The Research of Stock Forecasting Based on Wavelet Denoising and BP-RBF Combination Neural Network |
1981-1986 |
Rui Shan, Haibo Dai, Fei Jin and Jinxia Wei |
|
|
|
Hessian-LoG: A Novel Dot Enhancement Filter |
1987-1992 |
Zhenghao Shi, Minghua Zhao, Yinghui Wang, Lifeng He, Kenji Suzuki, Chenwang Jin and Ming Zhang |
|
|
|
Rain Removal from Video Using Dark Channel Prior and Guided Filter |
1993-1998 |
Jing Xu, Wei Zhao, Peng Liu and Xianglong Tang |
|
|
|
An Improved Harmony Search Algorithm for Absolute Value Equations with Normal Distribution |
1999-2004 |
Longquan Yong, Yan Zhu, Guanghua Zhang and Tao Zhou |
|
|
|
Comparison of Wavelet, Contourlet and Dual-Tree Complex Wavelet for Palmprint Recognition |
2005-2010 |
Xiaopeng Wei, Jianyang Liu, Jianxin Zhang and Qiang Zhang |
|
|
|
Generalized Interval-Valued Intuitionistic Trapezoidal Fuzzy Correlated Weighted Averaging Operator by Means of Choquet Integrals and Its Application to Multiple Attribute Decision Making |
2011-2017 |
Hongchun Sun and Min Sun |
|
|
|
Option-Based Modelling of Technology Choices and Bank Performance |
2019-2024 |
Wei-Ming Hung and Jyh-Horng Lin |
|
|
|
Design and Implementation of ZigBee Network Layer Protocol Based on Embedded ARM/TinyOS Platform |
2025-2031 |
Quanli Liu, Guangen Gao, Gang Li and Wei Wang |
|
|
|
Aspect Ratio Invariant Visual Cryptography Scheme with Flexible Size Expansion |
2033-2038 |
Peng Li, Pei-Jun Ma and Dong Li |
|
|
|
Nonlinear Dynamics in Heterogeneous Cournot Duopoly with Risk-Averse Agent |
2039-2044 |
Ruiwu Yu and Renbin Xiao |
|
|
|
Efficient ECC-Based Key Management Scheme for Secure Multicast in Heterogeneous Sensor Networks |
2045-2050 |
Chin-I Lee, Tzong-Chen Wu, Hung-Yu Chien and Kuo-Yu Tsai |
|
|
|
Further Cryptanalysis of Huang-Wei's Efficient Remote User Authentication Scheme with Smart Cards |
2051-2056 |
Wen-Gong Shieh and Wen-Bing Horng |
|
|
|
An Efficient Ant Colony Optimization for Real Parameter Optimization |
2057-2063 |
Li-Qing Zhao, Zi-Xuan Luo, Zhi-Qiang Chen and Rong-Long Wang |
|
|
|
Finite Memory Filtering for Power Control in Broadband Wireless Data Networks |
2065-2070 |
Pyung Soo Kim |
|
|
|
Modeling and Analysis for Availability Management of P2P Storage Systems with Eager Repair Policy |
2071-2078 |
Shunfu Jin and Lingling Chen |
|
|
|
Approach for Building Ontology Automatically Based on Wikipedia |
2079-2084 |
Tianji Wu, Kui Xiao and Xiaohu Tan |
|
|
|
A Haptic Bimanual Interface for 3D B-Spline Curve Manipulation |
2085-2089 |
Zhan Gao, Jiehua Wang and Xiang Gu |
|
|
|
Reliability Analysis of Embedded Software System Considering Component Reliability of Weibull Distribution |
2091-2097 |
Tao Liu, Zhenzhou Ji, Qing Wang and Suxia Zhu |
|
|
|
One-Pass Testing Algorithm for Solving Underflow and Overflow Problems in Reversible Watermarking |
2099-2104 |
Te-Cheng Hsu, Cheng-Yeh Chen, Wen-Shyong Hsieh, Nan-Tung Chen and John Y. Chiang |
|
|
|
A One-Parameter Family of Intuitionistic Fuzzy Entropy Based on Cosine Function |
2105-2111 |
Jing Liu and Min Sun |
|
|
|
A Simple Unifying Approach of Designing the Sinusoidal Oscillator |
2113-2117 |
Chung-Cheng Chen, Ting-Li Chien, Ying-Chen Chen, Kuan-Yu Chou and Yi-Hsiang Tseng |
|
|
|
Resource Reservation Based on Relaxed Strategy in Network Computing Systems |
2119-2124 |
Peng Xiao, Ning Han and Zhe Huang |
|
|
|
Quantized Feedback Control of Linear Quadratic Gaussian Systems under Communication Constraints |
2125-2131 |
Fang Jin, Qing-Quan Liu and Gui-Hong Tao |
|
|
|
Particle Swarm Optimization with Neighborhood Search for Multimodal Optimization Problems |
2133-2140 |
Dingcai Shen, Yuanxiang Li and Yu Sun |
|
|
|
Cross-Language Speech Emotion Recognition in German and Chinese |
2141-2146 |
Chengwei Huang, Dong Han, Yongqiang Bao, Hua Yu and Li Zhao |
|
|
|
The Precision for Fluid Flow Model of Window-Size Behavior of the Transmission Control Protocol |
2147-2152 |
Hui Wang, Zhenzhou Ji, Huijie Qiao and Yandong Sun |
|
|
|
Optimal Control Problems for the Stochastic SIR Model under Vaccination< |
2153-2160 |
Masaaki Ishikawa |
|
|
|
New Results on Robust H-infinity Control for Markovian Jump Linear Systems with Time-Delay |
2161-2166 |
Xiang Teng |
|
|
|
Soap Header Extensions for Cross Domain SaaS Security |
2167-2172 |
Yangpeng Zhu, Jing Zhang and Junhuai Li |
|
|
|
Route Selection for Dangerous Goods Transportation under Uncertain Environment |
2173-2178 |
Daijun Wei, Bingyi Kang and Yong Deng |
|
|
|
Pyramid Difference Reversible Image Watermarking Scheme |
2179-2184 |
Chien-Chang Chen |
|
|
|
New Admissibility Condition of Discrete-Time Singular Systems with Commensurate Delays |
2185-2190 |
Yongyun Shao, Xiaodong Liu and Xin Sun |
|
|
|
Collision Analysis of Human Visual System Based Image Hashing |
2191-2196 |
Zhenjun Tang, Xianquan Zhang and Zhixin Li |
|
|
|
Forecasting Enrollments Based on Fuzzy-Trend of Axiomatic Fuzzy Set Membership Degrees |
2197-2204 |
Lili Tao, Xiaodong Liu and Yan Chen |
|
|
|
Solution Algorithm for Unit Commitment |
2205-2210 |
Takayuki Shiina |
|
|
|
A New Simple Thermoelectric Temperature Controlled Box System |
2211-2218 |
Hsin-Hung Chang, Fu-Tai Wang and Chung-Cheng Chen |
|
|
|