Abstract is missing.
- A guidance law design with terminal impact angle constraint based on nonlinear generalized predictive controlTeng Lv, Chuanjiang Li, Yanchao Sun, Guangfu Ma, Junzi Xiao. 1-5 [doi]
- Analyzing robust D-stability and D-stabilization for discrete descriptor systems subjected to norm-bounded uncertainties in the coefficient matrixLei Zhao, Ben-Wen Li. 6-11 [doi]
- Axial flux Doubly Salient Motor speed control based on fuzzy-PID controlJiazhen Zhang, Guangming Zhang, Meilei, Deming Wang. 12-17 [doi]
- Continuous but non-smooth adaptive observer of a class of nonlinear systemsYanjun Shen, Qinghua Jiang, Peng Miao. 18-22 [doi]
- Control on output peak current of motors in robotsTongtong Zhang, Weimin Zhang. 23-27 [doi]
- H2and H∞control of discrete systems with time scalesMagdi S. Mahmoud. 28-32 [doi]
- Quasi-synchronization for delayed systems with parameter mismatches via aperiodically intermittent controlXiwei Liu, Ping Li, Yuan Xu, Ying Liu. 33-38 [doi]
- Two numerical algorithms and numerical experiments for efficiently solving inequality-and-bound constrained QPJunqiao Qiu, Weibing Li, Yunong Zhang, Senbo Fu, Hongzhou Tan. 39-44 [doi]
- ZE in iZ1eD1 manner for MKE redundancy resolution at velocity and acceleration levelsDongsheng Guo, Xiaogang Yan, Long Jin, Hongzhou Tan, Yunong Zhang. 45-50 [doi]
- A control oriented model and application for control system design of a series hydraulic hybrid vehicleTri-Vien Vu, Chih-Keng Chen. 51-56 [doi]
- A phase compensator to prevent pilot induced oscillations by actuator rate limitingYongtao Li, Xiangju Qu, Wenqian Tan. 57-62 [doi]
- An optimal allocation approach of cooperative search capability based on game theoryChunyang Gao, Zhenyu Zhao. 63-67 [doi]
- The application of asymptotic tracking and disturbance rejection in voltage source converter controller designYiqiao Liang, Qiguo Han. 68-73 [doi]
- Routing algorithm for wireless sensor networks based on resistance distanceWenhui Zhao, ZhiXin Qin. 74-78 [doi]
- Geomagnetic field aided inertial navigation using the SITAN algorithmZhiguo Dai, Chong Kang. 79-83 [doi]
- Improved PID algorithms with application to excimer laser temperature controlMingqing Hu, Xiaoquan Han, Zebing Feng, Yi Zhou, Weihu Zhou, Lujun Bai, Bing Li. 84-88 [doi]
- The CSNS RCS remote control system based on EPICSWei Long, Hong Sun, Xiao Li, Bo Jiang, Yang Liu. 89-93 [doi]
- The simulation of direct torque control fuzzy control system based on Labview and MatlabBaodong Gao, Jianping Wang, Fan Cheng, Guo Zhang, Xiaohong Yang, Junhui Liu. 94-98 [doi]
- μcontroller to control three-phase parallel pulses width modulation (PWM) rectifierThi Thu Giang Hoang, Ren Feng Zheng, Xiao-Hong Wang, Lian-fang Tian. 99-103 [doi]
- A DIBR method based on foreground extraction and holes corrosionRong Hu, Zhaohui Li, Dongmei Li, Hui Ding. 104-108 [doi]
- Curved lane detection using robust feature extractionHo-Jin Jang, Seung-Hae Baek, Soon-Yong Park. 109-112 [doi]
- Fire video recognition based on flame and smoke characteristicsYaqin Zhao, Guizhong Tang. 113-118 [doi]
- Design of the virtual reality roam system for ancient cityQing Xie, Lin Ge, Zhenyi Wang. 119-123 [doi]
- A fuzzy logic controller application for marine power plantsLanxin Hu, YuLong Ying, Jingchao Li. 124-131 [doi]
- A new approach for identification of the fault type on transmission linesLi-qun Shang, Jian-dang Lv. 132-136 [doi]
- Applying of network security situation awareness in smart substationsWei Huang, YaJuan Guo, Ling Zhuang, Qin Mei, Xiaohai Xu. 137-142 [doi]
- How could advanced distribution automation have prevented the 2006 U.S. Northwest Queen blackoutTaifeng Kang, Ruipeng Zhang, Fengqing Zhao, Aoyang Han, Jianying Li, Yuanlong Liu. 143-147 [doi]
- Hybrid real-time simulator of power system for advanced simulation of the FACTS and HVDC system based on voltage source converterYury S. Borovikov, Alexandr S. Gusev, Almaz O. Sulaymanov, Ruslan A. Ufa. 148-152 [doi]
- Simulation of automatic exciting regulators of synchronous generators in hybrid real-time power system simulatorYury S. Borovikov, Almaz O. Sulaymanov, Alexandr S. Gusev, Mikhail V. Andreev. 153-158 [doi]
- Battery equalization based on state of chargeWeijia Li, Yuzhuo Fu, Ting Liu, Pengzhi Chu, Jiafang Wang, Hui Chen. 159-163 [doi]
- A low consumption DSP based power analyzerXiaofei Gao, Qin Zhou. 164-168 [doi]
- Taking advantage of the harmonics at the load side using passive filtersHussein Al-bayaty, Marcel Ambroze, Mohammed Zaki Ahmed. 169-174 [doi]
- The online detection of faulty insulator using fast Fourier transformationYing Hong Yang, Lichun Wang. 175-179 [doi]
- Short-term prediction models for wind speed and wind powerGuangxing Bai, Yanwu Ding, Mehmet Bayram Yildirim, Yan-Hong Ding. 180-185 [doi]
- A economic operation optimization for microgrid with battery storage and load transferJianping Zhang, Zhenyu Gao, Yuliang Ren, Xinhui Du, Xiaohai Yin. 186-191 [doi]
- Implementation of a virtual power plant: The integrated load management systemBradley Rideout, Tugcan Sahin, Daniel Shereck. 192-196 [doi]
- Islanding partition of the distribution system with distributed generations based on Memetic algorithmKe Sun, Weihui Shao, Zhiyu Xu, Weisheng Xu. 197-201 [doi]
- Renewable energy sources in a transactive energy marketTugcan Sahin, Daniel Shereck. 202-208 [doi]
- Substation equipment temperature monitoring system design based on self-powered wireless temperature sensorsHuihui Lu, Yuxiang Yuan. 209-214 [doi]
- A new simulation method of switching overvoltage on shunt capacitorsLiqun Shang, Senfeng Zhang. 215-219 [doi]
- A new robust character segmentation methodKangli Chen. 220-224 [doi]
- HMM-based recognition engine using a novel approach for statistical feature extractionMohammad S. Khorsheed, Samir Ouis. 225-229 [doi]
- Pedestrian tracking algorithm based on Kalman filter and partial mean-shift trackingKangli Chen, Wancheng Ge. 230-235 [doi]
- Method of circles for solving formation task in a group of quadrotor UAVsDonat Ivanov, Igor Kalyaev, Sergey Kapustyan. 236-240 [doi]
- Multi-agents based data mining for intelligent decision support systemsDharmendra Sharma, Fariba Shadabi. 241-245 [doi]
- Non-linear permutation groups on Physarum polycephalumAndrew Schumann. 246-251 [doi]
- Trustworthy agents for B2B operations under Normative environmentEugénio C. Oliveira, Henrique Lopes Cardoso, Joana Urbano, Ana Paula Rocha 0001. 252-257 [doi]
- A method for predicting aircraft flying qualities using neural networks pilot modelWenqian Tan, Yu Wu, Xiangju Qu, Alexander V. Efremov. 258-263 [doi]
- An emotion understanding systemRui Qiao, Heng He, Jinguang Gu, Maofu Liu, Yajun Feng, Xiaolei Zhong. 264-270 [doi]
- Attractiveness of real time strategy gamesShuo Xiong, Hiroyuki Iida. 271-276 [doi]
- A sliding parameter estimation method based on UKF for agricultural tracked robotJun Jiao, Li Sun, Wen Kong, Youhua Zhang, Yan Qiao, Chenchen Yuan. 277-282 [doi]
- Scenario-driven composition of context-aware simulation componentsPeng Hu, Jianjing Shen, Linbo Tao. 283-287 [doi]
- Vessel navigator for surgical rehearsal system using topological map: An application to gastrectomyJi-Wook Jeong, Jeong-Won Lee, Sung-Hee Park, Woo Jin Hyung, Sooyeul Lee. 288-292 [doi]
- Analysis for cloud testing of web applicationJianhua Cai, Qingchun Hu. 293-297 [doi]
- Cloud based semantic middleware for data storage on peer to peer networkJaveria Khizar, Sarmad Sadik. 298-303 [doi]
- A cloud computing resource scheduling scheme based on estimation of distribution algorithmNiansheng Chen, Xiaoping Fang, Xin Wang 0034. 304-308 [doi]
- Optimizing performance and fault tolerance through cloud based adaptive replication for mobile applicationsTayyiba Naeem, Sarmad Sadik. 309-314 [doi]
- Proposed anticipating learning classifier system for cloud intrusion detection (ALCS-CID)Wafa S. Al-Sharafat. 315-318 [doi]
- MP3 audio parallel decoding based on Libmad libraryXiaxin Li, Shutao Sun. 319-323 [doi]
- A hard real-time scheduling algorithm based on elastic modelBo Liu, Yunhong Yan, Lizhang Peng, Yunlong Cheng, Yan Jin. 320-333 [doi]
- Task assignments based on shared memory multi-core communicationXiaojie Xu, Network Center, Lisheng Wang. 324-328 [doi]
- Recognition of access patterns for DSP kernel codesXiaoyang Li, Yu Liu, Chen Gong 0003, Dake Liu. 334-338 [doi]
- Two speed processor system high accuracy digital to synchro converterYang Bo, Hao Zhong-kao. 339-343 [doi]
- A method of categorization and organization for 3D model-based design knowledgeJihong Liu, Zhenjie Zhao. 344-349 [doi]
- Design and implementation of an elevator wireless adjustment systemCheng Jing, Guo-jun Zhao. 350-355 [doi]
- Emulsifier fault diagnosis based on back propagation neural network optimized by particle swarm optimizationYuesheng Wang, Hao Qian, Dawei Zhen. 356-360 [doi]
- ConferenceOne: A cloud-based collaborative conference service systemZhao Du, Yeming Tang, Ting Liu, Qifeng Liu. 361-365 [doi]
- English sentence pronunciation evaluation using rhythm and intonationXinguang Li, Jiahua Chen, MinFeng Yao, Dongxiong Shen, Fan Lin. 366-371 [doi]
- A new tracking algorithm for hypersonic targetsChangxi Li, Yan Zhou, Xu-hui Lan, Ge Guo, Chong Wu. 372-377 [doi]
- Hardware realization of locally normalized cross correlation algorithmS. Baloch, F. Ghazali, N. Mir, F. Farrukh, H. Ismail, Muhammad Yasir Qadri. 378-382 [doi]
- Identification of protein complexes algorithm based on random walk modelXuantong Dong, Zhijie Lin, Yuan Ren. 383-388 [doi]
- A fast vehicle top-view systemWenhui Li, Feng Qu, Ying Wang, Peixun Liu. 389-393 [doi]
- Cellular automata simulation of traffic spillback and queue-jumping behaviors at off-ramp on urban expressways in ShanghaiBin Shang, Shun Fang. 394-399 [doi]
- A forensics tool of Foxmail clientLili Xie, Guolong Chen. 400-405 [doi]
- An efficient algorithm for pairwise test case generation in presence of constraintsShiwei Gao, Binglei Du, Yaruo Jiang, Jianghua Lv, Shilong Ma. 406-410 [doi]
- In-house system for holistic modelling of machine tool operating propertiesJerzy Jedrzejewski, Zbigniew Kowal, Wojciech Kwasny, Zdzislaw Winiarski. 411-416 [doi]
- Multilevel semantic foundation for digital logic diagramsSabah Al-Fedaghi, Noura Aljallal. 417-424 [doi]
- A mesh generation method for geometric features based on knowledge-based engineeringHeng Liu, Ping Xi. 425-430 [doi]
- Scenario-driven composition of context-aware simulation componentsPeng Hu, Jianjing Shen, Linbo Tao. 431-435 [doi]
- A simulation study of RFID system for improving patient discharge process in a hospitalSung J. Shim, Arun Kumar 0010, Roger Jianxin Jiao. 436-440 [doi]
- Design and implementation of the online map system based on LBSCuihua Sun, Feng Wang, Yong Ge. 441-446 [doi]
- Design and realization of general matrix keyboard based on STM32Kai Shi 0006, Zhanquan Wang, Fei Luo, Chunhua Gu. 447-453 [doi]
- Design of message-oriented middleware with publish/subscribe model on Telemetry and Command computerChongnan Wang, Zongtao Wang, Hongwei Xing. 454-458 [doi]
- Restoration of missing time-series data via multiple sine functions decomposition with Guangzhou-temperature applicationYunong Zhang, Weixiang Ding, Wenchao Lao, Ying Wang, Hongzhou Tan. 459-464 [doi]
- W-Revised: An amazing tool for creating customized websitesLing-Hua Chang, Sanjiv Behl, Tung-Ho Shieh. 465-470 [doi]
- Application of digital technology in ballistic mortar for determining the power of high explosivesTuan Son Nguyen, Tien Thanh Nguyen, Thi Thu Thuy Nguyen, Anh Hai Nguyen. 471-476 [doi]
- Delay-induced Hopf bifurcation in the double-link inverted pendulum system for human quiet standingCaihong Wang, Jian Xu. 477-481 [doi]
- Development of probabilistic timed CEGARSatoshi Yamane, Takaya Shimizu. 482-491 [doi]
- A study of secured wireless sensor networks with XBee and ArduinoA. F. M. Sultanul Kabir, Mollah Ahmed Shorif, Hua Li, Qian Yu. 492-496 [doi]
- An efficient visualization method of RFID indoor positioning dataWei-qing Huang, Chang Ding, Siye Wang, Xiang Jing, Yuan-Jian Luo, Yanfang Zhang, Zhujun Zhang. 497-504 [doi]
- An energy efficient cluster-based routing protocol for intelligent environmental monitoring systemDapeng Cheng, Yingjie Song, Yanyan Mao, Xiangrong Wang. 505-509 [doi]
- LDDP: A location-based directed diffusion routing protocol for smart home sensor networkDapeng Cheng, Yingjie Song, Yanyan Mao, Xiangrong Wang. 510-514 [doi]
- An optimization of the object function for routing protocol of low-power and Lossy networksWei Xiao, Jianfei Liu, Nan Jiang, Hongzhou Shi. 515-519 [doi]
- A novel clouds based spectrum monitoring approach for future monitoring networkRong Li, Ji Li. 520-524 [doi]
- An admission control scheme based on the game theory for LEO satellite networksJian Zhou, Lijuan Sun, Tianshi Liu, Tao Zhang, Fu Xiao. 525-530 [doi]
- Dynamical coding method for intermittent connectivity wireless networkPeng Yang, Dou Liu, Yan Zhang. 531-535 [doi]
- OPNET-based modeling and simulations on routing protocols in VANETs with IEEE 802.11pShuai Yang, Rongxi He, Ying Wang, Sen Li, Bin Lin. 536-541 [doi]
- Closed-loop system of Cesium atomic magnetometer and its characteristicsWenhui Zhao, Yuhui Dong. 542-547 [doi]
- A resource allocation approach via the genetic algorithms in electric power communication networksFei Xia, Zongze Xia, Xiaobo Huang, Xiao Gao. 548-552 [doi]
- An improved detection method for different types of jamming attacks in wireless networksBo Yu, Lu-Yong Zhang. 553-558 [doi]
- Computation of reflection and transmission coefficients of frequency selective surfaces using sub-entire-domain basis function methodQuan-Quan Wang, Hong Bo Zhu, Ru-Shan Chen. 559-563 [doi]
- Design and application of multi-channel data acquisition system based on short-range wireless communication technologyYalin Miao, Ying Liu, Longyan Wang. 564-569 [doi]
- Design and implementation of TCP with network codingXudong Fan, Hui Li. 570-575 [doi]
- Design broad-band power amplifier and chip antenna with human body at intelligent computer and communications applicationsWen Cheng Lai, Jhin-Fang Huang, Pi-Gi Yang. 576-580 [doi]
- Improved clustering and outlier detection based shortwave direction finding and crossing location algorithmShuhui Jiang, Xi Shen, Yan Wang, Xiaofei Zhang, Dayong Liu. 581-585 [doi]
- Modeling of acoustic propagation channel in underwater wireless sensor networksMuhammad Waqas Khan, Yimin Zhou, Guoqing Xu. 586-590 [doi]
- Performance analysis of rate compatible punctured turbo coded hybrid ARQ scheme over satellite channelAlahoum Fathi, Zhen Xu. 591-596 [doi]
- Performance comparison of spatial multiplexing multi-input multi-output systems in accordance with dimming controlMin-Jung Lee, Yong-Won Kim, Sang-Lim Ju, Kyung-Seok Kim. 597-601 [doi]
- Performance of color shift keying-space time block code-orthogonal frequency division multiplexing system on visible light communicationLan Mi Hwang, Yong-Won Kim, Byeong Gon Choi, Kyung-Seok Kim. 602-606 [doi]
- Design and implementation of web browser for named data networking in WindowsYoufeng Wang, Xiuquan Qiao. 607-612 [doi]
- DNS configuration detection modelKeyu Lu, Kaikun Dong, Cuihua Wang, Haiyan Xu. 613-618 [doi]
- Location-based social networking information services in university campusZizhuo Zhang, Ruda Yang, Zhengqin Li, Liwei Chen, Xiaozhi Yu, Yeming Tang, Zhao Du. 619-623 [doi]
- A low-cost and efficient method of determining the best frequency band for video leaking signal reconstructionDegang Sun, Jun Shi, Dong Wei, Meng Zhang. 624-628 [doi]
- Classified removable storage medium control based on the access control matrixDegang Sun, Wen Yang, Meng Zhang, Shaojian Huang. 629-633 [doi]
- Joint remote state preparation of a qubit state via a W state using single-atom rotation operationsXiaoqi Xiao, Xiaochen Lin, Yuan Li. 634-638 [doi]
- Symmetric controlled quantum secret sharing scheme via stabilizer codesYuan Li, Xiaoqi Xiao, Yu Yang, Shunru Ji. 639-643 [doi]
- Vulnerability mining for network protocols based on fuzzingSai-Dan Zhang, Lu-Yong Zhang. 644-648 [doi]
- Vulnerability mining of Cisco router based on fuzzingFengjiao Li, Luyong Zhang, Dianjun Chen. 649-653 [doi]
- H-infinity filtering for networked control systems with packet dropout using delta operatorDuanjin Zhang, Xue Liu. 654-658 [doi]
- A model based on crossed cubes for VoD servicesHaifei Shen, Jianxi Fan, Baolei Cheng, Cheng-Kuan Lin. 659-664 [doi]
- A scheme for remotely preparing a two-atom entangled state in cavity quantum electrodynamics systemJunfang Xiao, Yuan Ren. 665-669 [doi]
- Assessment and application of network access control technologiesLiqing Li, Hai Lu, Xudong Li. 670-675 [doi]
- Individual radiation source identification based on fractal box dimensionJingchao Li, YuLong Ying. 676-681 [doi]
- MultiClassifier: A combination of DPI and ML for application-layer classification in SDNYunchun Li, Jingxuan Li. 682-686 [doi]
- RTOmin as a balancing parameter between fast retransmissions and timeouts within stream control transmission protocol (SCTP)Eduardo Gonzalez, Stan McClellan, Wuxu Peng. 687-691 [doi]
- The realization of high-precise clock synchronization protocol based on adaptive exponential smoothing algorithmXie Tai Jun, Zhu Luan Juan. 692-696 [doi]
- A fast entropy assisted complete ensemble empirical mode decomposition algorithmYihai Liu, Xiaomin Zhang, Yang Yu. 697-701 [doi]
- Analysis of fiber similarity metric for fiber tract clustering in white matter of human brainXufeng Yao, Tian Xia, Zhexu Li, Xiaopin Xu, Peizhong He, Songlin Zhuang. 702-706 [doi]
- Development of synthesis model for fine tuning and playing styleSang Jin Cho, Sang-Bock Cho, Kyung-Hun Lee, Hyung-Seob Han. 707-711 [doi]
- Inter comparison of classification techniques for vowel speech imagery using EEG sensorsAnaum Riaz, Sana Akhtar, Shanza Iftikhar, Amir Ali Khan, Ahmad Salman. 712-717 [doi]
- Radar signal recognition algorithm based on entropy theoryJingchao Li, YuLong Ying. 718-723 [doi]
- Waveform design and optimization for OFDM radar signal based on fractional Fourier transformTian Liu, Ning Cao 0003, Minghe Mao, Fei Wang, Yuefeng Du. 724-729 [doi]
- A bio-inspired model of image representation based on non-classical receptive fieldsBo Lang, Yina Fan, Jing Huang. 730-735 [doi]
- A general image representation scheme and its improvement for image analysisYina Fan, Bo Lang, Jing Huang. 736-741 [doi]
- A multiple threshold for image secret sharing based on Cauchy matrixQizhao Yuan, Hongliang Cai. 742-747 [doi]
- A rapid vehicle recognition and retrieval systemWei Pei, Zijie An, Yong-ying Zhu, Xiao Jia 0007, Xin Wei Zuo, Fa Sheng Wang. 748-753 [doi]
- An image coding of shape adaptive wavelet-based contourlet transformZhenghua Shu, Guodong Liu, Zhihua Xie. 754-758 [doi]
- Despeckling of medical ultrasound images using multiscale weighting nonlinear diffusionQiong Zhang, Minfen Shen, Ruoyu Fang, Bin Li, Binghuang Cai. 759-763 [doi]
- Efficient deformable model with sparse shape composition prior on compromised right lung segmentation in CTJinghao Zhou, Giovanni Lasio, Baoshe Zhang, Karl Prado, Warren D'Souza, Zhennan Yan, Dimitris N. Metaxas. 764-768 [doi]
- Identifying gender from human faces using correlation filtersMohamed I. Alkanhal, Fahad Alqahtani, Khalid Alqahtani. 769-773 [doi]
- Image enhancement for point feature detection in built environmentVille V. Lehtola, Petri Rönnholm. 774-779 [doi]
- Image retrieval based on color-spatial histogramsShan Zeng, Jun Bai, Rui Huang 0001. 780-784 [doi]
- Improved algorithm for digital segment codes' flaw detectionChunqiao Zhou, Sizheng Zhu, Songsong Zhu. 785-790 [doi]
- Nonuniform quantization for block-based compressed sensing of images in differential pulse-code modulation frameworkCheng Qian, Baoyu Zheng, Bilan Lin. 791-765 [doi]
- Normal MSCT manifestation of small bowel mesenteryPeng Dong, Qi-min Gao, Xi-he Sun, Xi-zhen Wang, Guang-hui Chang, Yue Guan, Yan-ming Ge. 796-801 [doi]
- Objective measurement of image degradation caused by optical transmission effectsMing Li, Jie Yang. 802-807 [doi]
- A rapid fluorescence lifetime image acquistion method based on time-gated fluorescence lifetime imaging microscopyYang Liu, Yan Zhou, Yuliang Liu. 808-812 [doi]
- Simulations and experiment of lensless imaging with intensity correlation arrayXiyu Li, Lingjie Feng, Xin Gao, Changming Lu. 813-817 [doi]
- Table frame line detection in low quality document images based on Hough transformYangyang Tian, Chenqiang Gao, Xiaoming Huang. 818-822 [doi]
- The application of B-spline based interpolation in real-time image enlarging processingKai-yu Li, Wen-dong Wang, Kai-wen Zheng, Wen-bo Liu, Gui-li Xu. 823-827 [doi]
- Visible and infrared image fusion based on Curvelet transformSiji Quan, Weiping Qian, Junhai Guo, Hua Zhao. 828-832 [doi]
- A dictionary-based HD video compressing scheme for videoconferenceGuobo Zhang, Yunlong Wang, Xuan Zhang. 833-838 [doi]
- A DSP-based video processing system for infrared small targets detectionYinan Cao, Yan Zhou, Xinwei Wang, Songtao Fan, Jun He. 839-843 [doi]
- A single antenna interference cancellation by sequential importance samplingNan Xia, Wen Wei, Xiaofei Zhang, Jingchun Li. 844-848 [doi]
- Adaptive beamforming based on stochastic parallel gradient descent algorithm for single receiver phased arrayHaijun Zhao, Jing Zhang, Zhiping Yin. 849-853 [doi]
- Hidden Markov and Markov switching model for primary user channel state prediction in cognitive radioAhmed Mohammed Mikaeil, Bin Guo, Xuemei Bai, Zhijun Wang. 854-859 [doi]
- Identification of Volterra kernels for nonlinear communication systems with OFDM inputsJen-Ho Cheng, Yang-Han Lin, Ching-Hsiang Tseng. 860-865 [doi]
- Primary user channel state prediction based on time series and hidden Markov modelAhmed Mohammed Mikaeil, Bin Guo, Xuemei Bai, Zhijun Wang. 866-870 [doi]
- Laboratory spectral calibration and radiometric calibration of hyper-spectral imaging spectrometerXiujuan Yu, Yanhua Sun, Aiping Fang, Weijun Qi, Caijuan Liu. 871-875 [doi]
- A gesture based real-time interactions with 3D modelRuohan Xing, Gang Zhao, Guocai Ma, Wenlei Xiao. 876-880 [doi]
- A sketch-based query interface for 3D CAD model retrievalXinxiang Wang, Jiale Wang, Weifeng Pan. 881-885 [doi]
- Protein molecular surface triangulation based on Contour-Buildup algorithmJingqiao Zhang, Lin Wang. 886-890 [doi]
- Scene layout in text-to-scene conversionFuping Yang, Yun Zhou, Xiaobo Luo. 891-895 [doi]
- A spatiotemporal dithering method to extend color depth in multi-display systemYimu Wang, Luc Claesen. 896-900 [doi]
- First-episode depression: Diffusion tensor imaging of deep white matterXizhen Wang, Shanshan Gao, Shuai Wang, Hongwei Sun, Yanyu Wang, Nengzhi Jiang, Guohua Xie. 901-905 [doi]
- A hybrid genetic algorithm for Bayesian network optimizationJiaqi Zhao, Hongzhe Xu, Wen Li. 906-910 [doi]
- A hybrid measure for the semantic similarity of gene ontology termsShu-Bo Zhang, Jian-Huang Lai. 911-916 [doi]
- Compound identification using random projection location-sensitive Hash for gas chromatography-mass spectrometryLi-Li Cao, Zhi-Shui Zhang, Jun Zhang. 917-921 [doi]
- Description language for graph-based representation in surgical rehearsalSung-Hee Park, Jeongwon Lee, Ji-Wook Jeong, Woo Jin Hyung, Sooyeul Lee. 922-926 [doi]
- A forensics method of web browsing behavior based on association rule miningYiyun Zhang, Guolong Chen. 927-932 [doi]
- A personalized recommendation algorithm based on interest graphShanshan Yu, Donglin Chen, Bing Li, YuFeng Ma. 933-937 [doi]
- A support vector machine with maximal information coefficient weighted kernel functions for regressionHuiting Hou, Yan Gao, Dengke Liu. 938-942 [doi]
- Applications of data mining in online retailing: A case for mining prefix-ordered web site navigation pathsW. L. Yeung. 943-947 [doi]
- Graph mining based knowledge discovery in designing decision-making context modelsHao Jiang, Jihong Liu, Zhenjie Zhao. 948-953 [doi]
- Mining frequent sequential patterns and association rules on campus map systemYeming Tang, Qiuli Tong, Zhao Du. 954-958 [doi]
- Network dynamics of the Chinese stock marketBing Li, Yida Li. 959-963 [doi]
- Text classification based on a novel ensemble multi-label learning methodTao Zhang, Jiansheng Wu, Haifeng Hu 0004. 964-968 [doi]
- A secure and fair resource allocation model under hybrid cloud environmentLei Zhao, Fu Wang, Kaikai Fan. 969-973 [doi]
- Clustering massive small data for IOTXin Tao, Chunlei Ji. 974-978 [doi]
- Impact of data to decision based on emergency planShengli Pan 0002, Jun Tian. 979-986 [doi]
- A data fusion method for the attitude of the floating production storage and offloading(FPSO) single-point mooring system based on the monitoring dataDongmei Wang, Da Tang, Qianjin Yue, Zhongmin Shi, Jiaguo Feng. 987-991 [doi]
- Research and development on data quality assessment management systemKeting Yin, Shan Wang, Zirui Liu, Qi Yu, Bo Zhou. 992-997 [doi]
- Anonymization on refining partition: Same privacy, more utilityHong Zhu, Shengli Tian, Meiyi Xie. 998-1005 [doi]
- Estimating development size and effort of business process service-oriented architecture applicationsSiba Mishra, Chiranjeev Kumar. 1006-1011 [doi]
- Method mining in experimental software engineeringHideaki Uchimiya, Shinpei Ogata, Kenji Kaijiri. 1012-1016 [doi]
- A control software of gated imaging lab(GIL) for 2D/3D range-gated imagingXiaoquan Liu, Xinwei Wang, Yinan Cao, Songtao Fan, Yan Zhou. 1017-1021 [doi]
- A method of function modeling in accurate stub generationChi Yao, Ya Wen Wang, Feng Li, Yun-Zhan Gong. 1022-1026 [doi]
- Creating an integrated marketing information systemJian-sen Liu, Kun Zhai, Bin Liu. 1027-1032 [doi]
- Virtual assembly of chemical equipmentShuailing Zhang, Dongxiang Zhang, Miyi Li, Wensheng Deng. 1033-1037 [doi]
- Improving guide-based vulnerability detection with hybrid symbolic executionYongji Ouyang, Shuai Zeng, Chao Yang, QingXian Wang. 1038-1043 [doi]
- JDBC-based middleware applications in instant message systemsYi Zhang, Lu-Yong Zhang. 1044-1049 [doi]
- A search log sparseness oriented query expansion methodShu-Bo Zhang, Bin Zhang, Yin Zhang, Anxiang Ma, Daming Sun. 1050-1055 [doi]
- BigData visualization: Parallel coordinates using density approachJinson Zhang, Zhao-Peng Meng, Mao Lin Huang. 1056-1063 [doi]
- Causality evaluation of transfer function by fuzzy dataWentsung Lai, Ya-Hui Chan. 1064-1066 [doi]
- Explore the associated MiRNAs with emphysema severity of chronic obstructive pulmonary diseaseLin Hua, Hong Xia, Ping Zhou, Li An. 1067-1071 [doi]
- User level secure deletion for USB flash disksPeng Zhang, Wen Zhang, Shao-zhang Niu, Zhen-peng Huang. 1072-1077 [doi]
- Targets of MiRNAs in lung cancer related pathways as predictors of chronic obstructive pulmonary diseaseLin Hua, Hong Xia, Ping Zhou, Li An. 1078-1082 [doi]