JOURNAL OF COMPUTERS     Vol. 31  No. 1     February 2020

0.
Contents and cover

1. Investing Strategies as Stochastic Oscillator Indicators Staying in Overreaction Zones for Consecutive Days with Big Data Concerns
Yensen Ni, Paoyu Huang, Yaochia Ku, Yiching Liao, Min-Yuh Day
full article

2. HMM-based Fault Diagnosis for Web Service Composition
Zhi-Chun Jia, Yuan Lu, Xiang Li, Xing Xing
full article

3. A Crowd Video Retrieval Framework Using Generic Descriptors
Pei Voon Wong, Norwati Mustapha, Lilly Suriani Affendey, Fatimah Khalid
full article

4. Deeply Integrated Convolutional Neural Networks
Daojun Liang, Xiuping Wang, Xiaohui Ju, Feng Yang
full article

5. Reliability of Cluster-based Mobile Cloud Computing Enhancement Using Optimal Byzantine Agreement
Shu-Ching Wang, Ya-Jung Lin, Kuo-Qin Yan, Yao-Te Tsai
full article

6. High Precision Calibration Method for Binocular Visual System
Yuxin Du, Minming Tong, He Zhang
full article

7. An Improved Particle Swarm Optimization Algorithm Based on Restart Strategy
Hu Huang, Yu-Hui Lei, Chen-Hao Xiong, Ding Yang
full article

8. An Improved Memetic Algorithm for Traction Characteristic Curve Fitting of Urban Rail Vehicle
Kai-Wei Liu, Xing-Cheng Wang, Long-Da Wang, Gang Liu

full article

9. Using Analytic Hierarchy Process to Assess Network Video Quality
Zhiming Shi, Chengti Huang, Jianeng Tang
full article

10. Effective Hierarchical Cluster Analysis Based on New Clustering Validity Index
Er-Zhou Zhu, Yin-Yin Ju, Da-Wei Liu, Yang Li, Dong Liu, Zhu-Juan Ma
full article

11. Multi-Authority Attribute-based Encryption Resilient against Auxiliary-Input Leakage
Hai-Ying Ma, Zhan-Jun Wang, Jin-Hua Wang, Zhi-Jin Guan
full article

12. Multi-object Cosegmentation Using Density-based Clustering
Tzu-Chiang Wang, I-Cheng Chang, Chun-Man Lin
full article

13. Cross-regional Cross-level Encryption Collaborative Data Transmission
Tongfei Yao, Yun Liu, Shih-Chen Wang, Sheng-Lung Peng, Kun Mi, Zhihong Ying
full article

14. A Face Recognition System on Embedded Device
Lianfen Huang, Jia Guo, Zhibin Gao
full article

15. Research on Cache Timing Template Attack Based on KNN Algorithm
Cai-Sen Chen, Zhi-Wei Cheng, Yu-Bo Wang, An Wang, Xiang-liang Ma
full article

16. A Situation Awareness System for the Information Security of Power Grid
Ming Xie, Zhubin Chen
full article

17. Neutral Point Clamped Single-phase Three-level Rectifier Operated with SHE-PWM Based on Improved Particle Swarm Optimization
Xin-Hua Guo, Zhao-Xian Wang, Lei-Jun Xiang, Jiang-Yu Xue, Kai Xu
full article

18. A Web Service Composition Model k2-MDD-WS
Fengying Li, Xianqiang Wu, Rongsheng Dong
full article

19. Abnormal-Gait Based Auxiliary Diagnosis System for Parkinsonˇ¦s Disease
Xuwei Fan, Zhibin Gao, Hezhi Lin, Lianfen Huang
full article

20. Multi-pose Face Recognition Based on Convolutional Neural Network
Jinyu Li, De Zhang
full article

21. Generate Football News from Live Webcast Scripts Based on Character-CNN with Five Strokes
Xue-Qiang Lv, Xin-Dong You, Wen-Chao Wang, Jian-She Zhou
full article

22. Webshell Detection Based on Multi-classifier Ensemble Model
Wenjuan-Lian, Qi-FAN, Dandan-Shi, Qili-An, Bin Jia
full article

23. Power Data Classification Method Based on Selective Ensemble Learning
Yi-Ying Zhang, Fei Liu, Hao-Yuan Pang, Bo Zhang, Yang Wang
full article

24. Research on Security Communication and Access Control of Grid Service
Yu-Bo Wang, Cai-Sen Chen, Xi-Ren Wang, Xiang-liang Ma, Lei-Ze Xue
full article

25. Image Segmentation Method for Brassica Napus L. Based on PSO and Color Space Model
Chang-Hua Liu, Shu-Fang Qin, Xiao-Ming Wu, Li-Xia Li, Kai-Qiong Sun, Ren-Feng Liu
full article

26. Gesture Recognition System Based on Normalized Neural Network
Yangyang Guo, Hezhi Lin, Zhibin Gao, Lianfen Huang
full article

27. Study on V2V Clustering Algorithm in Heterogeneous Network Based on VANET and LTE-V2X
Liu Shuang, Shao-Bo Wu, Jia-Hui Qiu, Liu Qi
full article

28. Deep Learning in Aquaculture: A Review
Ming Sun, Xiaofen Yang, Yinggang Xie
full article

29. Chosen-ciphertext Secure Hierarchical Identity-based Encryption from R-LWE
Xue-Feng Jiang, Ting Wang, Zhi-Wei Sun
full article