Abstract is missing.
- Decision making with the induced generalised OWA operator and Dempster-Shafer theoryYouzhi Zhang, Xudong Luo. 1-5 [doi]
- Evaluation of multi-cloud computing TMR-based model using a cloud simulatorMohammed Abdullatif Alzain, Ben Soh, Eric Pardede. 6-11 [doi]
- Fuzzimetric Type-2 sets representation using fuzzimetric arcsIssam Kouatli. 12-17 [doi]
- Fuzzy T-type filters in pseudo-BCI algebrasXiaohong Zhang, Xiaoyan Mao. 18-23 [doi]
- Mixture data-driven Takagi-Sugeno fuzzy modelZhi-gang Su, Babak Rezaee, Pei-Hong Wang. 24-30 [doi]
- Q-increment deterministic annealing fuzzy c-means clsutering using Tsallis entropyMakoto Yasuda. 31-35 [doi]
- Several classes of polynomial-time solvable fuzzy relational inequalitiesFangfang Guo, Yonghong Ren. 36-41 [doi]
- A study on fault diagnostic method for the lube oil system of gas turbine based on rough sets theoryShuang Yi, Ningbo Zhao, Shuying Li, Zhiqiang Xu. 42-48 [doi]
- Covering-based rough sets on covering-circuit matroidsBin Yang, William Zhu. 49-54 [doi]
- Performance diagnosis of elite table tennis competition based on rough set theoryJie Wang, Qingyan Kong. 55-60 [doi]
- Rough approximations in tolerance rough set modelsJilin Huang, Yanyong Guan, Jianting Shen, Hongkai Wang. 61-66 [doi]
- The vehicle routing problem for the coal mine dangerous materials distributionBingyi Li, Hong Zhang, Jinling Li. 67-71 [doi]
- A knowledge-based procedure for remote sensing image classificationLimin Zhang, Tao Xu, Jianting Zhang, Yingfu Yu. 72-76 [doi]
- Aerial image clustering analysis based on genetic fuzzy c-means algorithm and Gabor-Gist descriptorZhiming Shang, Zhaorong Lin, Gaojin Wen, Na Yao, Chunxiao Zhang, Qian Zhang. 77-81 [doi]
- Parameter selection for suppressed fuzzy c-means clustering algorithm based on fuzzy partition entropyJing Li, Jiulun Fan. 82-87 [doi]
- Root cause reasoning based on fuzzy fault Petri net for petroleum engineering systemsJinqiu Hu, Laibin Zhang, Wenqiang Li, Wenhui Tian. 88-93 [doi]
- Sampling strategies and sample redundancy in population-based fuzzy modeling and classificationRuijun Dong. 94-97 [doi]
- Subspace analysis of spectral features for speaker recognitionLing Chen, Hong Man, Huading Jia, Zhiyi Wang, Lei Wang, Zili Li. 98-102 [doi]
- The application of fuzzy analysis method to the evaluation of grain productionHui Zhao, Qian Li, Li Li, Guanjun Zhang. 103-107 [doi]
- The research on the risk assessment of aquatic product cold chain based on fuzzy comprehensive evaluationKang Li, Jianguo Zheng. 108-113 [doi]
- Unstructured road detection based on fuzzy clustering arithmeticXiao Liu, Keke Shang, Jie Liu, Chun Yu Zhou. 114-118 [doi]
- Application of fuzzy rule-based classifier to CBIR in comparison with other classifiersTatiana Jaworska. 119-124 [doi]
- Density-driven fuzzy connectedness for image segmentationMa Ru-Ning, Ding Jun-Di. 125-130 [doi]
- FPGA implementation of A MASH 1-1-1 delta-sigma modulator infractional-N phase locked loop for fuzzy control applicationWen Cheng Lai, Jhin-Fang Huang, Cheng-Lun Wen, Wang-Tyng Lay. 131-134 [doi]
- Multisensor multichannel image fusion based on fuzzy logicM. A. Rahman, Stephen Ching-Feng Lin, C. Y. Wong, Guannan Jiang, Ngai Ming Kwok. 135-140 [doi]
- A heuristic algorithm to VRP with the consideration of customers' service preferenceJun Li, Jianyong Zhang. 141-146 [doi]
- A hybrid genetic algorithm to the vehicle routing problem with fuzzy cost coefficientsJianyong Zhang, Jun Li. 147-152 [doi]
- Performance evaluation of bank microfinance based on fuzzy mathematics and AHPQiguang Zhang, Chong Wu, Wei Guo. 153-158 [doi]
- An evaluation index system of american sports coaches in the centuryDongxue Sun, Yuefei Liu, Song Xin. 159-164 [doi]
- Fuzzy control design for thermostatically controlled loads considering consumers' thermal comfortRongxiang Zhang, Xiaodong Chu, Wen Zhang, Yutian Liu, Yuanhong Hou. 165-170 [doi]
- Multi-objective fully fuzzy linear programming problems with triangular fuzzy numbersXiao-Peng Yang, Bing-yuan Cao, Hai-Tao Lin. 171-177 [doi]
- Neuro fuzzy model with singular value decomposition for forecasting the number of train passengers in YogyakartaAgus Maman Abadi, Dhoriva Urwatul Wutsqa. 178-182 [doi]
- Projection pursuit fuzzy rules classification evaluation method of commercial creditQianqian Chen, Yehua Chen. 183-187 [doi]
- Self-balanced bicycle rental systems under dynamic demand forecastingWenbo Kuang, Zhengtian Xu, Huapu Lu. 188-193 [doi]
- Self-tuning performance of database systems based on fuzzy rulesZhijie Wei, Zuohua Ding, Jueliang Hu. 194-198 [doi]
- An emergency logistics transportation path optimization model by using trapezoidal fuzzyShu-Cheng Xiao, Jia-Feng Wu, Hong He, Zhen-Dong Yang, Xin Shen. 199-203 [doi]
- A hybrid multiple attribute decision-making approach for evaluating weapon systems under fuzzy environmentShanliang Yang, Song Wang, Xiao Xu, Ge Li. 204-210 [doi]
- A new approach for multiple attribute decision making under linguistic environmentJibin Lan, Xiaochun Mo, Shangfei Lu, Zhongxing Wang. 211-216 [doi]
- Assessment of water use benefits in irrigation district - An application of variable fuzzy modelSubing Lu, Wenchuan Wang, Cancan Liu. 217-221 [doi]
- Auto-tuning method of fuzzy PID controller parameter based on self-learning systemZhangli Yang, Lei Li, Buqing Liu. 222-226 [doi]
- Complex lithology automatic identification technology based on fuzzy clustering and neural networksWei Zheng, Xiuwen Mo. 227-231 [doi]
- Defuzzification methods in intuitionistic fuzzy inference systems of Takagi-Sugeno type: The case of corporate bankruptcy predictionPetr Hájek, VladimÃr Olej. 232-236 [doi]
- IFSDA: An intuitionistic fuzzy set-based data aggregation approach for software maintainability evaluationYan Nan, Hengshan Zhang, Qinghua Zheng, Di Wang, Ting Liu, Boqin Feng. 237-242 [doi]
- Listed commercial bank credit evaluation of financial performance based on AHPQiguang Zhang, Chong Wu, Wei Guo. 243-248 [doi]
- Prioritization of strategies to achieve world-class manufacturing using a hybrid approach of fuzzy multiple criteria technique: Case study from Quanzhou industrial clustersQingquan Jiang, Mojtaba Rees Safari, Liu Zhen-yu, Qinglan Chen. 249-254 [doi]
- Ranking fragile states for support facility: A fuzzy topsis approachEric Afful-Dadzie, Stephen Nabareseh, Petr Klimek, Zuzana KomÃnková Oplatková. 255-261 [doi]
- Recognition of outer membrane proteins using adaptive neuro-fuzzy inference systemsZhijun Wang, Qiangyan Pan, Lifeng Yang, Chunyan Xu, Feng Yu, Liang Li, Jianhua He. 262-267 [doi]
- Research on condition-based maintenance strategy of protection systems based on multistage fuzzy comprehensive evaluationZhijun Li, Zhihui Dai, Yanjun Jiao. 268-272 [doi]
- Robust stabilization for uncertain fuzzy singular systems with interval time-varying delayFeng Hu, Rui Yang. 273-277 [doi]
- Sustainability performance evaluation of renewable energy systemsSantoso Wibowo, Srimannarayana Grandhi. 278-283 [doi]
- An improved parallel association rules algorithm based on MapReduce framework for big dataXinhao Zhou, Yongfeng Huang. 284-288 [doi]
- ARAS: Efficient generation of Association Rules Using Antecedent SupportShalini Bhaskar Bajaj. 289-294 [doi]
- On top-k closed sequential patterns miningJing Wang, Lei Zhang, Guiquan Liu, Qi Liu, Enhong Chen. 295-300 [doi]
- A novel ensemble classifier based on multiple diverse classification methodsHai Wei, Xiaohui Lin, Xirong Xu, Lishuang Li, Weijian Zhang, Xiaomei Wang. 301-305 [doi]
- A novel feature voting model for text classificationSen Jia, Jinquan Liang, Yao Xie, Lin Deng. 306-311 [doi]
- Computer anomaly detection based on the moving averages of the power series distributed random sequenceDeqiang Chen. 312-316 [doi]
- Hybrid self-configuring evolutionary algorithm for automated design of fuzzy logic rule baseVladimir Stanovov, Eugene Semenkin. 317-321 [doi]
- Land-use classification of Zhanghe river basin using the maximum likelihood and decision tree methodHao Wang, Hongrui Zhao, Wanqing Li. 322-327 [doi]
- A biclustering algorithm with coherent evolution on the contiguous columns facing time-series gene dataYun Xue, Meihang Li, Zhengling Liao, Jie Luo, TieChen Li, Hua Xiao, Xiaohui Hu. 328-333 [doi]
- A common-subsequence-based approach for mining deep order preserving submatrixYun Xue, TieChen Li, Zhiwen Liu, Zhengling Liao, Hua Xiao, Hongya Zhao, Xiaohui Hu. 334-340 [doi]
- A new approach for mining deep order-preserving submatricesZhengling Liao, Jie Luo, Meihang Li, Yun Xue, TieChen Li, Xiaohui Hu. 341-345 [doi]
- Academic co-author networks based on the self-organizing feature mapGege Zhang, Weixing Zhou, Yuanyuan Zhang, Xiaohui Hu, Yun Xue, Jianping Wang, Meihang Li. 346-351 [doi]
- Distributed clustering using distributed mixture of probabilistic PCAHang Yin, Chunhong Zhang, Yang Ji. 352-357 [doi]
- Image clustering based on SIFT-affinity propagationYanpeng Zhang, Hong Zhang. 358-362 [doi]
- Online bidding system based on Cournot model using K-means clusteringJun Tan, Yan-Jiang Jia. 363-368 [doi]
- A hybrid method for short-term sensor data forecasting in Internet of ThingsPeng Ni, Chunhong Zhang, Yang Ji. 369-373 [doi]
- A statistical learning approach to Chang'E microwave radiometer data calibrationK. T. Tsang, S. Fu, J. Gu, M. Zhou, K. L. Chan, Y. C. Zheng. 374-378 [doi]
- Combining frequent itemsets and statistical features for texture classification in relative phase domainLi Liu, Chen Chen, Longfei Yang. 379-384 [doi]
- Compressed partial least squares regression: A supervised method for multi-label dataZongjie Ma, Huawen Liu, Zhonglong Zheng, Jianmin Zhao, Xiaodan Xu. 385-389 [doi]
- Mining related information of traffic flows on lanes by k-medoidsTing Zhang, Yingjie Xia, Qianqian Zhu, Yuncai Liu, Jianhui Shen. 390-396 [doi]
- Parallel feature selection using positive approximation based on MapReduceQing He, Xiaohu Cheng, Fuzhen Zhuang, Zhongzhi Shi. 397-402 [doi]
- A knowledge base with dependenciesChaohui Zhuang. 403-407 [doi]
- Enterprise knowledge cooperation network based on business time-sequence relationshipZeqing Liu, Hongfei Zhan, Junhe Yu. 408-412 [doi]
- Compressive neighborhood embedding for classificationYuan Chen, Zhonglong Zheng. 413-417 [doi]
- Daily sound recognition for elderly people using ensemble methodsArslan Shaukat, Muhammad Ahsan, Ali Hassan, Farhan Riaz. 418-423 [doi]
- Dynamic threshold model based probabilistic latent semantic analysisYiming Wang, Yangdong Ye, Zhenfeng Zhu. 424-429 [doi]
- Ensemble based data stream mining with recalling and forgetting mechanismsYanhuang Jiang, Qiangli Zhao, Yutong Lu. 430-435 [doi]
- Ensemble learning model for P2P traffic identificationShengxiong Deng, Jiangtao Luo, Yong Liu, Xiaoping Wang, Junchao Yang. 436-440 [doi]
- Research on attribute reduction based on L-contextCan Wang, Xi Yu. 441-446 [doi]
- A novel Naxi dependency parsing method based on rules and statisticsMeng Su, Zhengtao Yu, Shengxiang Gao, Lanjiang Zhou, Mingjia An. 447-452 [doi]
- Hierarchical structure invariance and optimal approximation for proximity dataXiao-Li Xue, Li-Tan Peng, Hua Tao, Wei-Wei Li, Xu-Qing Tang. 453-459 [doi]
- Neural network-based reranking model for statistical machine translationHaipeng Sun, Tiejun Zhao. 460-465 [doi]
- p-Adic valued fuzzyness and experiments with physarum polycephalumAndrew Schumann. 466-472 [doi]
- Synthesizing data-to-wisdom hierarchy for developing smart systemsKaiyu Wan, Vangalur S. Alagar. 473-478 [doi]
- Hub selection for hub based clustering algorithmsZhenfeng He. 479-484 [doi]
- Lightning and nuclear explosion pattern recognition from optical and electromagnetic dataPeng Li, Yi Zheng, Chao Han, Yan Ma. 485-489 [doi]
- A decision support system based on fuzzy specialized rules for the Alzheimer diseaseFiras Zekri, Hanên Ghorbel, Rafik Bouaziz. 490-496 [doi]
- A novel method for diagnosing premature ventricular contraction beat based on chaos theoryHaiman Du, Yang Bai, Suiping Zhou, Hongrui Wang, Xiuling Liu. 497-501 [doi]
- Exploring the application of gene ontology semantic similarity measure for identifying protein complexesJiawei Luo, Lingyao Yu, Qian Dang. 502-507 [doi]
- Qualitative modeling and analysis of the indoleamine 2, 3-dioxygenase regulatory network in homeostasis and diseaseKashif Asghar, Jamil Ahmad, Javaria Ashraf, Amjad Ali, Hussnain Ahmed Janjua, Sheeba Murad. 508-512 [doi]
- RapidTree: A solution to rapid reconstruction phylogenetic treeZhen Meng, Jing Shao, Wei Cao, Jianhui Li, Yuanchun Zhou, Xuezhi Wang. 513-517 [doi]
- RCMDE-GMD: Predicting gene ontology terms using differential evolutionRafael Abud Menezes, Júlio César Nievola. 518-524 [doi]
- Stage diagnosis for Chronic Kidney Disease based on ultrasonographyChi-Jim Chen, Tun-Wen Pai, Hamido Fujita, Chien-Hung Lee, Yang-Ting Chen, Kuo-Su Chen, Yung-Chih Chen. 525-530 [doi]
- The analysis of functional modules in primary cardiomyopathiesWan Li, Lina Chen, Xu Jia, Chenchen Feng, Yuehan He, Youwen Du, Min Hou, Xiaoqing Li. 531-536 [doi]
- A dynamic path data cleaning algorithm based on constraints for RFID data cleaningKongfa Hu, Long Li, Chengjun Hu, Jiadong Xie, Zhipeng Lu. 537-541 [doi]
- A data replica placement scheme for cloud storage under healthcare IoT environmentBang Zhang, Xingwei Wang, Min Huang. 542-547 [doi]
- A real-time trajectory indexing method based on MongoDBYuxing Zhu, Jun Gong. 548-553 [doi]
- A robust object detection algorithm based on background difference and LK optical flowGuang Han, Xiaofei Li, Ning Sun, Jixin Liu. 554-559 [doi]
- Designing and optimizing the method for pedestrian detection based on Adaboost algorithmYunpeng Su, Binwen Fan, Qiliang Yang. 560-564 [doi]
- Detection of violent crowd behavior based on statistical characteristics of the optical flowJian-Feng Huang, Shui-Li Chen. 565-569 [doi]
- Geometry calibration for multi-projector display automatically based on the feedback of camera algorithmMeihua Chen, Binwen Fan, Huanyu Song. 570-574 [doi]
- A tripartite graph-based fuzzy co-similarities for document retrievalSonia Alouane-Ksouri, Minyar Sassi Hidri, Kamel Barkaoui. 575-580 [doi]
- A unified latent factor correction scheme for collaborative filteringPenghua Yu, Lanfen Lin, Ruisong Wang, Jing Wang, Feng Wang. 581-586 [doi]
- Global reoccurrence measure for keyword extractionWenzhen Chi, Yijiang Chen, Chang Su, Xiaodong Shi. 587-592 [doi]
- Improving event extraction using online learning strategyJinxiu Chen. 593-597 [doi]
- New feature selection methods based on context similarity for text categorizationYifei Chen, Bingqing Han, Ping Hou. 598-604 [doi]
- Page query language generation for structural extractionHe Hu, Xiaoyong Du. 605-609 [doi]
- Research on Chinese microblog's semantic expansion model based on specific contextZhigang Xu, Lei Liu, Haibo Cai, Shuying Yan. 610-615 [doi]
- A semantic case based web 2.0 tag hierarchy construction frameworkYin Zhang, Kening Gao, Bin Zhang, Li Gao. 616-622 [doi]
- GSLDA: Supervised topic model with graph regularizationQiuling Yan, Dongqing Yang. 623-627 [doi]
- Adaptively incremental dictionary compression method for column-oriented databaseHui Liu, Zhijing Liu, Tong Yuan, Yong Yao. 628-632 [doi]
- Acquiring semantic relation pattern from large microblog textLei Liu, Zhigang Xu, Haibo Cai, Lu Hong Diao, Shuying Yan. 633-637 [doi]
- Address block localization for Chinese postal envelopes with clutter backgroundMeiling Cheng, Jinhua Xu. 638-643 [doi]
- Mining multi-attribute sequential pattern in onboard failure loggingMin Zhu, Yicheng Li, Shaoqin Chen. 644-649 [doi]
- Identification method of particle material heterochromatic object based on color featureYanli Xiang, Ze Zhang, Ruirui Bo. 650-654 [doi]
- An approach to detect network attacks applied for network forensicsKhoa Nguyen, Dat Tran, Wanli Ma, Dharmendra Sharma. 655-660 [doi]
- Combining grey systems theory and entropy method to evaluate the organizational healthXiaoqian Liu, Kan Shi, Lei Xing. 661-665 [doi]
- Investor sentiment affects the trading volume: An evidence from network forums text analysisJuanjuan Lai, Tianlun Zheng, Hongbo Yi, Dayong Dong. 666-670 [doi]
- Mining high-temperature event space-time regions in geo-referenced temperature series dataXue Bai, Yitong Wang, Heng Jiang, Zhicheng Liao, Yun Xiong, Xibin Shi. 671-676 [doi]
- Multi-dimensional time warping based on complexity invariance and its application in sports evaluationYu Wei. 677-680 [doi]
- Node role analysis algorithm based on directed topological potentialXinglong Yu, Bin Wu, Yu Liu. 681-685 [doi]
- Occupation recommendation based on student achievement mining in vocational skill trainingYue Wang, Xiubang Zhang, Lilan Nan, Daling Wang. 686-691 [doi]
- Traffic zone division using mobile billing dataXingxing Xing, Wenhao Huang, Guojie Song, Kunqing Xie. 692-697 [doi]
- A Conjugate Gradient Neural Network for inspection of glass defectsYong Jin, Youxing Chen, Zhaoba Wang. 698-703 [doi]
- A MapReduce based parallel algorithm for CIM data verificationYang Liu 0010, Xiaodong Shen, Lixiong Xu, Maozhen Li. 704-709 [doi]
- Abstract model of k-cloud computingMartin Bobák, Ladislav Hluchý, Viet D. Tran. 710-714 [doi]
- Big data analytics on PMU measurementsMukhtaj Khan, Maozhen Li, Phillip Ashton, Gareth Taylor, Junyong Liu. 715-719 [doi]
- Data locality in Hadoop cluster systemsMukhtaj Khan, Yang Liu 0010, Maozhen Li. 720-724 [doi]
- Data mining in hydrological domainPeter Krammer, Ondrej Habala, Ladislav Hluchý, Katarina Tothova. 725-728 [doi]
- Development of self-localizer using collaboration of trilateration and triangulationByoungsu Lee, Dong-Min Woo, Minkee Park, Seungwoo Kim. 729-733 [doi]
- Digital forensics and NoSQL databasesMan Qi. 734-739 [doi]
- Implementation of a parallel graph partition algorithm to speed up BSP computingShengmei Luo, Lixia Liu, Hongxu Wang, Bin Wu, Yang Liu. 740-744 [doi]
- A MapReduce based parallel algorithm for CIM data verificationYang Liu 0010, Xiaodong Shen, Lixiong Xu, Maozhen Li. 745-750 [doi]
- Study of fuzzy comprehensive evaluation model for shoes comfortXingfang Lu. 751-755 [doi]
- Topic selection in latent dirichlet allocationBiao Wang, Yang Liu 0010, Zelong Liu, Maozhen Li, Man Qi. 756-760 [doi]
- Analysis of resolution limit in community detectionPeng-Gang Sun. 761-765 [doi]
- An improved image retrieval method based on SIFT algorithm and saliency mapJing Liu, Fang Meng, Fangcheng Mu, Yichun Zhang. 766-770 [doi]
- Blind adaptive multi-user detection technique based on improved Kalman filter for underwater acoustic communicationZhong-qiu Wang, Zhen Wang, Hong-ru Wang, Jun-cheng Wang. 771-776 [doi]
- High-accuracy phase-equalizer design based on bi-linearized phase-error functionWei Qin, Noboru Ito. 777-781 [doi]
- Image compressed sensing based on multi-level adaptive learning dictionariesQicong Wang, Meixiang Zhang, Yunqi Lei, Yehu Shen. 782-787 [doi]
- Image compression algorithm based on automatic extracted ROIPeilong Zhao, Jiwen Dong, Lei Wang. 788-792 [doi]
- Key frame extraction based on improved hierarchical clustering algorithmHuayong Liu, Huifen Hao. 793-797 [doi]
- Locating steganographic payloads by combining weighed-stego residuals and maximum a posteriori probability cover estimatorTao Zhang, Xiaomeng Yan. 798-802 [doi]
- Optimized multi-task sparse representation based classification method for robust face recognitionBo Sun, Feng Xu, Dongyang Liu, Qi Kuang, Jun He. 803-807 [doi]
- Parameter estimation of K model of radar cross section for synthetic aperture radar images based on second-kind statisticsZengguo Sun, Zhihua Zhang. 808-813 [doi]
- Radial fourier analysis (RFA) image descriptorStephen Ching-Feng Lin, C. Y. Wong, Guannan Jiang, M. A. Rahman, Ngai Ming Kwok. 814-819 [doi]
- Single image haze removal using dark channel prior and fields of experts modelPucheng Zhou, Yuan Zhou. 820-824 [doi]
- Sketch-based image retrieval by using saliencyDa Pan, Ping Shi, Cuiying Li. 825-829 [doi]
- The contrast experiment on visual attention regions and saliency maps based on the eye trackerYujie Zheng, Xuliu Lan, Junling Li, Fang Meng. 830-834 [doi]
- The face detection and location system based on ZynqTailin Han, Guangw Wen Liu, Hua Cai, Bo Wang. 835-839 [doi]
- An energy efficient routing algorithm based on radar chart for wireless sensor networksSen Feng, Liangrui Tang, Jian-hong Hao. 840-844 [doi]
- Energy independent clustering routing algorithm for wireless sensor networkXunli Fan, Feifei Du, Jun Guo, Jie Zhang. 845-849 [doi]
- Improved decoding of binary Golay codeMing-Zong Wu, Ming-Haw Jing, Chong-Dao Lee, Yaotsu Chang. 850-853 [doi]
- PFPG: A novel MTU model for IPv4/IPv6 transitionRong Xiao, Yungang Wei, Yongkang Xiao, Xiaoming Zhu, Bo Sun. 854-859 [doi]
- Acceleration-level Z2G0 controller for redundant manipulator end-effector trackingJiawei Luo, Xiaotian Yu, Yonghua Yin, Hongzhou Tan, Yunong Zhang. 860-865 [doi]
- Delay synchronization controller for Chua's chaotic circuitsLiping Zhang, Shu-Lin Wu, Kelin Li. 866-870 [doi]
- Robust observer-based fault estimation of switched systemsWen Li, Baotong Cui, Wenying Mu. 871-875 [doi]
- Research on distributed computing of EAI platform systemJun Tao. 876-880 [doi]
- A scaled LSE wirelength model for VLSI global placementJianli Chen, Wenxing Zhu. 881-885 [doi]
- An alliance generation algorithm based on modified particle swarm optimization for multiple emotional robots pursuit-evader problemHao Wang, Cheng Luo, Baofu Fang. 886-891 [doi]
- Methods to monitor process's Spatial and temporal consumptionHuiming Jia, Rui Mao, Wenbo Wu. 892-897 [doi]
- Predict user interest with respect to global interest popularityWenhao Zhu, Kangkang Niu, Guannan Hu, Jiaoxiong Xia. 898-902 [doi]
- The study of methods for post-pruning decision trees based on comprehensive evaluation standardHongtao Xie, Fuhua Shang. 903-908 [doi]
- Unsupervised intrusion detection algorithm based on association amendmentZuohua Wang. 909-913 [doi]
- Fuzziness of rough sets generated by a coveringJun Hu, Feng Hu, Hong Yu. 914-918 [doi]
- Online hot topic detection from web news archive in short termsRuiguo Yu, Mankun Zhao, Peng Chang, MuWen He. 919-923 [doi]
- Ontology based goal and task allocation for autonomous agentsMaryam Nazar, Sarmad Sadik. 924-929 [doi]
- Provenance-based workflow composition with virtual simulation objects technologyPavel A. Smirnov, Sergey V. Kovalchuk. 930-934 [doi]
- A benchmark 3D fingerprint databaseWei Zhou, Jiankun Hu, Ian Petersen, Song Wang, Mohammed Bennamoun. 935-940 [doi]
- A statistical framework for intrusion detection systemMd Enamul Kabir, Jiankun Hu. 941-946 [doi]
- A strategic framework for managing internet securityElena Sitnikova, Mehdi Asgarkhani. 947-955 [doi]
- A survey: Error control methods used in bio-cryptographyHarsha S. Gardiyawasam Pussewalage, Jiankun Hu, Josef Pieprzyk. 956-962 [doi]
- Automatic generation of station catchment areas: A comparison of Euclidean distance transform algorithm and location-allocation methodsTing Grace Lin, Richard Palmer, Jianhong Cecilia Xia, David A. McMeekin. 963-967 [doi]
- Bee-based IP tracebackM. Hamedi-Hamzehkolaie, Reza Sanei, Chi Chen, Xue Tian, Masoud Khalil Nezhad. 968-972 [doi]
- Detecting encrypted metamorphic viruses by hidden Markov ModelsFereidoon Rezaei, Masoud Khalil Nezhad, Saeid Rezaei, Ali Payandeh. 973-977 [doi]
- Evaluating host-based anomaly detection systems: Application of the one-class SVM algorithm to ADFA-LDMiao Xie, Jiankun Hu, Jill Slay. 978-982 [doi]
- Loss rate estimation with incomplete data setWeiping Zhu. 983-988 [doi]
- Optional multi-biometric cryptosystem based on fuzzy extractorChi Chen, Chaogang Wang, Tengfei Yang, Dongdai Lin, Song Wang, Jiankun Hu. 989-994 [doi]
- The effect of spurious and missing minutiae on delaunay triangulation based on its application to fingerprint authenticationWenCheng Yang, Jiankun Hu, Song Wang. 995-999 [doi]
- Using integrated system theory approach to assess security for SCADA systems cyber security for critical infrastructures: A pilot studySuhaila Ismail, Elena Sitnikova, Jill Slay. 1000-1006 [doi]