


default search action
2nd CSAE 2018: Hohhot, China
- Ali Emrouznejad

, Zhihong Qian:
The 2nd International Conference on Computer Science and Application Engineering, CSAE 2018, Hohhot, China, October 22-24, 2018. ACM 2018, ISBN 978-1-4503-6512-3
Algorithm and Data Structure
- Jixin Shao, Xiuguo Zhang, Zhiying Cao:

Research on Context-based Instances Selection of Microservice. 1:1-1:5 - Chang Yi, Xiuguo Zhang, Wei Cao:

Dynamic Weight Based Load Balancing for Microservice Cluster. 2:1-2:7 - Yu Tong, Yunjie Zhang:

An Audio Signs Separation Algorithm Based on Fuzzy C-Lines Clustering in Smart Home. 3:1-3:7 - Xingang Wang, Peipei Yao:

A Fuzzy KNN Algorithm Based on Weighted Chi-square Distance. 4:1-4:6 - Wen Yang, Xiaoning Liu, Jiabei Hu, Fei Zhu, Kang Li, Guohua Geng:

Three-dimensional Model Segmentation Based on Improved Random Walk Segmentation Algorithm. 5:1-5:5 - Hongbin Qiu, Aihua Zhou, Bin Hu, Bo Chai, Sen Pan, Pei Yang:

TAnalyzer: A Graph Database Based Topology Analysis Tool for Power Grid. 6:1-6:5 - Xu Ren, Xiang-Qi Liu, Zhen Meng:

Trajectory Planning Algorithm for 3DOF Electro-Hydraulic Servo Manipulators. 7:1-7:6 - Yiran Xing, Hailun Yan, Xuejia Lai:

New Observation on Division Property: Simplifying Models of Basic Operations and Modeling Modular Multiplication Operation. 8:1-8:6 - Piao Wang, Guohua Geng, Xiaofeng Wang, Yi Wang:

Method for Splicing Fragments Based on Constructing Surface Texture and Fracture Boundary Tuple. 9:1-9:7 - Meng Li, Qinpeng Sun, Qing Song, Zhaoliang Wang, Yuan Li:

Path Planning of Mobile Robot Based on RRT in Rugged Terrain. 10:1-10:5 - Qinglan Fan, Xinxin Liu, Yunfeng Zhang, Fangxun Bao, Shilong Li:

Adaptive Mutation PSO Based SVM Model for Credit Scoring. 11:1-11:7 - Piao Wang, Guohua Geng, Wen Yang, Xiaoning Liu, Jiabei Hu, Yanfang Zhu:

A Correspondence Method of 3D Facial Points Based on Voxel Model and Multi-scale Constraints. 12:1-12:6 - Zhangli Yang, Xinli Deng:

Fuzzy Cognition Map Based Data Processing Technology for Robot Sensor Suit. 13:1-13:6 - Dongni Ma, Liyan Dong, Kelu Li:

Collaborative Filtering Recommendation Algorithm Based on Social Relation and Geographic Information. 14:1-14:7 - Tianle Zhang

, Muzhou Hou, Futian Weng
, Yunlei Yang, Hongli Sun, Zheng Wang, Zhong Gao, Jianshu Luo:
An Online Learning Algorithm for Voice Activation Detection Based on a Pretrained Online Extreme Learning Machine. 15:1-15:8 - Jiangcong Hao, Wenke Wang, Zijun Duo:

An Efficient Algorithm for Streamline Visualization in Unstructured Steady Vector Field. 16:1-16:7 - Guohua Yue, Jingjing Ren:

A Self-learning Drinking Water Safety Detection Algorithm Based on Telescopic Sliding Window. 17:1-17:5 - Li Liang, Yong Hou, Xiaoting Liu:

An Altered Adaptive Genetic Algorithm for Solving Energy Consumption Problems. 18:1-18:6 - Sanyang Liu, Chong Zhang:

Randomized Method for Robust Principal Component Analysis. 19:1-19:5 - Yue Min, Zhenzhong Wei:

An Anti-Occlusion Tracking Algorithm. 20:1-20:6 - Li Sun, Jie Song, Cheng Hua, Chengchao Shen, Mingli Song:

Value-Aware Resampling and Loss for Imbalanced Classification. 21:1-21:6 - Yu Liu, Guodong Wei, Zheng Qiao:

Research on Heavy Haul Train Protection Algorithm Based on Online Parameter Identification. 22:1-22:5 - Tao Zheng, Ya Zhang

, Chenhao Fan:
Research on Hospital Operation Index Prediction Method Based on PSO-Holt-Winters Model. 23:1-23:8 - Kunlun Chen, Yanru Liu, Qingxu Deng:

Indexing Moving Objects Using Query Oriented Parallel Grids. 24:1-24:5 - Xiao Wang, Jianfu Zhang

, Pingfa Feng, Dingwen Yu, Zhijun Wu:
A Safety Monitoring System for Unmanned Aerial Vehicles. 25:1-25:8 - Ryuichi Takahashi, Kazuma Nishida, Yoshiaki Fukazawa:

Recommendation Method for Service Selection Algorithm Based on User Preference. 26:1-26:6
Big Data & Cloud Computing
- Wai Ming Wang, Hanyang Guo, Zhi Li, Yunhui Shen, Ali Vatankhah Barenji:

Towards Open and Automated Customer Service: A Blockchain-based AutoML Framework. 27:1-27:6 - Han Zhang, Kuisheng Wang:

Research on Customer Credit Demand Forecasting Based on Big Data Analysis. 28:1-28:5 - Changwen Ke, Kuisheng Wang:

Research and Application of Enterprise Big Data Governance. 29:1-29:5 - Guilan Zhang, Jian Wang, Guomin Zhou, Jianping Liu, Caoyuan Wei:

Scientific Data Relevance Criteria Classification and Usage. 30:1-30:7 - Zhe Zou, Linjiang Zheng, Jing Huang, Jian Li, Jie Wang:

Design and Implementation of Coal Mine Dust Monitoring System Based on Cloud Platform. 31:1-31:8 - Zhuo Zhao, Xingying Li, Shanzi Li, Yixuan Wu, Xin Zhao:

Towards the Big Data in Official Statistics: An Analytic Service Framework for Distributed Multiple Sourced Heterogeneous Datasets. 32:1-32:5 - Enyuan Liu:

Construction of University Entrepreneurship Project Service Mechanism Based on Internet Semantic Analysis. 33:1-33:6 - Zhiyi Ma, Yanwei Bai:

A Distributed System Monitoring Tool with Virtual Reality. 34:1-34:5 - Xiao Li, Ling Ge, Hongtao Den:

Research on Knowledge Mapping of Domestic Virtual Community Based on CiteSpace. 35:1-35:5 - Yinan Wu:

Research and Implementation of Library Circulation System Based on Block Chain. 36:1-36:4
Communication Networks
- Yang Guo, Xiang Li, Jiaojuan Wang, Xiangde Zhang:

DFN: Dual Fusion Networks for Single Stage Face Detection. 37:1-37:5 - Xiaoyi Shao, Xiaoli Ni, Gengfeng Niu, Yuping Wang, Ran Qu, Yangwen Geng:

The Mediating Effect of Self-concept Clarity: Anonymity and Online Public Communication. 38:1-38:5 - Xinlian Zhou, Ru Jin, Zepeng Zhu:

An Improved LEACH Algorithm. 39:1-39:5 - Hong Wen, Ru Jin:

Research on BA Scale-free Networks Congestion and Control. 40:1-40:5 - Zhijun Yang, Yangyang Sun, Zheng Liu:

Research on MAC Layer Control Protocol of Wireless Network. 41:1-41:6 - Yao Lu, Wei Qi, Juan Qin:

The Research on Wechat Advertising Effectiveness Based on SOR Model. 42:1-42:7 - Yuantao Kou, Guojian Xian, Chao Dong, Sa Ye, Ruixue Zhao:

Dynamic Evolution Research and System Implementation of International Soybean Trade Network Based on Complex Network. 43:1-43:6 - Liang Chen, Dongyi Chen:

CaMap: Camera-based Map Manipulation on Mobile Devices. 44:1-44:5 - Xin Song, Li Dong, Lei Qin, Siyang Xu, Jing Cao, Xiuwei Han, Yue Ni, Jingpu Wang, Zhigang Xie:

Power Allocation for Non-Orthogonal Multiple Access in HetNet with Imperfect Channel State Information. 45:1-45:5 - Hongwei Kang

, Jia Zhou, Xin Pang, Yong Shen, Xingping Sun, Qingyi Chen:
Stag Hunt Game on Scale-free Networks with Variable Clustering Coefficients. 46:1-46:5 - Gewei Lou, Wenjing Yang:

Formation Control and Collision Avoidance of Multi-agent System with Switching Communication Topology. 47:1-47:6 - Zhenxin Chen, Yongmei Hu, Pingao Huang, Jianpi Huang, Hui Wang, Guanglin Li

:
Design and Experimental Validation of a Synchronous Wireless Acquisition System of EMG and Muscle Impedance Signals. 48:1-48:5 - Cao Huang, Huiyu Jin, Ying Wang:

Stability for Sampled-Data Systems with Delay and Applications for Networked Control Systems. 49:1-49:4 - Mengyuan Wang, Jiao Wan, Lei Zhou, Shuoying Liang, Hui Liu, Jun Liu:

Research and Simulation of Efficient Data Acquisition Technology in Spatial Information Network. 50:1-50:5 - Yulun Cheng, Lili Sun, Xiaoyun Liu:

User-Oriented Energy-Saving Offloading for Wireless Virtualization Aided Mobile Edge Computing. 51:1-51:5 - Hengyuan Guo, Qian Zeng, Zike Chen, Ming Zhao:

Bluetooth Door Lock System Based on Smart Mobile Device. 52:1-52:5
Computational Science and Engineering
- Changqing Pan, Dong Hu, Honggang Ruan:

A Fast Scale Adaptive Kernel Correlation Filter Tracker via Reliable Key Points. 53:1-53:6 - Mengyuan Wang, Lei Zhou, Jiao Wan, Shuoying Liang, Ning Ye:

SDN-based Service-Driven Virtualization Scheme. 54:1-54:5 - Yulun Cheng, Longxiang Yang, Hongbo Zhu:

Distributed Computation Offloading and Power Allocation for Wireless Virtualization Aided Mobile Edge Computing. 55:1-55:5 - Zhen Yang, Xiaodong Cheng, Mengsongqi Li:

The Application of CURD Clustering Algorithm in UWB Positioning. 56:1-56:5 - Luobing Dong

, Fei Wang, Junyuan Shan:
Computation Offloading for Mobile-Edge Computing with Maximum Flow Minimum Cut. 57:1-57:5 - Tingrong Zhang, Shuming Chen, Zhao Lv:

FAL-based High Reusability and Automated Verification Platform. 58:1-58:5 - Nan Li, Bo Jiang, Nannan Li:

An Efficient Algorithm for Finding the Minimum Perimeter Convex Hull of Disjoint Segments. 59:1-59:6 - Huan Liu, Zhiying Cao, Xiuguo Zhang:

An Efficient Algorithm of Context-Clustered Microservice Discovery. 60:1-60:6 - Pei Wang:

A Solution Method for Reliability Evaluation of Dust-proofing Water Supply Network in pit. 61:1-61:5 - Haibo Zhao, Fei Zheng, Jian Wu, Baosong Nan, Boliang Li, Kuizhi Mei:

Automatic Parallelization for Binary on Multi-core Platforms. 62:1-62:6 - Pei Li, Chaofan Dai, Wenqian Wang:

Inconsistent Data Detection based on Maximum Dependency Set. 63:1-63:8 - Chiyue Huang, Pufeng Qin, Shengye Huang:

Simulation Study of the Depositing Method of Chemical Materials on the Diffusion Duration within Sewage. 64:1-64:5 - Baoyan Zhong, Xiaofeng Lu, Qiaoyuan Wang, Siqi Zhao, Qianyun Liu:

A Hardware Architecture of Target Tracking System on FPGA. 65:1-65:5 - Zhiguang Xiong, Anfeng Chi, Yi Wang:

The Finite Element Method and Its Computational Effectiveness for Solving Semilinear Singularly Perturbed Two-point Boundary Value Problems Using Shishkin Mesh. 66:1-66:5 - Vladimir V. Akhiyarov

, Andrey B. Borzov, Konstantin P. Likhoedenko, Yury V. Karakulin, Grigory M. Seregin, Victor B. Suchkov:
Mathematical Simulation of Electromagnetic Scattering Field from Perfectly Conducting Object with Dielectric Cover on the Base of Physical Theory of Diffraction. 67:1-67:5 - Han Yang, Qiang Li, Xue-Zhang Liang:

Quartic Spline Approximation of a Circle by Piecewise Bézier Curves with High Smoothness and Accuracy. 68:1-68:5 - Xianfeng Li, Dekai An:

An In-depth Performance Analysis and Optimization for Android Screencast. 69:1-69:6 - Baohua Zhao, Xiao Liang, Ningyu An, Hui Lu, Zhan Zhang:

The Design of Heterogeneous Multi-core Reconfigurable Mobile Terminal Architecture. 70:1-70:5 - Mengyao Liu, Can Kang, Lili Zhang:

Numerical Simulation of the Response of the Axial-Flow Pump Blade to the Impact of Solid Particles. 71:1-71:5 - Demin Wei, Ying Chen:

Response Analysis for the Tower Model of a Cable-Stayed Bridge under Local Collision. 72:1-72:6 - Jing Lü, Yuhang Qi:

Leader-following Formation Control for Multi-agent Systems with Sliding Mode Estimator under fixed Topologies. 73:1-73:5 - Xianda Shang, Yi Zhou, Jie Fang, Jianwu Lin:

Life-cycle Research of A-H Share Arbitrage Performance Based on Discrete-event Simulation. 74:1-74:5 - Yuhui Peng, Yan Zhao:

Detection and Recovery of Sharp Features for 3D Mesh Models. 75:1-75:6 - Valeria Lupiano

, Guillermo Machado
, Salvatore Di Gregorio:
Revisiting the 1877 Cataclysmic Lahars of Cotopaxi Volcano by a Cellular Automata Model and Implications for Future Events. 76:1-76:7 - Siyuan Jiang, Zhexue Ge, Zhuqi Qi:

Research on Level of Repair Optimization Method Based on Comprehensive Cost Analysis. 77:1-77:7 - Xing Chen, Yinan Lu, Ran Fang:

3D Face Recognition Based on Empirical Mode Decomposition and Sparse Representation. 78:1-78:5 - Chunxiao Xing

, Qi Zhu:
Crowd Sensing Incentive Mechanism based on Coalition Game. 79:1-79:6 - Haoyang Lu, Miao Yu, Weipeng Shang:

Wide-area Damping Control of the Time Delay Power System Based on an ϵ-Trade Off "Damping-Time delay" Method. 80:1-80:6
Data Mining, AI and Machine Learning
- Tian Fu, Zhen Wang, Tianming Wang:

Research on Application of a New Algorithm Based on Multi-source Data in Tourism Flow Forecasting. 81:1-81:5 - Cui Lv, Di-Rong Chen:

Interpretable Functional Logistic Regression. 82:1-82:5 - Chongyang Zhang, Zhi Ji, Jixiang Zhang, Yanqing Wang, Xingzhi Zhao, Yiping Yang:

Predicting Chinese Stock Market Price Trend Using Machine Learning Approach. 83:1-83:5 - Xingang Wang, Linlin Wang:

Research on Data Stream Clustering Algorithm Based on Decay Time Window. 84:1-84:7 - Wenjun Quan, Qing Zhou, Hai Nan, Ping Wang:

An Original Data Understanding Process. 85:1-85:5 - Zhengyu Zhu, Qiang Xu:

Fast Mining Frequent Page Sets from Web Log by Filtering Strategy. 86:1-86:7 - Huang Liu, Xiu Wang, Faqian Guan, Jinsen Hu:

Convolutional Neural Networks with Multi-task Loss for Polyphonic Sound Event Detection. 87:1-87:6 - Yan Wang, Weiping Hu:

Speech Emotion Recognition Based on Improved MFCC. 88:1-88:7 - Jiaquan Li, Baoan Li, Xueqiang Lv:

Machine Reading Comprehension Based on the Combination of BIDAF Model and Word Vectors. 89:1-89:4 - Liang Zhou, Xuan Ouyang, Huan Ying, Lifang Han, Yushi Cheng, Tianchen Zhang:

Cyber-Attack Classification in Smart Grid via Deep Neural Network. 90:1-90:5 - Yan Jiang, Bo Li, Hao Zhang, Quming Luo, Pengxin Zhou:

A Novel Classification Scheme of Moving Targets at Sea Based on Ward's and K-means Clustering. 91:1-91:5 - Yatian Shen, Jun Sun, Xiaopeng Li, Lei Zhang, Yan Li, Xiajiong Shen:

Legal Article-Aware End-To-End Memory Network for Charge Prediction. 92:1-92:5 - Kun Yu, Yushui Geng, Xuemei Li, Mengjie Yang:

Improvement of Fuzzy KNN Classification Algorithm Based on Fuzzy C-means. 93:1-93:5 - Jiawen Wang, Wai Ming Wang, Zonggui Tian, Zhi Li:

Classification of Multiple Affective Attributes of Customer Reviews: Using Classical Machine Learning and Deep Learning. 94:1-94:5
Image Processing & Text Analytics
- Biqiu Zhang, Dong Hu, Huifang Yan:

Compressive Tracking Based on Super-pixel Structured Information. 95:1-95:6 - Wenxiang Zhang, Dong Hu, Feng Han:

Parallel Acceleration Scheme of HEVC Decoder Based on Multicore Platform. 96:1-96:8 - Chunhui Deng, Huifang Deng, Fenfen Chen:

A New Approach to Face Detection Based on Binary Texture Extraction Algorithm. 97:1-97:6 - Yang Yang, Jingting Xu, Yi Gao, Ke Dong, Wenwen Yang:

Research on Tobacco-related Information Screening Algorithm Based on Deep Convolution Network. 98:1-98:6 - Ming Fang

, Jing-An Lei:
Field Corn Stalk Identification Method Based on Machine Learning and Spectral Characteristics. 99:1-99:5 - Maoshen Liu, Ke Gu, Junfei Qiao:

Convolutional Neural Network for Smoke Image Super-Resolution. 100:1-100:6 - Weihui Zeng

, Miao Li, Jian Zhang, Lei Chen, Sisi Fang, Jingxian Wang:
High-Order Residual Convolutional Neural Network for Robust Crop Disease Recognition. 101:1-101:5 - Yu Miao, Dalong Song, Weili Shi, Huamin Yang, Yanfang Li, Zhengang Jiang, Wei He, Wanqing Gu:

Application of the CLAHE Algorithm Based on Optimized Bilinear Interpolation in Near Infrared Vein Image Enhancement. 102:1-102:6 - Yanwei Sun

, Hao Li, Li Sun:
A Novel Wide-Baseline Stereo Matching Algorithm Combining MSER and DAISY. 103:1-103:5 - Minjuan Wang, Zhen Zhong

, Wanlin Gao:
Development and Challenges of Phenotypic Characterization in Modal Animals. 104:1-104:7 - Weirong Zhou, Yunjie Zhang, Yongchao Liu:

Bilateral Linear Operator for Period Noise Image De-noising. 105:1-105:5 - Yehong Chen:

CT-LSTM: Detection & Estimation Duplexed System for Robust Object Tracking. 106:1-106:7 - Lizhi Huang, Xunyi Ren:

Erotic Image Recognition Method of Bagging Integrated Convolutional Neural Network. 107:1-107:7 - Xiangchu Feng, Shuai Ma, Bingzhe Wei:

Single Image Dehazing Method Based on Cartoon-Texture Decomposition. 108:1-108:5 - Ye Yang, Peng Zheng, Hao He, Tianyu Zheng, Lei Wang, Shan He:

An Evaluation Method of Acceptable and Failed Spot Welding Products Based on Image Classification with Transfer Learning Technique. 109:1-109:6 - Yincheng Qi, Liqun Du, Zhenbing Zhao, Yaping Cui, Wenhao Si:

Insulator Detection Based on SSD with the Default Box Adaptively Selection. 110:1-110:4 - Haitao Li, Yongting Zhang, Guojian Liang:

Application of Foreground Detection Technology in Intelligent Video Monitoring System of Substation. 111:1-111:5 - Caixia Zhang, Xiaoxiao Liu, Qingyang Xu:

Mixed Gaussian Model Based Video Foreground Object Detection. 112:1-112:5 - Fengqiu Cao, Yang Duan, Mengzhi Zhang, Zhihua Xu

, Yuyue Zou, Yan Kang, Benqiang Yang:
A CT Image Analysis Method for Evaluating Hematoma Enlargement in Acute Hypertensive Cerebral Hemorrhage. 113:1-113:6 - Binghan Liu, Zhenda Li, Xiao Ke:

Human Pose Estimation Method Based on Flexible Model and Deep Learning. 114:1-114:6 - Longze Zhao, Bin Xi, Shunxiang Wu, Yasen Aizezi, Daodong Ming, Fulin Wang, Chao Yi:

Physical Mirror Extraction on Qualcomm-based Android Mobile Devices. 115:1-115:5 - Yichuan Jiang

, Xinyu Chen, Hui Liu, Yue Leng, Yuankui Yang, Pan Lin, Junfeng Gao, Ruimin Wang, Keiji Iramina, Sheng Ge:
Rapid Detection of Targets from Complex Backgrounds Based on Eye-tracking Data. 116:1-116:5 - Lei Gao, Wang Gao, Haitao Gu:

Virtual Simulation Technology of 3D Obstacle Avoidance Algorithm for AUV. 117:1-117:5 - Pengfei Dong, Xiaogang Ruan, Jing Huang, Xiaoqing Zhu, Yao Xiao:

A RGB-D SLAM Algorithm Combining ORB Features and BOW. 118:1-118:6 - Yunyang Li, Zhinong Zhong, Ning Jing:

Multi-Path Convolutional Neural Network for Distant Supervised Relation Extraction. 119:1-119:7 - Xiaoke Ma, Qian Xie, Xian Kong:

Improving KAZE Feature Matching Algorithm with Alternative Image Gray Method. 120:1-120:5 - Baoqing Jiang, Xiaoyan Zhao:

An Image Dehazing Algorithm Based on Sky Region Detection. 121:1-121:5 - Jianrong Zhang, Jinkai Zhang, Xingqian Li

, Xiaomin Li, Yan Zhang, Hongwei Zhao:
Path Planning Method of Sweeping Robot Based on Beacon Positioning. 122:1-122:5 - Yin Long, Changhua Liu, Dujuan Shuai, Fu-Gui Zhang

:
Image Segmentation of Canola Based on Color Similarity in Color Space. 123:1-123:6 - Zengsi Chen, Kuntao Xiao, Jiantao Yang, Dan Long, Dexing Kong:

Automatic Segmentation of 3D Lung Airway without Leakage. 124:1-124:5 - Jisheng Huang, Ping Guo, Enxin Xiang, Wei Li, Lingyun Tang, Zhengjie Cai:

Underground Electromagnetic Wave Velocity Calculation Method. 125:1-125:5 - Dingzeyu Wu, Lei Wang, Guoxiong Chen:

A Linux Cluster Automatic Deployment Method Under X86 Architecture. 126:1-126:5 - Jiangtao Liu, Zeping Li, Chuan Lin, Bingzhao Yang, Mengyuan Ge:

Design and Implementation of a Video Streaming Adaptive Algorithm Based on Markov Prediction Model. 127:1-127:6 - Bin Cheng, Hong-Hong Zhang:

Information Extraction of Saline-alkali Soil in the West of Jilin Province Based on Fully Polarimetric SAR-a Case Study in Qian An County. 128:1-128:5 - Hui-Qun Zhao, Shuai Liu, Hao-Chen Luo, Qing-Yun Huang, Wei Ye:

Design and Implementation of Table Tennis Technical and Tactical Analysis Software Based on Streaming Media Technology. 129:1-129:5 - Hongmei Wang, Faguang Wang, Shiyin Li, Sanghyuk Lee, Chong Yao, Moldaulet Balykbay:

GNU Radio Based Bandpass Sampling Radio Processor. 130:1-130:6 - Hong Liu, Yuezhao Chen, Runwei Ding, Cheng Pang:

Keyword Spotting Based on Hypothesis Boundary Realignment and State-Level Confidence Weighting. 131:1-131:7 - Wai Ming Wang, Eric Wing Kuen See-To, Hong Tao Lin, Zhi Li:

Comparison of Automatic Extraction of Research Highlights and Abstracts of Journal Articles. 132:1-132:5 - Yanchen Zhang:

The Roles of Translation Teachers in Computer-assisted Translation Teaching. 133:1-133:5 - Long He:

The Influence of Emotional Words on Character Building Based on Subjective Text. 134:1-134:5 - Xutong Liu, Hui Song, Longqi Dai, Bo Xu:

Text Analysis of Cases Description in Urban Management Field Based on Knowledge Atlas. 135:1-135:7 - Xi Wang, Shouming Chen

, Luu Thi Nguyen
:
TMT's Attention towards Space and Firms R&D Investment: CLIWC to Extract Psychological Features. 136:1-136:5 - Zi-Yu Liu

, Chenying Li:
The Effectiveness of China National Doctoral Dissertations Quality Inspection. 137:1-137:5
Information Systems and Applications
- Alexander A. Zuenko:

Local Search in Solution of Constraint Satisfaction Problems Represented by Non-Numerical Matrices. 138:1-138:5 - Hongtao Deng, Xun Zhu:

A Perceptron Model for Joint Extraction of Drug Entities and Drug-Drug Interactions. 139:1-139:5 - Haoyou Peng, Wuguang Han, Jian Yao, Cuiyu Fu:

The Realization of Load Balancing Algorithm in Cloud Computing. 140:1-140:5 - Yang Yu, Linfu Sun, Qi-Shi Wu:

Fuzzy Query Model of the Business Resources Based on Cloud Service Platform. 141:1-141:5 - Fei Luo, Ye Yuan, Weichao Ding, Haifeng Lu:

An Improved Particle Swarm Optimization Algorithm Based on Adaptive Weight for Task Scheduling in Cloud Computing. 142:1-142:5 - Yong Luo, Guochang Zhou, Jianping Li:

Comparing the Chinese University MOOC Platform to the Three Major MOOC Players. 143:1-143:5 - Zhen Liu, Zhiyu Deng, Peter Demian:

Integration of Building Information Modelling (BIM) and Sensor Technology: A Review of Current Developments and Future Outlooks. 144:1-144:5 - Dongsheng Li, Xiaodong Cheng, Mengsongqi Li:

Method for Identifying Cow Identity Based on Template Matching of Cow Activity Data. 145:1-145:5 - Yinghui Li, Jun Han, Jing Liu, Yue Zhao:

Research on Multi-modal Affective Assistant Model in Online Synchronous Teaching. 146:1-146:5 - Junling Zhang, Jing Liu:

Construction of Scaffolding Instruction Mode for Mblock for Arduino Maker Course Based on Design Thinking. 147:1-147:6 - Zhanli Li, Amin Hu, Jingding Fu, Xinghuan Wu, Hongan Li:

Printing Orientation Optimization of 3D Model. 148:1-148:5 - Chu-Chu Feng, Guang-Xing Tan, Fang-Bin Duan:

A Stable Tracking Control of Mobile Multi-robot Using Direct Lyapunov Method Based on Global Coordinate Representation. 149:1-149:6 - Xiaoyu Zheng, Jie Shen:

An NFC-based Context Approach to Life Cycle Management of Construction Projects. 150:1-150:5 - Wei Zhuang, Qingfeng Zeng:

A Trust-based Framework for Internet Word of Mouth Effect in B2C Environment. 151:1-151:5 - Liangshun Wu, Hengjin Cai:

The Periodicity of Fibonacci Sequence Modulo a Prime and Its Application in Primality Testing. 152:1-152:5 - Guojian Xian, Jiao Li, Yuantao Kou, Tingting Luo, Yongwen Huang:

Construction and Application of Upper Country Ontology Based on OWL and SKOS. 153:1-153:6 - Peng Han, Shiying Men, Lichun Huang, Jun He, Huan Liu, Hua Yang, Qin Wang, Tong Hu, Runze Lin:

Research on Control Method of Cable Manufacturing Process Based on Information Collection and Visualization. 154:1-154:6 - Liangzhong Cui, Fuliang Guo, Yingjie Liang:

Research Overview of Educational Recommender Systems. 155:1-155:7 - Ziran Shen, Si Chen, Yi Li:

Study on Improved GMP Fault-tolerant Strategy Based on Time Trigger. 156:1-156:5 - Zhikun Wang, Changxiu Hu, Jinglei Lin, Zhiyuan Cui, Meng Huang, Shuai Liu:

Development of a Performance Evaluation System Based on Baidu Map Fixed-point Observation Data. 157:1-157:5 - Wenrui Xie, Qiuxia Zhang, Aijia He, Xin Zhao:

QOS and AHP-Based Ranking System for University Campus Dining Halls. 158:1-158:5 - Milan Hudec

, Zdenek Smutný
:
Advanced Scene Recognition System for Blind People in Household: The Use of Notification Sounds in Spatial and Social Context of Blind People. 159:1-159:5 - Xuan Zuo, Qiao Zhang, Fei Lin, Adnan Rayit:

Empirical Analysis Agricultural Insurance Coverage Levels from Demand Perspective. 160:1-160:5
Intelligent Transportation System
- Litian Xiao, Weiguo Wang, Kewen Hou, Mengyuan Li, Fei Wang, Yuliang Li:

An Architecture of FPGA-Based Controller on Automatic Control System for Test and Launch in Launch Site. 161:1-161:6 - Dejun Chen, Rong Huang, Jiangyou Long:

Research on Urban Logistics Sharing Distribution Method Based on Improved Genetic Algorithm. 162:1-162:6 - Ning Luo, Jun Zhao:

Storage System Based on Norm and BPMN mapping Research on Business Process Modeling. 163:1-163:5 - Xi-Xi Huang, Feng Wang, Lu-Wei Chen:

The Design of Intelligent Vehicle Based on Electromagnetic Tracing. 164:1-164:4 - Kun Zheng, Quan Yang:

Vehicle Positioning Method Based on RFID in VANETs. 165:1-165:5 - Wenjian Huang, Jinmin Huang, Liu Yang, Chenghao Cao, Hanxin Chen:

Fault Diagnosis of Gearbox Based on Principal Component Analysis and Sequential Probability Ratio Test. 166:1-166:7 - Wei Zhou, Biao Wu:

Model for Snow-fighting Vehicle Route Planning Considering Deadheading Restriction. 167:1-167:5 - Sainan Liu:

Research on Scheduling Policy of Automated Warehouse System. 168:1-168:5 - Caoyi Xue, Yanxi Li:

Exploring Traffic Patterns of Bicycle Sharing System. 169:1-169:7 - Yi-Shuang He, Xiao-Ping Guang, Zhen-Yuan Tang, Ying He:

Design and Realization of Vehicle Navigation and Monitoring System Based on GPS and GIS. 170:1-170:6
Software Engineering, Security and Cryptology
- Xiaohua Feng, Marc Conrad:

Security Audit in Mobile Apps Security Design. 171:1-171:5 - Yuqi Dong, Jianhong Zhai:

A Privacy Risk Assessment Model Based on TAPE Framework. 172:1-172:8 - Jian Yao, Wuguang Han, Haoyou Peng, Cuiyu Fu:

The Research and Implementation of Middleware in Cloud Computing. 173:1-173:5 - Zhiqiang Wang, Yao Tang, Jing Yao, Rong Qian, Zheng Zhang, Pingchuan Ma:

Large-scale Malware Automatic Detection Based On Multiclass Features and Machine Learning. 174:1-174:5 - Yingchao Yu, Xueyong Liu, Zuoning Chen:

Attacks and Defenses towards Machine Learning Based Systems. 175:1-175:7 - Zheng Hao, Zhaowen Lin, Ran Li:

A SDN/NFV Security Protection Architecture with a Function Composition Algorithm Based on Trie. 176:1-176:8 - Yuan Gao, Xuedong Dong, Yuan Tian:

A New Signcryption Scheme without Certificate and Linear Pairing. 177:1-177:4 - Yuelan Ji, Yongjie Yang, Zhongxing Huo:

Design of Security Protection System for Smart Home Based on Web. 178:1-178:6 - Fang Miao, Wenhui Yang, Wenjie Fan, Yan Xie, Quanming Guo, Yufeng You, Zhiping Liu, Li Liu:

Digital Copyright Works Management System Based on DOSA. 179:1-179:9 - Jingchun Jiang, Bin Xi, Shunxiang Wu, Huan Li, Yu Rao, Ziliang Wang, Shaobo Zhou:

Acquisition System of Physical Memory Image on MTK-based Mobile Phone. 180:1-180:5 - Xiang Wang, Yuntong Tian, Pei Du, Xiaobing Zhang, Weike Wang

, Qiang Hao, Bing Xu, Zhun Zhang, Zongmin Zhao:
An Optimized Method of Hardware Implementation for LHash in the Embedded System. 181:1-181:5 - Junjie Geng, Jinyao Yan, Yangbiao Ren, Yuan Zhang:

Design and Implementation of Network Monitoring and Scheduling Architecture Based on P4. 182:1-182:6 - Xin Liu, Shenghua Dai:

Optimization of Train Control Strategy for Energy Saving and Time Precision Using Multi-Objective Cuckoo Search Algorithm. 183:1-183:5 - Feng Xue, Bo Zhao, Wenlong Zhou, Long-Yang Chen, Honleung Kelvin Wong

:
Computational Egress Simulation and Analysis for Nuclear Reactor Building. 184:1-184:6 - Jianguang Zhao, Man-Gui Liang, Jingjing Fan, Yingwei Feng:

The Research on Software-defined Wireless Sensor Network Data Forwarding Method Based on Vector Address. 185:1-185:5 - Junfu Zhang, E. Chengyuan, Aiqun Hu:

A Method of Android Application Forensics Based on Heap Memory Analysis. 186:1-186:5 - Haiyan Zhang, Xiao Zhang:

SQL Injection Attack Principles and Preventive Techniques for PHP Site. 187:1-187:9 - Haiyong Sun, Hang Lei, Lei Qiao, Zheng Yang:

Formal Verification of GP Specification based Embedded Operating System. 188:1-188:5 - Yabin Wang, Min Xu, Hao Chen:

Design and Development of Parallel Computation Software for Aerothermoelasticity. 189:1-189:8

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














