Abstract is missing.
- Construct an Online Contest Game-Based Learning System for Junior High School StudentsYuh-Ming Cheng. 1-4 [doi]
- Object-Based Error Concealment in 3D VideoChien-Shiang Hong, Chuen-Ching Wang, Shen-Chuan Tai, Ya-Chiung Luo. 5-8 [doi]
- Security on the Design of RFID Access Control Protocol Using the Strategy of Indefinite-Index and Challenge-ResponseBae-Ling Chen, Wen-Chung Kuo, Lih-Chyau Wuu. 9-12 [doi]
- The Implementation of Real-Time On-line Vehicle Diagnostics and Early Fault Estimation SystemShi-Huang Chen, Jhing-Fa Wang, YuRu Wei, John Shang, Shao-Yu Kao. 13-16 [doi]
- A Fast Shape Context Matching Using IndexingChien-Chou Lin, Chun-Ting Chang. 17-20 [doi]
- A Humanoid Robot as a Teaching Assistant for Primary EducationKai-Yi Chin, Chin-Hsien Wu, Zeng-Wei Hong. 21-24 [doi]
- Intelligent Physiological Monitoring and Feedback System for Driver SafetyYuan-Hsiang Lin, Chih-Fong Lin, Chong-Rong Wu, Yuan-Chang Hsu, He-Zhong You. 25-28 [doi]
- Computer Aided Diagnosis for Evaluating Colorectal Mucosal Lesions Using Narrow-Band ImagingMing-Hung Tsai, Chung-Fan Liu, Wei-Chih Shen. 29-32 [doi]
- An Efficient Component-Based Framework for Intelligent Home-Care System Design with Video and Physiological Monitoring MachineriesChuan-Yen Chiang, Yen-Lin Chen, Chao-Wei Yu, Shyan-Ming Yuan, Zeng-Wei Hong. 33-36 [doi]
- An Efficient Cluster Head Selection Strategy for Wireless Sensor NetworkJong-Shin Chen, Zong-Yi Lyu, Zeng-Wen Hong. 37-40 [doi]
- The Development of Smart Assistive Technology Devices for Urinary Catheterization MonitoringChuan-Pin Lu, Jui-Pin Li, Wei-Yi Liou, Hung-Ming Chen. 41-44 [doi]
- Dynamic Dispatching Mechanism for Differentiated Services in Cloud ClustersM. L. Chiang, Y. R. Chen, C. B. Lin, Y. C. Chang. 45-48 [doi]
- A Light-Weight Ranger Intrusion Detection System on Wireless Sensor NetworksChia-Fen Hsieh, Yung-Fa Huang, Rung Ching Chen. 49-52 [doi]
- A Personalized Pair-Recommendation Approach Using Mobile Message OntologyLi-Hua Li, Fu-Ming Lee, Tsung-Jen Pu, Chih-Wei Chen. 53-56 [doi]
- Bus Assisted Connectionless Routing Protocol for Metropolitan VANETWei Kuang Lai, Kai-Ting Yang, Meng-Chong Li. 57-60 [doi]
- A TDMA Medium Access Control Mechanism for IEEE 802.11-Based Wireless NetworksGuan-Hsiung Liaw, Yen-Tung Yeh. 61-64 [doi]
- Load-Balance Directed Diffusion in Wireless Sensor NetworksWei Kuang Lai, Yuh-Chung Lin, Tsung-Han Chen, Chin-Shiuh Shieh. 65-68 [doi]
- New Anti-phishing Method with Two Types of Passwords in OpenID SystemQingxiang Feng, Kuo-Kun Tseng, Jeng-Shyang Pan, Peng Cheng, Charles Chen. 69-72 [doi]
- GSM Automatic Frequency Planning with the Aid of Genetic AlgorithmsIyad Amro, Wassel Ghanem. 73-76 [doi]
- Access Security on Cloud Computing Implemented in Hadoop SystemBao Rong Chang, Hsiu Fen Tsai, Zih-Yao Lin, Chi-Ming Chen. 77-80 [doi]
- The Estimation of Mixture Customer Interpurchase LengthHui-Hsin Huang. 81-83 [doi]
- The Optimal Order and Payment Policies with Discount Cash Flows Analysis under Two Levels of Trade Credit PolicyChih-te Yang, Hsiu-Feng Yen, Tien-Tsai Huang, Liang-Ho Chen. 84-88 [doi]
- Accelerating Evolutionary Computation with Elite Obtained in Projected One-Dimensional SpacesYan Pei, Hideyuki Takagi. 89-92 [doi]
- Recurrent Fuzzy Neural Network for DC-Motor ControlAhmad Faramarzi, Kamel Sabahi. 93-96 [doi]
- A Survey on Interpretability-Accuracy (I-A) Trade-Off in Evolutionary Fuzzy SystemsPraveen Kumar Shukla, Surya Prakash Tripathi. 97-101 [doi]
- Comparison of NEAT and HyperNEAT Performance on a Strategic Decision-Making ProblemJessica Lowell, Sergey Grabkovsky, Kir Birger. 102-105 [doi]
- Reusable Knowledge from Symbolic Regression ClassificationIngo Schwab, Norbert Link. 106-109 [doi]
- The Role of Channel Experience in Enhancing Technology TransferChiou-Mei Chen. 110-113 [doi]
- Design of Low Adder Cost FIR Digital Filters Using Graph RepresentationHung-Yu Wang, Chun-Wei Chiu, Hung-Yuan Tseng, Hsieh-Wei Lee. 118-121 [doi]
- New Hardware Engine for Genetic AlgorithmsFariborz Ahmadi, Reza Tati, Soraia Ahmadi, Veria Hossaini. 122-126 [doi]
- A Methodology for Determining the Non-existence of Common Quadratic Lyapunov Functions for Pairs of Stable SystemsRodrigo H. Ordóñez-Hurtado, Manuel A. Duarte-Mermoud. 127-130 [doi]
- Application of ANN Technique for DC-Motor Control by Using FEL ApproachesKamel Sabahi. 131-134 [doi]
- An Asymmetry Printed WLAN/WiMax Dipole AntennaChurng-Jou Tsai, Wei-Chih Chen, Chia-Hsun Lin, Jinn-Kwei Guo, Chun-Lin Lu. 135-138 [doi]
- Design and Implementation of the Microcontroller Control System for Vertical-Garden ApplicationsTzu-Ching Chia, Chun-Lin Lu. 139-141 [doi]
- The Daily Activity Analysis of Patient with Cardiovascular Diseases at HomeChun-Han Yang, Kuo-Sheng Cheng, Jue-Long Wang, Ko-Long Lin. 142-145 [doi]
- Genetic Algorithms with Random Coordinates for Route Planning on a 3D TerrainOzer Ozdikis. 146-149 [doi]
- Assistive Technology for the Struggling Learner: Chinese PCS Editing ProcessorChi Nung Chu, Yu-Ting Huang. 150-152 [doi]
- Step-Locked Data Transformation in Personal Filing SystemsJiann-Gwo Doong. 153-156 [doi]
- Design and Implementation of Live SD Acquisition Tool in Android Smart PhoneSheng-Wen Chen, Chung-Huang Yang, Chien-Tsung Liu. 157-162 [doi]
- A Cross-Platform Mobile Learning System Using QT SDK FrameworkBabatunde B. Akinkuolie, Chia Feng Lin, Shyan-Ming Yuan. 163-167 [doi]
- Comments on a Secret-Key-Privacy-Preserving Authentication and Key Agreement SchemeYa-Fen Chang, Jhih-Yi Lin, Yuo-Ju Yen. 168-171 [doi]
- A Novel Cluster-Based Difference Expansion Transform for Lossless Data HidingYuan-Yu Tsai, Chi-Shiang Chan. 172-175 [doi]
- Intelligent Projector System Based on Computer VisionChih-Yang Lin, Wei-Wen Chang, Yi-Hui Chen. 176-179 [doi]
- An Efficient V-Fairness (t, n) Threshold Secret Sharing SchemeJen-Ho Yang, Chin-Chen Chang, Chih-Hung Wang. 180-183 [doi]
- Detection System of Smoking Behavior Based on Face AnalysisWen-Chuan Wu, Chun-Yang Chen. 184-187 [doi]
- Quantization- and Prediction-Based Image Authentication and RecoveryWen-Chuan Wu, Yi-Pei Hsieh. 188-191 [doi]
- A Verifiable Visual Cryptography SchemeYi-Hui Chen, Chi-Wei Lan, Chiao-Chih Huang. 192-195 [doi]
- A New Scheme for Data Hiding on Halftone ImagesHsin-Lung Wu, Jen-Chun Chang, Te-Chih Chou, Wei-Ming Lai. 196-199 [doi]
- The First Robust Image Tamper Detection Scheme under BrightnessJau-Ji Shen, Wei-Cheng Huang. 200-203 [doi]
- Reversible Watermarking Scheme with Visibility Using Randomize DistanceMin-Hao Wu, Fu-Hau Hsu, Cheng-Hsing Yang, Shiuh-Jeng Wang. 204-207 [doi]
- Reversible Data Hiding Based on VQ Compression CodeChin-Feng Lee, Ming-Chi Shih. 208-211 [doi]
- Hybrid Temporal Pattern Mining with Time Grain on Stock IndexSheng Xiang Fan, Jieh-Shan Yeh, Yaw-Ling Lin. 212-215 [doi]
- Classification Method Incorporating Decision Tree with Particle Swarm OptimizationChien-Lung Chan, Cheng-Yang Lee, Nan-Ping Yang, Sheng-Yuan Shen. 216-219 [doi]
- A Privacy Preserved Two-Party Equality Testing ProtocolShih-Fong Ciou, Raylin Tso. 220-223 [doi]
- The Design and Evaluation of GPU Based Memory DatabaseChia Feng Lin, Shyan-Ming Yuan. 224-231 [doi]
- Speeding up Subquadratic Finite Field Multiplier over GF(2m) Generated by Trinomials Using Toeplitz Matrix-Vector with Inner Product FormulaChiou-Yng Lee, Pramod Kumar Meher. 232-236 [doi]
- Novel Mastrovito Multiplier over GF(2m) Using TrinomialChe Wun Chiou, Jim-Min Lin, Chiou-Yng Lee, Chi-Ting Ma. 237-242 [doi]
- A Framework for the RFID Information Security and Privacy ProtectionChih-Yung Chen. 243-246 [doi]
- Event Mining and Indexing in Basketball VideoYung-Hui Chen, Lawrence Y. Deng. 247-251 [doi]
- Eye Detection Based on Skin Color Analysis with Different Poses under Varying Illumination EnvironmentDeng-Yuan Huang, Ta-Wei Lin, Wu-Chih Hu, Mu-Song Chen. 252-255 [doi]
- VQ-Based Fuzzy Compression Systems Designs through Bacterial Foraging Particle Swarm Optimization AlgorithmHsuan-Ming Feng, Ji-Hwei Horng. 256-259 [doi]
- Automatic Facial Skin Defects Detection and Recognition SystemChuan-Yu Chang, Heng-Yi Liao. 260-263 [doi]
- Probe Mastery Knowledge in E-learning Model with Web Technology - The Effective Factors by Flow TheoryHui-To Lin, Lin Huang, Su Hwa. 264-275 [doi]
- A Mobile Phone Base Sensory Integration Training SoftwareWen-Pinn Fang, Shun-Yi Pen. 276-278 [doi]
- A Preoperative 3D Computer-Aided Diagnosis System for Lung TumorChii-Jen Chen, You-Wei Wang. 279-282 [doi]
- Immunity-Inspired Host-Based Intrusion Detection SystemsChung-Ming Ou, Chung-Ren Ou. 283-286 [doi]
- Application of Gravity Vectors and Moving Vectors for the Acceleration of Both Differential Evolution and Interactive Differential EvolutionRyohei Funaki, Hideyuki Takagi. 287-290 [doi]
- Research on Architecture, Cross-Layer MAC Protocol for Wireless Sensor NetworksLizhong Jin, Jie Jia, Dong Chen, Fengyun Li, Zhicao Dong, Xue Feng. 291-294 [doi]
- A Load Balanced Routing Protocol Based on Ant Colony Algorithm for Wireless Mesh NetworksChunxiao Liu, Guiran Chang, Jie Jia, Lizhong Jin, Fengyun Li. 295-298 [doi]
- Improved Particle Swarm Optimization for Fuzzy Neural Network TraningChengjun Jin, Guiran Chang, Wei Cheng, Huiyan Jiang. 299-302 [doi]
- Efficient Traffic Aware Multipath Routing Algorithm in Cognitive NetworksJie Li, Xingwei Wang, Feng Li, Jie Jia. 303-306 [doi]
- A Vertical Search Engine for Energy Conservation and Environmental ProtectionChuan Wang, Lizhong Jin, Na Zhou. 307-310 [doi]
- A Novel Secure Architecture for the Internet of ThingsDong Chen, Guiran Chang, Lizhong Jin, Xiaodong Ren, Jiajia Li, Fengyun Li. 311-314 [doi]
- Composite Service Adaptation Supported Environmental Monitoring SystemFei Li, Bin Zhang, Liang Ge. 315-318 [doi]
- Evaluation of Intrusion Detection System Based on Evaluation ModelXianghui Zhou, Wei Wan. 319-322 [doi]
- A Multi-objective Evolution Algorithm Based Oil Field Stimulation Measure ProgrammingBixin Hu. 323-326 [doi]
- An Improved Algorithm for the Numerical Filtering Algorithm of Inverse Laplace TransformsZhen-Ping Xu, Ming-Jiang Li. 327-329 [doi]
- Application of Improved Apriori Algorithm on Educational InformationQiang Yang 0007, Yanhong Hu. 330-332 [doi]
- Applied Research on Discriminative-Adaptive Neural Network Algorithm in Indoor Positioning SystemYoufu Du, Ming Zhao, Yanhong Hu. 333-336 [doi]
- Constrained CMA-Based Blind Multiuser Detection for DS-CDMA UWB in a Realistic Indoor ChannelZhengqiang Wang, Ming Zhao, Xin-e Li. 337-340 [doi]
- A Novel Cooperation Mechanism to Enforce Security in Wireless Sensor NetworksFengyun Li, Guiran Chang, Fuxiang Gao, Lan Yao. 341-344 [doi]
- Symmetry Auto-detection Based on Contour and Corner ModelsMing Zhao, Zhenyu Meng, Kuo-Kun Tseng, Jeng-Shyang Pan, Chih-Yu Hsu. 345-349 [doi]
- Research on Properties and Application of B-netYuncai Zhou. 350-352 [doi]
- RCBA: An Efficient Annotation Tool for Community E-LearningFeng Lu, Xin Li. 353-356 [doi]
- Application of Information Fusion Method Based on Generalized Regression Neural Network in Hydrocarbon Reservoir Evaluation StudiesHanyun Wen. 357-360 [doi]
- Evacuation Model Based on Ellipse Sound Wave DiffusionYanrong Cui. 361-364 [doi]
- Design of Remote Video Monitoring System Based on Arm-Linux Platform and HTTP ProtocolHu-jie, Wang Kai, Wu Lei. 365-368 [doi]
- Evolutionary Interval Fingerprint for Wireless NetworkKuo-Kun Tseng, Wei Wei, Jeng-Shyang Pan, Chih-Yu Hsu, Shuo-Tsung Chen. 369-372 [doi]
- Biometric Electrocardiogram Card for Access Control SystemFuFu Zeng, Kuo-Kun Tseng, Ming Zhao, Jeng-Shyang Pan, Huang-Nan Huang, Chih-Yu Hsu, Shuo-Tsung Chen. 373-376 [doi]
- Robust Color Image Segmentation by Karhunen-Loeve Transform Based Otsu Multi-thresholding and K-means ClusteringChenxue Wang, Junzo Watada. 377-380 [doi]
- Fuzzy Game-Based Real Option Analysis in Competitive Investment SituationTanatch Tangsajanaphakul, Junzo Watada. 381-384 [doi]
- Particle Filter-Based Height Estimation in Human TrackingZhenyuan Xu, Junzo Watada, Zalili Binti Musa. 385-388 [doi]
- Building a Memetic Algorithm Based Support Vector Machine for Imbalaced ClassificationWu Mingnan, Junzo Watada, Zuwairie Ibrahim, Marzuki Khalid. 389-392 [doi]
- TCP Connection Management Model in Complex Topology NetworkZhi-Gang Wu, Hao Luo, Shuzhuang Zhang, Tao Zhang. 393-396 [doi]