Abstract is missing.
- A Fine-Grained Emotion Analysis Method for Chinese MicroblogRui Zhou, Huyin Zhang, Gang Ye. 1-11 [doi]
- Research of Detection Algorithm for Time Series Abnormal SubsequenceChunkai Zhang, Haodong Liu, Ao Yin. 12-26 [doi]
- An Improved SVM Based Wind Turbine Multi-fault Detection MethodShiyao Qin, Kaixuan Wang, Xiaojing Ma, Wenzhuo Wang, Mei Li. 27-38 [doi]
- GPU Based Hash Segmentation Index for Fast T-overlap QueryLianyin Jia, Yongbin Zhang, Mengjuan Li, Jiaman Ding, Jinguo You. 39-51 [doi]
- A Collaborative Filtering Recommendation Algorithm Based on the Difference and the Correlation of Users' RatingsZhao-hui Cai, Jing-song Wang, Yong-kai Li, Shu-bo Liu. 52-63 [doi]
- Research on Pattern Matching Method of Multivariate Hydrological Time SeriesZhen Gai, Yuansheng Lou, Feng Ye, Ling Li. 64-72 [doi]
- Further Analysis of Candlestick Patterns' Predictive PowerTao Lv, Yongtao Hao. 73-87 [doi]
- Partial Least Squares (PLS) Methods for Abnormal Detection of Breast CellsYuchen Zhu, Shanxiong Chen, Chunrong Chen, Lin Chen. 88-99 [doi]
- Desktop Data Driven Approach to Personalize Query RecommendationXiaoyun Li, Ying Yu. 100-109 [doi]
- Disease Prediction Based on Transfer Learning in Individual HealthcareYang Song, Tianbai Yue, Hongzhi Wang, Jianzhong Li, Hong Gao. 110-122 [doi]
- Research on Fuzzy Matching Query Algorithm Based on Spatial Multi-keywordSuzhi Zhang, Yanan Zhao, Rui Yang. 123-133 [doi]
- A New Approach to Dense Spectrum Analysis of Infrasonic SignalsKaiyan Xing, Kaixue Hao, Mei Li. 134-143 [doi]
- Research on XDR Bill Compression Under Big Data TechnologyBing Zhao, Sining Zhang, Jun Zheng. 144-152 [doi]
- The Scalability of Volunteer Computing for MapReduce Big Data ApplicationsWei Li, William Guo. 153-165 [doi]
- An Improved FP-Growth Algorithm Based on SOM PartitionKuikui Jia, Haibin Liu. 166-178 [doi]
- A Novel Recommendation Service Method Based on Cloud Model and User PersonalityJing Yao, Zhigang Hu, Hua Ma, Bingting Jiang. 179-191 [doi]
- A Cooperative Abnormal Behavior Detection Framework Based on Big Data AnalyticsNaila Marir, Huiqiang Wang. 192-206 [doi]
- Composite Graph Publication Considering Important DataYuqing Sun, Hongbin Zhao, Qilong Han, Lijie Li. 207-219 [doi]
- Hierarchical Access Control Scheme of Private Data Based on Attribute EncryptionXi Lin, Yiliang Han. 220-230 [doi]
- Secret Data-Driven Carrier-Free Secret Sharing Scheme Based on Error Correction Blocks of QR CodesSong Wan, Yuliang Lu, Xuehu Yan, Hanlin Liu, Longdan Tan. 231-241 [doi]
- Template Protection Based on Chaotic Map for Face RecognitionJinjin Dong, Xiao Meng, Meng Chen, Zhifang Wang, Linlin Tang. 242-250 [doi]
- A Fast and Secure Transmission Method Based on Optocoupler for Mobile StorageLu Zou, Dejun Zhang, Fazhi He, Zhuyang Xie. 251-261 [doi]
- Android Malware Detection Using Local Binary Pattern and Principal Component AnalysisQixin Wu, Zheng Qin, Jinxin Zhang, Hui Yin, Guangyi Yang, Kuangsheng Hu. 262-275 [doi]
- Elderly Health Care - Security and Privacy IssueKaiyu Wan, Vangalur S. Alagar, Peter Oyikanmi. 276-291 [doi]
- Secure Multi-party Comparison Protocol and ApplicationJing Zhang, Shoushan Luo, Yixian Yang. 292-304 [doi]
- Security Analysis of Secret Image SharingXuehu Yan, Yuliang Lu, Lintao Liu, Song Wan, Wanmeng Ding, Hanlin Liu. 305-316 [doi]
- PRS: Predication-Based Replica Selection Algorithm for Key-Value StoresLiyuan Fang, Xiangqian Zhou, HaiMing Xie, Wanchun Jiang. 317-330 [doi]
- A General (k, n) Threshold Secret Image Sharing Construction Based on Matrix TheoryWanmeng Ding, Kesheng Liu, Xuehu Yan, Lintao Liu. 331-340 [doi]
- A Real-Time Visualization Defense Framework for DDoS AttackYiqiao Jin, Qidi Liang, Jian Zhang, Ou Jin. 341-351 [doi]
- A Research and Analysis Method of Open Source Threat Intelligence DataRuyue Liu, Ziping Zhao, Chengjun Sun, Xiaoyu Yang, Xiaoli Gong, Jin Zhang. 352-363 [doi]
- An Improved Data Packet Capture Method Based on Multicore PlatformXian Zhang, Xiaoning Peng, Jia Liu. 364-372 [doi]
- Research on Linux Kernel Version Diversity for Precise Memory AnalysisShuhui Zhang, Xiangxu Meng, Lianhai Wang, Guangqi Liu. 373-385 [doi]
- Unsupervised Anomaly Detection for Network Flow Using Immune Network Based K-means ClusteringYuanquan Shi, Xiaoning Peng, Renfa Li, Yu Zhang. 386-399 [doi]
- The Research on Cascading Failure of Farey NetworkXiujuan Ma, Fuxiang Ma. 400-411 [doi]
- Optimal Task Recommendation for Spatial Crowdsourcing with Privacy ControlDan Lu, Qilong Han, Hongbin Zhao, Kejia Zhang. 412-424 [doi]
- An Information-Aware Privacy-Preserving Accelerometer Data SharingMingming Lu, Yihan Guo, Dan Meng, Cuncai Li, Yin Zhao. 425-432 [doi]
- A Range-Threshold Based Medical Image Classification Algorithm for Crowdsourcing PlatformShengnan Zhao, Haiwei Pan, Xiaoqin Xie, Zhiqiang Zhang, Xiaoning Feng. 433-446 [doi]
- A New Method for Medical Image Retrieval Based on Markov Random FieldTiaodi Wang, Haiwei Pan, Xiaoqin Xie, Zhiqiang Zhang, Xiaoning Feng. 447-461 [doi]
- Three-Dimensional Reconstruction of Wood Carving Cultural Relics Based on CT Tomography DataGuiling Zhao, Zongji Deng, Jun Shen, Zhaowen Qiu, Jing Huang. 462-471 [doi]
- Text Feature Extraction and Classification Based on Convolutional Neural Network (CNN)Taohong Zhang, Cunfang Li, Nuan Cao, Rui Ma, Shaohua Zhang, Nan Ma. 472-485 [doi]
- Predicting Big-Five Personality for Micro-blog Based on Robust Multi-task LearningShuguang Huang, Jinghua Zheng, Di Xue, Nan Zhao. 486-499 [doi]
- Automatic Malware Detection Using Deep Learning Based on Static AnalysisLiu Liu, Baosheng Wang. 500-507 [doi]
- High-Level Multi-difference Cues for Image Saliency DetectionJianwei Sun, Junfeng Wu, Hong Yu, Meiling Zhang, Qiang Luo, Juanjuan Sun. 508-519 [doi]
- Nonlinear Dimensionality Reduction via Homeomorphic Tangent Space and CompactnessShaoqun Zhang, Wanyun Xie. 520-533 [doi]
- Selective Image Matting with Scalable Variance and Model RectificationXiao Chen, Fazhi He, Yiteng Pan, Haojun Ai. 534-548 [doi]
- Side-Channel Attacks Based on Collaborative LearningBiao Liu, Zhao Ding, Yang Pan, Jiali Li, Huamin Feng. 549-557 [doi]
- Research on Hydrological Time Series Prediction Based on Combined ModelYi Cheng, Yuansheng Lou, Feng Ye, Ling Li. 558-572 [doi]
- A Cross-View Model for Tourism Demand Forecasting with Artificial Intelligence MethodSiming Han, Yanhui Guo, Han Cao, Qian Feng, Yifei Li. 573-582 [doi]
- Computational Intensity Prediction Model of Vector Data Overlay with Random Forest MethodQian Wang, Han Cao, Yanhui Guo. 583-593 [doi]
- An Implementation and Improvement of Convolutional Neural Networks on HSA PlatformZhenshan Bao, Qi Luo, Wenbo Zhang. 594-604 [doi]
- An Enhanced Transportation Mode Detection Method Based on GPS DataJing Liang, Qiuhui Zhu, Min Zhu, Mingzhao Li, Xiaowei Li, Jianhua Wang, Silan You, Yilan Zhang. 605-620 [doi]
- The Triangle Collapse Algorithm Based on Angle Error MetricsXiaorong Yan, Yuansheng Lou, Ling Li. 621-632 [doi]
- Spatial-Temporal Event Detection Method with Multivariate Water Quality DataYingchi Mao, Zhitao Li, Xiaoli Chen, Longbao Wang. 633-645 [doi]
- Context-Aware Technology of Disabled Health Service for Intelligent CommunityYao Tan, Wenbi Rao. 646-659 [doi]
- DFDVis: A Visual Analytics System for Understanding the Semantics of Data Flow DiagramHao Xiong, Haocheng Zhang, Xiaoju Dong, Lingxi Meng, Wenyang Zhao. 660-673 [doi]
- Design and Implementation of Medical Data Management SystemJie Wang, Jianqiao Liu, Jian Li, Jian Zhang, Qi Lei. 674-688 [doi]
- Recognition of Natural Road Sign Based on the Improved Curvature FeatureYanqing Wang, Hao Zheng, Weiwei Chen. 689-695 [doi]
- Evaluating Cities' Independent Innovation Capabilities Based on Patent Using Data Analysis MethodsYan Zhang, Ping Yuan, Bin Yu. 696-707 [doi]
- Research on Target Extraction Technology of Fruit and Vegetable Images in the Complex EnvironmentYanqing Wang, Hao Zheng. 708-717 [doi]
- Route Guidance for Visually Impaired Based on Haptic Technology and Their Spatial CognitionGuansheng Wang, Jianghua Zheng, Hong Fan. 718-728 [doi]
- Prediction of Passenger Flow at Sanya Airport Based on Combined MethodsXia Liu, Xia Huang, Lei Chen, Zhao Qiu, Mingrui Chen. 729-740 [doi]
- Research on the Copyright Protection Technology of Digital Clothing Effect DiagramYongqiang Chen, Lihua Peng. 741-750 [doi]
- Visualization Analysis Framework for Large-Scale Software Based on Software NetworkShengbing Ren, Mengyu Jia, Fei Huang, Yuan Liu. 751-763 [doi]