2014年发表的部分论文(B类以上)

发布者:系统管理员发布时间:2015-03-20浏览次数:1485

1.Ke, Yifen, and Changfeng Ma(马昌凤). "Iterative algorithm of common solutions for a constrained convex minimization problem, a quasi-variational inclusion problem and the fixed point problem of a strictly pseudo-contractive mapping." Fixed Point Theory and Applications 2014 ,54: 1-15.( SCI-I)

2. Huang, Na, and Changfeng Ma(马昌凤). "The Inversion-Free Iterative Methods for Solving the Nonlinear Matrix Equation." Abstract and Applied Analysis. Vol. 2013. Hindawi Publishing Corporation, 2013,2013: 1-7.( SCI-II )

3. Huang, Na, and Changfeng Ma(马昌凤). "A regularized smoothing Newton method for solving SOCCPs based on a new smoothing C-function." Applied Mathematics and Computation, 2014,230: 315-329. ( SCI-II )

4. Ke, Yifen, and Changfeng Ma(马昌凤). "The Generalized Bisymmetric (Bi-Skew-Symmetric) Solutions of a Class of Matrix Equations and Its Least Squares Problem." Abstract and Applied Analysis. Vol. 2014. Hindawi Publishing Corporation, 2014, 2014: 1-10. ( SCI-II )

5. Zheng, Qingqing, and Changfeng Ma(马昌凤). "A new SOR-Like method for the saddle point problems." Applied Mathematics and Computation,2014, 233:421-429.. ( SCI-II )

6. Zheng, Qing-Qing, and Chang-Feng Ma(马昌凤). "On normal and skew-Hermitian splitting iteration methods for large sparse continuous Sylvester equations." Journal of Computational and Applied Mathematics, 2014, 268: 145-154. ( SCI-II )

7. Xu, Li(许力), and Yuexin Zhang. "Matrix-based pairwise key establishment for wireless mesh networks." Future Generation Computer Systems ,201430: 140-145. ( SCI-II )

8. Chen J(陈建清). Multiple positive solutions to a class of modified nonlinear Schrödinger equations[J]. Journal of Mathematical Analysis and Applications, 2014, 415(2): 525-542. ( SCI-II )

9. Huang, Na, and Changfeng Ma(马昌凤). "The Iteration Solution of Matrix Equation Subject to a Linear Matrix Inequality Constraint." Abstract and Applied Analysis. Vol. 2014. Hindawi Publishing Corporation, 2014, 2014: 1-9. ( SCI-II )

10. Ke, Yi-Fen, and Chang-Feng Ma(马昌凤). "On the convergence analysis of two-step modulus-based matrix splitting iteration method for linear complementarity problems." Applied Mathematics and Computation 2014 ,243: 413-418. ( SCI-II )

11. Huang, Na, and Changfeng Ma(马昌凤). "Exceptional family and solvability of the second-order cone complementarity problems." Applied Mathematics and Computation ,2014,244 : 561-566. ( SCI-II )

12. DENG, QI-RONG(邓起荣), and SZEMAN NGAI. "DIMENSIONS OF FRACTALS GENERATED BY BI-LIPSCHITZ MAPS." ABSTRACT AND APPLIED ANALYSIS2014, 2014:1--12. ( SCI-II )

13. Zhong, Yansheng(钟延生). "${H}^{1}\ cap {L}^{p} $ versus ${C}^{1} $ Local Minimizers." Abstract and Applied Analysis. Vol. 2014. Hindawi Publishing Corporation, 2014,2014:6. ( SCI-II )

14. Chen, Jianqing(陈建清). "Multiple positive solutions to a class of Kirchhoff equation on R3 with indefinite nonlinearity." Nonlinear Analysis: Theory, Methods & Applications ,2014,96 : 134-145. ( SCI-II )

15. Shen, Jianhe(沈建和), and Zheyan Zhou. "Fast–slow dynamics in first-order initial value problems with slowly varying parameters and application to a harvested Logistic model." Communications in Nonlinear Science and Numerical Simulation ,2014,19 (8): 2624-2631. ( SCI-II )

16. Chen, Mi(陈密), Kam Chuen Yuen, and Junyi Guo. "Survival probabilities in a discrete semi-Markov risk model." Applied Mathematics and Computation 2014,232 (1): 205-215. ( SCI-II )

17. Zheng, Qingqing, and Changfeng Ma(马昌凤). "A class of accelerated Uzawa algorithms for saddle point problems." Applied Mathematics and Computation ,2014,247 : 244-254. ( SCI-II )

18. Chen, Chao(陈超), and Chunjing Xie. "Three dimensional steady subsonic Euler flows in bounded nozzles." Journal of Differential Equations, 2014,256 (11): 3684-3708. ( SCI-II )

19. Ye S(叶善力). Norm and Essential Norm of Composition Followed by Differentiation from Logarithmic Bloch Spaces to[C]//Abstract and Applied Analysis. Hindawi Publishing Corporation, 2014, 2014:6 . ( SCI-II )

20. Lian, Yanling, Xinyi Huang(黄欣沂), and Yi Mu. "SA< sup> 3</sup>: Self-adaptive anonymous authentication for dynamic authentication policies." Future Generation Computer Systems 30 (2014): 133-139. ( SCI-II )

21. Chen, Mi(陈密), Junyi Guo, and Xueyuan Wu. "Expected discounted dividends in a discrete semi-Markov risk model." Journal of Computational and Applied Mathematics 2014,266 (1): 1-17. ( SCI-II )

22. Deng, Qi-Rong(邓起荣). "Spectrality of one dimensional self-similar measures with consecutive digits." Journal of Mathematical Analysis and Applications ,2014,409,(1): 331-346. ( SCI-II )

23. Yang, Wensheng(杨文生), and Xuepeng Li(李学鹏). "Global asymptotical stability of a n+ 1 dimensional Leslie–Gower predator–prey model." Applied Mathematics and Computation ,2014,235 : 377-382. ( SCI-II )

24. Li, Chengjin(李成进). "A New Approximation of the Matrix Rank Function and Its Application to Matrix Rank Minimization." Journal of Optimization Theory and Applications ,2014,163(2):569-594. ( SCI-II )

25. Shen, Jianhe(沈建和), and Maoan Han. "Canard solution and its asymptotic approximation in a second-order nonlinear singularly perturbed boundary value problem with a turning point." Communications in Nonlinear Science and Numerical Simulation, 2014,19(8):2632-2643. ( SCI-II )

26. Wang, Feng-Yu, and Jian Wang(王健). "Harnack inequalities for stochastic equations driven by Lévy noise." Journal of Mathematical Analysis and Applications ,2014,410 (1): 513-523. ( SCI-II )

27. Schilling, René, and Jian Wang(王健). "Some theorems on Feller processes: Transience, local times and ultracontractivity." Transactions of the American Mathematical Society ,2013,365(6): 3255-3286. ( SCI-II )

28. Huang, Na, and Changfeng Ma(马昌凤). "The modified conjugate gradient methods for solving a class of generalized coupled Sylvester-transpose matrix equations." Computers & Mathematics with Applications , 2014, 67(8): 1545-1558. ( SCI-III )

29. Liu, Jinghui, and Changfeng Ma(马昌凤). "A NEW NONMONOTONE TRUST REGION ALGORITHM FOR SOLVING UNCONSTRAINED OPTIMIZATION PROBLEMS ‘." 2014, 32(4): 476490 .( SCI-III )

30. Xie, Yajun, Yifen Ke, and Changfeng Ma(马昌凤). "The modified accelerated Bregman method for regularized basis pursuit problem." Journal of Inequalities and Applications,2014,2014( 130): 1-17. ( SCI-III )

31. Li, Meiyan, and Changfeng Ma(马昌凤). "A continuation method for linear complementarity problems with P 0 matrix." Optimization ,2014, 63(5): 757-773. ( SCI-III )

32. Huang, Na, and Changfeng Ma(马昌凤). "Convergence Analysis and Numerical Study of a Fixed-Point Iterative Method for Solving Systems of Nonlinear Equations." The Scientific World Journal 2014,2014: 1-10. ( SCI-III )

33. Xie, Yajun, Changfeng Ma(马昌凤), and Huang, Na. " Iterative method to solve the generalized coupled Sylvester-transpose linear matrix equations over reflexive or anti-reflexive matrix " The Scientific World Journal 201467 : 2071-2084. ( SCI-III )

34. Zhong, Yansheng(钟延生). "A Concentration Phenomenon for p-Laplacian Equation." Journal of Applied Mathematics,2014,2014:6 .( SCI-III )

35. Xu L(许力), He Y, Chen X, et al. Ticket-based handoff authentication for wireless mesh networks[J]. Computer Networks, 2014, 73: 185-194. ( SCI-III )

36. Huang, Na, and Changfeng Ma(马昌凤). "A sufficient condition that has no exceptional family of elements for SDCP." Optimization Letters ,2014,8(1): 259-265. ( SCI-III )

37. Huang, Na, and Changfeng Ma(马昌凤). "A New Exceptional Family of Elements and Solvability of General Order Complementarity Problems." The Scientific World Journal 2014, 2014: 1-6. ( SCI-III )

38. Xie, Yajun, and Changfeng Ma(马昌凤). "Iterative Methods to Solve the Generalized Coupled Sylvester-Conjugate Matrix Equations for Obtaining the Centrally Symmetric (Centrally Antisymmetric) Matrix Solutions." Journal of Applied Mathematics 2014, 2014:1-12. ( SCI-III )

39. Shi, Peng(时鹏), Yue Huang, and Jinsheng Hong. "Automated three-dimensional reconstruction and morphological analysis of dendritic spines based on semi-supervised learning." Biomedical optics express ,2014,5(5):1541-1553. ( SCI-III )

40. Ye, Shanli(叶善力). "A note on cyclic vectors in Qp space." Expositiones Mathematicae ,2014, 32(1): 92-98. ( SCI-III )

41. Lai, Huilin(赖惠林), and Changfeng Ma. "A new lattice Boltzmann model for solving the coupled viscous Burgers’ equation." Physica A: Statistical Mechanics and its Applications ,2014,395 : 445-457. ( SCI-III )

42. Huang, Xinyi(黄欣沂),Chen,Xiaofeng,Li,Jing andXu,Li(许力). "Further Observations on Smart-Card-Based Password-Authenticated Key Agreement in Distributed Systems." IEEE Transactions on Parallel and DistributedSystems ,2014,25(7):1767-1775 .( SCI-III )

43. Zeng, Jing(曾晶). "The estimation and profile of the critical value for a Schrödinger equation." Boundary Value Problems 2014 (1): 1-10. ( SCI-III )

44. Lin, Song(林崧), et al. "Quantum key distribution: defeating collective noise without reducing efficiency." Quantum Information & Computation ,2014,14 (9&10): 845-856. ( SCI-III )

45. Wang, Jian(王健). "On the Existence and Explicit Estimates for the Coupling Property of Lévy Processes with Drift." Journal of Theoretical Probability 2014,273): 1021-1044. ( SCI-III )

46. Yang, Wensheng(杨文生). "Dynamics of a Diffusive Predator-Prey Model with General Nonlinear Functional Response." The Scientific World Journal ,2014 ,2014:1-10. ( SCI-III )

47. Zeng, Jing(曾晶). "The estimates on the energy functional of an elliptic system with Neumann boundary conditions." Boundary Value Problems 2013(1): 1-11. ( SCI-III )

48. Chen, Mei-xiang,陈清华. "On the Open Problem Related to Rank Equalities for the Sum of Finitely Many Idempotent Matrices and Its Applications." The Scientific World Journal ,2014 ,2014:7. ( SCI-III )

49. Chen, Xin, and Jian Wang(王健). "Functional inequalities for nonlocal Dirichlet forms with finite range jumps or large jumps." Stochastic Processes and their Applications ,2014,124(1): 123-153. ( SCI-III )

50. Chen, Zhen-Qing, and Jian Wang(王健). "Ergodicity for time-changed symmetric stable processes." Stochastic Processes and their Applications,2014,124(9): 2799-2823. ( SCI-III )

51. Xu, Li(许力), Elisa Bertino, and Yi Mu. "Security of new generation computing systems." Concurrency and Computation: Practice and Experience, 2014,(8): 1475-1476. ( SCI-IIII )

52. He, Yuan, Li Xu(许力), and Wei Wu(伍玮). "A local joint fast handoff scheme in cognitive wireless mesh networks." Security and Communication Networks ,2014,7(2): 455-465. ( SCI-IIII )

53. Wu, Wei(伍玮), et al. "An Efficient Construction of Convertible Undeniable Proxy Signatures." Journal of Internet Technology ,2014,15(3): 471-484.

54. Lin, Limei, Shuming Zhou(周书明), Xu, Li(许力),DAqin,Wang . "Conditional diagnosability of arrangement graphs under the PMC model." Theoretical Computer Science ,2014,548 : 79-97. ( SCI-IIII )

55. Zhuo, Zhengyuan, and Shanli Ye(叶善力). "Univalent Functions in Cyclic Vectors in Q_p Space." Complex Analysis and Operator Theory , 2014, 8(5): 1077-1086. ( SCI-IIII )

56. Chen, Zhengxin(陈正新). "Canonical Algebras of Type (n 1, n 2, n 3) and Kac–Moody Algebras." Communications in Algebra 2014,42(8):3297-3324. ( SCI-IIII )

57. CHEN, Zhengxin(陈正新). "Generalized derivations on parabolic subalgebras of general linear Lie algebras." Acta Mathematica Scientia ,2014,34(3):814-828. ( SCI-IIII )

58. Wang, Y., G. D. Guo(郭躬德), and L. F. Chen(陈黎飞). "Chaotic Artificial Bee Colony algorithm: A new approach to the problem of minimization of energy of the 3D protein structure." Molecular Biology,2014, 47(6): 894-900. ( SCI-IIII )

59. Yu, Chao-Hua, Gong-De Guo(郭躬德), and Song Lin(林崧). "Quantum secure direct communication with authentication using two nonorthogonal states." International Journal of Theoretical Physics, 2013,52(6): 1937-1945. ( SCI-IIII )

60. Yu, Chao-Hua, Gong-De Guo(郭躬德), and Song Lin(林崧). "Quantum private comparison with d-level single-particle states." Physica Scripta, 2013,88(6 ): 65013-65018. ( SCI-IIII )

61. Yu, ChaoHua, GongDe Guo(郭躬德), and Song Lin(林崧). "Arbitrated quantum signature scheme based on reusable key." Science China Physics, Mechanics & Astronomy ,2014,57(11): 2079-2085. ( SCI-IIII )

62. Ye, Xuemei(叶雪梅). "A Note on Upper Generalized Exponents of Tournaments." ARS COMBINATORIA ,2014,113 : 321-324. ( SCI-IIII )

63. Yang, Wensheng(杨文生). "Permanence of a diffusive Leslie–Gower predator–prey model incorporating a prey refuge." International Journal of Biomathematics,2014,7(3):1-8. ( SCI-IIII )

64. Chen, Lanxiang(陈兰香), Gongde Guo(郭躬德), and Zhen Peng. "A hill cipherbased remote data possession checking in cloud storage." Security and Communication Networks, 20147(3):511-518. ( SCI-IIII )

65. Qinghua, C(陈清华). H. E. N., et al. "Two applications of matrix volume." Hokkaido Mathematical Journal ,2014,43(2): 261-274. ( SCI-IIII )

66. Zhide Chen(陈志德), Cheng Qiao,Yihui Qiua,Li Xu(许力) Wei Wu(伍玮). "Dynamics stability in wireless sensor networks active defense model." Journal of Computer and System Sciences ,2014,2014:1534-1548. ( SCI-IIII )

67. Chen, Zhide(陈志德), and Yali Zeng. "Random Access Control for M2M in LTE System." International Journal of Distributed Sensor Networks,2013,2013:8. ( SCI-IIII )

68. Wang, Jian(王健). "Smooth properties for semigroups of Lévy processes and their application." Statistics & Probability Letters ,2014,89 : 23-30. ( SCI-IIII )

69. Wang, Jian(王健). "A simple approach to functional inequalities for non-local Dirichlet forms." ESAIM: Probability and Statistics ,2014,18:503-513. ( SCI-IIII )

70. Xu, Li(许力), et al. "Software Service Signature (S3) for authentication in cloud computing." Cluster computing ,2013,16(4): 905-914. ( SCI-IIII )

71. Harn, Lein, and Changlu Lin(林昌露). "Efficient group Diffie–Hellman key agreement protocols." Computers & Electrical Engineering,2014,40(6): 1972-1980. ( SCI-IIII )

72. Dong, Yuxin, and Hezi Lin(林和子). "Monotonicity formulae, vanishing theorems and some geometric applications." The Quarterly Journal of Mathematics 2014,65(2):365-397. ( SCI-IIII )

73. Chen, Lifei(陈黎飞), Shanjun He, and Qingshan Jiang. "Validation indices for projective clustering." Frontiers of Computer Science in China , 2009,3(4):477-484. ( SCI-IIII )

74.Lin, Limei, Li Xu(许力), and Shuming Zhou(周书明). "Conditional Diagnosability and Strong Diagnosability of Shuffle-cubes under the Comparison Model." International Journal of Computer Mathematics just-accepted ,2014,2014: 1-17. ( EI )

75. Zhang, Yuexin, Huang, Xinyi(黄欣沂),Li Xu(许力). "Matrix-Based Pairwise Key Establishment with Pre and Post Deployment Knowledge for Wireless Mesh Networks." Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2013 Seventh International Conference on.,2013,2013:153-158. ( EI )

76. Huang, Xinyi(黄欣沂), Li Xu(许力), et al. "Robust Multi-Factor Authentication for Fragile Communications." IEEE Transactions on Dependable and Secure Computing ,2014,11(6):568-581 ( EI )

77. Zhang, Jing, Shuming Zhou(周书明),Li Xu(许力)and Wei Wu(伍玮). "Constructing Connected Dominating Set Based on Crossed Cube in WSN." Intelligent Networking and Collaborative Systems (INCoS), 2013 5th International Conference on,2013,2013:443-447. ( EI )

78. Lu, Lishan, and Shuming Zhou(周书明). "Conditional Diagnosability of Complete Josephus Cubes." Network and Parallel Computing. Springer Berlin Heidelberg, 2013,2013: 220-231. ( EI )

79. Chen, Lifei(陈黎飞), and Gongde Guo(郭躬德). "Centroid-Based Classification of Categorical Data." Web-Age Information Management. Springer International Publishing, 2014,8485: 472-475. ( EI )

80. Chen, Lifei(陈黎飞). "EM-type method for measuring graph dissimilarity." International Journal of Machine Learning and Cybernetics,2014,5(4):625-633 ( EI )

81. Chen, Lifei(陈黎飞), and Shengrui Wang. "Central clustering of categorical data with automated feature weighting." Proceedings of the Twenty-Third international joint conference on Artificial Intelligence. 2013,2013:1260-1266. ( EI )

82. Lian, Yanling, Li Xu(许力), and Xinyi Huang(黄欣沂). "Attribute-Based Signatures with Efficient Revocation." Intelligent Networking and Collaborative Systems (INCoS), 2013 5th International Conference on.2013,2013:573-577. ( EI )

83. Zhang, Yuexin, Xinyi Huang(黄欣沂),Li Xu(许力),and Yang Xiang. "Matrix-based pairwise key establishment in wireless mesh networks using deployment knowledge." Communications (ICC), 2013 IEEE International Conference on. .2013,2013:1604-1608. ( EI )

84. Ke, Yi-Fen, and Chang-Feng Ma(马昌凤). "A preconditioned nested splitting conjugate gradient iterative method for the large sparse generalized Sylvester equation." Computers & Mathematics with Applications ,2014,68(10): 1409-1420. ( EI )

85. 李瑞芳, 柯品惠. 一类新的周期为 2pq 的二元广义分圆序列的线性复杂度[J]. 电子与信息学报, 2014, 36(3): 650-654. ( EI )

86. 柯品惠, 陈浩源. 无碰撞区跳频序列集的进一步构造[J]. 北京邮电大学学报, 2014, 2: 009. ( EI )

87. 柯品惠, 李瑞芳, 张胜元. 一类新的周期为< em> p< sup> m+ 1</sup> q< sup> n+ 1</sup></em> 二元广义分圆序列的线性复杂度[J]. 电子学报, 42(5): 1009-1013. ( EI )

88. Wu, Shengyan, Changlu Lin(林昌露), and Li Xu(许力). "Fully Distributed Multi-authority Cloud Storage Model." Cloud Computing and Big Data (CloudCom-Asia), 2013 International Conference on. 2013,2013:621-626. ( EI )

89. Tang, Fei, Changlu Lin, and Hongda Li. "ID-Based Signcryption with Restrictive Unsigncryption." Intelligent Networking and Collaborative Systems (INCoS), 2013 5th International Conference on. 2013,2013485-489. ( EI )

90. Xiao, Minqing. "Reliable D-stabilization for a class of linear discrete time-delay systems." Control Conference (CCC), 2013 32nd Chinese. 2013,2013,:1404-1408. ( EI )

91. 叶阿勇, 李亚成, 马建峰, . 基于服务相似性的 k-匿名位置隐私保护方法[J]. 通信学报, 2014, 11: 019. ( EI )

92. 张美平, 谷雨, 许力. 无线传感器网络单基站调度算法[J]. 计算机应用, 2014, 34(7): 1941-1946. ( A )

93. 龚平 冯在文. 基于标注的业务过程合规性验证方法[J]. 计算机应用, 2014, 34(7): 2115-2123. ( A )

94. 吴坤安, 严宣辉, 陈振兴, . 混合分散搜索的进化多目标优化算法[J]. 计算机应用, 2014, 34(10): 2874-2879. ( A )

95. 林晖, 马建峰, 许力. MWNs 中基于跨层动态信誉机制的安全路由协议[J]. 计算机研究与发展, 2014, 51(7): 1486-1496. ( A )

96. 吴涛, 陈黎飞, 郭躬德. 优化子空间的高维聚类算法[J]. 计算机应用, 2014, 34(8): 2279-2284. ( A )

97. 彭真 陈兰香 郭躬德. 云存储中基于喷泉码的数据恢复系统[J]. 计算机应用, 2014, 34(4): 986-993. ( A )

98. 郭躬德, 李南, 陈黎飞. 一种基于混合模型的数据流概念漂移检测算法[J]. 计算机研究与发展, 2014, 51(4). ( A )

99. 卢伟胜, 郭躬德, 陈黎飞. 基于词性标注序列特征提取的微博情感分类[J]. 计算机应用, 2014, 34(10): 2869-2873. ( A )

100. 陈家祯, 郑子华, 连桂仁. 多三维物体菲涅耳变换数字实现方法[J]. 激光与光电子学进展, 2014, 51(4): 75-81. ( B )

101. 严宣辉,郭躬德. 基于簇间分离性的稀有类识别算法[J]. 模式识别与人工智能,2014,27(6):502508. ( B )

102. 罗晓晴, 李世唐, 许力. 在无线双向通信中基于 CRC-NC 抵抗污染攻击方案[J]. 信号处理, 2014, 30(11). ( B )

103. 叶晶, 陈清华. 基于内外部表征的数学高考应用题分析[J]. 数学教育学报, 2014, 4: 019. ( B )

104. 方禾, 许力, 章静, . Ad-Hoc 网络中基于可能性博弈的拓扑控制策略[J]. 小型微型计算机系统, 2014, 35(008): 1761-1765. ( B )

105. 严晓明. 基于类别平均距离的加权 KNN 分类算法[J]. 计算机系统应用, 2014, 23(2): 128-132. ( B )

106. 钟延生. 含超临界指数的 p&q-拉普拉斯方程的多重解[J]. 数学物理学报, 2014, 4: 013. ( B )

107. 赖智铭, 郭躬德. 基于自适应阈值蚁群算法的路径规划算法[J]. 计算机系统应用, 2014, 23(2): 113-118. ( B )

108. 宋苏林,周书明,林丽美. Pancake网络的t/k诊断度及其算法. 运筹学学报,201418(4)65-77( B )

109. 林新棋. 基于改进模糊综合评价的电影情感分类[J]. 计算机科学, 2014, 41(2): 161-165. ( B )

110. 投资, 陈密, 郭军义. 指数保费准则下的最优投资和比例再保险[J]. ( B )

111. 吴宏和, 陈黎飞, 郭躬德. 一种事件序列的加权变阶马尔可夫模型[J]. 计算机工程, 2014, 40(4): 175-181. ( B )

112. 郭彦明, 陈黎飞, 郭躬德. 基于隐马尔科夫模型的 DNA 序列分类方法[J]. 计算机系统应用, 2014, 23(7): 24-30. ( B )

113. 余勇, 郭躬德, 陈黎飞. 基于多代表点学习的 RSKNN 分类算法[J]. 计算机系统应用, 2014, 23(11): 92-98. ( B )

114. 许如意, 陈清华. 福建数学工作者中学数学教研论文的计量分析——基于 2008-2012 年中国知网和维普资讯网的数据[J]. 数学教育学报, 2014, 23(5). ( B )

115. 吁超华, 郭躬德, 林崧. 无纠缠的量子秘密比较[J]. 小型微型计算机系统, 2014, 35(5): 1061-1064. ( B )

116. 阳超, 吴炎辉, 李学鹏. 一类具有阶段结构的传染病模型的全局分析[J]. 生物数学学报, 2013,281):123-129 ( B )

117. 吴建宁, 黄河清, 唐浩, 黄健. 面向无线传感网的社区远程医疗实时生理参数监测系统 [J]. 201413(2)78-85. ( B )

118. 李祎, 曹益华. 函数概念的本质与定义方式探究[J]. 数学教育学报, 2013, 22(006): 5-8. ( B )

119. 李祎. 刍议教师理解数学的几个维度[J]. 数学通报, 2014, 6: 002. ( B )

120. 李彩红, 李祎. 基于三种学习理论整合的数学概念教学设计 [J]. 数学通报, 2014, 53(5): 19-23. ( B )

121. 陈俊凡. 关于角域里亚纯函数的增长性[J]. 数学物理学报: A , 2014, 34(4): 1014-1025. ( B )

122. 卢伟胜, 郭躬德, 严宣辉, . SMwKnn: 基于类别子空间距离加权的互 k 近邻算法[J]. 计算机科学, 2014, 41(2): 166-169. ( B )

123.刘帅, 沈建和, 周哲彦. 二阶半线性奇摄动边值问题的渐近解[J]. 数学物理学报,2014,34A(5):1104-1110. ( B )

124. 刘帅, 周哲彦, 沈建和. 二阶半线性奇摄动边值问题解的渐近行为[J]. 数学物理学报,2014,34A(2):437-444. ( B )

125. 倪莹莹, 陈清华. 情理之中 意料之外——2013 年高考数学福建卷 () 答卷评析[J]. 数学通报, 2014, 53(4): 56-59. ( B )

126. 江伟坚, 郭躬德. 复杂环境下高效物体跟踪级联分类器[J]. 中国图象图形学报, 2014, 19(2): 253-265. ( B )