JOURNAL OF COMPUTERS Vol. 29 No. 3 June 2018
1. | Computational Intelligence for Corrosion Rate Prediction of Refinery Cooling Water Plant Chen Xuan, Feng Dan, Lei Jing full article
|
2. | A Data Augment Method for Fine-grained Recognition Yin Zhang, Zhifeng Hu, Shenjing Tian full article
|
3. | Double Cluster Head-based Fault-tolerant Topology Control Algorithm for Wireless Sensor Networks Xue-Wei Wang, Sang-Yang Liu, Zhao-Hui Zhang full article
|
4. | Stability Analysis of Hybrid Impulsive and Switching Stochastic Neural Networks with Time-Delay Zhuang Fang, Xue-Gang Tan full article
|
5. | Bit Image Encryption Algorithm Based on Hyper Chaos and DNA Sequence Ye Liu, Tao Lin, Jun Wang, Hong-Mei Yuan full article
|
6. | An FCM-based Hierarchical Method for Evaluating Network Security Situation Zhijie Fan, Zhiping Tan, Chengxiang Tan, Xin Li full article
|
7. | A Memory Source Model Researched on Video Coding Quantization Algorithm Xin-Xiu Wei, Zhe-Lei Xia, Hai-Bing Yin, Hong-Kui Wang full article
|
8. | A Simple and Secure Non-interactive Deniable Authentication Scheme with Privacy Protection using Quantum Bits Hongfeng Zhu full article
|
9. | Nonlinear System State Estimation Mechanism Based on Kalman Filter for Wireless Sensor Networks Localization Yue-Jiao Wang, San-Yang Liu, Zhong Ma, Zhao-hui Zhang, Xue-Han Tang full article
|
10. | A Secure Non-interactive Chaotic Maps-based Deniable Authentication Scheme with Privacy Protection in Standard Model Hongfeng Zhu, Yan Zhang full article
|
11. | An Image Inpainting Technique on Chinese Paintings I-Cheng Chang, Zong-Sing Wun, Hung-Yu Yeh full article
|
12. | Business Requirement-based 5G Slice Selection Wenqi Wang, Zhan Xu, Zhigang Tian full article
|
13. | Dynamic Channel Allocation Scheme in CRN Applied Fuzzy-inference System Ying-Hong Wang, Shou-Li Liao full article
|
14. | Research on Model and Methodology of Big Data Security Situation Assessment Based on Fuzzy Set Xiao-Lu Han, Yun Liu, Zhen-Jiang Zhang, Xin Lu, Yang Li full article
|
15. | A Dynamic Method to Adjust Overlapping Community Structures Yi-Jen Su, Wei-Lin Hsu full article
|
16. | An Improved Weighted K-shell Decomposition Method for Complex Networks Zhenjiang Zhang, Xiaoyu Tan, Shiyuan Tong full article
|
17. | A Novel Comprehensive Optimization Routing Algorithm Based on Ladder Diffusion Yan-Hong Hu, Yu-Hai Li, Wen-Qi Xie full article |
18. | A Modified Tabu Search Algorithm to Solve Vehicle Routing Problem Qinhong Fu, Kang Zhou, Huaqing Qi, Falin Jiang full article |
19. | A New Bidirectional Research Chord Method Based on Bacterial Foraging Algorithm Hang Li, Lin Teng, Shoulin Yin full article |
20. | Bounded Confidence Opinion Dynamics in Virtual Networks and Real Networks Xia-Meng Si, Chen Li full article |
21. | Research on Switch Signals of Electrical Equipment in Power Distribution Systems Gen-ping Wang, You-de Ruan, Xiao-jun Wen full article |
22. | A Universal Controller Used in NCSs with Long Time Delay and Short Time Delay Jianqiu Deng, Cui Hao full article |
23. | The Research on Comprehensive Evaluation System of Teachers¡¦ Quality Construction in Ethnic Minority Areas Ran Li, LiMin Jia full article |