian Li, Saihua Cai, Ruizhi Sun. 1077-1084 [doi]
- Bayesian Belief Networks-Based Fault-Alarm Assessment in Communication NetworksRongyu Liang, Feng Liu, Hongreng Li, Zhiguo Zhang. 1085-1091 [doi]
- Spatial Colocation Pattern Mining with the Maximum Membership ThresholdMeiJiao Wang, Lizhen Wang, Lihua Zhou. 1092-1100 [doi]
- The Application of the Dijkstra Algorithm in the Tourist Route PlanningYonglin Xu, Na Zhang, Qiancan Pu-Hua. 1101-1110 [doi]
- An Improved Unbounded HIBE Scheme in the Prime Order SettingSong Luo, Su Yu, Lu Yan, Zheng Yang 0001. 1111-1117 [doi]
- Infrared Dim and Small Target Detection Based on Spatio-Temporal Spectral SaliencyKai Zhang, Chenhui Li, Shaoyi Li, Xiaotian Wang, Saisai Niu. 1118-1123 [doi]
- Comparison on Two Methods for Ground Target Bearing Estimation Based on the Theory of Acoustic Vector SensorZongyi Cai. 1124-1129 [doi]
- Combining Clustering and SVR for Predicting Passengers of Regional Airports on Limited SampleMengyao Xu, Ming Zhao, Yang Li, Youhao Zhang, Yang An. 1130-1137 [doi]
- A Hybrid Blockchain System Based on Parallel Distributed Architecture for Central Bank Digital CurrencyYanghua Cao, Jinnan Zhang, Xueguang Yuan, Teng Guo, Changqi Lu, Gang Chen, Jian Kang, Xin Yan, Xia Zhang, Yongqing Huang. 1138-1145 [doi]
- Simplified DST Matrix-Based RD Cost Estimation Model and Hardware Architecture in Video CodingLihan Dong, Zhifeng Chen, Bo Huang, MingKui Zheng. 1146-1157 [doi]