A novel gradient climbing control for seeking the best communication point for data collection from a seabed platform using a single unmanned surface vehicle Jiu-cai JinJie ZhangZhi-chao Lv OriginalPaper 09 July 2019 Pages: 751 - 759
Message delay time distribution analysis for controller area network under errors Lei-ming ZhangYi-chao SunYong Lei OriginalPaper 09 July 2019 Pages: 760 - 772
Generic attribute revocation systems for attribute-based encryption in cloud storage Genlang ChenZhiqian XuMiao-qing Huang OriginalPaper 09 July 2019 Pages: 773 - 786
A secure data sharing scheme with cheating detection based on Chaum-Pedersen protocol for cloud storage Xin WangBo YangHong-xia Hou OriginalPaper 09 July 2019 Pages: 787 - 800
Malware homology identification based on a gene perspective Bing-lin ZhaoZheng ShanWen-jie Sun OriginalPaper 09 July 2019 Pages: 801 - 815
An artificial intelligence based method for evaluating power grid node importance using network embedding and support vector regression Hui-fang WangChen-yu ZhangBen-teng He OriginalPaper 09 July 2019 Pages: 816 - 828
An online error calibration method for spaceflight TT&C systems based on LEO-ground DDGPS Qiao WangXiao-jun JinZhong-he Jin OriginalPaper 09 July 2019 Pages: 829 - 841
Taylor expansion MUSIC method for joint DOD and DOA estimation in a bistatic MIMO array Wen-tao ShiQun-fei ZhangJing Han OriginalPaper 09 July 2019 Pages: 842 - 848
Detecting interaction/complexity within crowd movements using braid entropy Murat AkpulatMurat Ekinci OriginalPaper 09 July 2019 Pages: 849 - 861
De-scattering and edge-enhancement algorithms for underwater image restoration Pan-wang PanFei YuanEn Cheng OriginalPaper 09 July 2019 Pages: 862 - 871
A network security entity recognition method based on feature template and CNN-BiLSTM-CRF Ya QinGuo-wei ShenXin Jin OriginalPaper 09 July 2019 Pages: 872 - 884