Abstract is missing.
- Skin Segmentation Based on Double-ModelsHaokui Tang, Zhiquan Feng. 3-7 [doi]
- A Small World Network Based Grid Resource Discovery MechanismWeichun Huang, Min Chen, Jian Liu. 8-11 [doi]
- Adaptive Hybrid Function Projective Synchronization for Two Different Chaotic System with Uncertain ParametersChengrong Xie, Yuhua Xu. 12-16 [doi]
- A Quay Crane Assignment Approach for Berth Allocation Problem in Container TerminalZhi-Hua Hu. 17-21 [doi]
- Performance Analysis of an Improved Single Neuron Adaptive PID ControlWu Wang, Zheng-min Bai. 22-25 [doi]
- A Mixture Conjugate Gradient Method for Unconstrained OptimizationHailin Liu. 26-29 [doi]
- Distributed Key Management Scheme for Large Scale Pay-TV ApplicationJia-Yin Tian, Cheng Yang, Yi-Chun Zhang, Jianbo Liu. 30-33 [doi]
- SECTrust: A Secure and Effective Distributed P2P Trust ModelJianli Hu, Xiaohua Li, Bin Zhou, Yonghua Li. 34-38 [doi]
- Representing Non-deterministic Actions within the Situation Calculus for Autonomous CharactersXiangyang Huang, Xiao Xin, Wenjun Wu. 39-42 [doi]
- Study on Service Selections Based on Ontology and QosWang Gang, Yin Fengxia. 43-47 [doi]
- On the Way to Design an Optical Camera Lens for River Sediment in Underwater ImagingXuyan Zhou, Bing Tan, Bing Zhu, Xuange Peng, Xuemou Liu. 48-53 [doi]
- Research on MAC Communication Mechanism of Air-to-Ground Data Link Based on 3G: The MSDU Frame Subsection and RTS/CTS Handshake MechanismMinghui Li, Jingbo Xia, Yaoguo Wang. 54-57 [doi]
- The Application Research of Wireless Sensor Network in the Prison Monitoring SystemWan Zhou, Zhang Xuehua, Xiong Xin, Jiande Wu. 58-62 [doi]
- Research on k-means Clustering Algorithm: An Improved k-means Clustering AlgorithmNa Shi, Xumin Liu, Yong Guan. 63-67 [doi]
- A Verifiable Copyright-Proving Scheme Based on Lifting Wavelet TransformationLizong Li, Tiegang Gao, Qiaolun Gu, Bi Lei. 68-72 [doi]
- Design and Implementation for Real-Time Property of Serial Communication Based on WINDOWS CEYuxiang Jiang, Cheng Xu, Lulu Zhang, ShanQin Wang. 73-76 [doi]
- Design of Panoramic Mosaic Surveillance Platform in Severe CircumstanceYu Liu, Junchan Du, Feng Ji. 77-80 [doi]
- Analysis on the Integration of ERP with E-businessQunli Wu. 81-83 [doi]
- An Integrated P2P Mobile Learning Model for Timely Farming GuidanceXiaoming Yao, Wencai Du, Baodan Chen, Zhongzhi Yuan. 84-87 [doi]
- An Integrated Network Performance Monitor SystemHongjie Sun. 88-91 [doi]
- Pattern-Based Blind Spatial Image WatermarkingXiaoming Yao, Wencai Du, Mei Huang, Weihua Wu, Jundong Fu. 92-96 [doi]
- Genetic Algorithm-Based Evaluation Model of Teaching QualityHongfa Wang, Feng Yu, Chen Xing, Zhimin Zhou. 97-100 [doi]
- Study on Incremental Data Mining Based on Rough Set TheoryShanguo Lv, Hongli Chen. 101-104 [doi]
- Study on Ontology Model Based on Rough SetHongli Chen, Shanguo Lv. 105-108 [doi]
- A General Method of Constructing the Reversible Full-AdderLihui Ni, Zhijin Guan, Wenying Zhu. 109-113 [doi]
- Automatic Construction of Web-Based English/Chinese Parallel CorporaBin Tan, Xuyan Zhou. 114-117 [doi]
- Research on Component Composition with Formal SemanticsRuzhi Xu, Quansheng Wu, Hongquan Gong, Leqiu Qian. 118-124 [doi]
- Multi-modal Medical Image Registration Based on Gradient of Mutual Information and Hybrid Genetic AlgorithmXiaosheng Huang, Fang Zhang. 125-128 [doi]
- A Robust EMD-Like Stegnographic SchemeXiaoming Yao, Wencai Du, Weihua Wu, Mei Huang, Jundong Fu. 134-137 [doi]
- SOM-Based Classification Method for Moving Object in Traffic VideoJie Xia, Jian Wu, Yanyan Cao, Zhiming Cui. 138-142 [doi]
- The Study of Electrocardiograph Based on Radial Basis Function Neural NetworkGuangying Yang, Yue Chen. 143-145 [doi]
- SAR Image Segmentation Based on SWT and Improved AFSAMiao Ma, Jian-hui Liang, Li Sun, Min Wang. 146-149 [doi]
- The Research of High Noise Image s Restoration and Recognition of Train s PlatesXiangang Jiang, Dean Ma, Longfeng Tao. 150-153 [doi]
- Property Preservation of Time Petri Net ReductionChuanliang Xia, Zhendong Liu. 154-159 [doi]
- Regional Logistics System Bi-level Programming with Elastic Demand by Using Fuzzy C-means ClusteringMing-bao Pang, Fang Dong, Xin-ping Zhao. 160-164 [doi]
- A Strong Deviation Theorem Based on Laplace Transform on a Non-homogeneous TreeShaohua Jin, Chongguang Ding, Yongxue Wang, Yanmin Zhang, Jie Lv. 165-168 [doi]
- Some Strong Limit Theorems for Hidden Markov Models Indexed by a Non-homogeneous TreeShaohua Jin, Yongxue Wang, Huitao Liu, Ying Tian, Hui Li. 169-172 [doi]
- Dynamic Evolution Simulation of Corporate Governance Based on SwarmRong-jie Lv, Yu-hong An. 173-177 [doi]
- Integrated Security Framework for Secure Web ServicesWenjun Zhang. 178-183 [doi]
- A Preferable Method on Digital Filter in ECG Signal s Processing Based on FPGANianqiang Li, Yongbing Wang, Guoyi Zhao. 184-187 [doi]
- A New Scheme on Multifunction Wireless Medical Surveillance System Based on FPGANianqiang Li, Yongbing Wang, Guoyi Zhao. 188-191 [doi]
- Research on Application of Region-of-Interest in Face DetectionDengfeng Zhou, ShuiSheng Ye, Shaohua Hu. 192-194 [doi]
- A Study of Image-Based Algorithms of River Sediment MeasurementBing Zhu, Xuyan Zhou, Bin Tan, Xuange Peng, Xuemou Liu. 195-201 [doi]
- A Hybrid Model of RST and DST with its Application in Intrusion DetectionQing Ye, Xiaoping Wu, Yongqing Liu, Gaofeng Huang. 202-205 [doi]
- Detection of Aircraft In-flight Icing in Non-steady Atmosphere Using Artificial Neural NetworkSibin Ying, Jianliang Ai. 206-211 [doi]
- Two Sub-swarms Quantum-Behaved Particle Swarm Optimization Algorithm Based on Exchange StrategyZhihua Liu, Hui Sun, Haizhi Hu. 212-215 [doi]
- A Quantifying Metric for Privacy Protection Based on Information TheoryFeng Gao, Jingsha He, Shufen Peng, Xu Wu. 216-220 [doi]
- A Cloud Model Inference System Based Alpha-Beta Filter for Tracking of Maneuvering TargetJianJun Huang, Jiali Zhong, Pengfei Li. 221-225 [doi]
- A PSO Based Array Shape Calibration Utilizing CyclostationarityJianjun Huang 0002. 226-231 [doi]
- ZigBee-based Vehicle Access Control SystemRong Zhou, Chunyue Zhao, Lili Fu, Ao Chen, Meiqian Ye. 232-235 [doi]
- The Design and Implementation of Electronic Farm System Based on Google MapsMeiyu Zhang, Jinghua Mei. 236-240 [doi]
- A Method of Honey Plant Classification Based on IR Spectrum: Extract Feature Wavelength Using Genetic Algorithm and Classify Using Linear Discriminate AnalysisYan Yang, Pengcheng Nie, Yong He. 241-245 [doi]
- Classification Based on Particle Swarm Optimization for Least Square Support Vector Machines TrainingLin Yang, Hui Ting Wang. 246-249 [doi]
- Automated Assessment System for Subjective Questions Based on LSIXinming Hu, Huosong Xia. 250-254 [doi]
- A Study of User Downloading Behavior in Mobile Internet Using Clickstream DataYanbin Liu, Ping Yuan. 255-257 [doi]
- Vehicle Edge Detection Based on Multi-structure Mathematical MorphologyYanyan Cao, Hengjun Yue, Jian Wu, Jianming Chen, Zhiming Cui. 258-262 [doi]
- Estimating Typhoon Rainfall over Sea from SSM/I Satellite Data Using a Back-Propagated NetworkWen-Huan Chine, Hsiao-Ping Wei, Keh-Chia Yeh, Li Chen, Gin-Rong Liu, Chang-Hung Chiu. 263-267 [doi]
- Design and Implementation of ICAP-Client Based on Improved LRU AlgorithmShi Lan, Shao Xia, Zhao Ying. 271-275 [doi]
- Air Conditioning Load Prediction Based on DE-SVM AlgorithmZhonghai Chen, Yong Sun, Guoli Yang, Tengfei Wu, Guizhu Li, Longbiao Xin. 276-279 [doi]
- Comparative Study between the Magic Formula and the Neural Network Tire Model Based on Genetic AlgorithmChen Long, Huang Chen. 280-284 [doi]
- The Security Issues of Scientific-Workflow Technique in Network Grid ComputingFeng Wang, Hui Deng, Wei Dai, Sheng Zheng, Bo Liang. 285-288 [doi]
- A Historical Role-Based Fast Negotiation Model in Open NetworkDing Hong, Zhao Yizhu. 289-293 [doi]
- Design and Application of New Topology of Transverse Flux Permanent-Magnet Motor with Driving SystemHuan Wang, Yi-Kai Shi, Jian-kang Lu, Xiao-qing Yuan. 294-297 [doi]
- Emotion Recognition of Electromyography Based on Support Vector MachineGuangying Yang, Shanxiao Yang. 298-301 [doi]
- A Test Platform for Evaluation of Web Service Composition AlgorithmDong Li, Chun-Hui Yang. 302-305 [doi]
- A Trust Evaluation Model for Web Service SelectionDong Li, Chun-Hui Yang. 306-310 [doi]
- DW 2.0-Oriented Metadata Evolution ManagementDing Pan. 311-314 [doi]
- The Application of Random Forest and Morphology Analysis to Fault Diagnosis on the Chain Box of ShipsZhiyuan Yang, Qinming Tan. 315-319 [doi]
- Threshold Secret Sharing Based Trust Security in Structured P2P NetworkCai Biao, Zhishu Li, Zhen Luo. 320-323 [doi]
- The Research of Privacy-Preserving Clustering AlgorithmYanguang Shen, Junrui Han, Huifang Shan. 324-327 [doi]
- An Improved Algorithm of Collision Detection in 2D Grapple GamesKaiqiang Guo, Jiewu Xia. 328-331 [doi]
- Game Theory Based View to the Quantum Key Distribution BB84 ProtocolMahboobeh Houshmand, Monireh Houshmand, Habib Rajabi Mashhadi. 332-336 [doi]
- A New Method for Tracing by Using Corner Detecting and k-Nearest NeighborYang Zhang, Liqun Gao, Shufan Ye. 337-340 [doi]
- SPIHT Algorithm Combined with Huffman EncodingWei Li, Zhen Peng Pang, Zhi Jie Liu. 341-343 [doi]
- Research on the Knowledge Flow in Supply Chain Based on the Core EnterpriseLiang Xu, Yuanyuan Sun. 344-349 [doi]
- Efficient Scheduling of Task Graphs to Multiprocessors Using a Combination of Modified Simulated Annealing and List Based SchedulingMahboobeh Houshmand, Elaheh Soleymanpour, Hossein Salami, Mahya Amerian, Hossein Deldari. 350-354 [doi]
- A Noise Robust Endpoint Detection Algorithm for Whispered Speech Based on Empirical Mode Decomposition and EntropyXue-Dan Tan, He-Ming Zhao, Ji-Hua Gu, Zhi Tao. 355-359 [doi]
- IRC Botnets Homology Identifying Method Based on Improved LB_PAA Distance of Communication Characteristic CurvesYan Jia, Runheng Li, Liang Gan, Guangqiang Chen. 360-365 [doi]
- A Novel Measure of Diversity for Support Vector Machine EnsembleKai Li, Hongtao Gao. 366-370 [doi]
- An Improved Genetic Algorithm Based on PolygymyGu Min, Yang Feng. 371-373 [doi]
- Reconstruction of Normal Speech from Whispered Speech Based on RBF Neural NetworkZhi Tao, Xue-Dan Tan, Tao Han, Ji-Hua Gu, Yi-Shen Xu, He-Ming Zhao. 374-377 [doi]
- An NPT Watermarking Algorithm Using Wavelet Image CombinationJi-Hua Gu, Yun Shang, Bei-jing Huang. 378-381 [doi]
- Modeling Document Summarization as Multi-objective OptimizationLei Huang, Yanxiang He, Furu Wei, Wenjie Li. 382-386 [doi]
- New Lattice-Based Public-Key CryptosystemYali Jiang, Xiuling Ju, Feng Shi. 387-389 [doi]
- A Route-Nearest Neighbor Algorithm for Large-Scale Vehicle Routing ProblemRuhan He, Weibin Xu, Ying Wang, Wei Zhan. 390-393 [doi]
- The Algorithm Study of Sensor Compensation in MWD Instrument Based on Genetic Elman Neural NetworkLi-li Ju, Xiu-fang Wang, Sai Ma, Chun-ming Wei. 394-397 [doi]
- Identification of Nutrition Elements in Orange Leaves by Laser Induced Breakdown SpectroscopyMingyin Yao, Muhua Liu, Jinhui Zhao, Lin Huang. 398-401 [doi]
- An Adaptive Fast Algorithm for Coding Block Mode SelectionWeixing Zhu, Yong Ma, Rixia Wang. 402-406 [doi]
- The Analysis and Enhancement of Voting Behaviors in P2P NetworksBowei Yang, Guanghua Song, Yao Zheng. 407-410 [doi]
- Efficient Group Key Management Scheme in Wireless Sensor NetworksGuorui Li, Ying Wang, Jingsha He. 411-415 [doi]
- An Improved Key Management of ZigBee ProtocolBing Zhang, Li Chen. 416-418 [doi]
- An Improved Method for Similar Handwritten Chinese Character RecognitionFang Yang, Xue-dong Tian, Xin Zhang, Xin-Biao Jia. 419-422 [doi]
- Application of Clipboard Monitoring Technology in Graphic and Document Information Security Protection SystemShaobo Li, Shulin Lv, Xiaohui Jia, Zhisheng Shao. 423-426 [doi]
- Optimization of a Subset of Apple Features Based on Modified Particle Swarm AlgorithmWeixing Zhu, Dajun Hou, Jin Zhang, Jian Zhang. 427-430 [doi]
- Automated Monitoring System of Pig Behavior Based on RFID and ARM-LINUXWeixing Zhu, Fangkui Zhong, Xiangping Li. 431-434 [doi]
- The Solution of Printing on University Human Management SystemWei Yang, Chen Guo, Xuan Ge Peng. 435-437 [doi]
- Research and Application of USB Filter Driver Based on Windows KernelShaobo Li, Xiaohui Jia, Shulin Lv, Zhisheng Shao. 438-441 [doi]
- The Feasible Control Lyapunov Function of Nonlinear Affine-Control SystemsXiaodan Chen, ShaoBai Chen. 442-445 [doi]
- On the Upper Completeness of Quasi-metric SpacesXiaodan Chen, ShaoBai Chen. 446-449 [doi]
- P2PKMM: A Hybrid Clustering Algorithm over P2P NetworkZhongjun Deng, Wei Song, Xuefeng Zheng. 450-454 [doi]
- The Modeling and Simulation of Negotiation Process for High-Tech Virtual Enterprise Based on UML and Petri NetChangyuan Gao, Shuchen Zhang, Xiaoxing Zhang. 455-459 [doi]
- RFID System Security Using Identity-Based CryptographyYouqin Chen, Zhide Chen, Li Xu. 460-464 [doi]
- Intrusion Detection Model Based on Improved Support Vector MachineJingbo Yuan, Haixiao Li, Shunli Ding, Limin Cao. 465-469 [doi]
- Dynamic Replica Selection Using Improved Kernel Density EstimationYin Pang, Kan Li, Xin Sun, Kaili Bu. 470-474 [doi]
- Design of Temperature Control System for a Special Shortwave Infrared Spatial Remote Sensor Based on FPGAZhipeng Xu, Qianting Zhou, Jun Wei. 475-477 [doi]
- Associating IDS Alerts by an Improved Apriori AlgorithmWang Taihua, Guo Fan. 478-482 [doi]
- Three-Dimensional Multiscale Texture SynthesisJunyu Dong, Yuliang Wang, Yan Song, Guanglin Cheng. 483-487 [doi]
- Aesthetic Evolution of Staged L-systems for Tiling Pattern DesignYang Li, Chong-chong Zhao. 488-492 [doi]
- Study on the Convergence of Hybrid Ant Colony Algorithm for Job Shop Scheduling ProblemsXiaoyu Song, Lihua Sun. 493-497 [doi]
- Negotiation Problem Processing System of High-Tech Virtual EnterpriseLili Zhai, Fuguo Chang. 498-501 [doi]
- A Flexible Fuzzy Comprehensive Evaluation MethodJuan Chen. 502-506 [doi]
- A High Security Dynamic Secret Key Management Scheme for Wireless Sensor NetworksLanying Li, Xin Wang. 507-510 [doi]
- An Efficient and Secure Key Establishment Scheme for Wireless Sensor NetworkEric Ke Wang, Yunming Ye. 511-516 [doi]
- A Focused Crawler Based on Naive Bayes ClassifierWenxian Wang, Xingshu Chen, Yongbin Zou, Haizhou Wang, Zongkun Dai. 517-521 [doi]
- Economic Grid Resource Scheduling Based on Utility OptimizationJuan Chen. 522-525 [doi]
- A Study on CRL Issue by P2P NetworkZhao Qiu, Mingrui Chen, Jun Huang. 526-529 [doi]
- Design of Multi-mode E-commerce Recommendation SystemZhao Qiu, Mingrui Chen, Jun Huang. 530-533 [doi]
- 4-Step Face Authentication Algorithm Based on SVMFang-jun Luan, Lan Lin, Yong-hui Wang. 534-538 [doi]
- A Security Architecture for Intranet Based on Security Area DivisionFuxiang Gao, Sha Li, Xiaolu Wang, Lan Yao. 539-543 [doi]
- Attack Simulation and Signature Extraction of Low-Rate DoSZenghui Liu, Liguo Guan. 544-548 [doi]
- Research on the Directional Interferences CancelingBin Zhang. 549-552 [doi]
- An Ontology for Vulnerability LifecycleRatsameetip Wita, Nattanatch Jiamnapanon, Yunyong Teng-Amnuay. 553-557 [doi]
- A Prototype System of Software Reliability Prediction and EstimationJintao Zeng, Jinzhong Li, Xiaohui Zeng, Wenlang Luo. 558-561 [doi]
- How to Construct a Divisible Online/Offline SignatureYilian Zhang, Zhide Chen, Li Xu. 562-566 [doi]
- Mining Maximal Patterns Based on Improved FP-tree and Array TechniqueHuajin Wang, Chun-an Hu. 567-571 [doi]
- Research on Active Controllable Defense Model Based on Zero-PDR ModelKehe Wu, Tong Zhang, Fei Chen. 572-575 [doi]
- Optimization Design of Supervising and Controlling on the SOFC Integration SystemSuying Yang, Meng Wang, Jianying Lin, Kuijun Meng. 576-579 [doi]
- A Visual Domain Recognition Method Based on Function Mode for Source Code PlagiarismSuying Yang, Xin Wang. 580-584 [doi]
- A Multi-mode P2P Live Media Broadcasting MiddlewareYin Zhou, Wei Zhu. 585-590 [doi]
- Automatic Summarization for Chinese Text Based on Combined Words Recognition and Paragraph ClusteringChang-jin Jiang, Hong Peng, Qian-Li Ma, Jian-chao Chen. 591-594 [doi]
- The Design and Implementation of Host-Based Intrusion Detection SystemYing Lin, Yan Zhang, Yang-jia Ou. 595-598 [doi]
- An Improved Pattern Matching AlgorithmJingbo Yuan, Jisen Zheng, Shunli Ding. 599-603 [doi]
- Autonomy-Oriented, Self-Equilibrium Routing Model in Traffic NetworksChunyan Yu, Dongyi Ye, Xiaosheng He, Minghui Wu. 604-608 [doi]
- A New Agent Oriented Model for AutoMotive Computing PlatformChunyan Yu, Dongyi Ye, Minghui Wu. 609-613 [doi]
- Mediated Hierarchical Identity-Based Combined Public Key SchemesPingjian Wang, Jingqiang Lin, Jiwu Jing, Yongquan Xie. 614-618 [doi]
- IIS Security MechanismsPing Zhang, Yan Zhang, Zhengjiang Wu, Weifeng Du. 619-622 [doi]
- The Research on Two Important Counter-Examples of Four-Color ProblemJinbiao Wang, Shu-Qin. 623-626 [doi]
- Characteristics of Network Non-optimum and Extensionality Security ModeTeng Ping, He Ping. 627-630 [doi]
- Electronic Commerce Technology and its Security ProblemsXinqiang Ma, Youyuan Liu. 631-634 [doi]
- An Implementation of Object-Based Storage System Access Control Based on IBEJunjian Chen, Dan Feng, Jingning Liu. 635-639 [doi]
- Cascaded SVMs in Pattern Classification for Time-Sensitive SeparatingRuihu Wang, Bin Fang, Zhangping Hu, Liang Chen, Weihua Wang. 640-644 [doi]
- The Detecting Methods of Geostationary Orbit ObjectsMin Wei, HaiNing Chen, Tianyun Yan, QinZhang Wu, Bin Xu. 645-648 [doi]
- Research on the Key Technology of Secure Computer ForensicsYan Zhang, Ying Lin. 649-652 [doi]
- The Method of Early Real-Time Fault Diagnosis for Technical Process Based on Neural NetworkYingjun Guo, Lihua Sun, Haichao Ran. 653-657 [doi]
- Overcoming Disadvantages by Making Full Use of Extrinsic Objects: Advancing Information Resource Construction by ISAZhonghua Deng, Ying Wu. 658-662 [doi]
- Efficient Modeling of Spam ImagesQiao Liu, Zhiguang Qin, Hongrong Cheng, Mingcheng Wan. 663-666 [doi]
- Mobile Intelligence Sharing Based on Agents in Mobile Peer-to-Peer EnvironmentYe Liang. 667-670 [doi]
- A Novel Real-Time Face Tracking Algorithm for Detection of Driver FatigueQiufen Yangon, Weihua Gui, Huosheng Hu. 671-676 [doi]
- Research on High Performance RFID Code Resolving TechnologyHuifang Deng, Haiyan Kang. 677-681 [doi]
- An Improved Task Scheduling Algorithm in Embedded SystemsYumei Xiong, Yimin Chen. 682-685 [doi]
- Product Feature Extraction with a Combined ApproachZhixing Li. 686-690 [doi]
- An Algorithm of Webpage Information Hiding Based on Class SelectorsGuang Sun. 691-694 [doi]
- An Improved Particle Swarm Optimization Algorithm with Synthetic Update MechanismFei Li. 695-699 [doi]
- Study of Privacy Preserving Data MiningHaisheng Li. 700-703 [doi]
- Modeling and Simulating of Ecological Community in Digital Creative IndustryXiaojun Ma, Sa Li, Weihui Dai. 708-712 [doi]
- Modeling and Simulation of Double-tube Hydraulic Damper External CharacteristicChangcheng Zhou, Jie Meng. 713-719 [doi]
- Research on a High Efficient Intrusion Prevention ModelXiao-hui Zeng, Wen-lang Luo, Jin-tao Zeng, Yan-Ping Chen, Shi-yao Jin. 720-723 [doi]
- Application of Data Mining for Decision Tree Model of Multi-variety Discrete Production and ManufactureJianfang Sun. 724-728 [doi]
- A Multiple Population Genetic Algorithm and its Application in Fuzzy ControllerYukang Tian, Huy Quan Vu. 729-733 [doi]
- Knowledge Mining for Intelligent Decision Making in Small and Middle BusinessHuamin Li, Xingsen Li, Zhengxiang Zhu. 734-739 [doi]
- A New Method of Sea-Sky-Line DetectionChunliang Jiang, Hanhong Jiang, Chaoliang Zhang, Jie Wang. 740-743 [doi]
- Modeling and Dynamic Simulation of Electric Power Steering System of Automobile Using Bond Graph TechniqueLin-an Wang, Qiang Li, Xiao-juan Liang. 744-747 [doi]
- Design and Implementation of Quantum Factorization AlgorithmXiangqun Fu, Wansu Bao, Chun Zhou. 748-752 [doi]
- A Medium Field Multivariate Public Key Signature Scheme with External PerturbationLi Tian, Wansu Bao. 753-757 [doi]
- Towards a Theory of Cloud Computing in the Protocol-Composition FrameworkHuafei Zhu. 758-762 [doi]
- Research on Logistics System Architecture Based on SOAXin Yu, Zhiguang Wei. 763-766 [doi]
- The Construction and Test for a Small Beowulf Parallel Computing SystemWen-lang Luo, An-dong Xie, Wen Ruan. 767-770 [doi]
- Research of Image Acquisition Device for River SedimentXuange Peng, Ying Xiao, Bing Zhu. 771-776 [doi]
- A Collaborative Filtering Algorithm Based on Time Period PartitionYuchuan Zhang, Yuzhao Liu. 777-780 [doi]
- A Blind Watermark Algorithm for Color Image Based on Dual Scrambling TechniqueHongqin Shi, Fangliang Lv. 781-785 [doi]
- Artificial Neural Network Method for the Analysis of 1-D Defected Ground StructureShan Wang, Yang Jiang, Minghua Gao, Chuanyun Wang, Haiwen Liu. 786-788 [doi]
- Volume Rendering Effect Analysis with Image Preprocessing Technology Based on Three Dimension Anisotropic DiffusionXiangang Jiang, Lunlun Xu, Dean Ma. 789-792 [doi]
- An Intelligent Security Defensive Software Scheme and RealizationKun Wang, Jin-dong Wang, Liu-qing Shen, Zhen-hua Han. 793-796 [doi]