Abstract is missing.
- Forecast Models of Partial Differential Equations Using Polynomial NetworksLadislav Zjavka. 1-11 [doi]
- PSO-2S Optimization Algorithm for Brain MRI SegmentationAbbas El Dor, Julien Lepagnot, Amir Nakib, Patrick Siarry. 13-22 [doi]
- Task Scheduling in Grid Computing EnvironmentsYi-Syuan Jiang, Wei-Mei Chen. 23-32 [doi]
- A Swarm Random Walk Algorithm for Global Continuous OptimizationNajwa Altwaijry, Mohamed El-bachir Menai. 33-43 [doi]
- A Sampling-PSO-K-means Algorithm for Document ClusteringNadjet Kamel, Imane Ouchen, Karim Baali. 45-54 [doi]
- A New Algorithm for Data Clustering Based on Cuckoo Search OptimizationIshak Boushaki Saida, Kamel Nadjet, Bendjeghaba Omar. 55-64 [doi]
- Object Detection Using Scale Invariant Feature TransformThao Nguyen, Eun-Ae Park, Jiho Han, Dong-Chul Park, Soo-Young Min. 65-72 [doi]
- Nearest Feature Line and Extended Nearest Feature Line with Half FaceQingxiang Feng, Lijun Yan, Tien-Szu Pan, Jeng-Shyang Pan. 73-81 [doi]
- Studying Common Developmental Genomes in Hybrid and Symbiotic FormationsKonstantinos Antonakopoulos. 83-94 [doi]
- Routing and Wavelength Assignment in Optical Networks from Maximum Edge-Disjoint PathsChia-Chun Hsu, Hsun-Jung Cho, Shu-Cherng Fang. 95-103 [doi]
- Robust Self-organized Wireless Sensor Network: A Gene Regulatory Network Bio-Inspired ApproachNour El Mawass, Nada Chendeb Taher, Nazim Agoulmine. 105-114 [doi]
- Automated Test Data Generation for Coupling Based Integration Testing of Object Oriented Programs Using Particle Swarm Optimization (PSO)Shaukat Ali Khan, Aamer Nadeem. 115-124 [doi]
- Boosting Scheme for Detecting Region Duplication Forgery in Digital ImagesDeng-Yuan Huang, Ta-Wei Lin, Wu-Chih Hu, Chih-Hung Chou. 125-133 [doi]
- Robust Watermarking Scheme for Colour Images Using Radius-Weighted Mean Based on Integer Wavelet TransformChing-Yu Yang. 135-145 [doi]
- A Novel Data Hiding Method Using Sphere EncodingChing-Min Hu, Ran-Zan Wang, Shang-Kuan Chen, Wen-Pinn Fang, Yu-Jie Chang, Yeuan-Kuen Lee. 147-154 [doi]
- Non-expanding Friendly Visual CryptographyWen-Pinn Fang, Ran-Zan Wang, Shang-Kuan Chen. 155-161 [doi]
- An Embedded 3D Face Recognition System Using a Dual Prism and a CameraChuan-Yu Chang, Chuan-Wang Chang, Min-Chien Chang. 163-173 [doi]
- Robust Watermarking for Multiple Images and Users Based on Visual CryptographySheng-Shiang Chang, Chih-Hung Lin, Tzung-Her Chen, Kai-Siang Lin. 175-182 [doi]
- A Tailor-Made Encryption Scheme for High-Dynamic Range ImagesKai-Siang Lin, Tzung-Her Chen, Chih-Hung Lin, Sheng-Shiang Chang. 183-192 [doi]
- NBA All-Star Prediction Using Twitter Sentiment AnalysisYi-Jen Su, Yue-Qun Chen. 193-201 [doi]
- Information Hiding Based on Binary Encoding Methods and Crossover Mechanism of Genetic AlgorithmsKuang Tsan Lin, Pei Hua Lin. 203-212 [doi]
- A Modified Method for Constructing Minimum Size Homogeneous Wireless Sensor Networks with Relay Nodes to Fully Cover Critical Square GridsBing-Hong Liu, Yue-Xian Lin, Wei-Sheng Wang, Chih-Yuan Lien. 213-220 [doi]
- Relative Location Estimation over Wireless Sensor Networks with Principal Component Analysis TechniqueShao-I Chu, Chih-Yuan Lien, Wei-Cheng Lin, Yu-Jung Huang, Chung-Long Pan, Po-Ying Chen. 221-230 [doi]
- Hierarchical Particle Swarm Optimization Algorithm of IPSVR ProblemShang-Kuan Chen, Gen-Han Wu, Yen-Wu Ti, Ran-Zan Wang, Wen-Pinn Fang, Chian-Jhu Lu. 231-238 [doi]
- An Approach to Mobile Multimedia Digital Rights Management Based on AndroidZhen Wang, Zhiyong Zhang, Yanan Chang, Meiyu Xu. 239-246 [doi]
- A Path-Combination Based Routing Scheme for Cognitive Radio NetworksZi Li, Hongyang Zhao, Qingqi Pei. 247-256 [doi]
- Digital Rights Management and Access Control in Multimedia Social NetworksEnqiang Liu, Zengliang Liu, Fei Shao. 257-266 [doi]
- Modeling of Human Saccadic Scanpaths Based on Visual SaliencyLijuan Duan, Haitao Qiao, Chunpeng Wu, Zhen Yang, Wei Ma. 267-274 [doi]
- A Social Network Information Propagation Model Considering Different Types of Social RelationshipsChangwei Zhao, Zhiyong Zhang, Hanman Li, Shiyang Zhao. 275-282 [doi]
- A Dynamic Intrusion Detection Mechanism Based on Smart Agents in Distributed Cognitive Radio NetworksLichuan Ma, Ying Min, Qingqi Pei. 283-290 [doi]
- Bio-inspired Visual Attention Model and Saliency Guided Object SegmentationLijuan Duan, Jili Gu, Zhen Yang, Jun Miao, Wei Ma, Chunpeng Wu. 291-298 [doi]
- Tumor Cell Image Recognition Based on PCA and Two-Level SOFMLan Gan, Chunmei He, Lijuan Xie, Wenya Lv. 299-306 [doi]
- Face Recognition Based on Representation with Reject OptionMin Wang, Yuyao Wang, Jinrong Cui, Shu Liu, Yuan Tian. 307-312 [doi]
- The Fusion of SRC and SRRC AlgorithmsKe Yan, Jian Cao. 313-321 [doi]
- Posterior Probability Based Multi-classifier Fusion in Pedestrian DetectionJialu Zhao, Yan Chen, Xuanyi Zhuang, Yong Xu. 323-329 [doi]
- Quantification-Based Ant Colony System for TSPMing Zhao, Jeng-Shyang Pan, Chun-Wei Lin, Lijun Yan. 331-339 [doi]
- Directional Discriminant Analysis for Image Feature ExtractionLijun Yan, Jeng-Shyang Pan, Xiaorui Zhu. 341-348 [doi]
- Novel Matrix Based Feature Extraction Method for Face Recognition Using Gaborface FeaturesQi Zhu, Yong Xu, Yuwu Lu, Jiajun Wen, Zizhu Fan, Zhengming Li. 349-357 [doi]
- Hybrid Digit-Serial Multiplier for Shifted Polynomial Basis of GF(2 m )Chiou-Yng Lee, Wen-Yo Lee, Che Wun Chiou, Jeng-Shyang Pan, Cheng-Huai Ni. 359-368 [doi]
- Pipeline Design of Bit-Parallel Gaussian Normal Basis Multiplier over GF(2m)Che Wun Chiou, Jim-Min Lin, Yu-Ku Li, Chiou-Yng Lee, Tai-Pao Chuang, Yun-Chi Yeh. 369-377 [doi]
- Symbolic Analysis Using Floating Pathological ElementsHung-Yu Wang, Shung-Hyung Chang, Nan-Hui Chiang, Quoc-Minh Nguyen. 379-387 [doi]
- Vehicle Driving Video Sharing and Search Framework Based on GPS DataChuan-Yen Chiang, Shyan-Ming Yuan, Shian-Bo Yang, Guo-Heng Luo, Yen-Lin Chen. 389-397 [doi]
- Personalized Cloud Storage System: A Combination of LDAP Distributed File SystemChen-Ting Hsu, Guo-Heng Luo, Shyan-Ming Yuan. 399-408 [doi]