


default search action
Journal of Networks, Volume 8
Volume 8, Number 1, 2013
- Mohammad S. Obaidat

, Daniel Cascado Caballero, José Luis Sevillano
, Joaquim Filipe
:
Guest Editorial. 1-3 - Wouter van Kleunen, Nirvana Meratnia, Paul J. M. Havinga:

Simplified Scheduling for Underwater Acoustic Networks. 4-14 - Christos Bouras, Savvas Charalambides, Kostas Stamos

, Stamatis Stroumpis, Giannis Zaoudis:
Power Management Mechanism Exploiting Network and Video Information over Wireless Links. 15-25 - Muath A. Obaidat, Mohamed A. Ali, Ihsan Shahwan, Mohammad S. Obaidat

, Suhaib Obeidat:
QoS-Aware Multipath Communications over MANETs. 26-36 - José Antonio Gómez Martin, Ana Verónica Medina Rodríguez, Enrique Dorronzoro Zubiete, Octavio Rivera Romero

, Sergio Martín Guillén
:
Fingerprint Indoor Position System Based. 37-44 - Diego Francisco Larios

, Julio Barbancho, Francisco Javier Molina, Carlos León:
Localization method for low-power wireless sensor networks. 45-58 - Ran Zhao, Kirusnapillai Selvarajah, Neil A. Speirs:

Development Tools for Context Aware and Secure Pervasive Computing in Embedded Systems (PECES) Middleware. 59-70 - Jawad Khalife, Amjad Hajjar, Jesús Esteban Díaz Verdejo:

Performance of OpenDPI in Identifying Sampled Network Traffic. 71-81 - Mario H. A. C. Adaniya, Taufik Abrão

, Mario Lemes Proença Jr.
:
Anomaly Detection Using Metaheuristic Firefly Harmonic Clustering. 82-91
- Daochao Huang, Dong Yang, Hongke Zhang, Fuhong Lin

:
Efficient DoS-limiting Support by Indirect Mapping in Networks with Locator/Identifier Separation. 92-99 - Gang Nie, Xiuhua Qing:

Comparison and Handover Performance Evaluation of the Macro-mobility Protocol. 100-107 - Haina Rong, Jixiang Cheng, Yuquan Li:

Radar Emitter Signal Analysis with Estimation of Distribution Algorithms. 108-115 - Ying Guo, Yutao Liu:

Time Synchronization for Mobile Underwater Sensor Networks. 116-123 - Xiaoting Han

, Li Niu:
On Charactering of Information Propagation in Online Social Networks. 124-131 - Shouzhi Xu, Pengfei Guo, Bo Xu, Huan Zhou:

QoS Evaluation of VANET Routing Protocols. 132-139 - Jin Yang, Cilin Wang, Caiming Liu, Le Yu:

Cloud Computing for Network Security Intrusion Detection System. 140-147 - Ding Wang

, Chunguang Ma, Qi-Ming Zhang, Sendong Zhao:
Secure Password-based Remote User Authentication Scheme Against Smart Card Security Breach. 148-155 - Dan Feng, Chuanhe Huang, Bo Wang, Junyu Zhu, Liya Xu:

Mutihop-enabled Trusted Handoff Algorithm in Heterogeneous Wireless Networks. 156-164 - Haipeng Qu, Lili Wen, Yanfei Xu, Ning Wang:

LCCWS: Lightweight Copyfree Cross-layer Web Server. 165-173 - Xin Hou, Xingfeng Wei, Ertian Hua, Yujing Kong:

Self-Adaptive and Energy-Efficient MAC Protocol Based on Event-Driven. 174-181 - Jiangtao Zhai

, Guangjie Liu, Yuewei Dai:
An Improved Retransmission-based Network Steganography: Design and Detection. 182-188 - Wei Kuang Lai, Kai-Ting Yang:

Cross-Layer Dual Domain Scheduler for 3GPP-Long Term Evolution. 189-196 - Guangsong Yang, Mingbo Xiao, Shuqin Zhang:

Data Aggregation Scheme based on Compressed Sensing in Wireless Sensor Network. 197-204 - Yunlu Ni, Hang Chen:

Detection of Underwater Carrier-Free Pulse based on Time-Frequency Analysis. 205-212 - Wei Gao, Zhirong Guo:

Speed Sensorless Control of PMSM using Model Reference Adaptive System and RBFN. 213-220 - Xiancun Zhou, Yan Xiong, Mingxi Li:

Detection System of Clone Attacks based on RSSI in Wireless Sensor Networks. 221-228 - Yuan Wang, Liang Hu, Jian Feng Chu, Xiao Bo Xu:

Analysis and Improvement for SPINS. 229-236 - Wen Xiong, Yaohong Jin:

Semantic MMT Model Based on Hierarchical Network of Concepts in Chinese-English MT. 237-244 - Weiming Tong, Xianji Jin, Lei Lu:

Optimized Information Transmission Scheduling Strategy Oriented to Advanced Metering Infrastructure. 245-252 - Lu Han

, Liyan Han, Hongwei Zhao:
Credit Scoring Model Hybridizing Artificial Intelligence with Logistic Regression. 253-261
Volume 8, Number 2, 2013
- Mohamed Lahby

, Leghris Cherkaoui
, Abdellah Adib
:
A Novel Ranking Algorithm Based Network Selection For Heterogeneous Wireless Access. 263-272 - Zhizhong Wu, Xuehai Zhou, Jun Xu:

A Result Fusion based Distributed Anomaly Detection System for Android Smartphones. 273-282 - Ming Zhao, Tao Luo, Changchuan Yin, Guangxin Yue, Xiaojun Wang

:
Dynamic Spectrum Management with Competitive Market Equilibrium. 283-289 - Saber Zrelli, Nobuo Okabe, Yoichi Shinoda:

XKDCP: An Inter-KDC Protocol for Dependable Kerberos Cross-Realm Operations. 290-296 - Basheer Al-Duwairi, Zakaria Al-Qudah, Manimaran Govindarasu:

A Novel Scheme for Mitigating Botnet-Based DDoS Attacks. 297-306 - Mohammad Fraiwan, Manimaran Govindarasu:

Empowering PlanetLab: A Method for TCP Evaluation Over the Planetary-scale Testbed. 307-316 - Rony Hasinur Rahman, Craig R. Benson, Frank Jiang, Michael R. Frater:

LOARP: A Low Overhead Routing Protocol for Underwater Acoustic Sensor Networks. 317-330 - Jin Li:

Model and Simulation for Collaborative VRPSPD. 331-338 - Yan Guang, Yue-Fei Zhu, Chun-Xiang Gu

, Yonghui Zheng, Jinlong Fei:
An Efficient Proof of Retrievability Scheme for Fully Homomorphic Encrypted Data. 339-344 - Mehrnaz Moudi, Mohamed Othman:

A Cost-Effective Architecture For Optical Multistage Interconnection Network. 345-350 - Pasquale Pace

, Gianluca Aloi
:
Managing and Deploying Pervasive Wireless Internet Access through Attractive Connection Sharing and Reselling Mechanisms. 351-364 - Zhongsheng Huang, Wensheng Li, Zhifang Feng, Huaming Xing:

On Nonnegative Signed Domination in Graphs and its Algorithmic Complexity. 365-372 - Hongwei Liu, Peng Zhang, Jun Liu:

Public Data Integrity Verification for Secure Cloud Storage. 373-380 - Xiaomin Wang, Yangyang Lu:

Algorithm of Solutions for Solving Generalized Mixed Implicit Equilibrium Problems. 381-388 - Peng Yang, Jin Qin, Wenliang Zhou

:
Multi-Commodity Flow and Multi-Period Equilibrium Model of Supply Chain Network with Postponement Strategy. 389-396 - Ying Chen, Shaobai Zhang:

Notice of Violation of Academy Publisher Publication Principles "Learning Tract Variables with Distal Supervised Learning Model". 397-404 - Bin Chen, Hong-zhen Yang, Li-wen Wang:

Single Neuron PID Control of Aircraft Deicing Fluids Rapid Heating System. 405-412 - Xiaoyan Gao:

Optimality and Duality for Non-smooth Multiple Objective Semi-infinite Programming. 413-420 - Yong Ma, Yanguang Sun, Yujiao Zeng:

Parameter Identification for Iron and Steel Enterprise Steam Network Model. 421-428 - Haijing Zhu:

Estimates of Weighted Hardy-Littlewood Inequality for Differential Forms. 429-436 - Li Guo Zhang, Hua Zuo

:
Pareto Optimal Solution Analysis of Convex Multi-Objective Programming Problem. 437-444 - Jingmin Wang, Yanmei Li:

Research on EPC Project Risk Evaluation based on FAHP and TOPSIS. 445-452 - Wei-Min Cheng, Wen Nie, Gang Zhou

, Jun-lei Yang:
Research on Eddy Air-Curtain Dust Controlled Flow Field in Hard Rock Mechanized Driving Face. 453-460 - Shaowei Shen, Zuiyi Shen, Bing Xu:

Analysis of Fishery Production Efficiency based on the Three-Stage DEA. 461-468 - Min Zhao, Tao Zhang, Jinshuang Wang, Zhijian Yuan:

A Smartphone Malware Detection Framework Based on Artificial Immunology. 469-476 - Haiyan Hu, Pengfei Wang, Lining Sun:

Simulation Platform of Monitoring and Tracking Micro System for Dangerous Chemicals Transportation. 477-484 - Hai-Yan Jiang, Xing-ce Wang, Zhongke Wu, Mingquan Zhou, Xuesong Wang:

Topic Information Collection based on the Hidden Markov Model. 485-492 - Fei Pu:

Modular Reversibility Analysis in Self-loops Connections of Petri Net Systems. 493-500 - Zuwei Yu, Gan Wang, Hongwei Hu:

Intertemporal Dynamics: Convergence Speed of Current Account across Countries. 501-506 - Wenjing Liao, Z. Balzen:

LSSVM Network Flow Prediction Based on the Self-adaptive Genetic Algorithm Optimization. 507-512
Volume 8, Number 3, 2013
- Kuo-Feng Huang, Shih-Jung Wu:

Real-time-service-based Distributed Scheduling Scheme for IEEE 802.16j Networks. 513-517 - Kasman Suhairi, Ford Lumban Gaol:

The Measurement of Optimization Performance of Managed Service Division with ITIL Framework using Statistical Process Control. 518-529 - Mohammed D. Halloush

, Tasneem Dawahdeh:
On Varying Network Coding Forwarding Ratio in Vector Based Wireless Sensor Networks. 530-536 - Vinod Mirchandani, Peter Bertók

:
Optimized Energy Management for Mixed Uplink Traffic in LTE UE. 537-551 - Yan Guang, Yue-Fei Zhu, Chun-Xiang Gu

, Jinlong Fei, Xin-Zheng He:
A Framework for Automated Security Proof and its Application to OAEP. 552-558 - Samaneh Movassaghi, Mehran Abolhasan

, Justin Lipman
:
A Review of Routing Protocols in Wireless Body Area Networks. 559-575 - Diego Mendez

, Miguel A. Labrador:
On Sensor Data Verification for Participatory Sensing Systems. 576-587 - Hung-Chin Jang

, Tzu-Yao Hsu:
Infrastructure Based Chord Structure for P2P File Sharing over Vehicular Network. 588-597 - Peng Chen, Lede Qiu, Feng Xu:

Downlink Power Control for CDMA Satellite Cognitive Radio. 598-606 - Yulong Wang, Jiakun Shen:

CloudProxy: A NAPT Proxy for Vulnerability Scanners based on Cloud Computing. 607-615 - Luqiao Zhang, Qinxin Zhu, Juan Wang:

Adaptive Clustering for Maximizing Network Lifetime and Maintaining Coverage. 616-622 - Feng Zhao

, Xuezhi Lv, Hongbin Chen:
A Leakage-Based Beamforming Algorithm for Cognitive MIMO Systems via Game Theory. 623-627 - Ting T. Liu, Wei Yang, Chang L. Xu, Young-Il Kim:

A SNR-based Multi-channel Multicast Scheme for Popular Video in Wireless Networks. 628-635 - Xufei Zheng, Yonghui Fang, Yanhui Zhou, Jing Zhang:

A Novel Multi-layered Immune Network Intrusion Detection Defense Model: MINID. 636-644 - S. Kami Makki, Keenan B. Bonds:

Enhancing Node Cooperation in Mobile Ad Hoc Network. 645-649 - Yange Chen, Zhili Zhang, Qingfang Cui:

Design of Three-dimensional Interchange Network Based on IPv4/IPv6 Network. 650-657 - Baishun Su, Baoding Zhang:

Wireless Position Scheme based on ZigBee Network in the Freeway ETC System. 658-664 - Yang Ou, Yi-Ming Wang:

Multiple Antennas Spectrum Sensing for Cognitive Radio Networks. 665-671 - Weiwu Ren, Liang Hu, Kuo Zhao, Jianfeng Chu:

An Efficient Parallel Anomaly Detection Algorithm Based on Hierarchical Clustering. 672-679 - Anhua Chen, Yang Pan, Lingli Jiang:

Improving K-means Clustering Method in Fault Diagnosis based on SOM Network. 680-687 - Zhang Ji Bo Ning:

Research on Web Information Retrieval based on Vector Space Model. 688-695 - Haihong Li, Luo Zhong, Huaxiong Yao:

Detecting Protein Complexes through Micro-Network Comparison in Protein-Protein Interaction Networks. 696-703 - Yuanqiang Chen:

Stability of Impulsive Cellular Neural Networks with Time-varying Delays. 704-711 - Qiufen Ni, Rongbo Zhu, Zhenguo Wu, Yongli Sun, Lingyun Zhou, Bin Zhou:

Spectrum Allocation Based on Game Theory in Cognitive Radio Networks. 712-722 - Zhenwu Wang, Xuejun Zhao, Benting Wan

, Jun Xie, Pengfei Bai:
A Workflow-based RBAC Model for Web Services in Multiple Autonomous Domains. 723-730 - Jianqiang Tang, Ying Liu, Ming Wan, Hongke Zhang:

Blocking DoS Attack Traffic in Network with Locator/Identifier Separation. 731-738 - Xiaoyan Gao:

Optimality and Duality for Minimax Fractional Semi-Infinite Programming. 739-746
Volume 8, Number 4, 2013
- Mahdi Pirmoradian, Olayinka Adigun, Christos Politis

:
Adaptive Spectrum Opportunity Access in Cognitive Radio Networks. 747-754 - Jianjian Wang, Rongbo Zhu, Chenliang Qian:

Efficient Disengaging Hooks System Based on Constant-Power Speed Regulation of Frequency Converter. 755-760 - Hao Zhang, Wei Shi, Tingting Lu, Jingjing Wang, Xinjie Wang:

Performance Analysis of Multiple Access 60 GHz System Using Frequency-shifted Gaussian Pulse and Non-carrier PSWF Pulse. 761-768 - K. V. Krishnam Raju, V. Valli Kumari

:
Formal Verification of IEEE 802.11 Authentication Protocols. 769-778 - Yan Luo, Xuzhou Chen, Jie Wang:

A Virtual Network Embedding Algorithm for Providing Stronger Connectivity in the Residual Networks. 779-786 - Asma Ben Hassouna, Hend Koubaa, Farouk Kamoun

:
Conflict-Aware Relay Selection for Multicast in MUD based Wireless Networks. 787-795 - Xiaolin Tan, Zhongyang Xiong, Yun He:

Signal Attenuation-aware Clustering in Wireless Mobile Ad Hoc Networks. 796-803 - Keiichi Endo, Kentaro Watanabe, Dai Okano, Kaname Amano:

An Efficient Position-based Broadcasting Method Considering Node Density in MANETs. 804-811 - Yulong Wang, Dong Wang, Lei Wang:

A Parsing Mode based Method for Malformed SIP Messages Testing for IMS Network. 812-821 - Zhiping Kang

, Honglin Yu, Qingyu Xiong:
Detection and Recovery of Coverage Holes in Wireless Sensor Networks. 822-828 - Hongyu Yang, Sen Wang, Yang Zhang:

Web Service Replacement Algorithm based on Complex Network. 829-835 - Xiaomao Huang, Xuan Li, Changjiang Long, Yun Gao:

Guaranteed Cost Fault-tolerant Control of Networked Control Systems with Short Output Delay and Short Control Delay Based on State Observer. 836-842 - Chun-Ying Liu:

Adaptive Search Protocol Based on Optimized Ant Colony Algorithm in Peer-to-Peer Network. 843-850 - Yuanqiang Chen, Renbi Tian:

Impulsive Tracking Control for Non-measurable State with Time-delay. 851-857 - Shi-Wen Chen, Jiang-xing Wu, Xiao-long Ye, Tong Guo:

Distributed Denial of Service Attacks Detection Method Based on Conditional Random Fields. 858-865 - Jianchang Lu, Leping Pei:

Security Evaluation of Power Network Information System Based on Analytic Network Process. 866-873 - Jinkui Hou, Lei Wang:

Formal Description for Component-based Architecture Model Transformation. 874-881 - Jianjun Li, Xibing Li, Xilong Qu:

Signature Analysis Based on Improved EMD with High-order Spline Interpolation. 882-887 - Chuan Cai, Liang Yuan:

Intrusion Detection System based on Ant Colony System. 888-894 - Kexin Xing, Qi Xu, Yegui Lin:

Identification Scheme of Surface Electromyography of Upper Limb Movement. 895-902 - Kai-Sheng Lu, Xiao-Bing Yi:

On Some Separability, Reducibility and Controllability Criteria of RLCM Networks over F(Z). 903-909 - Yuan Sun, Qian Wang:

Demand Analysis of Water Resources Based on Pulse Process of Complex System. 910-916 - Xia Yan, Hua Zhao:

Chinese Microblog Topic Detection Based on the Latent Semantic Analysis and Structural Property. 917-923 - Jun Zhu, Wankui Li, Lili Han:

PMSM Control System Based on Digital Signal Processor. 924-931 - Chuanyan Hou:

Study of Combinatorial Operator on Poisson Manifolds. 932-938 - Jianbin Xue, Ting Zhang, Yan Yan, Wenhua Wang, Songbai Li:

Cooperation-based Ant Colony Algorithm in WSN. 939-946 - Zhenwu Wang, Xuejun Zhao, Benting Wan

, Jun Xie:
Research of BP Neural Network based on Improved Particle Swarm Optimization Algorithm. 947-954 - Weiping Zhang

, Regina Stoll
, Norbert Stoll, Kerstin Thurow:
An mHealth Monitoring System for Telemedicine Based on WebSocket Wireless Communication. 955-962 - Shaohua Jiang, Xia Hua:

Construction Site Environment Temperature Monitoring System Based on ZigBee and Virtual Instrument. 963-970 - Keqing Wang, Jianzhong Chen, Yingtao Niu, Yonggang Zhu:

A novel Spectrum Estimation Algorithm Based on Compressed Sensing and Multi-taper Method. 971-976
Volume 8, Number 5, 2013
- Md. Iftekhar Salam

, Hoon-Jae Lee:
Algebraic Countermeasure to Enhance the Improved Summation Generator with 2-Bit Memory. 977-984 - Li Wang, Yanyan Pei, Biao Lian, Weili Wu, Xueqi Cheng:

A Routing Protocol based on Temporal-awareness Ordered-MPR for Dynamic Wireless Multi-hop Mobile Networks. 985-990 - Wenming Ma, Yujie Zhang, Xiangwu Meng:

Distribution Aware Collaborative Spread Replication for Rare Objects in Unstructured Peer-to-Peer Networks. 991-998 - Mehrnoush Masihpour, Daniel Robert Franklin

, Mehran Abolhasan
:
Multihop Relay Techniques for Communication Range Extension in Near-Field Magnetic Induction Communication Systems. 999-1011 - Juan Du, Su-li Chen:

Research of Improved Network Malicious Information Filtering Model Based on SVM. 1012-1018 - Dexiang Ming, Xiaopeng Zhong, Lili Liu, Xiandong Ma

:
Design of a Reconfigurable Platform for Navigation Signal Simulation. 1019-1026 - Xiaoyan Shen, Chenjiang Xie, Haoxue Liu, Zhaowen Qiu:

Model and Algorithm for Routing and Scheduling Problem in Hazardous Materials Transportation Network. 1027-1034 - Chun-Ying Liu:

An Improved Adaptive Genetic Algorithm for the Multi-depot Vehicle Routing Problem with Time Window. 1035-1042 - Hannv Zhang, Jiang Xu, Qigang Jiang:

Extraction and Network Sharing of Forest Vegetation Information based on SVM. 1043-1049 - Zhengkang Zuo, Jinyun Xue, Changjing Wang:

Constraint Verification of Generic Algorithmic Program for Solving General Network Path Problems. 1050-1057 - Weifeng Zhao, Xin Huang, Kai Shi, Lei Zhang:

TSBCC: Time Series-Based Congestion Control Algorithm for Wireless Network. 1058-1064 - Feixiang Chen, Xiao Ma, Haiyan Ren:

Progressive Transmission of Vector Spatial Data. 1065-1072 - Hui-Ying Gao:

Performance Evaluation of Management Environment in Microelectronics Enterprise. 1073-1079 - Liai Gao, Meng Zhang, Geng Chen:

An Intelligent Irrigation System Based on Wireless Sensor Network and Fuzzy Control. 1080-1087 - Ying Wang, Dianfu Ma:

An Automatic Development Process for Integrated Modular Avionics Software. 1088-1095 - Yang Yang, Biaobiao Shi, Bo Jiang, Xiang Long:

Data-Replicas Scheduler for Heterogeneous MapReduce Cluster. 1096-1103 - Jing Li:

A Fast Semantic Web Services Matchmaker for OWL-S Services. 1104-1111 - He Xiaolan:

Prediction Model of Network Information Dissemination. 1112-1120 - Dian-xu Ruan, Xiaoguang Zhang, Li-Jun Li:

Safety Data Fusion Algorithm in Wireless Sensor Network. 1121-1129 - Yanjun Long, Jianquan Ouyang:

Research on Multicast Reliability in Distributed Virtual Environment. 1130-1137 - Lei He, Jiaxin Qi:

Enterprise Human Resources Information Mining Based on Improved Apriori Algorithm. 1138-1145 - Yuan Zhang, Qing-wei Shen:

Data Flow Control Algorithm based on Feature Matching in Mobile P2P Network. 1146-1152 - Chuan Cai, Liang Yuan:

Research on Energy-Saving-Based Cloud Computing Scheduling Strategy. 1153-1159 - Xinyan Wang, Ruixin Zhang:

Parallel Processing for Large-scale Fault Tree in Wireless Sensor Networks. 1160-1167 - Xiaoyong Tian:

Chaos Encryption Algorithm to Deal with Security Threat to Internet of Things RFID. 1168-1174 - Shupeng Zhao, Miao Tian, Shifang Zhang, Jiuxi Li:

Control Information and Data Processing of Vehicle based on Global Position System. 1175-1182 - Xiaoxia Niu, Yanxia Wu, Bowei Zhang, Guochang Gu, Guoyin Zhang:

Rapid FPGA-based Delay Estimation for the Hardware/Software Partitioning. 1183-1190 - Zhengcai Wang, Xiaofeng Wang, Zhengyi Tang:

Analysis and Improvement of AC-BM Algorithm in Intrusion Detection System. 1191-1196 - Jian Huang, Hongmei Yan:

Indoor Localization Algorithm Based on Cooperative of State Matrix and Kalman Filter. 1197-1203 - Jun Zhu, Lili Han, Likuan Chang, Yongbiao Li:

Vector Control Based on SVPWM for ACIM. 1204-1211 - Shaohua Jiang, Jian Zhang, Haiyan Zhang:

Ontology-based Semantic Retrieval for Risk Management of Construction Project. 1212-1220 - Chengshuang Sun, Fan Jiang, Shaohua Jiang:

Research on RFID Applications in Construction Industry. 1221-1228
Volume 8, Number 6, 2013
- Khaled Shuaib, Issa Khalil

, Mohammed Abdel-Hafez
:
Communications in Smart Grid: A Review with Performance, Reliability and Security Consideration. 1229-1240 - Guoxiang Yao, Saizhi Ye, Caiting Huang:

A Key Management Algorithm Based on Two-tier Architecture in Wireless Ad Hoc Network. 1241-1247 - Kai Peng, Rongheng Lin, Binbin Huang, Hua Zou, Fangchun Yang:

Node Importance of Data Center Network Based on Contribution Matrix of Information Entropy. 1248-1254 - Rania A. Mokhtar

, Rashid A. Saeed
, Raed A. Alsaqour
, Yahia Abdallah:
Study on Energy Detection-based Cooperative Sensing in Cognitive Radio Networks. 1255-1261 - Jinxiu Chen, Chao Dong, Youzheng Wang:

Performance Evaluation of Adaptive Modulation System over Mobile Satellite Channels. 1262-1269 - Bin Wang, Zhigang Jin:

Distributed Randomized Algorithm based on Buffer Utility for Control Channel Scheduling in IEEE 802.16 Mesh Networks. 1270-1277 - Lifang Wang, Shuhai Zhang, Yurong Li, Ruijuan Wu, Yi Yu:

An Attribute-weighted Clustering Intrusion Detection Method. 1278-1284 - Liang Zhao, Jili Zhang, Ruobing Liang:

Remote Ethernet Data Transmission System based on Hardware Protocol Stack Chip. 1285-1291 - Lu Xiong, Shen-guang Gong:

Reliability Allocation of Underwater Experiment System Based on Particle Swarm Optimization. 1292-1299 - Tingfang Yu

, Hongzhen Zhu, Chunhua Peng:
Multi-objective Optimization of Coal-fired Boiler Combustion Based on NSGA-II. 1300-1306 - Wen-jie Xu, Jin Yao:

Integrated Quality Diagnosis Algorithm Method based on Neural Network and Sensitivity Analysis to Input Parameters. 1307-1314 - Zhongwen Wang, Ruizhen Duan, Xiaoqiu Xu:

Model Identification of Hydrostatic Center Frame Control System based on MATLAB. 1315-1321 - Yuxiang Li, Haiming Wang, Hongkui Yu, Changquan Ren, Qingjia Geng:

Network Intrusion Detection based on GMKL Algorithm. 1322-1328 - Mingyu Ji, Di Wu, Zhiyuan Chen:

Verification Method of Conditional Probability Based on Automaton. 1329-1335 - Huiqing Niu, Hong Chen:

An Improved Recommendation Algorithm in Knowledge Network. 1336-1342 - Shupeng Zhao, Miao Tian, Shifang Zhang, Jiuxi Li:

Information Processing of Chassis Dynamometer based on Controller Area Network. 1343-1349 - Yongliang Deng, Qiming Li, Ying Lu, Jingfeng Yuan

:
Topology Vulnerability Analysis and Measure of Urban Metro Network: The case of Nanjing. 1350-1356 - Lijun Cao, Xiyin Liu, Zhongping Zhang:

Resource Discovery Algorithm Based on Multilayer Overlay Network. 1357-1363 - Qunhui Zhang:

Online Network Traffic Classification Algorithm Based on RVM. 1364-1369 - Cong Gao, Jianfeng Ma:

A Collaborative QoS-Aware Service Evaluation Method for Service Selection. 1370-1379 - Xiyin Liu, Lijun Cao, Min Liu, Kun Han:

Process-based Security Detection Approach for Virtual Machines on Private Cloud Platforms. 1380-1386 - Yanjun Long, Jianquan Ouyang, Xinwen Sun:

Network Intrusion Detection Model based on Fuzzy Support Vector Machine. 1387-1394 - Yuanping Xu, Jian Huang, Jun Lu:

A Categorical Knowledge Management Software Platform for Advanced Areal Surface Texture Specification and Verification. 1395-1402 - Zhong-wei Cui, Yong Zhao, Dao-yun Xu, Yu Zuo:

A Dynamic Routing Based on Bayes Estimation for Wireless Sensor Networks. 1403-1410 - Hui Li, Jingxiao Zhang, Lieyan Ren, Zhen Shi:

Scheduling Optimization of Construction Engineering based on Ant Colony Optimized Hybrid Genetic Algorithm. 1411-1416 - Bo Huang, Yong Xu, Mengting Yuan, Guoqing Wu:

Formal Behavior Modeling: Business Processes Based on Cloud Platform. 1417-1424 - Hongliang Fu, Beibei Zhang:

Compressed Sensing Precoding with Limited Feedback in Multi-carrier MIMO System. 1425-1431 - Yao Liu, Qiao Liu

, Zhiguang Qin:
Community Detecting and Feature Analysis in Real Directed Weighted Social Networks. 1432-1439 - Yang Li, Xichuan Lin, Zhisong Bie, Hyok Hui Kim:

Power- and Bandwidth-Efficient Euclidean Code with Sparse Generator Matrix. 1440-1447 - Shaolin Wang:

Cascading Model of Infrastructure Networks based on Complex Network. 1448-1454 - Shaohua Jiang, Haiyan Zhang, Jian Zhang:

Research on BIM-based Construction Domain Text Information Management. 1455-1464
Volume 8, Number 7, 2013
- Khalid S. Ahmad

, A. Z. Yonis:
Miniaturized Hybrid Rat-Race Coupler of a 2.5 GHz Loaded by Resistors. 1465-1469 - Yanyan Han, Deshi Li, Jian Chen, Tianyu Wang, Xiaoliang Wang:

Carrying Network Accessing Architecture and Strategy Based on Business Differentiation. 1470-1475 - Lei Lv, Zhongpei Zhang:

A Selfish Linear Precoding Strategy for Downlink Two-User MIMO Systems Using Limited Rate Feedback. 1476-1479 - Yang Xu, Ruochen Tan, Shuai Wu, Qilin Tang:

Connect Internet with Sensors by 6LoWPAN. 1480-1487 - Christoforos Kachris

, Ioannis Tomkos
:
Optical OFDM-based Data Center Networks. 1488-1496 - Qi Liu, Jun Cui, Hongdong Zhao, Hong Shen:

A Soft Fault-concept Diagnosis Method of Analog Circuits Based on Cloud Model Theory. 1497-1503 - Hao Huang, Fei Yang

:
An Interpretation of Erlang into Value-passing Calculus. 1504-1513 - Feixiang Chen, Xiao Ma, Shaoliang Ni:

Organization and Correction of Spatial Data in Mobile GIS. 1514-1520 - Dan-ye Chen, Qi-zhi Yu:

Research of Computer Intelligent Control System and data processing of Welding Inverter Power Based on DSP. 1521-1528 - Ching-Ching Cheng, Pei-Li Huang, Kuo-Hung Huang

:
Cooperative Learning in Lego Robotics Projects: Exploring the Impacts of Group Formation on Interaction and Achievement. 1529-1535 - Jingyu Chen, Ping Chen, Xian'gang Sheng:

A Sketch-based Clustering Algorithm for Uncertain Data Streams. 1536-1542 - Xin Jin, Yaohua Wang:

Research on Social Network Structure and Public Opinions Dissemination of Micro-blog Based on Complex Network Analysis. 1543-1550 - Mingyang Liu, Shufen Liu, Changhong Hu, Y. V. Ramana Reddy, Sumitra Reddy:

Personalized Search Based on Context-Centric Model. 1551-1557 - Yong Yin, Tao Yuan, Yu Xiao, Chaoyong Zhang, Ping Lou, Yu Li:

An Improved Search Strategy for Even Degree Distribution Networks. 1558-1565 - Jing Li, Dianfu Ma:

Suffix Tree Based Incremental Web Services Clustering Method. 1566-1573 - Rui Su:

Identification Method of Sports Throwing Force Based on Fuzzy Neural Network. 1574-1581 - Lijun Cao, Xiyin Liu, Yubin Wang, Zhongping Zhang:

WSO-based Spatial Outlier Detection Algorithms. 1582-1588 - Shuyan Wu, Kelin Lv:

Research on the Content Networking Sensor. 1589-1594 - Hailing Sun, Tianbao Su:

Project Cost Prediction Model Based on Fuzzy Theory. 1595-1600 - Huafeng Xu, Yongli Bai, Zhigeng Fang:

Solution of Grey Chance Constrained Programming and Convexity of its Feasible Set. 1601-1608 - Limin Song, Junli Zhang:

Load Balancing Method Based on Servers and Reverse Proxy. 1609-1616 - Chaoyu Yang:

LDH Control Algorithm in Wireless Sensor Network. 1617-1623 - Yifei Yang, Huangqiu Zhu:

Optimal Control and H∞ Output Feedback Design Options for Active Magnetic Bearing Spindle Position Regulation. 1624-1631 - Kaijian Xia

, Yue Wu, Xiaogang Ren, Yong Jin:
Research in Clustering Algorithm for Diseases Analysis. 1632-1639 - Fang Dong, Mengchi Liu, Kun Ma:

Web Entities Extraction Based on Semi-Structured Semantic Database. 1640-1646 - Di Song:

Research on Information Propagation Model for Microblogging. 1647-1653 - Zhiying Zhang, Peng Wang, Weize Wang:

Optimization and Operation Scheduling for a Steel Plate yard Based on Greedy Algorithm. 1654-1659 - Bowen Li:

Research on Portable Fatigue Signal Detection System. 1660-1666 - Jiankun Ouyang:

Energy-Efficient Data Processing Scheme in Sensor Networks. 1667-1672 - Wu Xue:

Study on Digital Image Scrambling Algorithm. 1673-1679
Volume 8, Number 8, 2013
- Hao Zhang, Xinjie Wang, T. Aaron Gulliver, Wei Shi, Jingjing Wang:

Performance of Incremental AF Relaying Cooperative Networks with the nth Best Relay over Rayleigh Fading Channels. 1681-1688 - Qiu-Yan Wang, Bin Zhang, Chen-Hui Jin:

Practical Security against Differential and Linear Cryptanalysis for SMS4-like Cipher. 1689-1693 - Song Zha, Peiguo Liu:

An Efficient Non-sparsity Protection Scheme for Collaborative Compressed Spectrum Sensing. 1694-1699 - Song Li, Yuhao Wang, Henry Leung, Dakun Bao, Boyuan Li, Bo Kong:

The Inversion-based Coverage Prediction Tool for Cellular Networks - Real City Experiments. 1700-1707 - Junge Yao, Ming Gu:

Conceptology: Using Concept Map for Knowledge Representation and Ontology Construction. 1708-1712 - Yang Yu, Xiaomin Chen:

Research on Custody Transfer Service in Delay Tolerant Network. 1713-1719 - Ping Liang:

A Bisimulation-based Hierarchical Framework for Software Development Models. 1720-1725 - Jing Wang, Yourui Huang:

Improved Artificial Fish Algorithm for Parameters Optimization of PID Neural Network. 1726-1733 - Wenhui Lin, Jun Liu:

Performance Analysis of MapReduce Program in Heterogeneous Cloud Computing. 1734-1741 - Guozhu Jia, Wen Kong:

Dynamic Cell Formation based on Multi-objective Optimization Model. 1742-1749 - Juqiong Yang, Chu-Ho Ting, Xudong Zhang:

¬Network Traffic Prediction Using the Combination of Chaos Theory and Simple-MKL. 1750-1756 - Guangyou Tu, Songtao Guo, Hongyu Huang, Yuanyuan Yang

:
Optimal Resource Allocation for Cross-layer Utility Maximization in Ad Hoc Networks. 1757-1766 - Wenxue Liu, Guanying Sun:

A Trust-based Information Propagation Model in Online Social Networks. 1767-1773 - Bin Ding, Yan Ma, Yiwei Wu:

Playfield Detection Algorithm Based on AGMM in Sports Video. 1774-1780 - Jie Yang, Li Wan, Changqing Qu, John Savaria:

A New Load-balancing Algorithm in Wireless Networks. 1781-1787 - Li Wan, Yang Jie:

Context-aware Greedy Scheduling Algorithm in Wireless Network. 1788-1795 - Jian-Hua Wang, Yan Yu, Madukasi Charles Nnaemeka:

Data Storage Algorithms Based on Clustering in Wireless Sensor Networks. 1796-1802 - Xuhui Li, Gangyan Li, Guowen Sun, Huiping Shi, Baoan Yang:

Research on Layout Optimization of Urban Circle Solid Waste Transfer and Disposal Stations. 1803-1809 - Qingsheng Wan, Shaobin Huang, Mengxi Wei:

Research on Pretreatment of Questions Based on Large-scale Real Questions Set. 1810-1816 - Liang Zhao, Liyuan He, Wong Harry, Xing Jin:

Intelligent Agricultural Forecasting System Based on Wireless Sensor. 1817-1824 - Jinlong Tao, Lirong Chen:

Software Test Case Automated Generation Algorithm with Extended EDPN Model. 1825-1830 - Zhaoyin Zhang:

Neural Network Control Optimization based on Improved Genetic Algorithm. 1831-1837 - Kai-Wayne Chuang, Chien-Nan Lin, Chun-Hsiung Lan:

Order Policy Analysis for Deteriorating Inventory Model with Trapezoidal Type Demand Rate. 1838-1844 - Fangwei Li, Yongchuan Tang, Jiang Zhu:

Dynamic Resource Access Using Graphical Game in Asymmetric Wireless Networks. 1845-1851 - Xiaohui Guo, Xinmin Zhang, Haiyan Ren, Xiao Zhang:

Research on Context Aware Network Security Model. 1852-1858 - Bao-juan Liang:

Traffic Flow Detection Based on Wireless Sensor Network. 1859-1865 - Jinghua Yan, Xiaohui Fan:

HFBP: Identifying P2P Traffic by Host Level and Flow Level Behavior Profiles. 1866-1873 - Yong Zhang, Lin Guo:

Network Percolation Based on Complex Network. 1874-1881 - Bi-geng Zheng:

Research on Fiber Optic Sensor based on Fuzzy Control Theory. 1882-1889 - Qinghua Chen, Yan Liu, Jianwei Feng:

Quantitative Fracture Modeling on Low-permeability Sandstone Reservoirs by Stress Field. 1890-1898 - Yang Li, Zhisong Bie, Jiaru Lin, Hyok Hui Kim:

Low-Density Lattice Codes for Inter-Symbol Interference Channels. 1899-1905 - Yanbo Qi, Zhong Liu, Huadong Chen, Jieying Han:

Distributed Combat System of Systems Network Modeling. 1906-1912 - Lingli Jiang, Bo Zeng, Francis R. Jordan, Anhua Chen:

Kernel Function and Parameters Optimization in KICA for Rolling Bearing Fault Diagnosis. 1913-1919 - Lei Ding, Fei Yu, Zhenghua Yang, Guangxue Yue:

The System Design of a Node of P2P Networks for Intrusion Detection. 1920-1927
Volume 8, Number 9, 2013
- Zahid Ali, Qurban A. Memon

:
Time Delay Tracking for Multiuser Synchronization in CDMA Networks. 1929-1935 - Zhejun Kuang, Liang Hu, Chen Zhang:

Research on Human Sensory Architecture for Cyber Physical Systems. 1936-1942 - Xiaolu Zhang, Liang Hu, Shinan Song, Zhenzhen Xie, Xiangyu Meng, Kuo Zhao:

An Intelligent Analysis Model for Multisource Volatile Memory. 1943-1949 - Zhuhua Liao, Aiping Yi, Guoqing Zhang:

Distributed Data Integration in Content-centric Networks. 1950-1959 - Jia Wei, Huajing Fang:

State Feedback Consensus for Multi-Agent System with Multiple Time-Delays. 1960-1966 - Jinkui Hou, Yuyan Zhang:

Model Mapping Approach Based on Ontology Semantics. 1967-1974 - Yahui Bu, Aifen Li, Junrong Liu, Weiqiang Yu:

Multisensor Acquirement System of Electrokinetic in Multiphase Flow. 1975-1981 - Hui-long Jin, Shu-li Qi, Miao Zhang, Zhiyuan Wang:

Punctured Difference Set Pair and Perfect Punctured Binary Sequence Pair. 1982-1989 - Junping Zhou, Jingming Xia, Yixian Ge, Eric Chernoff:

Internal and External Optical Feedback Effect in Fiber Linear Lasers. 1990-1996 - Wenxue Liu, Guanying Sun:

An advanced Data Mining Strategy for Multi-Target Tracking in Adverse Environments. 1997-2004 - Jian-Hua Wang, Yan Yu, Madukasi Charles Nnaemeka:

A High Throughput MAC Protocol for Wireless Sensor Networks in Surveillance Applications. 2005-2012 - Guang Ouyang, Xiang Chen:

Trust Model Based on P2P Network. 2013-2020 - Yu Zhang, Meixing Qi, Min-Ming Tong:

Composite Taste Recognition Method Based on Fuzzy Neural Network. 2021-2028 - Biao Lu:

Credibility Control Method Based on Error Transfer Model. 2029-2036 - Jia Chen, Xian Huang:

A Data-reversible Hiding Algorithm in WSNs. 2037-2042 - Hao Liu, Zhigang Chen:

Research on P2P Overlay Network Model with Small-world Features. 2043-2049 - Li Wan, Jie Yang:

Advanced Split BIRCH Algorithm in Reconfigurable Network. 2050-2056 - Yinghui Zhang, Muhammad Saeed, Tiankui Zhang, Zhimin Zeng:

Tensor-Based Channel Estimation for Cooperative Diversity Scheme in the Presence of Timing and Frequency Offsets. 2057-2062 - Yuyu Li, Bo Huang:

Multiple Principal-Agent Model of SMEs Pollution Regulation under Centralized Treatment. 2063-2070 - Yonglong Zhuang, Xiaolan Weng, Yuwu Wang, Haiyang Zhuang:

Improvement and Analysis of Encryption and Decryption Performance in Cloud Document. 2071-2077 - Hehua Li, Chunling Wu, Wei Wei, Buddha Khoukhi:

Decentralized Distribution Update Algorithm Based on Compressibility-controlled Wireless Sensor Network. 2078-2084 - Yiqing Zhang, Jianwei Tan:

Improved MDS-based Sensor Localization Algorithm in Wireless Sensor Networks. 2085-2092 - Gang Chen, Dawei Zhao:

Model of Information Security Risk Assessment based on Improved Wavelet Neural Network. 2093-2100 - Xiangrong Feng:

Traffic Prediction Scheme based on Chaotic Models in Wireless Networks. 2101-2106 - Linhao Li:

An Improved Congestion Control Strategy Algorithm for Heterogeneous Network. 2107-2113 - Xiehua Yu:

Security Key Management Scheme in Heterogeneous Wireless Sensor Networks Based on Clustering Strategy. 2114-2120 - Dingcheng Yang, Lin Xiao, Fei Wang, An Li:

A Multi-Cell Coordinated Scheduling Algorithm Based on Delta-CQI for CoMP Network Systems. 2121-2127 - Guangping Zhou, Anup Shrestha

:
Efficient Intrusion Detection Scheme based on SVM. 2128-2134 - Jiuyuan Lu:

Bit Loading Algorithm Based on Channel Detection in VSF-OFCDM Wireless Communication System. 2135-2142 - Jun He, Liang Chen, Xiaolong Wang, Yonggang Li:

Web Service Composition Optimization Based on Improved Artificial Bee Colony Algorithm. 2143-2149 - Shuijuan Yu, Zhenbi Li, Xia Sun:

Design of Adaptive Grid Type Filter Based on FPGA. 2150-2154 - Jinbao Cai, Yalin Wu:

An Enhanced Rate Control Initialization Method for H.264 based on Image Quality Balance of GOP Using Support Vector Machines. 2155-2162 - Yabing Jiao:

Electronic Commerce Logistics Network Optimization Based on Swarm Intelligent Algorithm. 2163-2170 - Lianju Ning, Xin Feng, Lichi Sun:

A Secure Protocol for Efficient SMS Transmission and Management. 2171-2178 - Xiaozhu Liu, Yuwei Peng, Yuanhua He, Zukai Tang:

Uniform Storage Model-based Update Scheme of On-line Information Retrieval System. 2179-2185
Volume 8, Number 10, 2013
- Kanghee Lee, Hyuck M. Kwon, Wenhao Xiong, Hyunggi Kim, Inha Hyun:

Relay Selection Scheme for AF Relay Network based on Cost Function Criterion. 2187-2194 - Stephan Massner, Chris Richter, Uwe Hautzendorfer:

SIP Trunking - General Requirements for Interconnecting Enterprise Networks. 2195-2212 - Yangrong Chen

, Guanglin Xing:
A Key Issuing Scheme in IBE-based Distributed Online Social Networks. 2213-2219 - Dan Wang, Weiping Shi, Xiaowen Li:

Low-Complexity Carrier Frequency Offset Estimation Algorithm in TD-LTE. 2220-2226 - Xin Zhang, Meng Cai, Jia Liu:

Fast Approximate Matching Algorithm for Phone-based Keyword Spotting. 2227-2233 - Wenxue Ran

, Xinling Shi, Li Liu:
Combination of the Sorting Line Priority Polling Control Mechanism. 2234-2240 - Ying Liu, Wenxiang Gu, Tingting Zou, Qingtao Huang, Qiao Li:

Incremental Knowledge Compilation Using the Extension Rule. 2241-2246 - Juan Fan, Wuyang Zhou:

Joint Uplink Resource Allocation Algorithm with Proportional-Fair in Heterogeneous Wireless Networks. 2247-2254 - Tong Zhao, Bingbing Qian, Yimin Li:

Hybrid Adaptive Fuzzy Control Based on the Biological Adaptation Strategies. 2255-2262 - Luping Zhou, Bingrong Li, Fucai Wang:

Particle Swarm Optimization Model of Distributed Network Planning. 2263-2268 - Wen-Tie Wu, Min Li, Bo Liu:

Intrusion Detection Scheme based on IPSO-RBF. 2269-2276 - Xian Huang, Jia Chen:

Efficient Node Coverage Scheme of Wireless Sensor Network under Multi-Constraint Conditions. 2277-2284 - Jinsheng Tan, Peng Liu:

Efficient Flow Control Scheme in Multimedia Cloud Computing. 2285-2292 - Li Wei, Chunjian Zhao:

An Optimized and Improved Network Trust Model Based on P2P. 2293-2301 - Jianyu Lan, Houjun Tang, Xin Geng:

Finite Element Analysis of a Contactless Transformer. 2302-2309 - Jun Gong, Miao Yu:

A Multi-objective Cross-training Plan Based on NSGA-II. 2310-2316 - Zheng Sun, Zhufeng Shao:

Greedy Forwarding Routing Strategy Based on Energy Efficiency in Wireless Sensor Network. 2317-2323 - Wei Huang, Bo Huang:

R&D Outsourcing Policy with Input Spillovers Based on Multi-Outsourcer and Multi-Supplier. 2324-2331 - Hongying Jin, Linhao Li:

Dynamic Network Traffic Flow Prediction Model based on Modified Quantum-Behaved Particle Swarm Optimization. 2332-2339 - Pengyi Zhang, Jiannan Xia, Ruiji Li:

Personalized Multimedia Information Retrieval based on User Profile Mining. 2340-2346 - Yan Wang, Xiufeng Cao:

Process of Assembling Component Based on Domain Ontology. 2347-2352 - Chunlong Yao, Fengjiao Yin, Xu Li, Fenglong Fan:

Security Analysis of PHP Encoder. 2353-2360 - Daojian Liu, Tianmin Huang:

A Reduced-Order Correction Algorithm for the Linear Programming Problem by Non-negative Constraints with the Most-Obtuse Angle. 2361-2367 - Bin Xu, Li-Hui Zhang, Xiao-Pin Tan:

Research of RFID Certification Security Protocol based on Hash Function and DES Algorithm. 2368-2375 - Zhaoyan Jin

, Dianxi Shi, Quanyuan Wu, Hua Fan:
MCHITS: Monte Carlo based Method for Hyperlink Induced Topic Search on Networks. 2376-2382 - Hui Peng:

Research of Collaborative Filtering Recommendation Algorithm based on Network Structure. 2383-2391 - Zhonghua Zhao:

Clustering Algorithm in Data Mining Based on Web Log. 2392-2399 - Ruihui Mu, Wuqiang Zhang:

QAODV: Improved Security Routing Protocol of AODV. 2400-2405 - Zhenguo Wu, Rongbo Zhu, Yongli Sun, Qiufen Ni:

Routing Protocol Design and Performance Optimization in Cognitive Radio Networks. 2406-2413 - Guoping Tan, Xinhua Peng, Xinyang Ni, Betene A. Francis Lin, Xiuquan Liu:

PNCRM: A Novel Real-time Multicast Scheme in MANETs Based on Partial Network Coding. 2414-2421 - Qiuyan Liu, Peng Zhang, Yuping Zhao:

Energy Efficient Deployment of Heterogeneous Networks. 2422-2428 - Feng Chen, Wenjun Xu, Yuchen Guo, Hongyu Ma, Jiaru Lin:

Joint Traffic Splitting and Spectrum Resource Allocation in Heterogeneous Cognitive Wireless Networks. 2429-2435 - Zhongzhen Yang, Jinlin Wang, Jun Lin

:
Utility-Based Online Bandwidth Allocation for Bonded Channels. 2436-2443 - Yue Long, Qiang Xian:

Logistics Optimization of Auto Parts Supplier Embedded by Service Alliance. 2444-2451 - Lixin Wang, Lianggang Wu, Kelly Wang:

Customer Recognition of Network Finance Based on MKL Algorithm. 2452-2458
Volume 8, Number 11, 2013
- Ying Zhu, Zhiyong Feng, Ping Zhang:

Analysis of Improved Cyclostationary Detector with Multiple Antennas over Fading Channels. 2459-2466 - Xu Li, Qijing Feng, Shijie Li, Haiyang Ding:

RE-AODV: Improved AODV Routing Protocol for Repairing Efficiency. 2467-2472 - Xuna Miao, Ran Liu, Yingfeng Wang:

A Network Evaluation Algorithm in Heterogeneous Wireless Networks. 2473-2477 - Yongli Sun, Bin Zhou, Zhenguo Wu, Qiufen Ni, Rongbo Zhu:

Multi-channel MAC Protocol in Cognitive Radio Networks. 2478-2490 - Zheng Sun, Xuezheng Han, Zhufeng Shao:

A Hierarchical Routing Protocol Based on Energy Efficiency and Chain Structure for One-Way Aerial Ropeways for Underground Mine. 2491-2497 - Xingchen Ge, Ning Deng, Jian Yin:

Application for Data De-duplication Algorithm Based on Mobile Devices. 2498-2505 - Dayu Xu, Shanlin Yang, He Luo

:
A Fusion Model for CPU Load Prediction in Cloud Computing. 2506-2511 - Liang Hu, Shinan Song, Xiaolu Zhang, Zhenzhen Xie, Xiangyu Meng, Kuo Zhao:

Analyzing Malware Based on Volatile Memory. 2512-2519 - Jun Shuai, Xuli Han:

Constructing Low-Dimensional Dynamical Systems of Nonlinear Partial Differential Equations Using Optimization. 2520-2526 - Jianwei Tan, Yiqing Zhang:

Research on Multi-Sensor Multi-Target Tracking Algorithm. 2527-2533 - Jie Fang, Qingbiao Zhou, Xide Wu, Shijie Yang:

Network Traffic Prediction Model Based on Catfish-PSO-SVM. 2534-2540 - Yanjun Wang:

Network Intrusion Detection Technology based on Improved C-means Clustering Algorithm. 2541-2547 - Hui Zhang:

A Scheme of Certificateless Multilevel Proxy Digital Signature in Electronic Commerce. 2548-2555 - Zhe Xu, Ping Zhu, Jie Mei:

Notice of Violation of Academy Publisher Publication Principles "Research on Backward Cloud Model with Uncertainty". 2556-2563 - Yuanqiang Chen, Renbi Tian:

Exponential Stability of Impulsive Discrete Systems with Multiple Delays. 2564-2571 - Meilian Chen, Yan Ma, Yikun Liu, Fan Jia, Yanhui Ran, Jie Wang:

Mobile Learning System based on Cloud Computing. 2572-2577 - Lichuan Gu, Jinqin Zhong:

An Improved Anti-collision Algorithm Based on JDS. 2578-2584 - Shuanfeng Zhao, Guanghua Xu, Wei Guo:

Parallel Diagnosis Model of Fatigue Driving Based on Vehicle Running Status. 2585-2591 - Hehua Li, Chunling Wu:

Study on the Application of Digital Certificates in the Protection of Network Information Security and Data Integrity. 2592-2598 - Kai Zhao:

Multiple-Agent Task Allocation Algorithm Utilizing Ant Colony Optimization. 2599-2606 - Pinghui Zou:

A Novel Data Detection Method for Data Aggregation Security in WSN. 2607-2613 - Zhenhua Jia, Haohan Xie, Ye Liang:

Interval Similarity-Based Quantization Method for Continuous Data. 2614-2619 - Wei Jiang, Kefu Wang:

An Improved PAPR Suppression Algorithm based on Channel Coding in OFDM System. 2620-2626 - Junli Zhang, Limin Song, Linhao Li:

Research on Object-oriented Software Testing Cases of Automatic Generation. 2627-2634 - Chunlong Yao, Wei Pan, Lan Shen, Xu Li:

Research of Multi-sensor Images Based on Color Fusion Methods. 2635-2641 - Xiulin Fan

:
Efficient Data Fusion Algorithm in WSNs. 2642-2648 - Chunjing Xiao

, Yuhong Zhang, Xue Zeng, Yue Wu:
Predicting User Influence in Social Media. 2649-2655 - Kaibing Chen:

Unequal Cluster-Based Routing Protocol in Wireless Sensor Networks. 2656-2662 - Jiyun Li, Junping Wang, Hongxing Pei:

Data Cleaning of Medical Data for Knowledge Mining. 2663-2670 - Cui-fang Zhang, Gui-Gen Zeng:

A novel HARQ Scheme based on Frequency Diversity and Energy-MRC. 2671-2677 - Dafei Wu:

Research on Patient Privacy Protection for Medical Data in Cloud Computing. 2678-2684 - Yan Zhu, Guanghua Zhang, Jing Qiu:

Network Traffic Prediction based on Particle Swarm BP Neural Network. 2685-2691 - Zhejun Kuang, Liang Hu, Chen Zhang:

Research on Human Sensory Architecture for Cyber Physical Systems. 2692-2698 - Xiaolu Zhang, Liang Hu, Shinan Song, Zhenzhen Xie, Xiangyu Meng, Kuo Zhao:

An Intelligent Analysis Model for Multisource Volatile Memory. 2699-2705 - Tengyue Mao, Zhengquan Xu:

An Effective QoS Integrated Weighted Cost Model for LEO/MEO Satellite IP Networks. 2706-2711
Volume 8, Number 12, 2013
- Wenzhe Jiao, Guoqing Wang, Zhengjun Zhai, Xiaoxue Ye:

Dynamic Data Possession Checking for Secure Cloud Storage Service. 2713-2720 - Liang Hu, Jingyan Jiang, Jin Zhou, Kuo Zhao, Liang Chen, Huimin Lu:

Environment Observation System based on Semantics in the Internet of Things. 2721-2727 - Jian Chu:

Improved Shadowed Sets Data Selection Method in Extension Neural Network. 2728-2735 - Guifeng Wu, Xuan Wang, Donglei Chen:

Based on Low-power Wireless Sensor Network Node Data Storage Method. 2736-2742 - Peiyi Dong:

User Equilibrium Exchange Allocation Algorithm Based on Super Network. 2743-2748 - Imad Jawhar, Nader Mohamed, Hafsa Usmani:

An Overview of Inter-Vehicular Communication Systems, Protocols and Middleware. 2749-2761 - Jing Wang, Yourui Huang:

Decimal Integer Multiplication based on Molecular Beacons. 2762-2768 - Liangming Li:

An Integration Testing Approach Based on Composition of Unit Test Cases. 2769-2775 - Yanhua Zheng, Gaoyong Luo, Bingzhi Zhang, Yongling He:

Research on Power Line as Communication Channel with Multi-Tap and Multi-Branch Configuration. 2776-2782 - Xiangdong Yin, Jie Yang, Andreas Tiee-Girl:

Optimal Energy Routing Protocol Algorithm in Wireless Network. 2783-2790 - Jian Sun, Chenghua Wang, Jing Sun, Lei Wang:

Analog Circuit Soft Fault Diagnosis based on PCA and PSO-SVM. 2791-2796 - Qingshuang Wu, Chunya Tong, Qiang Wang, Xiangfu Cheng:

All-pairs Shortest Path Algorithm based on MPI+CUDA Distributed Parallel Programming Model. 2797-2803 - Hean Liu

, Zhike Kuang, Cizhen Zhang, Goodson A. Yilly:
Research on Spectrum Allocation Based on the Network Weights of Internet of Things. 2804-2811 - Jianyun Lei:

Weighted Directed Graph-Based Authorization Delegation Model. 2812-2815 - Kun Liu, Gaochao Xu, Jun'e Yuan:

An Improved Hadoop Data Load Balancing Algorithm. 2816-2822 - Tao Tao, Hongze Xu:

Adaptive Fault-Tolerant Control for Time-Varying Failure in High-Speed Train Computer Systems. 2823-2828 - Wei Wang, Ying Li, Hui Tao, Xiao-Ping Ma:

Determining Reconstruction Variables and Parameters on Improved Multi-Objective Immune Algorithm. 2829-2838 - Xiaoyong Zhang, Huafeng Wu:

Mixed Hermite-Legendre Spectral Method. 2839-2848 - Jianli Xie

, Cuiran Li:
Hybrid Weighted-based Clustering Routing Protocol for Railway Communications. 2849-2856 - Feichao Wang:

Energy Consumption Oriented Network-on-Chip Mapping Method. 2857-2863 - Shanliang Zhang, Lihua Zhu:

A Packet Classification Algorithm based on Improved Decision Tree. 2864-2871 - Yong Hu:

Minimal K-Covering Set Algorithm based on Particle Swarm Optimizer. 2872-2877 - Shupeng Zhao, Miao Tian, Shifang Zhang, Jiuxi Li, Lijuan Du, Ye Wang:

Data Process of Diagnose Expert System based on Neural Network. 2878-2884 - Linpeng Hai, Rui Wang, Liying Xiao:

A Novel RFID Anti-Collision Algorithm based on Binary Tree. 2885-2892 - Yinghui Qiu, Chao Liu:

Security and Stability Analysis for Yunnan Power Grid with Wind Power Integration. 2893-2899 - Ying Lu, Peng Jing:

The Combination of Postponement Operations in a Supply Chain Network with Multi-level Product Differentiations. 2900-2907 - Qingsheng Wan, Shaobin Huang, Kai Sun, Lifu Feng, Ya Li:

A Domain Information Retrieval Method based on Pension Insurance Ontology Concept Similarity. 2908-2914 - Bao Xu:

Time Synchronization for Heterogeneous WSNs Based on Cluster. 2915-2921 - Dejun Wang, Bo Meng, Shaomin Jin:

Improved Clustered Routing Algorithm Based on Distance and Energy in Wireless Sensor Networks. 2922-2926 - Xiaowen Hao, Jianguo Yang, Yi'e Zhao:

Optimization of Integrated Pollutants Control Equipment by Computer Information Processing Technology. 2927-2934 - Lixiong Gong:

Research on Evaluating and Choosing Logistics Service Providers for Manufacturing Enterprise. 2935-2941 - Tengyue Mao, Zhengquan Xu:

An Effective Mechanism for Improving Performance of TCP over LEO/MEO Satellite IP Networks. 2942-2947 - Yan Zhang, Wenxing Ma, Xuesong Li:

Shift Control System of Heavy-duty Vehicle Automatic Transmission. 2948-2955 - Chung-Hung Tsai, Dauw-Song Zhu, Yueh-Meei Jang:

A Study on the Consumer Adoption Behaviors of Internet Bank. 2956-2963 - Xiao-Yun Jiang, Horng-Huei Wu:

Optimization of Setup Frequency for TOC Supply Chain Replenishment Systems Based on Pareto Particle Swarm Optimization. 2964-2971

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














