Abstract is missing.
- Fuzzy inductive learning: Principles and applications in data miningBernadette Bouchon-Meunier, Christophe Marsala. 1-4 [doi]
- Intelligent social network modeling and analysisRonald R. Yager. 5-6 [doi]
- Multi-granular representation-the key to machine intelligenceBo Zhang 0010, Ling Zhang 0001. 7 [doi]
- Learning and acting through sensorsQiang Yang 0001. 8 [doi]
- A "PARtially COnnected Neural Evolutionary" model serving as the basis for building China's first artificial brainHugo de Garis. 9-12 [doi]
- An improved algorithm for Dempster-Shafer theory of evidenceQing Ye, Xiaoping Wu, Dingjun Zhai. 13-18 [doi]
- Research on hiberarchy trusted network based on the grade divisionJian Wang 0003, Yanheng Liu, Jing Zhang, Jianqi Zhu, Tianzhe Dong. 19-25 [doi]
- Adaptive control based on Pattern Recognition and its applications in typical industrial processesYanqing Peng, Jian Luo, Jinfa Zhuang, Fan Yang 0010. 26-31 [doi]
- Problem Oriented Analysis and Decision Expert System with large capacity knowledge-baseWensheng Yin, Pinghui Tu, Xiuguo Chen, Hengxi Zhang. 32-37 [doi]
- A hybrid ant colony algorithm for the capacitated location-routing problemJitao Yan, Qiuwen Zhang, Wenshuai Zhang, Tong Zhen. 38-43 [doi]
- INLAB2: Fast native XML storage and query retrievalSu-Cheng Haw, Chien-Sing Lee. 44-49 [doi]
- Fast H.264 inter-prediction mode decision based on macroblock Inner ComplexityYin Luo, Yan Fu. 50-54 [doi]
- Degree-optimized LMPT topology control algorithm of wireless sensor networksHaoran Liu, Ming Zhai, Xiaochen Hao, Jingjing Dou, Bin Liu, Weihong Bi. 55-60 [doi]
- Coal face wireless sensor network physical layer design based on UWB technologyJinling Song, Gang Wang, Hongyan Liu. 61-65 [doi]
- A substation monitoring and warning system based on infrared technology and image separatingJian Liu, Lihua Lin, Gongquan Liu, Jianmin Zheng, Bing Chen. 66-70 [doi]
- Study on SOA-based architecture of product collaborative design system for mass customizationZhiqiang Zhang, Qingming Wu, Chao Zhou, Qiang Zhang. 71-75 [doi]
- A novel computation for AI-Searching technology of VCNQiusun Ye. 76-81 [doi]
- Cognitive dependency logicChang Su, Changle Zhou, Yijiang Chen. 82-84 [doi]
- A knowledge-based creation of mathematical programming for GIS problem solvingHui Wei. 85-91 [doi]
- Fuzzy neural networks control for hydraulic AGC system of aluminum cold rolling millYong Yang, Xinming Zhang. 92-97 [doi]
- Pattern recognition based on weighted and supervised ART2Na Chu, Lizhuang Ma. 98-102 [doi]
- Study on the expert system of overhead lines icing and icing meltingHeyun Liu, Wenbin Tang, Xiaohui Ma, Xiaosong Gu. 103-107 [doi]
- Fast tuning of SVM kernel parameter using distance between two classesJiancheng Sun. 108-113 [doi]
- The design of reversible gate and reversible sequential circuit based on DNA computingTao Song 0001, Shudong Wang, Xun Wang. 114-118 [doi]
- Negotiating agent architecture and communication modelMukun Cao, Yuqiang Feng. 119-124 [doi]
- A polymorphic type system in logic programmingHuiqi Li, Zhizhuo Zhao. 125-130 [doi]
- A novel inter-scale correlation image denoising method based on Dual-tree M-band waveletJingwen Yan, Guide Yang, Anfa Zhang. 131-136 [doi]
- A fuzzy neural network model based on fuzzy clustering and its applicationsShui-Li Chen, Guo-Long Chen, Yong-Li Niu, Guo-Rong Cai. 137-140 [doi]
- Resolution method of six-element linguistic truth-valued intuitionistic propositional logicLi Zou, Fang Sun, Yang Xu 0001. 141-145 [doi]
- A Trust-related and Energy-concerned Distributed MANET clustering designQiang Zhang, Ying Zhuo, Zhenghu Gong. 146-151 [doi]
- An efficient algorithm for the Single-Source Shortest Path Problem in graph theoryTianrui Li 0001, Luole Qi, Da Ruan 0001. 152-157 [doi]
- An intelligent design system for military situation assessmentYanping Xiang, Yifeng Zeng, William Zhu, Kim-Leng Poh. 158-163 [doi]
- Approach to model WEB activity based on phase transition theoryJianping Zeng, Shiyong Zhang. 164-169 [doi]
- PCE-oriented Multi-Agent software framework and its interactive computing applicationFagui Liu, Gongsheng Zhang, Zhaomiao Zheng, Yongdan Li, Jun Lin. 170-175 [doi]
- The improvement and implementation in the algorithm of finding maximal motifs in DNA sequencesYifan Fu, Dongdai Zhou, Shaochun Zhong, Ruiqing Zhao. 176-179 [doi]
- Artificial Immune System and its applications in gps single frequency precise point positioningChengquan Xu, Suxia Xu, Wei Chen. 180-183 [doi]
- An Artificial Immune System based on the innate immune response for a multi-agent object transportationFredy Fernando Munoz, Luis Fernando Niño, Claribed Calderon. 184-189 [doi]
- Study on dynamic distribution of bio-entity service in the bio-network middlewareXiangFeng Zhang, Zhaoxia Liang, Yongsheng Ding. 190-194 [doi]
- Optimal and adaptive pairwise DNA sequence correlation analysis in natural gradientKe Chen, Kun She 0001, William Zhu, Qingxin Zhu. 195-199 [doi]
- Detecting DNA-binding domain from sequence and secondary structure Information Using Kernel-based TechniqueFei Wang, Lusheng Chen. 200-204 [doi]
- Bibliography of works done on CAPTCHASajad Shirali-Shahreza, Mohammad Hassan Shirali-Shahreza. 205-210 [doi]
- Chaotic synchronization for a class of different chaotic (Hyperchaotic) Systems via Feedback ControlPing Zhou, Li-Jia Wei. 211-214 [doi]
- Synchronization of a class of hyper-haotic systems with multivariable Transmission Using ObserverWei Deng, GuangZhao Cui, Zhenjun Wu, Jie Fang. 215-219 [doi]
- Internal impedance of battery detection based on theory of chaotic OscillatorChengque Yin, Yue Sun, Yi-Ran Huang. 220-223 [doi]
- Globus pallidus neuron spike time series prediction based on local-region multi-step forecasting modelYan He, Jue Wang, Qingfeng Wang, Guangjun Zhang, Julei Wang, Weixin Li, Mingming Zhang, Guodong Gao. 224-229 [doi]
- The application of chaos genetic algorithm in the pid parameter optimizationTiebin Wu, Yun Cheng, Jiafan Tan, Taoyun Zhou. 230-234 [doi]
- Lag projective stochastic perturbation synchronization of chaotic systemsJian-An Fang, Qingying Miao, Yang Tang. 235-239 [doi]
- An algorithm for mining frequent closed itemsetsTiejun Zhang, Junrui Yang, Xiuqin Wang. 240-245 [doi]
- Spatial clustering with obstacles constraints using PSO-DV and K-MedoidsXueping Zhang, Wei Ding, Jiayao Wang, Zhongshan Fan, Gaofeng Deng. 246-251 [doi]
- Data mining for the optimization of production scheduling in flexible Manufacturing SystemYan Cao, Xu Xu, Fengru Sun. 252-255 [doi]
- New model of semantic similarity measuring in wordnetZili Zhou, Yanna Wang, Junzhong Gu. 256-261 [doi]
- Clustering transactions based on weighting maximal frequent itemsetsFaliang Huang, Guoqing Xie, Zhiqiang Yao, Shengzhen Cai. 262-266 [doi]
- Mining relation between the blogger and query in blog retrieval systemDazhen Lin, Donglin Cao, Shaozi Li. 267-272 [doi]
- Association rule mining with domain knowledge constraintHaiwei Pan, Qilong Han, Guisheng Yin, Wei Zhang 0017, Jianzhong Li. 273-278 [doi]
- Finding RkNN by compressed straightforward indexYanmin Luo 0001, Jianquan Liu, Canhong Lian, Hanxiong Chen. 279-284 [doi]
- Extracting product features from chinese customer reviewsYu Zheng, Liang Ye, Gengfeng Wu, Xin Li. 285-290 [doi]
- A new associative classifier for text categorizationZhitong Su, Wei Song 0004, Dan Meng, Jinhong Li. 291-295 [doi]
- Design of business component identification method with graph segmentationLifang Peng, Zhuochao Tong, Yanfei Zhang. 296-301 [doi]
- Using decision boundary to analyze classifiersZhiyong Yan, Congfu Xu. 302-307 [doi]
- Pheromone-based concept in Ant ClusteringWarangkhana Ngenkaew, Satoshi Ono, Shigeru Nakayama. 308-312 [doi]
- Adding Content-based 3D Model retrieval to semantic webShiguo Huang, Mingquan Zhou, Guohua Geng, Zhengyuan Ning, Kegang Wang. 313-318 [doi]
- A combined bias of network RTK based on Nu-SVR and the analysis of the model parameterHaichi Shu, Qiongfang Shi. 319-323 [doi]
- Research on grid based spatial outliers mining and its implementationJiaxiang Lin, Chongcheng Chen, Dongyi Ye, Weibin Wang. 324-328 [doi]
- Modeling and application of Shape Memory Alloy based on hysteretic nonlinear theory and data miningZhi-wen Zhu, Ya-nan Liu, Jia Xu, Hong-li Wang. 329-334 [doi]
- An improved voltage-based algorithm for community discoveryShiheng Xu, Jikun Yan. 335-339 [doi]
- An incremental reduct algorithm based on generalized decision for incomplete decision tablesDedong Zhang, Renpu Li, Xinting Tang, Yongsheng Zhao. 340-344 [doi]
- A Maximum contribution method for classification based on information theoryKe-Ming Lin, Yong-Sheng Xue, Juan Wen. 345-350 [doi]
- Applying data mining to forest maturity forecastingJinming Li, Rongqi Liu. 351-353 [doi]
- Mining diagnostic rules of breast tumor on ultrasound image using cost-sensitive RuleFit methodWei Yang, Su Zhang 0001, Yazhu Chen, Yaqing Chen, Wenying Li, Hongtao Lu. 354-359 [doi]
- A new ranking methodology based on hierarchical cluster analysisÖzgür Kabak, Füsun Ülengin, Sule Önsel. 360-365 [doi]
- A Multiobjective Evolutionary Algorithm for spam e-mail filteringAntonio Gabriel López-Herrera, Enrique Herrera-Viedma, Francisco Herrera. 366-371 [doi]
- Monte Carlo simulation in demographyJiayou Zhang, Qi'an Chen. 372-377 [doi]
- Externalizing Tacit knowledge to discern unhealthy nuclear intentions of nation statesSuman Rao. 378-383 [doi]
- Research & application of Metadata Management System based on data warehouse for banksFucheng Xie, Beizhan Wang, Liyan Chen, Liang Shi, Qingshan Jiang, Beizhan Wang. 384-388 [doi]
- Two new optimal aggregation approaches of fuzzy opinions in group decision environmentYanbing Gong, Jiguo Zhang. 389-394 [doi]
- Fuzzy distance measuring based on RSSI in Wireless Sensor NetworkXiufang Feng, Zhanqiang Gao, Mian Yang, Shibo Xiong. 395-400 [doi]
- Modeling and stability analysis of DC-DC buck converter via Takagi-Sugeno fuzzy approachKamyar Mehran, Damian Giaouris, Bashar Zahawi. 401-406 [doi]
- Model research and system design of internal evaluation of power supply service quality based on improved fuzzy AHPXuehong Zhang, Lin Xiao, Yi Feng, Jing Zhang, Ming Zeng. 407-410 [doi]
- Axiomatic design principles under fuzzy environmentSelçuk Çebi, Cengiz Kahrman. 411-417 [doi]
- Fuzzy multi-criteria evaluation of R&D projects and a fuzzy trinomial lattice approach for real optionsA. Çagri Tolga, Cengiz Kahraman. 418-423 [doi]
- On process capability analysis under fuzzy normal distributionIhsan Kaya, Cengiz Kahraman. 424-428 [doi]
- Active insulin infusion using fuzzy-based closed-loop controlSholeh Yasini, Mohammad-Bagher Naghibi Sistani, Ali Karimpour. 429-434 [doi]
- A fuzzy set approach on pricing american put options on Euribor futuresXiaojian Yu, Min Fan. 435-439 [doi]
- Research on fuzzy matching model for semantic Web servicesZhichao Peng, Wenhua He, Daiwu Chen. 440-445 [doi]
- An intelligent system in healthcare using fuzzy measuresAmol S. Wagholikar, Jun Jo. 446-449 [doi]
- Fuzzy probabilistic belief base revisionYunguo Lin, Xiuli Wang, Shanli Hu. 450-454 [doi]
- Analysis of breast cancer morbidity by information diffusion principlesRongmin Li, Jiaqi Yao, Hanji Shang. 455-458 [doi]
- On the chaining Syllogism in fuzzy logicDa Ruan 0001, Yun Shi, Etienne E. Kerre. 459-464 [doi]
- Analysis and identification of fashion oriented industrial products using fuzzy logic techniquesLudovic Koehl, Xianyi Zeng, Mauricio Camargo, Christian Fonteix, François Delmotte. 465-470 [doi]
- Palmprint verification based on genetic algorithmYan Jin, Miao Qi, Yinghua Lu, Yao Fu, Jun Kong. 471-475 [doi]
- An improved genetic algorithm for the stable structures of (C60)N clustersGuifang Shao, Yuhua Wen, Yaohua Chen. 476-480 [doi]
- Application of genetic algorithm in rapid prototypingJibin Zhao, Renbo Xia, Weijun Liu, Jinting Xu. 481-485 [doi]
- A novel Memetic Algorithm based on real-observation Quantum-inspired evolutionary algorithmsHongwen Liu, Gexiang Zhang, Chunxiu Liu, Chun Fang. 486-490 [doi]
- Research on analysis of convergence of an adaptive Ant Colony Optimization AlgorithmWeijin Jiang. 491-496 [doi]
- A genetic algorithm for the vehicle routing problem with multi-type and multi-costHuimin Niu, Yinqiang Tao, Yongzhong Yang. 497-501 [doi]
- Research on performance measures of multi-objective optimization evolutionary algorithmsLili Zhang, Wenhua Zeng. 502-507 [doi]
- Evolutionary game of altruistic and selfish behaviorsQi Xiang, Zhao Yong. 508-512 [doi]
- A networking requirement application by multi-objective genetic algorithms with Sexual SelectionSunantha Sodsee, Phayung Meesad, Zhong Li 0001, Wolfgang A. Halang. 513-518 [doi]
- The optimization of pipeline network based on parent genetic algorithmsHua Wang, Yifeng Jiang 0005, Yan Wang. 519-523 [doi]
- A modified differential evolution algorithm with self-adaptive control parametersZhifeng Wu, Houkuan Huang, Bei Yang, Ying Zhang. 524-527 [doi]
- A cooperative co-evolutionary control method for Stewart platformJian Sun, Yongsheng Ding, Kuangrong Hao. 528-532 [doi]
- A novel strategy for dynamic risk grading of major hazards based on evolutionary algorithmFaen Shi, Neng Zhu. 533-540 [doi]
- Adaptive genetic algorithm-based forest harvest adjustmentMeifang Wang, Jinming Li. 541-544 [doi]
- Afforestation Program based on self-adaptive Genetic AlgorithmJinming Li, Meifang Wang. 545-548 [doi]
- A hybrid genetic algorithm for designing feedforward neural networksJinhua Xu, Yue Lu. 549-554 [doi]
- Coalition structure generation with given required bound based on coalition combinationJianbin Luo, Shanli Hu, Yaohai Lin. 555-559 [doi]
- Evolution analysis and survival condition for altruistic behaviors in evolutionary gameQi Xiang, Zhao Yong. 560-564 [doi]
- Large image/videos' automatic annotation using bidirectional associative memoriesYing Dai. 565-571 [doi]
- Learning to rank with voted multiple hyperplanes for documents retrievalHeli Sun, Boqin Feng, Jianbin Huang. 572-577 [doi]
- Quantum associative memory that processes nonorthogonal patternsLingxiang Zheng, Changle Zhou. 578-583 [doi]
- Code based software security vulnerability analyzing and detecting based on similar characteristicXifeng An, Weihua Li, Wei Pan. 584-589 [doi]
- Sliding mode control of ROV based on RBF neural networks adaptive learningHeping Liu, Zhenbang Gong, Min Li. 590-594 [doi]
- Distributed knowledge management for collaborative designJunming Hou, Chong Su, Shuang Lang, Yingying Su, Wanshan Wang. 595-598 [doi]
- Parameters optimization of fuzzy controller based on PSODongyun Wang, Guan Wang, Rong Hu. 599-603 [doi]
- A low complexity and high performance real-time algorithm of detecting and tracking circular shape in hole-punching machineYigang Wang, Yangguang Liu, Zhuoyuan Wang, Shengli Fan, Jialin Cui. 604-608 [doi]
- Short-time traffic flow prediction using third-order Volterra filter with product-decoupled structureYumei Zhang, Shiru Qu, Kaige Wen. 609-614 [doi]
- A fast cutpoints sieve method for interval-valued decision treeMingzhi Chen, Lun Yu, Shuili Chen. 615-618 [doi]
- Study of an integrated resource management system oriented to ferry companiesXiaobing Liu, Zhongkai Li, Xuewen Huang, Qingjie Song. 619-624 [doi]
- Team Situation Awareness measurement using group aggregation and implication operatorsJun Ma 0002, Guangquan Zhang 0001. 625-630 [doi]
- Research on a novel MAS for decision making methodDejia Shi. 631-634 [doi]
- Notice of Violation of IEEE Publication Principles: Research on a novel MAS for automated negotiation methodGang Yi. 635-639 [doi]
- REV: Valuation and price adjustment in a fuzzy logic frameworkVictoria López, Javier Montero. 640-645 [doi]
- National energy security early-warning pattern design and simulation analysis based on CASShuqiong Fang, Baoan Yang, Yin Yu. 646-649 [doi]
- A kernel view of manifold analysis for face imagesDong Huang, Zhang Yi 0001, Xiaorong Pu. 650-655 [doi]
- A novel signals splitting method for intermittent sampling in deficient periodZhenhua Sun, Xuemin Tian, Ping Wang. 656-661 [doi]
- A race condition graph for concurrent program behaviorYan Chen, Yann-Hang Lee, W. Eric Wong, Donghui Guo. 662-667 [doi]
- Blind identification of FIR SIMO channels using an improved particle swarm optimizerYing Gao, Miao Liu 0005, Xiao Hu, Huailiang Liu. 668-672 [doi]
- Strategic interaction support for knowledge sharing in virtual communitiesJing Lei, Xixiang Zhang, Baoan Yang. 673-679 [doi]
- A feature extraction method using base phrase and keyword in Chinese textXinfu Li, Leilei Zhao, Lihong Wu. 680-684 [doi]
- Cognitive detector: A new architecture for target detection and tracking in complex environmentYang Li, Ning Zhang, Qiang Yang 0003. 685-688 [doi]
- Study on eye quantification in Traditional Chinese MedicineFeng Guo 0005, Ying Lin. 689-694 [doi]
- A novel approach of emotion recognition based on selective ensembleZhenguo Zhu, Kun He. 695-698 [doi]
- Texture-based ancient porcelain shards classifications using Gabor transformKegang Wang, Guohua Geng, Mingquan Zhou. 699-702 [doi]
- Region localization based on rotational invariant feature and improved self organized mapZhuofu Bai, Zhaoxuan Yang, Jiapeng Wu, Yang Chen. 703-706 [doi]
- Interframe variation vector-based gait recognitionSong-Zhi Su, Li Wang, Shao-Zi Li. 707-712 [doi]
- Ear recognition based on wavelet transform and Discriminative Common VectorsHailong Zhao, Zhichun Mu, Xia Zhang, Wen-jie Dun. 713-716 [doi]
- A united classification system of X-ray image based on fuzzy rule and neural networksDongmei Liu, Zhaoxia Wang. 717-722 [doi]
- Underwater target recognition system based on Case-Based ReasoningJun Xie, Junchuan Hu, Lianglong Da, Yuyang Li. 723-725 [doi]
- Self-Organization of robust intelligent controller using quantum fuzzy inferenceSergey V. Ulyanov. 726-732 [doi]
- Fuzzy navigation of a monitoring mobile robotJorge S. Benítez-Read, Erick Rojas-Ramírez. 733-738 [doi]
- The Anti-wave control of small open-frame underwater robotHeping Liu, Zhenbang Gong, Min Li. 739-744 [doi]
- Application of particle filter orientation based on visual noise in the RoboCupYongmei Li, Haimeng Sun, Jiancan Mao. 745-747 [doi]
- An attitude control method of unmanned helicopter based on adaptive output feedbackJiande Wu, Guoyong Huang, Yugang Fan. 748-753 [doi]
- On-line fault detection method based on modified SVDD for industrial process systemJinfa Zhuang, Jian Luo, Yanqing Peng, Changqing Wu. 754-760 [doi]
- An approach for accurate measurement of lubricant film thickness by fiber-optic Michelson InterferometerYuping Chen, Hong Zhao. 761-765 [doi]
- Lightly-supervised clustering using pairwise constraint propagationJianbin Huang, Heli Sun. 765-770 [doi]
- Chinese organization name recognition based on co-training algorithmXiao Ke, Shaozi Li. 771-777 [doi]
- Anaphoric resolution of Chinese personal pronouns based on the focus-set and DRTChangle Zhou, Xiaojun Ding. 778-784 [doi]
- Knowledge representation based on semantic network in the Chinese character intelligent formation systemYouguo Pi, Mingyou Liu, Huang Jian. 785-790 [doi]
- Translating OOV phrases based on lexical information and web miningGuihua Sun, Gaopan Xu, Ke Zhang. 791-796 [doi]
- New word detection algorithm for Chinese based on extraction of local context informationHualin Zeng, Changle Zhou, Xiao Dong Shi, Tang-Qiu Li, Chang Su. 797-801 [doi]
- An adaptive Markov model for text categorizationJin Li, Kun Yue, Weiyi Liu. 802-807 [doi]
- Incorporating syntax-based language models in phrase-based SMT modelsYidong Chen, Xiaodong Shi, Changle Zhou, Qingyang Hong. 808-812 [doi]
- Extracting Chinese multi-word terms from small corpusLang Zhou, Liang Zhang, Chong Feng, Heyan Huang. 813-818 [doi]
- Research on template automatic extraction based on systematic clusterXianming Lin, Shaozi Li. 819-824 [doi]
- Extended linguistic hierarchiesLuis Martínez 0001, Macarena Espinilla, Jun Liu 0001. 825-830 [doi]
- Rational functional network for function approximationYongquan Zhou, Bai Liu, Zhucheng Xie, Dexiang Luo. 831-836 [doi]
- An adaptive neural network system for prediction of thermal protective performance of fabricsZhiying Cui, Weiyuan Zhang. 837-841 [doi]
- Absolute exponential stability analysis of recurrent neural networks with generalized activation function: An LMI approachJun Xu. 842-847 [doi]
- Research and application of compound control based on RBF neural network and PIDLi Liu Ke Kang, Sheng Zhang. 848-850 [doi]
- Global exponential stability of a class of impulsive Cohen-Grossberg neural networks with unbounded delaysXiaohui Xu, Jiye Zhang, Keyue Zhang. 851-855 [doi]
- Detection of six kinds of acid in red wine with infrared spectroscopy based on FastICA and neural networkLimin Fang, Min Lin. 856-861 [doi]
- Power system reactive power optimization based on direct neural dynamic programmingZhigang Lu, Liye Ma. 862-866 [doi]
- Performance of associative memory using partially-connected networksMin Xia, Yang Tang, Jian-An Fang. 867-872 [doi]
- Rule extraction from artificial neural network with optimized activation functionsJianguo Wang, Jianhong Yang, Wenxing Zhang, Jinwu Xu. 873-879 [doi]
- Performance prediction of ground-water heat pump system using artificial neural networksHui Xie, Li Liu, Fei Ma. 880-885 [doi]
- Fuzzy neural network structure of linguistic dynamic systems based on nonlinear particle swarm optimizationGuo-Rong Cai, Shui-Li Chen, Wenzhong Guo. 886-891 [doi]
- A parameter adjustment algorithm of BP neural networkXiaozhong Li, Qiu Li. 892-895 [doi]
- Continuous attribute discretization and application in Chinese wine classification using BP neural networkXingbo Sun, Xiuhua Tang, Yueyun Lei. 896-900 [doi]
- Development of a composite road safety performance indicator based on neural networksYongjun Shen, Elke Hermans, Da Ruan 0001, Geert Wets, Koen Vanhoof, Tom Brijs. 901-906 [doi]
- Rough sets theory for Chinese-listed companies' fraudulent financial reporting predictionsYonghong Zhong, Zheng Li. 907-912 [doi]
- Function S-rough Sets and image F-interior hidingYufeng Qiu, Xuefang Ren, Kaiquan Shi. 913-919 [doi]
- New operators in covering rough set theoryDingjun Chen, Liu Yi, Kaiteng Wu, Keyun Qin. 920-924 [doi]
- S-rough sets and the dependent separation by its F-attribute interferenceJinming Qiu, Kaiquan Shi. 925-929 [doi]
- Discernable matrix and its application in decision rulesShufu Zheng, FengChai Liao, Kaiquan Shi. 930-933 [doi]
- Rough data and rough data law recognitionChangjing Lu, Kaiquan Shi. 934-939 [doi]
- Analysis on earthquake precursory anomalies based on two direction S-rough setsXiuqiong Chen, Kaiquan Shi. 940-944 [doi]
- Rough law security and its applicationsLing Zhang, Guolong Chen. 945-952 [doi]
- Simplifying rough set-based if-then rules with remarkable degreePeijun Guo. 953-956 [doi]
- Rough law generation and the discovery of F - rough lawJinming Qiu, Changjing Lu, Kaiquan Shi. 957-962 [doi]
- Support vector machines with continued fraction kernelJingDong Tan, Rujing Wang, Xiaoming Zhang. 963-967 [doi]
- Fast training of support vector machines using top-down kernel clusteringXiao-Zhang Liu, Hui-Zhen Qiu. 968-971 [doi]
- Chattering-free sliding mode control based on support vector regressionLinsheng Li, Jianning Li. 972-977 [doi]
- Support vector machine learning from positive and unlabeled samplesAi-bing Ji, Qiming Niu, Minghu Ha. 978-982 [doi]
- Chattering-free grey sliding mode control for discrete time-delay systems with unmatched uncertaintyJianning Li, Yibo Zhang, Haipeng Pan. 983-986 [doi]
- Online modeling for rotational speed of helicopter rotor based on Support Vector MachineShuzhou Wang, Ye San, Shuwen Wang. 987-990 [doi]
- A geometric approach to train SVM on very large data setsZhi-Qiang Zeng, Huarong Xu, Yanqi Xie, Ji Gao. 991-996 [doi]
- Fast training Support Vector Machines using parallel sequential minimal optimizationZhi-Qiang Zeng, Hong-Bin Yu, Huarong Xu, Yanqi Xie, Ji Gao. 997-1001 [doi]
- Application of least squares support vector machines for discrimination of red wine using visible and near infrared spectroscopyFei Liu 0008, Li Wang 0071, Yong He 0001. 1002-1006 [doi]
- Extension of Mean Shift vector with theoretical analysis and experimentJiaxiang Huang, Shaozi Li, Changle Zhou. 1007-1012 [doi]
- Opposition based comprehensive learning particle swarm optimizationZhangjun Wu, Zhiwei Ni, Chang Zhang, Lichuan Gu. 1013-1019 [doi]
- VLSI floorplanning based on Particle Swarm OptimizationGuolong Chen, Wenzhong Guo, Hongju Cheng, Xiang Feng, Xiaotong Fang. 1020-1025 [doi]
- Self-adaptation in Bacterial Foraging Optimization algorithmHanning Chen, Yunlong Zhu, Kunyuan Hu. 1026-1031 [doi]
- Chaos-mutation-based Particle Swarm Optimizer for dynamic environmentDianmin Dong, Jing Jie, Jianchao Zeng 0001, Meng Wang. 1032-1037 [doi]
- Feature subset selection by particle swarm optimization with fuzzy fitness functionBasabi Chakraborty. 1038-1042 [doi]
- Function one direction S-rough sets and F -decomposition of imageYufeng Qiu, Yingling Du, Kaiquan Shi. 1043-1049 [doi]
- Wavelet-based coefficients' relationship co-occurrence histogram algorithm of texture teature extractionQing Liu, Tusheng Lin. 1050-1053 [doi]
- Iris recognition based on Empirical Mode DecompositionMin Han, Yuhua Peng, Weifeng Sun. 1054-1058 [doi]
- Thresholding approaches with interval-valued fuzzy sets to image segmentationTingquan Deng, Peipei Wang, Yuling Mei, Wenjie Liu. 1059-1064 [doi]
- Fully automatic matching of circular markers for camera calibrationRenbo Xia, Jibin Zhao, Weijun Liu, Jinting Xu. 1065-1070 [doi]
- A fingerprint matching method based on minutiae and ridgesWeibo Zhong, Xinbao Ning. 1071-1074 [doi]
- A multi-ROIs medical image compression algorithm with edge feature preservingMin Hu, Changjiang Zhang, Juan Lu, Bo Zhou. 1075-1080 [doi]
- An effective algorithm for low quality fingerprint segmentationChengpu Yu, Mei Xie, Jin Qi. 1081-1085 [doi]
- A hybrid object tracking method in complex backgroundsFenlan Li, Chao Li, Zhemin Zhuang. 1086-1091 [doi]
- Image mosaic algorithm based on similar curveLing Yang, Yun Cheng, Zhou Yue, Taoyun Zhou. 1092-1095 [doi]
- Handwritten Bangla digit recognition using hierarchical Bayesian networkJinwen Xu, Jinhua Xu, Yue Lu. 1096-1099 [doi]
- Cascade boosting LBP feature based classifiers for face recognitionCanming Ma, Taizhe Tan, Qunsheng Yang. 1100-1104 [doi]
- Video watermarking temporal synchronization on motion vectorKeZheng Lin, Wei Yang, Pie Liu. 1105-1110 [doi]
- Viscous fluid model-based non-rigid registration incorporating scale space keypointsXuesong Lu, Su Zhang 0001, Wei Yang, Yazhu Chen. 1111-1116 [doi]
- The image processing and target identification of laser imaging fuzeChengtian Song, Keyong Wang, Lian Zheng. 1117-1120 [doi]
- A stereo video segmentation algorithm combining disparity map and frame differenceShigang Wang, Xuejun Wang, Hexin Chen. 1121-1124 [doi]
- A wavelet-based 3D surfacelet transformHongzhi Xiao, Jingwen Yan, Xiaoyan Zhang. 1125-1129 [doi]
- Integrated shape corresponding information by landmark sliding for non-rigid registration between CT and ultrasound imagesSu Zhang 0001, Wei Yang, Xuesong Lu, Yazhu Chen. 1130-1135 [doi]
- Color digital watermark method based on non-symmetry and anti-packing pattern representation modelWenlue Chen, Zhihua Hu. 1136-1140 [doi]
- A multi-stage fingerprint image segmentation methodKeming Mao, Guoren Wang, Changyong Yu, Yan Jin. 1141-1145 [doi]
- Improved contour and texture-based object segmentationKeZheng Lin, Xinyuan Li, Pie Liu. 1146-1151 [doi]
- Black-ink painting synthesis based on brush modeling and ink diffusion algorithmTianming Yao, Tianding Chen. 1152-1155 [doi]
- Automated method of fracture detection in CT brain imagesWan Mimi Diyana Wan Zaki, Mohammad Faizal Ahmad Fauzi, Rosli Besar. 1156-1160 [doi]
- Color consistency classification system based on fuzzy neural networkWeiqing Li, Qun Wang, Chengbiao Wang, Guangshe Chen. 1161-1166 [doi]
- Face recognition by subspace analysis of 2D Log-Gabor wavelets featuresLing Fan, Hong Duan, Fei Long. 1167-1172 [doi]
- Spatial moment sub-pixel edge locator based on cubic Bézier curveWenBiao Jin, JingJing Shen, Zhifeng Zhang. 1173-1178 [doi]
- SAR image denoising based on orthogonal bandlet domain with context modelingAnfa Zhang, Jingwen Yan, Zhixi Wang. 1179-1184 [doi]
- Unsupervised abnormalities extraction and brain segmentationHau-Lee Tong, Mohammad Faizal Ahmad Fauzi, Ryoichi Komiya, Su-Cheng Haw. 1185-1190 [doi]
- Learning spatial prior with automatically labeled landmarksJianzhai Wu, Zongtan Zhou, Li Zhou 0003, Dewen Hu. 1191-1197 [doi]
- Fast binocular vision with filtersYiming Nie, Tao Wu 0001, Xiangjing An, Hangen He. 1198-1202 [doi]
- Inpainting algorithm for jacquared image based on phase-field modelZhilin Feng, Jianwei Yin, Jianan Zhou. 1203-1207 [doi]
- Image segmentation of MRI based on improved anttree clustering algorithmChenling Li, Wenhua Zeng, Jiahe Zhuang. 1208-1213 [doi]
- Correcting sample selection bias for image classificationDi Wu, Dinzhong Lin, Li Yao, Wenjun Zhang. 1214-1220 [doi]
- A fast asst motion estimation algorighm based on diamond and line search parrernsXiong Jiang. 1221-1226 [doi]
- Exact threshold for zero-block detection in H.264/AVCMinlian Xiao, Xiong Jiang. 1227-1230 [doi]
- A fast mode decision algorithm of 4x4 block intra prediction for H.264/AVCYun Cheng, Min Wu. 1231-1236 [doi]
- A compression algorithm of hyperspectral remote sensing image based on 3-D Wavelet transform and fractalWei Pan, Yi Zou, Lu Ao. 1237-1241 [doi]
- Automatic segmentation of kidney without using contrast medium on abdominal CT imagesYan Gao, Boliang Wang. 1242-1246 [doi]
- The cycle spinning-based sharp frequency localized contourlet transform for image denoisingXiaobo Qu 0001, Jingwen Yan. 1247-1251 [doi]
- The algorithm of fingerprint enhancement base on dynamic direction fieldYushan Zheng, Zhen Qi, You-Jun Ding. 1252-1255 [doi]
- A survey of flash memory design and implementation of database in flash memoryAminul Haque Chowdhury, Ki-Hyung Kim. 1256-1259 [doi]
- Improved centroid localization algorithm in WSNsBinwei Deng, Guangming Huang, Lei Zhang, Hao Liu. 1260-1264 [doi]
- A multi-agent prototype system for medical diagnosisQiao Yang, John Shunen Shieh. 1265-1270 [doi]
- Reasoning about belief, goal and exceptions in multi-agent cooperation logicsXianwei Lai, Shanli Hu, Zhengyuan Ning, Xiuli Wang. 1271-1275 [doi]
- Performance evaluation model for R&D department: An integrated balanced scorecard and analytical hierarchy process approachUfuk Cebeci, Burak Sezerel. 1276-1281 [doi]
- System law inference and law recognitionYingling Du, FengChai Liao, Xiumei Hao. 1282-1287 [doi]
- Key management scheme based on (t, n) threshold cryptosystemXuanwu Zhou, Ping Wei. 1288-1293 [doi]
- On the logic of dynamic coalition formationYao-Hai Lin, Shan-li Hu, Jian-Bin Luo. 1294-1298 [doi]
- Performance optimization for ControlNet networkYunjing Liu, Songai Juan. 1299-1303 [doi]
- On local kernel polarizationTinghua Wang, Shengfeng Tian, Houkuan Huang. 1304-1309 [doi]
- Uncorrelated Maximum Locality Preserving ProjectionsKeZheng Lin, Sheng Lin. 1310-1313 [doi]
- PSO-FNN-based extraction of security situation elementWenzhong Guo, Guolong Chen, Zongming Lin, Yuzhong Chen, Xiaotong Fang. 1314-1318 [doi]
- Stability criteria for switched linear systemsHongbo Zou, Renquan Lu. 1319-1323 [doi]
- The implementation and application of programming port communication between industry PC and Mitsubishi FX series PLCJian Sun, Peng Lu, Yaqiong Fu, Ruixiang Liu, Le Chen. 1324-1327 [doi]
- A love mode gas sensor coated with polyaniline/ In2O3 for sensing COPeng Zhang, Ming Chen, Pengju He. 1328-1333 [doi]
- A new pension control approach to observer-based fault detection systems intelligent designingXiaobei Liang, Bingyong Tang. 1334-1337 [doi]
- Optimal design for 2-DOF PID controller based on Maximum Entropy Estimation of Distribution AlgorithmLu Lin. 1338-1342 [doi]
- The design and realization of Ajax worm detectable systemZhaoyang Qu, Qun Zheng. 1343-1346 [doi]
- Research on timestamp in HDDBMSShuang Lai. 1347-1351 [doi]
- The guidance system of anti-radiation aircraftTaoyun Zhou, Yun Cheng, Yi Zhang. 1352-1356 [doi]
- Alternating-time temporal belief and knowledge logic in multi-agent systemsZhengyuan Ning, Xianwei Lai, Shanli Hu, Xiuli Wang. 1357-1362 [doi]
- Steganography in TeX documentsMohammad Shirali-Shahreza, Sajad Shirali-Shahreza. 1363-1366 [doi]
- Research of inter-cluster multi-hop routing algorithm for wireless sensor networksHaoran Liu, Yan Fang, Xiaochen Hao, Jingjing Dou, Hongliang Li, Weihong Bi. 1367-1372 [doi]
- A Modified Naive Bayes to online training assessment in virtual reality simulatorsRonei Marcos de Moraes, Liliane dos Santos Machado. 1373-1378 [doi]
- A new aggregation operator based on mapping and its evaluation applicationXiaoping Qiu, Xiaobing Li, Kaijun Xu, Hongwei Ma. 1379-1383 [doi]
- Soft sciences versus crisp sciences: A look into the future of scienceJavier Montero. 1384-1387 [doi]
- Research on self-adaptive load balancing in EJB clustering systemYong Liu, Lushan Wang, Shaozi Li. 1388-1392 [doi]
- Transitive closure of interval-valued relationsRamón González del Campo, Luis Garmendia, Victoria López. 1393-1397 [doi]
- m-Government: A framework of mobile-based emergency response systemsKhaled Amailef, Jie Lu 0001. 1398-1403 [doi]
- An intelligent evaluation system for tourism websites in Shijiazhuang cityZi Lu, Ruiling Han, Peipei Zhang, Yiming Ren, Guangquan Zhang 0001. 1404-1408 [doi]
- Performance appraisal with heterogenous informationRocío de Andrés Calle, José Luis García-Lapresta, Jun Liu 0001, Luis Martínez 0001. 1409-1414 [doi]
- Extended belief rule base inference methodologyJun Liu 0001, Luis Martínez 0001, Ying-Ming Wang. 1415-1420 [doi]
- Trust modeling in virtual communities using social network metricsGrzegorz Kolaczek. 1421-1426 [doi]
- Chosen IV algebraic attack on One.FiviumZhe Sun, Shiwu Zhang, Lei Wang. 1427-1431 [doi]
- Modelling method for a self-proliferation Cellular automaton and computer simulation for crystallization of hypereutectoid steel1Yongze Fang, Yongmei Li. 1432-1435 [doi]
- Optimization model of e-waste reverse logistics and recycling networkShanshan Wei, Kejing Zhang. 1436-1442 [doi]
- Research on model-based optimization decision of combinatorial demand forecast and marketing mix tacticsFugen Song, Ji Miao. 1443-1447 [doi]
- Condition monitoring system for circuit breaker based on substation automation systemZhong Tang. 1448-1452 [doi]
- Brain tumour diagnosis with Wavelets and Support Vector MachinesGonzalo Farias, Matilde Santos 0001, Victoria López. 1453-1459 [doi]
- Improving Project for security and secrecy's risk of WLAN managementZhiwen Wang, Meizhen Liu, Qixian Cai, Jie Li. 1460-1465 [doi]