JOURNAL OF COMPUTERS     Vol. 30  No. 3     June 2019

0.
Contents and Cover

1. Automatic Extraction of Fuzzy and Touching Leukocyte Using Improved FWSA K-means in Peripheral Blood and Bone Marrow Cell Images
Li-Qun Lin, Wei-Xing Wang
full article

2. Application of Grey-Markov Chain Model in Software Reliability Prediction
Gul Jabeen, Xi Yang, Ping Luo, Sabit Rahim
full article

3. The Implementation of a Secret Information Hiding Framework Based on Hash Function and Invisible ASCII Characters Replacement
Er-Zhou Zhu, Zhu-Juan Ma, Hui Sun, Feng Liu
full article

4. Distributed Implementation of Iterative Kalman Filter Localization with Taylor Expansion for Wireless Sensor Networks
Yue-Jiao Wang, Zhong Ma, Xue-Han Tang
full article

5. IM-MobiShare: An Improved Privacy Preserving Scheme Based on Asymmetric Encryption and Bloom Filter for Users Location Sharing in Social Network
Lin Teng, Hang Li, Shoulin Yin
full article

6. Influence of Multiple Tagsˇ¦ Distribution on the Reading Performance of RFID-MIMO System Based on CRB
Xiao-lei Yu, Xiao Zhuang, Yin-shan Yu, Zhi-min Zhao
full article

7. Research on Weibo Public Opinion Prediction Using Improved Genetic Algorithm Based BP Neural Networks
Fang-Min Yin, Hua-Hu Xu, Hong-Hao Gao, Min-Jie Bian
full article

8. A Spatio-Temporal-Contour-Consistency-Based Shape Tracking Framework from Multi-View Video
Chu-Hua Huang, Jin Qin, Zhi Li

full article

9. An Emotion Feature Highlighting Method for Sentiment Analysis of Social Media Text
Zi-Qiang Shen, Tao Song, Qi-Rong Mao, Zhen Jiang
full article

10. An optimized Speculative Execution Strategy Based on Local Data Prediction in Heterogeneous Hadoop Environment
Dan-Dan Jin, Qi Liu, Xiao-Dong Liu, Nigel Linge
full article

11. Research on The Location Planning and Optimization of Express Delivery Service Based on Probabilistic Model Checking: A Computing and Improvement Perspective
Yonghua Zhu, Xiaoyi Xue, Kai Zhang, Shunyi Mao
full article

12. A Novel Fuzzy Clustering Approach Based on Breadth-first Search Algorithm
Ying Zhang, Li-li Zhai, Muhammad Shahbaz
full article

13. Research on the Co-opetition Relationship of a Closed-loop Supply Chain Based on Private Information Leakage
Pan Liu, Shu ping Yi, Yue Long
full article

14. Efficient and Rational Multi-criteria Group Decision Making Method Based on Vague Set Theory
Kuo-Sui Lin
full article

15. Efficient Predictive Structure Algorithm for MV-HEVC
Tao Yan, In-Ho Ra, Lin-Yun Huang, Min-Hang Weng
full article

16. A Non-central Point Sound Field Reconstruction Method for 22.2 Multichannel System
Song Wang, Cong Zhang, Han-Chieh Chao, Heng Wang
full article

17. A DD-means Clustering Algorithm for Intrusion Behavior Analysis
Yongxin Feng, Yingyun Kang, Yuntao Zhao, Wenbo Zhang
full article

18. Research on the Synergetic Algorithm of Linear Permanent Magnet Motor
Jinzi Li, Jiongran Xiao, Jianfei Pan
full article

19. Human Resource Allocation Management Based on Network Data Quality
Meilan Guo, Bei Li
full article

20. Data Analysis Ability of Data Mapping in Business Circulation Statistics
Yu Guan
full article

21. Stock Selection in Investment Management of Commercial Stock Market: Prediction by Data Mining
Qun Wang, Xiaoyu Hu
full article

22. A Portable Sketching Robot Based on Artificial Intelligence
Yunxiu Xu, Bingxia Shen, Shan Luo, Mi Zhao and Xinghan Li
full article

23. Nursing Robot Safety Path Planning Based on Improved A Star Algorithm
Hongjiang Yu, Xingang Miao, Su Wang, Yawei Hu
full article

24. High-accuracy 3D indoor Positioning Algorithm Based on P440 Ultra-wideband Ranging and Communication Module
Hui Liu, Xu Zhang, Lei Zhang, Lei Pang, Fang Li
full article

25. A Survey of Segmentation Algorithms Based on ITK
Zhen-Huan Zhou, Xiao-Jun Wen
full article

26. The Research on Computer Network Security Defense System Based on GABP Neural Network Algorithm
Han Feng
full article

27. Design of a Control system Based on Beck Hoff TwinCAT Nursing Robot
Xuedong Li, Xingang Miao, Su Wang
full article