Abstract is missing.
- An algorithm for reduct cardinality minimizationHassan AbouEisha, Mohammed Al Farhan, Igor Chikalov, Mikhail Moshkov. 1-3 [doi]
- Boosting for learning from multiclass data sets via a regularized loss functionMohamed Abouelenien, Xiaohui Yuan. 4-9 [doi]
- Bi-superintuitionistic logics for rough setsSeiki Akama, Tetsuya Murai, Yasuo Kudo. 10-15 [doi]
- Granular based analytical hierarchical processAssem Ahmed Alsawy, Hesham Ahmed Hefny. 16-21 [doi]
- P2P traffic identification based on transfer learningLin Cai, Xiaojun Jing, Songlin Sun, Hai Huang 0001, Na Chen, Yueming Lu. 22-26 [doi]
- MC framework: High-performance distributed framework for standalone data analysis packages over Hadoop-based cloudChao-Chun Chen, Nguyen Huu Tinh Giang, Tzu-Chao Lin, Min-Hsiung Hung. 27-32 [doi]
- Container-code pattern recognition based on attribute grid computingLiang-dong Chen, Wei-Ming Zeng, Ni-zhuan Wang. 33-37 [doi]
- The YTM-based stock portfolio mining approach by genetic algorithmChun-Hao Chen, Ching-Yu Hsieh, Yeong-Chyi Lee. 38-42 [doi]
- Parallel mining frequent patterns over big transactional data in extended mapreduceHui Chen, Tsau Young Lin, Zhibing Zhang, Jie Zhong. 43-48 [doi]
- Defensive strategy of the goalkeeper based on the 3D vision and field division for the middle-size league of robocupJiehao Chen, Chen Ma, Zizhen Yan, Bo Chen, Yu Shen, Yu Liang. 49-52 [doi]
- The design and implementation of the kernel level mobile storage medium data protection systemJiehao Chen, Yi Zheng, Liang Zhang, Ming Wang, Fangyu Gai, Canhan Li, Yu Shen. 53-57 [doi]
- Using end-to-end data encryption to secure SIP device configurationXudong Chen, Wenjun Fan. 58-63 [doi]
- An ad-hoc clustering algorithm based on ant colony algorithmYing-Wei Chen, Xin Xia, Rong Wang. 64-69 [doi]
- Finding time series motifs based on cloud modelHehua Chi, Shuliang Wang. 70-75 [doi]
- A Comparison of global and local probabilistic approximations in mining data with many missing attribute valuesPatrick G. Clark, Jerzy W. Grzymala-Busse. 76-81 [doi]
- Modeling and control of a sugars precipitation process for Chinese medicine mixed solutionHongjun Duan, Qingwei Li. 82-87 [doi]
- Multi-agent comprehensive evaluation on inland port production efficiency based on arrtibute theoryDuan Xue-yan, Yu Si-qin, Xu Guang-lin. 88-90 [doi]
- The construction and research of lightweight cryptography SOPT-S boxes based on the inverse mapping in galois fieldZhao-long Fan, Qi-jian Xu, Yongjun Xu, Fei Wang. 91-98 [doi]
- Information fusion of multi-fuzzy information systemsTao Feng, Libo Feng. 99-104 [doi]
- A secure query method for EPCGlobal networksGe Fu, Xinran Liu, Hong Zhang. 105-109 [doi]
- Higher order vagueness and rough setsHao Cheng Fu. 110-113 [doi]
- Multi-objective opposition-based learning fully informed particle swarm optimizer with favour rankingYing Gao, Lingxi Peng, FuFang Li, Miao Liu, Waixi Liu. 114-119 [doi]
- Ensure privacy and security in the process of medical image analysisMahadevan Gomathisankaran, Xiaohui Yuan, Patrick Kamongi. 120-125 [doi]
- Granular computing for inconsistent decision tableSujie Guan. 126-131 [doi]
- A novel algebra to articulate feature in text dimension reductionXin Guo, Yang Xiang, Qian Chen. 132-136 [doi]
- Clothes style recommendation systemW. H. Hsieh, B. F. Xue, J. C. Chen, Kawuu W. Lin, W. L. Chang. 137-140 [doi]
- The construction of general type-2 fuzzy setsDan Hu, Tsau Young Lin, Qiang Fan. 141-146 [doi]
- Granular computing in visual haze-free taskHong Hu, Liang Pang, Dongping Tian, Zhongzhi Shi. 147-152 [doi]
- Dynamic relationship between real estate prices and inflation rateHuang Ting, Liu Huangjin. 153-156 [doi]
- Improvement in the Cohen-Sutherland line segment clipping algorithmBaoqing Jiang, Jingjing Han. 157-161 [doi]
- Application of table based similarity to classification of bio-medical documentsTaeho Jo. 162-166 [doi]
- Simulation of numerical semantic operations on strings in medical domainTaeho Jo. 167-171 [doi]
- Decision logic for rough set-based interrelationship miningYasuo Kudo, Tetsuya Murai. 172-177 [doi]
- Specific-to-general approach for rule induction using discernibility based dissimilarityYoshifumi Kusunoki, Tetsuzo Tanino. 178-181 [doi]
- Research on simulation of the networks information ecological chain evolutionary process in complex network perspectiveLi Beiwei, Fu Jinxin. 182-185 [doi]
- Dimension reduction based on categorical fuzzy correlation degree for document categorizationQiang Li, Liang He, Xin Lin. 186-190 [doi]
- Privacy preserving high utility mining based on genetic algorithmsChun-Wei Lin, Tzung-Pei Hong, Jia-Wei Wong, Guo-Cheng Lan. 191-195 [doi]
- Evaluate dynamic network with evolutionary game methodQun Liu, Jia-yi. 196-201 [doi]
- Forecasting model based on an improved Elman neural network and its application in the agricultural productionYi Liu, Ke Xu, Junde Song, Yuwen Zhao, Qiang Bi. 202-207 [doi]
- Complex scientific management of China's higher educationZhaohui Liu, Zheng Zeng. 208-212 [doi]
- A fuzzy data mining approach for remote sensing image recommendationEric Hsueh-Chan Lu, Jung-Hong Hong, Zeal Li-Tse Su, Chun-Hao Chen. 213-218 [doi]
- GN: A privacy preserving data publishing method based on generalization and noise techniquesYeling Ma, Jiyi Wang, Jianmin Han, Lixia Wang. 219-224 [doi]
- Algorithms of crisp, fuzzy, and probabilistic clustering with semi-supervision or pairwise constraintsSadaaki Miyamoto, Nobuhiro Obara. 225-230 [doi]
- Sparse manifold embedding Tri-factor Nonnegative Matrix FactorizationXiaobing Pei, Zehua Lv, Changqing Chen. 231-235 [doi]
- A dynamic attribute reduction algorithm based on compound attribute measureWenbin Qian, Yonghong Xie, Bingru Yang. 236-241 [doi]
- Equipment supportability assessment using matter-element and cloud model integrated methodQiwei Hu, Guangyan Wang, Yongsheng Bai. 242-246 [doi]
- Resilient and adaptive public-key infrastructure for distributed city-wide surveillance systemsAarne Rantala, Markku Kylänpää, Janne Merilinna, Mikko Nieminen. 247-252 [doi]
- Performance-driven live migration of multiple virtual machines in datacentersTusher Kumer Sarker, Maolin Tang. 253-258 [doi]
- Construct rough approximation based on GAELin Shi, Jun Meng, Yang Zhou, Tsauyoung Lin. 259-264 [doi]
- Predicting tumor location from prone to supine breast MRI using a simulation of breast deformationHong Song, Xiangbin Zhu, Xiangfei Cui. 265-269 [doi]
- High-performance content-based image retrieval using DFS strategyJa-Hwung Su, Chung-Chieh Hsu, Josh Jia-Ching Ying. 270-275 [doi]
- Definability of approximations in reflexive relationsYu-Ru Syau, Lixing Jia, En-Bing Lin. 276-280 [doi]
- Sequential extraction of clusters for imbalanced dataHengjin Tang, Sadaaki Miyamoto. 281-285 [doi]
- Combining SURF with MSER for image matchingLei Tao, Xiaojun Jing, Songlin Sun, Hai Huang 0001, Na Chen, Yueming Lu. 286-290 [doi]
- A study on the relationship mechanism between institutionalized management and employee satisfaction in hotel companiesXiaolong Tao, Wanqing Lv Qiaoran Wang. 291-296 [doi]
- Multi-features prostate tumor aided diagnoses based on ensemble-svmTao Zhou, Huiling Lu. 297-302 [doi]
- Algebraic analysis of statistical dependenceShusaku Tsumoto, Shoji Hirano. 303-308 [doi]
- Incremental induction of medical diagnostic rulesShusaku Tsumoto, Shoji Hirano. 309-314 [doi]
- A mapping between fuzzy covering information systemsChangzhong Wang, Wenying Bao, Xiuxiu Wang, Qiang He. 315-319 [doi]
- A new method of face recognition with data field and PCADakui Wang, Dongwei Li, Yi Lin. 320-325 [doi]
- An introduction to the variable neighborhood and the related adaptive determination algorithmFangxin Wang, Wei Pan, Lifeng Wu, Yong Guan. 326-331 [doi]
- (k, ε)-Anonymity: An anonymity model for thwarting similarity attackHaiyuan Wang, Jianmin Han, Jiyi Wang, Lixia Wang. 332-337 [doi]
- Measurement and analysis of Shanghai Xinmin microblog websiteJian Wang, Xiaolin Xu, Xiaoming Hu, Yinchun Yang, Xiumei Wu. 338-341 [doi]
- Protein function prediction based on physiochemical properties and protein granularityWanlu Wang, Xin Zhang, Jun Meng, Yushi Luan. 342-346 [doi]
- Towards sharing disks between host OS and virtual machine with volume snapshot technologyYan Wen, Jinjing Zhao, Hua Chen, Minhuan Huang. 347-352 [doi]
- A combined analysis method of FMEA and FTA for improving the safety analysis quality of safety-critical softwareXiangyu Han, Jun Zhang. 353-356 [doi]
- A new emotional model based on multiple factorsQiong Xiao, Gangyi Ding. 357-361 [doi]
- Knowledge mining in big data - A lesson from algebraic geometryJun Xie, Zehua Chen, Gang Xie, Tsau Young Lin. 362-367 [doi]
- The analysis and prediction of stock priceTao Xing, Yuan Sun, Qian Wang, Guo Yu. 368-373 [doi]
- Integrating multiple information of active learning for image classificationHaihui Xu, Pengpeng Zhao, Jian Wu, Zhiming Cui, Chengchao Li. 374-379 [doi]
- A comparative study of the semi-elastic and fully-elastic mapreduce modelsXiaoyong Xu, Maolin Tang. 380-385 [doi]
- Inclusion measure and its use in measuring similarity and distance measure between hesitant fuzzy setsShu Yun Yang, Hong-Ying Zhang, Zhi Wei Yue. 386-390 [doi]
- Cooperative task assignment of multiple UCAVs based on MAS and CNPYang Ying. 391-395 [doi]
- Predicting movie sales revenue using online reviewsRui Yao, Jianhua Chen. 396-401 [doi]
- An adaptive group recommender based on overlapping community detectionChen Yuan, Tingjie Lv, Xia Chen. 402-407 [doi]
- Handwritten digits recognition using multiple instance learningHanning Yuan, Peng Wang. 408-411 [doi]
- Scale selection in roughness based color quantizationXiaodong Yue, Duoqian Miao, Yue Wu, Caiming Zhong, Yufei Chen. 412-417 [doi]
- Variable precision neighborhood rough sets on two universesKai Zeng, Kun She. 418-422 [doi]
- Risk element transmission prediction model of grid infrastructure project capital flowChen-song Zhang, Xue-Qin Xiong, Cun-Bin Li, Liang Xu. 423-427 [doi]
- A study on the relationship between rural-urban income gap and human capital investment disparity in China: A case study on Yunnan provinceJianmin Zhang, Xiaoqing Duan, Li Lin, Yuhan Ma. 428-432 [doi]
- The design of touch-screen with high resolution infrared based on plastic optical fiber and image processingLiang Zhang, Jigao Fu, Zhubing Wang, Chen Ma, Bo Chen, Pingfan He. 433-436 [doi]
- An error analysis on locally linear embeddingPeng Zhang, Chunbo Fan, Yuanyuan Ren, Zhou Sun. 437-442 [doi]
- A novel detective and self-organized certificateless key management scheme in mobile ad hoc networksJun Zheng, Sanchun Xu, Fangfang Zhao, Dianxin Wang, Yuanjun Li. 443-448 [doi]
- A new theory of complexity science management - Big organizationZhan Zheng, Wei Zhao, Xiaodi Zhang, Xuegong Zeng, Xiaojing Zheng. 449-458 [doi]