


default search action
20th CSE / 15th EUC 2017: Guangzhou, China - Volume 1
- 2017 IEEE International Conference on Computational Science and Engineering, CSE 2017, and IEEE International Conference on Embedded and Ubiquitous Computing, EUC 2017, Guangzhou, China, July 21-24, 2017, Volume 1. IEEE Computer Society 2017, ISBN 978-1-5386-3220-8

- Hongli Chen:

A Personalized Recommendation Algorithm Based on the Fusion of Trust Relation and Time Series. 3-6 - Naqin Zhou, Deyu Qi, Wei Feng, Xinyang Wang, Yang Shen:

Budget-Deadline Constrained Workflow Scheduling for Heterogeneous Resources. 7-14 - Jianying Lin, Rui Liu, Quanye Jia, Yahui Zhao:

From Top to Down Hierarchical Classification Process with the Candidates' Strategy. 15-22 - Yunsheng Deng, Ping Miao, Hongyong Yang:

Cooperation of Improved Hk Networks Based on Prisoner Dilemma Game. 23-27 - Zhanying Zhang, Wenjun Xiao, Minfan He, Jianqing Xi, Yijun Mao:

Research and Analysis about the Length of Vertex-Degree Sequence of Complex Networks with Poisson Distribution. 28-31 - Ming Tao, Jiaxing Li, Jie Zhang, Xiaoyu Hong, Chao Qu:

Vehicular Data Cloud Platform with 5G Support: Architecture, Services, and Challenges. 32-37 - Xianglin Wei, Qin Sun:

Wireless Facility Scheduling for Data Center Networks. 38-43 - Min Liu, Xiaowei Xu, Ye Tao, Xiaodong Wang:

An Improved Random Forest Method Based on RELIEFF for Medical Diagnosis. 44-49 - Chao Xia, Xinye Cai, Zhun Fan

, Muhammad Sulaman:
Reference Line Guided Pareto Local Search for Bi-Objective Traveling Salesman Problem. 50-56 - Yu Wu, Pengfei Chao, Weiqin Ying

, Linlin He, Shiyun Chen:
A Conical Area Evolutionary Algorithm Based on Modularity Q for Community Detection from Signed Networks. 57-62 - Li Li, Xianyong Zhang, Zhongsheng Wang, Zhiyong Lin:

Consensus of Leader-Following Multi-Agent Systems with Sampling Information under Directed Networks. 63-68 - Yuanyuan Fan, Qingzhong Liang:

An Improved Method for Detection of the Pedestrian Flow Based on RFID. 69-72 - Liu Yang, Shaohong Zhang, Zuyuan Yang:

An Improved Precoding Method for Blind Separation of Spatially Correlated Signals. 73-76 - Li Yang, Xiaoqin Wang, Yaping Tian:

A Trusted Recommendation Scheme Based on the Improved Slope One Algorithm. 77-84 - Guiping Xu, Gaoyang Li, Jingqing Jiang, Yuqing Lin, Yanchun Liang, Heow Pueh Lee, Xiaohu Shi, Chunguo Wu:

A Novel Method for Analysing the Population Dynamic Behavior of Particle Swarm Optimization. 85-92 - Jiawei Zhang, Lining Xing:

A Survey of Multiobjective Evolutionary Algorithms. 93-100 - Ying Zhou:

A Decomposition-Based Multi-Objective Tabu Search Algorithm for Tri-Objective Unconstrained Binary Quadratic Programming Problem. 101-107 - Jingdong Jia, Zupeng Chen, Xiaoping Du:

Understanding Soft Skills Requirements for Mobile Applications Developers. 108-115 - Sen Qiu, Long Liu, Jinxiao Li, Zhelong Wang, Kairong Qin, Yongmei Jiang:

Gaitsense: A Potential Assistance for Physical Rehabilitation by Means of Wearable Sensors. 116-121 - Shimin Wang, Wenyan Jiang, Jihua Ye, Mingwen Wang, Xinyu Zhou:

Image Visual Saliency Feature Extraction Based on Multi-Scale Tensor Space. 122-127 - Wenjun Wang, Hui Wang, Xinyu Zhou, Jia Zhao, Li Lv, Hui Sun:

Dynamic Step Factor Based Firefly Algorithm for Optimization Problems. 128-134 - Zhifeng Hao, Ruichu Cai, Yiyang Yang, Wen Wen, Lixin Liang:

A Dynamic Conditional Random Field Based Framework for Sentence-Level Sentiment Analysis of Chinese Microblog. 135-142 - Jun Yang, Pengpeng Yang, Xiaohui Jin, Qian Ma:

Multi-Classification for Malicious URL Based on Improved Semi-Supervised Algorithm. 143-150 - Dongbin Jiao

, Liangjun Ke, Weibo Yang, Jing Li:
An Estimation of Distribution Algorithm Based Load-Balanced Clustering of Wireless Sensor Networks. 151-158 - Xin Xie, Jianan Wang, Fengping Hu, Nan Jiang, Songlin Ge:

An Improved Spatial-Temporal Correlation Algorithm of Wsns Based on Compressed Sensing. 159-164 - Min Gai, Shanshan Zhao, Yan Li:

Establishment of Data Collection and Transmission Optimization Model Based on TRIZ. 165-170 - Guan Hui, Zhang Yan, Bin Zhang, Fahong Yu:

Improved RFID Anti-Collision Algorithm Based on Quad-Tree. 171-175 - Simeng Sun, Hui Zhang, Ning Li, Yong Chen:

Name Disambiguation for Chinese Scientific Authors with Multi-Level Clustering. 176-182 - Yingyi Yang, Yi You, Bochuan Gu:

A Hierarchical Framework with Consistency Trade-off Strategies for Big Data Management. 183-190 - Hadi Sutopo

, Wisnu Pamungkas
:
Developing Mathematics Mobile Game to Enhance Learning for Children. 191-197 - Jun Xu, Hui Liu:

Segmentation of Pulmonary CT Image by Using Convolutional Neural Network Based on Membership Function. 198-203 - Chi Shao, Guo Sun, Meng Zhao, Yiqiao Cai:

Adaptive Differential Evolution with Landscape Modality Detection for Global Optimization. 204-209 - Aourra Khaled, Quan-Xin Zhang:

An Energy Aware Mass Memory Unit for Small Satellites Using Hybrid Architecture. 210-213 - Jiamin Zheng, Yu-an Tan, Xiaosong Zhang, Chen Liang, Changyou Zhang, Jun Zheng:

An Anti-Forensics Method against Memory Acquiring for Android Devices. 214-218 - Xiaxu He, Pengfei Liu, Weifeng Zhang

:
Design and Implementation of a Unified Mooc Recommendation System for Social Work Major: Experiences and Lessons. 219-223 - Zibo Qi, Wei Gao, Chen Guo, Kaili Xu:

The Development of AC Arc Fault Simulation Test Device with Arc Breaking Function. 224-227 - Xiaxu He, Pengfei Liu:

Empirical Study on the Construction of a Unified Information System with Big Data Analysis: A Case of Social Work Organizations and Civil Affairs Departments. 228-233 - Haiping Wang, Sanfeng Zhang, Yunxiao Sun:

Practical Optimization for Wireless Network with Network Coded Opportunistic Routing and SIC. 234-239 - Ping Miao, Yunsheng Deng, Hongyong Yang:

A Donation Heterogeneity Public Goods Game on High Clustering Coefficient and Adjustable Power-Law Network. 240-244 - Li Tan, Chaoyu Yang, Minghua Yang, Xiaojiang Tang:

Path Self-Deployment Algorithm of Three-Dimensional Space in Directional Sensor Networks. 245-250 - Tao Wang:

A Novel Face Recognition Method Based on ICA and Binary Tree SVM. 251-254 - Fusheng Wang, Hongyong Yang:

Swarming Movement of Dynamical Multi-Agent Systems with Modeling Errors. 255-259 - Xiao Sun, Xiaoqi Peng, Fuji Ren, Yun Xue:

Human-Machine Conversation Based on Hybrid Neural Network. 260-266 - Zhengwen Lai, Wenjun Xiao, Meisheng Li, Zhanying Zhang:

An Exponential Distribution Complex Network Model Constructed by Degree Sequence Length Iteration. 267-271 - WuYang Ding, Bo Liu, Yanshan Xiao:

Real-Time Face Recognition Based on Sparse Illumination Learning. 272-277 - Tianwen He, Hong Wang, Baofang Hu:

Evaluate the Chinese Version of Machine Translation Based on Perplexity Analysis. 278-281 - Fu Zhang, Jingwei Cheng:

Fuzzy Query over Ontologies Based on Relational Databases. 282-290 - Guizhen Mai, Shiguo Peng, Yinghan Hong, Pinghua Chen:

Fast Causal Division for Supporting High Dimensional Causal Discovery. 291-296 - Yan Zhang, Zhaobin Liu, Bin Zhang, Fahong Yu:

A Novel Adaptive Resampling Particle Filtering Algorithm. 297-300 - Xiaoling Zhong, Siyu Jiang, Hengjie Song:

ABCGA Algorithm for the Two Echelon Vehicle Routing Problem. 301-308 - Yu Wu, Bin Wu, Weiqin Ying

, Yuehong Xie, Weipeng He:
Global Pareto Optimality of Cone Decomposition of Bi-Objective Optimization. 309-314 - Yuhui Jin, Jianhao Li, Dongyuan Ma, Xi Guo, Haitao Yu:

A Semi-Automatic Annotation Technology for Traffic Scene Image Labeling Based on Deep Learning Preprocessing. 315-320 - Meihua Wang, Jiaming Mai, Yun Liang, Ruichu Cai, Tom Zhengjia, Zhenjie Zhang:

Component-Based Distributed Framework for Coherent and Real-Time Video Dehazing. 321-324 - Junhua Ku, Bing Zheng:

Distributed Extreme Learning Machine with Kernels Based on Mapreduce for Spectral-Spatial Classification of Hyperspectral Image. 325-332 - Ziqi Zhou, Xinting Tang, Xiaofeng Zhang, Hongjiang Gao, Kun Liu:

Research of Rough Set Model under Logical Computing of Granular. 333-336 - Xiaodong Jia

, Wendong Gong, Jie Yuan
:
Handwritten Yi Character Recognition with Density-Based Clustering Algorithm and Convolutional Neural Network. 337-341 - Yan Zhang, Zhaobin Liu, Bin Zhang:

A Novel Differential Evolution Algorithm for Constrained Optimization. 342-348 - Xi Zhao, Yong Ding, Quanyu Zhao:

A Multi-Candidate Electronic Voting Scheme with Unlimited Participants. 349-353 - Xiaoxiao Chen, Xiaodong Yan, Arun:

Development and Design of Micro-Course System Based on Wechat Platform. 354-357 - Xiaoting Sun, Xinting Tang, Xiaofeng Zhang, Hongjiang Gao, Kun Liu:

Rough Set Model under Different Granular Computing. 358-360 - Jian Li, Rui Liu, Rui Xiong:

A Chinese Geographic Knowledge Base for GIR. 361-368 - Jialin Li, Wei Li, Ying Huang:

A New Quantum Rotation Angle of Quantum-Inspired Evolutionary Algorithm for TSP. 369-374 - Gang Liu, Liang Xiao, Caiquan Xiong:

Image Classification with Deep Belief Networks and Improved Gradient Descent. 375-380 - Yuan Yuan, Fu Xie:

Identity-Based Proxy Signature Multiple-File PDP for Mobile Cloud Computing. 381-387 - Yinghan Hong, Zhifeng Hao, Guizhen Mai, Bingfeng Chen, Rui Xie:

An Approach for Inferring Causal Directions from Multi-Dimensional Networks. 388-392 - Hui Zhang, Xiangwei Zheng, Jie Tian, Qingshui Xue:

A Virtual Network Embedding Algorithm Based on RBF Neural Network. 393-396 - Xianglin Wei, Fei Hu, Qin Sun, Tongxiang Wang:

Association Graph Based Jamming Detection in Multi-Hop Wireless Networks. 397-402 - Renchu Guan

, Xu Wang, Maurizio Marchese, Yanchun Liang, Chen Yang:
A Feature Space Learning Model Based on Semi-Supervised Clustering. 403-409 - Tongxiang Wang, Xianglin Wei, Qin Sun, Fei Hu:

GSA-Based Jammer Localization in Multi-Hop Wireless Network. 410-415 - Xue-Qiang Zeng, Run Xiang, Hua-Xing Zou:

Partial Least Squares Regression Based Facial Age Estimation. 416-421 - Bing Jia, Wuyungerile Li, Tao Zhou:

A Centralized Service Discovery Algorithm via Multi-Stage Semantic Service Matching in Internet of Things. 422-427 - Dong Li, Zedan Zheng, Yi Li, Yang Xu, Deyou Tang:

Design and Implementation of Load Balancing Strategy in Openstack Cloud Platform. 428-435 - Dong Li, Jiechu Wu, Zehang Deng, Zelin Chen, Yang Xu:

QoS-Based Service Selection Method for Big Data Service Composition. 436-443 - Zhaoyi Chen, Hui Tian

, Jing Lu, Fulin Nan, Yiqiao Cai, Tian Wang, Yonghong Chen:
Secure Logging and Public Audit for Operation Behavior in Cloud Storage. 444-450 - Zhishuo Zheng, Deyu Qi:

Developing a Lock-Free Scheduling on Manycore Computer. 451-458 - Xi Guo, Yuanzhen Wen, Dongyuan Ma, Yuhui Jin, Haitao Yu:

Research on Scene Parsing Algorithm Cascading Object Detection Network. 459-464 - Haiping Wang, Yunxiao Sun, Sanfeng Zhang:

Practical Optimization for Wireless Network with Intra-Session Network Coding and SIC. 465-470 - Liye Song:

Impact Analysis of Air Pollutants on the Air Quality Index in Jinan Winter. 471-474 - Wenle Wang

, Yuanlong Cao, Jun Gong, Zhifen Li:
CP-TPS: A Real-Time Transaction Processing Strategy Supporting Compensatory Task. 475-482 - Kang Miao, Qinghong Yang, Xing Wei, Xiaoping Du, Jianwei Zhang:

How Perceived Factors of Review Contents Influence Consumers' Purchase Decision. 483-486 - Ye Tao, Xiaodong Wang, Xiaowei Xu, Liang Yang:

Containerized Resource Provisioning Driven by User Preference. 487-490 - Mincong Yu, Deyu Qi:

Automatic Planning on Sequence of Operations Based on Entity-Flow Model towards Pipelining Manufacturing System. 491-497 - Javier Dario Fernandez Ledesma:

Statistical Model to Validate a Metaprocess-Oriented Methodology Based on RAS. 498-503 - Dan Kang, Xiuyang Zhao, Dongmei Niu, Mingjun Liu:

A Volumetric Shape Registration Based on Locally Affine-Invariant Constraint. 504-511 - Li Tan, Chaoyu Yang, Xiaojiang Tang, Yaoyao Jiao:

A Target Tracking Algorithm Based on Path Virtual Force. 512-517 - Baojiang Cui, BaiHui Zhang, Kaiyue Wang:

A Data Masking Scheme for Sensitive Big Data Based on Format-Preserving Encryption. 518-524 - Bo Li, Zheli Liu, Ilsun You:

Partition ORAMS Combined with Novel Client Eviction Mechanism. 525-530 - Ziming Wu, Weiwei Lin, Zilong Zhang, Angzhan Wen, Longxin Lin:

An Ensemble Random Forest Algorithm for Insurance Big Data Analysis. 531-536 - Jianming Cui, Xiaojun Zhang, Yihui Liu, Ning Cao:

A More Secure and Practical Remote User Authentication Scheme for Multi-Server Environment. 537-540 - Yuxiang Feng, Wenhao Wang, Yukai Weng, Huanming Zhang:

A Replay-Attack Resistant Authentication Scheme for the Internet of Things. 541-547 - Ye Li, Zoe Lin Jiang, Xuan Wang, Siu-Ming Yiu:

Privacy-Preserving ID3 Data Mining over Encrypted Data in Outsourced Environments with Multiple Keys. 548-555 - Hongwei Liu, Ping Zhu, Zehong Chen, Peng Zhang, Zoe Lin Jiang:

Attribute-Based Encryption Scheme Supporting Decryption Outsourcing and Attribute Revocation in Cloud Storage. 556-561 - Yulin Wu, Zoe Lin Jiang, Xuan Wang, Siu-Ming Yiu, Peng Zhang:

Dynamic Data Operations with Deduplication in Privacy-Preserving Public Auditing for Secure Cloud Storage. 562-567 - Yong Ding, Xiumin Li:

Policy Based on Homomorphic Encryption and Retrieval Scheme in Cloud Computing. 568-571 - Yingying Kong, Zhiwen Yu

, Huihui Chen, Zhu Wang
, Chao Chen, Bin Guo
:
Detecting Type and Size of Road Crack with the Smartphone. 572-579 - Ming-Xing Wang, Dong Dai Lin:

Related Key Chosen IV Attack on Stream Cipher Espresso Variant. 580-587 - Ying Pang, Zhenxiang Chen, Xiaomei Li, Shanshan Wang, Chuan Zhao, Lin Wang, Ke Ji, Zicong Li:

Finding Android Malware Trace from Highly Imbalanced Network Traffic. 588-595 - Meng Bi, Andi Wang, Jian Xu

, Fucai Zhou:
DDOS Attack Detection System Based on Analysis of Users' Behaviors for Application Layer. 596-599 - Xiao-Zhang Liu:

Kernel Bilinear Discriminant Analysis for Face Recognition. 603-606 - ShanGuo Lv:

Research on Personalized Hybrid Recommendation Method of Commodity Based on Context. 607-610 - Yanfeng Lyu, Xunli Fan, Kun Liu:

An Optimized Strategy for Small Files Storing and Accessing in HDFS. 611-614 - Shuxian Sun, Rui Liu, Junlong Chen, Feng Yang, Jinyu Liu:

An Improvement of Distributed Indexing Method Based on the Map/Reduce. 615-618 - Zhiping Fan, Musheng Cai, Xie Li, Jianfeng Chen:

A New Dynamic Energy-Based Clustering Model for Wireless Sensor Networks. 619-622 - Yanli Liu, Mengyu Zhu, Heng Zhang:

Processed RGB-D Slam Using Open-Source Software. 623-626 - Meisheng Li, Wenjun Xiao, Zhengwen Lai, Zhanying Zhang:

Random Walk on Undirected Networks Based on the Neighbor Nodes Degree Distribution. 627-630 - Lei Xiao, Kejiang Liu, Xincai Zhuang:

Research and Optimization of Hydraulic Simulation in Gas Pipeline Network. 631-634 - Ya-Ping Chang, Wei Li, Zhongming Yang:

Network Intrusion Detection Based on Random Forest and Support Vector Machine. 635-638 - Guangzhen Zhao

, Cuixiao Zhang, Lijuan Zheng:
Intrusion Detection Using Deep Belief Network and Probabilistic Neural Network. 639-642 - Chijun Zhang, Mingzhe Xu, Chunyan Qiu:

Complex-Network-Based Supply Chain Relationships Inference in Cloud Logistics Services. 643-646 - Zhen Li, Xiangwei Zheng, Yuang Zhang, Qingshui Xue:

Multi-Objective Virtual Network Embedding Algorithm Based on Global Resource Capacity. 647-650 - Jin Li, Qiang Li, Nanxi Chen, Yingguan Wang:

Indoor Pedestrian Trajectory Detection with LSTM Network. 651-654 - Jinhui Chen, Junying Chen, Huaqing Min:

An Evolutionary Algorithm Using Multi-Strategy Combination for Single Objective Optimization Problem. 655-658 - Weigong Lv, Fanchao Meng, Ce Zhang, Yuefei Lv, Ning Cao, Jianan Jiang:

A General Architecture of IoT System. 659-664 - Ting Xia, Changqing Song, Junqing Li, Ning Cao, Chunyan Li, Gang Xu, Feifei Xu, Jifeng Liu, Russell Higgs

, Gregory M. P. O'Hare
, Guofu Chang, Cuinan Yang, Qiang Zhou:
Research and Application of Cow Estrus Detection Based on the Internet of Things. 665-667 - Zizhen Wang:

Implementation of Temperature-Measuring System Based on Zigbee Technology: The Technology Research on Sensor Network. 668-672 - Wangsheng Fang, Hui Wang, Zhongdong Hu:

Filter Anchor Node Localization Algorithm Based on Rssi for Underground Mine Wireless Sensor Networks. 673-676 - Jingling Zhao, Congxian Yin, Xiaohui Jin, Weiliang Liu:

A High-Speed Network Data Acquisition System Based on Big Data Platform. 677-681 - Zhou Yong:

Dynamical Resource Allocation Controller Research Based on Flow Aware in Content Distribution Networks. 682-684 - Yanwu Zhang, Lei Li, Bin Xue, Ning Cao, Yuyan Shen:

Research on Network Driver Based on Embedded Processor. 685-687 - Xinyu Tang, Changyou Zhang, Chen Liang, Aourra Khaled, Yuanzhang Li:

A Code Self-Relocation Method for Embedded System. 688-691 - Lixin Pang, Ning Yao, Yue Wang, Zhang Yao, Xinxi Lu:

Teaching Quality Evaluation System of Part-Time Teachers. 692-695 - Jingdong Jia, Wenchao Chen:

The Ethical Dilemmas of Virtual Reality Application in Entertainment. 696-699 - Xiaoting Sun, Yujuan Sun, Muwei Jian

:
The Research of Texture Transmission Algorithm Combined with Texture Synthesis. 700-703 - Shengke Wang, Shan Wu, Lianghua Duan, Changyin Yu, Yujuan Sun, Junyu Dong:

Person Re-Identification with Deep Features and Transfer Learning. 704-707 - Xiaohui Zhao, Sai Guo

, Yanlei Wang:
The Node Influence Analysis in Social Networks Based on Structural Holes and Degree Centrality. 708-711 - Yan-ling Hu:

Analysis on the Internal Control of Enterprise Accounting under Computer Network Environment. 712-715 - Chen Guo, Zhenwei Liu, Zibo Qi, Wei Gao, Ying Wu:

Research on the Frequency Spectrum of Electric Bicycle DC Fault Arc. 716-719 - Zhenyu Xu, Xicheng Li, Chuanbin Du, Baojian Qiu:

Optimal Schedule on a Special Home and Away Double-Loop Rule. 720-723 - Tao Wang:

Digital Image Watermarking Using Dual-Scrambling and Singular Value Decomposition. 724-727 - Zhenyu Guo, Yujuan Sun, Muwei Jian

:
Three Dimensional Surface Reconstruction Based on the Reference Object and PMS. 728-731 - Xinming Wang, Fang Xu, Sujun Liu, Ying Wu:

Analysis on Computer Automatic Identification of Low-Over Current for Conductor Insulating Lagging. 732-734 - Huili Jia, Xunli Fan, Kun Liu, Yang Qian:

An Energy Efficiency Routing Algorithm for Wireless Sensor Network. 735-739 - Hui Xu, Xiang Li, Wenyin Gong:

Research on Recognition of Landslides with Remote Sensing Images Based on Extreme Learning Machine. 740-747 - Zhen-Hao Zhang, Guo-Ping Jiang, Yurong Song, Ling-Ling Xia, Qi Chen:

An Improved Weighted LeaderRank Algorithm for Identifying Influential Spreaders in Complex Networks. 748-751 - Yannan Qin, Lin Li, Yongxin Zhang, Yanhui Ding:

A Method of Data Obfuscation Based on Monte Carlo Random Monotone Function. 752-755 - Dengpan Tian, Xiaowei Xu, Ye Tao, Xiaodong Wang:

An Improved Activity Recognition Method Based on Smart Watch Data. 756-759 - Ying Wu, Yongping Zhu, Fang Xu, Jian Xu

:
Analysis Model for Fire Accidents of Electric Bicycles Based on Principal Component Analysis. 760-762 - Jinlong Wang, Zhaochan Li, Russell Higgs

:
The Application of Dense Storage Integration Technology in Tobacco Logistics Centers Based on the Internet of Things. 763-767 - Xuejun Wang, Yan Zhang:

The Detection and Recognition of Bridges' Cracks Based on Deep Belief Network. 768-771 - Yeqing Li:

Research on Technology, Algorithm and Application of Web Mining. 772-775 - Jie Li, Lirong Qiu:

A Sentiment Analysis Method of Short Texts in Microblog. 776-779 - Jun Yang, Haoxiang Huang, Xiaohui Jin:

Mining Web Access Sequence with Improved Apriori Algorithm. 780-784 - Lingzhi Xu, Can Ge, Weidong Qiu, Zheng Huang, Zheng Gong, Jie Guo, Huijuan Lian:

Password Guessing Based on LSTM Recurrent Neural Networks. 785-788 - Sunyong Wu, Qiutiao Xue, Qiaojiao Ning, Congnan Gui, Xingli Gan:

Bernoulli Box-Particle Smoothing for Detection and Tracking under Interval Measurement. 789-792 - FuYong Zhang, Tiezhu Zhao:

Malware Detection and Classification Based on N-Grams Attribute Similarity. 793-796 - Chenke Luo

, Feng Yuan, Qiyuan Gao, Jiateng Yang, Jian Xu
:
Anti-Reverse-Engineering Tool of Executable Files on the Windows Platform. 797-800 - Chijun Zhang, Yetong Dai, Jialing Han:

Optimizing Pharmacy-Based Distribution of Pandemic Influenza Antiviral Drugs Based on Large Urban Network. 801-803 - Cuicui Ru, Mao Feng, Jianhao Li, Haitao Yu:

Incident Duration Predication Based on Traffic Boardcasting Information. 804-807 - Zizhen Wang, Chenggang Wang:

A Temperature Measure Method Based on Wireless Communication. 808-812 - Yeqing Li:

Research on Hotspot Topic Discovery Algorithm Based on Web Mining Technology. 813-816 - Pengfei Pang, Aourra Khaled, Yuan Xue, Yuanzhang Li, Quanxin Zhang:

A Transparent Encryption Scheme of Video Data for Android Devices. 817-822 - FanJiao Meng, Jiamin Zheng, Xiao Yu, Changyou Zhang, Yu-an Tan:

A High Efficiency Encryption Scheme of Dual Data Partitions for Android Devices. 823-828 - Yuan Gao, Hong Ao, Zenghui Feng, Weigui Zhou, Su Hu, Xiangyang Li:

Modeling and Practise of Satellite Communication Systems Using Physical Layer Security: A Survey. 829-832 - Haonan Su, Dong Zheng, Yinghui Zhang:

An Efficient and Secure Deduplication Scheme Based on Rabin Fingerprinting in Cloud Storage. 833-836 - Guo Sun, Yiqiao Cai:

A Novel Neighborhood-Dependent Mutation Operator for Differential Evolution. 837-841 - Xiaochun Yang, Hongfei Zhu, Xiaosong Zhang, Aourra Khaled:

A SDIO-Interface Wi-Fi Packet Capture Scheme Based on Android Kernel Extension. 842-845 - Zhao Hong, Guo Nan:

Java Source Code Protection Based on JNI and AES Algorithm. 846-849 - Wei Lu, Wei-qi Yuan:

Comparison of Four Local Invariant Characteristics Based on Palm Vein. 850-853 - Wei He, Bo Liu, Yanshan Xiao:

Multi-View Action Recognition Method Based on Regularized Extreme Learning Machine. 854-857 - Wei Li, Kangshun Li, Liang Zhong, Ying Huang:

A Mixed Strategies Differential Evolution Based on Fitness Landscapes Features. 858-861 - Wei Li, Zhong-Ming Yang, Ya-Ping Chang, Bin Zhang:

A Clustering Algorithm Oriented to Intrusion Detection. 862-865 - Fanyu Kong, Dashui Zhou, Yali Jiang, Jianwei Shang, Jia Yu:

Fault Attack on an Improved CRT-RSA Algorithm with the Modulus Chaining Method. 866-869 - Yinghui Zhang, Dong Zheng:

Anonymous Attribute-Based Encryption with Large Universe and Threshold Access Structures. 870-874 - Zhao Jin, Guoqiang Yuan, Hui Liu:

Optimization of 3D Reconstruction Technique for CT Image and Analysis of the Derived Model. 875-878 - Lirong Qiu, Na Yang, Maierdan Maolimamuti:

Chinese-Uyghur-English Semantic Search Based on the Knowledge Graphs. 879-882 - Lirong Qiu, Huan Yang, Rong Zhou:

The Design and Implementation of Chinese-Uighur-English Online Dictionary Based on Knowledge Graph. 883-886 - Yeqing Li:

Research and Analysis of Semantic Search Technology Based on Knowledge Graph. 887-890 - Jihui Wang:

Equitable Neighbor Sum Distinguishing Edge Colorings of Some Graphs. 891-893 - Lirong Qiu, Huili Zhang:

Review of Development and Construction of Uyghur Knowledge Graph. 894-897 - Baojian Qiu, Jihui Wang, Yan Liu, Zhenyu Xu:

Neighbor Sum Distinguishing Total Colorings of Graphs with Bounded Maximum Degree and Maximum Average Degree. 898-901 - Shengke Wang, Changyin Yu, Yujuan Sun, Junyu Dong:

A Specular Reflection Removal Method for Large Scale Ocean Surface Images. 902-907 - Changsong Li, Yiqi Zhou:

The Research of Signal Processing of the Control System Based on Electromyography Signal. 908-911 - Hu Wang, Zhongming Yang, Congbo Ma, Hongyue Wu, Mingting Ouyang:

A Fast Image Matting Method Based on Interval-Line Sampling. 912-915 - Xinting Tang, Xiaofeng Zhang, Hongjiang Gao, Kun Liu:

FCM-Based Image Segmentation with Kernel Functions. 916-919

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














