


default search action
2nd ICSAI 2014: Shanghai, China
- 2nd International Conference on Systems and Informatics, ICSAI 2014, 15-17 November 2014, Wistaria Hotel, Shanghai, China. IEEE 2014

- Teng Lv, Chuanjiang Li, Yanchao Sun, Guangfu Ma, Junzi Xiao:

A guidance law design with terminal impact angle constraint based on nonlinear generalized predictive control. 1-5 - Lei Zhao, Ben-Wen Li:

Analyzing robust D-stability and D-stabilization for discrete descriptor systems subjected to norm-bounded uncertainties in the coefficient matrix. 6-11 - Jiazhen Zhang, Guangming Zhang, Meilei, Deming Wang:

Axial flux Doubly Salient Motor speed control based on fuzzy-PID control. 12-17 - Yanjun Shen, Qinghua Jiang, Peng Miao

:
Continuous but non-smooth adaptive observer of a class of nonlinear systems. 18-22 - Tongtong Zhang, Weimin Zhang

:
Control on output peak current of motors in robots. 23-27 - Magdi Sadek Mahmoud

:
H2and H∞control of discrete systems with time scales. 28-32 - Xiwei Liu, Ping Li, Yuan Xu, Ying Liu:

Quasi-synchronization for delayed systems with parameter mismatches via aperiodically intermittent control. 33-38 - Junqiao Qiu

, Weibing Li, Yunong Zhang
, Senbo Fu, Hongzhou Tan
:
Two numerical algorithms and numerical experiments for efficiently solving inequality-and-bound constrained QP. 39-44 - Dongsheng Guo, Xiaogang Yan, Long Jin, Hongzhou Tan

, Yunong Zhang
:
ZE in iZ1eD1 manner for MKE redundancy resolution at velocity and acceleration levels. 45-50 - Tri-Vien Vu, Chih-Keng Chen:

A control oriented model and application for control system design of a series hydraulic hybrid vehicle. 51-56 - Yongtao Li, Xiangju Qu, Wenqian Tan:

A phase compensator to prevent pilot induced oscillations by actuator rate limiting. 57-62 - Chunyang Gao, Zhenyu Zhao:

An optimal allocation approach of cooperative search capability based on game theory. 63-67 - Yiqiao Liang, Qiguo Han:

The application of asymptotic tracking and disturbance rejection in voltage source converter controller design. 68-73 - Wenhui Zhao, ZhiXin Qin:

Routing algorithm for wireless sensor networks based on resistance distance. 74-78 - Zhiguo Dai, Chong Kang:

Geomagnetic field aided inertial navigation using the SITAN algorithm. 79-83 - Mingqing Hu, Xiaoquan Han, Zebing Feng, Yi Zhou, Weihu Zhou, Lujun Bai, Bing Li:

Improved PID algorithms with application to excimer laser temperature control. 84-88 - Wei Long, Hong Sun, Xiao Li, Bo Jiang, Yang Liu:

The CSNS RCS remote control system based on EPICS. 89-93 - Baodong Gao, Jianping Wang, Fan Cheng, Guo Zhang, Xiaohong Yang, Junhui Liu:

The simulation of direct torque control fuzzy control system based on Labview and Matlab. 94-98 - Thi Thu Giang Hoang

, Ren Feng Zheng, Xiao-Hong Wang, Lian-Fang Tian:
Using fractional-order PIλDμcontroller to control three-phase parallel pulses width modulation (PWM) rectifier. 99-103 - Rong Hu, Zhaohui Li, Dongmei Li, Hui Ding:

A DIBR method based on foreground extraction and holes corrosion. 104-108 - Ho-Jin Jang, Seung-Hae Baek, Soon-Yong Park

:
Curved lane detection using robust feature extraction. 109-112 - Yaqin Zhao, Guizhong Tang:

Fire video recognition based on flame and smoke characteristics. 113-118 - Qing Xie, Lin Ge, Zhenyi Wang:

Design of the virtual reality roam system for ancient city. 119-123 - Lanxin Hu, YuLong Ying, Jingchao Li:

A fuzzy logic controller application for marine power plants. 124-131 - Li-qun Shang, Jian-dang Lv:

A new approach for identification of the fault type on transmission lines. 132-136 - Wei Huang, Yajuan Guo, Ling Zhuang, Qin Mei, Xiaohai Xu:

Applying of network security situation awareness in smart substations. 137-142 - Taifeng Kang, Ruipeng Zhang, Fengqing Zhao, Aoyang Han, Jianying Li, Yuanlong Liu:

How could advanced distribution automation have prevented the 2006 U.S. Northwest Queen blackout. 143-147 - Yury S. Borovikov, Alexandr S. Gusev

, Almaz O. Sulaymanov
, Ruslan A. Ufa
:
Hybrid real-time simulator of power system for advanced simulation of the FACTS and HVDC system based on voltage source converter. 148-152 - Yury S. Borovikov, Almaz O. Sulaymanov

, Alexandr S. Gusev
, Mikhail V. Andreev
:
Simulation of automatic exciting regulators of synchronous generators in hybrid real-time power system simulator. 153-158 - Weijia Li, Yuzhuo Fu, Ting Liu, Pengzhi Chu, Jiafang Wang, Hui Chen:

Battery equalization based on state of charge. 159-163 - Xiaofei Gao, Qin Zhou:

A low consumption DSP based power analyzer. 164-168 - Hussein Al-bayaty

, Marcel Ambroze
, Mohammed Zaki Ahmed:
Taking advantage of the harmonics at the load side using passive filters. 169-174 - Ying Hong Yang, Lichun Wang:

The online detection of faulty insulator using fast Fourier transformation. 175-179 - Guangxing Bai, Yanwu Ding, Mehmet Bayram Yildirim

, Yan-Hong Ding:
Short-term prediction models for wind speed and wind power. 180-185 - Jianping Zhang, Zhenyu Gao, Yuliang Ren, Xinhui Du, Xiaohai Yin:

A economic operation optimization for microgrid with battery storage and load transfer. 186-191 - Bradley Rideout, Tugcan Sahin, Daniel Shereck:

Implementation of a virtual power plant: The integrated load management system. 192-196 - Ke Sun, Weihui Shao, Zhiyu Xu, Weisheng Xu:

Islanding partition of the distribution system with distributed generations based on Memetic algorithm. 197-201 - Tugcan Sahin, Daniel Shereck:

Renewable energy sources in a transactive energy market. 202-208 - Huihui Lu, Yuxiang Yuan:

Substation equipment temperature monitoring system design based on self-powered wireless temperature sensors. 209-214 - Liqun Shang, Senfeng Zhang:

A new simulation method of switching overvoltage on shunt capacitors. 215-219 - Kangli Chen:

A new robust character segmentation method. 220-224 - Mohammad S. Khorsheed, Samir Ouis:

HMM-based recognition engine using a novel approach for statistical feature extraction. 225-229 - Kangli Chen, Wancheng Ge:

Pedestrian tracking algorithm based on Kalman filter and partial mean-shift tracking. 230-235 - Donat Ivanov

, Igor A. Kalyaev, Sergey Kapustyan
:
Method of circles for solving formation task in a group of quadrotor UAVs. 236-240 - Dharmendra Sharma

, Fariba Shadabi:
Multi-agents based data mining for intelligent decision support systems. 241-245 - Andrew Schumann

:
Non-linear permutation groups on Physarum polycephalum. 246-251 - Eugénio C. Oliveira

, Henrique Lopes Cardoso
, Joana Urbano, Ana Paula Rocha
:
Trustworthy agents for B2B operations under Normative environment. 252-257 - Wenqian Tan, Yu Wu

, Xiangju Qu, Alexander V. Efremov:
A method for predicting aircraft flying qualities using neural networks pilot model. 258-263 - Rui Qiao, Heng He, Jinguang Gu, Maofu Liu, Yajun Feng, Xiaolei Zhong:

An emotion understanding system. 264-270 - Shuo Xiong, Hiroyuki Iida

:
Attractiveness of real time strategy games. 271-276 - Jun Jiao, Li Sun, Wen Kong, Youhua Zhang, Yan Qiao, Chenchen Yuan:

A sliding parameter estimation method based on UKF for agricultural tracked robot. 277-282 - Peng Hu, Jianjing Shen, Linbo Tao:

Scenario-driven composition of context-aware simulation components. 283-287 - Ji-Wook Jeong, Jeong-Won Lee, Sung Hee Park, Woo Jin Hyung, Sooyeul Lee:

Vessel navigator for surgical rehearsal system using topological map: An application to gastrectomy. 288-292 - Jianhua Cai, Qingchun Hu:

Analysis for cloud testing of web application. 293-297 - Javeria Khizar, Sarmad Sadik:

Cloud based semantic middleware for data storage on peer to peer network. 298-303 - Niansheng Chen, Xiaoping Fang, Xin Wang:

A cloud computing resource scheduling scheme based on estimation of distribution algorithm. 304-308 - Tayyiba Naeem, Sarmad Sadik:

Optimizing performance and fault tolerance through cloud based adaptive replication for mobile applications. 309-314 - Wafa S. Al-Sharafat:

Proposed anticipating learning classifier system for cloud intrusion detection (ALCS-CID). 315-318 - Xiaxin Li, Shutao Sun:

MP3 audio parallel decoding based on Libmad library. 319-323 - Xiaojie Xu, Lisheng Wang:

Task assignments based on shared memory multi-core communication. 324-328 - Bo Liu, Yunhong Yan, Lizhang Peng, Yunlong Cheng, Yan Jin:

A hard real-time scheduling algorithm based on elastic model. 320-333 - Xiaoyang Li, Yu Liu, Chen Gong, Dake Liu:

Recognition of access patterns for DSP kernel codes. 334-338 - Yang Bo, Hao Zhong-kao:

Two speed processor system high accuracy digital to synchro converter. 339-343 - Jihong Liu, Zhenjie Zhao:

A method of categorization and organization for 3D model-based design knowledge. 344-349 - Cheng Jing, Guo-jun Zhao:

Design and implementation of an elevator wireless adjustment system. 350-355 - Yuesheng Wang, Hao Qian, Dawei Zhen:

Emulsifier fault diagnosis based on back propagation neural network optimized by particle swarm optimization. 356-360 - Zhao Du, Yeming Tang

, Ting Liu, Qifeng Liu:
ConferenceOne: A cloud-based collaborative conference service system. 361-365 - Xinguang Li, Jiahua Chen, Minfeng Yao, Dongxiong Shen, Fan Lin:

English sentence pronunciation evaluation using rhythm and intonation. 366-371 - Changxi Li, Yan Zhou, Xu-hui Lan, Ge Guo, Chong Wu:

A new tracking algorithm for hypersonic targets. 372-377 - Sajid Baloch, Fahad Al Ghazali, N. Mir, Fasih Ud Din Farrukh

, H. Ismail, Muhammad Yasir Qadri:
Hardware realization of locally normalized cross correlation algorithm. 378-382 - Xuantong Dong, Zhijie Lin, Yuan Ren:

Identification of protein complexes algorithm based on random walk model. 383-388 - Wenhui Li, Feng Qu, Ying Wang, Peixun Liu:

A fast vehicle top-view system. 389-393 - Bin Shang, Shun Fang:

Cellular automata simulation of traffic spillback and queue-jumping behaviors at off-ramp on urban expressways in Shanghai. 394-399 - Lili Xie, Guolong Chen:

A forensics tool of Foxmail client. 400-405 - Shiwei Gao, Binglei Du, Yaruo Jiang, Jianghua Lv, Shilong Ma:

An efficient algorithm for pairwise test case generation in presence of constraints. 406-410 - Jerzy Jedrzejewski

, Zbigniew Kowal, Wojciech Kwasny
, Zdzislaw Winiarski:
In-house system for holistic modelling of machine tool operating properties. 411-416 - Sabah Al-Fedaghi

, Noura Aljallal:
Multilevel semantic foundation for digital logic diagrams. 417-424 - Heng Liu, Ping Xi:

A mesh generation method for geometric features based on knowledge-based engineering. 425-430 - Peng Hu, Jianjing Shen, Linbo Tao:

Scenario-driven composition of context-aware simulation components. 431-435 - Sung J. Shim, Arun Kumar, Roger Jianxin Jiao

:
A simulation study of RFID system for improving patient discharge process in a hospital. 436-440 - Cuihua Sun, Feng Wang, Yong Ge:

Design and implementation of the online map system based on LBS. 441-446 - Kai Shi, Zhanquan Wang, Fei Luo, Chunhua Gu:

Design and realization of general matrix keyboard based on STM32. 447-453 - Chongnan Wang, Zongtao Wang, Hongwei Xing:

Design of message-oriented middleware with publish/subscribe model on Telemetry and Command computer. 454-458 - Yunong Zhang

, Weixiang Ding, Wenchao Lao, Ying Wang, Hongzhou Tan
:
Restoration of missing time-series data via multiple sine functions decomposition with Guangzhou-temperature application. 459-464 - Ling-Hua Chang, Sanjiv Behl, Tung-Ho Shieh:

W-Revised: An amazing tool for creating customized websites. 465-470 - Tuan Son Nguyen

, Tien Thanh Nguyen
, Thi Thu Thuy Nguyen
, Anh Hai Nguyen:
Application of digital technology in ballistic mortar for determining the power of high explosives. 471-476 - Caihong Wang, Jian Xu

:
Delay-induced Hopf bifurcation in the double-link inverted pendulum system for human quiet standing. 477-481 - Satoshi Yamane, Takaya Shimizu:

Development of probabilistic timed CEGAR. 482-491 - A. F. M. Sultanul Kabir, Mollah Ahmed Shorif, Hua Li, Qian Yu:

A study of secured wireless sensor networks with XBee and Arduino. 492-496 - Wei-qing Huang, Chang Ding, Siye Wang

, Xiang Jing, Yuan-Jian Luo, Yanfang Zhang, Zhujun Zhang:
An efficient visualization method of RFID indoor positioning data. 497-504 - Dapeng Cheng, Yingjie Song, Yanyan Mao, Xiangrong Wang:

An energy efficient cluster-based routing protocol for intelligent environmental monitoring system. 505-509 - Dapeng Cheng, Yingjie Song, Yanyan Mao, Xiangrong Wang:

LDDP: A location-based directed diffusion routing protocol for smart home sensor network. 510-514 - Wei Xiao, Jianfei Liu, Nan Jiang, Hongzhou Shi:

An optimization of the object function for routing protocol of low-power and Lossy networks. 515-519 - Rong Li, Ji Li:

A novel clouds based spectrum monitoring approach for future monitoring network. 520-524 - Jian Zhou, Lijuan Sun, Tianshi Liu, Tao Zhang, Fu Xiao:

An admission control scheme based on the game theory for LEO satellite networks. 525-530 - Peng Yang, Dou Liu, Yan Zhang:

Dynamical coding method for intermittent connectivity wireless network. 531-535 - Shuai Yang, Rongxi He

, Ying Wang, Sen Li, Bin Lin:
OPNET-based modeling and simulations on routing protocols in VANETs with IEEE 802.11p. 536-541 - Wenhui Zhao, Yuhui Dong:

Closed-loop system of Cesium atomic magnetometer and its characteristics. 542-547 - Fei Xia, Zongze Xia, Xiaobo Huang, Xiao Gao:

A resource allocation approach via the genetic algorithms in electric power communication networks. 548-552 - Bo Yu, Lu-Yong Zhang:

An improved detection method for different types of jamming attacks in wireless networks. 553-558 - Quan-Quan Wang, Hong Bo Zhu, Ru-Shan Chen:

Computation of reflection and transmission coefficients of frequency selective surfaces using sub-entire-domain basis function method. 559-563 - Yalin Miao, Ying Liu, Longyan Wang:

Design and application of multi-channel data acquisition system based on short-range wireless communication technology. 564-569 - Xudong Fan, Hui Li:

Design and implementation of TCP with network coding. 570-575 - Wen-Cheng Lai

, Jhin-Fang Huang, Pi-Gi Yang:
Design broad-band power amplifier and chip antenna with human body at intelligent computer and communications applications. 576-580 - Shuhui Jiang, Xi Shen, Yan Wang, Xiaofei Zhang, Dayong Liu:

Improved clustering and outlier detection based shortwave direction finding and crossing location algorithm. 581-585 - Muhammad Waqas Khan, Yimin Zhou, Guoqing Xu:

Modeling of acoustic propagation channel in underwater wireless sensor networks. 586-590 - Alahoum Fathi, Zhen Xu:

Performance analysis of rate compatible punctured turbo coded hybrid ARQ scheme over satellite channel. 591-596 - Min Jung Lee, Yong Won Kim, Sang-Lim Ju, Kyung-Seok Kim:

Performance comparison of spatial multiplexing multi-input multi-output systems in accordance with dimming control. 597-601 - Lan Mi Hwang, Yong-Won Kim, Byeong Gon Choi, Kyung-Seok Kim:

Performance of color shift keying-space time block code-orthogonal frequency division multiplexing system on visible light communication. 602-606 - Youfeng Wang, Xiuquan Qiao:

Design and implementation of web browser for named data networking in Windows. 607-612 - Keyu Lu, Kaikun Dong, Cuihua Wang, Haiyan Xu:

DNS configuration detection model. 613-618 - Zizhuo Zhang, Ruda Yang, Zhengqin Li, Liwei Chen, Xiaozhi Yu, Yeming Tang

, Zhao Du:
Location-based social networking information services in university campus. 619-623 - Degang Sun, Jun Shi, Dong Wei, Meng Zhang:

A low-cost and efficient method of determining the best frequency band for video leaking signal reconstruction. 624-628 - Degang Sun, Wen Yang, Meng Zhang, Shaojian Huang:

Classified removable storage medium control based on the access control matrix. 629-633 - Xiaoqi Xiao, Xiaochen Lin, Yuan Li:

Joint remote state preparation of a qubit state via a W state using single-atom rotation operations. 634-638 - Yuan Li, Xiaoqi Xiao, Yu Yang, Shunru Ji:

Symmetric controlled quantum secret sharing scheme via stabilizer codes. 639-643 - Sai-Dan Zhang, Lu-Yong Zhang:

Vulnerability mining for network protocols based on fuzzing. 644-648 - Fengjiao Li, Luyong Zhang, Dianjun Chen:

Vulnerability mining of Cisco router based on fuzzing. 649-653 - Duanjin Zhang

, Xue Liu:
H-infinity filtering for networked control systems with packet dropout using delta operator. 654-658 - Haifei Shen, Jianxi Fan, Baolei Cheng, Cheng-Kuan Lin:

A model based on crossed cubes for VoD services. 659-664 - Junfang Xiao, Yuan Ren:

A scheme for remotely preparing a two-atom entangled state in cavity quantum electrodynamics system. 665-669 - LiQing Li, Hai Lu, Xudong Li:

Assessment and application of network access control technologies. 670-675 - Jingchao Li, YuLong Ying:

Individual radiation source identification based on fractal box dimension. 676-681 - Yunchun Li, Jingxuan Li:

MultiClassifier: A combination of DPI and ML for application-layer classification in SDN. 682-686 - Eduardo Gonzalez, Stan McClellan, Wuxu Peng:

RTOmin as a balancing parameter between fast retransmissions and timeouts within stream control transmission protocol (SCTP). 687-691 - Xie Tai Jun, Zhu Luan Juan:

The realization of high-precise clock synchronization protocol based on adaptive exponential smoothing algorithm. 692-696 - Yihai Liu, Xiaomin Zhang, Yang Yu:

A fast entropy assisted complete ensemble empirical mode decomposition algorithm. 697-701 - Xufeng Yao, Tian Xia, Zhexu Li, Xiaopin Xu, Peizhong He, Songlin Zhuang:

Analysis of fiber similarity metric for fiber tract clustering in white matter of human brain. 702-706 - Sang Jin Cho, Sang-Bock Cho, Kyung-Hun Lee, Hyung-Seob Han:

Development of synthesis model for fine tuning and playing style. 707-711 - Anaum Riaz, Sana Akhtar, Shanza Iftikhar, Amir Ali Khan, Ahmad Salman:

Inter comparison of classification techniques for vowel speech imagery using EEG sensors. 712-717 - Jingchao Li, YuLong Ying:

Radar signal recognition algorithm based on entropy theory. 718-723 - Tian Liu, Ning Cao, Minghe Mao

, Fei Wang, Yuefeng Du:
Waveform design and optimization for OFDM radar signal based on fractional Fourier transform. 724-729 - Bo Lang, Yina Fan, Jing Huang:

A bio-inspired model of image representation based on non-classical receptive fields. 730-735 - Yina Fan, Bo Lang, Jing Huang:

A general image representation scheme and its improvement for image analysis. 736-741 - Qizhao Yuan, Hongliang Cai:

A multiple threshold for image secret sharing based on Cauchy matrix. 742-747 - Wei Pei, Zijie An, Yongying Zhu, Xiao Jia, Xin Wei Zuo, Fa Sheng Wang:

A rapid vehicle recognition and retrieval system. 748-753 - Zhenghua Shu, Guodong Liu, Zhihua Xie:

An image coding of shape adaptive wavelet-based contourlet transform. 754-758 - Qiong Zhang, Minfen Shen, Ruoyu Fang, Bin Li, Binghuang Cai

:
Despeckling of medical ultrasound images using multiscale weighting nonlinear diffusion. 759-763 - Jinghao Zhou, Giovanni Lasio, Baoshe Zhang, Karl Prado, Warren D. D'Souza, Zhennan Yan, Dimitris N. Metaxas:

Efficient deformable model with sparse shape composition prior on compromised right lung segmentation in CT. 764-768 - Mohamed I. Alkanhal

, Fahad Alqahtani
, Khalid Alqahtani:
Identifying gender from human faces using correlation filters. 769-773 - Ville V. Lehtola

, Petri Rönnholm:
Image enhancement for point feature detection in built environment. 774-779 - Shan Zeng, Jun Bai, Rui Huang:

Image retrieval based on color-spatial histograms. 780-784 - Chunqiao Zhou, Sizheng Zhu, Songsong Zhu:

Improved algorithm for digital segment codes' flaw detection. 785-790 - Cheng Qian, Baoyu Zheng, Bilan Lin:

Nonuniform quantization for block-based compressed sensing of images in differential pulse-code modulation framework. 791-765 - Peng Dong, Qi-min Gao, Xi-he Sun, Xi-zhen Wang, Guang-hui Chang, Yue Guan, Yan-ming Ge:

Normal MSCT manifestation of small bowel mesentery. 796-801 - Ming Li, Jie Yang:

Objective measurement of image degradation caused by optical transmission effects. 802-807 - Yang Liu, Yan Zhou, Yuliang Liu:

A rapid fluorescence lifetime image acquistion method based on time-gated fluorescence lifetime imaging microscopy. 808-812 - Xiyu Li, Lingjie Feng, Xin Gao, Changming Lu:

Simulations and experiment of lensless imaging with intensity correlation array. 813-817 - Yangyang Tian, Chenqiang Gao, Xiaoming Huang:

Table frame line detection in low quality document images based on Hough transform. 818-822 - Kaiyu Li, Wendong Wang, Kaiwen Zheng, Wenbo Liu

, Guili Xu:
The application of B-spline based interpolation in real-time image enlarging processing. 823-827 - Siji Quan, Weiping Qian, Junhai Guo, Hua Zhao:

Visible and infrared image fusion based on Curvelet transform. 828-832 - Guobo Zhang, Yunlong Wang, Xuan Zhang:

A dictionary-based HD video compressing scheme for videoconference. 833-838 - Yinan Cao, Yan Zhou, Xinwei Wang, Songtao Fan, Jun He:

A DSP-based video processing system for infrared small targets detection. 839-843 - Nan Xia, Wen Wei, Xiaofei Zhang, Jingchun Li:

A single antenna interference cancellation by sequential importance sampling. 844-848 - Haijun Zhao, Jing Zhang, Zhiping Yin:

Adaptive beamforming based on stochastic parallel gradient descent algorithm for single receiver phased array. 849-853 - Ahmed Mohammed Mikaeil, Bin Guo, Xuemei Bai, Zhijun Wang:

Hidden Markov and Markov switching model for primary user channel state prediction in cognitive radio. 854-859 - Jen-Ho Cheng, Yang-Han Lin, Ching-Hsiang Tseng:

Identification of Volterra kernels for nonlinear communication systems with OFDM inputs. 860-865 - Ahmed Mohammed Mikaeil, Bin Guo, Xuemei Bai, Zhijun Wang:

Primary user channel state prediction based on time series and hidden Markov model. 866-870 - Xiujuan Yu, Yanhua Sun, Aiping Fang, Weijun Qi, Caijuan Liu:

Laboratory spectral calibration and radiometric calibration of hyper-spectral imaging spectrometer. 871-875 - Ruohan Xing, Gang Zhao, Guocai Ma, Wenlei Xiao:

A gesture based real-time interactions with 3D model. 876-880 - Xinxiang Wang, Jiale Wang, Weifeng Pan

:
A sketch-based query interface for 3D CAD model retrieval. 881-885 - Jingqiao Zhang, Lin Wang:

Protein molecular surface triangulation based on Contour-Buildup algorithm. 886-890 - Fuping Yang, Yun Zhou, Xiaobo Luo:

Scene layout in text-to-scene conversion. 891-895 - Yimu Wang, Luc Claesen:

A spatiotemporal dithering method to extend color depth in multi-display system. 896-900 - Xizhen Wang, Shanshan Gao, Shuai Wang, Hongwei Sun, Yanyu Wang, Nengzhi Jiang, Guohua Xie:

First-episode depression: Diffusion tensor imaging of deep white matter. 901-905 - Jiaqi Zhao, Hongzhe Xu, Wen Li:

A hybrid genetic algorithm for Bayesian network optimization. 906-910 - Shu-Bo Zhang, Jian-Huang Lai:

A hybrid measure for the semantic similarity of gene ontology terms. 911-916 - Li-Li Cao, Zhi-Shui Zhang, Jun Zhang:

Compound identification using random projection location-sensitive Hash for gas chromatography-mass spectrometry. 917-921 - Sung Hee Park, Jeongwon Lee, Ji-Wook Jeong, Woo Jin Hyung, Sooyeul Lee:

Description language for graph-based representation in surgical rehearsal. 922-926 - Yiyun Zhang, Guolong Chen:

A forensics method of web browsing behavior based on association rule mining. 927-932 - Shanshan Yu, Donglin Chen, Bing Li, Yufeng Ma:

A personalized recommendation algorithm based on interest graph. 933-937 - Huiting Hou, Yan Gao, Dengke Liu:

A support vector machine with maximal information coefficient weighted kernel functions for regression. 938-942 - W. Lok Yeung:

Applications of data mining in online retailing: A case for mining prefix-ordered web site navigation paths. 943-947 - Hao Jiang, Jihong Liu, Zhenjie Zhao:

Graph mining based knowledge discovery in designing decision-making context models. 948-953 - Yeming Tang

, Qiuli Tong, Zhao Du:
Mining frequent sequential patterns and association rules on campus map system. 954-958 - Bing Li, Yida Li:

Network dynamics of the Chinese stock market. 959-963 - Tao Zhang, Jiansheng Wu, Haifeng Hu:

Text classification based on a novel ensemble multi-label learning method. 964-968 - Lei Zhao, Fu Wang, Kaikai Fan:

A secure and fair resource allocation model under hybrid cloud environment. 969-973 - Xin Tao, Chunlei Ji:

Clustering massive small data for IOT. 974-978 - Shengli Pan, Jun Tian:

Impact of data to decision based on emergency plan. 979-986 - Dongmei Wang, Da Tang, Qianjin Yue, Zhongmin Shi, Jiaguo Feng:

A data fusion method for the attitude of the floating production storage and offloading(FPSO) single-point mooring system based on the monitoring data. 987-991 - Keting Yin, Shan Wang, Zirui Liu, Qi Yu, Bo Zhou:

Research and development on data quality assessment management system. 992-997 - Hong Zhu, Shengli Tian, Meiyi Xie:

Anonymization on refining partition: Same privacy, more utility. 998-1005 - Siba Mishra

, Chiranjeev Kumar
:
Estimating development size and effort of business process service-oriented architecture applications. 1006-1011 - Hideaki Uchimiya, Shinpei Ogata

, Kenji Kaijiri:
Method mining in experimental software engineering. 1012-1016 - Xiaoquan Liu, Xinwei Wang, Yinan Cao, Songtao Fan, Yan Zhou:

A control software of gated imaging lab(GIL) for 2D/3D range-gated imaging. 1017-1021 - Chi Yao, Yawen Wang, Feng Li, Yunzhan Gong:

A method of function modeling in accurate stub generation. 1022-1026 - Jian-sen Liu, Kun Zhai, Bin Liu:

Creating an integrated marketing information system. 1027-1032 - Shuailing Zhang, Dongxiang Zhang, Miyi Li, Wensheng Deng:

Virtual assembly of chemical equipment. 1033-1037 - Yongji Ouyang, Shuai Zeng, Chao Yang, Qingxian Wang:

Improving guide-based vulnerability detection with hybrid symbolic execution. 1038-1043 - Yi Zhang, Lu-Yong Zhang:

JDBC-based middleware applications in instant message systems. 1044-1049 - Shu-Bo Zhang, Bin Zhang, Yin Zhang, Anxiang Ma, Daming Sun:

A search log sparseness oriented query expansion method. 1050-1055 - Jinson Zhang, Zhao-Peng Meng, Mao Lin Huang

:
BigData visualization: Parallel coordinates using density approach. 1056-1063 - Wentsung Lai, Ya-Hui Chan:

Causality evaluation of transfer function by fuzzy data. 1064-1066 - Lin Hua, Hong Xia, Ping Zhou, Li An:

Explore the associated MiRNAs with emphysema severity of chronic obstructive pulmonary disease. 1067-1071 - Peng Zhang, Wen Zhang, Shao-Zhang Niu, Zhen-peng Huang:

User level secure deletion for USB flash disks. 1072-1077 - Lin Hua, Hong Xia, Ping Zhou, Li An:

Targets of MiRNAs in lung cancer related pathways as predictors of chronic obstructive pulmonary disease. 1078-1082

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














