


default search action
Information, Volume 6
Volume 6, Number 1, March 2015
- Liqing Zhou, Henry Leung, Peng Xu, Guobao Ru, Quansheng Zhao, Da Xu:

The Kalman Filtering Blind Adaptive Multi-user Detector Based on Tracking Algorithm of Signal Subspace. 3-13 - Xunjun Chen:

Modeling of Experimental Adsorption Isotherm Data. 14-22 - Paul Walton:

Measures of Information. 23-48 - Jie-Sheng Wang, Jiang-Di Song, Jie Gao:

Rough Set-Probabilistic Neural Networks Fault Diagnosis Method of Polymerization Kettle Equipment Based on Shuffled Frog Leaping Algorithm. 49-68 - Huiru Zhao, Sen Guo, Wanlei Xue:

Urban Saturated Power Load Analysis Based on a Novel Combined Forecasting Model. 69-88 - Ho-Nien Hsieh, Jeng-Fung Chen, Quang Hung Do

:
Applying TRIZ and Fuzzy AHP Based on Lean Production to Develop an Innovative Design of a New Shape for Machine Tools. 89-110
Volume 6, Number 2, June 2015
- Yaohu Lin, Xuelian Lin, Ning Li, Yongmin Mu:

Evaluate the Interoperability of Document Format: Based on Translation Practice of OOXML and UOF. 111-121 - Yunmei Shi, Xuhong Liu, Ning Li, Xia Hou:

An MVC-based Intelligent Document Model Using UIML. 122-133 - Ying Shen, Ligang Zhao, Jing Fan:

Analysis and Visualization for Hot Spot Based Route Recommendation Using Short-Dated Taxi GPS Traces. 134-151 - Songjiang Lou, Xiaoming Zhao, Wenping Guo

, Ying Chen
:
Graph Regularized Within-Class Sparsity Preserving Projection for Face Recognition. 152-161 - Edoardo Magnone

:
Analysis of Scholarly Communication Activities in Buddhism and Buddhist Studies. 162-182 - Gaute Wangen:

The Role of Malware in Reported Cyber Espionage: A Review of the Impact and Mechanism. 183-211 - Fang Zong, Yu Bai, Xiao Wang, Yixin Yuan, Yanan He:

Identifying Travel Mode with GPS Data Using Support Vector Machines and Genetic Algorithm. 212-227 - Abhilash Sreeramaneni, Hyungjin Im, Won Min Kang, Chan Koh, Jong Hyuk Park

:
CIMS: A Context-Based Intelligent Multimedia System for Ubiquitous Cloud Computing. 228-245 - Jianfeng Xi, Wei Li, Shengli Wang, Chuanjiu Wang:

An Approach to an Intersection Traffic Delay Study Based on Shift-Share Analysis. 246-257 - Xunjun Chen, Yuelong Zhu, Jiguo Li, Yamin Wen, Zheng Gong:

Efficiency and Privacy Enhancement for a Track and Trace System of RFID-Based Supply Chains. 258-274 - Xuhong Liu, Ning Li, Yunmei Shi, Xia Hou:

ODQ: A Fluid Office Document Query Language. 275-286
Volume 6, Number 3, September 2015
- Jiarong Shi

, Xiuyun Zheng, Wei Yang:
Robust Sparse Representation for Incomplete and Noisy Data. 287-299 - Jie-Sheng Wang, Chen-Xu Ning:

ANFIS Based Time Series Prediction Method of Bank Cash Flow Optimized by Adaptive Population Activity PSO Algorithm. 300-313 - Reza Maleeh:

Mind, Matter, Information and Quantum Interpretations. 314-338 - Longhui Gang, Mingheng Zhang, Xiudong Zhao, Shuai Wang:

Improved Genetic Algorithm Optimization for Forward Vehicle Detection Problems. 339-360 - Guoxiang Lu, Bingqing Li:

A Class of New Metrics Based on Triangular Discrimination. 361-374 - Yuebo Zha, Zhihua Zhang, Yulin Huang, Jianyu Yang:

Controlled Remote State Preparation via General Pure Three-Qubit State. 375-387 - Jing Lu, Shengjun Xue, Xiakun Zhang, Yang Han:

A Neural Network-Based Interval Pattern Matcher. 388-398 - Maroua Drissi

, Mohammed Oumsis
:
Multi-Criteria Vertical Handover Comparison between Wimax and Wifi. 399-410 - Wolfgang Johannsen:

On Semantic Information in Nature. 411-431 - Fadil Hicham

, Driss Yousfi, Aite Driss Youness, Elhafyani Mohamed Larbi
, Nasrudin Abd. Rahim
:
Sliding-Mode Speed Control of PMSM with Fuzzy-Logic Chattering Minimization - Design and Implementation. 432-442 - Mao Ye, Zhi Tang, Jianbo Xu, Lifeng Jin:

Recommender System for E-Learning Based on Semantic Relatedness of Concepts. 443-453 - Pavel Lozhnikov

, Alexey Sulavko
, Alexander Samotuga
:
Personal Identification and the Assessment of the Psychophysiological State While Writing a Signature. 454-466 - Yao Wang, Jing Lu:

Optimization of China Crude Oil Transportation Network with Genetic Ant Colony Algorithm. 467-480 - Xingbing Fu, Xuyun Nie, Fagen Li:

Black Box Traceable Ciphertext Policy Attribute-Based Encryption Scheme. 481-493 - Khalid Fakhar, Mohamed El Aroussi, Mohamed Nabil Saidi, Driss Aboutajdine:

Applying the Upper Integral to the Biometric Score Fusion Problem in the Identification Model. 494-504 - Bilal M'hamed Abidine

, Belkacem Fergani:
News Schemes for Activity Recognition Systems Using PCA-WSVM, ICA-WSVM, and LDA-WSVM. 505-521 - Guangnian Xiao, Zhicai Juan, Jingxin Gao:

Travel Mode Detection Based on Neural Networks and Particle Swarm Optimization. 522-535 - Jinhua Ma, Zhide Chen, Wei Wu, Rongjun Zheng, Jianghua Liu:

Influences of Removable Devices on the Anti-Threat Model: Dynamic Analysis and Control Strategies. 536-549 - Anissa Benlarabi, Amal Khtira, Bouchra El Asri:

Analyzing Trends in Software Product Lines Evolution Using aCladistics Based Approach. 550-563 - Naoual Chaouni Benabdellah

, Mourad Gharbi, Mostafa Bellafkih
:
Toward E-Content Adaptation: Units' Sequence and Adapted Ant Colony Algorithm. 564-575
Volume 6, Number 4, December 2015
- Yamin Wen, Zheng Gong, Lingling Xu:

A Backward Unlinkable Secret Handshake Scheme with Revocation Support in the Standard Model. 576-591 - Amal Khtira, Anissa Benlarabi, Bouchra El Asri:

Duplication Detection When Evolving Feature Models of Software Product Lines. 592-612 - Jinhua Ma, Zhide Chen, Jianghua Liu, Rongjun Zheng:

Analysis of Two-Worm Interaction Model in Heterogeneous M2M Network. 613-632 - Pengfei Jia

, Shukai Duan, Jia Yan
:
An Enhanced Quantum-Behaved Particle Swarm Optimization Based on a Novel Computing Way of Local Attractor. 633-649 - Yuebo Zha, Yin Zhang, Yulin Huang, Jianyu Yang:

Bayesian Angular Superresolution Algorithm for Real-Aperture Imaging in Forward-Looking Radar. 650-668 - Robert K. Logan

:
Extending Deacon's Notion of Teleodynamics to Culture, Language, Organization, Science, Economics and Technology (CLOSET). 669-678 - Hassan Silkan

, Youssef Hanyf
:
A New Efficient Optimal 2D Views Selection Method Based on Pivot Selection Techniques for 3D Indexing and Retrieval. 679-692 - Kun Wu:

The Development of Philosophy and Its Fundamental Informational Turn. 693-703 - Chen Yang, Yang Sun, Qianhong Wu:

Batch Attribute-Based Encryption for Secure Clouds. 704-718 - Hsien-Pu Chen, Elias Gonzalez, Yessica Saez

, Laszlo B. Kish:
Cable Capacitance Attack against the KLJN Secure Key Exchange. 719-732 - Paul Walton:

Digital Information and Value. 733-749 - Joseph E. Brenner:

Three Aspects of Information Science in Reality: Symmetry, Semiotics and Society. 750-772 - Alastair A. Abbott

, Cristian S. Calude
, Karl Svozil
:
A Non-Probabilistic Model of Relativised Predictability in Physics. 773-789 - Shengyu Liu, Buzhou Tang, Qingcai Chen, Xiaolong Wang:

Drug Name Recognition: Approaches and Resources. 790-810 - Walter Craig, Jonathon Stone:

Information and Phylogenetic Systematic Analysis. 811-832 - Qiong Huang, Guomin Yang

:
A Summary of the Special Issue "Cybersecurity and Cryptography". 833-835 - Stefan Strauß

:
Datafication and the Seductive Power of Uncertainty - A Critical Exploration of Big Data Enthusiasm. 836-847 - Shengyu Liu, Buzhou Tang, Qingcai Chen, Xiaolong Wang:

Effects of Semantic Features on Machine Learning-Based Drug Name Recognition Systems: Word Embeddings vs. Manually Constructed Dictionaries. 848-865 - Hua Zhou, Jiao Feng, Peng Li, Jingming Xia:

Codeword Structure Analysis for LDPC Convolutional Codes. 866-879 - Haiping Ren, Guofu Wang:

An Interval-Valued Intuitionistic Fuzzy MADM Method Based on a New Similarity Measure. 880-894

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














