A New Method for Absolute Value Equations Based on Harmony Search Algorithm |
1231-1236 |
Longquan Yong, Sanyang Liu, Shemin Zhang and Fang'an Deng |
|
|
|
A Prediction-Correction Method for Co-Coercive Variational Inequality Problems with Separable Operators in Traffic Assignment Problems |
1237-1243 |
Li Yue, Min Sun and Jihuan Ding |
|
|
|
Faults Diagnosis Based on Support Vector Machines with Parameters Optimization |
1245-1252 |
Chenghua Shi, Yapeng Wang and Honglei Zhang |
|
|
|
An Effective Attack Classification Scheme for Intrusion Detection Systems Using Bayesian Analysis Techniques |
1253-1259 |
Shuyue Wu, Jie Yu, Xiaoping Fan and Xiaodong Tang |
|
|
|
A Method for Attribute Reduction Using Rough Set Theory and Improved Particle Swarm Optimization |
1261-1266 |
Xingwen Liu, Dianhong Wang, Liangxiao Jiang and Fenxiong Chen |
|
|
|
Digital Acceleration Control Method for Path Tracking Control of an Autonomous Mobile Robot |
1267-1272 |
Yina Wang, Shuoyu Wang, Renpeng Tan and Yinlai Jiang |
|
|
|
A Parallel-MLFMA Method with the Domain Decomposition |
1273-1278 |
Xingang Wang, Bin Cheng and Weiqin Tong |
|
|
|
A Text Classifier Based on Cloud Model |
1279-1284 |
Yixing Liao, Xuezeng Pan and Wenyu Zhang |
|
|
|
Bayesian Network Learning for the Medicine Aid Diagnosis Analysis |
1285-1290 |
Jianfei Zhang, Shuangcheng Wang, Lijun Tian and Ning Wang |
|
|
|
An Experimental Investigation of the Competition Impact on Risk Attitude |
1291-1295 |
Meiping Huang, Xianyu Wang, Yingsheng Su and Huan Zhang |
|
|
|
Image Encryption Using Mapping Array and Random Division |
1297-1302 |
Zhenjun Tang, Weiwei Lan, Yumin Dai and Jinzhen He |
|
|
|
A Novel Quantum-Inspired Evolutionary Algorithm Based on EDA |
1303-1308 |
Jie Qian |
|
|
|
Combining PSO and Iterative MUSIC Searching DOA Estimation for the CDMA System |
1309-1314 |
Jhih-Chung Chang and Ann-Chen Chang |
|
|
|
Simulation for Disassembly Planning of Used-Product in Reverse Supply Chain |
1315-1320 |
Qiaolun Gu and Tiegang Gao |
|
|
|
Research and Application of Multi-Embedded System Cooperative Control for Plate Leveler |
1321-1326 |
Hongjie Li, Qingxue Huang, Xiulian Gong, Changjiang Ju, Jianmei Wang and Liye Fu |
|
|
|
Personalized Information Retrieval in Specific Domain |
1327-1332 |
Chunyan Liang |
|
|
|
Engineering Project Risk Rating Based on Matter-Element Model and Extension Analysis |
1333-1337 |
Cunbin Li, Yang Yang, Wenjun Chen and Zhe Du |
|
|
|
The Study of the Nuclear Power Economic Evaluation Index System Based on RBF Neural Network |
1339-1344 |
Jicheng Liu, Yajuan Yang and Suhua Wang |
|
|
|
Low-Carbon Contribution Effects Analysis Model of Power Supply Enterprises Based on Fuzzy Comprehensive Assessment Method and Its Application |
1345-1350 |
Ming Zeng, Chunwu Chen, Qingyu Liu and Xiaoli Zhu |
|
|
|
Investment Pattern and Economics Benefits Analysis of Distributed Generation |
1351-1356 |
Ming Zeng, Zhiwei Ma, Hongzhi Liu and Kun Zhang |
|
|
|
Government Investment Projects Collusion Supervision Based on the Prospect Theory |
1357-1362 |
Yunna Wu, Yisheng Yang, Tiantian Feng, Lirong Liu and Ruhang Xu |
|
|
|
Digital Plant Colony Modeling Based on 3D Digitization |
1363-1367 |
Boxiang Xiao, Weiliang Wen, Xinyu Guo and Shenglian Lu |
|
|
|
Automatic Transmission Idling Control Based on Discrete-Time Sliding Mode Controller |
1369-1374 |
Guangqiang Wu and Leilei Wang |
|
|
|
Performance Evaluation of Batch Median for Simulation Output Analysis |
1375-1380 |
Zhan Bao, Peng Shi and Ming Yang |
|
|
|
Quantitative Analysis on Core Frame Structure in Large-Scale Software |
1381-1386 |
Hui Li, Hai Zhao, Jiuqiang Xu, Wei Cai and Jun Ai |
|
|
|
Data Selection Algorithm for LVCSR's Semi-Supervised Incremental Learning |
1387-1392 |
Haifeng Li, Tian Zhang, Lin Ma and Maozu Guo |
|
|
|
A Strong RFID Authentication Protocol Based on Quadratic Residues and Key Array |
1393-1398 |
Xiuwei Xuan, Jianfu Teng and Yu Bai |
|
|
|
On the Security of Improved Low-Computation Partially Blind Signatures |
1399-1405 |
Hsiu-Feng Lin, Chiou-Yueh Gun and Chih-Ying Chen |
|
|
|
A Fine-Grained Access Control Scheme for Secure Video Multicast |
1407-1412 |
Lo-Yao Yeh, Jee-Gong Chang and Yi-Lang Tsai |
|
|
|
Integrating the CART and Support Vector Machines Approach for Information Disclosure Prediction |
1413-1418 |
Der-Jang Chi, Ching-Chiang Yeh, Ming-Cheng Lai and Lon-Fon Shieh |
|
|
|
Setpoint Filters for Minimizing Overshoot for Low Order Processes |
1419-1425 |
V. Vijayan, C. Selvakumar and Rames C. Panda |
|
|
|
Knee Pain Detection Technology Using Magnetic Resonance Images |
1427-1432 |
Tun Chang Lu, Wan-Chun Liu, Chao-Hsing Hsu, Chung-Lain Lu and Yi-Nung Chung |
|
|
|
A Multi-Objective Evolutionary Algorithm for Reverse Logistics Network Design |
1433-1438 |
Bo He and He Huang |
|
|
|
A Prediction-Based Data Collection Method in Wireless Sensor Network Using Kalman Filter |
1439-1446 |
Yunsheng Liu and Zheng Wang |
|
|
|
Non-Fragile H-infinity Filtering for a Class of Sampled-Data System with Long Time-Delay |
1447-1452 |
Shi-gang Wang, Jun-feng Wu |
|
|
|