[1] P. A. Fouque, B. Hadjibeyli,P. Kirchner, “Homomorphic Evaluation of Lattice-based Symmetric Encryption Schemes,” inProceedings of the 22nd International Conference on Computing and Combinatorics, pp. 269-280, Springer, Berlin, January 2016 [2] F. Z. Feng, C. S. Zhang, Q. X. Min,P. F. Wang, “Heating Characteristics of Metal Plate Crack in Sonic IR Imaging,” Infrared and Laser Engineering, Vol. 44, No. 5, pp. 1456-1461, July 2015 [3] H. Y. Zhang, Y. L. Kuang, G. H. Wang,L. Ji, “Soft Sensor Model for Coal Slurry Ash Content based on Image Gray Characteristics,” International Journal of Coal Preparation and Utilization, Vol. 34, No. 1, pp. 24-37, September 2015 [4] F. Y. Xu, G. H. Gu, X. F. Kong, P. C. Wang,K. Ren, “Object Tracking based on Two-Dimensional PCA,” Optical Review, Vol. 23, No. 2, pp. 231-243, February 2016 [5] R. Kumar, B. K. Verma,S. S. Rastogi, “Social Popularity based SVD++ Recommender System,” International Journal of Computer Applications, Vol. 87, No. 14, pp. 33-37, October 2014 [6] M. Ovesny, P. Krízek, J. Borkovec, Z. Svindrych,G. M. Hagen, “ThunderSTORM: A Comprehensive ImageJ Plug-in for PALM and STORM Data Analysis and Super-Resolution Imaging,” Bioinformatics, Vol. 30, No. 16, pp. 2389-2390, February 2014 [7] Z. H.Wu and P. Hu, “Analysis on VANET Routing Protocols,” Journal on Communications, Vol. 36, No. 5, pp. 75-84, October 2015 [8] L. S.Li and Q. Q. Weng, “Self-Adaptive Differential Evolution Algorithm based on Opposition-based Learning,” Journal of Computer Applications, Vol. 38, No. 2, pp. 399-404, July 2018 [9] S. L. Xiao, X. Chen,Z. Li, “Distributed Neural Network for Classification of Attack Behavior to Social Security Events,” Journal of Computer Applications, Vol. 37, No. 10, pp. 2794-2798, January 2017 [10] Y. L.Li and J. Dong, “Study and Improvement of MapReduce based on Hadoop,” Computer Engineering and Design, Vol. 33, No. 8, pp. 3110-3116, September 2012 [11] Z. Moghaddam and M. Piccardi, “Training Initialization of Hidden Markov Models in Human Action Recognition,” IEEE Transactions on Automation Science and Engineering, Vol. 11, No. 2, pp. 394-408, October 2014 [12] B. B. Amor, J. Su,A. Srivastava, “Action Recognition using Rate-Invariant Analysis, of Skeletal Shape Trajectories,” IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 38, No. 1, pp. 1-13, July 2016 [13] X. Luo,“Fuzzy Wavelet Neural Network Control based on Ant Colony Learning Algorithms,” Fujian Computer, Vol. 11, No. 6, pp. 178-180, January 2008 [14] D. M. Zhao, J. X. Liu,J. F. Ma, “Information Security Risk Assessment based on Improved Wavelet Neural Network,” Computer Science, Vol. 2, No. 5, pp. 125-129, September 2010 [15] J. Wan, D. M. Xu,Y. Q. He, “Research on a Wavelet Neural Network Structure and Its Learning Algorithms,” System Engineering and Electronic Technology, Vol. 3, No. 5, pp. 69-74, February 2002 [16] C. X. Yang, K. C. Liu,X. Y. Che, “Application of Improved Wavelet Neural Network in Teaching Quality Evaluation,” Journal of Nanyang Institute of Technology, Vol. 10, No. 6, pp. 201-206, October 2011 [17] D. M. Zhao, J. X. Liu,J. F. Ma, “Information Security Risk Assessment based on Fuzzy Wavelet Neural Network,” Journal of Huazhong University of Science and Technology (Natural Science Edition), Vol. 11, No. 5, pp. 189-200, February 2009 [18] H. R.Wang and B. Y. Yan, “Information Security Risk Assessment Method based on Wavelet Neural Network Algorithm,” Information Technology, Vol. 12, No. 15, pp. 169-172, February 2018 [19] W. Wang, “Power System Load Forecasting based on Wavelet Neural Network,” Monthly Journal of Science and Technology Entrepreneurship, Vol. 12, No. 5, pp. 189-201, January 2017 [20] H. Q.Wang and B. Wang, “Research and Application of Internal Model Control based on Self-Constructed Wavelet Neural Network,” Computer Measurement and Control, Vol. 8, No. 9, pp. 265-269, September 2014 |