| Optimization of the Emergency Materials Distribution Network with Time Windows in Anti-bioterrorism System |
| 3615-3624 |
| Ming Liu and Lindu Zhao |
| Abstract |
|
|
|
| Enhanced Stochastic Learning for Feature Selection in Intrusion Classification |
| 3625-3635 |
| Gil-Jong Mun, Bong-Nam Noh and Yong-Min Kim |
| Abstract |
|
|
|
| Probabilistic Production Cost Credit Evaluation of Wind Turbine Generators |
| 3637-3646 |
| Jeongje Park, Wu Liang, Jaeseok Choi, A. A. El-Keib and Junzo Watada |
| Abstract |
|
|
|
| Real-time Risk Measurement for Business Activity Monitoring (BAM) |
| 3647-3657 |
| Bokyoung Kang, Nam Wook Cho and Suk-Ho Kang |
| Abstract |
|
|
|
| Impact of Time and Costs when Determining Batch Size in a Supply Chain |
| 3659-3666 |
| Ruedee Masuchun, Kitti Tirasesth, Teerawat Thepmanee, Wiboon Masuchun, Yan Shi and Hirofumi Sasaki |
| Abstract |
|
|
|
| Application of Co-evolutionary System for Strategy Developments of Teams in the Same Generation to Team Match-up Games |
| 3667-3676 |
| Jun-ichi Kushida, Iori Nakaoka, Katsuari Kamei and Yukinobu Hoshino |
| Abstract |
|
|
|
| A PDF-matched Short-term Linear Predictability Approach to Blind Source Separation |
| 3677-3690 |
| Mahdi Khosravy, Mohammad Reza Asharif and Katsumi Yamashita |
| Abstract |
|
|
|
| A Real-Time Intelligent System for Order Processing in B2C E-Commerce |
| 3691-3706 |
| Xiangpei Hu, Xuyin Wang, Lijun Sun and Zhichao Xu |
| Abstract |
|
|
|
| A Parallel Ant Colony Optimization Algorithm Based on Fine-grained Model with GPU-acceleration |
| 3707-3716 |
| Jianming Li, Xiangpei Hu, Zhanlong Pang and Kunming Qian |
| Abstract |
|
|
|
| An Efficient Spam Filtering Method by Analyzing E-mail's Header Session Only |
| 3717-3731 |
| Jyh-Jian Sheu and Ko-Tsung Chu |
| Abstract |
|
|
|
| Stability Analysis of Fuzzy Control Systems Using Polynomial Methods |
| 3733-3744 |
| Hung-Yuan Chung and Sheng-Chung Chan |
| Abstract |
|
|
|
| A Hierarchical and Chord-based Semantic Service Discovery System in the Universal Network |
| 3745-3753 |
| Ying Zhang, Houkuan Huang, Dong Yang and Hongke Zhang |
| Abstract |
|
|
|
| Multicriteria Tradeoffs in Inventory Control Using Memetic Particle Swarm Optimization |
| 3755-3768 |
| Chin-Hsiung Hsu, Ching-Shih Tsou and Fong-Jung Yu |
| Abstract |
|
|
|
| Output Synchronization and Stability Analysis of Complex Dynamical Networks |
| 3769-3777 |
| Lifu Wang, Yuanwei Jing and Zhi Kong |
| Abstract |
|
|
|
| Evaluating Brand Equity for Container-based Ocean Carriers in Taiwan: An Empirical Study |
| 3779-3796 |
| Ji-Feng Ding |
| Abstract |
|
|
|
| Tree-trust: A Novel and Scalable P2P Reputation Model Based on Human Cognitive Psychology |
| 3797-3807 |
| Xiaoyong Li and Xiaolin Gui |
| Abstract |
|
|
|
| A Study on Fuzzy Decision and Preferred Enterprise Strategy |
| 3809-3826 |
| Yu-Fang Chung, Yuan Lung Yu and Tsung-Chin Hsiao |
| Abstract |
|
|
|
| Fault-tolerant H-infinity Filter Design of a Class of Switched Systems with Sensor Failures 3827 |
| 3827-3838 |
| Shuhui Shi, Zhonghu Yuan and Qingling Zhang |
| Abstract |
|
|
|
| H-infinity Controller Design for a Class of SISO Nonlinear Stochastic Systems without Solving HJIs |
| 3839-3848 |
| Zhongwei Lin, Yan Lin and Weihai Zhang |
| Abstract |
|
|
|
| Excluding Background Initial Segmentation for Radiographic Image Segmentation |
| 3849-3860 |
| San-Ging Shu, Hsiu-Hsia Lin, Shiau-Wei Kuo and Shyr-Shen Yu |
| Abstract |
|
|
|
| An Efficient Fair Electronic Payment System Based upon Non-signature Authenticated Encryption Scheme |
| 3861-3873 |
| Jen-Ho Yang and Chin-Chen Chang |
| Abstract |
|
|
|
| An Iterative Based Novel Multi-nucleus Detection Scheme for Protozoan Parasite Microscopic Images |
| 3875-3886 |
| Ching-Hao Lai, Hsiao-Yu Wang, Yi-Chuan Tsai and Shyr-Shen Yu |
| Abstract |
|
|
|
| Fast Randomization Schemes for Chaum Blind Signatures |
| 3887-3900 |
| Chun-I Fan, Chih-I Wang and Wei-Zhe Sun |
| Abstract |
|
|
|
| A Secure mCoupon Scheme Using Near Field Communication |
| 3901-3909 |
| Han-Cheng Hsiang, Hsiang-Chou Kuo and Wei-Kuan Shih |
| Abstract |
|
|
|
| An Efficient and Provably Secure Id-based Signature Scheme with Batch Verifications |
| 3911-3922 |
| Yuh-Min Tseng, Tsu-Yang Wu and Jui-Di Wu |
| Abstract |
|
|
|
| A New Design of Cryptographic Key Management for HIPAA Privacy and Security Regulations |
| 3923-3931 |
| Hui-Feng Huang, Kuo-Ching Liu and Hsin-Wei Wang |
| Abstract |
|
|
|
| Growing Radial Basis Function Networks Using Genetic Algorithm and Orthogonalization |
| 3933-3948 |
| Cheol W. Lee and Yung C. Shin |
| Abstract |
|
|
|
| Robust Task-space Control of Robot Manipulators under Imperfect Transformation of Control Space |
| 3949-3960 |
| Mohammad Mehdi Fateh and Mohammad Reza Soltanpour |
| Abstract |
|
|
|
| An Effective Immune Algorithm for Multiple-valued Logic Minimization Problems |
| 3961-3969 |
| Shangce Gao, Zheng Tang and Catherine Vairappan |
| Abstract |
|
|
|
| Optimized Ordering Strategy for Food Supply Chain with Bidirectional Options |
| 3971-3982 |
| Lindu Zhao, Zhi Li and Ming Liu |
| Abstract |
|
|
|
| Fast Deblocking Filter Implementation Method for H.264/AVC |
| 3983-3993 |
| Tian Song, Yoshinori Hayashi and Takashi Shimamoto |
| Abstract |
|
|
|
| Parameter Self-tuning Based Industrial Batching and Weighting Control System |
| 3995-4005 |
| Bailin Hang and Lianming Sun |
| Abstract |
|
|
|
| Simulation Modeling Method of Batch Annealing Production Scheduling Problem Based on SystemC |
| 4007-4016 |
| Zhigang Wang, Quanli Liu and Wei Wang |
| Abstract |
|
|
|
| Evolution of Neural Controllers in Real Mobile Robots for Task Switching Behaviors |
| 4017-4024 |
| Genci Capi and Shin-ichiro Kaneko |
| Abstract |
|
|
|
| Midpoint Validation Method for Support Vector Machines with Margin Adjustment Technique |
| 4025-4032 |
| Hiroki Tamura and Koichi Tanno |
| Abstract |