JOURNAL OF COMPUTERS Vol. 32 No. 4 August 2021
0. |
Contents and cover
|
1. | Topic Analysis in LDA Based on Keywords Selection Bing-Xin Du, Guo-Ying Liu full article
|
2. | Image Steganography Based on the Absolute Value of Adjacent Pixels Xiao-Ge Pan, Tian Yang, Ning Jia, Pan-Pan Zhao, Ming-Wei Tang full article
|
3. | A Novel Data-Driven Rolling Force Predictive Model Based on PSO-BAS-HKSVR Approach Ming-Hua Liu, Qiang Zhang, Ying-Hua Liu, Wen-Li Wang full article
|
4. | A Novel Denoising Algorithm of RFID Label Image Based on Singular Spectrum Analysis of Phase Space Reconstruction Shanhao Zhou, Xiaolei Yu, Ke Zhang, Zhenlu Liu, Lin Li, Zhimin Zhao full article
|
5. | Does CBOE Volatility Index Jumped or Located at a Higher Level Matter for Evaluating DJ 30, NASDAQ, and S&P500 Index
Subsequent Performance Yulu Liao, Min-Yuh Day, Yirung Cheng, Paoyu Huang, Yensen Ni full article
|
6. | Uncertain GM-CFSFDP Clustering Algorithm for Landslide Hazard Prediction Yimin Mao, Binbin Guo, Ruey-Shun Chen, Yeh-Cheng Chen, Tao Tao, Deborah Simon Mwakapesa full article
|
7. | Description Model and Qualitative Evaluation of Intelligence Characteristics of Unmanned Swarms Wen-Liang Wu, Xing-She Zhou full article
|
8. | Using Improved Dense Trajectory Feature to Realize Action Recognition Guo-Liang Xu, Hang Zhou, Liang-You Yuan, Yue-Yu Huang full article
|
10. | A Spark-based Method for Identifying Large-scale Network Burst Traffic Yu-Lu Sun, Ben-Sheng Yun, Ya-Guan Qian, Jun Feng full article
|
11. | A Novel Hierarchical Wildfire Alarm System Based on Vegetation Features Kuo-Ming Hung, Li-Ming Chen, Ting-Wen Chen full article
|
12. | Lung Fields Segmentation Based on Shape Compactness in Chest X-Ray Images Yuqin Li, Ke Zhang, Weili Shi, Zhengang Jiang full article
|
13. | Research on Improved Ant Colony Optimization Based on Adaptive Chemical Reaction Optimization Teng Fei, Xin-Xin Wu, Xu-Hua Pan full article
|
14. | Design and Implementation of Cloud-Edge Integrated Security Authentication System Cai-sen Chen, Bo-gong Ji, Ying-zhan Kou, Jia-xing Du full article
|
15. | A Maximizing Influence of Multiple Nodes Propagation Algorithm Based on Optimal Neighbor Discovery Yun Liu, Ling Sun, Fei Xiong, Junjun Cheng full article
|
16. | Research on Insider Threat Detection Method Based on Variational Autoencoding Zhenjiang Zhang, Lulu Zhao, Yang Zhang, Hongde Zhou, Wei Li full article
|
17. | Research on Cloud-edge Joint Task Inference Algorithm in Edge Intelligence Yaping Zheng full article |
18. | Design of Malicious Code Detection System Based on Binary Code Slicing Zhiyuan Zhang, Zhenjiang Zhang, Wei Li, Hongde Zhou, Bo Shen full article |
19. | Cloud-side Collaborative Privacy Protection Based on Differential Privacy Zhenjiang Zhang, Desong Qin, Zihang Yu, Li He, Xiaohua Liu, Shutao Liu full article |
20. | Research on Road Traffic Accident Judgment Method Based on D-S Evidence Theory Naiyue Chen, Zhenjiang Zhang, Jiawei Wang, Zihang Yu full article |