Abstract is missing.
- Artificial Bee Colony Using Opposition-Based LearningJia Zhao, Li Lü, Hui Sun. 3-10 [doi]
- Theorem of Existence and Uniqueness of Fixed Points of Monotone OperatorsHui Luan, Zhihong Xia. 11-17 [doi]
- Adaptive Sampling Detection Based Immune Optimization Approach and Its Application to Chance Constrained ProgrammingKai Yang, Zhuhong Zhang. 19-28 [doi]
- Characteristic Analysis and Management of Human Resource in EPC ProjectWenhai Luo, Yanfang Zhu, Tao Hong. 29-36 [doi]
- Hybrid Particle Swarm Optimization with Bat AlgorithmTien-Szu Pan, Thi-Kien Dao, Trong-The Nguyen, Shu-Chuan Chu. 37-47 [doi]
- Interaction Artificial Bee Colony Based Load Balance Method in Cloud ComputingJeng-Shyang Pan, Haibin Wang, Hongnan Zhao, Lin-Lin Tang. 49-57 [doi]
- Command Center Operation Miss Root Cause AnalysisXiaoLin Xiong, XinMing Xiang. 59-65 [doi]
- A New Cat Swarm Optimization with Adaptive Parameter ControlJianguo Wang. 69-78 [doi]
- Multi-objective Nondominated Sorting Invasive Weed Optimization Algorithm for the Permanent Magnet Brushless Direct Current Motor DesignSi-Ling Wang, Bao-wei Song, Gui-Lin Duan. 79-87 [doi]
- An Evolutionary Approach to Tower of Hanoi ProblemJie Li, Rui Shen. 89-98 [doi]
- Multipopulational Metaheuristic Approaches to Real-Parameter OptimizationVáclav Snásel, Pavel Krömer. 99-108 [doi]
- Evolved Bat Algorithm for Solving the Economic Load Dispatch ProblemThi-Kien Dao, Tien-Szu Pan, Trong-The Nguyen, Shu-Chuan Chu. 109-119 [doi]
- A Simple and Accurate Global Optimizer for Continuous Spaces OptimizationZhenyu Meng, Jeng-Shyang Pan. 121-129 [doi]
- Spatial Evolutionary Algorithm for Large-Scale Groundwater ManagementJihua Wang, Ximing Cai, Albert J. Valocchi. 131-142 [doi]
- Block-Based Colour Image Steganography Using Smart Pixel-AdjustmentChing-Yu Yang, Wen-Fong Wang. 145-154 [doi]
- A Sport Recognition Method with Utilizing Less Motion SensorsWen-Fong Wang, Ching-Yu Yang, Ji-Ting Guo. 155-167 [doi]
- Information Hiding Based on Binary Encoding Methods and Linear Transformation Scrambling TechniquesKuang Tsan Lin. 169-177 [doi]
- Dispersed Data Hiding Using Hamming Code with Recovery CapabilityBrian K. Lien, Shan-Kang Chen, Wei-Sheng Wang, Kuan-Pang King. 179-187 [doi]
- 16-Bit DICOM Medical Images Lossless Hiding Scheme Based on Edge Sensing Prediction MechanismTzu-Chuen Lu, Chun-Ya Tseng, Chun-Chih Huang, Kuang-Mao Deng. 189-196 [doi]
- A Quality Improving Scheme for VQ Decompressed Image Based on DCTYung-Chen Chou, Shu-Huan Chen, Min-Rui Hou. 197-206 [doi]
- Research of Image Enhancement Algorithm Based on Multi-scale RetinexXinhua Yang, Jianlong Yang. 207-215 [doi]
- The HRV Analysis on e-Book ReadingChien-Sheng Huang, Ching-Huang Lin, Chien-Yue Chen, Shao-Ciang Gan, Guan-Syuan Hong. 217-222 [doi]
- Modified Choice Function Heuristic Selection for the Multidimensional Knapsack ProblemJohn H. Drake, Ender Özcan, Edmund K. Burke. 225-234 [doi]
- A Distributed Computational Model of State of ConsciousnessSusmit Bagchi. 235-245 [doi]
- Rotation Invariant Texture Classification Using Principal Direction EstimationYulong Qiao, Ying Zhao. 247-256 [doi]
- An Improved Spatial Histogram and Particle Filter Face TrackingDingli Yang, Yulin Zhang, Rendong Ji, Yazhou Li, Liqun Huang-Fu, Yudong Yang. 257-267 [doi]
- Joint Encoding of Multi-scale LBP for Infrared Face RecognitionZhihua Xie, Zhengzi Wang. 269-276 [doi]
- Driving Behavior Analysis of Multiple Information Fusion Based on AdaBoostShi-Huang Chen, Jeng-Shyang Pan, Kaixuan Lu, Huarong Xu. 277-285 [doi]
- The Study and Application of IT Projects Management and Control Model for Enterprise GroupKe Li, Yongteng Wang. 287-297 [doi]
- A Data Hiding Method for Image RetargetingWen-Pinn Fang, Wen-Chi Peng, Yu-Jui Hu, Chun Li, Shang-Kuan Chen. 301-308 [doi]
- Rendering 3D Solid ModelCheng-Wei Huang, Ran-Zan Wang, Shang-Kuan Chen, Wen-Pinn Fang. 309-316 [doi]
- Greedy Active Contour Detection for Median Nerve on Strain Sonographic ImagesChii-Jen Chen, You-Wei Wang, Sheng-Fang Huang, Yi-Shiung Horng. 317-324 [doi]
- One Decomposition Method of Concept LatticeHaixia Li, Jian Ding, Dongming Nie, Linlin Tang. 325-333 [doi]
- The Evaluation Method for Enterprise Group Information Planning and Implementation Based on PDCA CycleWeixiong Chen, Lailong Zou, Juan Liu, Xiaochen Yang. 335-341 [doi]
- A New Look into Web Page Ranking SystemsThi Thi Zin, Pyke Tin, Hiromitsu Hama, Takashi Toriu. 343-351 [doi]
- Seismic Qualification of Telecommunication System in Nuclear Power PlantZhichun Li, Yong Zheng. 353-358 [doi]
- A Virtual Network Guard System Based on Cloud Computing EnvironmentsBing-Zhe He, Kuan-Ling Huang, Hung-Min Sun, Raylin Tso. 361-370 [doi]
- Towards SQL Injection Attacks Detection Mechanism Using Parse TreeTsu-Yang Wu, Jeng-Shyang Pan, Chien-Ming Chen, Chun-Wei Lin. 371-380 [doi]
- No-Reference Image Quality Assessment in Spatial DomainTao Sun, Xingjie Zhu, Jeng-Shyang Pan, Jiajun Wen, Fanqiang Meng. 381-388 [doi]
- MDPAS: Markov Decision Process Based Adaptive Security for Sensors in Internet of ThingsEric Ke Wang, Tsu-Yang Wu, Chien-Ming Chen, Yuming Ye, Zhujin Zhang, Futai Zou. 389-397 [doi]
- Accurate Recommendation Based on Opinion MiningXiu Li, Huimin Wang, Xinwei Yan. 399-408 [doi]
- Reliability Analysis on Parallel System with N Element Obeying Exponential DistributionLu-Xiong Xu, Chao-Fan Xie, Lin Xu. 409-418 [doi]
- The Research of Private Network Secure Interconnection Scheme in Large-Scaled EnterprisesHaijun Guo, Tao Tang, Di Wu. 419-426 [doi]