JOURNAL OF COMPUTERS Vol. 31 No. 1 February 2020
0. |
Contents and cover
|
1. | Investing Strategies as Stochastic Oscillator Indicators Staying in Overreaction Zones for Consecutive Days with Big Data Concerns Yensen Ni, Paoyu Huang, Yaochia Ku, Yiching Liao, Min-Yuh Day full article
|
2. | HMM-based Fault Diagnosis for Web Service Composition Zhi-Chun Jia, Yuan Lu, Xiang Li, Xing Xing full article
|
3. | A Crowd Video Retrieval Framework Using Generic Descriptors Pei Voon Wong, Norwati Mustapha, Lilly Suriani Affendey, Fatimah Khalid full article
|
4. | Deeply Integrated Convolutional Neural Networks Daojun Liang, Xiuping Wang, Xiaohui Ju, Feng Yang full article
|
5. | Reliability of Cluster-based Mobile Cloud Computing Enhancement Using Optimal Byzantine Agreement Shu-Ching Wang, Ya-Jung Lin, Kuo-Qin Yan, Yao-Te Tsai full article
|
6. | High Precision Calibration Method for Binocular Visual System Yuxin Du, Minming Tong, He Zhang full article
|
7. | An Improved Particle Swarm Optimization Algorithm Based on Restart Strategy Hu Huang, Yu-Hui Lei, Chen-Hao Xiong, Ding Yang full article
|
8. | An Improved Memetic Algorithm for Traction Characteristic Curve Fitting of Urban Rail Vehicle Kai-Wei Liu, Xing-Cheng Wang, Long-Da Wang, Gang Liu full article
|
9. | Using Analytic Hierarchy Process to Assess Network Video Quality Zhiming Shi, Chengti Huang, Jianeng Tang full article
|
10. | Effective Hierarchical Cluster Analysis Based on New Clustering Validity Index Er-Zhou Zhu, Yin-Yin Ju, Da-Wei Liu, Yang Li, Dong Liu, Zhu-Juan Ma full article
|
11. | Multi-Authority Attribute-based Encryption Resilient against Auxiliary-Input Leakage Hai-Ying Ma, Zhan-Jun Wang, Jin-Hua Wang, Zhi-Jin Guan full article
|
12. | Multi-object Cosegmentation Using Density-based Clustering Tzu-Chiang Wang, I-Cheng Chang, Chun-Man Lin full article
|
13. | Cross-regional Cross-level Encryption Collaborative Data Transmission Tongfei Yao, Yun Liu, Shih-Chen Wang, Sheng-Lung Peng, Kun Mi, Zhihong Ying full article
|
14. | A Face Recognition System on Embedded Device Lianfen Huang, Jia Guo, Zhibin Gao full article
|
15. | Research on Cache Timing Template Attack Based on KNN Algorithm Cai-Sen Chen, Zhi-Wei Cheng, Yu-Bo Wang, An Wang, Xiang-liang Ma full article
|
16. | A Situation Awareness System for the Information Security of Power Grid Ming Xie, Zhubin Chen full article
|
17. | Neutral Point Clamped Single-phase Three-level Rectifier Operated with SHE-PWM Based on Improved Particle Swarm Optimization Xin-Hua Guo, Zhao-Xian Wang, Lei-Jun Xiang, Jiang-Yu Xue, Kai Xu full article |
18. | A Web Service Composition Model k2-MDD-WS Fengying Li, Xianqiang Wu, Rongsheng Dong full article |
19. | Abnormal-Gait Based Auxiliary Diagnosis System for Parkinsonˇ¦s Disease Xuwei Fan, Zhibin Gao, Hezhi Lin, Lianfen Huang full article |
20. | Multi-pose Face Recognition Based on Convolutional Neural Network Jinyu Li, De Zhang full article |
21. | Generate Football News from Live Webcast Scripts Based on Character-CNN with Five Strokes Xue-Qiang Lv, Xin-Dong You, Wen-Chao Wang, Jian-She Zhou full article |
22. | Webshell Detection Based on Multi-classifier Ensemble Model Wenjuan-Lian, Qi-FAN, Dandan-Shi, Qili-An, Bin Jia full article |
23. | Power Data Classification Method Based on Selective Ensemble Learning Yi-Ying Zhang, Fei Liu, Hao-Yuan Pang, Bo Zhang, Yang Wang full article |
24. | Research on Security Communication and Access Control of Grid Service Yu-Bo Wang, Cai-Sen Chen, Xi-Ren Wang, Xiang-liang Ma, Lei-Ze Xue full article |
25. | Image Segmentation Method for Brassica Napus L. Based on PSO and Color Space Model Chang-Hua Liu, Shu-Fang Qin, Xiao-Ming Wu, Li-Xia Li, Kai-Qiong Sun, Ren-Feng Liu full article |
26. | Gesture Recognition System Based on Normalized Neural Network Yangyang Guo, Hezhi Lin, Zhibin Gao, Lianfen Huang full article |
27. | Study on V2V Clustering Algorithm in Heterogeneous Network Based on VANET and LTE-V2X Liu Shuang, Shao-Bo Wu, Jia-Hui Qiu, Liu Qi full article |
28. | Deep Learning in Aquaculture: A Review Ming Sun, Xiaofen Yang, Yinggang Xie full article |
29. | Chosen-ciphertext Secure Hierarchical Identity-based Encryption from R-LWE Xue-Feng Jiang, Ting Wang, Zhi-Wei Sun full article |