


default search action
Journal of Computers, Volume 5
Volume 5, Number 1, January 2010
- Syed Mahfuzul Aziz

, Vijayan K. Asari, M. Alamgir Hossain, Mohammad A. Karim
, Mariofanna G. Milanova:
Guest Editorial. 1-3 - Syed Ishtiaque Ahmed

, Md. Ariful Islam
, Masud Hasan:
Cutting a Cornered Convex Polygon Out of a Circle. 4-11 - Ashiqur Md. Rahman, Sheik Shafaat Giasuddin, Rashedur M. Rahman

:
Decision Tree Based Routine Generation (DRG) Algorithm: A Data Mining Advancement to Generate Academic Routine and Exam-time Tabling for Open Credit System. 12-22 - Dewan Md. Farid

, Mohammad Zahidur Rahman:
Anomaly Network Intrusion Detection Based on Improved Self Adaptive Bayesian Algorithm. 23-31 - Muhammad Arifur Rahman:

Performance Evaluation for Question Classification by Tree Kernels using Support Vector Machines. 32-39 - Md. Khalilur Rhaman, Tsutomu Endo:

Recurrent Neural Network Classifier for Three Layer Conceptual Network and Performance Evaluation. 40-48 - Md. Rafiqul Islam, S. A. Ahsan Rajon:

An Enhanced Short Text Compression Scheme for Smart Devices. 49-58 - Md. Rafiqul Islam, S. A. Ahsan Rajon:

Design and Analysis of an Effective Corpus for Evaluation of Bengali Text Compression Schemes. 59-68 - Rushdi Shams, Adel Elsayed, Quazi Mah-Zereen Akter:

A Corpus-based Evaluation of a Domain-specific Text to Knowledge Mapping Prototype. 69-80 - Syed Mahfuzul Aziz

, Minh Duc Pham:
Implementation of Low Density Parity Check Decoders using a New High Level Design Methodology. 81-90
- Li Bao, Weishi Zhang, Xiong Xie:

A Formal Model for Abstracting the Interaction of Web Services. 91-98 - Turki F. Al-Somani

:
Performance Evaluation of Elliptic Curve Projective Coordinates with Parallel GF(p) Field Operations and Side-Channel Atomicity. 99-109 - Shibao Sun, Ruijuan Zheng, Qingtao Wu, Tianrui Li

:
VPRS-Based Knowledge Discovery Approach in Incomplete Information System. 110-116 - Hai Guo, Jing-ying Zhao:

NaXi Pictographs Input Method and WEFT. 117-124 - Yaobin Liu

, Li Wan:
A Systematic Decision Criterion for Urban Agglomeration: Methodology for Causality Measurement at Provincial Scale. 125-130 - Jingjun Zhang, Liya Cao, Weize Yuan, Ruizhen Gao, Jingtao Li:

Application of improved Fuzzy controller for Smart Structure. 131-138 - Shouyun Liang, Xiangxian Ma, Haifeng Zhang:

Numerical Simulation of Snow Drifting Disaster on Embankment Project. 139-143 - Zhiqiang Chen, Jianfei Chen:

The Simulation of Extraterrestrial Solar Radiation Based on SOTER in Zhangpu Sample Plot and Fujian Province. 144-149 - Shang Gao, Zaiyue Zhang, Cungen Cao:

Multiplicate Particle Swarm Optimization Algorithm. 150-157 - Yu Chen:

Research and Design of Intelligent Electric Power Quality Detection System Based on VI. 158-165
Volume 5, Number 2, February 2010
- Qihai Zhou, Peng Wang:

Guest Editorial. 167-168 - Qihai Zhou, Yan Li:

Isomorphic New Parallel Division Methods and Parallel Algorithms for Giant Matrix Transpose. 169-177 - Peng Wang:

Algorithm Dynamics Analysis Method. 178-185 - Hongqiao Yang, Kecheng Liu, Weizi Li

:
Adaptive Requirement-Driven Architecture for Integrated Healthcare Systems. 186-193 - Hui Feng, Zeqi Yu:

A 105 dB DR, -101 dB THD+N Sigma-Delta Audio D/A converter with A Noise-shaping Dynamic Element Matching Technique. 194-201 - Yurong Li, Zhengdong Du, Hongguang Fu:

Adaptive Extraction of Principal Colors Using an Improved Self-Growing Network. 202-209 - Jun Lu, Tong Wang, Daxin Liu:

Study on Optimization Technology in Computing Ordinal Number. 210-217 - Qiang Liu, Binqiang Wang, Wanwei Huang, Nan Jiang:

Research on the Reconfiguration Router Unit Component Composition Technology Based on the Agent. 218-225 - Yongquan Zhou, Xingqiong Wei:

A Novel Numerical Computation Method Based on Particle Swarm Optimization Algorithm. 226-233 - Wenqing Zhao, Bo Jiang:

Nonlinear Combinational Forecasting Based on Support Vector Machine. 234-241 - Junjie Wu, Xuejun Yang:

Optimizing the Management of Reference Prediction Table for Prefetching and Prepromotion. 242-249 - Qilin Li, Mingtian Zhou:

The Future-Oriented Middleware Technology. 250-257 - Kewen Li, Zilu Zhang, Jisong Kou:

Breeding Software Test Data with Genetic-Particle Swarm Mixed Algorithm. 258-265 - Weizi Li

, Kecheng Liu, Shuzhang Li, Hongqiao Yang:
A Semiotic Multi-Agent Modeling Approach for Clinical Pathway Management. 266-273 - Xianjin Zha, Minghong Chen:

Study on Early Warning of Competitive Technical Intelligence Based on the Patent Map. 274-281 - Qingsheng Zhu, Yanxia Wang, Huijun Liu:

Edges Extraction Method based on Fractal and Wavelet. 282-289 - Guangjun Song, Zhongxiao Hao, Chunjuan Wang:

The research of fuzzy segment query under the spatial database. 290-297 - Cheng Zhang, Qingsheng Zhu, Ziyu Chen:

Game-based Data-Forward Decision Mechanism for Opportunistic Networks. 298-305 - Zhenghong Xiao, Zhigang Chen, Xiaoheng Deng:

Anomaly Detection Based on a Multi-class CUSUM Algorithm for WSN. 306-313 - Huiying Gao, Jinghua Zhao:

Ontology-based Enterprise Content Retrieval Method. 314-321 - Wenyu Chen, Xiaobin Wang, Xiaoou Cheng, Shixin Sun:

Analysis of Valid Closure Property of Formal Language. 322-329
Volume 5, Number 3, March 2010
- Liang Hu, Zheli Liu, Xiaochun Cheng

:
Efficient Identity-based Broadcast Encryption without Random Oracles. 331-336 - Abdoul Rjoub, Al-Mamoon Al-Othman:

The Influence of the Nanometer Technology on Performance of CPL Full Adders. 337-344 - Guiwu Wei:

Some Arithmetic Aggregation Operators with Intuitionistic Trapezoidal Fuzzy Numbers and Their Application to Group Decision Making. 345-351 - Sandip Patel, Jigish Zaveri

:
A Risk-Assessment Model for Cyber Attacks on Information Systems. 352-359 - Anderson Pereira Correia, Carlos H. Llanos

, Rodrigo Willians de Carvalho, Sadek Crisóstomo Absi Alfaro
, Carla Koike, Edward David Moreno:
A Control Design Approach for Controlling an Autonomous Vehicle with FPGAs. 360-371 - Malay Kishore Dutta

, Phalguni Gupta, Vinay K. Pathak:
Audio Watermarking Using Pseudorandom Sequences Based on Biometric Templates. 372-379 - Qisong Chen, Xiaowei Chen, Yun Wu:

Optimization Algorithm with Kernel PCA to Support Vector Machines for Time Series Prediction. 380-387 - Minqiang Pan, Dehuai Zeng, Gang Xu:

Temperature Prediction of Hydrogen Producing Reactor Using SVM Regression with PSO. 388-393 - Feng Sun, Lihui Wang, Gang Wang, Gang Liu:

Study on the Drift of Modulated Phase in Interference Fiber Optic Gyroscope. 394-400 - Jingjun Zhang, Lili He, Ercheng Wang:

Active Vibration Control of Piezoelectric Intelligent Structures. 401-409 - Xiangde Guo, Zhezhao Zeng:

The Neural-Network Approaches to Solve Nonlinear Equation. 410-416 - Zhenmei Li, Jin Shen, Peiyu Wei, Tianze Li:

Voltage Fluctuation and Flicker Monitoring System Using LabVIEW and Wavelet Transform. 417-424 - Xiao Zheng, Guoxiang Lin, Jingzhou Wang, Yaxin Zhang:

Particles Swarm Optimization Based Parameter Identification of Nonlinear Viscoelastic-Plastic Constitutive Equation of Soybean and Cottonseed. 425-431 - Zhi-Hua Hu

, Bin Yang, You-Fang Huang:
A Decision Support System for Tobacco Distribution Partition Optimization Based on Immune Co-Evolutionary Algorithm. 432-439 - Liping An, Lingyun Tong:

Binary Relations as a Basis for Rule Induction in Presence of Quantitative Attributes. 440-447 - Zhenguo Xiao, Xin Tian:

Neuronal Ensemble Coding of Spike Trains in the Hippocampus CA3 via Small-world Network. 448-455 - Liang Shan, Zhong Liu, Zhiquan Wang:

A New MLS Chaotic System and its Backstepping Sliding Mode Synchronization Control. 456-463 - Xiangzheng Xu, Baichao Chen:

Research on Synthesis Control of Power Quality for Electrified Railway. 464-470 - Wang Zuo:

An Intelligent Multi-Port Memory. 471-478 - Ping He:

Design of Interactive Learning System Based on Intuition Concept Space. 479-487
Volume 5, Number 4, April 2010
- Fei Yu, Chin-Chen Chang, Guangxue Yue, Jiexian Zeng, Wen Chen:

Guest Editorial. 489-491 - Shukui Zhang, Zhiming Cui, Sheng-Rong Gong, Quan Liu, Jianxi Fan:

A Data Aggregation Algorithm Based on Splay Tree for Wireless Sensor Networks. 492-499 - Xuefeng Xian, Pengpeng Zhao, Yuanfeng Yang, Jie Xin, Zhiming Cui:

Efficient Selection and Integration of Hidden Web Database. 500-507 - Zhihong Li, Tao Zhu, Fang Luo:

A Study on the Influence of Organizational Climate on Knowledge-Sharing Behavior in IT Enterprises. 508-515 - Yuxiang Dong, Yunni Xia, Tianhao Sun, Qingsheng Zhu:

Modeling and performance evaluation of service choreography based on stochastic Petri net. 516-523 - Wei Cheng, Zhenhua Tan, Zhiliang Zhu, Guiran Chang:

The Design of Serial ATA Bus Control Chip. 524-532 - Changbing Jiang

:
Research on Logistics Network Infrastructure Based on HCA and DEA-PCA Approach. 533-540 - Yuhang Gao, Tianjie Cao:

Memory Forensics for QQ from a Live System. 541-548 - Yonghui Wu, Yuxin Ding, Xiaolong Wang, Jun Xu:

On-line Hot Topic Recommendation Using Tolerance Rough Set Based Topic Clustering. 549-556 - Cunhua Qian, Yingyan Huang, Xufeng Zhao, Toshio Nakagawa:

Optimal Backup Interval for a Database System with Full and Periodic Incremental Backup. 557-564 - Yong Liu, Jianzhong Li, Jinghua Zhu, Hong Gao:

Mining Top-K Graph Patterns that Jointly Maximize Some Significance Measure. 565-572 - Xixiang Zhang, Guangxue Yue, Xiaojing Liu, Fei Yu:

A New Judging and Revising Method for Ordinal Consistency of Fuzzy Judgment Matrix. 573-580 - Zhibin Liu, Shuanghai Li:

A Hybrid Intelligent Learning Algorithm to Identify the ECNS Based on FBP Optimized by GA. 581-588 - Rui Li, Hongwei Li, Fasong Wang:

Dependent Component Analysis: Concepts and Main Algorithms. 589-597
- Xiaoyong Liu, Hui Fu:

An Effective Clustering Algorithm With Ant Colony. 598-605 - Zhezhao Zeng, Dongmei Lin, Lulu Zheng:

Novel algorithms solving nonlinear equation in very large scope. 606-613 - Xuemei Li, Ming Shao, Lixing Ding, Gang Xu, Jibin Li:

Particle Swarm Optimization-based LS-SVM for Building Cooling Load Prediction. 614-621 - Zhu-Chao Yu, Zhi-Ping Fan:

Dynamics Modeling and Simulation of System Catastrophe in Knowledge Collaboration Complexity Network. 622-630 - Wangqiang Niu

, Jianxin Chu, Wei Gu:
Robust Tension Control of the Anchor Chain of the Ship Windlass under Sea Wind. 631-637 - Jimin Li, Wei Zhang, Kunlun Li:

A Novel Semi-supervised SVM Based on Tri-training for Intrusition Detection. 638-645 - Guoli Zhang, Siyan Wang, Yang Li:

A Self-adaptive Genetic Algorithm Based on the Principle of Searching for Things. 646-653 - Shibin Zhou, Zhao Cao, Yushu Liu:

Classifying Documents with Maximum Likelihood Approximation of the Dirichlet Multinomial Gibbs Model. 654-661
Volume 5, Number 5, May 2010
- Jiangqing Wang, Rongbo Zhu:

Handwritten Nushu Character Recognition Based on Hidden Markov Model. 663-670 - Kunlun Li, Xuerong Luo, Ming Jin:

Semi-supervised Learning for SVM-KNN. 671-678 - Kyungmi Lee:

Exploration on Feature Extraction Schemes and Classifiers for Shaft Testing System. 679-686 - Qian Zhang, Zhen Li:

Design of Grid Resource Management System Based on Information Service. 687-694 - Qi-Wen Ran, Hui Zhao, Gui-Xia Ge, Jing Ma, Li-Ying Tan:

Sampling Theorem Associated with Multiple-parameter Fractional Fourier Transform. 695-702 - Wei Li, Zhengang Zhang:

The Optimized Comparison of The Gray Model Improved by Posterior-error-test and SVM Modified by Markov Residual Error in The Long-medium Power Load Forecast. 703-708 - Zhongying Zhao

, Shengzhong Feng, Qingtian Zeng, Jianping Fan, Xiaohong Zhang:
Personalized Knowledge Acquisition through Interactive Data Analysis in E-learning System. 709-716 - Jianxia Liu, Nan Li, Keming Xie:

Application of Chaos Mind Evolutionary Algorithm in Antenna Arrays Synthesis. 717-724 - Zhenbing Liu, Jianguo Liu, Guoyou Wang:

An Arbitrary-length and Multiplierless DCT Algorithm and Systolic Implementation. 725-732 - Weiwei Fang, Bingru Yang, Dingli Song:

Preserving Private Knowledge In Decision Tree Learning. 733-740 - Hong Men, YuHong Li, Fang-Bao Tian

:
The Parameter's Effect on the Stability in Microbial Growth Model. 741-748 - Bailiang Cheng, Guosun Zeng, Anquan Jie:

Adding Branching Temporal Dimension to Qualitative Coalitional Games with Preference. 749-756 - Zhen Guo, Yanling Hao, Feng Sun:

A New Method to Improve the Maneuver Capability of AUV Integrated Navigation Systems. 757-764 - Ziran Zheng, Xiyu Liu, Lizi Yin, Zhaocheng Liu:

A Hybrid Password Authentication Scheme Based on Shape and Text. 765-772 - Peng Li, Xinhan Huang, Min Wang:

A New Hybrid Method for Mobile Robot Dynamic Local Path Planning in Unknown Environment. 773-781 - Hongmei Liao, Qianping Wang, Guoxin Li:

A Reliable Fuzzy Theory based Reputation System in Grid. 782-790 - Chunsheng Li, Yaonan Wang, Hai-Dong Yang:

Combining Fuzzy partitions Using Fuzzy Majority Vote and KNN. 791-798 - Quan Sun, Hao Cao, Jianxin You:

Factors influencing the adoption of mobile service in China: An integration of TAM. 799-806 - Xu An Wang

, Xiaoyuan Yang, Jindan Zhang:
Provable Secure Generalized Signcryption. 807-814 - Shouming Chen

, Jie Li:
Examining Consumers' Willingness to Buy in Chinese Online Market. 815-824
Volume 5, Number 6, 2010
- Yun Liu, Fei Yu, Chin-Chen Chang, Dongfeng Yuan, Yiqin Lu:

Guest Editorial. 825-827
- Chu-Jiao Wang, Shi-Xiong Xia, Hai-zhi Wang:

A Study of Fault Diagnostic based on Artifcial Immune Systems. 828-835 - Yaping Lu, Yunjia Wang, Houquan Liu:

An Interest Management Architecture by ALM and Region Partition for Large-Scale Distributed Virtual Environment. 836-843 - Wuying Liu, Ting Wang:

Index-based Online Text Classification for SMS Spam Filtering. 844-851 - Jian Shu, Yebin Chen, Linlan Liu, Sheng Zhang, Jun Li:

Study on Aggregation Tree Construction Based on Grid. 852-860 - Chunxiao Ye, Xiang Li:

An Auto-revocation Supported Delegation Model. 861-869 - Lei Liu, Sen Zhang, Lu Hong Diao, Cungen Cao:

An Iterative Method of Extracting Chinese ISA Relations for Ontology Learning. 870-877 - Guozhu Liu, Yanjun Shang:

Unknown Virus Detection Method Amalgamation Genetic Algorithm into Ant Colony Algorithm. 878-884 - Xiangguang Zhang, Yun Liu:

A Computationally Efficient Super-Resolution Reconstruction Algorithm Based On The Hybird Interpolation. 885-892
- Ying Xiao, Xuange Peng, Ming Leng, Bing Zhu:

The Research of Image Collection Method for Sediment Online-Detection. 893-900 - Yifan Wu, Behrouz Nowrouzian, Syed Bokhari:

A Novel Diversity-Controlled Genetic Algorithm for Optimization of BIBO Stable Digital IF Filters Over CSD Multiplier Coefficient Space. 901-913 - Ximing Liang, Xiang Li:

A New Decentralized Planning Strategy for Flocking of Swarm Robots. 914-921 - Xuejun Wu:

The Scheduling Model for Disabilities Transfer in Airports. 922-926 - Hai Guo, Jing-ying Zhao:

Chinese Minority Script Recognition Using Radial Basis Function Network. 927-934 - Limin Meng, Kai Zhou, Zhijiang Xu, Jingyu Hua:

Research on Qos Protocol Based on Quantum State Algorithm for MANET. 935-939 - Benjamin J. Ford, Haiping Xu, Christopher K. Bates, Sol M. Shatz:

Visual Specification of Layered Bidding Strategies for Autonomous Bidding Agents. 940-950 - Minghua Zhu, Xiumin Fan, Huanchong Cheng, Qichang He:

Modeling and Simulation of Automated Container Terminal Operation. 951-957 - Lizhe Wang, Jie Tao, Gregor von Laszewski

, Holger Marten:
Multicores in Cloud Computing: Research Challenges for Applications. 958-964 - Yongquan Zhou, Shengyu Pei:

A Hybrid Co-evolutionary Particle Swarm Optimization Algorithm for Solving Constrained Engineering Design Problems. 965-972 - Jianyong Chen, Cunying Hu, Huawang Zeng:

A Novel Model for Evaluating Optimal Parameters of Security and Quality of Service. 973-978 - Xu Xu, Jie Lin:

Strategic Supplier Network for Supplier Selection. 979-986
Volume 5, Number 7, 2010
- Xiang Fu, Jie-xian Zeng:

Local Features Based Image Sequence Retrieval. 987-994 - Xuefeng Xian, Zhiming Cui, Pengpeng Zhao, Yuanfeng Yang, Guangming Zhang:

Utility Maximization Model for Deep Web Source Selection and Integration. 995-1002 - Chuanfeng Li, Yongji Wang, Lingling Tang, Zongzhun Zheng:

Research on Programming Algorithm of Trajectory for Hypersonic Vehicles Based on Particle Swarm Optimization. 1003-1010 - Qiaorong Zhang, Haibo Liu, Jing Shen, Guochang Gu, Huimin Xiao:

An Improved Computational Approach for Salient Region Detection. 1011-1018 - Fengchen Huang, Jing Ling, Aiye Shi, Lizhong Xu:

A Band Selection Method For Hyperspectral Images Using Choquet Fuzzy Integral. 1019-1026 - Yuanbin Wang

, Bin Zhang, Tianshun Yao:
An Algebraic Method for Estimating the Fundamental Matrix with Rank Constraint. 1027-1037 - Zhaohui Zeng, Yajun Liu:

Construction of High Performance Balanced Symmetric Multifilter Banks and Application in Image Processing. 1038-1045 - Zhihong Li, Zhu Tao, Wendi Lai:

A Study on the Knowledge Diffusion of Communities of Practice Based on the Weighted Small-world Network. 1046-1053 - Xinming Zhang, Lin Yan:

A Fast Image Thresholding Method Based on Chaos Optimization and Recursive Algorithm for Two-Dimensional Tsallis Entropy. 1054-1061 - Chunting Yang, Yang Liu, Jing Yu:

Automatic Pronunciation Assessment for Mandarin Proficiency Test Based on HMM. 1062-1069 - Bing He, Liu Cheng:

A Quad Tree Based Self-collision Detection Method for Cloth Simulation. 1070-1077 - Hao Wang, Qiuliang Xu, Xiufeng Zhao:

Generalized Hierarchical Identity-Based Signcryption. 1078-1085 - Chuan-pei Xu, Xue-yun Lu, Cong Hu:

TAM/wrapper Co-optimization And Test Scheduling For SOCs Based On Hybrid Genetic Algorithm. 1086-1093 - Mohammad Reza Lavvafi, S. Amirhassan Monadjemi, Payman Moallem

:
Film Colorization, Using Artificial Neural Networks and Laws Filters. 1094-1099 - Hengwu Li:

Fast Algorithm for Pseudoknotted RNA Structure Prediction. 1100-1104 - Ling Li, Ming Li, Yuming Lu, Yongliang Zhang:

A New Multi-Objective Genetic Algorithm for Feature Subset Selection in Fatigue Fracture Image Identification. 1105-1111 - Taoying Li, Yan Chen:

Fuzzy Clustering Ensemble with Selection of Number of Clusters. 1112-1119 - Cheng Chao, Yonglong Luo

, Wenjuan Cheng:
Research on the Problem of Privacy-Preserving Closest Pair. 1120-1124 - Jianfeng Li, Jun Zhai, Yan Chen, Shuyong Liu:

System Dynamic Simulation Approach for Supply Chain with Capability Limit. 1125-1132 - Wei Chen, Zhiying Wang, Dan Chen:

An Emulator for Executing IA-32 Applications on ARM-Based Systems. 1133-1141
Volume 5, Number 8, 2010
- Dan Zhang, Bale Reddy:

Guest Editorial. 1143
- Yongquan Zhou, Shengyu Pei:

An Effective Adaptive Multi-objective Particle Swarm for Multimodal Constrained Function Optimization. 1144-1151 - Yongfeng Yin, Bin Liu, Duo Su:

Research on Formal Verification Technique for Aircraft Safety-Critical Software. 1152-1159 - Yuan Ren, Guangchen Bai:

Determination of Optimal SVM Parameters by Using GA/PSO. 1160-1168 - Xianfeng Huang, Guohua Fang:

Water Resources Allocation Effect Evaluation Based on Chaotic Neural Network Model. 1169-1176 - Xiaohui Rong, Feng Chen, Pan Deng, Shilong Ma:

A Large-Scale Device Collaboration Performance Evaluation Approach Based-on Dynamics. 1177-1184 - Zheng Liu:

Annotating Web Image using Parallel Graph Bipartition and Word Clustering. 1185-1192 - Congfeng Jiang, Jian Wan, Xindong You, Yinghui Zhao:

Power Aware Job Scheduling in Multi-Processor System with Service Level Agreements Constraints. 1193-1203 - Feng Chen, Xiaohui Rong, Pan Deng, Shilong Ma:

Transaction in Large-scale Device Collaborative System. 1204-1212 - Xilong Qu, Zhongxiao Hao:

The Entropy Model of Fractal Supply Chain Network System Based on Fuzzy AHP. 1213-1218 - Ye Du, Ruhui Zhang, Youyan Guo:

A Useful Anomaly Intrusion Detection Method Using Variable-length Patterns and Average Hamming Distance. 1219-1226
- Liping Wang:

Empirical Study on the Effect of Trade Protection on Chinese Textiles Exporting based on Trade Gravity Model. 1227-1234 - Herui Cui:

Research on the Price Risk Management in China Agricultural Products. 1235-1239 - Yu Zhao, Chunjie Qi:

Simulation of Transaction Behavior and Price Volatility in Chinese Soybean Futures Market Using MVAR Model. 1240-1247 - Ruxing Xu, Dan Wu, Shenghong Li:

Dynamic Investment under Asymmetric Information. 1248-1255 - Hongchang Ke, Hui Wang, Hongwei Zhao, Kaiyu Liang:

Visual Mental Imagery Memory Model Based on Weighted Directed Graph. 1256-1263 - Hua Jiang, Junhu Ruan:

Applying Rough Set Theory to Evaluate Network Marketing Performance of China's Agricultural Products. 1264-1272 - Huawang Shi, Wanqing Li, Yong Deng

:
Applying Principal Component Analysis and Unascertained Method for the Analysis of Construction Accident Risk. 1273-1280 - Malin Song:

The Productivity of Listed Companies of Computers and Related Equipment Manufacturing Industry. 1281-1288 - Shuqi Wang, Jian Liu, Sen Wang, Zhizhong Li:

Grounding Grid Corrosion Diagnosis and Uncertainly Analysis of Branches. 1289-1295
Volume 5, Number 9, 2010
- Lanfranco Lopriore:

Page Protection in Multithreaded Systems. 1297-1304 - Vandana Dixit Kaushik, Vinay K. Pathak, Phalguni Gupta:

Geometric Modeling of 3D-Face Features and Its Applications. 1305-1314 - Yingjie Xia, Mingzhe Zhu, Yang Li:

Towards Topology-and-Trust-Aware P2P Grid. 1315-1321 - Salman Yussof

, Ong Hang See:
A Robust GA-based QoS Routing Algorithm for Solving Multi-constrained Path Problem. 1322-1334 - Zhanli Hu, Jing Zou

, Jianbao Gui, Junyan Rong, Yanming Li, Dongxing Xi, Hairong Zheng:
Real-Time Visualization and Interaction of Three-dimensional Human CT Images. 1335-1342 - Jianwu Wu:

Functional Verification Methodology of Complex Electronics System Based Modeling and Simulation. 1343-1347 - Guiyang Li, Tao Li, Jie Zeng, Haibo Li:

An Outlier Robust Negative Selection Algorithm Inspired by Immune Suppression. 1348-1355 - Changjun Zhu, Enhui Jiang, Lianjun Zhao:

A Study on Roughness Coefficient Using BP Neural Network. 1356-1363 - Li Yang, Malin Song:

Coal Mine Safety Evaluation with V-Fold Cross-Validation and BP Neural Network. 1364-1371 - Jian Li:

A Combination of PSO and SVM for Road Icing Forecast. 1372-1379 - Shibing You, Bi Wu, Malin Song:

A Qualitative Study on the Value of Governmental Economic Service. 1380-1387 - Xianzhang Feng:

Testing Research of Liner Stress in Process of Side Pressing. 1388-1393 - Bin Wang, Jinkuan Wang, Xin Song, Yinghua Han:

Temporal Difference Learning Waveform Selection. 1394-1401 - Yu Shen, Cheng-Bo Yu:

To Design Logic Circuits by Using Symmetrical Coordinate. 1402-1409 - Zhi-Hua Hu

:
Multi-Signal Cooperative Decision for Emergency Management Inspired by Immune system. 1410-1416 - Changjun Zhu, Shuwen Li:

Numerical Simulation of River Water Pollution using Grey Differential Model. 1417-1423 - Shuai Wang, Yindong Ji, Shiyuan Yang:

A Stochastic Combinatorial Optimization Model for Test Sequence Optimization. 1424-1435 - Chung-Chi Wu, Yung-Nan Hu:

Image Recognition for PCB Soldering Platform Controlled by Embedded Microchip Based on Hopfield Neural Network. 1436-1443 - Huanqi Tao, Wencong Liu:

Measurement System for Liquid Level based on Laser Triangulation and Angular Tracking. 1444-1447 - Chunlai Chai, Biwei Li:

A Novel Association Rules Method Based on Genetic Algorithm and Fuzzy Set Strategy for Web Mining. 1448-1455
Volume 5, Number 10, 2010
- Mohamed Masmoudi

:
Guest Editorial. 1457-1458
- Francisco J. Escribano

, Luis López, Miguel A. F. Sanjuán
:
Analysis of Chaos-Based Coded Modulations under Intersymbol Interference. 1459-1467 - Aymen Ladhar, Mohamed Masmoudi

:
Extraction and Simulation of Intra-gate Defects Affecting CMOS Libraries. 1468-1477 - Asma Maalej

, Manel Ben-Romdhane
, Chiheb Rebai
, Patricia Desgreys, Patrick Loumeau, Adel Ghazel:
Pseudorandom Direct Sampler for Non-Uniform Sub-sampling Architecture in a Multistandard Receiver. 1478-1485 - Kostadin Tzvetkov, Andrzej Tarczynski

:
On Digital Filtering of Band-limited Signals Using Lower Sampling Rates. 1486-1493 - Manel Ben-Romdhane

, Aymen Abeda, Chiheb Rebai
:
Digital High Order Multiplier-free Delta Sigma Modulator for Multistandard Fractional-N Frequency Synthesizer. 1494-1501 - Leandro Zafalon Pieper, Eduardo A. C. da Costa

, Sérgio J. M. de Almeida, Sergio Bampi
, José C. Monteiro
:
Efficient Dedicated Multiplication Blocks for 2's Complement Radix-2m Array Multipliers. 1502-1509
- Ling Shang, Maxime R. Hugues, Serge G. Petiton:

A Fine-grained Task Based Parallel Programming Paradigm of Gauss-Jordan Algorithm. 1510-1519 - Neelam Goyal

, Mukesh Kumar
, Renu Vig
:
Consistency Enforcement Using Ontology on Web. 1520-1526 - Chwen-Yea Lin, Kwoting Fang, Chien-Chung Tu:

Predicting Consumer Repurchase Intentions to Shop Online. 1527-1533 - Qi Li, Wei Ba

:
A Novel Partitioned Scheduling Algorithm of Constrained-deadline Sporadic Task Systems on Multiprocessors. 1534-1542 - Changfeng Wang

, Peng Zhang:
A Simulation Model for the Main Factors Affecting Business Innovation Performance. 1543-1551 - Sue Ellen Haupt, Robert F. Kunz

, Leonard Joel Peltier
, James J. Dreyer:
Computational Fluid Dynamics Coupled with Thermal Impact Model for Building Design. 1552-1559 - Ahmed S. Ghiduk

:
Automatic Generation of Object-Oriented Tests with a Multistage-Based Genetic Algorithm. 1560-1569 - Tangkeshwar Thokchom, P. K. Bansal, Renu Vig

, Seema Bawa:
Recognition of Handwritten Character of Manipuri Script. 1570-1574 - Lichun Jiang, Yaoxiang Li:

Application of Nonlinear Mixed-Effects Modeling Approach in Tree Height Prediction. 1575-1581 - Shaohua Tao, Zhili Zhang, Shengli Tian:

Properties of Self-similarity Networks. 1582-1589 - Jun Zhi, Jianyong Liu, Cheng-qun Fu:

Damage Effect Assessment of Battlefield Target Based on PSO and Multiple Neural Network Fusion Algorithm. 1590-1596 - Hong Zhou:

The Study on Secure Strategy for Knowledge Management. 1597-1605 - Jianfu Li, Weiguo Gong:

Real Time Pedestrian Tracking using Thermal Infrared Imagery. 1606-1613 - Aimin Yang, Guanghua Zhao, Yuhuan Cui, Jingguo Qu:

The Improvement of Parallel Predict-Correct Gmres(m) Algorithm and It's Application for Thin Plate Structures. 1614-1619
Volume 5, Number 11, 2010
- Changda Wang, Shiguang Ju:

A Novel Method to Implement Book Cipher. 1621-1628 - Junping Liu, Ke Zhou, Zhikun Wang, Liping Pang, Dan Feng:

Modeling the Impact of Disk Scrubbing on Storage System. 1629-1637 - Zuowen Tan:

An E-Cash Scheme Based on Proxy Blind Signature from Bilinear Pairings. 1638-1645 - Xiao Xu, Weizhe Zhang, Hongli Zhang, Binxing Fang:

Exploiting Location-aware Mechanism for Distributed Web Crawling over DHTs. 1646-1654 - Zhongsheng Qian:

Test Case Generation and Optimization for User Session-based Web Application Testing. 1655-1662 - Ming He, Yongping Du:

Uncertain Queries Processing in Probabilistic Framework. 1663-1669 - Taoying Li, Yan Chen:

Fuzzy K-Means Incremental Clustering Based on K-Center and Vector Quantization. 1670-1677 - Youwen Zhu, Liusheng Huang, Wei Yang, Fan Dong:

Privacy Preserving Aggregate Query of OLAP for Accurate Answers. 1678-1685 - Juncheng Wang, Zhenzhen Fu, Jun Cheng, Feicheng Ma:

The Measurement of Relative Recall with Weights: a Perspective of User Feedback. 1686-1692 - Yalan Yan

, Xianjin Zha:
Applying OWL to Build Ontology for Customer Knowledge Management. 1693-1699 - Rongdong Yu, Yin Zhang, Sanyuan Zhang, Patricia Chiang, Yiyu Cai, Jianmin Zheng

, Koon Hou Mak:
GPU Accelerated Simulation of Cardiac Activities. 1700-1705 - Siguang Chen, Meng Wu, Weifeng Lu:

Resisting Malicious Attacks via Secure Network Coding and Incentive Compatible Mechanism in Multihop Wireless Networks. 1706-1714 - Kaipeng Liu, Binxing Fang, Weizhe Zhang:

Unsupervised Tag Sense Disambiguation in Folksonomies. 1715-1722 - Hua-Qing Zhou, Sheng-Hui Dai:

Wavelet Descriptor for Closed Curves Detection in Complex Background. 1723-1730 - Xianhui Wang, Zheng Qin, Xuanping Zhang:

Automatically Affinity Propagation Clustering using Particle Swarm. 1731-1738 - Yang Liu, Chunting Yang:

Automatic Grading System for Mandarin Proficiency Test based on PSO-ANN. 1739-1746 - Long Wang, Yanheng Liu, Xiaoguang Li, Jian Guan, Qi Song:

Analog Circuit Fault Diagnosis Based on Distributed Neural Network. 1747-1754 - Yishi Zhang

, Zigang Zhang
, Kaijun Liu, Gangyi Qian:
An Improved IAMB Algorithm for Markov Blanket Discovery. 1755-1761 - Xin-Zheng Wang, Xiao-chen Duan, Jing-yan Liu:

Application of Neural Network in the Cost Estimation of Highway Engineering. 1762-1766 - Yulin Ma

, Xinping Yan, Qing Wu, Rui Zhang:
Research on Intelligent Vehicle platoon Driving Simulation Experiment System under the Coordination between Vehicle and Highway. 1767-1774
Volume 5, Number 12, 2010
- Syed Mahfuzul Aziz

, Vijayan K. Asari, M. Alamgir Hossain, Mohammad A. Karim
, Mariofanna G. Milanova:
Guest Editorial. 1775-1778
- Salena Akter, Mozammel H. A. Khan

:
Multiple-Case Outlier Detection in Multiple Linear Regression Model Using Quantum-Inspired Evolutionary Algorithm. 1779-1788 - Mohammad Ashiqur Rahman

, Md. Mostofa Akbar:
A Permission Based Hierarchical Algorithm for Mutual Exclusion. 1789-1799 - Kazi Shah Nawaz Ripon, Ashiqur Rahman, G. M. Atiqur Rahaman

:
A Domain-Independent Data Cleaning Algorithm for Detecting Similar-Duplicates. 1800-1809 - Razan Paul, Abu Sayed Md. Latiful Hoque:

Search Efficient Representation of Healthcare Data based on the HL7 RIM. 1810-1818 - M. A. H. Akhand, Pintu Chandra Shill, Kazuyuki Murase

:
Ensembles of Artificial Example based Neural Networks. 1819-1827 - Rubaiyat Islam Rafat, Kazi Muheymin Sakib:

LUC Model : A Timestamp Ordering based View Consistency Model for Distributed Shared Memory. 1828-1838 - Mohammad M. R. Chowdhury, Sarfraz Alam, Zahid Iqbal, Josef Noll:

Sociality brings Security in Content Sharing. 1839-1846 - Ramin Tajallipour, Md. Ashraful Islam, Khan A. Wahid:

Fast Algorithm of A 64-bit Decimal Logarithmic Converter. 1847-1855
- Lijun Pei, Dewang Chen

:
Modeling and Algorithms on Releasing Range of Traffic Guidance Information. 1856-1861 - Zhong-Mei Wan, Jian Weng

, Jiguo Li:
Security Mediated Certificateless Signatures Without Pairing. 1862-1869 - Adalet N. Abiyev:

Measurement of Reactive Power in Three-Phase Electric Power Systems by Use of Walsh Functions. 1870-1877 - Keke Wu, Huiyun Li, Fengqi Yu:

Retrieving Lost Efficiency of Scalar Multiplications for Resisting against Side-Channel Attacks. 1878-1884 - Shijun Li, Yunlu Zhang, Ming Xie, Hao Sun:

Belief Reasoning Recommendation -Mashing up Web Information Fusion and FOAF. 1885-1892 - Ming Cen, Yi Yan, Huasheng Dai:

General Calibration System Architecture of Automobile Electronic Control Unit. 1893-1898 - Yongjun Peng, Zhengbing Hu

, Xi Guo:
Research on the Evolution Law and Response Capability Based on Resource Allocation Model of Unconventional Emergency. 1899-1906 - Hai Zhu, Yuping Wang, Lei Fan, Xiaoli Wang:

Grid Independent Task Scheduling Multi-Objective Optimization Model and Genetic Algorithm. 1907-1915 - Jian-wen Huang, Xing-xia Wang, Rui Chen:

Genetic Algorithms for Optimization of Resource Allocation in Large Scale Construction Project Management. 1916-1924 - Jianquan Xie, Qing Xie, Lijun Tian:

A High Capacity Information Hiding Algorithm Based on Invariance Properties of JPEG Compression. 1925-1932 - Xinmin Zhou, Sichun Wang, Shuchu Xiong, Jianping Yu:

Attack Model and Performance Evaluation of Text Digital Watermarking. 1933-1941 - Yu Bao, Guosun Zeng, Ke Zhang:

Interest-driven Reasoning Based on Commitment Alternating Temporal Logic in the P2P Reputation System. 1942-1950

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














