Abstract is missing.
- Study on the Design of Automatic Cotton Bale Inspecting Management SystemJie Zhao, Fang Yu, Minfeng Tang, Wenliao Du, Jin Yuan. 1-8 [doi]
- The Smallest Randić Index for TreesBingjun Li, Weijun Liu. 9-14 [doi]
- Design of Meridian and Acupoints Compatibility Analysis SystemJingchang Pan, Guangwen Wang. 15-21 [doi]
- Invariant Subspaces for Operators with Thick SpectraMingxue Liu. 22-25 [doi]
- Voronoi Feature Selection Model Considering Variable-Scale Map's Balance and LegibilityHua Wang, Jiatian Li, Haixia Pu, Rui Li, Yufeng He. 26-35 [doi]
- A Code Dissemination Protocol of Low Energy ConsumptionHaiyong Wang, Geng Yang, Jian Xu, Zhengyu Chen, Zhen Yang. 36-43 [doi]
- Dynamic Spectrum Analysis of High-Speed Train Passenger Compartment Luggage Rack NoiseChuanhui Wu, Xiangling Gao, Pinxian Gao. 44-50 [doi]
- Port-Based Composable Modeling and Simulation for Safety Critical System TestbedYujun Zhu, Zhongwei Xu, Meng Mei. 51-58 [doi]
- Risk Assessment Method of Radio Block Center in Fuzzy Uncertain EnvironmentQiuxiang Tao, Wei Nai, Haiming Gao, Jiliang Tu. 59-66 [doi]
- Learning Research in Knowledge TransferBing Wu, Pingping Chen. 67-72 [doi]
- A Post-filtering Technique for Enhancing Acoustic Echo Cancelation SystemYaxun Wang. 73-80 [doi]
- Packet Dropping Schemes and Quality Evaluation for H.264 Videos at High Packet Loss RatesYuxia Wang, Yi Qu, Rui Lv. 81-89 [doi]
- A Blocked Statistics Method Based on Directional DerivativeJunli Li, Chengxi Chu, Gang Li, Yang Lou. 90-97 [doi]
- Study on Cooperative Game Model of Talent Training through School-Enterprise CoalitionJun Li, Yan Niu, Jingliang Chen. 98-104 [doi]
- Research on Internet Public Opinion Detection System Based on Domain OntologyChunming Yang. 105-110 [doi]
- A Security Analysis Model Based on Artificial Neural NetworkRongqi Liu, Shifen Zhong. 111-116 [doi]
- Social Network Analyses on Knowledge Diffusion of China's Management ScienceHongjiang Yue. 117-124 [doi]
- A Parallel Association-Rule Mining AlgorithmZhi-Gang Wang, Chi-she Wang. 125-129 [doi]
- An Algorithm of Parallel Programming Design Based on Problem Domain ModelXin Zhang, Guangnan Guo, Lu Bai, Yu Zhang, Hao Wang. 130-135 [doi]
- Metadata-Aware Small Files Storage Architecture on HadoopXiaoyong Zhao, Yang Yang, Li-Li Sun, Han Huang. 136-143 [doi]
- Research on the Isomorphism of the Electronic-Government and Electronic-Commerce in Support SystemYunbiao Gu, Jian Liu. 144-149 [doi]
- On the Deployment of Wireless Sensor Networks with Regular Topology PatternsWen-xiang Li, Ya-Jie Ma. 150-158 [doi]
- An Empirical Study on the Relationship among Trust and the Risky and Non-Risky Components of E-CommerceXibao Zhang. 159-166 [doi]
- Process Modeling and Reengineering in the Integration Stage of Electronic GovernmentNing Zhang, Haifeng Li. 167-174 [doi]
- Development of Vertical Industrial B2B in China: Based on Cases StudyJinghuai She, Xiaotong Xing. 175-182 [doi]
- Personalized Recommendation System on Massive Content Processing Using Improved MFNNJianyang Li, Xiaoping Liu. 183-190 [doi]
- A Speaker Recognition Based Approach for Identifying Voice SpammerFei Wang, KeXing Yan, Min Feng. 191-198 [doi]
- Security Access Authentication System for IPv4/IPv6 Dual-Stack Campus Network Based on IpoEJinshan Zhu, Jiankang Guo, Yueguang Ruan. 199-205 [doi]
- Information Encryption Based on Virtual Optical Imaging System and Chen's ChaosWei Zhu, Geng Yang, Jian Xu, Xiao-ling Yang. 206-213 [doi]
- A New Scheme with Secure Cookie against SSLStrip AttackSendong Zhao, Wu Yang, Ding Wang, Wenzhen Qiu. 214-221 [doi]
- ID-Based Signatures from Lattices in the Random Oracle ModelChunxiang Gu, Li Chen, Yonghui Zheng. 222-230 [doi]
- Strongly Secure Attribute-Based Authenticated Key Exchange with TraceabilityFugeng Zeng, Chunxiang Xu, Xiujie Zhang, Jian Liu. 231-238 [doi]
- A New Public Key Signature Scheme Based on Multivariate PolynomialsFeng Yuan, Shangwei Zhao, Haiwen Ou, Shengwei Xu. 239-245 [doi]
- Comments on an Advanced Dynamic ID-Based Authentication Scheme for Cloud ComputingDing Wang, Ying Mei, Chunguang Ma, Zhen-shan Cui. 246-253 [doi]
- Research on Security Management in Active Network Node Operating SystemsYongchun Cao, Yabin Shao, Zhengqi Cai. 254-263 [doi]
- An Integrity Verification Scheme for Multiple Replicas in CloudsLa Zhang, Qingzhong Li, Yuliang Shi, Lin Li, Wenxiao He. 264-274 [doi]
- Multi-stage Attack Detection Algorithm Based on Hidden Markov ModelNurbol Luktarhan, Xue Jia, Liang Hu, Nannan Xie. 275-282 [doi]
- Security Analysis of a Secure and Practical Dynamic Identity-Based Remote User Authentication SchemeMo-han Zhang, Chen-guang Yang, Ding Wang. 283-290 [doi]
- Formal Construction of Secure Information Transmission in Office Automation SystemXiaole Li, Lianggang Nie, Jianrong Yin, Yuanlu Lu. 291-298 [doi]
- A Novel CBCD Scheme Based on Local Features CategoryJie Hou, Baolong Guo, Jinfu Wu. 299-305 [doi]
- Research and Improvement on Association Rule Algorithm Based on FP-GrowthJingbo Yuan, Shunli Ding. 306-313 [doi]
- Encrypted Remote User Authentication Scheme by Using Smart CardAli A. Yassin, Hai Jin, Ayad Ibrahim, Deqing Zou. 314-323 [doi]
- A Web Visualization System of Cyberinfrastructure ResourcesYuwei Wang, Kaichao Wu, Danhuai Guo, Wenting Xiang, Baoping Yan. 324-332 [doi]
- A Novel Clustering Mechanism Based on Image-Oriented Correlation Coefficient for Wireless Multimedia Sensor NetworksRong Wu, Ruchuan Wang, Chao Sha, Liyang Qian. 333-341 [doi]
- Design of Underground Miner Positioning System Based on ZigBee TechnologyXin Xu, Ping Zheng, Lingling Li, Haisheng Chen, Jianping Ye, Jun Wang. 342-349 [doi]
- Metadata Management of Context Resources in Context-Aware Middleware SystemRong Tan, Junzhong Gu, Zhou Zhong, Peng Chen 0005. 350-357 [doi]
- Research on Scientific Data Sharing Platform of Hydrology and Water Resources Based on Service CompositionDingsheng Wan, Juan Tang, Dazheng Yu, Yufeng Yu, Xingzhong Guan. 358-365 [doi]
- Study on the Scheme of Tianjin Area E-commerce Platform ConstructionYunbiao Gu. 366-371 [doi]
- Research on Chinese Hydrological Data Quality ManagementYufeng Yu, Yuelong Zhu, Jianxin Zhang, Jingjin Jiang. 372-379 [doi]
- Using IoT Technologies to Resolve the Food Safety Problem - An Analysis Based on Chinese Food StandardsYun Gu, Weili Han, Lirong Zheng, Bo Jin. 380-392 [doi]
- Towards Better Cross-Cloud Data Integration: Using P2P and ETL TogetherJian Dai, Shuanzhu Du. 393-401 [doi]
- Design of Intelligent Maintenance Decision-Making System for Fixed Equipment in Petrochemical PlantsGuangpei Cong, Jinji Gao, Bing Hou, Guochen Wang. 402-413 [doi]
- Dimensional Modeling for Landslide Monitoring Data WarehouseHongbo Mei, Guangdao Hu. 414-421 [doi]
- A New Fuzzy Risk Evaluation Method for Uncertain Network Public Sentiment EmergencyQiansheng Zhang, Xia Li, Yirong Huang. 422-430 [doi]
- Service Lifecycle Management in Distributed JBI EnvironmentBen Wang, Xingshe Zhou, Gang Yang, Yunfeng Lou. 431-438 [doi]
- Graded BDI Models for Agent Architectures Based on Łukasiewicz Logic and Propositional Dynamic LogicXiaojun Zhang, Min Jiang, Changle Zhou, Yijiang Hao. 439-450 [doi]
- A Polymorphic Type System with Progress for Binary SessionsZhenguo Yang, Farong Zhong, Jinfang Zhang. 451-461 [doi]
- Energy Model of SARA and Its Performance AnalysisBo Pang, Zhiyi Fang, Hongyu Sun, Ming Han, Xiaohui Nie. 462-471 [doi]
- Data Profiling for Semantic Web DataHuiying Li. 472-479 [doi]
- Checking and Handling Inconsistency of DBpediaZhaohua Sheng, Xin Wang, Hong Shi, Zhiyong Feng. 480-488 [doi]
- Conceptual Representing of Documents and Query Expansion Based on OntologyHao-ming Wang, Ye Guo, Xibing Shi, Fan Yang. 489-496 [doi]
- Robust Web Data Extraction: A Novel Approach Based on Minimum Cost Script Edit ModelDonglan Liu, Xinjun Wang, Zhongmin Yan, Qiuyan Li. 497-509 [doi]
- Rule-Based Text Mining of Chinese Herbal Medicines with Patterns in Traditional Chinese Medicine for Chronic Obstructive Pulmonary DiseaseJunping Zhan, Guang Zheng, Miao Jiang, Cheng Lu, Hongtao Guo, Aiping Lu. 510-520 [doi]
- Fault Forecast of Electronic Equipment Based on ε -SVRLina Liu, Jihong Shen, Hui Zhao. 521-527 [doi]
- Analysis and Design of Internet Monitoring System on Public Opinion Based on Cloud Computing and NLPHui-Wen, Peiguang Lin, Yaobin Hu. 528-535 [doi]
- Using Similes to Extract Basic Sentiments across LanguagesBin Li, Haibo Kuang, Yingjie Zhang, Jiajun Chen, Xuri Tang. 536-542 [doi]
- Automatic Summarization for Chinese Text Using Affinity Propagation Clustering and Latent Semantic AnalysisRui Yang, Zhan Bu, ZhengYou Xia. 543-550 [doi]
- A Webpage Deletion Algorithm Based on Hierarchical FilteringXunxun Chen, Wei Wang, Dapeng Man, Sichang Xuan. 551-557 [doi]
- Research in Keyword ExtractionBing Wu, Pingping Chen. 558-563 [doi]
- Tuple Refinement Method Based on Relationship Keyword ExtensionXiaoling Yang, Jing Yang 0001, Chao Chen. 564-571 [doi]
- An Agent Based Intelligent Meta Search EngineQingshan Li, Yingcheng Sun. 572-579 [doi]
- A Novel Image Annotation Feedback Model Based on Internet-SearchJianSong Yu, Donglin Cao, Shaozi Li, Dazhen Lin. 580-588 [doi]
- The Design and Application of an Ancient Porcelain Online Identification Analysis SystemWei Li, Xiaochuan Wang, Rongwu Li, Guoxia Li, Weijuan Zhao, Wenjun Zhao, Peiyu Guo. 589-594 [doi]
- A Self-adaptive Strategy for Web Crawler in In-Site SearchRui Sun, Peng Jin, Wei Xiang. 595-602 [doi]
- A Novel Shark-Search Algorithm for Theme CrawlerLei Luo, Rong-bo Wang, Xiao-xi Huang, Zhi-qun Chen. 603-609 [doi]
- A Framework of Online Proxy-Based Web PrefetchingZhijie Ban, Sansan Wang. 610-620 [doi]
- Mapping the Intellectual Structure by Co-word: A Case of International Management ScienceHongjiang Yue. 621-628 [doi]
- Study on Multi-sensor Information Fusion Technology in the Dynamic Monitoring of Coal Mine RoofYong Zhang, Zhao-Jun Liu, Yun-Fu Cheng. 629-636 [doi]
- Detecting Hot Topics in Chinese Microblog Streams Based on Frequent Patterns MiningWeili Xu, Shi Feng, Lin Wang, Daling Wang, Ge Yu. 637-644 [doi]
- KACTL: Knowware Based Automated Construction of a Treelike Library from Web DocumentsRuqian Lu, Yu Huang, Kai Sun, Zhongxiang Chen, Yiwen Chen, Songmao Zhang. 645-656 [doi]
- Associating Labels and Elements of Deep Web Query Interface Based on DOMBaohua Qiang, Long Shi, Chunming Wu, Qian He, Chao Shen. 657-663 [doi]
- Design and Implementation of the Online Shopping SystemGuoyong Zhao, Zhiyu Zhou. 664-670 [doi]
- System Development of Residence Property Management Based on WEBHanbin Cui, Zhiyu Zhou. 671-677 [doi]
- An Intelligent Metadata Extraction Approach Based on Programming by DemonstrationBinge Cui, Jie Zhang. 678-685 [doi]
- OF-NEDL: An OpenFlow Networking Experiment Description Language Based on XMLJunxue Liang, Zhaowen Lin, Yan Ma. 686-697 [doi]
- Structural Similarity Evaluation of XML Documents Based on Basic StatisticsChen-Ying Wang, Xiao-jun Wu, Jia Li, Yi Ge. 698-705 [doi]
- An XML Data Query Method Based on Structure-EncodedZhaohui Xu, Jie Qin, Fuliang Yan. 706-713 [doi]