Abstract is missing.
- Stereo Matching with Semi-limited Belief PropagationChengzhi Luo, Jianjun Lei, Guanglong Hu, Kefeng Fan, Shupo Bu. 1-4 [doi]
- A Testing Method for the Image Crosstalk of Stereoscopic TelevisionKefeng Fan, Jianjun Lei, Guanglong Hu, Shupo Bu. 5-8 [doi]
- Advance on Trust Model and Evaluation Method in Social NetworksLijun Yang, Zhiyong Zhang, Weili Tian, Qingli Chen. 9-14 [doi]
- Application of Belief Learning Model Based Socio-rational Secret Sharing Scheme on Cloud StorageTao Zheng, Haitong Wu, Hao Wen Lin, Jeng-Shyang Pan. 15-18 [doi]
- Target-Preserving Content-Aware Image ResizingCheng-Hung Chuang, Zhong-Yan Shi. 19-22 [doi]
- Improved Reversible Data Hiding Based on Residue Histogram ShiftingWen-Chuan Wu, Yu-Chieh Wu. 23-26 [doi]
- Joint Fingerprinting and Decryption for VQ Images through Bipartite MatchingPanyaporn Prangjarote, Chih-Yang Lin, Li-Wei Kang, Chia-Hung Yeh. 27-30 [doi]
- Analyze the Digital Watermarking Security Demands for the Facebook WebsiteWei-Fan Hsieh, Pei-Yu Lin. 31-34 [doi]
- Extraction and Analysis of Structural Features of Lateral Ventricle in Brain Medical ImagesHui-Fuang Ng, Cheng-Hung Chuang, Chih-Hsueh Hsu. 35-38 [doi]
- An Image Hiding Method by Linking Multiple Pixels with XOR OperatorChiao-Chih Huang, Yi-Hui Chen, Yuan-Yu Tsai, Chi-Shiang Chan. 39-42 [doi]
- Directional Discriminant Analysis for Image Feature ExtractionDong Zou, Li-Yan Zhao. 43-46 [doi]
- An Information Hiding Method Based on Grouping Color Palette Indices by K-means Clustering and Similar PairsChyuan-Huei Thomas Yang, Yu Wei Hsu, Che-Lun Chun. 47-50 [doi]
- The Study of Automate Locate Special Fiducial MarksYu-Ching Lin, Yu-Ying Chiu, Hau-Wei Lee, Bo-Yan Jhan, Chuen-Horng Lin. 51-54 [doi]
- Enhancement of Dynamic ID Based User Authentication for Multi-server EnvironmentHui-Feng Huang, Pin-Han Lin. 55-58 [doi]
- Comments on a Dynamic-ID-Based Remote User Authentication Scheme for Multi-server Environment Using Smart CardsYa-Fen Chang, Pei-Yu Chang. 59-62 [doi]
- An Efficient and Flexible Mobile Payment ProtocolChin-Chen Chang, Jen-Ho Yang, Kai-Jie Chang. 63-66 [doi]
- Payment Status and Service Level Agreement Based Access Control Method in Cloud Service BusinessChi-Lun Liu. 67-70 [doi]
- A Security Flaw of a Bilinear-Pairing-Based Electronic Cash Scheme with Trustee-Based Anonymity RevocationYuan-Fu Li, Ya-Fen Chang. 71-74 [doi]
- The Case Study of Adaptive Network-Based Fuzzy Inference System Modeling for TAIEX PredictionMin-Hsuan Fan, Mu-Yen Chen, Hui-Feng Huang, Tai-Ying Huang. 75-78 [doi]
- An Improvement to Lee and Hwang's SchemeShao-Fan Tseng, Chao-Wen Chan. 79-81 [doi]
- Analysis to Wen and Li's SchemeChun-Hong Lin, Chao-Wen Chan. 82-86 [doi]
- On Decoding of Binary Cyclic Codes up to Error-Correcting Capacity FiveTsung-Ching Lin, Pei-Yu Shih, Wen-Ku Su, Trieu-Kien Truong. 87-90 [doi]
- Semantic Clustering-Based Community Detection in an Evolving Social NetworkHsun-Hui Huang, Horng-Chang Yang. 91-94 [doi]
- The Relevant Research of Mobile Learning Mode and Information Ability Indicator in Countrified AreaTzong-Song Wang. 95-98 [doi]
- Design of Document Access Control Mechanism on Cloud ServicesChun-Wei Tseng, Feng-Jung Liu, Shih Hao Huang. 99-102 [doi]
- An Efficient Packet Forwarding Mechanism Based on Bandwidth Prediction with Consideration of V2I and V2V CommunicationsWei Kuang Lai, Mei-Tso Lin, Yuh-Chung Lin, Ya-Lin Jhuang. 103-106 [doi]
- An Novel Scheduling Algorithm for Video Stream in LTEYuh-Chung Lin, Wei Kuang Lai, Kai-Ting Yang, Mei-Tso Lin. 107-110 [doi]
- Cooperative Transmission Scheme in Metropolitan EnvironmentKai-Ting Yang, Wei Kuang Lai, Chen-Da Tsai, Chuan-Wang Chang. 111-114 [doi]
- Improving Harmony Search by Zipf DistributionShih-Pang Tseng, Wuu-Wen Lin. 115-118 [doi]
- Access Point Design with a Genetic AlgorithmMarco Antonio S. Barbosa, Maury Meirelles Gouvea Jr.. 119-123 [doi]
- Seasonal Support Vector Regression with Chaotic Genetic Algorithm in Electric Load ForecastingWei-Chiang Hong, Yucheng Dong, Li-Yueh Chen, Shih-Yung Wei. 124-127 [doi]
- Two-Stage Multi-objective Unit Commitment Optimization under Future Load UncertaintyBo Wang, You Li, Junzo Watada. 128-131 [doi]
- Improving Expert Knowledge in Dynamic Process Monitoring by Symbolic RegressionIngo Schwab, Melanie Senn, Norbert Link. 132-135 [doi]
- Gene Expression Programming-Fuzzy Logic Method for Crop Type ClassificationS. N. Omkar, Nikhil Ramaswamy, J. Senthilnath, S. Bharath, N. S. Anuradha. 136-139 [doi]
- A Peer-Peer Particle Swarm OptimizerHrishikesh Dewan, V. Susheela Devi. 140-144 [doi]
- Multiple Feature Selectoin for Pattern Recognition Using ID3 Ensemble SystemKoichiro Nakatsu, Hitoshi Furuta, Kyosuke Takahashi, Ken Ishibashi, Shigeki Yasuda. 145-148 [doi]
- An Efficient Fragile Watermarking Scheme for Pixel-Wise Tamper DetectionYang-Kuo Lee, Jen-Chun Chang, Hsin-Lung Wu, Rong-Jaye Chen. 149-152 [doi]
- A Reversible Data Hiding Scheme Using Cartesian Product for HTML FileYung-Chen Chou, Chun-Yi Huang, Hsin-Chi Liao. 153-156 [doi]
- A Reversible Data Hiding Scheme for Block Truncation Compressions Based on Histogram ModificationChia-Chen Lin, Xiao-Long Liu. 157-160 [doi]
- Two Phased Decompression Scheme for Quality Improvement of Vector Quantized ImagesJinn-ke Jan, Jau-Ji Shen, Chun-Hsiu Yeh. 161-164 [doi]
- A Cloud-User Access Control Mechanism Based on Data MaskingTing-Kuang Wu, Yung-Wang Lin, Iuon-Chang Lin. 165-168 [doi]
- A High Capacity Reversible Data Hiding Scheme Based on SMVQChia-Chen Lin, Xue-Bai Zhang. 169-172 [doi]
- A Robust Information Hiding Scheme with Range Coding on Color-ImageYung-Chen Chou, Chih-Chao Wang, Jau-Ji Shen. 173-176 [doi]
- Design of an Augmented Reality Application Framework to Mobile DeviceYong-Yi Fanjiang, Shih-Chieh Lin, Yu-Zuo Lin. 177-179 [doi]
- A Model-Based Testing Tool for Embedded SoftwareChien-Hung Liu, Shu-Ling Chen, Tien-Chi Huang. 180-183 [doi]
- A Cloud Service Design for Quality Evaluation of Design PatternsNien-Lin Hsueh, Ju-Yun Wang, Der-Hong Ting. 184-187 [doi]
- The Study of Plagiarism Detection for Object-Oriented ProgrammingJong-Yih Kuo, Fu-Chu Huang, Chien Hung, Liu Hong Zhan Yang. 188-191 [doi]
- Applying Software Effort Estimation Model Based on Work Breakdown StructureWen-Tin Lee, Kuo-Hsun Hsu, Jonathan Lee, Jong-Yih Kuo. 192-195 [doi]
- An Intelligent Data Fusion Algorithm with Fusion Benefit Pattern Tree for Wireless Sensor NetworksChien-Chang Hsu, Wei-Yi Wang. 196-199 [doi]
- Position Correction on Consumer-Grade GPS Using Genetic ProgrammingJung-Yi Lin, Ming-Chih Tung, Chia-Hui Chang, Chao-Chung Liu, Ju Fu Peng. 200-203 [doi]
- PSO and APSO Evolutionary Computing in Indoor Wireless CommunicationChien-Hung Chen, Min-Hui Ho, Chien-Ching Chiu, Shu-Han Liao. 204-206 [doi]
- A Wireless Sensor Network Topology Design Method Based on Negotiable Evolutionary AlgorithmHao Wen Lin, Li Zhang, Xinchang Hao, Tomohiro Murata. 207-210 [doi]
- The Application of Bioimpedance Method for Foot Sole Blood Perfusion CharacterizationKuo-Sheng Cheng, Yen-Fen Ko, Ting Wang. 211-213 [doi]
- Fractal Dimension Characteristic Analysis for Dose Verification in Intensity Modulation Radiation TherapyJia-Ming Wu, Tsair-Fwu Lee, Ching-Jiang Chen, Chung Ming Kuo, Shyh-An Yeh. 214-218 [doi]
- Using Kalman Filter with Morphological Image Operation Tracking a Moving Target in RadiotherapyJen-Hong Lan, Luke K. Wang, Ssu-Wei Chen, Shih-Yao Lin, Tsair-Fwu Lee. 219-222 [doi]
- Analysis of Vibroarthrographic Signals for Knee Osteoarthritis DiagnosisTsair-Fwu Lee, Wei-Chun Lin, Li-Fu Wu, Hung-Yu Wang. 223-228 [doi]
- Evaluation of the Opposition Ability for Hand Intrinsic Damage Using a Simple Self-Constructing ElectromyographyChi-Heng Lu, Tsair-Fwu Lee, Szi-Wen Chen, Shih-Yao Lin, Chiu-Ching Tuan. 229-232 [doi]
- Symbolic Small-Signal Analysis of Various AmplifiersHung-Yu Wang, Tsair-Fwu Lee, Cing-Wen Yang, Edward Soto, Wei-Chun Lin, Shun-Hsyung Chang. 233-236 [doi]
- Medical Image Diagnosis of Liver Cancer by Revised GMDH-type Neural Network Using Feedback Loop CalculationTadashi Kondo, Junji Ueno, Shoichiro Takao. 237-240 [doi]
- Classification of Leukemia Gene Expression Data Using Particle Swarm OptimizationYajie Liu, Xinling Shi, Zhenzhou An. 241-244 [doi]
- Novel Detection of Image Forgery for Exchanged Foreground and Background Using Image Watermarking Based on Alpha MatteWu-Chih Hu, Wei-Hao Chen, Deng-Yuan Huang, Ching-Yu Yang. 245-248 [doi]
- Application of Support Vector Machine for Emotion ClassificationChuan-Yu Chang, Chuan-Wang Chang, Yu-Meng Lin. 249-252 [doi]
- Path Planning Based on Bezier Curve for Robot SwarmsChien-Chou Lin, Wei-Ju Chuang, Yan-Deng Liao. 253-256 [doi]
- Reducing the Cost of Regression Testing by Identifying Irreplaceable Test CasesChu-Ti Lin, Kai-Wei Tang, Cheng-Ding Chen, Gregory M. Kapfhammer. 257-260 [doi]
- A Fast Algorithm of the Discrete Cosine Transform for the Fermat Prime-LengthTsung-Ching Lin, Wen-Ku Su, Pei-Yu Shih, Trieu-Kien Truong. 261-264 [doi]
- Modified 2-D Cepstrum Using Soft-ComputingHimanshu Chaurasiya. 265-269 [doi]
- Printable Optical Logic Gates with CIELAB Color Coding System for Boolean Operation-Mediated Handling of ColorsTomonori Kawano. 270-275 [doi]
- Generalized Structural Holes Finding Algorithm by Bisection in Social CommunitiesEnde Zhang, Guoren Wang, Kening Gao, Xiangguo Zhao, Yu Zhang. 276-279 [doi]
- A Four-Party Password-Based Authentication Key Exchange ProtocolXiumei Liu, Junjiang Liu, Guiran Chang. 280-283 [doi]
- Scalable Influence Maximization in Social Networks Using the Community Discovery AlgorithmJinshuang Li, Yangyang Yu. 284-287 [doi]
- A Lightweight Group-Key Management Protocol for Ad Hoc NetworksChangsheng Miao, Fengling Cao, Dong Chen, Guiran Chang. 288-291 [doi]
- Exploring Learning Effectiveness through Windows Live Social Network for Elementary SchoolYuh-Ming Cheng. 292-295 [doi]
- A Smartphone-Based Chinese DAISY Digital Talking Book Player for Visually ImpairedYuan-Hsiang Lin, Yuan-Chang Hsu, Yuan-Ya Kao. 296-299 [doi]
- An Energy Efficient Binarization Algorithm Based on 2-D Intelligent Block Detection for Complex Texture and Gradient Color ImagesChia-Shaud Hong, Yen-Hsiang Chen, Shanq-Jang Ruan. 300-303 [doi]
- Ability of Density Feature in Low-Dose Computed Tomography for Evaluating Screened Lung TumorWei-Chih Shen, Yang-Hao Yu, Shwn-Huey Shieh, Guan-Chin Tseng, Wu-Huei Hsu, Chih-Yi Chen. 304-307 [doi]
- Mutation in Compressed Encoding in Estimation of Distribution AlgorithmOrawan Watchanupaporn, Worasait Suwannik, Prabhas Chongstitvatana. 308-311 [doi]
- Analysis of Evolution Mechanism for Multi-agent Optimization MethodKoichiro Nakatsu, Hitoshi Furuta, Kyosuke Takahashi, Ken Ishibashi, Masahiro Uchida. 312-315 [doi]
- Examining the Performance of Evolutionary Many-Objective Optimization Algorithms on a Real-World ApplicationKaname Narukawa, Tobias Rodemann. 316-319 [doi]
- Stock Index Forecasting for Vietnam's Stock MarketJuifang Chang, Son Van Duong. 320-323 [doi]
- MASP: A Multi-attribute Secretary Problem Approach to Multi-objective Optimization with Fair Decision MakerMario Köppen, Rodrigo Verschae, Masato Tsuru. 324-327 [doi]
- A Novel Diversity Induction Method for Bacterial Memetic Algorithm by Hibernation of IndividualsJĂ¡nos Botzheim. 328-331 [doi]
- Image Restoration for Linear Local Motion-Blur Based on CepstrumChao-Ho Chen, Zhang Rui, Kuo-Kun Tseng, Jeng-Shyang Pan. 332-335 [doi]
- An Efficient Hole-Filling Approach Using Adaptive RenderingChao-Ho Chen, Chun-Yi Sung, Tsong-Yi Chen, Bo-Ting Guo, Chin-Hsing Chen. 336-339 [doi]
- Semi-automatic Depth Map Extraction Method for Stereo Video ConversionTsung-Han Tsai, Chen-Shuo Fan, Chih-Chi Huang. 340-343 [doi]
- An Improved Method of Constructing a Data Aggregation Tree in Wireless Sensor NetworksBing-Hong Liu, Ying-Hong Jhuang, Li-Ping Tung, Jyun-Yu Jhang. 344-347 [doi]
- An Efficient Image Dehazing MethodChih-Yuan Lien, Fu-Jhong Yang, Chien-Chuan Huang. 348-351 [doi]
- High Dynamic Range Image Rendering with Order-Statistics FilterYeu-Horng Shiau, Hung-Yu Yang, Pei-Yin Chen, Chien-Chuan Huang. 352-355 [doi]
- A Low-Complexity Scaling Scheme for Barrel Distortion CorrectionChien-Chuan Huang, Pei-Yin Chen, Chih-Yuan Lien, Hung-Yu Yang. 356-359 [doi]
- A System Architecture of Widget-Based Digital TV Interactive PlatformKefeng Fan, Shijun Tang, Yun Liu, Subing Zhang, Yong Wang, Zhuoyan Xu. 360-363 [doi]
- Dominant Points Based Hand Finger Counting for Recognition under Skin Color Extraction in Hand Gesture Control SystemZhenyu Meng, Jeng-Shyang Pan, Kuo-Kun Tseng, Weimin Zheng. 364-367 [doi]
- Optical Verification System Based on a Correlator Using Image Manipulations as LocksHsuan T. Chang, Chien-Yi Lu, Mn-Ta Lee, Mu-Liang Wang. 368-371 [doi]
- Robust Audio Watermarking Based on MDCT CoefficientsMu-Liang Wang, Hong-Xun Lin, Mn-Ta Lee. 372-375 [doi]
- A Moving Object Detection Algorithm for Vehicle LocalizationChieh-Ling Huang, Heng-Ning Ma. 376-379 [doi]
- Using Incremental Addition to Evaluate the Grouping Quality of Document ClassificationYi-Jen Su, Chuan-Wang Chang, Jian-Cheng Wun, Wei-Lin Hsu, Yue-Qun Chen. 380-383 [doi]
- Card Fraud Detection by Inductive Learning and Evolutionary AlgorithmLiang Lei. 384-388 [doi]
- Exploring Humanity-Oriented Content Producing Process in Providing Valuable E-learning ApplicationsJiann-Gwo Doong. 389-392 [doi]
- A Fuzzy Support Vector Machine with Qualitative Regression PresetYicheng Wei, Junzo Watada, Witold Pedrycz. 393-399 [doi]
- Comparative Study on Fitness Landscape Approximation with Fourier TransformPei Yan, Hideyuki Takagi. 400-403 [doi]
- Stochastic Global Optimization Method for Solving Constrained Engineering Design Optimization ProblemsJui-Yu Wu. 404-408 [doi]
- Pure and Hybrid Optimizers Applicable to Large-Scale Design ProblemKazuhisa Chiba. 409-412 [doi]
- A Hierarchical Approach for Clustering and Pattern Matching of Gene Expression DataSoriful Hoque, Salim Istyaq, Md. Mushir Riaz. 413-416 [doi]
- Application of Sensitivity Analysis for an Improved Representation in Evolutionary Design OptimizationLars Gräning, Stefan Menzel, Thomas Ramsay, Bernhard Sendhoff. 417-420 [doi]
- Design and Simulation of a Ku-band MMIC Power AmplifierChen Li, Zheng-Liang Huang, Wei Chen, Yong-Heng Shang, Fa-Xin Yu. 421-424 [doi]
- Applying Feature Selection Combination-Based Rough Set Classifiers to Forecast Credit Rating StatusYou-Shyang Chen, Ching-Hsue Cheng, Da-Ren Chen, Wei-Yu Chen. 425-428 [doi]
- An Expandable Genetic Cell System for Solving Global Optimization Problem on Continuous Multimodal FunctionsTing-Hua Chang. 429-432 [doi]
- A Memetic Algorithm with Random Key Crossover and Modified Neighborhood Search for the Solution of Capacitated Arc Routing ProblemsMin Liu, Tapabrata Ray. 433-436 [doi]
- Packing Unequal Disks in a Circular Container Using a Population Based AlgorithmWenqi Huang, Zhizhong Zeng, Ruchu Xu, Zhanghua Fu. 437-440 [doi]
- Feature Weighting for Clustering by Particle Swarm OptimizationK. P. Swetha, V. Susheela Devi. 441-444 [doi]
- Differential Evolution with Graph-Based Speciation by Competitive Hebbian RulesTetsuyuki Takahama, Setsuko Sakai. 445-448 [doi]
- Design of Fuzzy Quality Control Charts for Attributes Based on Triangular Fuzzy NumbersTien-Tsai Huang, Liang-Ho Chen, Yen-Wen Wang, Yi-Syuan Su. 449-452 [doi]
- A New Approach for Solving Linear Bilevel Programming Using Differential EvolutionKejia Pan, Yan Yang, Jianli Liu. 453-456 [doi]
- An Intelligent Hand Gesture Extraction and Recognition System for Home Care ApplicationWen-Pinn Fang. 457-459 [doi]
- An Efficient Data Gathering System for Home Medical TreatmentJen-Chu Liu, Kuo-Yu Chuang, Yi-Lun Wen. 460-463 [doi]
- Verifiable Visual CryptographyShuo-Fang Hsu, Yu-Jie Chang, Ran-Zan Wang, Yeuan-Kuen Lee, Shih-Yu Huang. 464-467 [doi]
- Image Hiding by LSB Matching of Higher PayloadShang-Kuan Chen, Ja-Chen Lin. 468-471 [doi]
- Evolvable Hardware Image Filters with Discriminations of Noise PatternsChih-Hung Wu, Chien-Jung Chen, Wei-Chih Yeh. 472-475 [doi]
- Image Watermarking Scheme Using Genetic AlgorithmChih-Chin Lai, Chih-Hsiang Yeh, Chung-Hung Ko, Chin-Yuan Chiang. 476-479 [doi]
- A Robust Texture-Based Background Subtraction Algorithm for Moving Object Detection in Video SequencesChen-Sen Ouyang, Ping-Wei Chen. 480-483 [doi]
- Robust Image Watermarking Based on Coevolutionary Genetic AlgorithmYueh-Hong Chen, Hsiang-Cheh Huang. 484-487 [doi]
- An Empirical Study on Fuzzy Image Clustering with Various Clustering Validity IndexesChih-Hung Wu, Li-Wen Chen, Li-Wei Lu. 488-491 [doi]
- Vision-Based Coordinate Transformation with Back Propagation Neural Networks on Mobile RobotsChiung-Hui Tsai, Chih-Hung Wu, You-Dong Huang. 492-495 [doi]
- Vision-Based Human Following and Obstacle Avoidance for an Autonomous Robot in IntersectionsJau-Woei Perng, Cheng-Kang Chuang. 496-499 [doi]
- A PSO-based Algorithm with Subswarm Using Entropy and Uniformity for Image SegmentationJzau-Sheng Lin, Shou-Hung Wu. 500-504 [doi]
- Self-Checking Gaussian Normal Basis Multiplier over GF(2m) Using Multiplexer ApproachChe Wun Chiou, Jim-Min Lin, Hung Wei Chang, Wen-Yew Liang, Jenq-Haur Wang, Yun-Chi Yeh. 505-508 [doi]
- Super Digit-Serial Systolic Multiplier over GF(2^m)Chiou-Yng Lee. 509-513 [doi]
- Development and Validation on Integrated Dynamic Security Monitoring PlatformMing-Zhi Wu, Wei-Tsong Lee, Ren-Ji Liao, George Chang. 514-517 [doi]
- SSTreasury+: A Secure and Elastic Cloud Data Encryption SystemKuan-Ying Huang, Guo-Heng Luo, Shyan-Ming Yuan. 518-521 [doi]
- A P2P Auto-Recover Method for the Factory Data of Cable Modem over the HFC NetworkYu-Liang Chen, Guo-Heng Luo, Yi-Ming Chang, Shyan-Ming Yuan. 522-525 [doi]
- Application of Social Harmony Search Algorithm on Composite Web Service Selection Based on Quality AttributesPegah Majlesi Esfahani, Jafar Habibi, Touraj Varaee. 526-529 [doi]
- A Hybrid Congestion Control for TCP over High Speed NetworksYi-Cheng Chan, Hon-Jie Lee. 530-533 [doi]
- A Dynamic Routing Scheme to Support Reliable TCP Connections on Wireless Mesh NetworksMong-Fong Horng, Bo-Chao Chang, Pei-Yin Chen, Chin-Shiuh Shieh, Bin-Yih Liao. 534-537 [doi]
- Development of Context Awareness Learning System for Elementary Chinese Language LearningDavid Tawei Ku, Chia-Chi Chang. 538-541 [doi]
- The Optimal Deployment of Wi-Fi Wireless Access Points Using the Genetic AlgorithmChen-Shu Wang, Li-Fang Kao. 542-545 [doi]
- Base Station Deployment with Capacity and Coverage in WCDMA Systems Using Genetic Algorithm at Different HeightChen-Shu Wang, Yi-Dung Chen. 546-549 [doi]
- Activities and Event-Driven-Based Role EngineeringMei-Yu Wu. 550-553 [doi]
- An Adaptive E-service for Bridging the Cloud ServicesChih-Kun Ke, Shih-Fang Chang, Zheng-Hua Lin. 554-557 [doi]
- Network-Enabled Knowledge Discovery Service Design - Medical Online TextsWei-Feng Tung, Wen-Kai Liu. 558-561 [doi]
- A Study of Taiwan Political Elections and Stock Market DynamismDeng-Yiv Chiu, Ming-Hsiung Ying, Ping-Chung Yu. 562-565 [doi]
- Combining Fuzzy AHP and Association Rule to Evaluate the Activity Processes of E-learning SystemChen-Shu Wang, Shiang-Lin Lin. 566-570 [doi]
- Handover Strategy in HIP-based LTE Femtocells Networks with Hybrid Access ModeShih-Jung Wu. 571-576 [doi]
- Enhancing Sales Forecasting by Using Neuro Networks and the Popularity of Magazine Article TitlesHani A. Omar, Duen-Ren Liu. 577-580 [doi]
- A Double Blocking Dynamic Framed Slotted ALOHA Anti-collision Method for Mobile RFID SystemsChi-Chung Lee, Sheng-Yue Lin. 581-584 [doi]
- The Antecedents of Reflection in Online Learning Environments by Using a Social Network PerspectiveHsiu-Hua Cheng, Ju-Chun Lin. 585-588 [doi]
- Development of a Multiplayer Online Game-Based Learning System Based on ARCS Motivation ModelMing-Hsiung Ying, Kai-Ting Yang, Guang-Hong Deng. 589-594 [doi]