default search action
Journal of Computers, Volume 4
Volume 4, Numbers 1, January 2009
- Fei Yu, Chin-Chen Chang, Ben M. Chen, Jian Shu, Guangxue Yue:
Editorial. 1-2 - Qian Zhao, Tianjie Cao:
Collecting Sensitive Information from Windows Physical Memory. 3-10 - Chih-Chien Wang, Chun-An Chen, Jui-Chin Jiang:
The Impact of Knowledge and Trust on E-Consumers' Online Shopping Activities: An Empirical Study. 11-18 - Yang Lu, Jiguo Li, Junmo Xiao:
Constructing Efficient Certificate-based Encryption with Paring. 19-26 - Shu Chen, Guo Qing Wu:
Modeling and Analysis of Workflow Based on TLA. 27-34 - Yun Wu, Yong Zhao, Ling Shen:
The Analysis and Design of Nearly-Orthogonal Symmetric Wavelet Filter Banks. 35-44 - Suying Yang, Jianzhe Tai, Cheng Shao:
Dynamic Partition of Elevator Group Control System with Destination Floor Guidance in Up-peak Traffic. 45-52 - Xiaojun Jia, Guangxue Yue, Fang Mei:
The Mathematical Model and Applications of Coded Structured Light System for Object Detecting. 53-60 - Tianjie Cao, Shi Huang, Hui Cui, Yipeng Wu, Qihan Luo:
Controlled Secret Leakage. 61-68 - Zhibin Liu, Xiangsong Meng:
Integration of Improved BPNN Algorithm and Multistage Dynamic Fuzzy Judgement and Its Application on ESMP Evaluation. 69-76 - Dawei Wang, Peng Zhao, Sikun Li:
System Level Distributed Cooperative Design of Media SoC Using Application Profiling. 77-85 - Guang Zheng, Lian Li, Wenbo Chen, Anping He, Jinzhao Wu:
Process Algebra with Chaos Executing Policy for Unhealthy Systems. 86-93 - Bangzuo Zhang, Wanli Zuo:
Reliable Negative Extracting Based on kNN for Learning from Positive and Unlabeled Examples. 94-101
Volume 4, Numbers 2, February 2009
- Feng Xia, Longhua Ma, Wenhong Zhao, Youxian Sun, Jinxiang Dong:
Enhanced Energy-Aware Feedback Scheduling of Embedded Control Systems. 103-111 - Yi-Shiung Yeh, Ting-Yu Huang, Han-Yu Lin, Yu-Hao Chang:
A Study on Parallel RSA Factorization. 112-118 - Mohammad Hossein Moaiyeri, Reza Faghih Mirzaee, Keivan Navi:
Two New Low-Power and High-Performance Full Adders. 119-126 - Chiang S. Jao, Cathy M. Helgason, Donna A. Zych:
Implementing a Computerized Charge Capture System to Improve Billing Work Flow and Reduce Errors in Data Entry. 127-134 - Asli Celikyilmaz, I. Burhan Türksen:
A Genetic Fuzzy System Based On Improved Fuzzy Functions. 135-146 - Hazem M. Abbas:
System Identification Using Optimally Designed Functional Link Networks via a Fast Orthogonal Search Technique. 147-153 - V. Amudha, B. Venkataramani, R. Vinoth Kumar, S. Ravishankar:
Software/Hardware Co-design of HMM Based Speaker Independent Isolated Digit Recognition System. 154-159 - Zhangjun Huang, Chengen Wang, Mingxu Ma:
A Robust Archived Differential Evolution Algorithm for Global Optimization Problems. 160-167 - Nuttaka Homsup, Terapass Jariyanorawiss, Wiroj Homsup:
FDTD Simulation of a Mobile Phone Operating Near a Metal Wall. 168-175
Volume 4, Numbers 3, March 2009
- Qi Luo, Ben K. M. Sim:
Editorial. 177-178 - Weixiang Wang, Youlin Shang:
A New T-F Function Approach for Discrete Global Optimization. 179-183 - Bo Meng:
A Formal Logic Framework for Receipt-freeness in Internet Voting Protocol. 184-192 - Wang Chu, Depei Qian:
Design Web Services: Towards Service Reuse at the Design Level. 193-200 - Youyao Liu, Jungang Han, Huimin Du:
DL(2m): A New Scalable Interconnection Network for System-on-Chip. 201-207 - Ling Chen, Lingjun Zou, Li Tu:
Stream Data Classification Using Improved Fisher Discriminate Analysis. 208-214 - Xinsheng Zhang, Xinbo Gao, Ying Wang:
MCs Detection with Combined Image Features and Twin Support Vector Machines. 215-221 - Wei-Peng Liu, Jun Hu, Xing Zhang:
A Novel Secure Terminal System Based on Trusted Hardware: U-Key. 222-229 - Yong Zhou, Youwen Li, Shixiong Xia:
An Improved KNN Text Classification Algorithm Based on Clustering. 230-237 - Yan Liu, Renfa Li, Cheng Xu, Fei Yu:
HW-SW Framework for Multimedia Applications on MPSoC: Practice and Experience. 238-244 - Jingtao Sun, Qiuyu Zhang, Zhanting Yuan:
Application of Refined LSA and MD5 Algorithms in Spam Filtering. 245-250 - Xianfang Wang, Zhiyong Du, Jindong Chen, Feng Pan:
Dynamic Modeling of Biotechnical Process Based on Online Support Vector Machine. 251-258 - Xiaoqiang Yang, Huimin Du, Jungang Han:
Topology and Routing Algorithm Based on the Combination Gray Code with Johnson Code. 259-264 - Peide Liu, Zhongliang Guan:
Evaluation Research on the Quality of the Railway Passenger Service Based on the Linguistic Variables and the Improved PROMETHEE-II Method. 265-270 - Peiyu Liu, Li-Wei Zhang, Zhen-fang Zhu:
Research on E-mail Filtering Based On Improved Bayesian. 271-275 - Yongqing Wei, Peide Liu:
Risk Evaluation Method of High-technology Based on Uncertain Linguistic Variable and TOPSIS Method. 276-282
Volume 4, Numbers 4, April 2009
- Prechanon Kumkratug:
Application of UPFC to Increase Transient Stability of Inter-Area Power System. 283-287 - Ye Li, Barbara J. Lence, Sander M. Calisal:
Modeling the Energy Output from an In-Stream Tidal Turbine Farm. 288-294 - Qian Zhang, Yongfei Zhang, Shi-Yin Qin:
Modeling and Analysis for Obstacle Avoidance of a Behavior-Based Robot with Objected Oriented Methods. 295-302 - Mário J. G. C. Mendes, Bruno M. S. Santos, José M. G. Sá da Costa:
Multi-agent Platform and Toolbox for Fault Tolerant Networked Control Systems. 303-310 - Thomas M. Hemmerling, Samer Charabati, Emile Salhab, David Bracco, Pierre A. Mathieu:
The Analgoscore: A Novel Score to Monitor Intraoperative Nociception and its Use for Closed-Loop Application of Remifentanil. 311-318 - Alexander M. Yemelyanov:
Modeling and Decision Support for Analysis of Operator Errors in Complex Systems. 319-329 - Jinyue Zhang:
SSWP: A Social Semantic Web Portal for Effective Communication in Construction. 330-337 - Chen-Wei Lin, Jiun-Lang Huang:
A Charge-Sensing-Capable Source Driver for TFT Array Testing in System-on-Panel Displays. 338-346 - Wenzhong Gao, Xi Chen:
Distributed Generation Placement Design and Contingency Analysis with Parallel Computing Technology. 347-354
Volume 4, Number 5, May 2009
- Luca Spalazzi, Ratan Guha:
Editorial. 355-356 - Matthias Becker, Martin Drozda, Sven Schaust, Sebastian Bohlmann, Helena Szczerbicka:
On Classification Approaches for Misbehavior Detection in Wireless Sensor Networks. 357-365 - Massimo Benerecetti, Nicola Cuomo, Adriano Peron:
TPMC: A Model Checker For Time-Sensitive Security Protocols. 366-377 - Massimo Bernaschi, Mauro Bisson, Emanuele Gabrielli, Simone Tacconi:
An Architecture for Distributed Dictionary Attacks to Cryptosystems. 378-386 - Angelo Biscotti, Gianluca Capuzzi, Egidio Cardinale, Francesco Pagliarecci, Luca Spalazzi:
An IPS for Web Applications. 387-394 - Jérémy Briffaut, Jean-François Lalande, Christian Toinard:
Security and Results of a Large-Scale High-Interaction Honeypot. 395-404 - Jianyong Dai, Ratan K. Guha, Joohan Lee:
Efficient Virus Detection Using Dynamic Instruction Sequences. 405-414 - Joni Hahkala, Henri Mikkonen, Mika Silander, John White:
A Pseudonymity System for Grids. 415-422 - Mathieu Blanc, Patrice Clemente, Jonathan Rouzaud-Cornabas, Christian Toinard:
Classification of Malicious Distributed SELinux Activities. 423-432
Volume 4, Number 6, June 2009
- Li Ming, Mingwen Wang, Deng-Yi Zhang, Chin-Chen Chang, Fei Yu:
Editorial. 433-435 - Liyi Zhang, Mingzhu Zhu, Wei Huang:
A Framework for an Ontology-based E-commerce Product Information Retrieval System. 436-443 - Jiguo Li, Lizhong Xu, Yichen Zhang:
Provably Secure Certificate-based Proxy Signature Schemes. 444-452 - Zhixin Sun, Lin Jiao:
Research of Intelligent Rule-base Based on Multilayer Intrusion Detection. 453-460 - Yuanzhuo Wang, Chuang Lin, Kun Meng, Junjie Lv:
Analysis of Attack Actions for E-Commerce Based on Stochastic Game Nets Model. 461-468 - Han Zhu:
Axiomatic Systems for the Bisimilarity on Finite Fair Ambient Processes. 469-476 - Peng Zhao, Dawei Wang, Ming Yan, Sikun Li:
Parallel Processing of Sequential Media Algorithms on Heterogeneous Multi-Processor System-on-Chip. 477-484 - Yuxiang Dong, Yunni Xia, Qingsheng Zhu, Ruilong Yang:
A Stochastic Approach to Predicting Performance of Web Service Composition. 485-493 - Huanchun Peng, Jun Gu, Xiaojun Ye:
Towards Compliance and Accountability: a Framework for Privacy Online. 494-501 - Tongyang Wang, Pengfei Yu, Jun-jun Wu, Xin-long Ma:
Research on On-card Bytecode Verifier for Java Cards. 502-509 - Ran Yang, Chuang Lin, Fujun Feng:
A Time and Mutable Attribute-Based Access Control Model. 510-518 - Yefei Zhao, Zongyuan Yang, Jinkui Xie, Qiang Liu:
Formal Model and Analysis of Sliding Window Protocol Based on NuSMV. 519-526 - Qihai Zhou, Yujun Li, Zhuma Pudu, Xun Lin:
China's E-business Model Innovation Analysis. 527-534
- Mehdi Eghbal, Naoto Yorino, Yoshifumi Zoka:
Comparative Study on the Application of Modern Heuristic Techniques to SVC Placement Problem. 535-541 - Justin L. Rice, Khalid H. Abed, Gerald R. Morris:
Design Heuristics for Mapping Floating-Point Scientific Computational Kernels onto High Performance Reconfigurable Computers. 542-553 - Evelyn Brannock, Michael Weeks, Robert W. Harrison:
The Effect of Wavelet Families on Watermarking. 554-566
Volume 4, Number 7, July 2009
- Arash Azizi Mazreah, Mohammad Taghi Manzuri, Ali Mehrparvar:
A High Density and Low Power Cache Based on Novel SRAM Cell. 567-575 - Wen-Shyong Yu:
H∞ Tracking Performance Design for Fuzzy-Model-Based Descriptor Systems Subject to Parameter Uncertainties. 576-584 - Jian Shu, Ronglei Zhang, Linlan Liu, Zhenhua Wu, Zhiping Zhou:
Cluster-based Three-dimensional Localization Algorithm for Large Scale Wireless Sensor Networks. 585-592 - Naotoshi Sugano, Shou Komatsuzaki, Hiroyuki Ono, Yuko Chiba:
Fuzzy Set Theoretical Analysis of Human Membership Values on the Color Triangle. 593-600 - Suhyeon Kim, Hyungrae Kim, Tae-Kyu Yang:
Increasing SLAM Performance by Integrating Grid and Topology Map. 601-609 - Yves-Thierry Jean-Charles, Vichate Ungvichian, Juciana A. Barbosa:
Effects of Substrate Permittivity on Planar Inverted-F Antenna Performances. 610-614 - Xinghao Jiang, Tanfeng Sun, Bin Chen, Rongjie Li, Bing Feng:
A Novel Video Content Understanding Scheme Based on Feature Combination Strategy. 615-622 - Adalet N. Abiyev:
A New Signal Processing based Method for Reactive Power Measurements. 623-630 - Hidehisa Takamizawa, Kazuhiro Saji, Masayoshi Aritsugi:
A Replica Management Protocol in a Binary Balanced Tree Structure-Based P2P Network. 631-640 - Mohammed Blej, Mostafa Azizi:
Modeling and Analysis of a Real-Time System Using the Networks of Extended Petri. 641-645 - Jun Zhang, Yuping Hu, Zhibin Yuan:
Detection of LSB Matching Steganography using the Envelope of Histogram. 646-653 - Samer Younes, Ramzi A. Haraty:
An Enhanced Quorum Selection Algorithm. 654-662 - Kirsi Helkala, Einar Snekkenes:
Password Generation and Search Space Reduction. 663-669 - Alan McCabe, Jarrod Trevathan:
Handwritten Signature Verification Using Complementary Statistical Models. 670-680 - Hongwei Li, Rui Li, Fasong Wang:
Multiresolution Subband Blind Source Separation: Models and Methods. 681-688
Volume 4, Number 8, August 2009
- Carlos Alberto Ochoa Ortíz Zezzatti, Alejandro Padilla:
Guest Editorial. 689-690 - Humberto Ochoa, Osslan Osiris Vergara-Villegas, Vianey Guadalupe Cruz Sánchez, Efrén Gútierrez:
A Hybrid System Based on a Filter Bank and a Successive Approximations Threshold for Microcalcifications Detection. 691-696 - José Mireles, Frank L. Lewis, Roberto C. Ambrosio, Edgar A. Martínez-García:
Development of a Discrete Event Controller Supervisor using a Hybrid Matrix Formulation with Fuzzy Logic Conflict Resolution. 697-704 - Ricardo Mendoza González, Miguel Vargas Martin, Jaime Muñoz Arteaga, Francisco Álvarez Rodríguez, Carlos Alberto Ochoa Ortíz Zezzatti:
Web Service-Security Specification based on Usability Criteria and Pattern Approach. 705-712 - Alberto Ochoa Ortíz, Angel Eduardo Muñoz Zavala, Arturo Hernández Aguirre:
A Hybrid System Approach to Determine the Ranking of a Debutant Country in Eurovision. 713-720 - Rodolfo A. Pazos Rangel, José Antonio Martínez Flores, Javier González B., María Lucila Morales-Rodríguez, Alberto Castro H.:
Semi-automatic Generation of Subcategorization Frames for Spanish Verbs Using Ontologies and Verbs Functional Class. 721-726 - Claudia Gómez-Santillán, Laura Cruz-Reyes, Eustorgio Meza Conde, Tania Turrubiates López, Marco Antonio Aguirre Lam, Satu Elisa Schaeffer:
Improving Distributed Resource Search through a Statistical Methodology of Topological Feature Selection. 727-733 - Simonné Suarent, Carlos Alberto Ochoa Ortíz Zezzatti, S. Jöns, Fernando Montes, Alessandra Spianetta:
Evolving Optimization to Improve Diorama's Representation using a Mosaic Image. 734-737 - Carlos Alberto Ochoa Ortíz Zezzatti, Julio Ponce, Arturo Hernández, Liang Li:
Resolution of a Combinatorial Problem using Cultural Algorithms. 738-741 - Carlos Alberto Ochoa Ortíz Zezzatti, Saúl González, Cynthia Esquivel, Girolama Matozzi, Abigaíl Maffucci:
Musical Recommendation on Thematic Web Radio. 742-746
- Junfeng Man, Zhicheng Wen, Changyun Li, Xiangbing Wen:
Research on Running Time Behavior Analyzing and Trend Predicting of Modern Distributed Software. 747-754 - Peng Yang, Qingsheng Zhu, Xun Zhong:
Subtractive Clustering Based RBF Neural Network Model for Outlier Detection. 755-762 - Muwei Jian, Haoyan Guo, Lei Liu:
Texture Image Classification Using Visual Perceptual Texture Features and Gabor Wavelet Features. 763-770 - Kaushik Deb, Hyun-Uk Chae, Kang-Hyun Jo:
Vehicle License Plate Detection Method Based on Sliding Concentric Windows and Histogram. 771-777 - Weihui Dai, Xingyun Dai, Tao Sun:
A Smart Targeting System for Online Advertising. 778-786 - Yuhua Zhang, Longhua Qian, Qiang Lv, Peide Qian, Shengchao Guo:
A Practical Dynamic Frequency Scaling Solution to DPM in Embedded Linux Systems. 787-793
Volume 4, Number 9, September 2009
- Huadong Ma, Guojun Wang:
Guest Editorial. 795-796 - Gui Gui, Paul D. Scott:
Measuring Software Component Reusability by Coupling and Cohesion Metrics. 797-805 - Lianwei Zhang, Wei Wang, Yan Li, Xiaolin Liu, Meiping Shi, Hangen He:
A Method for Surface Reconstruction Based on Support Vector Machine. 806-812 - Yemei Qin, Ji Wang:
Distribution Network Reconfiguration Based on Particle Clonal Genetic Algorithm. 813-820 - Chuanming Song, Xiang-Hai Wang, Fuyan Zhang:
Visually Lossless Accuracy of Motion Vector in Overcomplete Wavelet-based Scalable Video Coding. 821-828 - Zhijian Wang, Dingguo Wei:
Modeling Complex System Using T-subnet based Hierarchical Petri Nets. 829-836 - Jin-Cherng Lin, Jan-Min Chen:
An Automated Mechanism for Secure Input Handling. 837-844 - Jin Zheng, Weijia Jia, Guojun Wang:
Data Management of Mobile Object Tracking Applications in Wireless Sensor Networks. 845-852 - Zhigang Chen, Jiaqi Liu, Deng Li, Hui Liu, Athanasios V. Vasilakos:
SOBIE: A Novel Super-node P2P Overlay Based on Information Exchange. 853-861 - Lingli Deng, Ziyao Xu, Yeping He:
Trust-Based Constraint-Secure Interoperation for Dynamic Mediator-Free Collaboration. 862-872 - Mianxiong Dong, Long Zheng, Kaoru Ota, Song Guo, Minyi Guo, Li Li:
Improved Resource Allocation Algorithms for Practical Image Encoding in a Ubiquitous Computing Environment. 873-880
- Kerrie J. Long, Frank J. Zajaczkowski, Sue Ellen Haupt, Leonard Joel Peltier:
Modeling a Hypothetical Chlorine Release on a College Campus. 881-890 - P. Assadee:
Modified CMOS Multiplication Algorithm Using Optimized Array Structure. 891-895 - Ashok Kumar Das:
A Location-Adaptive Key Establishment Scheme for Large-Scale Distributed Wireless Sensor Networks. 896-904 - Sabah Mohammed, Jinan Fiaidhi, Osama Mohammed:
Sharing Biomedical Learning Knowledge for Social Ambient Intelligence. 905-912 - Spyros Sioutas, Dimitrios Sofotassios, Kostas Tsichlas, Dimitrios Sotiropoulos, Panayiotis M. Vlamos:
Canonical Polygon Queries on the Plane: A New Approach. 913-919
Volume 4, Number 10, October 2009
- Abdul Kadir Kureshi, Mohd. Hasan:
DTMOS Based Low Power High Speed Interconnects for FPGA. 921-926 - Muhammad Yasir Qadri, Hemal S. Gujarathi, Klaus D. McDonald-Maier:
Low Power Processor Architectures and Contemporary Techniques for Power Optimization - A Review. 927-942 - Ryotaro Kamimura:
Feature Discovery by Information Loss. 943-953 - László Horváth, Imre J. Rudas:
Human Intent Representation in Knowledge Intensive Product Model. 954-961 - Toshiro Kubota:
Designs of Second-Order Associated Memory Networks with Threshold Logics: Winner-Take-All and Selective Voting. 962-974 - Kristopher M. Thornburg, Geb W. Thomas:
Robotic Exploration Utility for Urban Search and Rescue Tasks. 975-980 - José R. Celaya, Alan A. Desrochers, Robert J. Graves:
Modeling and Analysis of Multi-agent Systems using Petri Nets. 981-996 - Mamoru Yoshida, Hirokazu Tatano:
Payment Plan for the Delegation of One or Two Inspection Agencies. 997-1004 - Ming-Yih Lee, Kok Soon Soon, Chih-Feng Lin:
New Computer Protocol with Subsensory Stimulation and Visual/Auditory Biofeedback for Balance Assessment in Amputees. 1005-1011 - Yukio Ohsawa, Yusuke Maeda:
Eyes Draw Auxiliary Lines in Interpreting Images. 1012-1021 - Qing Wu, Mehrdad Saif:
Model-based Robust Fault Diagnosis for Satellite Control Systems Using Learning and Sliding Mode Approaches. 1022-1032 - Marek Makowski:
Management of Attainable Tradeoffs between Conflicting Goals. 1033-1042 - John T. Boardman, Brian J. Sauser, Dinesh Verma:
In Search of Systems "DNA". 1043-1052 - Sinan Kockara, Tansel Halic, Coskun Bayrak, Kamran Iqbal, Richard Rowe:
Contact Detection Algorithms. 1053-1063 - Haijun Zhang, Jingjun Zhang, Ruizhen Gao:
A Novel Method of Phase Current Compensation for Switched Reluctance Motor System Based on Finite Element. 1064-1071
Volume 4, Number 11, November 2009
- Qi Luo, Ben K. M. Sim:
Guest Editorial. 1073-1074 - Lin Sun, Hongjun Xiao, Shouju Li, Dequan Yang:
Forecasting Fish Stock Recruitment and Planning Optimal Harvesting Strategies by Using Neural Network. 1075-1082 - Chunguang Wang, Jingfeng He, Guixian Li, Junwei Han:
An Automated Test System for Flight Simulator Fidelity Evaluation. 1083-1090 - Shubo Liu, Jing Sun, Zhengquan Xu:
An Improved Image Encryption Algorithm based on Chaotic System. 1091-1100 - Ickjai Lee, Kyungmi Lee, Christopher Torpelund-Bruin:
Voronoi Image Segmentation and Its Applications to Geoinformatics. 1101-1108 - Li Yang, Malin Song:
Formation Mechanism of Green Strategic Alliances and Its Cooperative System for Coal-Mining Eco-Industrial Parks Based on Synthetic Decision Support System. 1109-1116 - Jimin Li, Zhen Li, Kunlun Li:
Detection and Classification of Non-self Based on System Call Related to Security. 1117-1124 - Jiaxin Li, Feng Shi, Ning Deng, Qi Zuo, Zuo Wang, Mengxiao Liu:
Intelligent Trace and Evaluation for Parallel Programming Based on Architectural Details. 1125-1132 - Minqiang Pan, Dehuai Zeng, Yong Tang, Dongqing Chen:
CFD-based Study of Velocity Distribution among Multiple Parallel Microchannels. 1133-1138 - Zhibin Liu, Haifen Yang, Shaomei Yang:
Integration of Multi-layer SVM Classifier and Multistage Dynamic Fuzzy Judgement and Its Application in SCDA Measurement. 1139-1144 - Shaomei Yang, Donglei Liu, Zhibin Liu:
Evaluating the Network and Information System Security Based on SVM Model. 1145-1150 - Zhi-Hua Hu:
A Hybrid System Based on Neural Network and Immune Co-Evolutionary Algorithm for Garment Pattern Design Optimization. 1151-1158 - Chunlai Chai:
Efficient Intelligent Localization Scheme for Distributed Wireless Sensor Networks. 1159-1166 - Gang Liu, Wei Chen, Jun Guo:
A Research on Mixture Splitting for CHMM Based on DBC. 1167-1174 - Rongdi Yuan, Huizong Feng, Ming Cen:
Modeling and Simulation of Crush Natural Gas Turbo Engine. 1175-1181 - Yanduo Zhang, Kun Wang:
The Application of Liquid State Machines in Robot Path Planning. 1182-1186
Volume 4, Number 12, December 2009
- Jinrong Zhu:
Guest Editorial. 1187 - Dongxiao Niu, Jianjun Wang:
Combination of Text Mining and Corrective Neural Network in Short-term Load Forecasting. 1188-1194 - Jicheng Ding, Lin Zhao, Weiquan Huang:
Design of a General Single Frequency GPS Receiver Research Platform for High Dynamic and Weak Signal. 1195-1201 - Yazao Yang, Wenzhou Jin, Xiaoni Hao:
Dynamic Pool Segmentation Model and Algorithm in the Car Rental Industry. 1202-1208 - Yongxiu He, Weihong Yang, Yu Zhang, Dezhi Li, Furong Li:
Urban Electric Load Forecasting Using Combined Cellular Automata. 1209-1215 - Xiaochu Liu, Qitao Huang, Dacheng Cong, Junwei Han, Lin Xiao:
Analysis of Performance Effect Factors of Three-Stage Electro-Hydraulic Servo Valve. 1216-1222 - Hua Jiang, Junhu Ruan:
The Application of Genetic Neural Network in Network Intrusion Detection. 1223-1230 - Jinrong Zhu:
A Modified Particle Swarm Optimization Algorithm. 1231-1236 - Liu-Juan Zhu, Wen-Zhong Cai, Shan-Tung Tu:
Computational Micromechanics of Particle-reinforced Composites: Effect of Complex Three-dimensional Microstructures. 1237-1242 - Lin Xu, Xiaoming Wu, Yanru Zhang, Hengxin Yuan:
The Optimization Study on Time Sequence of Enhanced External Counter-Pulsation in AEI-CPR. 1243-1248 - Jun Yuan, Yongchao Zhu, Minzhe Wu:
Vibration Characteristics and Effectiveness of Floating Slab Track System. 1249-1254
- Douglas R. Isenberg, Y. P. Kakad:
Simulating the Effects of a Non-Uniform Gravitational Field on a Space Robot. 1255-1262 - Mohammad Masumuzzaman Bhuiyan, Abu Sayed Md. Latiful Hoque:
High Performance SQL Queries on Compressed Relational Database. 1263-1274 - Carlos E. Otero, Antonio Velazquez, Ivica Kostanic, Chelakara Subramanian, Jean-Paul Pinelli, Larry Buist:
Real-Time Monitoring of Hurricane Winds using Wireless and Sensor Technology. 1275-1285 - Hicham Hihi:
Structural Controllability of Switching Linear Systems. 1286-1293 - Wei Pan, Guowei Hua, Lean Yu, Jinlong Zhang, Gang Xie, Shouyang Wang:
Determining Optimal Selling Price, Order Size and the Number of Price Changes with Weibull Distribution Deterioration. 1294-1300 - Xu Xu, Jie Lin:
A Novel Time Advancing Mechanism for Agent-Oriented Supply Chain Simulation. 1301-1308 - Jimmie Wiklander, Jens Eliasson, Andrey Kruglyak, Per Lindgren, Johan Nordlander:
Enabling Component-Based Design for Embedded Real-Time Software. 1309-1321 - Lanfranco Lopriore:
Key-Lock Mechanisms for Object Protection in Single-Address-Space Systems. 1322-1331 - Zhengbing Hu, Kai Du:
Towards High Availability and Performance Database Clusters for Archived Stream. 1332-1339
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.