Abstract is missing.
- Target Localization Based on SIFT AlgorithmBo Lei, Yuanping Jing, Jinlei Ding. 1-7 [doi]
- Find the Mona Lisa in the Louvre Study on Museum Exhibition Space and Visual Oriented SignMin Huang. 8-15 [doi]
- A Biclustering Technique for Mining Trading Rules in Stock MarketsQinghua Huang. 16-24 [doi]
- The Design of Image Similarity Tool Based on SCILABJianfeng Sun, Xiang Li, Yuan Zhan. 25-32 [doi]
- Research of Event-Driven Enterprise Application Integration Base on Service Oriented ArchitectureWei Lu, Yanfen Liu. 33-37 [doi]
- Efficient Top-K Query Algorithms Using Density IndexDongqu Chen, Guang-Zhong Sun, Neil Zhenqiang Gong, Xiaoqiang Zhong. 38-45 [doi]
- Task Allocation Mechanism Based on Genetic Algorithm in Wireless Sensor NetworksXiaoqing Hu, Bugong Xu. 46-58 [doi]
- Investigation of Multi-view Matching Models for Three-Line-Array Digital ImageryDazhao Fan, Song Ji, Rong Lei. 59-65 [doi]
- Classifying Wetland Vegetation Type from MODIS NDVI Time Series Using Fourier AnalysisXiaodong Na, Shuying Zang. 66-73 [doi]
- Application of Hilbert-Huang Transform to Fault Feature Extraction of Offshore PlatformsChunhong Dou. 74-78 [doi]
- A Novel Method of Abnormal Behaviors RecognitionRuitai Li, Chunfang Zhang, Guanghui Zhong. 79-86 [doi]
- Research and Implementation of the Uniform Authentication Based on Web ServiceSonghao Jia, Jinliang Guo, Cai Yang, Xiaoxia Liu. 87-92 [doi]
- Computer-Aided Composition Method of Children's Song Based on Grammatical EvolutionDakun Zhang, Chang Zhang, Guiyuan Jiang. 93-99 [doi]
- Decision Making Technique of Processing TechnologyQing-hua Zou. 100-108 [doi]
- Research of Dynamic Priority Improvement Method in μC/OS-II Real-Time Operating SystemXianmin Wei. 109-112 [doi]
- A New Method of Automatic Monitoring DC Breaker by Using GPRS TechniqueJun Wang, Tao Ning, Zhihua Li, Wei Chen. 113-120 [doi]
- Research of Video Transmission System in Wireless Sensor NetworkChunsen Xu, Yanjuan Zhao, Yan Zhang. 121-126 [doi]
- An Improved Apriori AlgorithmJianlong Gu, Baojin Wang, Fengyu Zhang, Weiming Wang, Ming Gao. 127-133 [doi]
- A Process Modeling Method Based on Cooperation Pattern Research in Airplane DesignAnning Zhou, Yi Liu. 134-142 [doi]
- Present Research Status and Future Trends of Microbial Enhanced Oil RecoverySongyuan Liu, Shuang Liang. 143-149 [doi]
- The Algorithm Design and Application of the Neural NetworkJunping Shi. 150-155 [doi]
- Parameter Estimation of High-Voltage Circuit Breaker Based on Genetic AlgorithmsTao Jin, Wei Chen, Tao Ning, Zhihua Li. 156-164 [doi]
- Development of an Implanted Neural ProsthesesHongyun Liu, Weidong Wang, Zhengbo Zhang. 165-171 [doi]
- Image Feature Extraction Method Based on Shape Characteristics and Its Application in Medical Image AnalysisJianhua Liu, Yanling Shi. 172-178 [doi]
- Study on the Traverse Mechanism with Rotary WingsXu Zhang, Jian Wei, Lijuan Du, Ming Zhao, Tianwei Li. 179-189 [doi]
- Analytic Invariant Curves in a Two Dimensional Complex Discrete Dynamical SystemLingxia Liu. 190-201 [doi]
- Improvements of Genetic Algorithm to the Knapsack ProblemHaibo Zhang, Liwen Cai, Shenyong Gao, Jianguo Cheng, Feng Yu, Daqing Li. 202-206 [doi]
- Polarity Analysis Based on an Improved Feature Selection AlgorithmWeixin Tian, Sheng Zheng, Anhui Wang. 207-214 [doi]
- A New Method for Stochastic Simulation of Macromolecule ConformationShu-yong Hu, Lie-hui Zhang, Heng-shen Yao. 215-222 [doi]
- An Approach for IPSecVPN Network Topology Discovery Based on Layer 3 TopologyDancheng Li, Tianyi Yin, Cheng Liu, Chunyan Han, Yixian Liu. 223-232 [doi]
- Protecting Flow Design for DoS Attack and Defense at the MAC Layer in Mobile Ad Hoc NetworkJian Su, Huining Liu. 233-240 [doi]
- Research of Weighted Frequent Patterns Algorithm Based on Web-Log MiningLixia Zou, Haiyan Xue. 241-247 [doi]
- Research on Method of Bezier Triangular Curved Highway Surface 3D RestructureWeiyong Ji, Jianjun Cui, Shaohua Zhang. 248-253 [doi]
- Study on the Method of Matching with Cartoon Sequence Graphics on the Base of Character′s CentroidBaoyin Zhang, Jianjun Cui, Weiyong Ji. 254-261 [doi]
- Fuzzy Rees Hypercongruences on HypersemigroupsFei Gao, Xiang-Yun Xie. 262-269 [doi]
- The Application of the Pseudo Vector Multiplication in the Image Encryption AlgorithmXiang Liu, Zongying Li. 270-277 [doi]
- Innovation Pattern Recognition of Equipment Manufacturing Industry Based on Jing You MethodXi-lin Hou, Li-Li Zhang, Sen Liu, Xi-nan Zhao. 278-285 [doi]
- Face Recognition Using Discrete Cosine Transform and Fuzzy Linear Discriminant AnalysisQi-wen Zhang, Wen-xia Du, Liu-qing Yuan, Ming Li. 286-293 [doi]
- Morbidity Research on Grey Forecast ModelYing Wei. 294-298 [doi]
- Distributed Range-Free Localization Algorithm for 3D Wireless Sensor Networks under Irregular Radio Propagation ModelJianping Xing, Dehua Wang, Yang Liu. 299-306 [doi]
- HCI Using a Robust Hand Tracking MethodShilin Zhang, Hui Wang. 307-314 [doi]
- A Hybrid Genetic Algorithm to Solve Zero-One Knapsack ProblemQing Chen, Yuxiang Shao. 315-320 [doi]
- Research on the Authenticated Encryption Technology in CCSDSChang-qing Gong, Ya-Hui Yang. 321-329 [doi]
- Quality Assessment in Virtual Surgical TrainingHui Liang, Minyong Shi. 330-337 [doi]
- The Deceptive Effect of Blinking Decoys on ARMsWen-feng Dong, Quan Liu, Zhong-kuan Cheng, Zi-kai Pan. 338-347 [doi]
- Design of Virtual Reclosing SystemQian Zhang, Qun Mei. 348-355 [doi]
- Emulation of Dynamic Secondary Cooling and Soft Reduction in Continuous Slab CastingPeng Rui, Zhang Xiao Long, Zhang Hua. 356-364 [doi]
- Gaussian Process Machine Learning Model for Forecasting of Karstic CollapseYan Zhang, Guoshao Su, Liubin Yan. 365-372 [doi]
- Study of a Scheme of Bid Evaluation by Experts Based on Chinese Remainder TheoremXiaohan Sun. 373-377 [doi]
- Converting Digital Image to SVG for User InteractionQiang Wei, Dancheng Li, Cheng Liu, Binsheng Liu, Zhiliang Liu. 378-385 [doi]
- Research on the Customer Consumption Classification Model Based on RS-NNYinghong Wan, Xiaopeng Cao, Ying Yue, Wanping Hu. 386-396 [doi]
- Influencing Factors of Sports Consumption: Provincial Evidence in ChinaHua Chen, Xinke Yin. 397-403 [doi]
- Study on Security Architecture for Internet of ThingsHui Li, Xin Zhou. 404-411 [doi]
- Emotion Recognition from Physiological Signals Using AdaBoostBo Cheng. 412-417 [doi]
- Search on Security of Wireless Sensor Network in Facilities on Sports VenuesBin Liu, Long Wang, Guo-Feng Zhang. 418-423 [doi]
- Realization of the Minimum Cost Spanning Tree's Storage and Optimization in Prim AlgorithmDa-zhi Pan, Zhi-bin Liu, You-jun Chen, Xian-feng Ding. 424-431 [doi]
- Object Tracking Based on Unmanned Aerial Vehicle VideoXiong Tan, Xuchu Yu, Jingzheng Liu, Weijie Huang. 432-438 [doi]
- Design and Implimentation of Rural New Energy Source Gis System Based on KmlLi Tan, Lu Wang, Chongchong Yu, Jie Liu. 439-447 [doi]
- Development of Real-Time Register System for Printing Press Based on μCOS-IIGuodong Sun, Daxing Zhao. 448-455 [doi]
- Locally Optimum Detection of a Noise Model Based on Generalized Gaussian DistributionYanqing Dai, Gang Tang, Taiyue Wang. 456-462 [doi]
- New Development of Simulation Methods on Refrigeration and Air Conditioning EquipmentsWensheng Cao. 463-468 [doi]
- Assessing Dynamic Neural Networks for Travel Time PredictionLuou Shen, Min Huang. 469-477 [doi]
- Fault Feature Extraction of Gearboxes Using Ensemble Empirical Mode DecompositionJinshan Lin. 478-483 [doi]
- Data Mining Method for Incident duration PredictionLuou Shen, Min Huang. 484-492 [doi]
- Research and Application of Credit Score Based on Decision Tree ModelWei-Li Jiang. 493-501 [doi]
- Rank and Kernel of a Binary CodeXiaoyan Zhang. 502-506 [doi]
- Analysis and Research for Multi-mode Identity Authentication of E-CommerceXiaomin Ge, Cuihong Wu. 507-513 [doi]
- Study of Key Technology for Laser Scanner Based Measurement of Railway Complete ProfileYumei Zhang, Hongmei Shi. 514-521 [doi]
- Path Planning for Mobile Robot Based on Fuzzy ControlTongxiang He, Peng Li, Ningqing Han. 522-531 [doi]
- No-Model Tracking by Data-Driven Method Using BP NetworksXue-bo Jin, Hai-ran He, Ya-ming Wang, Meng-yang Yuan. 532-540 [doi]
- A Controlled Seismic Emulator: Regenerating Earthquakes via a RobotGuangyu Liu, Feng Song, Jiang-Feng Tao, Guang Ma. 541-549 [doi]
- The Location of the WSN-Nodes Based on RSSIJiachun Zheng. 550-559 [doi]
- Lithology Recognitions of Coal-Bearing Strata on BP-ANN in Qiongdongnan Basin, Sea of South ChinaDawei Lv, Xigui Ding, Zengxue Li, Haiyan Liu, Xiaoyan Chen. 560-565 [doi]
- The Intrinsic Relationship between Security Mechanisms and Trust MechanismsYimin Guo, Yajun Guo, Fei Peng, Huidan Gao. 566-572 [doi]
- Research on Real Estate Monitoring and Forewarning System Based on System Dynamics ModelDemin Wu, Wenyong Dong, Chao Zhou, Kai Tang, Aidi Lin. 573-581 [doi]
- A Novel Method for Fluence Map Optimization with Dose Volume Constraints in IMRTHaozheng Ren, Yihua Lan, Cunhua Li, Xuefeng Zhao, Zhifang Min. 582-589 [doi]
- Existence and Uniqueness of Strong Solution for Predator-Prey System of Three Species with Age-StructureLi-Yu Chen, Qi-Min Zhang. 590-601 [doi]
- Reducing Computational and Memory Cost for HMM-Based Embedded TTS SystemRong Fu, Zengliang Zhao, Qixiong Tu. 602-610 [doi]
- A General Survey on Technological Developments of Oil Leakage Detection over the Past DecadeZhigang Lou, Hongzhao Liu, Mingdu Hu. 611-618 [doi]
- Selecting Principle and Equipment of Valve TappetsLian-Hu Xu, Yi-Bao Yuan, Lei Wang. 619-630 [doi]
- Systems Analysis Causes and Countermeasure of Environmental Problems in ChinaLu Yali. 631-638 [doi]
- Academic Emotions Model Based on Radial Basis Function in E-Learning SystemWan-sen Wang, Chun Juan Guo, Shuai Liu. 639-646 [doi]
- Design and Implementation of Twister Algorithm Based on FPGAZhang Lei. 647-653 [doi]
- Research on the Forming Mechanism of Multiple Wave in the South Yellow SeaSiyou Tong, Wei Hao, Huaishan Liu, Jin Zhang, Linfei Wang, Shulun Wang. 654-662 [doi]
- Statistical Modeling for LSB-Based Image Steganalysis: A Systematic PerspectiveXiaoming Yao, Wencai Du, Taijun Li, Longjuan Wang, Honglei Li, Hanwei Wu, Zequn Wang. 663-671 [doi]
- Image Resizing Based on Self-adapting Significant MapFenghui Niu, Haisheng Li. 672-681 [doi]
- Research on Intelligence Decision-Making Analysis and Optimization Design Development of Pavement Management SystemXue-zhen Dai, Lei Xing, Bo Zhang. 682-690 [doi]
- Laplacian Maximum Scatter Difference Discriminant CriterionJun Gao, Lili Xiang. 691-697 [doi]
- Method of Underwater Autonomous Weapon System Hitting Control Based on PSOPengfei Peng, Zhong Liu, Jun Xing. 698-704 [doi]
- The Design of the Network Configuration Management Based on NETCONF ProtocolJianqun Cui, Keming Jia, Libing Wu, Chuanhe Chen, Mincai Lai. 705-713 [doi]
- Resource Allocation: An Optimum-Seeking Approach under the Uncertainty for PERTChangqing Li, Mang Zhang. 714-725 [doi]
- Influencing Factors Research of Phenol Wastewater Treatment by Cathode Electro-Fenton MethodYafeng Li, Yuzhuo Guan, Cuicui Tao. 726-733 [doi]
- Numerical Simulation Reaseach on Stress Field Distribution of Coal Bed Fault Structure Formation and EvolutionHe Jun, Zhai Pei Jie, Chen Xin Sheng, Jing Fu Xing. 734-740 [doi]