Abstract is missing.
- A Novel Event Network Matching AlgorithmJianfang Shan, Zongtian Liu. 1-14 [doi]
- Static Patterns Matching for High Speed NetworksKunpeng Jiang, Huifang Guo, Shengping Zhu, Julong Lan. 15-22 [doi]
- Information Propagation in Online Social Networks Based on User BehaviorNiu Li, Xiaoting Han. 23-30 [doi]
- Research on Operation and Management of Railway Transport of Dangerous Goods in Third-Party Logistics EnterprisesXin Li, Yue-fang Yang. 31-36 [doi]
- A Password Authentication Scheme against Smart Card Security BreachJing Shen, Yusong Du. 37-44 [doi]
- A Vulnerability Attack Graph Generation Method Based on ScriptsBo Han, Qing Wang, Fajiang Yu, Xianda Zhang 0002. 45-50 [doi]
- DFP-Growth: An Efficient Algorithm for Mining Frequent Patterns in Dynamic DatabaseZailani Abdullah, Tutut Herawan, Ahmad Noraziah, Mustafa Mat Deris. 51-58 [doi]
- Analysis on Key Nodes Behavior for Complex Software NetworkXizhe Zhang, Guolong Zhao, Tianyang Lv, Ying Yin, Bin Zhang. 59-66 [doi]
- Webpage Information Hiding Algorithm Based on Integration of Tags and DataJunling Ren, Li Zhang. 67-74 [doi]
- Location Method of Underground Pipeline Monitoring Point Based on Cavity DetectionWei Zhu, Ping Sun, Ying-Nan Ma, Rui Song, Shiwei He, Ke Hui Liu. 75-81 [doi]
- Research on Purified Internet Environment for College StudentsQichun Zhong, Jinghong Hu. 82-87 [doi]
- A Mobile-Certificate Security Method of Satellite-Earth Integration NetworksQianmu Li, Qiugan Shi, Jun Hou, Yong Qi, Hong Zhang. 88-97 [doi]
- Duration Modeling for Emotional SpeechWen-Hsing Lai, Siou-Lin Wang. 98-103 [doi]
- Research on Image Retrieval Based on Color and Shape FeaturesHongwei Zhao, Xiao Chen, Wei Huang, Pingping Liu, Lingjiao Ma. 104-111 [doi]
- Existence and Simulations of Periodic Solution for Impulsive Predator-Prey System with Stage Structure for the PredatorKaihua Wang, Wenxiang Zhang, Zhanji Gui. 112-119 [doi]
- Dynamics and Simulations of Multi-species Competition-Predator System with ImpulsiveYan Yan, Kaihua Wang, Zhanji Gui. 120-127 [doi]
- Research on the Distal Supervised Learning Model of Speech InversionYing Chen, Shaobai Zhang. 128-135 [doi]
- Low Power Pulse Width Modulation Design for Class D Audio Amplifier SystemsRuei-Chang Chen, Shih-Fong Lee, Yeong-Chau Kuo. 136-143 [doi]
- A New Logic Method for Education Resource Software GuaranteeWei Guan, Yuanhai Lv. 144-151 [doi]
- Research on 3D Object Rounding Photography Systems and TechnologyZhenjie Hou, Junsheng Huang, Jianhua Zhang. 152-158 [doi]
- Facial Expression Feature Selection Based on Rough SetDong Li, Yantao Tian, Chuan Wan, ShuaiShi Liu. 159-166 [doi]
- Concise Representations for State Spaces in Conformant Planning TasksWeisheng Li, Jiao Du, Lifang Zhou. 167-174 [doi]
- On Fast Division Algorithm for Polynomials Using Newton IterationZhengjun Cao, Hanyue Cao. 175-180 [doi]
- On the Security of an Improved Password Authentication Scheme Based on ECCDing Wang, Chunguang Ma, Lan Shi, Yu-Heng Wang. 181-188 [doi]
- Strategies to Develop Personal Knowledge Management Ability Based on M-LearningLin Hu. 189-195 [doi]
- Improved Detection Algorithm for MIMO Wireless Communication System Based on Chase DetectorLi Liu, Jinkuan Wang, Dongmei Yan, Fulai Liu. 196-202 [doi]
- Improving Recommendation Performance through Ontology-Based Semantic SimilarityMingxin Gan, Xue Dou, Rui Jiang. 203-210 [doi]
- Formal Modeling and Model Checking Analysis of the Wishbone System-on-Chip Bus ProtocolRicai Luo, Hua Tan. 211-220 [doi]
- A Time Synchronization Method for Wireless Sensor NetworksChao Zou, Yueming Lu. 221-228 [doi]
- Real-Valued Negative Selection Algorithm with Variable-Sized Self RadiusJinquan Zeng, Weiwen Tang, Caiming Liu, Jianbin Hu, Lingxi Peng. 229-235 [doi]
- Scale Effect on Soil Attribute Prediction in a Complex Landscape RegionZhenfu Wu, Yanfeng Zhao, Li Qi, Jie Chen. 236-245 [doi]
- New Machine Learning Algorithm: Random ForestYanli Liu, Yourong Wang, Jian Zhang. 246-252 [doi]
- Efficient Method of Formal Event AnalysisYing Liu, Zongtian Liu. 253-260 [doi]
- Application of Monte Carlo Simulation in Reliability and Validity Evaluation of Two-Stage Cluster Sampling on Multinomial Sensitive QuestionQiao-qiao Du, Ge Gao, Zong-da Jin, Wei Li, Xiang-yu Chen. 261-268 [doi]
- New Lax-Friedrichs Scheme for Convective-Diffusion EquationHai-xin Jiang, Wei Tong. 269-276 [doi]
- Span of T-Colorings MultigraphsJuan Du. 277-283 [doi]
- Dual-Scaled Method for the Rheology of Non-newtonian Boundary Layer and Its High Performance FEMLei Hou, Hanling Li, Ming Zhang, Weijia Wang, Dezhi Lin, Lin Qiu. 284-290 [doi]
- Factor Model Averaging Quantile Regression and Simulation StudyZhimeng Sun. 291-298 [doi]
- Analytical Studies and Experimental Examines for Flooding-Based Search AlgorithmsHassan Barjini, Mohamed Othman, Hamidah Ibrahim, Nur Izura Udzir. 299-306 [doi]
- Innovative Study on the Multivariate Statistical Analysis Method of Chromatography Economy AnalysisShibing You, Yuan Hui, Xue Yu, Lili Bao. 307-314 [doi]
- Optimization of Lifting Points of Large-Span Steel Structure Based on Evolutionary ProgrammingXin Wang, Xu Lei, Xuyang Cao, Yang Zhou, Shunde Gao. 315-322 [doi]
- Modifying Feasible SQP Method for Inequality Constrained OptimizationZhijun Luo, Zhibin Zhu, Guohua Chen. 323-330 [doi]
- On the Solvable n-Lie AlgebrasJianbo Liu, Yanyan Zhang, Yafeng Men, Wenying Chen. 331-336 [doi]
- Modules of Lie Algebra G(A)Yanyan Zhang, Jianbo Liu, Wen Tao, Qin Zhu. 337-342 [doi]
- Detection Performance Analysis of Tests for Spread Targets in Compound-Gaussian ClutterXiandong Meng, Zhiming He, Xiaowei Niu, Ganzhong Feng. 343-349 [doi]
- Rough Differential Equations in Rough Function ModelYun Wang, Xiaojing Xu, Zhiqin Huang. 350-357 [doi]
- Cloud Computing Infrastructure and Application StudyMing Ye, Zehui Qu. 358-364 [doi]
- An Ant Colony Algorithm for Solving the Sky Luminance Model ParametersPing Guo, Lin Zhu, Zhujin Liu, Ying He. 365-372 [doi]
- Tugboat Scheduling Problem Based on Trust-Based Ant Colony OptimizationSu Wang, Min Zhu, Jun Zheng, Kai Zheng. 373-380 [doi]
- A Cloud Architecture with an Efficient Scheduling TechniqueNawsher Khan, Ahmad Noraziah, Tutut Herawan. 381-388 [doi]
- A Local Search Particle Swarm Optimization with Dual Species Conservation for Multimodal OptimizationDingcai Shen, Xuewen Xia. 389-396 [doi]
- Cloud Computing: Analysis of Various ServicesNawsher Khan, Ahmad Noraziah, Tutut Herawan, Mustafa Mat Deris. 397-404 [doi]
- Quantum Ant Colony Algorithm Based on Bloch CoordinatesXiaofeng Chen 0008, Xingyou Xia, Ruiyun Yu. 405-412 [doi]
- Energy Efficient VM Placement Heuristic Algorithms Comparison for Cloud with Multidimensional ResourcesDailin Jiang, Peijie Huang, Piyuan Lin, Jiacheng Jiang. 413-420 [doi]
- A Python Based 4D Visualization EnvironmentLin Jing, Xipei Huang, Yiwen Zhong, Yin Wu, Hui Zhang 0006. 421-428 [doi]
- Study of Trustworthiness Measurement and Kernel Modules Accessing Address Space of Any ProcessCe Zhang, Gang Cui, Bin Jin, Liang Wang. 429-436 [doi]
- Human Resource Management System Based on Factory Method Design PatternXing Xu, Hao Hu, Na Hu, Lin Xiao, Weiqin Ying. 437-444 [doi]
- Ant Colony Optimization with Multi-Agent Evolution for Detecting Functional Modules in Protein-Protein Interaction NetworksJunzhong Ji, Zhijun Liu, Aidong Zhang, Lang Jiao, Chunnian Liu. 445-453 [doi]
- Research on Genetic Segmentation and Recognition AlgorithmsZhenjie Hou, Jianhua Zhang. 454-460 [doi]
- Blog-Based Distributed Computation - Implementation of Software Verification SystemTakayuki Sasajima, Shin-ya Nishizaki. 461-467 [doi]
- Model Transformation Method for Compensation Events and Tasks from Business Process Model to FlowchartJian Deng, Bo Chen, Jiazhi Zeng. 468-476 [doi]
- Towards Efficient Replication of Documents in Chord: Case (r, s) Erasure CodesRafal Kapelko. 477-483 [doi]
- Path Planning for Crawler Crane Using RRTYuanshan Lin, Di Wu, Xin Wang, Xiukun Wang, Shunde Gao. 484-491 [doi]
- Study on Data Preprocessing for Daylight Climate DataPing Guo, Shuai-Shuai Chen, Ying He. 492-499 [doi]
- Scalable Technique to Discover Items Support from Trie Data StructureAhmad Noraziah, Zailani Abdullah, Tutut Herawan, Mustafa Mat Deris. 500-507 [doi]
- On Soft Partition Attribute SelectionRabiei Mamat, Tutut Herawan, Ahmad Noraziah, Mustafa Mat Deris. 508-515 [doi]
- Effect of Vocabulary Preparation on Students Vocabulary and Listening ComprehensionLijun Li, Kaida He, Qiudong He. 516-523 [doi]
- 3D Parametric Design on Trough Type Liquid Distributor Based on AutoCAD VBAPengfei Zhang, Luojia Wan. 524-530 [doi]
- A Novel Differential Evolution Algorithm with Adaptive of Population TopologyYu Sun, Yuanxiang Li, Gang Liu, Jun Liu. 531-538 [doi]
- Empirical Study on the Relationship between Money Supply and Stock Market in EuropeYijun Li. 539-544 [doi]
- Evaluation of Agricultural Information Service SystemYanxia Wang, Xingjie Hui. 545-552 [doi]
- Six-Mode Truncation and Chaotic Characteristics of Atmospheric Convection SystemLi Zhen. 553-559 [doi]
- Security Uniform Office Format Specification and API Design Based on the Java PlatformYing Cai, Ning Li, Chengxia Liu. 560-568 [doi]
- Bioinformatics Analysis of the Complete Nucleotide Sequence of Duck Plague Virus UL22 GeneLi-Sha Yang, An-Chun Cheng, Ming-Shu Wang, De-Kang Zhu, Shun Chen, Ren-Yong Jia, Xiao-Yue Chen. 569-575 [doi]
- Evidence Conflict Analysis Approach to Obtain an Optimal Feature Set for Bayesian Tutoring SystemsChoo-Yee Ting, Kok-Chin Khor, Yok-Cheng Sam. 576-583 [doi]
- Binary Vote Assignment Grid Quorum for Managing Fragmented DatabaseAhmad Noraziah, Ainul Azila Che Fauzi, Noriyani Mohd Zin, Tutut Herawan. 584-591 [doi]
- WLAR-Viz: Weighted Least Association Rules VisualizationAhmad Noraziah, Zailani Abdullah, Tutut Herawan, Mustafa Mat Deris. 592-599 [doi]
- Ontology-Based Genes Similarity Calculation with TF-IDFYue Huang, Mingxin Gan, Rui Jiang. 600-607 [doi]
- Quantitative Study of Oilfield Casing DamageRui Deng, Liang Zhang, Haimin Guo. 608-615 [doi]
- Complete SAT Solver Based on Set TheoryWensheng Guo, Guowu Yang, QianQi Le, William N. N. Hung. 616-623 [doi]
- Application of XML Data Mining in GUI Run-Time State ClusteringJing Feng, Tingjie ShangGuan. 624-631 [doi]
- Strong Reduction for Typed Lambda Calculus with First-Class EnvironmentsShin-ya Nishizaki, Mizuki Fujii. 632-639 [doi]
- Reliable NoC Mapping Based on Scatter SearchQianQi Le, Guowu Yang, William N. N. Hung, Wensheng Guo. 640-647 [doi]
- Towards the Applied Hybrid Model in Decision Making: Support the Early Diagnosis of Type 2 DiabetesAndrea Carvalho Menezes, Plácido Rogério Pinheiro, Mirian Caliope Dantas Pinheiro, Tarcísio Pequeno Cavalcante. 648-655 [doi]
- Replacement Study of the Retention Time in Chromatography Ecomomic AnalysisPing Shen, Shibing You. 656-662 [doi]
- Study on Frustration Tolerance and Training Method of College StudentsNaisheng Wang. 663-668 [doi]
- On Statistical Analysis and Management Countermeasures of Occupation Burnout for College TeachersYoucai Xue, Jianhui Pan. 669-676 [doi]
- Development of a RFID Multi-point Positioning and Attendance System Based on Data Comparison AlgorithmWenyu Zhao, Jun Gao, Xiaotian Liu, Yaping Wu. 677-683 [doi]
- High Throughput Constraint Repetition for Regular Expression Matching AlgorithmKunpeng Jiang, Julong Lan, Youjun Bu. 684-691 [doi]
- Interference Mitigation Based on Multiple SINR Thresholds in 60GHz Wireless NetworksWeixia Zou, Fang Zhang, Guanglong Du, Bin Li. 692-699 [doi]
- Analysis of the Coupling Action in Nonlinear Harmonic Vibration Synchronization SystemXiaohao Li, Zhenwei Zhang. 700-706 [doi]
- Performance Analysis of Hierarchical Modulation with Higher Spectrum Efficiency for a Higher Date Rate T-DMB SystemLinlin Dong, Lixin Sun, Xiaoming Jiang, Na Zhu. 707-714 [doi]
- Research on the Controlling Technique of DFBLD in the Spectrum Absorption Optical Fiber Gas Detecting SystemShuTao Wang, Pengwei Zhang, Xiaoqing Shao. 715-721 [doi]
- An Efficient and Provable Secure PAKE Scheme with Robust AnonymityCong Liu, Chuan-gui Ma. 722-729 [doi]
- Study on QoS of Video Communication over VANETShouzhi Xu, Pengfei Guo, Bo Xu, Huan Zhou. 730-738 [doi]
- Phase Noise Estimation and Mitigation for Cognitive OFDM SystemsYuan jing, Haoyu Li, Xiaofeng Yang, Li Ma, Ji Ma, Bin Niu. 739-745 [doi]
- An Effective Multipath Approach to Reducing Congestion in WSNsLaomo Zhang, Ying Ma, Guodong Wang. 746-753 [doi]
- Immunity-Based Gravitational Search AlgorithmYu Zhang, Yana Li, Feng Xia, Ziqiang Luo. 754-761 [doi]
- A Clustering Method Based on Time Heat Map in Mobile Social NetworkWang Ye, Wang Jian, Yuan Jian. 762-769 [doi]
- TNC-eSA: An Echanced Security Access Solution to Office NetworksJun Ma, Yuanbo Guo, Jinbo Xiong. 770-777 [doi]