


default search action
Information, Volume 6
Volume 6, Number 1, March 2015
- Liqing Zhou, Henry Leung, Peng Xu, Guobao Ru, Quansheng Zhao, Da Xu:
The Kalman Filtering Blind Adaptive Multi-user Detector Based on Tracking Algorithm of Signal Subspace. 3-13 - Xunjun Chen:
Modeling of Experimental Adsorption Isotherm Data. 14-22 - Paul Walton:
Measures of Information. 23-48 - Jie-Sheng Wang, Jiang-Di Song, Jie Gao:
Rough Set-Probabilistic Neural Networks Fault Diagnosis Method of Polymerization Kettle Equipment Based on Shuffled Frog Leaping Algorithm. 49-68 - Huiru Zhao, Sen Guo, Wanlei Xue:
Urban Saturated Power Load Analysis Based on a Novel Combined Forecasting Model. 69-88 - Ho-Nien Hsieh, Jeng-Fung Chen, Quang Hung Do
:
Applying TRIZ and Fuzzy AHP Based on Lean Production to Develop an Innovative Design of a New Shape for Machine Tools. 89-110
Volume 6, Number 2, June 2015
- Yaohu Lin, Xuelian Lin, Ning Li, Yongmin Mu:
Evaluate the Interoperability of Document Format: Based on Translation Practice of OOXML and UOF. 111-121 - Yunmei Shi, Xuhong Liu, Ning Li, Xia Hou:
An MVC-based Intelligent Document Model Using UIML. 122-133 - Ying Shen, Ligang Zhao, Jing Fan:
Analysis and Visualization for Hot Spot Based Route Recommendation Using Short-Dated Taxi GPS Traces. 134-151 - Songjiang Lou, Xiaoming Zhao, Wenping Guo
, Ying Chen
:
Graph Regularized Within-Class Sparsity Preserving Projection for Face Recognition. 152-161 - Edoardo Magnone
:
Analysis of Scholarly Communication Activities in Buddhism and Buddhist Studies. 162-182 - Gaute Wangen:
The Role of Malware in Reported Cyber Espionage: A Review of the Impact and Mechanism. 183-211 - Fang Zong, Yu Bai, Xiao Wang, Yixin Yuan, Yanan He:
Identifying Travel Mode with GPS Data Using Support Vector Machines and Genetic Algorithm. 212-227 - Abhilash Sreeramaneni, Hyungjin Im, Won Min Kang, Chan Koh, Jong Hyuk Park
:
CIMS: A Context-Based Intelligent Multimedia System for Ubiquitous Cloud Computing. 228-245 - Jianfeng Xi, Wei Li, Shengli Wang, Chuanjiu Wang:
An Approach to an Intersection Traffic Delay Study Based on Shift-Share Analysis. 246-257 - Xunjun Chen, Yuelong Zhu, Jiguo Li, Yamin Wen, Zheng Gong:
Efficiency and Privacy Enhancement for a Track and Trace System of RFID-Based Supply Chains. 258-274 - Xuhong Liu, Ning Li, Yunmei Shi, Xia Hou:
ODQ: A Fluid Office Document Query Language. 275-286
Volume 6, Number 3, September 2015
- Jiarong Shi
, Xiuyun Zheng, Wei Yang:
Robust Sparse Representation for Incomplete and Noisy Data. 287-299 - Jie-Sheng Wang, Chen-Xu Ning:
ANFIS Based Time Series Prediction Method of Bank Cash Flow Optimized by Adaptive Population Activity PSO Algorithm. 300-313 - Reza Maleeh:
Mind, Matter, Information and Quantum Interpretations. 314-338 - Longhui Gang, Mingheng Zhang, Xiudong Zhao, Shuai Wang:
Improved Genetic Algorithm Optimization for Forward Vehicle Detection Problems. 339-360 - Guoxiang Lu, Bingqing Li:
A Class of New Metrics Based on Triangular Discrimination. 361-374 - Yuebo Zha, Zhihua Zhang, Yulin Huang, Jianyu Yang:
Controlled Remote State Preparation via General Pure Three-Qubit State. 375-387 - Jing Lu, Shengjun Xue, Xiakun Zhang, Yang Han:
A Neural Network-Based Interval Pattern Matcher. 388-398 - Maroua Drissi
, Mohammed Oumsis
:
Multi-Criteria Vertical Handover Comparison between Wimax and Wifi. 399-410 - Wolfgang Johannsen:
On Semantic Information in Nature. 411-431 - Fadil Hicham
, Driss Yousfi, Aite Driss Youness, Elhafyani Mohamed Larbi
, Nasrudin Abd. Rahim
:
Sliding-Mode Speed Control of PMSM with Fuzzy-Logic Chattering Minimization - Design and Implementation. 432-442 - Mao Ye, Zhi Tang, Jianbo Xu, Lifeng Jin:
Recommender System for E-Learning Based on Semantic Relatedness of Concepts. 443-453 - Pavel Lozhnikov
, Alexey Sulavko
, Alexander Samotuga
:
Personal Identification and the Assessment of the Psychophysiological State While Writing a Signature. 454-466 - Yao Wang, Jing Lu:
Optimization of China Crude Oil Transportation Network with Genetic Ant Colony Algorithm. 467-480 - Xingbing Fu, Xuyun Nie, Fagen Li:
Black Box Traceable Ciphertext Policy Attribute-Based Encryption Scheme. 481-493 - Khalid Fakhar, Mohamed El Aroussi, Mohamed Nabil Saidi, Driss Aboutajdine:
Applying the Upper Integral to the Biometric Score Fusion Problem in the Identification Model. 494-504 - Bilal M'hamed Abidine
, Belkacem Fergani:
News Schemes for Activity Recognition Systems Using PCA-WSVM, ICA-WSVM, and LDA-WSVM. 505-521 - Guangnian Xiao, Zhicai Juan, Jingxin Gao:
Travel Mode Detection Based on Neural Networks and Particle Swarm Optimization. 522-535 - Jinhua Ma, Zhide Chen, Wei Wu, Rongjun Zheng, Jianghua Liu:
Influences of Removable Devices on the Anti-Threat Model: Dynamic Analysis and Control Strategies. 536-549 - Anissa Benlarabi, Amal Khtira, Bouchra El Asri:
Analyzing Trends in Software Product Lines Evolution Using aCladistics Based Approach. 550-563 - Naoual Chaouni Benabdellah
, Mourad Gharbi, Mostafa Bellafkih
:
Toward E-Content Adaptation: Units' Sequence and Adapted Ant Colony Algorithm. 564-575
Volume 6, Number 4, December 2015
- Yamin Wen, Zheng Gong, Lingling Xu:
A Backward Unlinkable Secret Handshake Scheme with Revocation Support in the Standard Model. 576-591 - Amal Khtira, Anissa Benlarabi, Bouchra El Asri:
Duplication Detection When Evolving Feature Models of Software Product Lines. 592-612 - Jinhua Ma, Zhide Chen, Jianghua Liu, Rongjun Zheng:
Analysis of Two-Worm Interaction Model in Heterogeneous M2M Network. 613-632 - Pengfei Jia
, Shukai Duan, Jia Yan
:
An Enhanced Quantum-Behaved Particle Swarm Optimization Based on a Novel Computing Way of Local Attractor. 633-649 - Yuebo Zha, Yin Zhang, Yulin Huang, Jianyu Yang:
Bayesian Angular Superresolution Algorithm for Real-Aperture Imaging in Forward-Looking Radar. 650-668 - Robert K. Logan
:
Extending Deacon's Notion of Teleodynamics to Culture, Language, Organization, Science, Economics and Technology (CLOSET). 669-678 - Hassan Silkan
, Youssef Hanyf
:
A New Efficient Optimal 2D Views Selection Method Based on Pivot Selection Techniques for 3D Indexing and Retrieval. 679-692 - Kun Wu:
The Development of Philosophy and Its Fundamental Informational Turn. 693-703 - Chen Yang, Yang Sun, Qianhong Wu:
Batch Attribute-Based Encryption for Secure Clouds. 704-718 - Hsien-Pu Chen, Elias Gonzalez, Yessica Saez
, Laszlo B. Kish:
Cable Capacitance Attack against the KLJN Secure Key Exchange. 719-732 - Paul Walton:
Digital Information and Value. 733-749 - Joseph E. Brenner:
Three Aspects of Information Science in Reality: Symmetry, Semiotics and Society. 750-772 - Alastair A. Abbott
, Cristian S. Calude
, Karl Svozil
:
A Non-Probabilistic Model of Relativised Predictability in Physics. 773-789 - Shengyu Liu, Buzhou Tang, Qingcai Chen, Xiaolong Wang:
Drug Name Recognition: Approaches and Resources. 790-810 - Walter Craig, Jonathon Stone:
Information and Phylogenetic Systematic Analysis. 811-832 - Qiong Huang, Guomin Yang
:
A Summary of the Special Issue "Cybersecurity and Cryptography". 833-835 - Stefan Strauß
:
Datafication and the Seductive Power of Uncertainty - A Critical Exploration of Big Data Enthusiasm. 836-847 - Shengyu Liu, Buzhou Tang, Qingcai Chen, Xiaolong Wang:
Effects of Semantic Features on Machine Learning-Based Drug Name Recognition Systems: Word Embeddings vs. Manually Constructed Dictionaries. 848-865 - Hua Zhou, Jiao Feng, Peng Li, Jingming Xia:
Codeword Structure Analysis for LDPC Convolutional Codes. 866-879 - Haiping Ren, Guofu Wang:
An Interval-Valued Intuitionistic Fuzzy MADM Method Based on a New Similarity Measure. 880-894

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.