Advanced Search

    column
    Stealing Behavior Recognition Method Based on Electricity Characteristics Analysis
    Shi Yuliang, Rong Yiping, Zhu Weiyi
    2018, 55(8): 1599-1608. DOI: 10.7544/issn1000-1239.2018.20180216
    Abstract PDF
    The Automatic Identification of Butterfly Species
    Xie Juanying, Hou Qi, Shi Yinghuan, Lü Peng, Jing Liping, Zhuang Fuzhen, Zhang Junping, Tan Xiaoyang, Xu Shengquan
    2018, 55(8): 1609-1618. DOI: 10.7544/issn1000-1239.2018.20180181
    Abstract PDF
    An Overlapping Community Detection Algorithm Based on Centrality Measurement of Network Node
    Du Hangyuan, Wang Wenjian, Bai Liang
    2018, 55(8): 1619-1630. DOI: 10.7544/issn1000-1239.2018.20180187
    Abstract PDF
    A Distributed Representation Model for Short Text Analysis
    Liang Jiye, Qiao Jie, Cao Fuyuan, Liu Xiaolin
    2018, 55(8): 1631-1640. DOI: 10.7544/issn1000-1239.2018.20180233
    Abstract PDF
    The Social and Conceptual Semantic Extended Search Method for Microblog Short Text
    Cui Wanqiu, Du Junping, Kou Feifei, Li Zhijian, Lee JangMyung
    2018, 55(8): 1641-1652. DOI: 10.7544/issn1000-1239.2018.20180363
    Abstract PDF
    Variant Entropy Profile: A Multi-Granular Information Model for Data on Things with Order-of-Magnitude Compression Ratios
    Chao Lu, Peng Xiaohui, Xu Zhiwei
    2018, 55(8): 1653-1666. DOI: 10.7544/issn1000-1239.2018.20180219
    Abstract PDF
    Left-vs-Right Eye Discrimination Based on Convolutional Neural Network
    Zhong Zhiquan, Yuan Jin, Tang Xiaoying
    2018, 55(8): 1667-1673. DOI: 10.7544/issn1000-1239.2018.20180215
    Abstract PDF
    Predicting Biological Functions of G Protein-Coupled Receptors Based on Fast Multi-Instance Multi-Label Learning
    Wu Jiansheng, Feng Qiaoyu, Yuan Jingzhou, Hu Haifeng, Zhou Jiate, Gao Hao
    2018, 55(8): 1674-1682. DOI: 10.7544/issn1000-1239.2018.20180361
    Abstract PDF
    U-Statistics and Ensemble Learning Based Method for Gene-Gene Interaction Detection
    Guo Yingjie, Liu Xiaoyan, Wu Chenxi, Guo Maozu, Li Ao
    2018, 55(8): 1683-1693. DOI: 10.7544/issn1000-1239.2018.20180365
    Abstract PDF
    A Deep Q-Network Method Based on Upper Confidence Bound Experience Sampling
    Zhu Fei, Wu Wen, Liu Quan, Fu Yuchen
    2018, 55(8): 1694-1705. DOI: 10.7544/issn1000-1239.2018.20180148
    Abstract PDF
    A Reinforcement Learning Algorithm for Traffic Offloading in Dense Heterogeneous Network
    Wang Qian, Nie Xiushan, Yin Yilong
    2018, 55(8): 1706-1716. DOI: 10.7544/issn1000-1239.2018.20180310
    Abstract PDF
    A Measurable Bayesian Network Structure Learning Method
    Qi Xiaolong, Gao Yang, Wang Hao, Song Bei, Zhou Chunlei, Zhang Youwei
    2018, 55(8): 1717-1725. DOI: 10.7544/issn1000-1239.2018.20180197
    Abstract PDF
    Linguistic-Valued Intuitionistic Fuzzy Concept Lattice and Its Application
    Zou Li, Feng Kaihua, Liu Xin
    2018, 55(8): 1726-1734. DOI: 10.7544/issn1000-1239.2018.20180240
    Abstract PDF
    An Algorithm for Computing Core of Boolean Game
    Wang Bo, Liu Jinglei
    2018, 55(8): 1735-1750. DOI: 10.7544/issn1000-1239.2018.20180360
    Abstract PDF
    Exploiting Label Relationships in Multi-Label Classification with Neural Networks
    Song Pan, Jing Liping
    2018, 55(8): 1751-1759. DOI: 10.7544/issn1000-1239.2018.20180362
    Abstract PDF
    Fast Low-Rank Shared Dictionary Learning with Sparsity Constraints on Face Recognition
    Tian Ze, Yang Ming, Li Aishi
    2018, 55(8): 1760-1772. DOI: 10.7544/issn1000-1239.2018.20180364
    Abstract PDF
    Semantical Symbol Mapping Embedding Learning Algorithm for Knowledge Graph
    Yang Xiaohui, Wan Rui, Zhang Haibin, Zeng Yifu, Liu Qiao
    2018, 55(8): 1773-1784. DOI: 10.7544/issn1000-1239.2018.20180248
    Abstract PDF
    Survey on Security Threats and Countermeasures of Network Flow Watermarking
    Zhang Liancheng, Wang Yu, Kong Yazhou, Qiu Han
    2018, 55(8): 1785-1799. DOI: 10.7544/issn1000-1239.2018.20170448
    Abstract PDF
    Publicly Verifiable Databases Scheme with Efficient Updates and Low Storage Overhead
    Wu Qiyu, Zhou Fucai, Wang Qiang, Li Yuxi
    2018, 55(8): 1800-1808. DOI: 10.7544/issn1000-1239.2018.20170320
    Abstract PDF
    Location-Constrained Access Control Model and Verification Methods
    Cao Yan, Huang Zhiqiu, Kan Shuanglong, Peng Huanfeng, Ke Changbo
    2018, 55(8): 1809-1825. DOI: 10.7544/issn1000-1239.2018.20170250
    Abstract PDF