2015
2015
Volume 9, Number 10, 2015 October
-
- Efficient Mining Maximal Constant Row Bicluster in Function-resource Matrix for IMA Safety Analysis, Miao Wang, Zhiyong Xiong, Liang Xu, Lihua Zhang,Qingfan Gu and Guoqing Wang (pp. 1-20).
- LDPC Encoder and Decoder Architecture for Coding 3-bit Message Vector, Gade Sribala, D. V. N. Sukanya, K. Gouthami and Tai-hoon Kim (pp. 21-30).
- Joint Encryption and Error Correction Technical Research Applied an Efficient Turbo Code, Jianbin Yao, Jianhua Liu and Yang Yang (pp. 31-44).
- Application of Multi-attribute Cloud Decision Method in Congestion Control, Zhao Yu-hong, WuAi-Yan, Zheng Xue-feng, and Tu Xu-yan (pp. 47-58).
- Security of Personal Bio Data in Mobile Health Applications for the Elderly, Jong Tak Kim, Un Gu Kang, Young Ho Lee and Byung Mun Lee (pp. 59-70).
- Robust Fault Diagnosis Algorithm of Nonlinear System based on Group Algebra Theory, Zhao Jing-yun, Han Xiao, Fu Zhen-duo and Liao Yue-feng (pp. 71-82).
- Fingerprint Spoof Detection Using Quality Features, Arunalatha G and M. Ezhilarasan (pp. 83-94).
- Controlled Quantum Secure Direct Communication Protocol Based on Extended Three-particle GHZ State Decoy, Tao Fang (pp. 95-102).
- An Adaptive Gray Scale Watermarking Method in Wavelet Domain, Jialing Han and Xiaohui Zhao (pp. 103-114).
- Study on the System for Prevention of Harmful Invasion with Access from Wireless LAN Access Point, Chang-Su Kim (pp. 115-124).
- Embedding Binary Image Watermark in DC Components of All Phase Discrete Cosine Biorthogonal Transform, Fanfan Yang, Chengyou Wang, Wei Huang, and Xiao Zhou (pp. 125-136).
- Research on Detection Algorithm of WEB Crawler, Hongyan Zhao (pp. 137-146).
- An Approach to Generate 2-Dimensional AVK to Enhance Security of Shared Information, Manash Pratim Dutta, Subhasish Banerjee and C. T. Bhunia (pp. 147-154).
- Research on Approaching Error Boundary of Variable Universe Adaptive Fuzzy Controller, Hui Li (pp. 155-164).
- The User Action Event Generator Design for Leading Malicious Behaviors from Malware in Sandbox, Jung-Uk Joo, Incheol Shin, Tong-Wook Hwang and Minsoo Kim (pp. 165-176).
- An Optimized k-means Algorithm for Selecting Initial Clustering Centers, Jianhui Song, Xuefei Li and Yanju Liu (pp. 177-186).
- Constraint Sequential Fault Diagnosis using An Inertial Velocity Differential Evolution Algorithm, Xiaohong Qiu, Yuting Hu and Bo Li (pp. 187-200).
- Requirement of Security for IoT Application based on Gateway System, Jung Tae Kim (pp. 201-208).
- Platformization Mechanism and Simulation Analysis of High-tech Service Innovation Network Based on Structural Holes Theory, Yaowu Sun and Xiaoye Gong (pp. 209-220).
- Measurement for the Rehabilitation Efficacy of Aerobic Exercise of Male Elderly Patients with GPA based on Large-Scale Internet Data, Long Xiaodong, Tao Ganchen, Luo Hong, Wang Yuefeng and Chen Yuanping (pp. 221-230)
- Evaluating Software Metrics as Predictors of Software Vulnerabilities, Mamdouh Alenezi and Ibrahim Abunadi, (pp. 231-240).
- Rebuild the Basement Tectonic Framework of the Western South China Sea, Changsong Lin and Lihong Zhao (pp. 241-254).
- Research on the Governance Structure of Little Science based on Network of Employment Relationship: Policy Implications for China, Zhen-yu Huang, Yun-long Ding (pp. 255-266).
- A Comparative Study of the Proposed National Cyber-terror Prevention Act, Dea-woo Park and Jin Shin (pp. 267-274).
- Research on the Impact of E-commerce to Logistics Economy: An Empirical Analysis based on Zhengzhou Airport Logistics, Lei Wang (pp. 275-286).
- Research on the Influence of E-commerce Platform to Agricultural Logistics: An Empirical Analysis based on Agricultural Product Marketing, Yuqiu Cai, Yuqi Lang, Shulan Zheng and Yongqiang Zhang (pp. 287-296).
- An Efficient and Robust Anonymous Authentication Scheme in Global Mobility Networks, Jaecheol Ha (pp. 297-312).
- Research on Risk Early-Warning Model in Airport Flight Area based on Information Entropy Attribute Reduction and BP Neural Network, Li Shi and Fan Luo (pp. 313-322).
- Online Marketing Strategy for Agricultural Supply Chain and Regional Economic Growth based on E-commerce Perspective, Hui Yang and Yajuan Zhang (pp. 323-332).
- Quantum Secure Direct Communication Using Checking Sequence Coded, Zhao Guoan, Su Geng, Ning Fan and Gao Zehua (pp. 333-340).
- Spam Filtering based on Knowledge Transfer Learning, Xing Wang, Bin-Xing Fang, Hui He and Hong-Li Zhang (pp. 341-352).
- Cloud Security Algorithms, Ashima Pansotra and Simar Preet Singh (pp. 353-360).
- Node Trust Assessment and Prediction in Mobile Ad Hoc Networks, Shaojie Zhou and Hui Xia (pp. 361-372).
- A Study on Mobile Device Control Model for Critical Data Leakage Prevention in the Enterprise Business Service, Yong-Suk Kang, Yoondeok Kim, Yongtae Shin and Jong-Bae Kim (pp. 373-380).
- Coverage Balancing Based Trust Evaluation Method for Wireless Sensor Networks, Shen Haibo, Dong Shengjie, Xu Jian and Zhang Hong (pp. 381-394).
- Client Oriented Remote Attestation Model in Cloud Environment, Liu Zhenpeng, Wang Xu, Liu Yifan, Guo Ding and Zhu Xianchao (pp. 395-404).
- Comparison of Genetic Algorithm based Watermarking Techniques using Tournament Selection Approach and Roulette Wheel Approach for Fidelity Optimization, Sachin Goyal and Roopam Gupta (pp. 405-412).
- Research on the Impact of E-commerce on Enterprise Performance Based Factor Analysis, Xiong Hu (pp. 413-424).
- Application of Data Mining based on Classifier in Class Label Prediction of Coal Mining Data, Haixu Xi, Dan Guo and Hongjin Zhu (pp. 425-432).