| The Improvement of all-Digital Amplitude-Locked Loop Separation Analysis Combined MIMO System | 1001 |
|
| Gwo-Jia Jong and Gwo-Jiun Horng | Abstract | |
| Value Based Intelligent Requirement Prioritization (VIRP): Expert Driven Fuzzy Logic Based Prioritization Technique | 1017 |
|
| Muhammad Ramzan, M. Arfan Jaffar and Arshad Ali Shahid | Abstract | |
| Generalization of Proxy Signature Based on Factorization | 1039 |
|
| Cheng-Chi Lee, Tzu-Chun Lin, Shiang-Feng Tzeng and Min-Shiang Hwang | Abstract | |
| A Novel High Capacity 3D Steganographic Algorithm | 1055 |
|
| Meng-Tsan Li, Nien-Ching Huang and Chung-Ming Wang | Abstract | |
| Real-Time Decentralized Neural Block Control: Application to a Two DOF Robot Manipulator | 1075 |
|
| R. Garcia-Hernandez, E. N. Sanchez, E. Bayro-Corrochano, V. Santibanez and Jose A. Ruz-Hernandez | Abstract | |
| A Supervising Authenticated Encryption Scheme for Multilevel Security | 1087 |
|
| Chien-Lung Hsu, Liang-Peng Chang and Tzong-Chen Wu | Abstract | |
| Aesthetic Emotions in Human-Robot Interaction. Implications on Interaction Design of Robotic Artists | 1097 |
|
| Catalin Buiu and Nirvana Popescu | Abstract | |
| Modeling, Design and Experiment of Improved Super-Mini Underwater Robot | 1109 |
|
| Xin Song, Zao-Jian Zou and Jia-Wei Ye | Abstract | |
| Design and Approximation Capabilities Analysis of Time-Variant Fuzzy Systems | 1121 |
|
| Degang Wang, Wenyan Song and Hongxing Li | Abstract | |
| Encoding Prior Knowledge into Data Driven Design of Interval Type-2 Fuzzy Logic Systems | 1133 |
|
| Chengdong Li, Jianqiang Yi and Tiechao Wang | Abstract | |
| Generation and Application of Decision Rules within Dominance-Based Rough Set Approach to Multicriteria Sorting | 1145 |
|
| Liping An, Zengqiang Chen and Lingyun Tong | Abstract | |
| Automatic Classification of Driving Mental Fatigue with EEG by Wavelet Packet Energy and KPCA-SVM | 1157 |
|
| Chunlin Zhao, Chongxun Zheng, Min Zhao, Jianping Liu and Yaling Tu | Abstract | |
| 3D Triangle Mesh Compression Based on Vector Quantization with k-Ring Vector Prediction | 1169 |
|
| Lin-Lin Tang, Zhe-Ming Lu, Fa-Xin Yu, Ping-Hui Wang and Zhen Li | Abstract | |
| An Efficient Simulated Annealing with a Valid Solution Mechanism for TDMA Broadcast Scheduling Problem | 1181 |
|
| Gon Kim, Sung Soo Kim, Il-Hwan Kim, Dong Hoi Kim, V. Mani and Jae-Ki Moon | Abstract | |
| Scalable and Systolic Dual Basis Multiplier over GF(2m) 1193 | 1193 |
|
| Liang-Hwa Chen, Po-Lun Chang, Chiou-Yng Lee and Ying-Kuei Yang | Abstract | |
| A Fuzzy-Based Rough Sets Classifier for Forecasting Quarterly PGR in the Stock Market (Part II) | 1209 |
|
| Ching-Hsue Cheng and You-Shyang Chen | Abstract | |
| Re-Evaluation of Adaptive Control Charts: A Cost-Effectiveness Perspective | 1229 |
|
| Yan-Kwang Chen, Hung-Chang Liao and Hsu-Hwa Chang | Abstract | |
| Inventory Management in a (Q,r) Inventory Model with Two Demand Classes and Flexible Delivery | 1243 |
|
| Shuo Huang, Bo Liao and David J. Robb | Abstract | |
| A Novel Text Watermarking Algorithm Using Image Watermark | 1255 |
|
| Zunera Jalil, M. Arfan Jaffar and Anwar M. Mirza | Abstract | |
| An Efficient and Secure Three-Pass Authenticated Key Agreement Elliptic Curve Based Protocol | 1273 |
|
| Zeyad Mohammad, Chien-Lung Hsu, Yaw-Chung Chen and Chi-Chun Lo | Abstract | |
| Indicator of the Quality of the Sensor Set Up: A Study Using Surface EMG on Sub-Band ICA | 1285 |
|
| Ganesh R Naik and Dinesh K Kumar | Abstract | |
| H-infinity Filtering for Markovian Jump Systems with Time-Varying Delays | 1299 |
|
| Jinliang Liu, Zhou Gu and Songlin Hu | Abstract | |
| Surface Texture Characterization of Fibers Using Fractional Brownian Motion Model | 1311 |
|
| Jiun-Jian Liaw, Chuan-Pin Lu and Lin-Huang Chang | Abstract | |
| Power Grid Node and Line Delta Centrality Measures for Selection of Critical Lines in Terms of Blackouts with Cascading Failures | 1321 |
|
| Hwachang Song, Rodel D. Dosano and Byongjun Lee | Abstract | |
| Optimizing MIMO-SDMA Smart Antennas by Using Linear Array Phase Perturbations Based on Particle Swarm Optimization | 1331 |
|
| Chao-Hsing Hsu | Abstract | |
| An Environmental Visual Features Based Navigation Method for Autonomous Mobile Robots | 1341 |
|
| Fairul Azni Jafar, Yasunori Suzuki, Yuki Tateno, Kazutaka Yokota and Takeshi Matsuoka | Abstract | |
| Observer-Based Iterative Learning Control with Evolutionary Programming Algorithm for MIMO Nonlinear Systems | 1357 |
|
| Yan-Yi Du, Jason Sheng-Hong Tsai, Shu-Mei Guo, Te-Jen Su and Chia-Wei Chen | Abstract | |
| Reversible Data Hiding for VQ Indices Using Prediction Errors | 1375 |
|
| Zhi-hui Wang, Chin-Chen Chang, Huynh Ngoc Tu and Ming-Chu Li | Abstract | |
| A Novel Technique for Designing Decentralized Stabilizers for Robust Control in Power Systems Using an H-infinity Criterion | 1387 |
|
| Alexandre C. Castro, Jose M. Araujo, Eduardo T. F. Santos, Fabricio G. S. Silva and Clivaldo S. de Araujo | Abstract | |
| A Study of Three Novel Line-Based Techniques for Multi-Target Selection | 1397 |
|
| Jibin Yin and Xiangshi Ren | Abstract | |
| A Novel Modal Series Representation Approach to Solve a Class of Nonlinear Optimal Control Problems | 1413 |
|
| Amin Jajarmi, Naser Pariz, Ali Vahidian Kamyad and Sohrab Effati | Abstract | |
| Adaptive Frame Length Method for Hardware Context-Switching in Dynamic Partial Self-Reconfigurable Systems | 1427 |
|
| Trong-Yen Lee, Che-Cheng Hu, Yang-Kun Huang and Chia-Chun Tsai | Abstract | |
| An ID-Based Access Control in a Hierarchical Key Management for Mobile Agent | 1443 |
|
| Chia-Hui Liu, Yu-Fang Chung, Tzer-Shyong Chen and Sheng-De Wang | Abstract | |
| Meaningful Shadow Based Multiple Gray Level Visual Cryptography without Size Expansion | 1457 |
|
| Pei-Yan Pai, Chin-Chen Chang, Yung-Kuan Chan and Chi-Cheng Liao | Abstract | |
| Service-Oriented Routing and Clustering Strategies for Vehicle Infotainment Dissemination | 1467 |
|
| Chenn-Jung Huang, Chin-Fa Lin, Ching-Yu Li, Che-Yu Lee, Heng-Ming Chen, Hung-Yen Shen, You-Jia Chen and I-Fan Chen | Abstract | |
| An Optimal Fuzzy Controller for a High-Performance Drilling Process Implemented Over an Industrial Network | 1481 |
|
| Rodolfo E. Haber, Agustin Gajate, Steven Y. Liang, Rodolfo Haber-Haber and Raul M. del Toro | Abstract | |
| New Secret Key Traitor Tracing Scheme with Dispute Settlement from Bilinear Maps | 1499 |
|
| Kuo-Yu Tsai, Tzong-Chen Wu and Chien-Lung Hsu | Abstract |