Abstract is missing.
- A context-aware recommendation system based on latent factor modelZhenling Zhang, Yingyuan Xiao, Wenxin Zhu, Xu Jiao, Ke Zhu, Huafeng Deng, Yan Shen. 1-6 [doi]
- Aircraft recognition based on feature points and invariant momentsJun Fu, Baiqing He, Zimin Wang. 7-12 [doi]
- Alzheimer's disease diagnosis via interested structure selection in MRIsZhenbing Liu, Tao Xu, Chao Ma 0006, Chunyang Gao, Huihua Yang. 13-19 [doi]
- An accurate and efficient face recognition method based on hash codingYan Zeng, Xiaodong Cai, Yuelin Chen, Meng Wang. 20-23 [doi]
- An object tracking method based on CNN and optical flowLuyue Lin, Bo Liu 0002, Yanshan Xiao. 24-31 [doi]
- Build correlation awareness in negative correlation learningYong Liu. 32-36 [doi]
- Classify 3D voxel based point-cloud using convolutional neural network on a neural compute stickXiaofan Xu, Joao Amaro, Sam Caulfield, Gabriel Falcão, David Moloney. 37-43 [doi]
- Evolutionary artificial bee colony for neural networks trainingMario Tasso Ribeiro Serra Neto, Marco Antônio Florenzano Mollinetti, Rodrigo Lisboa Pereira. 44-49 [doi]
- Facial feature extraction method based on shallow and deep fusion CNNXiaoxi Liang, Xiaodong Cai, Longze Li, Yun Chen. 50-53 [doi]
- Finance time series prediction using complex-valued flexible neural tree modelBin Yang, Wei Zhang, Li-Na Gong, Huai-Zhi Ma. 54-58 [doi]
- Hyperspectral image classification based on deep auto-encoder and hidden Markov random fieldAtif Mughees, Linmi Tao. 59-65 [doi]
- Intelligent optimal lifecycle planning in agricultural products supply chains using cloud computing and RFID dataQian Tao, Zhenyu Wang, Chunqin Gu, Yizu Zhan, Junying Xu, Ziqi Tang. 66-71 [doi]
- Learning based fusion in ensembles for weather forecastingAli Haidar, Brijesh Verma. 72-78 [doi]
- Multiscale method based on spline regression for comparing multiple nonparametric curvesNa Li, Xuhua Liu. 79-86 [doi]
- Named entity recognition for Chinese microblog with convolutional neural networkLiang Zhang, Huan Zhao. 87-92 [doi]
- Person re-identification method based on CNN and manually-selected feature fusionHaohua Ku, Ping Zhou, Xiaodong Cai, Haiyan Yang, Yun Chen. 93-96 [doi]
- Vehicle type recognition based on increasing hierarchical feature convolutional neural networksXingguo Jiang, Xinxin Su, Xiaodong Cai, Haiou Li, Zhenzhen Luo. 97-101 [doi]
- A PLS-SVM-based method of general single-phase harmonic load identificationXiangwen Cheng, Xiaoke Chen, Jianhua Yin, Zhuo Wang, Jinquan Zhao. 102-105 [doi]
- Load forecast based on least square SVR and HHTMin Zou, Heng Zhang. 106-110 [doi]
- Multi-class wine grades predictions with hierarchical support vector machinesBernard Chen, Clifford Tawiah, James Palmer, Recep Erol. 111-115 [doi]
- Novelty detection in passive sonar systems using a kernel approachNatanael Nunes de Moura, José Manoel de Seixas. 116-122 [doi]
- Support vector machine classification prediction model based on improved chaotic differential evolution algorithmYaxin Hou, Xiangqian Ding, Ruichun Hou. 123-129 [doi]
- Support vector machine equipped with deep convolutional features for product reviews classificationShangdi Sun, Xiaodong Gu. 130-135 [doi]
- Semi-automated data classification with feature weighted self organizing mapAndrew Starkey, Aliyu Usman Ahmad. 136-141 [doi]
- Object classification in underwater images using adaptive fuzzy neural networkK. Srividhya, M. M. Ramya. 142-148 [doi]
- A new DTZD algorithm with geometric representation and numerical verification for solving time-varying nonlinear equationsDongsheng Guo, Zhijing Huang, Xinjie Lin, Sibo Sun. 149-154 [doi]
- Different types of three-step DTZD algorithms for time-varying inverse square root findingDongsheng Guo, Qingping Liu, Zhaozhu Su, Zhijing Huang. 155-160 [doi]
- Tensor optimal scoring for alzheimer's disease detectionShuo Wang, Qiang Wu, Ju Liu. 161-165 [doi]
- Zhang dynamics tracking control of varactor system with stability analysisChaowei Hu, Dongsheng Guo, Xiangui Kang, Yunong Zhang. 166-171 [doi]
- A genetic algorithm based feature selection for binary phenotype prediction using structural brain magnetic resonance imagingBenteng Ma, Yong Xia. 172-177 [doi]
- Analysis and comparison of adaptive huffman coding and arithmetic coding algorithmsPhyela Mbewe, Sampson D. Asare. 178-185 [doi]
- Binary variational genetic programming for the problem of synthesis of control systemA. I. Diveev, G. I. Balandina, S. V. Konstantinov. 186-191 [doi]
- EBCRO: Hybrid chemical reaction with employed bee operatorZhiyong Li, Tingkun Yuan, Bo Yang, Shilong Jiang, Yanmei Xie. 192-200 [doi]
- Experimental comparison of different differential evolution strategies in MOEA/DMeng Xu, Zhihua Cui, Maoqing Zhang, Guoyou Zhang. 201-207 [doi]
- Matching subtrees in genetic programming crossover operatorMartin Slapák, Roman Neruda. 208-213 [doi]
- Mathematical modeling and system design of timetabling problem based on improved GAYanming Yang, Wanchun Gao, Yang Gao. 214-220 [doi]
- Research on optimal operation of cascade hydropower station based on improved biogeography-based optimization algorithmYuechun Jiang, Zhongnan He, Ailing Liu, Zhongya Bai. 221-227 [doi]
- The modeling and simulation of task assignment behavior in industrial organizationsHaipeng Kong, Yuguang Wang, Pingyu Zhou, Ni Li, Guanghong Gong, Pei Yan. 228-233 [doi]
- A bio-inspired neural network based PSO method for robot path planningJianjun Ni, Zhitong Zhang, Baiyan Su, Xinnan Fan, Wei Liang. 234-238 [doi]
- A modified PSO algorithm with exponential decay weightChun-man Yan, Gen-yuan Lu, Ying-ting Liu, Xiang-yu Deng. 239-242 [doi]
- A novel pheromone initialization strategy of ACO algorithms for solving TSPShupeng Gao, Jiaqi Zhong, Yali Cui, Chao Gao, Xianghua Li. 243-248 [doi]
- A novel strategy of initializing the population size for ant colony optimization algorithms in TSPFanzhen Liu, Jiaqi Zhong, Chen Liu, Chao Gao, Xianghua Li. 249-253 [doi]
- An improved discrete particle swarm optimization algorithm for the capacitated p-median problemZhurong Wang, Zhenzhen Yi, Xinhong Hei 0001, Zhanmin Wang. 254-258 [doi]
- Foraging inspired algorithms: A design perspectiveAnthony Brabazon. 259-266 [doi]
- Solving single row facility layout problem with simplified swarm optimizationWei-Chang Yeh, Chyh-Ming Lai, Hsin-Yi Ting, Yunzhi Jiang, Hsin-Ping Huang. 267-270 [doi]
- A modified MOEA/D by introducing an invasive weed optimization operatorRuochen Liu, Cheng Lian, Langlang Zhang, Xiao Wang. 271-277 [doi]
- A multi-objective particle swarm optimization data scheduling algorithm for peer-to-peer video streamingPingshan Liu, Xiaoyi Xiong, Guimin Huang, Yimin Wen. 278-285 [doi]
- A novel multi-objective genetic algorithm for the QoS based multicast routing and wavelength allocation problem in WDM networkRuonan Sun, Shu Zhang, Bin Zhang, Changsheng Zhang. 286-291 [doi]
- An improved context adaptive hard-decision quantization algorithmXinxiu Wei, Zhelei Xia. 292-297 [doi]
- An optimization model of outpatient appointment scheduling window with patient no-showYing Zhou, Yong Luo. 298-303 [doi]
- Broadband power pattern synthesis of arbitrary arrays with mutual couplingWenming Tang, Ke Du, Ke Song, Stanislav Zavialov, Jian Zhu. 304-307 [doi]
- Filtering techniques for the intervention planning problems case of incident management in ITIL contextMounir Ketata, Zied Loukil, Faiez Gargouri. 308-313 [doi]
- Multi-objective optimal power flow problem of power system based on differential search algorithmYuechun Jiang, Ailing Liu, Zhongnan He, Ke Zhang. 314-318 [doi]
- Study on MS-BHFSP with multi-objectiveZe Tao, Qiu-Zhong Zhou. 319-323 [doi]
- Study on the adaptive scale of agricultural development and utilization in Mu Us Sandy Land based on NSGA-IISiyuan Liu, Ni Wang, Jiancang Xie, Rengui Jiang, Liu Yang. 324-330 [doi]
- Randomness analysis on 3D-AES block cipherSuriyani Ariffin, Nor Azeala Mohd Yusof. 331-335 [doi]
- A chaos-based self-adapting RGB image permutation schemeYuling Luo, Ronglong Zhou, Lvchen Cao, Junxiu Liu, Jinjie Bi, Yi Cao, Senhui Qiu. 336-341 [doi]
- A self-organizing community detection algorithm for complex networksDongming Chen, Zhaoliang Song, Cenyi Luo, Xinyu Huang. 342-347 [doi]
- A three dimensional indoor positioning algorithm based on the optimization modelNa Yang, Mei Xiong, Longwei Chen. 348-352 [doi]
- A two-stage hierarchical community structure detected algorithm in complex networkTingting Zhu, Manman Peng. 353-359 [doi]
- Degree-correlaed vaccination in aymmetric interacting spreading dynamicsQuan-Hui Liu, Xiaolong Chen, Wei Wang. 360-364 [doi]
- DP-MFTD algorithm based on the conditional probability ratio accumulation modelQiang Wei, Qihong Yang, Zhong Liu. 365-372 [doi]
- Facilitating information spreading with local information in complex networksLei Gao, Ling-Jiao Chen, Xiao Long Chen, Hui Gao. 373-377 [doi]
- Structural outlier detection: A tourist walk approachRafael D. Rodrigues, Liang Zhao 0001, Qiusheng Zheng, Junbao Zhang. 382-387 [doi]
- Synchronization of the delay financial hyperchaotic system via a single adaptive feedback controllerGuoliang Cai, Yuxiu Li, Wenjun Shi, Zhiyin Zhang, Gaihong Feng. 388-393 [doi]
- MedKiosk: An embodied conversational intelligence via deep learningPui Huang Leong, Ong Sing Goh, Yogan Jaya Kumar. 394-399 [doi]
- Towards basic level categories in cognitive agentsRadoslaw P. Katarzyniak, Wojciech Lorkiewicz, Mariusz Mulka, Ondrej Krejcar. 400-407 [doi]
- Dynamic contraction of tensor with quantum algorithmYinsheng Zhang, Hongjian Zhao, Fyodor O. Minakov. 408-411 [doi]
- Parallel simulation of Shor's and Grover's algorithms in the distributed geometric machineAnderson Braga de Avila, Renata H. S. Reiser, Adenauer C. Yamin, Maurício L. Pilla. 412-419 [doi]
- A kNN classifier optimized by P systemsJuan Hu, Guangchun Chen, Hong Peng 0001, Jun Wang, Xiangnian Huang, Xiaohui Luo. 432-437 [doi]
- A face recognition hybrid algorithm by combining LDA with PNNAijia Ouyang, Shengyu Pei, Ya Wang, Xuyu Peng. 438-443 [doi]
- A k-weighted centroid algorithm based on proximity beacon node optimizationXiu Ji, Lei Wang, Wo-ye Sun, Hui Wang. 444-448 [doi]
- A novel technique to prune variable selection ensemblesLiang-pin Ren, Chun-Xia Zhang, Hai-Yan Xuan. 449-454 [doi]
- A parallel clustering and test partitioning techniques based mining trajectory algorithm for moving objectsQian He, Yiting Chen, Qinghe Dong, Dongsheng Cheng. 455-462 [doi]
- A recommendation algorithm based on density peak clustering and key usersPei-Pei Wang, Pei-yu Liu, Ru Wang, Zhen-fang Zhu. 468-473 [doi]
- An algorithmic approach for computing the complement of intuitionistic fuzzy graphsSaid Broumi, Arindam Dey, Assia Bakali, Mohamed Talea, Florentin Smarandache, Dipak Koley. 474-480 [doi]
- An approximate ripple-spreading algorithm to identify the k best pathsXiao-Bing Hu, Ming-Kong Zhang, Di Hu. 481-486 [doi]
- Application of BP neural network optimization algorithm based on genetic algorithm in credit risk early-warning of commercial bankJie Su, Ya-Ning Zhang. 487-491 [doi]
- Application of Powell fruit fly optimization algorithm to solutions of nonlinear equationsYe Tang, Wei Zhou, Xuyu Peng. 492-496 [doi]
- Character recognition based on corner detection and convolution neural networkBeihai Tan, Qiuming Peng, Xiaojiao Yao, Chao Hu, Zhenhao Xu, Zipei Zhang. 503-507 [doi]
- Decomposition of Petri nets based on the behavior relation matrixMimi Wang, Peihai Zhao. 508-514 [doi]
- A novel multi-variate analysis method for searching particles in high energy physicsChao Ma, Jin-hui Xu, Tian-cheng Hou, Bin Lan, Zhenhua Zhang. 515-522 [doi]
- Discrete invasive weed optimization algorithm for traveling salesman problemsAijia Ouyang, Xuyu Peng, Qian Wang, Ya Wang. 523-528 [doi]
- Elite bases regression: A real-time algorithm for symbolic regressionChen Chen, Changtong Luo, Zonglin Jiang. 529-535 [doi]
- GPU-based PQGA algorithm for estimating parameters of Muskingum modelAijia Ouyang, Martin H. Luerssen, Qian Wang, Xuyu Peng. 536-541 [doi]
- Hooke-jeeves bat algorithm for systems of nonlinear equationsZhiguo Yang, Jiyuan Zhang, Wei Zhou, Xuyu Peng. 542-547 [doi]
- Human activity recognition based on random forestsLu Xu, Weidu Yang, Yueze Cao, Quanlong Li. 548-553 [doi]
- Image dehazing using non-symmetry and anti-packing model based on dark channel priorYunping Zheng, Yukang Shu, Changting Cai. 554-559 [doi]
- MapReduce distributed highly random fuzzy forest for noisy big dataFaruk Mustafic, Francisco Herrera, Ning Xiong, Sergio Ramírez-Gallego. 560-567 [doi]
- Matrix decomposition based salient object detection in hyperspectral imageryYiFan Gao, Hangqi Yan, Lei Zhang 0054, Runping Xi, Yanning Zhang, Wei Wei. 574-577 [doi]
- Optimal design of engineering structuresAleksander Muc. 578-585 [doi]
- PCA-based 3D pose modeling for beating heart trackingBo Yang, Chao Liu, Wenfeng Zheng. 586-590 [doi]
- Personal micro-blog recommendation based on user characteristics and user preferenceXian-ying Huang, Ran Lu, Zhi hao Wang, Zhen-fang Zhu. 591-596 [doi]
- Querying deep web data bases without accessing to dataRadhouane Boughammoura, Mohamed-Nazih Omri. 597-603 [doi]
- Saliency detection: Multi-level combination approach via graph-based manifold rankingCuiping Li, Zhenxue Chen, Chengyun Liu, Di Zhao. 604-609 [doi]
- Simplex-bat algorithm for solving system of non-linear equationsMaoqiang Yang, Xuexian Ruan, Wei Zhou, Xuyu Peng. 610-614 [doi]
- Simplex-fruit fly optimization algorithm for solving systems of non-linear equationsXin Chen, Yinmei Liu, Wei Zhou, Xuyu Peng. 615-620 [doi]
- Single image dehazing using non-symmetry and anti-packing model based decomposition and contextual regularizationYunping Zheng, Zhenfeng Xie, Changting Cai. 621-625 [doi]
- The generalization performance of kernelized elastic net regularization based on exponentially strongly mixing observationsYuan Ye, Jie Xu, Yan Yang, Jialun Li. 626-632 [doi]
- The vehicle hijacking alarm systemXiaoming Liu, Shaozhong Jiang. 633-637 [doi]
- Visualization of association rules based on a gray correlation analysis modelZhi-yun Zheng, Jia-zhuang Guo, Yuan Fu, Lun Li, Dun Li. 638-643 [doi]
- A new background update algorithm for airborne camera in dynamic backgroundXiang Peng, Xiaobo Lu, Shengqin Jiang, Cong Li, Chengyi Pan. 644-648 [doi]
- A safety evaluation method of mine pressure based on data stream classificationGang Sun, Zhongxin Wang, Jia Zhao, Hao Wang, Chuanyun Ni, Jie Bai, Nannan Wu. 649-653 [doi]
- A safety evaluation method of mine pressure based on incomplete labeled data stream classificationGang Sun, Jia Zhao, Zhongxin Wang, Hao Wang, Chuanyun Ni, Guobao Cai, Xiaolian Chen. 654-660 [doi]
- An improved lexicon generation method for mandarin speech recognitionYike Zhang, Pengyuan Zhang, QingWei Zhao, Yonghong Yan 0002, Zhenjiang Dong, Xia Jia. 661-665 [doi]
- Bitcoin price prediction using ensembles of neural networksEdwin Sin, Lipo Wang. 666-671 [doi]
- ECG quality assessment based on multi-feature fusionYong Xia, Honghong Jia. 672-676 [doi]
- EEG signal analysis of patients with obstructive sleep apnea syndrome (OSAS) using power spectrum and fuzzy entropySzu-Yu Lin, Yu-Te Wu, Wei-Chung Mao, Po-Shan Wang. 677-681 [doi]
- Event detection in video sequences: Challenges and perspectivesWafa Lejmi, Mohamed-Ali Mahjoub, Anouar Ben Khalifa. 682-690 [doi]
- Face alignment based on improved shape searchingYuqin Huang, Huawei Pan. 691-696 [doi]
- Feed-forward network for cancer detectionShengyu Pei, Lang Tong, Xia Li, Jin Jiang, Jingyu Huang. 697-701 [doi]
- Shuffled frog-leaping algorithm based neural network and its using in big data setWei Shan, Shou-Ping Nie. 707-711 [doi]
- Sparse feature auto-combination deep network for video action recognitionQicong Wang, Dingxi Gong, Maozhen Li, Chong Zhao, Yunqi Lei. 712-716 [doi]
- Spatio-temporal context tracking with color attributesBo Xu, Zhenhai Wang, Yuyun Kang, Yulan Wang. 717-721 [doi]
- Structural damage detection using improved modal strain energy index and cloud modelHuiyong Guo, Xin Zhang, Yushan Wang. 722-726 [doi]
- Synchronous prediction of arousal and valence using LSTM network for affective video content analysisLigang Zhang, Jiulong Zhang. 727-732 [doi]
- Textural features selection for image classification by Bayesian methodT. Vo-Van, H. Che-Ngoc, T. Nguyen-Trang. 733-139 [doi]
- EEG signal analysis of patients with obstructive sleep apnea syndrome (OSAS) using power spectrum and fuzzy entropySzu-Yu Lin, Yu-Te Wu, Wei-Chung Mao, Po-Shan Wang. 740-744 [doi]
- An innovation indoor robot self-localization system with fast vision content matching in global mapTianyang Cao, Haoyuan Cai, Dongming Fang, Chang Liu 0006. 745-752 [doi]
- Fuzzy logic gates on actin filament networksAndrew Schumann. 753-760 [doi]
- Path planning of mobile robot based on genetic algorithm with predictive operator and dynamic parametersYong Ge, Meiyun Du, Chengshui Niu, Qinglian Ma, Yu-an Zhang. 761-767 [doi]
- Potential field driven evacuation model based on ant colony algorithmXinlu Zong, Hui Xu. 768-772 [doi]
- Simplified swarm optimization for task assignment problem in distributed computing systemWei-Chang Yeh, Chyh-Ming Lai, Yen-Cheng Huang, Tzu-Wei Cheng, Hsin-Ping Huang, Yunzhi Jiang. 773-776 [doi]
- A method for fingertips detection using RGB-D image and convolution neural networkHai Duong Nguyen, Young-Chul Kim, Soo-Hyung Kim, In Seop Na. 783-785 [doi]
- Semi-supervised image segmentation with globalized probability of boundary and simple linear iterative clusteringJunliang Ma, Xili Wang, Bing Xiao. 786-790 [doi]
- Accelerating Haar wavelet transform with CUDA-GPU (July 2017)Esmael Torabi Angaji, Seyed Ali Razavi Ebrahimi. 791-796 [doi]
- Analysis on the performance of several data association algorithms using Doppler informationQiang Wei, Qihong Yang, Zhong Liu. 797-803 [doi]
- Attributes-oriented clothing description and retrieval with multi-task convolutional neural networkYizhang Xia, Baitong Chen, Wenjin Lu, Frans Coenen, Bailing Zhang. 804-808 [doi]
- Convolutional neural networks for class attendanceZhao Pei, Haixing Shang, Yi Su, Miao Ma, Yali Peng. 809-814 [doi]
- Data driven tight frames regularization for few-view image reconstructionJie Li, Wenkun Zhang, Hanming Zhang, Lei Li, Bin Yan. 815-820 [doi]
- Fast variable-frame-rate decoding of speech recognition based on deep neural networksGe Zhang, Pengyuan Zhang, Jielin Pan, Yonghong Yan 0002. 821-825 [doi]
- Flower classification based on single petal image and machine learning methodsSiyuan Lu, Zhihai Lu, Xianqing Chen, Shuihua Wang, Yudong Zhang. 826-831 [doi]
- Implementing acoustic radiation force imaging on GPU using OpenCLXuan Wang, Hao Yin, Kang Li, Chun-han Zhang. 832-836 [doi]
- Improving deep convolutional neural networks for real-world clothing imageRuifan Li, Yuzhao Mao, Ibrar Ahmad, Fangxiang Feng, Xiaojie Wang. 837-843 [doi]
- Indoor scene recognition based on deep learning and sparse representationNing Sun, Xiaoying Zhu, Jixin Liu, Guang Han. 844-849 [doi]
- Multilingual and skew license plate detection based on extremal regionsRongqiang Qian, Bailing Zhang, Frans Coenen, Yong Yue 0003. 850-855 [doi]
- Perceptual texture similarity learning using deep neural networksYing Gao, Yanhai Gan, Junyu Dong, Lin Qi, Huiyu Zhou. 856-860 [doi]
- Photographic composite detection using scene perspective constraintsQiong Yi, Gaobo Yang, Ming Xia, Dengyong Zhang. 861-866 [doi]
- Robust lip feature detection in facial imagesBinh T. H. Nguyen, Tran Vu Hieu, Bui Ngoc Dung. 867-871 [doi]
- Using random forests with meta frame and meta features to enable overlapped audio content indexing and segmentationFrancis F. Li. 872-878 [doi]
- Visual saliency using unit-linking PCNN image segmentationYikai Hua, Xiaodong Gu. 879-883 [doi]
- A computational evaluation system of Chinese calligraphy via extended possibility-probability distribution methodDajun Zhou, Jiamin Ge, Ruiqi Wu, Fei Chao, Longzhi Yang, Changle Zhou. 884-889 [doi]
- A Gaussian process regression method for urban road travel time predictionDong Wang, Yage Wu, Zhu Xiao. 890-894 [doi]
- A light-weight secret key-based privacy preserving technique for home area networks in smart gridShams Ullah, Eraj Khan, Sultan Ullah, Wajahat Ali. 895-899 [doi]
- A novel denoising algorithm for acceleration signal based on compressed sensingJianning Wu, Yun Ling, Jiajing Wang. 900-904 [doi]
- A novel dynamic clustering strategy on energy efficiency for dense network deploymentGang Su, Ya Xu, Li Tan, Lu Feng. 905-910 [doi]
- A ripple-spreading algorithm for calculating weighted betweenness in networksXiao-Bing Hu, Ming-Kong Zhang, Jian-Qin Liao. 911-917 [doi]
- An adapted vision measurement method for package volume based on KinectLing Li, Xingchang Zhuang, Li Chen, Bo Liu, Tingting Wang. 918-922 [doi]
- An application of artificial bee colony optimization to image edge detectionYi Liu, Shengqing Tang. 923-929 [doi]
- An effective fruit fly optimization algorithm for the hybrid flowshop scheduling problemJun-Hua Duan, Tao Meng, Quan-ke Pan, Qing-da Chen. 930-934 [doi]
- An improved effective approach for urban air quality forecastBin Mu, Site Li, Shijin Yuan. 935-942 [doi]
- Analysis of an epidemiological model with sub-optimal immune reaction and nonlinear incidence rateLiwei Huang, Jianhua Pang, Chunmiao Wei, Xun Zhong. 943-947 [doi]
- Coalbed methane production forecasting based on dynamic PSO neural network modelLei Yang, Hong Lin, Meng-Yao Gong, Sheng-Tian Zhou. 948-952 [doi]
- Combinatorial double auction-based mechanism with group price for cloud service reservation using swarm intelligenceXueyi Wang, Xingwei Wang, Min Huang 0001. 953-958 [doi]
- Compromising fairness for enterprise resource efficiency improvementLian Pan, Huicong Zou, Hanwu Wang. 959-963 [doi]
- Data-driven and semantic-based pedestrian re-identificationFangjie Xu, Keyang Cheng, Kaifa Hui, Jianming Zhang. 964-972 [doi]
- Designing fuzzy apparatus to model dyslexic individual symptoms for clinical useTereza Parilová, Eva Hladká, Pavel Riha. 973-977 [doi]
- Global analysis of a dengue fever model with quarantineJianhua Pang, Yuqian Zhao, Fengchao Lu, Zijian Liu, Ping Bi. 978-982 [doi]
- Kernel-based similarity and discovering documents of similar interestsHong Tuyet Tu, Khu Phi Nguyen. 983-988 [doi]
- Multi agent based networking satellite tasks scheduling with department collaborative mechanismWei Jiang, Xiu-Li Pang, Zi-qing Yuan. 989-996 [doi]
- Multi-level image thresholding based on improved fireworks algorithmMiao Ma, Weige Zheng, Jie Wu, Kaifang Yang, Min Guo. 997-1004 [doi]
- New debris flow critical rainfall line setting via cluster analysis and support vector machine after the Chi-Chi huge earthquakeYuan-Fang Tsai, Chun-Hsiang Chan, Keng-Han Lin, Wen-Ray Su, Jinn-Chyi Chen. 1005-1010 [doi]
- On the performance evaluation of the proportional control chartSheng Shu Cheng, Chien-Hsin Yang, Tsong Shin Sheu, Fong-Jung Yu. 1011-1017 [doi]
- Population dynamic evolutionary algorithm for virtual routers running on multiprocessors systemXia-an Bi, Qi Sun. 1018-1022 [doi]
- Prediction model of the unemployment rate for nanyang in henan province based on BP neural networkYiyuan Cheng, Tao Hai, Yangbing Zheng, Baolei Li. 1023-1027 [doi]
- Prediction of distribution network malfunction based on meteorological factorsMingzhu Zhang, Yan Chen, Ruoxi Liu, Xu Cheng 0001, Yi Jiao, Jiakui Zhao, Ouyang Hong. 1028-1032 [doi]
- PSO-based sparse regularization approach for structural damage detectionZiwei Luo, Ling Yu. 1033-1039 [doi]
- Optimization of hydraulic calculation simulation based on genetic algorithmLei Xiao, Kejiang Liu, Xincai Zhuang. 1040-1044 [doi]
- Scheduling services for MANETs using genetic algorithmsMarcelo Petri, Janine Kniess, Rafael Stubs Parpinelli. 1045-1052 [doi]
- The analysis of coal safety production monitoring data based on deep learningAn-xin Zhao. 1053-1057 [doi]
- The research and application of chaotic particle swarm optimization algorithmQiongqiong Hu, Huizhen Liu, Chengshui Niu, Meiyun Du, Yu-an Zhang, Yong Ge. 1058-1062 [doi]
- Using a multi-objective artificial immune system approach for biodiversity conservationShana Schlottfeldt, Maria Emilia Telles Walter, André C. P. L. F. Carvalho, Mariana P. C. Telles, José Alexandre Felizola Diniz-Filho. 1063-1069 [doi]
- A data fusion equipment monitoring method based on fuzzy set and improved D-S evidence theoryHan Ding, Ruichun Hou, Xiangqian Ding. 1070-1076 [doi]
- A method of BDS/SINS integrated navigation fusion based on CKF algorithmMafeng Gao, Xin Zhao, Quanhu Li, Zhenming Wang. 1077-1081 [doi]
- A relational approach of fuzzy graph grammarsAlex Bertei, Luciana Foss, Simone André da Costa, Renata H. S. Reiser. 1082-1089 [doi]
- A UML-based representation of fuzzy spatiotemporal relationsXu Chen, Weijun Li, Li Yan. 1090-1098 [doi]
- Analysis of the law of non-contradiction using additive generatorsNarcís Clara. 1099-1106 [doi]
- Fuzzy Bi-matrix games based on fuzzy structured elementCunlin Li, Ting Lei. 1107-1111 [doi]
- Fuzzy comprehensive evaluation method used in risk assessment of accidents on campus crowded stampedeQiquan Wang. 1112-1117 [doi]
- Fuzzy measures defined by pan-integralMinhao Yu, Jun Li, Xiaoli Hu, Yongjing Ji. 1118-1121 [doi]
- Fuzzy stabilizers in MV-algebrasXiaoyun Cheng, Xiao Long Xin, Jun Tao Wang. 1122-1126 [doi]
- Identifying an unknown flying target in missile defense systems using intelligent fuzzy neural networksChi-Hsu Wang, Kar-Chun Hor, Bin Wang. 1127-1132 [doi]
- Interval approach for encoding words into interval type-2 fuzzy sets based on normal distribution and free parameterZizhou Su, Dan Hu, Xianchuan Yu. 1133-1140 [doi]
- NMF-based stochastic models for multi-label propagationLiang Sun 0003, Hongwei Ge, Weiting Sun. 1141-1147 [doi]
- On a class of conjunctive left-continuous uninormsGang Li, Yongqiang Ren, Qingbo Yang. 1148-1151 [doi]
- On regular filters and well filters of pseudo-BCI algebrasXiaohong Zhang, Choonkil Park. 1152-1157 [doi]
- Robust segmentation of brain MRI images using a novel fuzzy c-means clustering methodMin Li 0009, Zhikang Xiang, Limei Zhang, Zhichao Lian, Liang Xiao 0001. 1158-1162 [doi]
- Temporal fuzzy association rules mining based on fuzzy information granulationZebang Li, Fan Bu, Fusheng Yu. 1168-1174 [doi]
- The construction of non-convex fuzzy setsDan Hu, Tao Jiang, Xianchuan Yu. 1175-1181 [doi]
- Typical interval-valued hesitant fuzzy probabilityXiujiu Yuan, Jiang Li, Xuejun Zhao. 1182-1187 [doi]
- Weak commutativity of fuzzy finite state machinesFeidan Huang, Jingkai Yang, Ying Zhai, Xuejia Li. 1188-1196 [doi]
- A new approach to exploring rough set boundary region for feature selectionRong Li, Yanpeng Qu, Ansheng Deng, Qiang Shen, Changjing Shang. 1197-1202 [doi]
- An improved attribute significance measure based on rough setZhenyu Chen, Xiaohong Zhang. 1203-1209 [doi]
- Analyzing environmental factors of on-line monitoring of smelting alloy steel using rough setShibing Ye, Peng Yang, Meiling Feng, Junqing Sun. 1210-1215 [doi]
- The computing approach for attribute reducts of information systems based on fuzzy matrixYanling Wang, Yanyong Guan, Fasheng Xu, Hongkai Wang. 1216-1221 [doi]
- Fuzzy-rough feature selection based on λ-partition differentiation entropyQian Sun, Yanpeng Qu, Ansheng Deng, Longzhi Yang. 1222-1227 [doi]
- Granular computing in wineinformaticsBernard Chen, Krizia Houston Buck, Caleb Lawrence, Christopher Moore, Jeremy Yeatts, Travis Atkison. 1228-1232 [doi]
- On utilization of k-means for determination of q-parameter for tsallis-entropy-maximized-FCMMakoto Yasuda. 1233-1240 [doi]
- Rough membership measure in intuitionistic fuzzy information systemBinbin Sang, Weihua Xu. 1241-1246 [doi]
- Fuzzy approach to fatigue problems in composite materials and structuresFatigue Life Durability, Fatigue Behaviour. 1247-1253 [doi]
- Real-time gas insulation state evaluation model of the gas insulated switchgearJianxia Chen, Wei Zhang, Qin Fang, Yu Cheng, Jie Zhang, Xiaoxing Zhang, Miao Jin. 1254-1260 [doi]
- Risk index assessment for urban natural gas pipeline leakage based on artificial neural networkYang Zhou, Zhengwei Wu. 1261-1263 [doi]
- A new approach of anti-swing control system based on run-to-run control and fuzzy control for overhead craneXiaoliang Wang, Hongbo Liu, Xiaochen Lai, Zhen Xu, Ruixin Jiang. 1264-1270 [doi]
- Balance control by diffuse logic for a phoenix hexapod robotDarwin Alulema, Cristian Andino, Diego Rodriguez, Victor Proano, Alexander Ibarra, Derlin Morocho, Freddy Tapia, Veronica Alulema. 1271-1276 [doi]
- Design of adaptive fuzzy sliding mode control via improved ant colony optimization algorithmXiaoyu Zhang, Chuanzhen Wei. 1277-1283 [doi]
- Observers of control state and uncertainty using Takagi-Sugeno fuzzy modelHugang Han, Yuki Sueyama, Chun-Jun Chen. 1284-1289 [doi]
- Fractional-order chaotic synchronization with unknown and uncertain via a new fuzzy sliding mode controlWenguang Yang, Yanhui Gao. 1290-1294 [doi]
- A fast speech feature extraction method based on perceptual hashingQiu-yu Zhang, Sibin Qiao, Tao Zhang, Yi-Bo Huang. 1295-1300 [doi]
- An adaptive grayscale image de-noising technique by fuzzy inference systemAshik Mostafa Alvi, Sheikh Faisal Basher, Ahsan Habib Himel, Tonmoy Sikder, Mashrikul Islam, Rashedur M. Rahman. 1301-1308 [doi]
- A combination of backpropagation neural network on fuzzy inference system approach in Indonesia scholarship selection process: Case study: "Bidik misi" scholarship selectionLuther Alexander Latumakulita, Tsuyoshi Usagawa. 1309-1314 [doi]
- Cutter layout design for tunnel boring machine (TBM) using fuzzy collaborative optimization modelYe Tao, Hong Yu, Wen-lian Yang, Hai-Bo Xi, Jian-Bin Wang. 1315-1320 [doi]
- Evolving GMDH-neuro-fuzzy system with small number of tuning parametersYevgeniy Bodyanskiy, Olena O. Boiko, Yuriy Zaychenko, Galib Hamidov. 1321-1326 [doi]
- Alternative optimization of multi-objective reservoirs with fuzzy optimum neural networksYu Guo. 1327-1330 [doi]
- Game influence diagrams with interval-valued utilitiesChangchun Ren, Lihua Zhou, Yuan Fang, Lizhen Wang. 1331-1338 [doi]
- Measuring the efficiency of international container ports with fuzzy DEAYu-Jie Wang, Shiang-Min Meng, Tzeu-Chen Han. 1339-1343 [doi]
- Optimal marketing strategy for electricity retailer considering interruptible loadKe Zhang, Diansheng Luo, Chong Wang, Ailing Liu. 1344-1348 [doi]
- Steady state properties of repairable cold standby systems with double uncertaintyYing Liu, Xiaozhong Li, Yang Yu, Dan Wang. 1349-1356 [doi]
- The bounds of premium and a fuzzy insurance model under risk aversion utility preferenceYing Liu, Xiaozhong Li, Dan Wang, Lixin Cui. 1357-1362 [doi]
- Towards social fuzzy geoparticipation stimulated by gamification and augmented realityRobert Olszewski, Milosz Gnat, Hanna Trojanowska, Agnieszka Turek, Agnieszka Wieladek. 1363-1370 [doi]
- A model of fuzzy opinion dynamicsFeifan Liu, Shuangling Luo, Haoxiang Xia. 1371-1377 [doi]
- A multilevel information processing technique for risk decision makingYu Xiang, Li Ma. 1378-1385 [doi]
- An uncertain aggregate production planning model for vegetablesNa Pang, Yufu Ning. 1386-1395 [doi]
- Application of fuzzy MCDM approach for evaluating and selecting solar energy suppliersSrimannarayana Grandhi, Santoso Wibowo. 1396-1401 [doi]
- Assessment of the contribution of a source of information to the final belief in a propositionPawel Kowalski, Trevor Martin. 1402-1409 [doi]
- Generalized pythagorean fuzzy information aggregation operators for multi-criteria decision makingYanjun Wang, Lidong Wang, Arun Kumar Sangaiah. 1410-1415 [doi]
- Int-fGrid: A type-2 fuzzy approach for scheduling tasks of computational gridsBruno M. P. Moura, Guilherme B. Schneider, Adenauer C. Yamin, Renata H. S. Reiser, Maurício L. Pilla. 1416-1423 [doi]
- Put currency option pricing under uncertain environmentsXiao Wang 0008, Yufu Ning. 1424-1428 [doi]
- A scientific judgment on overload transport by subtractive fuzzy c-means algorithm & three-way decisionsHao Wu, Qing-yun Luo, Si-yan Chen, Zhen-hua Zhang. 1429-1434 [doi]
- A novel approach for paper recommendation based on rough-fuzzy set theoryChu Wang, Daling Wang, Shi Feng, Yifei Zhang, Hongchen Liu. 1435-1442 [doi]
- Cloud model-based algorithm for uncertain strokes of interactive sand paintingTao Wu, Xia Chen, Limin Zhang. 1443-1450 [doi]
- Efficiency evaluation of emergency support based on fuzzy centralization statistical theoryXia Deng-you, Zhou Yang. 1456-1460 [doi]
- Estimation of heat flux distribution in convective heat transfer system based on decentralized fuzzy inferenceKun Wang, Guangjun Wang, Hong Chen, Fei Yan. 1461-1466 [doi]
- Fuzzy estimation of thermal boundary conditions of the three-dimensional steady-state heat transfer systemGuangjun Wang, Shibin Wan, Hong Chen, Cai Lv, Qiao Hua. 1467-1473 [doi]
- Fuzzy set ordination analysis of survival communities for an endangered medicinal plant species, Phellodendron amurenseNaiqi Song, Jin-Tun Zhang. 1474-1478 [doi]
- Intuitionistic fuzzy prioritized information aggregation operators based on Einstein operations and their applications to MCDMKefeng Li, Bin Chen. 1479-1484 [doi]
- Inversion about heat flux with phase change process in molten material reactor based on fuzzy adaptive predictionGuangjun Wang, Yanhao Li, Hong Chen. 1485-1490 [doi]
- Modeling and verification of cyber-physical systems under uncertaintyShengling Geng, Jiao Peng, Ping Li. 1491-1496 [doi]
- Optimizing equipment configuration of handling technology in an ore terminal based on fuzzy ruleXiaoling Huang, Meng Zhang, Jiaqing Sun, Jinxue Xu, Jihong Chen. 1497-1504 [doi]
- Predictive control of superheated steam temperature based on decentralized fuzzy inferenceGuangjun Wang, Cai Lv, Hong Chen, Shibin Wan. 1505-1509 [doi]
- Some operations on strong intuitionistic fuzzy k-uniform hypergraphsQian Wang, Zengtai Gong. 1510-1516 [doi]
- The application of fuzzy probability in assessment of pure electric vehicle battery systemHui Zhao, Na Liu, Hua Tong Xu, Yongqin Zhou. 1517-1521 [doi]
- The fuzzy neural network based haul truck driver fatigue detection in surface miningEnji Sun. 1522-1526 [doi]
- The improved detection of vehicle on the road for GF-2 satellite image with 1m spatial resolutionTong Gao, Wei-de Kang, Wei Hu, Yue-jiao Fan. 1527-1531 [doi]
- Tourist spot recommendation system using fuzzy inference systemHaymontee Khan, Noel Mannan, Shahnoor Chowdhury Eshan, Md. Mustafizur Rahman, K. M. Mehedi Hasan Sonet, Wordh Ul Hasan, Rashedur M. Rahman. 1532-1539 [doi]
- TV series recommendation using fuzzy inference system, K-Means clustering and adaptive neuro fuzzy inference systemMuyeed Ahmed, Anirudha Paul, Mir Tahsin Imtiaz, Md. Zahid Hassan, Shawon Ashraf, Rashedur M. Rahman. 1540-1547 [doi]
- A fast algorithm for mining temporal association rules based on a new definitionLi Zhan, Fusheng Yu, Huixin Zhang. 1548-1553 [doi]
- Accident prevention by fault propagation analysis and causal fault diagnosis based on granger causality testJinqiu Hu, Laibin Zhang, Anqi Wang, Siyang Li. 1554-1558 [doi]
- Analysis of medical and healthcare data based on positive and negative association rulesChenlu Li, Feng Hao, Long Zhao, Lizhe Song, Xiangjun Dong. 1559-1564 [doi]
- Specific temporal association rules and temporal correlations to enlarge and detect inconsistencies in a large growing knowledge baseRafael Garcia, Leonel Miani, Estevam Rafael, Hruschka Junior. 1565-1574 [doi]
- A collaborative intrusion detection based on K-means and projective adaptive resonance theoryYi Yi Aung, Myat Myat Min. 1575-1579 [doi]
- A hybrid data gravitation based classification algorithm applied to gene expression dataWei-Chang Yeh, Yen-Chin Lee, Chyh-Ming Lai, Yan-Chih Shih, Hsin-Ping Huang, Yunzhi Jiang. 1580-1585 [doi]
- A new supervised image classification using data set partitionMengmeng Liao, Xiaodong Gu. 1586-1591 [doi]
- An improved fusion algorithm based on RBF neural network and its application in data miningYaohui Liu, Rong Yang, Jianfei Pan, Denggui Wang. 1592-1597 [doi]
- Classification of file duplication by hierarchical clustering based on similarity relationsManop Phankokkruad. 1598-1603 [doi]
- Creation of semantic location profiles using Bayes, rule-based, trees and meta classification approachesS. C. Ganiachchi, S. S. Wijenayake, J. C. Wijekoon, S. Ahangama. 1604-1609 [doi]
- DCT MFA subspace hyperspectral remote sensing images terrain classificationJing Liu, Meng-yan Li, Yi Liu. 1610-1614 [doi]
- An improved decision tree algorithm based on mutual informationLietao Fang, Hong Jiang, Shuqi Cui. 1615-1620 [doi]
- Semantic analysis of social media and associated psychotic behaviorAmna Noureen, Usman Qamar, Mubashir Ali. 1621-1630 [doi]
- Sentiment analysis of bangla microblogs using adaptive neuro fuzzy systemMd. Asimuzzaman, Pinku Deb Nath, Farah Hossain, Asif Hossain, Rashedur M. Rahman. 1631-1638 [doi]
- Specific emitter identification using decomposed hierarchical feature extraction methodsWei Wang, Hui Liu, Jun-an Yang, Haibo Yin. 1639-1643 [doi]
- Terrain classification of hyperspectral remote sensing images based on kernel maximum margin criterionJing Liu, Cheng-cheng Qiu, Yi Liu. 1644-1650 [doi]
- A data selection framework for k-means algorithm to mine high precision clustersZhengzheng Lou, Chaoyang Zhang. 1651-1657 [doi]
- A heuristic similarity measure and clustering model to improve the collaborative filtering algorithmBin Jiang, Ting-Ting Song, Chao Yang. 1658-1665 [doi]
- A novel intelligent clustering approach for high dimensional data in a big data environmentQian Tao, Zhenyu Wang, Chunqin Gu, Wenyuan Chen, Weiqiang Lin, Haojie Lin. 1666-1671 [doi]
- A strategy based on community detection for parallel topology analysis in power networksJunjie Liu, Jun Liang, Zhihao Yun, Yan Zhao, Yong Zhang. 1672-1675 [doi]
- Attribute weighted fuzzy clustering algorithm based on mutual informationYao Zhu Cao, He Lin, Biao Liu. 1676-1682 [doi]
- Evaluation of promoting effects of several transdermal enhancers by factor and cluster analysisYi-biao Liang, Jin-Ling Li, Hui Wang. 1683-1688 [doi]
- A novel linear secret sharing scheme with multiple prime moduliHuaixi Wang, Nina Shu, Chen Wang, Jianxiong Chen. 1689-1693 [doi]
- An efficient algorithm for frequent pattern mining based on privacy-preservingYaling Zhang, Ting Wang, Shangping Wang. 1694-1699 [doi]
- An adaptive density clustering algorithm for massive dataKeyan Cao, Ibrahim Musa, Jiadi Liu, Yunting Zhang. 1700-1707 [doi]
- Based local density trajectory outlier detection with partition-and-detect frameworkFangjun Luan, Yunting Zhang, Keyan Cao, Qi Li. 1708-1714 [doi]
- Collaborative filtering recommendation algorithm optimization based on latent factor model clusteringErxin Wang, Wenbin Yao, Dongbin Wang. 1715-1719 [doi]
- Detecting the collusive bidding behavior in below average bid auctionMing Lei, Zihan Yin, Shalang Li, Hao Li. 1720-1727 [doi]
- Discovering probabilistic weighted frequent itemsets over uncertain dataTao You, Tingfeng Li, Chenglie Du, Xiang Zhai, Nan Jiang. 1728-1734 [doi]
- A query method for domain ontology based on HBaseHong Wang, Kang Sun, Xuejun Wang. 1735-1740 [doi]
- Formal transforming approach of spatiotemporal data from XML to object-oriented databaseLuyi Bai, Zhiyi Jia, Jiemin Liu, Lin Zhu. 1741-1744 [doi]
- Infrared image change detection of substation equipment in power system using random forestHua Yang, Jipu Gao, Changbao Xu, Zheng Long, Weigang Feng, Shaohua Xiong, Shuaiwei Liu, Shan Tan. 1745-1751 [doi]
- Knowledge-based system for improving supply chain resilienceYu Cui. 1752-1756 [doi]
- Tendency determining of knowledge-transfer evolution based on patent citation networkHante Duan, Mengjun Li, Hanlin You, Fangzhou Chen, Jiang Jiang, Qi Wang. 1757-1763 [doi]
- A novel keyphrase extraction method by combining FP-growth and LDAHao Sun, Bing Li, Bo Han. 1764-1768 [doi]
- A parallel randomized neural network on in-memory cluster computing for big dataTongwu Dai, Kenli Li, Cen Chen. 1769-1778 [doi]
- Abnormal condition diagnosis for process industry based on virtual sensing technologyJinqiu Hu, Xiaoxiao Hao, Laibin Zhang. 1779-1784 [doi]
- An improved credit card users default prediction model based on RIPPERPu Xu, Zhijun Ding, Meiqin Pan. 1785-1789 [doi]
- Analyst intuition inspired high velocity big data analysis using PCA ranked fuzzy k-means clustering with multi-layer perceptron (MLP) to obviate cyber security riskT. T. Teoh, Yue Zhang, Y. Y. Nguwi, Yuval Elovici, W. L. Ng. 1790-1793 [doi]
- Applications of the VOLA format for 3D data knowledge discoveryJonathan Byrne, Sam Caulfield, Leonie Buckley, Xiaofan Xu, Dexmont Pena, Gary Baugh, David Moloney. 1794-1801 [doi]
- Attribute reduction based on object conceptsCan Wang, Xi Yu, Lijuan Wang, Danni Liu, Chunming Xu. 1802-1806 [doi]
- Block dictionary learning with l0 regularization and its application in image denoisingWei Xue, Wensheng Zhang. 1807-1813 [doi]
- Classification of endangered languages using decision tree based algorithmsDongsheng Che, Taylor Shafer, Pu Tian. 1814-1821 [doi]
- Face recognition with improved deep belief networksRong Fan, Wenxin Hu. 1822-1826 [doi]
- Hierarchical hypothesis structure for ensemble learningChu-En Yu, Chien-Liang Liu, Hsin-Lung Hsieh. 1827-1832 [doi]
- HUNSPM: An efficient algorithm for mining high utility negative sequential patternsTongxuan Li, Tiantian Xu, Xiangjun Dong. 1833-1837 [doi]
- Improve regression accuracy by using an attribute weighted KNN approachZiqi Chen, Bing Li, Bo Han. 1838-1843 [doi]
- Influence of noise on transfer learning in Chinese sentiment classification using GRUMingjun Dai, Shansong Huang, Junpei Zhong, Chenguang Yang, Shiwei Yang. 1844-1849 [doi]
- Prediction of DNA-binding protein using random forest and elastic netQiujian Chen, Lei Li, Kun Yang, Rong Long, Feng Shi. 1850-1854 [doi]
- Predictive model based on decision tree combined multiple regressionsJing-Rong Chen, Yu-Heng Lin, Yih-Guang Leu. 1855-1858 [doi]
- Real time utility-based recommendation for revenue optimization via an adaptive online Top-K high utility itemsets mining modelRuixin Yang, Mingyang Xu, Paul Jones 0001, Nagiza F. Samatova. 1859-1866 [doi]
- Reliable and practical fall prediction using artificial neural networkWilliam Engel, Wei Ding. 1867-1871 [doi]
- The graded multi-granulation rough set based on interval-valued fuzzy information systemDerong Shi, Binin Sang, Weihua Xu. 1872-1878 [doi]
- Unconscious decision minds and divergent thinking modelZhenzhen Wang. 1879-1886 [doi]
- Variational hidden conditional random fields with beta processesChen Luo, Shiliang Sun, Jing Zhao. 1887-1893 [doi]
- A clustering reduction algorithm for fuzzy concept latticeQiangyi Zhang, Yanpeng Qu, Ansheng Deng, Reyer Zwiggelaar. 1894-1899 [doi]
- An estimation algorithm of time-varying channels in the OFDM communication systemLi Tian, Zhen Su. 1900-1904 [doi]
- Approximate optimization for facility location on two-dimensional internetwork topologyWenbin Qian, Jun Yang, Wenhao Shu, Hong Deng, Jun Liu. 1905-1909 [doi]
- Feature extraction and face recognition algorithmShuang Wang, Guanyu Wen, Hua Cai. 1910-1914 [doi]
- Prediction of electrical equipment failure rate based on improved drosophila optimization algorithmHui Wang, Liang Zhao, Jian-Shu Liu, Xiu Ji. 1915-1921 [doi]
- A method for principal components selection based on stochastic matrixYangwu Zhang, Guohe Li, Limei Wang, Heng Zong, Jingming Zhao. 1927-1933 [doi]
- An improved sampling K-means clustering algorithm based on MapReduceYa-ling Zhang, Ya-Nan Wang. 1934-1939 [doi]
- Visualizing smart water meter dataset clustering with parametric t-distributed stochastic neighbour embeddingStephen Mounce. 1940-1945 [doi]
- A multidimensional time-series association rules algorithm based on sparkDongyue Liu, Bin Wu, Chao Gu, Yan Ma, Bai Wang. 1946-1952 [doi]
- A noval space-time feature extraction approach for load forecastingWei Zhang, Gangui Yan, Gang Mu. 1953-1957 [doi]
- Analyzing the effect of power supply net capacity on electricity sales based on growth curveYuze Chen, Jiakui Zhao, Jian Liu, Yuxi Liu, Bingxin Wang, Ouyang Hong, Hongwang Fang, Yaozong Lu. 1958-1963 [doi]
- Comparative analysis of the outcomes of differing time series forecasting strategiesShamsul Masum, Ying Liu, John Chiverton. 1964-1968 [doi]
- Intermittent demand forecasting and inventory control with multiple temporal and cross-sectional aggregation and disaggregation methodsMing Lei, Zihan Yin, Shalang Li, Qian Tan. 1969-1977 [doi]
- Trajectory outlier detection based on partition-and-detection frameworkLiang Bao, Shanshan Wu, Weizhao Chen, Zisheng Zhu, Fan Yi. 1978-1983 [doi]
- A biomedical events extracted approach based on phrase structure treeLejun Gong, Zhifei Zhang, Xuemin Yang, Daoyu Huang, Ronggen Yang, Geng Yang. 1984-1988 [doi]
- A hybrid model for blood pressure prediction from a PPG signal based on MIV and GA-BP neural networkYue Zhang, Zhanyu Wang. 1989-1993 [doi]
- A MPI based parallel algorithm for inferring gene regulatory networksYaou Zhao, Yuehui Chen, Shi-Yuan Han, Xiao Xie. 1994-1998 [doi]
- An optimized fuzzy clustering algorithm for brain magnetic resonance image segmentationTing Zhang. 1999-2005 [doi]
- Comparison of software packages for Bayesian network learning in gene regulatory relationship miningYu Kang, Xuan Yang, Menghai Sun, Junfan Hu, Zhiman Zhong, Jianxiao Liu. 2010-2015 [doi]
- Discovering genomic islands in microbial genomes using a genetic algorithmDongsheng Che, Pingsheng Gao, Pu Tian, Bernard Chen 0001. 2016-2023 [doi]
- Normal and abnormal phonocardiogram classification based waveform and frequency features using LS-SVMYatao Zhang, Shoushui Wei. 2033-2037 [doi]
- Optimal channel set selection for SSVEP-based BCI using spatial temporal correlationJin Zhang, ChunGang Yan, Lei Cao, Xiaoliang Gong. 2038-2042 [doi]
- Random Forest model for quality control of high resolution mass spectra from SILAC labeling experimentsLong Chen 0001, Tianjun Li. 2043-2048 [doi]
- Retrieving Myers-Miller alignments for pairwise biological sequences using sparkXiangyuan Zhu, Bing Li, Jian Li, Kenli Li. 2049-2053 [doi]
- Similarity evaluation on noisy time series gene expression data using particle filter and longest common subsequenceHaixin Wang, Dawit Aberra. 2054-2059 [doi]
- Random forest and Bayesian prediction for Hepatitis B virus reactivationHuina Wang, Yihui Liu, Wei Huang. 2060-2064 [doi]
- The prediction of protein secondary structure based on auto encoderShuai-Yan Zhang, Yihui Liu, Jinyong Cheng. 2065-2069 [doi]
- Electric customer credit-rating based on entropy and Newton's law of coolingYan Chen, Jiakui Zhao, Yuxi Liu, Bei Jin, Feng Wang, Jing Cao, Hong Ouyang, Bao Yuan, Pingfei Zhu. 2070-2074 [doi]
- A scalable frequent user association mining algorithm using MapReduceLi Zhang, Bing Tang. 2075-2079 [doi]
- Analyst intuition based Hidden Markov Model on high speed, temporal cyber security big dataT. T. Teoh, Y. Y. Nguwi, Yuval Elovici, N. M. Cheung, W. L. Ng. 2080-2083 [doi]
- Analyzing healthcare big data for patient satisfactionKaiyu Wan, Vangalur S. Alagar. 2084-2091 [doi]
- Design and implementation of the water environmental quality monitoring system based on big dataZhenhai Wang, Bo Xu. 2092-2096 [doi]
- Large-scale image similarity search optimization based on multi-core architectureJun-Yi Li, Jian-hua Li. 2097-2101 [doi]
- Multi-keywords carrier-free text steganography based on part of speech taggingYuling Liu, Jiao Wu, Guojiang Xin. 2102-2107 [doi]
- On using cached results to enumerate maximal k-cliques in GeneWeaverQi Yang, Greg Speegle, Erich J. Baker. 2108-2115 [doi]
- Patent abstract analysis on Chinese big dataZongbao Yang, Zhiqian Zhang, Shaohong Zhang, Jing Wang, Haodong Lin, Baoying Zeng. 2116-2122 [doi]
- Block linked list index structure for large data full text retrievalYang Yang, Hongyun Ning. 2123-2128 [doi]
- Research on methods of improving customer profile in electric power marketing based on big data analysis of customer's electricity addressHong Lin, Yan Chen, Jiakui Zhao, Zhongping Xu, Yuze Chen, Jian Liu, Hong Ouyang, Bao Yuan, Genxin Xiong. 2129-2136 [doi]
- The performance analysis of Docker and rkt based on KubernetesXiao-Lan Xie, Peng Wang, Qi Wang. 2137-2141 [doi]
- Performance evaluation of state-owned listed company in Anhui province based on different subjectsMi Zhou, Yu-Ge Yao, Dan-dan Li. 2142-2149 [doi]
- Real-time messaging and time-shifted communication wireless systemsKhaled Deeb. 2150-2154 [doi]
- Semantic image query based on bimodal hashJiale Wang, Deng Chen, Guohui Li. 2155-2160 [doi]
- Towards a two-phase unsupervised system for cybersecurity concepts extractionZhifeng Xiao. 2161-2168 [doi]
- Highlight extraction in soccer videos by using multimodal analysisHuayong Liu. 2169-2173 [doi]
- A feature optimization algorithm of concept similarity based on Chinese wikipediaXiaofei Chang, Lei Liu, Mengtao Sun, Yalu Jia, Chunxia Zhang. 2174-2179 [doi]
- A novel rumor detection method based on labeled cascade propagation treeGuoyong Cai, Mengying Bi, Jianxing Liu. 2185-2194 [doi]
- Exploiting semantic knowledge base for patent retrievalFeng Wang, Lanfen Lin. 2195-2200 [doi]
- How to find valuable references? Application of text mining in abstract clusteringYanfang Zhang, Yan Wan. 2201-2205 [doi]
- Improving semantic role labeling using high-level classification in complex networksMurillo G. Carneiro, João Luís Garcia Rosa, Qiusheng Zheng, Xiaoming Liu, Liang Zhao. 2206-2212 [doi]
- Information retrieval approach based on indexing text documents: Application to biomedical domainKabil Boukhari, Mohamed-Nazih Omri. 2213-2220 [doi]
- Language independent text summarization of western European languages using shape coding of text elementsAhmed Abdelfattah Saleh, Li Weigang. 2221-2228 [doi]
- Named entity recognition in the domain of geographical subjectFeifei Xu, Huiying Li, Xuelian Li. 2229-2234 [doi]
- SenFact algorithm: Fact-checking by the confrontation of opinionsEdouard Ngor Sarr, Ousmane Sall, Assane Diagne. 2235-2241 [doi]
- Face recognition based on SIFT and LBP algorithm for decision level information fusionTong Gao, Xue-mei Lei, Wei Hu. 2242-2246 [doi]
- Link prediction via local structural information in complex networksSong Gao, Lihua Zhou, Xiaoxuan Wang, Hongmei Chen. 2247-2253 [doi]
- The comparison of four methods in finding influential spreader in social networkBaozhang Ren, Yu Hui Deng, Ping He, Kang-Too Tsang. 2254-2261 [doi]
- Querying RDF graphs over partitioned indexesLei Gai, Junmin Liu, Xiaoming Wang, Jian Li. 2262-2267 [doi]
- A novel key-points based shapelets transform for time series classificationManman Peng, Jun Luo. 2268-2273 [doi]
- Abnormal behavior recognition based on improved Gaussian mixture model and hierarchical detectorsShuang Liu, Peng Chen, Denis Spelic. 2274-2279 [doi]
- Bus scheduling method based on image texture and color analysisXiangyang Liu, Fengjiao Li, Shuming Jiang, Huisong Wan. 2280-2284 [doi]
- Classification of malignant-benign pulmonary nodules in lung CT images using an improved random forest (Use style: Paper title)Huihui Hu, Shengdong Nie. 2285-2290 [doi]
- Cluster and dynamic-TrAdaBoost-based transfer learning for text classificationZibin Li, Bo Liu, Yanshan Xiao. 2291-2295 [doi]
- Cross-angle behavior recognition via supervised dictionary learningGuanghui Lu, Bo Liu, Yanshan Xiao. 2296-2300 [doi]
- Deeply learned electrocardiogram representations are robustYue Zhang, Xiafei Lei. 2301-2305 [doi]
- Design of 3-factor strict local language in ethological data mining of bengalese Finch's and White-Rumped Munia's songPulkit Mathur, Vishwajeet Dagar, Ajay Kumar. 2306-2311 [doi]
- Detecting defects on citrus fruit surface by circularity gradient threshold segmentationJun Lu, Xiuwen Hu. 2312-2316 [doi]
- Gait based human identification in surveillance videosMan Qi. 2317-2322 [doi]
- Improved regression method with interval estimationPeter Krammer, Marcel Kvassay, Ladislav Hluchý. 2323-2329 [doi]
- Kernel low-rank embedding dictionary learning for face recognitionYuqi Pan, Mingyan Jiang. 2330-2333 [doi]
- Large dataset summarization with automatic parameter optimization and parallel processing for outlier detectionZhaoyu Shou, Simin Li. 2334-2340 [doi]
- Matching method combined hough transform and RANSAC for spectrometer wavelength calibrationZhihui Wang, Qing Song, Lu Yang 0006, Wenhe Jia, Liyi Yang. 2341-2346 [doi]
- Spectrum segmentation and peak-seeking method based on spectral energyLu Yang 0006, Qing Song, Zhihui Wang, Shihui Zhang. 2347-2353 [doi]
- The optimal maintenance strategy of power transformers based on the life cycle costJian-Peng Bian, Su Yang, Xiaoyun Sun. 2354-2358 [doi]
- The optimal switching strategy of transformers based on the costSu Yang, Yanjun Feng, Qinghong Wang, Jianpeng Bian. 2359-2366 [doi]
- Threshold algorithm for pancreas segmentation in Dixon water magnetic resonance imagesXiaoying Shan, Chaolin Du, Yufei Chen, Asoke K. Nandi, Xiaoliang Gong, Chao Ma, Panpan Yang. 2367-2371 [doi]
- A method for discovering data patterns through constructing feature networksXiaomeng Li, Chengli Zhao, Qiangjuan Huang, Xiaojie Wang, Dongyun Yi. 2372-2378 [doi]
- A decision support model used in teaching estimation system for bachelor course based on RSTRongyong Zhao, Cuiling Li, Xiangke Tian, Dong Wang 0016, Qianshan Hu, Qin Zhang, Xiaojuan Luo. 2379-2382 [doi]
- Application of attribute reduction algorithm based on rough set in financial management of commercial banksWeiwei Li, Weiyang Chen, Changfu Ma, Zhiqiang Yu. 2383-2390 [doi]
- Automated vehicles: Multivariate analysis of drivers' take-over behaviourF. Said, C. Chauvin. 2391-2396 [doi]
- CFXGBoost: Topic phrase extraction based on context features and XGBoost for knowledge base question answeringHan Han, Fengyu Yang, Jiuming Huang, Bin Zhou 0004. 2397-2402 [doi]
- Contraflow-constrained evacuation route planningWu Ni, Dan Guo, Hailei Wang, Wenbo Li. 2403-2410 [doi]
- Efficient electricity sales forecasting based on curve decomposition and factor regressionJian Liu, Jiakui Zhao, Yuze Chen, Yuxi Liu, Xuemin Fang, Ouyang Hong, Hong Lin, Bao Yuan, Yaozong Lu. 2411-2418 [doi]
- Fairness maintenance in social regional resource allocation managementLian Pan, Jie Su, H. Wang. 2419-2423 [doi]
- Forecasting of the electric vehicles' charging amount of electricity based on curves clusteringQijin Huang, Yan Chen, Zhou Sun, Jing Cao, Jiakui Zhao, Hong Ouyang, Pingfei Zhu, Dong Wang, Yuxi Liu. 2424-2428 [doi]
- Geospatial preprocessing for situational assessment through hydraulic simulationsGiang Nguyen, Martin Bobák, Ladislav Hluchý. 2429-2435 [doi]
- Knowledge characterization and evolution methodology of emergency scenario based on hybrid Petri netChen Chen, Yabin Yang, Xinmei Zhang. 2436-2440 [doi]
- Markov chain-based flight operations risk analysisWei Wang, Tianwei Zhang, Lin Wang. 2441-2445 [doi]
- Multi-attributes risk investment decision making based on dynamic probability rough setsXiumei Hao, Huifang Guo, Xiuqing Jiang. 2446-2450 [doi]
- Network attack path reconstruction based on similarity computationJian-Wei Tian, Xi Li, Zhen Tian, Weihui Qi. 2457-2461 [doi]
- On the use of Arabic stemmers to increase the recall of information retrieval systemsIhab Nasra, Mohammed Maree. 2462-2468 [doi]
- On-line static voltage security risk assessment based on Markov chain model and SVM for wind integrated power systemZhihao Yun, Qiong Zhou, Ying Feng, Donglei Sun, Jingwen Sun, Dong Yang. 2469-2473 [doi]
- Parameter optimization based two-layer SVM classification model for evaluation of maize breedingXin Mao, Gang Zhao, Ruoying Sun. 2474-2479 [doi]
- Probe into optimal combination of parameterization in continuous power flowXiangwen Cheng, Xiaoke Chen, Jinquan Zhao, Lixuan Jia, Jianzhi Liu. 2480-2484 [doi]
- Research on influential factors of E-commerce recommendation user behavior intentionXiu-Li Pang, Jiang Wei. 2485-2490 [doi]
- Inventory demand forecast based on gray correlation analysis and time series neural network hybrid modelFengjiao Cheng, Ruoying Sun. 2491-2496 [doi]
- Solving smart city revitalisation problems with geoparticipation process and fuzzy methodsRobert Olszewski, Hanna Trojanowska, Agnieszka Turek, Bogna Kietlinska. 2497-2503 [doi]
- Space syntax and time distance based analysis on the influences of the subways to the pubic traffic accessibility in Nanchang cityHan-yue Zhang, Bi-song Hu. 2504-2511 [doi]
- The optimal phase sequence arrangement of multicircuit transmission lines on the same towerHelong Li, Xueming Wang, Jinquan Zhao, Zhibin Zheng. 2525-2529 [doi]
- Towards a semi-automatic method for building Chinese tax domain ontologyYu Qiu, Li Cheng, Daniyal Alghazzawi. 2530-2539 [doi]
- Using cluster analysis to validate the angoff standard setting method in mixed-format assessmentsFen-Lan Tseng, Jia-Min Chiou, Yao-Ting Sung. 2540-2546 [doi]
- Analysis on employment situation of computer industry based on employing information data miningJiqiao Li, Shaohong Zhang, Zongbao Yang. 2551-2556 [doi]
- Numerical prediction of short-term snowy weather in Guangzhou via addition-subtraction frequency (ASF) algorithm with unequally half traversalYunong Zhang, Shuo Yang, Maotai Zou, Chengxu Ye, Yingbiao Ling. 2557-2562 [doi]
- Possible M7.0-or-above chile earthquake numerically projected via full-traversal addition-subtraction frequency methodYunong Zhang, Jiadi Wang, Fangzheng Lai, Yingbiao Ling, Chengxu Ye. 2563-2568 [doi]
- Query based summarization using topic background knowledgeYang Wei, Zhizhuo Yang. 2569-2572 [doi]
- Research on the key technology of big data service in university libraryChunlei Ye. 2573-2578 [doi]
- Resource scheduling strategy in consistency-based information-centric networkingLan Shi, Ying Zhao, Jianhui Lv, Peng Yin. 2579-2583 [doi]
- A novel image encryption algorithm based on the analysis sparse representation and double random phase encodingBiao Xu, Peng Guo, Ye Zhang. 2584-2589 [doi]
- An improved sample-based model for background subtractionShengqin Jiang, Xiaobo Lu. 2590-2594 [doi]
- Analysis of internal frequency's influence on blind detection of weak PSK signal by using duffing oscillatorYanhua Wu, Rangang Zhu. 2595-2605 [doi]
- AutoGrowCut - Automatic image segmentation by salient labelingJinliang Wu, Gang Wang, Jinyong Chen, Conghuan Tu, Qian Zhang, Qimin Cheng. 2606-2611 [doi]
- Automatic generation of composite image descriptionsChang Liu, Armin Shmilovici, Mark Last. 2612-2618 [doi]
- Boosted non-linear and non-negative sparse learning for single image super-resolutionYungang Zhang, Tianwei Xu. 2619-2623 [doi]
- Diffraction tomographic imaging algorithm for through-the-wall radar in planar multilayer environmentLele Qu, Yanan Ge, Tianhong Yang, Lili Zhang. 2635-2639 [doi]
- Efficient image decomposition for DECT by alternating direction methodLei Li, Ailong Cai, Linyuan Wang, Hanming Zhang, Zhizhong Zheng, Wanli Lu, Bin Yan. 2640-2644 [doi]
- Estimation of digital image noise based on multiscale segmentationYan Chen, Hongya Zhang, Kaimin Sun, Yepei Chen. 2645-2650 [doi]
- Evaluation of human brain aging via diffusion tensor imaging tract characteristicsXufeng Yao, Gan Huang, Tonggang Yu, Gang Huang. 2651-2655 [doi]
- Fast image dehazing under driving scenarioMengxiao Li, Xudong Yang. 2656-2661 [doi]
- Full polarimetric ground penetrating radar imaging using multiple measurement vectors modelLele Qu, Shimiao An, Tianhong Yang, Yanpeng Sun. 2662-2667 [doi]
- Fusion algorithms for multispectral and panchromatic image based on wavelet transformationXiao-Chun Li, Wei-Wei Yan, Wei-Hua Li. 2668-2673 [doi]
- Image de-noising based on association-prediction modelHaili Cui, Yanxiang Chen. 2681-2686 [doi]
- Image watermarking based on discrete fractional fourier transforms with multiple parametersWei-Ting Chiu, Yu Tai, Wen-Liang Hsue. 2687-2693 [doi]
- An efficient audio based performance evaluation system for computer assisted piano learningJing Pan, Ming Li, Zhanmei Song, Xiaolin Liu, Hua Yi, Manman Zhu, Xin Li. 2694-2698 [doi]
- Locally adaptive image denoising of "The first satellite of high resolution" image based on generalized Gaussian distributionZhentao Qin, Ru Yang. 2699-2704 [doi]
- Moving object attention selection using optical flow and pulse coupled neural networkJiancheng Wang, Xiaodong Gu. 2705-2709 [doi]
- Multi-parameter frequency warping based on LDAGang Liu, Boce Chu, Ruchao Fan. 2710-2714 [doi]
- Ore image thresholding segmentation using double windows with fisher discriminationGuoying Zhang, Mengjun Li, Yantong Zhan, Xiruo Shi. 2715-2719 [doi]
- Polar encode and decode in two-dimensional bar codeXizhong Lou, Jinghui Liao. 2720-2724 [doi]
- Reducing inverse quantization numbers for video transcodingMing-Te Wu. 2725-2729 [doi]
- Robust detection for object removal with post-processing by exemplar-based image inpaintingLinchuan Shen, Gaobo Yang, Leida Li, Xingming Sun. 2730-2736 [doi]
- Robust diffusion estimation algorithm via genearlized cauchy loss function over distributed networkWentao Ma, Jiandong Duan, Ning Li, Darui Zhu. 2737-2742 [doi]
- Single channel blind source separation using optimized local mean decompositionYina Guo, Xiaowen Ren, Chaoli Sun, Wenyan Tian. 2743-2748 [doi]
- Three-dimensional video inpainting using gradient fusion and clusteringYili Lai, Xianghong Tang, Xingxin Lou. 2749-2754 [doi]
- A novel relay selection algorithm based on mobile social networks for device-to-device cooperative communicationsZhiwei Fang, Xiaobin Li. 2755-2761 [doi]
- A recommendation model of smart parkingChin-Ling Chen, Wei-Cheng Chiu. 2762-2766 [doi]
- A sequential assisted relay selective scheme based on the stochastic dynamic programmingRui Zhu, Yangchao Huang, Lei Jiang, Hua Xu, Xihao Chen. 2767-2771 [doi]
- A source-location privacy protection algorithm in WSNs based on node distanceLeqiang Bai, Ye Yan, Shiguang Qian, Shihong Zhang. 2772-2776 [doi]
- A tree topology power allocation algorithm for non-orthogonal multiple access system in 5G systemYing Lin, Suoping Li, Duo Peng, Yamei Xu. 2777-2781 [doi]
- An adaptive vertical handover method based on prediction for heterogeneous wireless networksXiaobin Li. 2782-2787 [doi]
- Remotely checking data integrity with high efficiencyDaoli Huang, Changsheng Wan. 2788-2792 [doi]
- Channel estimation and symbol detection for AF relay system based on combined pilotRan Deng, Gaoming Huang, Gaoqi Dou, Jun Gao. 2793-2798 [doi]
- Comparative studies of IPv6 tunnel securityKejun Gu, Liancheng Zhang, Zhenxing Wang, Yazhou Kong. 2799-2804 [doi]
- Design of a low control-flow overhead-based software-defined wireless sensor network with link failureTeng Zhao, Haihui Wang, Mithun Mukherjee 0001, Lei Shu 0001. 2805-2811 [doi]
- Email trouble: Secrets of spoofing, the dangers of social engineering, and how we can helpBridget Opazo, Don Whitteker, Chen-chi Shing. 2812-2817 [doi]
- Energy-efficient power control in interference-limited spectrum sharing networks based on multi-objective optimizationJiajia Zhu, Run-ze Wu, Ankun Yang, Yanhua He, Hailin Hu, Liangrui Tang. 2818-2822 [doi]
- Information consistency in information-centric networkingLan Shi, Peng Yin, Jianhui Lv, Ying Zhao. 2823-2828 [doi]
- Intrusion detection algorithms based on correlation information entropy and binary particle swarm optimizationYan-fei Wang, Peiyu Liu, Min Ren, Xiao-Xue Chen. 2829-2834 [doi]
- Multi-dimensional resource allocation aware user clustering in user-centric overlapped virtual cellsHao Li, Changyin Sun, Yanxia Liang. 2835-2842 [doi]
- A network performance evaluation method based on objective weights determination for data center networkXiaofeng Shang, Lin Chen, Yang Nan. 2843-2849 [doi]
- Optimal relay placement for UAV-assisted wireless regenerative communication systemWei Wei, Shukang Chen, Jun Yan, Jian Ouyang, Wei-Ping Zhu. 2850-2854 [doi]
- User interest degree evaluation modelsJian Lv. 2855-2859 [doi]
- Using Botnet structure to construct the communication system of a real-time monitoring platform: Botnet structure for real-time monitoring platformHan-Wei Hsiao, Shih-Heng Tung, Ming-Hsiang Shih, Wen-Pei Sung. 2860-2865 [doi]
- A study on the impact of regulatory compliance awareness on security management performance and information technology capabilitiesYung Chang Wu, Linfeng, Shiann Ming Wu. 2866-2871 [doi]
- An evaluation power model for TriBA based application mapping and memory-on-chipXiaojun Wang, Feng Shi, Xu Chen, Fei Yin. 2872-2879 [doi]
- An improved similarity computation module based on basic semantics and influencing factors of concepts in domain ontologyLiubo Ouyang, Peiwen Hu. 2880-2885 [doi]
- Big data stream learning based on hybridized Kalman filter and backpropagation through time methodFan He, Ning Xiong. 2886-2891 [doi]
- Evaluation of depth perception based on binocular stereo visionZhibin Su, Dong-Rui Li, Hui Ren, Ling-feng Chen. 2892-2896 [doi]
- Financial risk analytics based on radial basis function neural networkLin Wang, Chun Yan, Yaqi Li, Wei Liu, Maozhen Li. 2897-2903 [doi]
- Optimal phase sequence of multi-circuit transmission lines on the same towerXiaoke Chen, Xiangwen Cheng, Jinquan Zhao, Jing Zhang, Xi He. 2904-2908 [doi]
- 2[0, 1] and fast wavelet algorithmsTurghunjan Abdukirim Turki, Matturdi Bardi, Aliya Yushan, Huang Yunhu. 2909-2914 [doi]
- iLuciano Barcellos de Paula, Henrique Martins Rocha. 2915-2919 [doi]
- XML structure graphic display based on JSmindYan-Song Cui, Xiao-Min Guo. 2920-2924 [doi]
- A heuristic method for single satellite observation and transmission tasks planningShuang Peng, Hao Chen, Jun Li, Ning Jing. 2925-2932 [doi]
- Indoor autonomous drone developmentZoltán Horváth, Norbert Zentai, Ildiko Jenak. 2933-2937 [doi]
- Pressure casting control for thin-walled parts based on dynamic matrix controlXiaojun Xing, Zhen Ma, Haibo Yu, Tuo Li, Zhuoya Wang, Yaohong Qu. 2938-2941 [doi]
- Research and implementation of embedded dynamic memory management mechanism of HeapManagerLei Xiao, Kejiang Liu. 2942-2947 [doi]
- Product defects detection based on features fusion and the multi-scale sliding windowYan Wang, Xiaofeng Lian, Lu Ye. 2948-2952 [doi]
- Location detection of underground pipeline based on multi-sensor fusionKejiang Liu, Xincai Zhuang, Lei Xiao. 2953-2957 [doi]
- Visual control system design of wheeled inverted pendulum robot based on Beaglebone BlackJian Lan, Jinxue Xu, Xiaoling Huang. 2964-2970 [doi]
- Design of smart container cloud based on DHTXiao-Lan Xie, Qi Wang, Peng Wang. 2971-2975 [doi]
- Dynamic load balancing model with time delay in distributed environmentTinglei Zhao, Jianzhong Qiao, Shukuan Lin, Yanhua Wang. 2976-2981 [doi]
- Storage and retrieval of massive heterogeneous IoT data based on hybrid storageShanshan Wu, Liang Bao, Zisheng Zhu, Fan Yi, Weizhao Chen. 2982-2987 [doi]
- The hardware design of taxi smart terminalsShengwu Hao, Yong Zhang. 2988-2992 [doi]
- A graying algorithm based on maximum preserving perception features of images whole structureBing Xiao, Li Guo, Jing Zhao, Junliang Ma. 2993-2997 [doi]
- A prototype simulator for the simulation of complicated hadoop framework behaviorsYang Liu, Weizhe Jing. 2998-3003 [doi]
- A resolution of sharing private charging piles based on smart contractYunfei Hou, Yan Chen, Yi Jiao, Jiakui Zhao, Hong Ouyang, Pingfei Zhu, Dong Wang, Yuxi Liu. 3004-3008 [doi]
- An automatic plotting method of air temperature isoline based on rectangular gridsQingyan Guo, Weiran Shi, Zhixing Zheng, Xiao Wang. 3009-3013 [doi]
- Changing patterns in speech: An analytical study of cultural emoticonsSultan Ullah Jadoon, Wajahat Ali, Ikram Ud Din, Yousaf Saeed, Muhammad Junaid, Eraj Khan, Shams Ullah. 3014-3020 [doi]
- Design and implementation of action recognition system based on RFID sensorHe Xu, Chengcheng Yuan, Peng Li, Yizhuo Wang. 3021-3025 [doi]
- Intelligent collision avoidance decision model based on geometric analysis of relative movementPeng Chen, Guoyou Shi, Yuanqiang Zhang, Shuang Liu. 3032-3037 [doi]
- Multi-attribute group decision making method based on evidence theoryYan-ling Li, Qi-Fei Yan, Jian-wei Wu. 3043-3047 [doi]
- Qualitative configuration based on generality data in ranch in three-river headwaters regionChengshui Niu, Meiyun Du, Yong Ge, Yu-an Zhang, Rende Song, Xiaofeng Qin. 3058-3064 [doi]
- Redis-based web server cluster session maintaining technologySong-huan Li, Hong Jiang, Ming-kang Shi. 3065-3069 [doi]
- Risks and risk control of wind power enterprisesQiquan Wang, Xiaoyan Li, Shuhao Li, Songli Yang. 3070-3075 [doi]
- The applicability analysis and improvement of several index dimensionless methodsYan-ling Li, Kui-Xia Han, Jian-wei Wu. 3084-3088 [doi]
- Training system for operation of dialysis puncture in clinical engineeringRen Kanehira, Atsushi Ohashi, Hideo Fujimoto. 3095-3099 [doi]
- A two-stage traffic sensor location method for low-volume road incident detectionXiao-feng Liu, Ji-sheng Zhang, Ting-Ting Gao, Zhi-Wei Guan, Yu-Qing Song. 3100-3106 [doi]
- PDF document watermarking algorithm based on discarded page objectShiru Zhang, Ye Wu, Qidi Li, Gaoyuan Li. 3107-3111 [doi]
- Research on rubbing image mosaic based on SIFT featureYingying Wang, Jingjing Zhang, Yuan Cai, Yichun Zhang. 3112-3116 [doi]
- TIVMM: An effective map algorithm for low-sampling-rate GPS trajectories in road networksDong Wang, Qichao Tu, Zhu Xiao. 3117-3121 [doi]