JOURNAL OF COMPUTERS     Vol. 32  No. 4     August 2021

0. Contents and cover

1. Topic Analysis in LDA Based on Keywords Selection
Bing-Xin Du, Guo-Ying Liu
full article

2. Image Steganography Based on the Absolute Value of Adjacent Pixels
Xiao-Ge Pan, Tian Yang, Ning Jia, Pan-Pan Zhao, Ming-Wei Tang
full article

3. A Novel Data-Driven Rolling Force Predictive Model Based on PSO-BAS-HKSVR Approach
Ming-Hua Liu, Qiang Zhang, Ying-Hua Liu, Wen-Li Wang
full article

4. A Novel Denoising Algorithm of RFID Label Image Based on Singular Spectrum Analysis of Phase Space Reconstruction
Shanhao Zhou, Xiaolei Yu, Ke Zhang, Zhenlu Liu, Lin Li, Zhimin Zhao
full article

5. Does CBOE Volatility Index Jumped or Located at a Higher Level Matter for Evaluating DJ 30, NASDAQ, and S&P500 Index Subsequent Performance
Yulu Liao, Min-Yuh Day, Yirung Cheng, Paoyu Huang, Yensen Ni
full article

6. Uncertain GM-CFSFDP Clustering Algorithm for Landslide Hazard Prediction
Yimin Mao, Binbin Guo, Ruey-Shun Chen, Yeh-Cheng Chen, Tao Tao, Deborah Simon Mwakapesa
full article

7. Description Model and Qualitative Evaluation of Intelligence Characteristics of Unmanned Swarms
Wen-Liang Wu, Xing-She Zhou
full article

8. Using Improved Dense Trajectory Feature to Realize Action Recognition
Guo-Liang Xu, Hang Zhou, Liang-You Yuan, Yue-Yu Huang
full article

10. A Spark-based Method for Identifying Large-scale Network Burst Traffic
Yu-Lu Sun, Ben-Sheng Yun, Ya-Guan Qian, Jun Feng
full article

11. A Novel Hierarchical Wildfire Alarm System Based on Vegetation Features
Kuo-Ming Hung, Li-Ming Chen, Ting-Wen Chen
full article

12. Lung Fields Segmentation Based on Shape Compactness in Chest X-Ray Images
Yuqin Li, Ke Zhang, Weili Shi, Zhengang Jiang
full article

13. Research on Improved Ant Colony Optimization Based on Adaptive Chemical Reaction Optimization
Teng Fei, Xin-Xin Wu, Xu-Hua Pan
full article

14. Design and Implementation of Cloud-Edge Integrated Security Authentication System
Cai-sen Chen, Bo-gong Ji, Ying-zhan Kou, Jia-xing Du
full article

15. A Maximizing Influence of Multiple Nodes Propagation Algorithm Based on Optimal Neighbor Discovery
Yun Liu, Ling Sun, Fei Xiong, Junjun Cheng
full article

16. Research on Insider Threat Detection Method Based on Variational Autoencoding
Zhenjiang Zhang, Lulu Zhao, Yang Zhang, Hongde Zhou, Wei Li
full article

17. Research on Cloud-edge Joint Task Inference Algorithm in Edge Intelligence
Yaping Zheng
full article

18. Design of Malicious Code Detection System Based on Binary Code Slicing
Zhiyuan Zhang, Zhenjiang Zhang, Wei Li, Hongde Zhou, Bo Shen
full article

19. Cloud-side Collaborative Privacy Protection Based on Differential Privacy
Zhenjiang Zhang, Desong Qin, Zihang Yu, Li He, Xiaohua Liu, Shutao Liu
full article

20. Research on Road Traffic Accident Judgment Method Based on D-S Evidence Theory
Naiyue Chen, Zhenjiang Zhang, Jiawei Wang, Zihang Yu
full article