Abstract is missing.
- Applying Embedded Hybrid ANFIS/Quantum-Tuned BPNN Prediction to Collision Warning System for Motor Vehicle SafetyBao Rong Chang, Chung-Ping Young, Hsiu Fen Tsai, Jian-Jr Lin. 3-8 [doi]
- A Novel Digital Watermarking Method for New Viewpoint Video Based on Depth MapNing Zhu, Guiguang Ding, Jianmin Wang. 3-7 [doi]
- Cryptanalysis of ID-Based Digital Signature Scheme on Elliptic Curve CryptosystemJen-Ho Yang, Chin-Chen Chang. 3-5 [doi]
- A Customer Privacy Protection Protocol on Agent-Based Electronic Commerce TransactionYu-Yi Chen, Jun-Chao Lu, Shin-I Chen. 6-10 [doi]
- A Novel Algorithm for Object Tracking with Particle Filtering and GVF-SnakeChun-li Dong, Yu-ning Dong. 8-13 [doi]
- A Sense Based Similarity Measure for Cross-Lingual DocumentsHsun-Hui Huang, Horng-Chang Yang, Yau-Hwang Kuo. 9-13 [doi]
- A Fair-Use DRM System Based on Web ServiceYu-Yi Chen, Yao-Jen Wang, Cheng-Jie Chen. 11-16 [doi]
- Anomaly Detection in Computer Networks Using Dissimilarity-Based One-Class ClassifiersJun Ma, Guanzhong Dai. 14-18 [doi]
- An Intelligent Intrusion Detection System Based on UPnP Technology for Smart LivingMong-Fong Horng, Bo-Chao Chang, Bei-Hao Su. 14-18 [doi]
- Design of Proxy Signature in ECDSAMing-Hsin Chang, I-Te Chen, Ming-Te Chen. 17-22 [doi]
- Robust Image Watermarking Using Mean Quantization in DTCWT DomainBaolong Guo, Lei-Da Li, Jeng-Shyang Pan, Liu Yang, Xiaoyue Wu. 19-22 [doi]
- Image Fusion Based on Grey Polynomial InterpolationCheng-Hsiung Hsieh, Pei-Wen Chen, Chia-Wei Lan, Kuan-Chieh Hsiung. 19-22 [doi]
- Design and Simulation of a Sliding Mode Controller for Reducing Radial Vibration of an Eccentric Rotor Equipped with an Automatic Dynamic BalancerChun-Lung Huang. 23-28 [doi]
- A Lock-Based Protocol for XML Metadata Knowledge BasesKuen-Fang Jea, Tsui-Ping Chang. 23-28 [doi]
- A Method of Camera Relationship Establishment Based on Temporal and Spatial Information of Video ClipsHsien-Chou Liao, Cheng-Hsiung Hsieh, Yi-Ming Hsieh, Chih-En Wu. 23-26 [doi]
- An Intelligent Agent for Personalized E-LearningJin-Ling Lin, Ming-Hung Chen. 27-31 [doi]
- An Embedded Fuzzy Type-2 Controller Based Sensor Behavior for Mobile RobotSiti Nurmaini, Siti Zaiton Mohd Hashim. 29-34 [doi]
- Key-Dependent Compressed Domain Audio HashingYuhua Jiao, Mingyu Li, Qiong Li, Xiamu Niu. 29-32 [doi]
- A Method of Pulmonary Nodules Detection with Support Vector MachinesLiu Lu, Liu Wanyu. 32-35 [doi]
- LMSS: A Location-Based Multimedia Service System Using Wireless NetworksYiqiang Chen, Juan Qi, Zhuo Sun. 33-38 [doi]
- Pattern Optimization and the Application in Question AnsweringYongping Du, Ming He. 35-39 [doi]
- A New Algorithm for Power System Scheduling ProblemsHuo-Ching Sun, Yann-Chang Huang, Kun-Yuan Huang. 36-40 [doi]
- Automatic Learning of Semantic Region Models for Event RecognitionLei Gao, Chao Li, Yi Guo, Zhang Xiong. 40-44 [doi]
- Fast Estimation of Communication Cost for Thread Mapping in Computation Grids Using SVDTi-Hsin Wang, Tyng-Yeu Liang, Chia-Hao Chang. 41-46 [doi]
- Predicting Protein-Protein Recognition Using Feature VectorHuang-Cheng Kuo, Ping-Lin Ong, Jia-Jie Li, Jen-Peng Huang. 45-50 [doi]
- The Synchronous Drive System in Gantry-Moving Milling Machine Based on Dynamic Compensation and Fuzzy ControlYishan Gong, Na Qian. 45-48 [doi]
- Performance Comparison of ADRS and PCA as a Preprocessor to ANN for Data MiningNicholas Navaroli, David Turner, Arturo I. Concepcion, Robert S. Lynch Jr.. 47-52 [doi]
- Enhanced Self-Adaptive Search Capability Particle Swarm OptimizationJuan Hu, Laihang Yu, Kaiqi Zou. 49-53 [doi]
- PCA-Based Face Verification and Passport Code Recognition Using Improved FKCN AlgorithmKwang-Baek Kim, Am-suk Oh, Young Woon Woo. 51-57 [doi]
- Applying the Particle Swarm Optimization and Boltzmann Function for Feature Selection and Classification of Lymph Node in Ultrasound ImagesChuan-Yu Chang, Cheng-Ting Lai, Shao-Jer Chen. 55-60 [doi]
- Generation of Permutations Based Upon Factorial NumbersAlexei A. Borisenko, Vyacheslav Kalashnikov, Igor A. Kulik, O. E. Goryachev. 57-61 [doi]
- Adaptive Template Block-Based Block Matching for Object TrackingWu-Chih Hu. 61-64 [doi]
- An Efficient Forward and Backward Fault-Tolerant Mobile Agent SystemJong-Shin Chen, Hong-Da Shi, Ching-Mu Chen, Zeng-Wen Hong, Pei-Lin Zhong. 61-66 [doi]
- Solving Bilevel Toll Assignment Problem by Penalty Function AlgorithmVyacheslav Kalashnikov, Nataliya Kalashnykova, Jose Fernando Camacho Vallejo. 62-66 [doi]
- Image Thresholding Using Mean-Shift Based Particle Swarm OptimizationChien-Cheng Lee, Yu-Chun Chiang, Cheng-Yuan Shih, Wen-Sheng Hu. 65-70 [doi]
- Design of an IDML-Based Interactive Agent Drama Authoring ToolTai-Hong Chen, Jim-Min Lin, Kai-Yi Chin, Zeng-Wei Hong. 67-72 [doi]
- Inexact Newton Algorithm to Solve Nonlinear Complementarity ProblemsNataliya Kalashnykova, Vyacheslav Kalashnikov, Aaron Arevalo Franco. 67-71 [doi]
- Object-Based Image Retrieval Using Perceptual GroupingTian-Luu Wu, Ji-Hwei Horng. 71-76 [doi]
- Liberalization of Mexican Electricity Market: Various Modeling Approaches with Numerical Simulation ResultsVitaly Kalashnikov, Nataliya Kalashnykova, Felipe de Jesus Castillo Perez, Armando César Uranga Sifuentes, Claudia Mayela Avila Garza. 72-76 [doi]
- The Study of Backup Mechanism for Web Services Based on MAS and Topic MapsFeng-Chao Yang, Jin-Ling Liao, Cheng-Li Chang. 73-78 [doi]
- A Fuzzy Temporal Model and Query Language for FTER DatabasesLiguo Deng, Zhiheng Liang, Yong Zhang. 77-82 [doi]
- Fragile Watermarking for H.264 Video Stream AuthenticationChuen-Ching Wang, Yu-Chang Hsu. 77-80 [doi]
- Applying Agent Composition for Development of Service-Oriented Program LanguageJong-Yih Kuo, Frank Hsieh, Ho Chin Lin. 79-84 [doi]
- Research on Solar Photovoltaic Surveillance System Base on NetworkLi De Jun, Liu Jie, Tian Yu Kang. 81-83 [doi]
- A New Support Vector Machine with Fuzzy Hyper-Plane and Its Application to Evaluate Credit RiskPei-Yi Hao, Min-Shiu Lin, Lung-Biao Tsai. 83-88 [doi]
- StudentsSheng-Hui Hsu, Yueh-Min Huang. 85-89 [doi]
- Fuzzy Possibility C-Mean Based on Complete Mahalanobis Distance and Separable CriterionHsiang-Chuan Liu, Der-Bang Wu, Jeng-Ming Yih, Shin-Wu Liu. 89-94 [doi]
- FPGA-Realization of Adaptive Fuzzy Controller for the Linear X-Y TableYing-Shieh Kung, Le Thi Van Anh, Shin-Hung Jou. 89-94 [doi]
- Application of Polynomial Neural Networks to Exchange Rate ForecastingRozaida Ghazali, Abir Jaafar Hussain, M. N. Mohd. Salleh. 90-95 [doi]
- The Self-Organizing Map Applying the Survival of the Fittest Type Learning AlgorithmJunko Shibata, Koji Okuhara, Shogo Shiode, Hiroaki Ishii. 95-100 [doi]
- Illumination Invariant Color Model for Image Matching and Object RecognitionHui-Fuang Ng, Yen-Wei Chu. 95-99 [doi]
- A Cyclic Coding Based Perceptual Hashing AlgorithmHui Zhang, Yanan Wang, Xiamu Niu. 96-99 [doi]
- Multi-user Signals Combined with Quadratic Residue Code for Monitoring SystemChien-Jung Ho, Wen-Hao Hsieh, Gwo-Jia Jong. 100-103 [doi]
- A Scene Images Classification Method Based on Local Binary Patterns and Nearest-Neighbor ClassifierGuang Han, Chunxia Zhao. 100-104 [doi]
- A New Iterative Learning Controller for Electro-Pneumatic Servo SystemShaojuan Yu, Jincai Bai, Shibo Xiong, Rucheng Han. 101-105 [doi]
- Data Mining of Geographical Accessibility for Tourism in Regional AreaKoji Okuhara, Kuang Yih Yeh, Hao-Ching Hsia, Hiroaki Ishii. 104-109 [doi]
- Using Resampling for Optimizing Continuous Queries in Wireless Sensor NetworksSan-Yih Hwang, Pin-Yu Liu, Chien-Hsiang Lee. 107-110 [doi]
- Some Software Engineering and Knowledge Representation Principles for the Design and Construction of Ontology-Based Linguistic ResourcesFrancisco Ãlvarez, Antonio Vaquero, Fernando Sáenz. 110-115 [doi]
- Discovering Moving Clusters from Spatial-Temporal DatabasesSan-Yih Hwang, Chien-Ming Lee, Chien-Hsiang Lee. 111-114 [doi]
- Genetics-Based Machine Learning Approach for Rule Acquisition in an AGV Transportation SystemKazutoshi Sakakibara, Yoshiro Fukui, Ikuko Nishikawa. 115-120 [doi]
- Malicious Webpage Detection by Semantics-Aware ReasoningShih-Fen Lin, Yung-Tsung Hou, Chia-Mei Chen, Bingchiang Jeng, Chi-Sung Laih. 115-120 [doi]
- Robust Image Hashing for Image Authentication Based on DCT-DWT Composite DomainRui-Xin Zhan, K. Y. Chau, Zhe-Ming Lu, Bei-Bei Liu, Andrew W. H. Ip. 119-122 [doi]
- Effective Integration of Imitation Learning and Reinforcement Learning by Generating Internal RewardKeita Hamahata, Tadahiro Taniguchi, Kazutoshi Sakakibara, Ikuko Nishikawa, Kazuma Tabuchi, Tetsuo Sawaragi. 121-126 [doi]
- The Design and Implementation of Zero-Copy for LinuxTianhua Liu, Hongfeng Zhu, Guiran Chang, Chuansheng Zhou. 121-126 [doi]
- Comments on A Semi-blind Digital Watermarking Scheme Based on Singular Value Decomposition Ting-Xian Zhang, Wei-min Zheng, Zhe-Ming Lu, Bei-Bei Liu. 123-126 [doi]
- A Novel Image Authentication and Recovery Method for Applications of Image SharingChiang-Lung Liu. 127-132 [doi]
- Research on Intelligent Systems Applied to Tourism Development DesignWei Min. 127-132 [doi]
- Multimodal Medical Image Registration Using Particle Swarm OptimizationYen-Wei Chen, Chen-Lun Lin, Aya Mimori. 127-131 [doi]
- A Heuristic Decoding Method for Coded Images of Uniformly Redundant ArrayShinya Nozaki, Shinsuke Fujioka, Yen-Wei Chen. 132-135 [doi]
- Population Control for Multi-agent Based Topical CrawlersAlban Mouton, Pierre-Francois Marteau. 133-137 [doi]
- Heuristics for Dynamic Lot-Sizing with Plan Setup Cost in a Rolling Horizon EnvironmentYooseong Choi, In-Jae Jeong. 133-138 [doi]
- 3D Function Approximation with rGCS Classifier SystemLukasz Cielecki, Olgierd Unold. 136-141 [doi]
- H-Index Analysis of Enron CorpusVáclav Snásel, Jiri Dvorský, Anton Timofieiev, Jaroslav Pokorný. 138-144 [doi]
- The Development of a Creativity-Enhancing Model for Innovative Design ConceptsZhiqiang Zhu, Sev V. Nagalingam, Hung-Yao Hsu. 139-144 [doi]
- Attentiveness Assessment in Learning Based on Fuzzy Logic AnalysisKuo-An Hwang, Chia-Hao Yang. 142-146 [doi]
- Enhance Term Weighting Algorithm as Feature Selection Technique for Illicit Web Content ClassificationZhi-Sam Lee, Mohd Aizaini Maarof, Ali Selamat, Siti Mariyam Hj. Shamsuddin. 145-150 [doi]
- An Agent Based Rough Classifier for Data MiningAzuraliza Abu Bakar, Zulaiha Ali Othman, Abdul Razak Hamdan, Rozianiwati Yusof, Ruhaizan Ismail. 145-151 [doi]
- A Novel Prediction Algorithm of Thermostable Proteins by Using Hurst Exponent and Choquet Integral Regression ModelHsiang-Chuan Liu, Yu-Chieh Tu, Bai-Cheng Jeng, Tung-Sheng Liu. 147-152 [doi]
- Multi-scale Entropy Based Traffic Analysis and Anomaly DetectionRuo-Yu Yan, Qing-Hua Zheng. 151-157 [doi]
- Equivalence between Weight Decay Learning and Explicit Regularization to Improve Fault Tolerance of RBFJohn Sum, Wun-He Luo, Yung-Fa Huang, You-Ting Jheng. 152-157 [doi]
- Feature Selection for Cancer Classification on Microarray Expression DataHui-Huang Hsu, Ming-Da Lu. 153-158 [doi]
- Adaptive Knowledge Retrieving on Mobile GridYue-Shan Chang, Pei-Chun Shih, Yu-Cheng Luo. 158-163 [doi]
- Low Complexity Search Method for G.723.1 MP-MLQ AlgorithmR. S. Lin, Y.-C. Chen, F. K. Chen. 158-161 [doi]
- FPGA Realization of Activation Function for Artificial Neural NetworksVenakata Saichand, M. Nirmala Devi, S. Arumugam, N. Mohankumar. 159-164 [doi]
- Fuzzy Crashing Problem on Project Management Based on Confidence-Interval EstimatesFeng-Tse Lin. 164-169 [doi]
- Use of NER Information for Improved Topic TrackingXiaowei Wang, Longbin Jiang, Jialin Ma, Jiangyan. 165-170 [doi]
- Prediction of Protein Subcellular LocalizationsChin-Sheng Yu, Jenn-Kang Hwang. 165-170 [doi]
- On Genetic Algorithms for Boolean Matrix FactorizationVáclav Snásel, Jan Platos, Pavel Krömer. 170-175 [doi]
- Advanced Plasmonic Biosensing Devices and Automation Systems for Disease Diagnostic and Drug Screening ApplicationsNan-Fu Chiu, Tzuu-Shaang Wey, Chun Yu, Tzu-Chien Hsiao, Chii-Wann Lin. 171-176 [doi]
- Color Visual Cryptography Scheme Using Meaningful SharesHsien-Chu Wu, Hao-Cheng Wang, Rui-Wen Yu. 173-178 [doi]
- Research on the Reciprocity of Transceiver in the Smart Antenna ApplicationFu Haiyang, Gao Peng, Ding Haibao. 177-182 [doi]
- A Scanning Method for Dotted Data MatrixYuan-Fei Cheng. 179-183 [doi]
- Robustness of Structure-Based Watermark by Using Balanced Incomplete Block DesignsZhi-Fang Yang, Mong-Shu Wu. 179-182 [doi]
- A High Quality Histogram Shifting Based Embedding Technique for Reversible Data HidingWien Hong, Chih-Wei Shiu, Tung-Shou Chen. 183-187 [doi]
- Genetic Annealing Optimization: Design and Real World ApplicationsMostafa A. El-Hosseini, Aboul Ella Hassanien, Ajith Abraham, Hameed Al-Qaheri. 183-188 [doi]
- The Development of Enhanced Hash Mechanism for Improving Performance of IEEE 802.15.4Bih-Yaw Shih, Jyun-Ying Tseng. 184-189 [doi]
- Mining Region-Based Movement Patterns for Energy-Efficient Object Tracking in Sensor NetworksVincent S. Tseng, Ming-Hua Hsieh, Kawuu Weicheng Lin. 188-196 [doi]
- Intelligent Emotion Decision System for Autonomous AgentsXia Mao, Haiyan Bao, Zheng Li. 189-194 [doi]
- The Image Watermarking Technique Using Visual Secret Sharing StrategyShu-Chien Huang, Chu-Fu Wang. 190-195 [doi]
- Using Multi-attribute Utility Theory to Rank and Select Co-branding PartnersWei-Lun Chang. 195-200 [doi]
- Efficient Deployment Algorithms for Prolonging Network Lifetime and Ensuring Coverage in Wireless Sensor NetworksChu-Fu Wang, Shu-Chien Huang. 196-201 [doi]
- Reversible Watermarking for Compressed SpeechMingyu Li, Yuhua Jiao, Xiamu Niu. 197-201 [doi]
- User Behavior Analysis in Masquerade Detection Using Principal Component AnalysisHan-Ching Wu, Shou-Hsuan Stephen Huang. 201-206 [doi]
- A Novel Algorithm for Completely Hiding Sensitive Association RulesChih-Chia Weng, Shan-Tai Chen, Hung-Che Lo. 202-208 [doi]
- Unknown Malicious Executable DefectionYingxu Lai. 202-207 [doi]
- Development of an Agent-Based Distributed Multi-axis Surface Milling Machining Service SystemYung-Chou Kao, Mau-Sheng Chen. 207-212 [doi]
- A Distributed Algorithm for 0-1 Knapsack Problem Based on Mobile AgentShanping Qiao, Shixian Wang, Yongzheng Lin, Ling Zhao. 208-212 [doi]
- Lossless and Lossy Image Secret Sharing for Data TransmissionFa-Xin Yu, Hao Luo, Jeng-Shyang Pan, Zhe-Ming Lu. 209-214 [doi]
- A Novel Algorithm for Weighted-Fair Rate Control in Wireless Sensor NetworkLufeng Mo, Yueyun Shen. 213-216 [doi]
- Neural Network Integration Fusion Model and ApplicationXiaodan Zhang, Zhendong Niu. 213-215 [doi]
- Microcomputer Based Smart Engine Ignition Control System for MotorcyclesChing-Biau Tzeng, Tzuu-Shaang Wey, Tsung-Yu Su. 215-221 [doi]
- Thinned ECOC Decomposition for Gene Expression Based Cancer ClassificationNima Hatami. 216-221 [doi]
- Verification of Mobile SMS Application with Model Checking AgentSiti Dianah Abdul Bujang, Ali Selamat. 217-222 [doi]
- Backward-Forward Combined Convolutive Blind Source SeparationXiaoyue Jiang, Hichem Sahli, Werner Verhelst, Yanning Zhang. 222-227 [doi]
- A Sort-Based DBA Algorithm for EPON SystemWen-Ping Chen, Shih-Wei Kau, Bin-Yih Liao, Wen-Shyang Hwang, Wen-Tsung Hu. 223-228 [doi]
- Multilingual Information Retrieval Using GHSOMHsin-Chang Yang, Chung-Hong Lee. 225-228 [doi]
- Solving TSP with Shuffled Frog-Leaping AlgorithmXuehui Luo, Ye Yang, Xia Li. 228-232 [doi]
- The Reform Schema and Usability of TD-SCDMA Smart AntennaHaiyang Fu, Xiaochun Qu, Youcai Han. 229-234 [doi]
- An Intelligent PPQA Web Services for CMMI AssessmentMei-Hui Wang, Chang-Shing Lee. 229-234 [doi]
- A DEA/AHP Approach to Efficiency Investigation for TaiwanYaFen Tseng, ShuChen Kao, TzaiZang Lee, ChienHsing Wu. 235-239 [doi]
- Efficient Authentication Schemes for Handover in Mobile WiMAXHung-Min Sun, Shih-Ying Chang, Yue-Hsun Lin, Shin Yan Chiou. 235-240 [doi]
- Image Registration Using Rotation Normalized Feature PointsZhan-long Yang, Baolong Guo. 237-241 [doi]
- Improving the Efficiency of Forward Checking Algorithm for Solving Constraint Satisfaction ProblemsYusef Farhang, Mohammad Reza Meybodi, A. R. Hatamlou. 240-245 [doi]
- The Essential Design Principles of Verifiable Non-interactive OT ProtocolsYa-Fen Chang, Wei-Cheng Shiao. 241-245 [doi]
- Efficient Intra Refresh Using Motion Affected Region Tracking for Surveillance Video over Error Prone NetworksJie Jiang, Baolong Guo, Wei Mo. 242-246 [doi]
- Fuzzy Clustering by Differential EvolutionYucheng Kao, Jin-Cherng Lin, Shin-Chia Huang. 246-250 [doi]
- An Exchangeable E-Cash Scheme by E-MintJung-Wen Lo, Min-Shiang Hwang, Yen-Ping Chu. 246-251 [doi]
- Convergence Analysis of PSO Inspired by r- and K-SelectionYunyi Yan, Baolong Guo. 247-252 [doi]
- Intelligent Aging Estimation Method for Lead-Acid BatteryYu-Hua Sun, Hurng-Liahng Jou, Jinn-Chang Wu. 251-256 [doi]
- Multiple-Image Encryption by Rotating Random GridsTzung-Her Chen, Kai-Hsiang Tsao, Kuo-Chen Wei. 252-256 [doi]
- Inertia-Adaptive Particle Swarm Optimizer for Improved Global SearchKaushik Suresh, Sayan Ghosh, Debarati Kundu, Abhirup Sen, Swagatam Das, Ajith Abraham. 253-258 [doi]
- A Two-Stage Approach for AAM FittingMingcai Zhou, Yangsheng Wang, Xiaoyan Wang, Xuetao Feng. 257-261 [doi]
- Hospital Management Based on Data MiningShusaku Tsumoto, Shoji Hirano. 257-262 [doi]
- Fuzzy Logic Controllers for a Seismic Isolation System with Variable Friction DamperGing-Long Lin, Lyan-Ywan Lu. 259-264 [doi]
- Analysis and Estimation of Micro-Doppler Effect in Passive Positioning SystemMiaohong Cai, Feng He, Lenan Wu. 262-265 [doi]
- E-Business Social Network Optimization and VisualizationSiti Nurkhadijah Aishah Ibrahim, Ali Selamat, Md. Hafiz Selamat. 263-268 [doi]
- Blind Image Deconvolution via Particle Swarm Optimization with Entropy EvaluationTsung-Ying Sun, Chan-Cheng Liu, Yu-Peng Jheng, Jyun-Hong Jheng, Shang-Jeng Tsai, Sheng-Ta Hsieh. 265-270 [doi]
- Sequential Quadratic Programming Based on IPM for Constrained Nonlinear ProgrammingXiming Liang, Hassan A. Bashir, Shanchun Li. 266-271 [doi]
- Efficient Mining of Frequent Closed Itemsets without Closure CheckingChih-Hsien Lee, Don-Lin Yang, Jungpin Wu, Kuo-Cheng Yin. 269-274 [doi]
- A Hybrid Feature Selection MechanismHui-Huang Hsu, Cheng-Wei Hsieh, Ming-Da Lu. 271-276 [doi]
- Notes on the Distinction of Gaussian and Cauchy MutationsKuo-Torng Lan, Chun-Hsiung Lan. 272-277 [doi]
- An Efficient Approximate Approach to Mining Frequent Itemsets over High Speed Transactional Data StreamsKuen-Fang Jea, Chao-Wei Li, Tsui-Ping Chang. 275-280 [doi]
- A Face Image Database for Evaluating Out-of-Focus BlurQi Han, Meihui Zhang, Chen Song, Zhifang Wang, Xiamu Niu. 277-282 [doi]
- Web Usage Mining Based on Clustering of Browsing FeaturesChu-Hui Lee, Yu-Hsiang Fu. 281-286 [doi]
- Detection Method Based on Reverse Proxy against Web Flooding AttacksChu-Hsing Lin, Jung-Chun Liu, Chih-Chieh Lien. 281-284 [doi]
- Wavelet-Based Image Fusion by Adaptive DecompositionYao-Hong Tsai, Yen-Han Lee. 283-287 [doi]
- Study on X-VRML-Based Modelling of Virtual MuseumShengnan Zhang, Limin Song, Lianqiang Niu. 285-288 [doi]
- Content-Based Image Retrieval Based on Vector Quantization and Affine Invariant RegionChin-Feng Lee, Shu-Ching Wang, Yi-Jia Wang. 287-290 [doi]
- DNA Computing and Its ApplicationsJunzo Watada, Rohani Binti Abu Bakar. 288-294 [doi]
- Novel Algorithms for Privacy Preserving Utility MiningJieh-Shan Yeh, Po-Chiang Hsu, Ming-Hsun Wen. 291-296 [doi]
- A Model for a Distance Learning System over the InternetAlessandro Brawerman, Cicero F. Marques, Francisco J. K. G. Navarro, Rafael Ribeiro Macedo. 291-292 [doi]
- E-Business Model Approach to Determine Models to DatawarehouseDiego Alex Harmatiuk, Silvio Bortoleto, Wesley Pereira de Oliveira, Durval Neto, Everson Volaco. 293-295 [doi]
- A Reversible Steganographic Algorithm for Point-Sampled GeometryPeng-Cheng Wang, Kuo-Chen Wu, Chung-Ming Wang. 296-301 [doi]
- Improvement of Wang-Li s Forward-Secure User Authentication Scheme with Smart CardsWen-Bing Horng, Cheng-Ping Lee. 297-302 [doi]
- Unsupervised Clustering by Means of Hierarchical Differential Evolution AlgorithmChih-Chin Lai, Pei-Fen Lee, Pei-Yun Hsieh. 297-301 [doi]
- Secret Sharing Scheme with Non-expansible Shadow Size for Color ImagesChia-Chen Lin, Wen-Xiu Zhang. 302-307 [doi]
- Support Vector Regression for GDOPWei-Han Su, Chih-Hung Wu. 302-306 [doi]
- Intelligent Data Mining Approach for Fault DiagnosisYann-Chang Huang, Huo-Ching Sun, Yu-Hsun Lin. 303-306 [doi]
- 2D/3D Face Recognition Using Neural Networks Based on Hybrid Taguchi-Particle Swarm OptimizationCheng-Jian Lin, Chen-Hsiang Chu, Chi-Yung Lee, Ya-Tzu Huang. 307-312 [doi]
- A Rough Set and SVM Based Approach to Chinese Textual Affect SensingXia Mao, Zheng Li, Haiyan Bao. 307-311 [doi]
- An Ordered Multi-proxy Multi-signature SchemeMin-Shiang Hwang, Shiang-Feng Tzeng, Shu-Fen Chiou. 308-313 [doi]
- Nonlinear Function Approximation Based on Least Wilcoxon Takagi-Sugeno Fuzzy ModelTsung-Ying Sun, Shang-Jeng Tsai, Cheng-Han Tsai, Chih-Li Huo, Chan-Cheng Liu. 312-317 [doi]
- Design of Self-Learning Fuzzy System by GA ApproachShian-Tang Tzeng. 313-318 [doi]
- Adaptive Image Hiding Algorithm Based on ClassificationShengbing Che, Qiangbo Huang, Bin Ma. 314-319 [doi]
- An Evolutionary Classifier Based on Adaptive Resonance Theory Network II and Genetic AlgorithmI-En Liao, Shu-Ling Shieh, Hui-Ching Chen. 318-322 [doi]
- Ant System Algorithm with Negative Pheromone for Course Scheduling ProblemDjasli Djamarus, Ku Ruhana Ku-Mahamud. 319-324 [doi]
- Image Hiding with an Improved Genetic Algorithm and an Optimal Pixel Adjustment ProcessLin Yu Tseng, Yung-Kuan Chan, Yu-An Ho, Yen-Ping Chu. 320-325 [doi]
- Monitoring System for Vehicle Power Supply Based on CAN BusSujing Wang, Lide Wang, Ping Shen, Biao Liu. 323-326 [doi]
- Compute the Term Contributed FrequencyCheng-Lung Sung, Hsu-Chun Yen, Wen-Lian Hsu. 325-328 [doi]
- The Improvement of Public Key Cryptography Based on Chaotic Neural NetworksYunpeng Zhang, Tongtong Xue, Zhengjun Zhai, Chunyan Ma, Xiaobin Cai. 326-330 [doi]
- Fuzzy Fusion Method for Combining Small Number of Classifiers in Hyperspectral Image ClassificationChun-Hsiang Chuang, Bor-Chen Kuo, Hsuan-Po Wang. 327-332 [doi]
- Output-Feedback PID Controllers for Robot Manipulators with Jacobian UncertaintyChunqing Huang, Xiafu Peng. 329-334 [doi]
- Reversible Watermarking Based on the Invariant Sum ValueShaoWei Weng, Yao Zhao, Jeng-Shyang Pan, Rongrong Ni. 331-334 [doi]
- A Multi-agent Based Architecture for an Assistive User Interface of Intelligent Home Environment ControlChih-Hsien Liang, Wei-Sheng Hung, Ming-Che Hsieh, Chung-Min Wu, Chin-Hsing Luo. 335-338 [doi]
- A GA-Based Image Halftoning TechniqueChih-Cheng Lo, Yi-Ting Chen, Shu-Chuan Chu, Jeng-Shyang Pan. 335-338 [doi]
- Intelligent Control for Principal Axis of Variable Vector Propeller of Submersible VehicleSheng Liu, Donghao Xu. 335-339 [doi]
- Spoken Dialogue Agent Interface Requirements Modeling Based on PASSI MethodologyMing-Che Hsieh, Wei-Sheng Hung, Shin-Shing Shin, Shu-Wen Lin, Tsan-Hsun Huang. 339-342 [doi]
- A Novel Template Protection Algorithm for Iris RecognitionZhifang Wang, Qi Han, Xiamu Niu, Christoph Busch. 340-345 [doi]
- Face Recognition Based on Digital Curvelet TransformYi-Chun Lee, Chin-Hsing Chen. 341-345 [doi]
- An Intelligent Brain Computer Interface of Visual Evoked Potential EEGShih-Chung Chen, Shih-Chang Hsieh, Chih-Kuo Liang. 343-346 [doi]
- Implementation of Wiki-Based Knowledge Management Systems for Small Research GroupsChia-Han Yang, Ming-Ying Wu, Chien-Min Lin, Don-Lin Yang. 346-349 [doi]
- Subpixel Edge Location Using Orthogonal Fourier-Mellin Moments Based Edge Location Error Compensation ModelWen-Chia Lee, Chin-Hsing Chen. 346-351 [doi]
- A Multi-agent Based Testbed for Agent Interface EvaluationChung-Min Wu, Ming-Che Hsieh, Chin-Hsing Luo. 347-350 [doi]
- CCSDS Advanced Orbiting Systems, Data Links Protocol: Study on Virtual Channels Scheduling AlgorithmQingli Liu, Chengsheng Pan, Guoren Wang, Wei Liu. 351-355 [doi]
- A Watermarking Method for Still Images Using Modified Code Division Multiple AccessJi-Hong Chen, Chin-Hsing Chen, Wen-Yuan Chen. 352-357 [doi]
- A Stressed Syllable Labeling Approach Using Fractal DimensionsQingcai Chen, Dandan Wang, Xiaolong Wang. 353-357 [doi]
- Application of Neural Network Techniques on Nonlinear Channel Equalization for 16-QAM Modulation SystemsChun-Yi Lo, Wan-De Weng. 356-361 [doi]
- A Fast and Stable Superresolution Reconstruction Method for Compressed Video SequencesHsi-Kuan Chen, Chin-Hsing Chen, Shih-Jen Wang. 358-362 [doi]
- A High Efficiency Protocol for Reporting Integrity MeasurementsChaowen Chang, Rongyu He, Hui Xie, Guoyu Xu. 358-362 [doi]
- Using Chi-Square Automatic Interaction Detector to Solve the Polysemy Problems in a Chinese to Taiwanese TTS SystemYih-Jeng Lin, Ming-Shing Yu, Chin-Yu Lin. 362-367 [doi]
- A New Multi Criteria Aid Model for Process Piloting Using Case-Based ReasoningDiala Dhouib, Habib Chabchoub, Sid-Ali Addouche, Abderrahman El Mhamedi. 363-367 [doi]
- Chinese Unknown Word Recognition Using Improved Conditional Random FieldsYisu Xu, Xuan Wang, Buzhou Tang, Xiaolong Wang. 363-367 [doi]
- A Modified Cluster-Based Routing Protocol with Cloud ModelYong Zhang, Yan-jun Yang, Jian-peng Xu, He Wang. 368-372 [doi]
- Intelligent Focus+Context Volume VisualizationCheng-Kai Chen, Russell Thomason, Kwan-Liu Ma. 368-374 [doi]
- A Fast Mode Decision Scheme with Variable Block Sizes in H.264/AVCPengyu Liu, Kebin Jia. 368-371 [doi]
- An Edge-Recovery-Based Error Concealment Method for VideoJifeng Sun, Wenkai Huang, Zhiyong Zhang. 372-375 [doi]
- Immune Network for Classifying Heterogeneous DataMazidah Puteh, Khairuddin Omar, Abdul Razak Hamdan, Azuraliza Abu Bakar. 373-377 [doi]
- An Exploratory Study on Malay Processing Tool for Acquisition of Taxonomy Using FCAMohd Zakree Ahmad Nazri, Siti Mariyam Shamsudin, Azuraliza Abu Bakar. 375-380 [doi]
- Mesh-Based In-band Motion Estimation MethodChen-Wei Deng, Bao-Jun Zhao. 376-380 [doi]
- Chattering-Free Fuzzy Sliding Mode Control Strategy for Uncertain Discrete Systems with Input SaturationLinsheng Li, Jianning Li. 378-382 [doi]
- Development of a Portable Automatic Inspection System for Printed Labels Using a Web CameraYuhki Shiraishi, Fumiaki Takeda. 381-385 [doi]
- Using MPE with Bayesian Network for Sub-optimization to Entropy-Based MethodologyBor-Chen Kuo, Tien-Yu Hsieh, Hsuan-Po Wang. 381-386 [doi]
- Comparing Query Similarity Measures for Collaborative Web SearchPavel Krömer, Václav Snásel, Jan Platos. 383-388 [doi]
- A Kind of Parallel Reference Frame Display Control AlgorithmBowen Fu, Wenhe Zhang, Lianqiang Niu. 386-390 [doi]
- The Empirical Study of Fuzzy Performance Appraisal Applied on Securities BrokerageTien-Tsai Huang, Chien-Yi Chen. 389-392 [doi]
- Evaluation of Automatic Text Summarization Methods Based on Rhetorical Structure TheoryVinÃcius Rodrigues Uzêda, Thiago Alexandre Salgueiro Pardo, Maria das Graças Nunes. 389-394 [doi]
- Suffix Tree Based Approach for Chinese Information RetrievalJin Hu Huang, David M. W. Powers. 393-397 [doi]
- Composite Shewhart-Poisson GWMA Control Chart with Sensitizing RulesTse-Chieh Lin. 393-396 [doi]
- Two Evolutionary Multiobjective Approaches for the Component Selection ProblemAndreea Vescan, Crina Grosan. 395-400 [doi]
- Fuzzy Multiple Objective Programming Based on Interval-Valued Fuzzy SetsTeng-San Shih, Huey-Ming Lee, Jin-Shieh Su. 397-402 [doi]
- Efficient Image Recovery Based on Self-EmbeddingYuan-Liang Tang, Chin-Feng Lee, Huai-En Lee. 398-402 [doi]
- Uniform Parallel Machines Scheduling Using a Genetic AlgorithmAlin Mihaila, Cristina Mihaila. 401-406 [doi]
- Tamper Detection of Relational Database Based on SVR Predictive DifferenceHsien-Chu Wu, Fang-Yu Hsu, Hwang-Yu Chen. 403-408 [doi]
- Genetic Optimization for Benefit-Oriented Data Broadcast in T-Learning EnvironmentsChao-Chun Chen, Yong-Ming Huang, Lien-Fa Lin, Ding-Chau Wang. 403-408 [doi]
- Ontology-Supported Focused-Crawler for Specified ScholarSheng-Yuan Yang, Chun-Liang Hsu. 409-414 [doi]
- Term Weighting Approaches for Text Categorization ImprovingL. A. Matsunaga, Nelson F. F. Ebecken. 409-414 [doi]
- A Blind Associative Watermarking Technique Using Self-EmbeddingChin-Feng Lee, Tsung-Chia Yang. 409-413 [doi]
- A Novel Algorithm for Ultrasonic Stereovision Data EnhancementLiu Lu, Liu Wanyu. 414-419 [doi]
- Using Semi-discrete Decomposition for Topic IdentificationVáclav Snásel, Pavel Moravec, Jaroslav Pokorný. 415-420 [doi]
- A Modular Method for Estimating Null Values in Relational Database SystemsShin-Jye Lee, Xiaojun Zeng. 415-419 [doi]
- PNagent: A Framework for Modelling BDI Agents Using Object Oriented Petri NetsZdenek Mazal, Radek KocÃ, VladimÃr Janousek, Frantisek Zboril. 420-425 [doi]
- Optimal Tuning of PI Speed Controller Using Nature Inspired HeuristicsMillie Pant, Radha Thangaraj, Ajith Abraham. 420-425 [doi]
- Implementation of an Intelligent HLA-Compliant Application Layer Gateway for Real-Time Flight SimulationKuo-Wei Meng, Ming-Chuan Hung, Don-Lin Yang, Yeh-Ching Chung. 421-426 [doi]
- Deductive E-Bargaining SystemH. F. Lai, S. G. Chen, W.-H. Jeng. 426-431 [doi]
- A Novel Anti-data Mining Technique Based On Hierarchical Anti-clustering (HAC)Tung-Shou Chen, Jeanne Chen, Yuan-Hung Kao, Tsang-Chou Hsieh. 426-430 [doi]
- Fuzzy Logic on Representation of Knowledge Structure and Measure of Similarity with Application on Mathematics Concepts for PupilsYuan-Horng Lin, He-Kai Chen, Wen-Liang Hung. 427-431 [doi]
- Robust and Progressive Color Image Visual Secret Sharing Cooperated with Data HidingHao Luo, Faxin Yu, Jeng-Shyang Pan, Zhe-Ming Lu. 431-436 [doi]
- The Influence of Order on a Large Bag of WordsCharles B. Prado, Felipe M. G. Fran, Ramon Diacovo, Priscila M. V. Lima. 432-436 [doi]
- Application of Grey Relational Analysis for Multivariate Time SeriesRoselina Sallehuddin, Siti Mariyam Hj. Shamsuddin, Siti Zaiton Mohd Hashim. 432-437 [doi]
- Improving VG-RAM WNN Multi-label Text Categorization via Label CorrelationAlberto Ferreira de Souza, Claudine Badue, Bruno Zanetti Melotti, Felipe Pedroni, Fernando Libio L. Almeida. 437-442 [doi]
- Tardiness in Fuzzy Flow Shop Scheduling Problems Based on Possibility and Necessity MeasuresPeng-Jen Lai, Ming-Hung Shu. 437-441 [doi]
- Research on Properties of Max-Product Fuzzy Associative Memory NetworksShuiling Zeng, Weihong Xu, Jingyu Yang. 438-443 [doi]
- Fast Parallel Molecular Solution to the Hitting-Set ProblemNung-Yue Shi, Chih-Ping Chu. 442-447 [doi]
- Rescheduling for Manufacturing Based on Ontology and Problem Solving MethodMuhammad Firdaus B. Mustapha, Safaai B. Deris. 444-449 [doi]
- An Incremental FUSP-Tree Maintenance AlgorithmChun-Wei Lin, Tzung-Pei Hong, Wen-Hsiang Lu, Wen-Yang Lin. 445-449 [doi]
- Control Strategy of Dynamic Leontief Input-Output ModelXiumei Wu, Lei Jiang. 450-453 [doi]
- An Evolution-Based Dynamic Scheduling Algorithm in Grid Computing EnvironmentKun-Ming Yu, Cheng-Kwan Chen. 450-455 [doi]
- A Mobile Trading Scheme for Digital Content Based on Digital RightsChia-Chen Lin, Po-Hsuan Chiang. 451-456 [doi]
- GM (1, 1) and DEA Application Model for Strategic Alliance in TaiwanChia-Nan Wang, Ya-Ru Lee. 454-459 [doi]
- A Data Grid File Replication Maintenance Strategy Using Bayesian NetworksChao-Tung Yang, Chien-Jung Huang, Ting-Chih Hsiao. 456-461 [doi]
- Fast Modular Multiplication for E-Commerce CryptosystemChia-Long Wu, Der-Chyuan Lou, Te-Jen Chang. 457-461 [doi]
- Ontology Model for Multi-relational Data Mining ApplicationSilvio Bortoleto, Nelson F. F. Ebecken. 460-463 [doi]
- Multi-recastable E-Bidding SchemeChun-I Fan, Chien-Nan Wu, Wei-Zhe Sun. 462-466 [doi]
- A Fast Elastic Net Method for Traveling Salesman ProblemJunyan Yi, Weixing Bi, Gang Yang, Zheng Tang. 462-467 [doi]
- Security Enhancement of Ku-Wang Authenticated Key Agreement ProtocolChin-Chen Chang, Jung-San Lee. 467-471 [doi]
- A Statistical Speckle Suppression Algorithm for Underwater Laser Image Based on Nonsubsampled Contourlet TransformLiu Yang, Baolong Guo, Wei Ni. 467-472 [doi]
- A Dynamic Weighting Scheme for Providing Fair Communication Service to Nomadic AgentsSang Won Rhee, Kyu Yeong Jeon, Sung-Keun Song, Hyung Su Lee, Hee Yong Youn. 468-473 [doi]
- An Efficiently Online/Offline Signcryption for FirewallDai-Rui Lin, Chih-I Wang, D. J. Guan. 472-478 [doi]
- A Panoramic Image Stabilization System Based on Block Motion IterationJuanjuan Zhu, Baolong Guo. 473-477 [doi]
- Bounded PSO Vmax Function in Neural Network LearningY. S. Lee, Siti Mariyam Hj. Shamsuddin, Haza Nuzly Abdull Hamed. 474-479 [doi]
- FFT-Based Orientation Recognition Algorithm in MirosotXian-xiang Wu, Bao-Long Guo. 478-481 [doi]
- Self-Certified Proxy Convertible Authenticated Encryption SchemeHan-Yu Lin, Tzong-Sun Wu, Ting-Yu Huang, Yi-Shiung Yeh. 479-483 [doi]
- Solution of Fuzzy Relational Equation by Real-Valued GALeh Luoh. 480-484 [doi]
- Robust Object Tracking via Hierarchical Particle FilterWei Sun, Baolong Guo. 482-486 [doi]
- The 2D Bar-Code Technology Applications in Medical Information ManagementYao-Lung Yeh, Jing-Cyun You, Gwo-Jia Jong. 484-487 [doi]
- Applying Experimental Statistical Method for the Preparation of Nanometric-Sized LiNi0.8Co0.2O2 Powders as a Cathode Material for Lithium BatteriesChing-Shieh Hsieh, Hsin-Ya Huang, Hui-Ling Fang, Wein-Duo Yang. 485-488 [doi]
- Spider Search: An Efficient and Non-Frontier-Based Real-Time Search AlgorithmChao Lin Chu, Russell J. Abbott, Debora K. Shuger. 487-492 [doi]
- Cultural-Based Genetic Algorithm: Design and Real World ApplicationsMostafa A. El-Hosseini, Aboul Ella Hassanien, Ajith Abraham, Hameed Al-Qaheri. 488-493 [doi]
- An Approach of Chunk Parsing and Entity Relation Extracting to Chinese Based on Conditional Random Fields ModelJun-hua Wu, Jing Zhou. 489-494 [doi]
- Estimation of Skin Color Range Using Achromatic FeaturesWen-Hung Liao, Yu-Hao Chi. 493-497 [doi]
- Improvement of SCTP Performance in Vertical HandoverChin-Shiuh Shieh, I-Cheng Lin, Wei Kuang Lai. 494-498 [doi]
- Earthquake Shelter Location Evaluation Considering Road StructureYung Lung Lee, Hiroaki Ishii, Cheng-An Tai. 495-497 [doi]
- Shape-Based Trademark Retrieval Using Cosine Distance MethodBeiji Zou, Umugwaneza Marie Providence. 498-504 [doi]
- A Prediction Mechanism of Mail Retrieval Based on the User Behavior Analysis for Electronic Mail Database SystemWei-Ru Lai, Che-Hui Liao, Chang-Ching Lu, Ming-Kuan Liao. 499-504 [doi]
- Finding the Complete Set of Minimal Solutions for Fuzzy Max-Archimedean t-Norm Relational EquationsJun-Lin Lin. 501-506 [doi]
- A High Performance Filter Based on Statistic Methods for Image ProcessingPao-Ta Yu, Yui-Lang Chen, Bae-Muu Chang. 505-510 [doi]
- Model of Approach and Determination of the Failure Pertaining to SchoolKatia Bortoleto, Silvio Bortoleto. 507-509 [doi]
- An Authentication Scheme in Peer-to-Peer Based Live Stream Sharing Management SystemsShiuh-Jeng Wang, Yuh-Ren Tsai, Pin-You Chen. 507-512 [doi]
- KDD on IVR Navigation Trees: Case StudyThiago T. Angelico, Thais Santos Bueno, Silvio Bortoleto, Anderson Ravanello. 510-512 [doi]
- Design and Application of a Reconfigurable Embedded SystemChing-Biau Tzeng, Tzuu-Shaang Wey, Li-Dao Fang. 511-516 [doi]
- A Block-Based Authentication Watermarking Technique for Binary ImagesHsien-Chu Wu, Yu-Chi Liu, Kuo-Ching Liu, Chwei-Shyong Tsai. 513-518 [doi]
- Interactive Mining of Frequent Patterns in a Data Stream of Time-Fading ModelsMing-Yen Lin, Sue-Chen Hsueh, Chung-Yi Wang. 513-518 [doi]
- Semi-supervised Laplacianfaces from Pairwise Constraints for Face RecognitionNa Wang, Xia Li. 517-522 [doi]
- Hierarchical P2P Networking and Two-Level Compression Scheme for Multi-agent System Supporting Context-Aware ApplicationsJoon Hwang Kim, Jeong Hun Chu, Seungwok Han, Chang-Won Park, Hee Yong Youn. 519-524 [doi]
- An Image Steganographic Scheme Based on Support Vector RegressionHsien-Chu Wu, Kuo-Ching Liu, Jun-Dong Chang, Ching-Hui Huang. 519-524 [doi]
- Complete Double Layered Embedding Scheme for Information HidingChin-Feng Lee, Jau-Ji Shen, Hung-Lin Chao. 525-528 [doi]
- Design of Fractional PID Control via Hybrid of Electromagnetism-Like and Genetic AlgorithmsFu-Kai Chang, Ching-Hung Lee. 525-530 [doi]
- Segmentation of Brain Internal Structures Automatically Using Non-rigid Registration with Simultaneous Intensity and Geometric MatchXiangbo Lin, Tianshuang Qiu, Su Ruan, Frédéric Morain-Nicolier. 525-530 [doi]
- NGN Service Pricing Support Decision System Based on Fuzzy Neural Network: NPDSSJin-Yu Zhang, Man-Gui Liang. 529-534 [doi]
- The Application of Genetic Algorithm on Control of Discrete Multiple Time-Delay Singularly Perturbation SystemsShin-Jang Pan, Jason S.-H. Tsai. 531-536 [doi]
- Detection of the Cardiovascular Diseases by Using a Linearly Modeling System with the PSO-Based Classification SchemeMeng-Cheng Shen, Heng-Chou Chen, Chih-Hui Chen. 531-536 [doi]
- A Collision Avoidance Protocol for Supporting All-Optical Ring NetworkWen-Ping Chen, Shih-Wei Kau, Wen-Shyang Hwang, Bin-Yih Liao, Wen-Tsung Hu. 535-540 [doi]
- NOx Estimation Based on Flame Image of High Temperature Air CombustionZengshou Dong, Mingjun Liu, Fengchun Zhang. 537-541 [doi]
- Differential Evolution Algorithm on Robust IIR Filter Design and ImplementationShing-Tai Pan, Bo-Yu Tsai, Chao-Shun Yang. 537-542 [doi]
- A Robust Audio Watermarking Algorithm Based on DCT and Vector QuantizationJi-Xin Liu, Zhe-Ming Lu, Jeng-Shyang Pan. 541-544 [doi]
- Location Tracking with Power-Level Switching for Wireless Sensor NetworksHung-Chi Chu, Chung-Jie Li, Ching-Yun Chen, Hong-Wen Yu. 542-547 [doi]
- A Study on the Applications of Learning Paths Concepts to the Teaching in Elementary SchoolHuan-Ming Chuang, Chia-Cheng Shen. 543-548 [doi]
- A Weight Method of Decoding the Binary BCH CodeH. P. Lee, H.-C. Chang, T.-C. Lin, T. K. Truong. 545-549 [doi]
- Traffic Identification of Tor and Web-MixXuefeng Bai, Yong Zhang, Xiamu Niu. 548-551 [doi]
- A Renewed Matrix Model for XML DataJaroslav Pokorný, Jan Vávra, Václav Snásel. 549-556 [doi]
- Digital Watermark for 3D Face Model Authentication and EER Performance AnalysisWenjun Huang, Xiamu Niu, Wei Song, Meiyu Lu. 550-554 [doi]
- Experiments with Boosted Decision Tree ClassifiersMichal Wozniak. 552-557 [doi]
- Combining Clustering and Bayesian Network for Gene Network InferenceSuhaila Zainudin, Safaai Deris. 557-563 [doi]
- Video Stabilization by Feature-Block Motion EstimationChao-Ho (Thou-Ho) Chen, Che-Wei Hsu, Chin-Hsing Chen. 557-560 [doi]
- Cooperative Collision Warning Based Highway Vehicle Accident ReconstructionChung-Ping Young, Bao Rong Chang, Jian-Jr Lin, Ren-Yang Fang. 561-565 [doi]
- The Study on Video Enhancement in the Low-Light Environment by Spatio-temporal FilteringTsong-Yi Chen, Thou-Ho (Chao-Ho) Chen, Che-Ping Su, Yi-jun Chen. 561-564 [doi]
- A Fieldbus Comprehensive Evaluation and Selection Method Based on Entropy-Ideal PointWei-Ming Tong, Hong-Wei Gao. 564-568 [doi]
- People Counting System for Getting In/Out of a Bus Based on Video ProcessingChao-Ho (Thou-Ho) Chen, Yin-Chan Chang, Tsong-Yi Chen, Da-Jinn Wang. 565-569 [doi]
- Design of an In-vehicle Anti-theft ComponentJung-Hsuan Wu, Chien-Chuan Kung, Jhan-Hao Rao, Pang-Chieh Wang, Cheng-Liang Lin, Ting-Wei Hou. 566-569 [doi]
- Facility Location Problem under Fuzzy Construction Cost and Preference of Candidate SitesHiroaki Ishii, Yung Lung Lee. 569-572 [doi]
- Point Clouds Construction Algorithm from a Home-Made Laser ScannerBagus Arthaya, Irwan Gunawan, Hendra Gunawan. 570-575 [doi]
- A Video Similarity Matching Algorithm Supporting for Different Time ScalesZhi-pin Deng, Ke-bin Jia. 570-574 [doi]
- Boosted Voting Scheme on ClassificationChien-Hsing Chen, Chung-Chian Hsu. 573-577 [doi]
- An Actor-Based Video Segmentation System Using Visual and Audio Information in E-LearningYi-Chun Liao, Ming-Hong Syu. 575-580 [doi]
- The Novel Fuzzy Sliding Mode Control of Synchronous Reluctance MotorChien-An Chen, Huann-Keng Chiang, Chih-Huang Tseng. 576-581 [doi]
- Context and Learning Based Approach to Programming of Intelligent EquipmentAndrey V. Gavrilov. 578-582 [doi]
- Prediction Filling Differences for Compress a Set of HDR ImagesJeanne Chen, Tung-Shou Chen, Ping-Feng Chen. 581-586 [doi]
- Immune System Assisted Radial Basis Function Network for OFDM System Channel Tracking in Dynamic EnvironmentsJingchen Liu, Xiaogang Zang, Xinbao Gong. 582-586 [doi]
- Research on Access Control Based on Certainty FactorRongyu He, Jianchun Yin, Chaowen Chang. 585-590 [doi]
- Building a Flexible Energy Management System with LonWorks Control NetworkChing-Biau Tzeng, Tzuu-Shaang Wey, Sheng-Hsiung Ma. 587-593 [doi]
- Rough Set Granularity in Mobile Web Pre-cachingSarina Sulaiman, Siti Mariyam Hj. Shamsuddin, Ajith Abraham, Shahida Sulaiman. 587-592 [doi]
- P2P Recommendation Trust ModelXuan Wang, Lei Wang. 591-595 [doi]
- The Innovation of Manufacturing Premise Based on Knowledge Obtained by Quality Accident ReportShujiro Murayama, Junko Shibata, Koji Okuhara, Hiroaki Ishii. 593-598 [doi]
- Efficient Scalable Distributed Video Coding Based on Residual SW-SPIHTAnhong Wang, Yao Zhao, Jeng-Shyang Pan. 594-597 [doi]
- Risk Dominance Strategy in Imperfect Information Multi-player GameXuan Wang, Jiajia Zhang, Xinxin Xu, Zhaoyang Xu. 596-601 [doi]
- Applying the Extended Classifier System to Trade Interest Rate Futures Based on Technical AnalysisAn-Pin Chen, Yu-Chia Hsu, Chien-Hua Huang, Ya-Chun Yang. 598-603 [doi]
- Categorizing Heartbeats by Independent Component Analysis and Support Vector MachinesKuan-To Chou, Sung-Nien Yu. 599-602 [doi]
- Video Content Authentication Technique Based on Invariant Feature Detection and Cloud WatermarkChang-yin Liang, Hao Wu, Ang Li. 602-607 [doi]
- Wavelet-Based Bispectra for Motor Rotor Fault DetectionD.-M. Yang. 603-607 [doi]
- A Moving Objects Detection Algorithm Based on Improved Background SubtractionLianqiang Niu, Nan Jiang. 604-607 [doi]
- One/T-Time Signatures Using Self-Certified Public KeysDai-Rui Lin, Chih-I Wang, D. J. Guan. 608-613 [doi]
- An Approach for Achieving Self-Optimization in Mechatronic Systems Supported by Active PatternsJürgen Gausemeier, O. Znamenshchykov, Simon Oberthür, Herbert Podlogar. 608-613 [doi]
- Untraceable Identity Management Framework for Mobile AccessMin-Chih Kao, Yi-Shiung Yeh, Chuan Chi Wang. 614-620 [doi]
- A Lossless Secret Image Sharing MethodHao-Kuan Tso, Der-Chyuan Lou, Kai-Ping Wang, Chiang-Lung Liu. 616-619 [doi]
- Intelligent Stock Selecting via Bayesian Naive Classifiers on the Hybrid Use of Scientific and Humane AttributesTien-Tsai Huang, Chir-Ho Chang. 617-621 [doi]
- Non-embedded Image Protection Approaches Based on Vector QuantizationCheng-Hsing Yang, Shu-Chien Huang, Cheng-Ta Huang, Shiuh-Jeng Wang. 620-625 [doi]
- An Efficient Heuristic for Minimizing Maximum Lateness on Parallel Batch MachinesTsung-Che Chiang, Hsueh-Chien Cheng, Li-Chen Fu. 621-627 [doi]
- The Neural Network Algorithm for Data-Mining in Dynamic EnvironmentsChing-Lien Huang, Tsung-Shin Hsu, Chih-Ming Liu. 622-625 [doi]
- Fuzzy Assessment for Sampling Survey Defuzzification by Signed Distance MethodLily Lin, Huey-Ming Lee. 626-630 [doi]
- The Technique of Information Hiding Based on Modification Function and LSB MatchingTzu-Chuen Lu, Li-Ling Hsu. 626-631 [doi]
- A Comparison between a KNN Based Approach and a PNN Algorithm for a Multi-label Classification ProblemElias Oliveira, Patrick Marques Ciarelli, Claudine Badue, Alberto Ferreira de Souza. 628-633 [doi]
- Neural Network for Routing in a Directed and Weighted GraphMehran Ghaziasgar, Armin Tavakoli Naeini. 631-636 [doi]
- Lossless Data Hiding for Color ImagesChing-Hui Huang, Chih-Chiang Lee, Hsien-Chu Wu, Chung-Ming Wang. 632-637 [doi]
- Human Action Retrieval via Spatio-temporal CuboidsQingshan Luo, Guihua Zeng. 634-637 [doi]
- Petri Net Based Synthesis Method to Construct Optimal Controllers and Its Application to a Jobshop SchedulingEun-Joo Lee, In-Jae Jeong, Jeehyoung Lee. 637-642 [doi]
- An Improved PSO with Time-Varying Accelerator CoefficientsZhihua Cui, Jianchao Zeng, Yufeng Yin. 638-643 [doi]
- A Novel Shape-Texture Approach to Palmprint Detection and IdentificationMichal Choras, Rafal Kozik, Aleksandra Zelek. 638-643 [doi]
- Reactive Planning with Weak Plan InstancesFrantisek Zboril Jr., VladimÃr Janousek, Radek KocÃ, Zdenek Mazal. 643-648 [doi]
- A Novel Image Annotation Scheme Based on Neural NetworkYufeng Zhao, Yao Zhao, Zhenfeng Zhu, Jeng-Shyang Pan. 644-647 [doi]
- A Novel Fitness Function in Genetic Algorithms to Optimize Neural Networks for Imbalanced Data SetsKuan-Chieh Huang, Yau-Hwang Kuo, I-Cheng Yeh. 647-650 [doi]
- Database-Driven Disease Prevention by Daily Menu Management and Physical ConditionEri Domoto, Koji Okuhara, Hiroaki Ishii. 648-651 [doi]
- The Design of a Quality Control System of PCB with SMT Based on RFID and AOIShih-Che Lo, Bei-Ming Li. 649-653 [doi]
- An Efficient Data Retrieval Indexing Structure for Wireless Broadcasting SystemLien-Fa Lin, Chao-Chun Chen. 651-656 [doi]
- Towards a Suitable Reconciliation of the Findings in Collaborative Fuzzy ClusteringRafael Falc, Benoît Depaire, Koen Vanhoof, Ajith Abraham. 652-657 [doi]
- Architecture Centric Approach to Enhance Software Testing ManagementFu-Shiau Li, Wei-Ming Ma, Architect Chao. 654-659 [doi]
- An Intelligent Monitoring System for Local-Area Network TrafficMing-Han Wan, Mong-Fong Horng. 657-660 [doi]
- A Real Time Spatial/Temporal/Motion Integrated Surveillance System in Compressed DomainChen-Chiung Hsieh, Wei-Ru Lai, Albert Chiang. 658-665 [doi]
- Fault Diagnosis of Generator Based on D-S Evidence TheoryQingdong Du, Jin Li, Xiao Chen. 660-663 [doi]
- Mobile Robot Path Planning Base on the Hybrid Genetic Algorithm in Unknown EnvironmentYong Zhang, Lin Zhang, Xiaohua Zhang. 661-665 [doi]
- FCM-Based RBF Network in Identifying Concrete Slab Surface CracksYoung Woon Woo, Doo Heon Song, Kwang-Baek Kim. 664-669 [doi]
- Constructing Intelligent Living Space Controlling System with Bluetooth and Speech-Recognition MicroprocessorChun-Liang Hsu, Sheng-Yuan Yang. 666-671 [doi]
- Research on the Architecture of Policy-Based Satellite Network ManagementWen-bo Zhang, Ye Xu, Yue-qiu Jiang. 672-676 [doi]
- Knowledge Management on Concept Structure Analysis with Weighted Polytomous Ordering Theory and Cluster AnalysisYuan-Horng Lin, Shin-Yu Chang, Sen-chi Yu. 677-681 [doi]
- State Estimation of ALV Integrated Navigation System Based on BP Neural NetworkMeiling Wang, Yongwei Fu. 682-686 [doi]
- Classifier Fusion Based on Weighted Voting - Analytical and Experimental ResultsMichal Wozniak. 687-692 [doi]
- A Fuzzy Neural Network Based on Particle Swarm Optimization Applied in the Speech Recognition SystemXueying Zhang, Ying Sun, Xiaomei Zhang, Peng Wang. 693-697 [doi]