Risk Sensitive FIR Filters for Stochastic Discrete-Time State Space Models | 1 |
|
Soohee Han | ||
Michigan Versus Pittsburg Approach: A Comparison for Market Selection Problem | 13 |
|
Ata-Ul-Waheed and A. R. Baig | ||
To Bound Search Space and Boost Performance of Learning Classifier Systems: A Rough Set Approach | 33 |
|
Farzaneh Shoeleh, Ali Hamzeh and Sattar Hashemi | ||
A Scalable Routing for Delay-Tolerant Heterogeneous Networks | 49 |
|
Chenn-Jung Huang, Heng-Ming Chen, Chin-Fa Lin, Jia-Jian Liao, Kai-Wen Hu, Dian-Xiu Yang, Chun-Hua Chen and Yi-Ta Chuang | ||
Control Design for Tele-Operation System with Time-Varying and Stochastic Communication Delays | 61 |
|
Yu Kang, Zhijun Li, Weike Shang and Hongsheng Xi | ||
Prioritizing Service Attributes for Improvement Using Fuzzy Zone of Tolerance | 75 |
|
Hung-Chung Chang, Gin-Shuh Liang, Ching-Wu Chu and Chen-Hui Chou | ||
Resonance Vibration Analysis in Double Acting Arm Using FEM with PSO Based Non-Uniform Refinement | 91 |
|
Somyot Kaitwanidvilai and Issarachai Ngamroo | ||
HERMIT: A New Methodology for Creating Autonomous Software Deployment Packages | 107 |
|
Umar Manzoor, Samia Nefti and AH Jones | ||
Master-Slave Chaos Synchronization Using an Adaptive Dynamic Sliding-Mode Neural Control System | 121 |
|
Chun-Fei Hsu, Chien-Jung Chiu and Jang-Zern Tsai | ||
A New Data Hiding Scheme Based on DNA Sequence | 139 |
|
Cheng Guo, Chin-Chen Chang and Zhi-Hui Wang | ||
A Fast Randomized Method for Efficient Circle/Arc Detection | 151 |
|
Shih-Hsuan Chiu, Kuo-Hung Lin, Che-Yen Wen, Jun-Huei Lee and Hung-Ming Chen | ||
A Global Color Transfer Scheme between Images Based on Multiple Regression Analysis | 167 |
|
Chen-Chung Liu | ||
Modified Integral Projection Method for Eye Detection Using Dynamic Time Warping | 187 |
|
Somaya Adwan and Hamzah Arof | ||
Modified Particle Swarm Optimization with Time Varying Velocity Vector | 201 |
|
Radha Thangaraj, Millie Pant, Ajith Abraham and Vaclav Snasel | ||
An Optimized Face Recognition System Using Stable Orthogonalization | 219 |
|
Imtiaz Ahmed Sajid, Mohammad Mansoor Ahmed and Mohammad Sagheer | ||
GPSO: A Framework for Optimization of Genetic Programming Classifier Expressions for Binary Classification Using Particle Swarm Optimization | 233 |
|
Hajira Jabeen and Abdul Rauf Baig | ||
Business Process Auditing on an SOA Foundation | 243 |
|
Shing-Han Li, Shih-Chih Chen, Chung-Chiang Hu, Wei-Shou Wu and Mark Hwang | ||
Comparison of Measuring Information Leakage for Fully Probabilistic Systems | 255 |
|
Donghong Sun, Yunchuan Guo, Lihua Yin and Changzhen Hu | ||
Multi-Objective Optimization for PID Controller Tuning Using the Global Ranking Genetic Algorithm | 269 |
|
Mohd Rahairi Rani, Hazlina Selamat, Hairi Zamzuri and Zuwairie Ibrahim | ||
Predicting Sequential Pattern Changes in Data Streams | 285 |
|
I-Hui Li, Jyun-Yao Huang and I-En Liao | ||
Automatic Text Extraction, Removal and Inpainting of Complex Document Images | 303 |
|
Yen-Lin Chen | ||
A Binary Image Hiding-Compression Method Using BFT Linear Quadtree and Logic-Spectra | 329 |
|
Yu-An Ho, Yung-Kuan Chan, Chwei-Shyong Tsai, Yen-Ping Chu and Hsien-Chu Wu | ||
Robust Adaptive Fuzzy Sliding Mode Control for a Class of Uncertain Discrete-Time Nonlinear Systems | 347 |
|
Tsung-Chih Lin, Shuo-Wen Chang and Chao-Hsing Hsu | ||
Selection of Proper Artificial Neural Networks for Fault Classification on Single Circuit Transmission Line | 361 |
|
Sulee Bunjongjit and Atthapol Ngaopitakkul | ||
Apply the Modulus Function to Secret Image Sharing | 375 |
|
Chi-Shiang Chan, Chih-Yang Lin and Yu-Hsuan Lin | ||
Password Cracking Based on Special Keyboard Patterns | 387 |
|
Hsien-Cheng Chou, Hung-Chang Lee, Chih-Wen Hsueh and Fei-Pei Lai | ||
Design of Stable and Quadratic-Optimal Static Output Feedback Controllers for TS-Fuzzy-Model-Based Control Systems: An Integrative Computational Approach | 403 |
|
Wen-Hsien Ho, Shinn-Horng Chen, I-Te Chen, Jyh-Horng Chou and Chun-Chin Shu | ||
A New Algorithm for Finding all Minimal Cuts in Modified Networks | 419 |
|
Wei-Chang Yeh, Hsiao-Chang Ho, Yi-Chun Chen and Yuan-Ming Yeh | ||
Constructing a T-Way Interaction Test Suite Using the Particle Swarm Optimization Approach | 431 |
|
Bestoun S. Ahmed, Kamal Z. Zamli and Chee Peng Lim | ||
Mining Condensed Sets of Frequent Episodes with More Accurate Frequencies from Complex Sequences | 453 |
|
Min Gan and Honghua Dai | ||
Real-Time Waste Paper Grading Using CBR Approach | 471 |
|
Mohammad Osiur Rahman, Aini Hussain, Edgar Scavino, M A Hannan and Hassan Basri | ||
Architecture Based Software Quality Maintenance Ripple Effect Analysis | 489 |
|
Sajid Anwar, Awais Adnan, Masoom Alam, Tamleek Ali Tanveer, Muhammad Ali, Muhammad Ramzan, Arfan Jaffer, Arshad Ali Shahid and Abdul Rauf |