The Fifth-Order WENO Method with Non-Uniform Adaptive Mesh |
1527-1534 |
Maryam Arab Ameri and Raziyeh Javaheri Afif |
|
|
|
Distributed Recursive Filtering for Spatially Interconnected Systems with Randomly Occurred Missing Measurements |
1535-1540 |
Bai Li |
|
|
|
Segment-Based Static Feature Analysis and Recognition of Emotional Speech for Manned Space Mission |
1541-1546 |
Jun Wang, Bin Wu, Chengwei Huang, Haibo Qin, Cheng Zha and Li Zhao |
|
|
|
An Immune Network Classifier Based on Pair Wise Antigens |
1547-1552 |
Zelin Deng, Guanzheng Tan and Pei He |
|
|
|
Hopf Bifurcation Analysis of a Complicated Hyperchaotic System |
1553-1559 |
Kejun Zhuang |
|
|
|
Effects of Slab Deformation on Reduction Gradient in Reduction Zone |
1561-1566 |
Xueliang Shi, Tingzhi Ren, Xin Jin, Dawei Liu and Yulin Zhang |
|
|
|
Study on Ultra-Lightweight RFID Authentication Protocol Based Crossover |
1567-1572 |
Zongyin Du, Guoan Zhang and Honglin Yuan |
|
|
|
A Game Theory Based Energy Efficiency Routing Algorithm for Wireless Sensor Networks |
1573-1578 |
Yanqi Chen, Xiaoyu Wang, Yuan Huang and Xingwei Liu |
|
|
|
Ranking Twitter Users Based on Their Retweet Probability |
1579-1583 |
Xue Zeng and Yue Wu |
|
|
|
Global Asymptotic Stability of an N-Patch Predator-Prey System |
1585-1592 |
Yanqiu Li and Jizhang Fan |
|
|
|
An Efficient Role-Based Access Control Approach in IRBAC 2000 |
1593-1598 |
Xiaopu Ma, Ning Cheng, Li Zhao and Ruixuan Li |
|
|
|
Phase Synchronization of Fractional-Order Chua's Chaotic System |
1599-1605 |
Junhai Luo and Heng Liu |
|
|
|
Research of Corn Seeds Contour Detection Algorithm Based on BEMD and Soft Morphology |
1607-1611 |
Yanqiu Wang and Xiaofei Yan |
|
|
|
A Method of Human Detection and Statistics Based on Monocular Vision |
1613-1618 |
Qing Ye, Rentao Gu and Yuefeng Ji |
|
|
|
Some Characterizations of Prime Q-Fuzzy Ideals of Ordered Semigroups |
1619-1626 |
Jian Tang |
|
|
|
A Sequence Clustering Method for Analyzing Software Fault Feature |
1627-1632 |
Yanyan Wang, Yanning Wang and Jiadong Ren |
|
|
|
Improvement of the Chaotic Image Encryption Effect Based on Unary Polynomial Transformation |
1633-1638 |
Ling Wu, Hong Chen and Kai Yang |
|
|
|
Content-Based Fast Query for PDF Document Data on MapReduce |
1639-1644 |
Hengliang Shi, Chongguang Ren, Lei Zhang and Tao Huang |
|
|
|
Novel Properties of Spread Spectrum Sequence in Digital Watermarking |
1645-1651 |
Jian Wang and Nan Jiang |
|
|
|
Optimal Strategies for Integrated Pricing, Marketing and Production Planning by Geometric Programming |
1653-1658 |
Guoli Liu, Tong Ye and Wei Wang |
|
|
|
Ant Colony Intelligence for Flexible Manufacturing Scheduling in the Framework of Contract-Net Protocol |
1659-1663 |
Yingzi Wei, Kanfeng Gu and Lijuan Qin |
|
|
|
A Novel Clustering Algorithm Based on Partition for Mass Data |
1665-1670 |
Zhaojiang Ren, Yanbo Liu, Kaiyu Jin and Shida Zhang |
|
|
|
A New Stabilization Approach to Sampled-Data Systems with Inputs Missing |
1671-1676 |
Zhongning Lu, Zhanlei Shang and Xunlin Zhu |
|
|
|
An Efficient Subspace Clustering Algorithm Based on Attribute Relativity and DBSCAN |
1677-1682 |
Qiang Zeng, Yunyue Bai, Haitao He and Jiadong Ren |
|
|
|
Research on the Algorithm for Euclidean Shortest Paths of Visiting Line Segments in the Plane |
1683-1688 |
Lijuan Wang, Bo Jiang, Qi Wei and Dandan He |
|
|
|
New Classification Method of Combining kNN and Structurally Regularized SVM |
1689-1695 |
Xuchu Wang, Yanmin Niu, Li-Wen Tan and Shao-Xiang Zhang |
|
|
|
Power-Rate-Distortion Optimization for Mobile Sign Language Video Encoding |
1697-1702 |
Xiaolei Chen, Aihua Zhang, Dongmei Lin and Xinzhu Yang |
|
|
|
A New Approach of Fault Line Detection in Small Current Grounding System |
1703-1709 |
Bo Li |
|
|
|
Particle Swarm Optimization with Opposition-Based Learning and Parent Centric Crossover |
1711-1717 |
Chen Chen and Xiaoting Ma |
|
|
|
Customer Heterogeneity and Intertemporal Pricing |
1719-1724 |
Biyu Lv and Jiantong Zhang |
|
|
|
Learning from the Imbalanced Data Based on Quantum Evolutionary |
1725-1729 |
Kuoyi Shao, Yun Zhai, Haifeng Sui and Changsheng Zhang |
|
|
|
Failure Mode and Effects Analysis Using Dempster-Shafer Theory and D Numbers Methodology |
1731-1736 |
Yuxian Du, Xinyang Deng and Yong Deng |
|
|
|
A Threshold Proxy Blind Signature Scheme Based on CL-PKC |
1737-1742 |
Lingyun Zhao, Fangai Liu and Zhenfang Zhu |
|
|
|
Evaluation Model of Business Project Overall Risks Based on Follower Banks |
1743-1748 |
Guotai Chi and Zhanjiang Li |
|
|
|
DWCSPMDS: Mining Dual Weighted Closed Sequential Patterns over Data Streams |
1749-1754 |
Xiaobing Hao, Gaowei Han, Weina Li and Jiadong Ren |
|
|
|
Damage Simulation of 3D Four-Directional Braided Composites |
1755-1760 |
Fangfang Zhang and Cai Liu |
|
|
|
Numerical Simulation Research on Stretch-Bending Springback of Sheet Metal in Different Loading Methods |
1761-1766 |
Ruixue Zhai, Zhiping Qian and Jun Zhao |
|
|
|
Document Cluster Ensemble Method Using the Spectral Clustering |
1767-1773 |
Ye Tian and Peng Yang |
|
|
|
Research on the Reactive Power Optimization of Power System with Distributed Generation |
1775-1780 |
Baoguo Li, Weiguo Guan, Pijie Jiang and Baochun Lu |
|
|
|
|
|