Extraction and Screening of Knee Joint Vibroarthrographic Signals Using the Independent Component Analysis Method | 7501 |
|
Jien-Chen Chen, Pi-Cheng Tung, Shih-Fong Huang, Shu-Wei Wu and Shih-Lin Lin | ||
WikiIdRank: An Unsupervised Approach for Entity Linking Based on Instance Co-Occurrence | 7519 |
|
Norberto Fernandez, Jesus A. Fisteus, Luis Sanchez and Damaris Fuentes-Lorenzo | ||
General Pattern Learning and Recognition Using Genetically-Optimized Training of a Biased ARTMAP Ensemble Voting System | 7543 |
|
Chu Kiong Loo, Wei Shiung Liew and Md. Shohel Sayeed | Full Text | |
Energy-Efficient Reprogramming in WSN Using Constructive Neural Networks | 7561 |
|
Daniel Urda Munoz, Eduardo Canete Carmona, Jose Luis Subirats Contreras, Leonardo Franco, Luis Manuel Llopis Torres and Jose Manuel Jerez Aragones | Full Text | |
A Supervised Learning Approach for Automatic Keyphrase Extraction | 7579 |
|
Muhammad Abulaish and Tarique Anwar | Full Text | |
A Cross-Layer Control Method for Network Lifetime Maximization in Wireless Sensor Networks | 7603 |
|
Jain-Shing Liu | Full Text | |
Robust Speed Control for a Variable Speed Wind Turbine | 7627 |
|
Oscar Barambones, Jose Maria Gonzalez de Durana and Manuel De la Sen | Full Text | |
The Multi-Hop Cluster Transmission of Information Method for Solving the Low Connectivity Problem in Wireless Sensor Networks with Non-Uniform Density | 7641 |
|
Ali Shanoon, Tat-Chee Wan and Wafaa Obeed | Full Text | |
Multi-Function Automatic Measurement Platform | 7663 |
|
Kai-Chao Yao, Jiunn-Shiou Fang and Wei-Tzer Huang | Full Text | |
A Collaborative Fuzzy-Neural System for Global CO2 Concentration Forecasting | 7679 |
|
Toly Chen | Full Text | |
The Optimal Parameter Design for a Blood Supply Chain System by the Taguchi Method | 7697 |
|
Yi-Chang Li and Hung-Chang Liao | Full Text | |
An Effective Application of Contextual Information Using Adjacency Pairs and a Discourse Stack for Speech-Act Classification | 7713 |
|
Kyungsun Kim, Youngjoong Ko and Jungyun Seo | Full Text | |
Emotion Recognition by a Novel Triangular Facial Feature Extraction Method | 7729 |
|
Kuan-Chieh Huang, Yau-Hwang Kuo and Mong-Fong Horng | Full Text | |
Backstepping Control Design for a Continuous-Stirred Tank | 7747 |
|
Saleh Alshamali and Mohamed Zribi | Full Text | |
Implementation of PID Controller Tuning Using Differential Evolution and Genetic Algorithms | 7761 |
|
Mohd Sazli Saad, Hishamuddin Jamaluddin and Intan Zaurah Mat Darus | Full Text | |
MagicLearning: A Serious Game for Learning Based in a Magic World | 7781 |
|
Pedro J. Munoz-Merino, Francisco Martinez Sanchez, Mario Munoz-Organero and Carlos Delgado Kloos | Full Text | |
Using Multi-Angles Evolutionary Algorithms for Training TSK-Type Neuro-Fuzzy Networks | 7793 |
|
Pei-Chia Hung, Sheng-Fuu Lin and Yung-Chi Hsu | Full Text | |
DSM: A Data Service Middleware for Sharing Data in Peer-to-Peer Computing Environments | 7819 |
|
Sofien Gannouni, Mutaz Beraka and Hassan Mathkour | Full Text | |
An Integration Framework for Haptic Feedback to Improve Facial Expression on Virtual Human | 7829 |
|
Ahmad Hoirul Basori, Abdullah Bade, Mohd Shahrizal Sunar, Nadzaari Saari, Daut Daman and Md Sah Hj Salam | Full Text | |
New Intermediate Quaternion Based Control of Spacecraft: Part II - Global Attitude Tracking | 7853 |
|
Wen Chuan Cai and Yong Duan Song | Full Text | |
An Evaluation Model of Information Security Management of Medical Staff | 7865 |
|
Kuo-Hsiung Liao and Hao-En Chueh | Full Text | |
An Approach for User Authentication on Non-Keyboard Devices Using Mouse Click Characteristics and Statistical-Based Classification | 7875 |
|
Cheng-Jung Tsai, Ting-Yi Chang, Yu-Ju Yang, Meng-Sung Wu and Yu-Chiang Li | Full Text | |
Fast Hashing Function Based on Multi-Pipeline Hash Construction (MPHC) | 7887 |
|
Ola A. Al-wesabi, Azman Samsudin and Nibras Abdullah | Full Text | |
Mining Roles Using Attributes of Permissions | 7909 |
|
Ruixuan Li, Wei Wang, Xiaopu Ma, Xiwu Gu and Kunmei Wen | Full Text | |
Risk-Based Decision Making for Public Key Infrastructures Using Fuzzy Logic | 7925 |
|
Carlos Ganan, Jose L. Munoz, Oscar Esparza, Jorge Mata-Diaz and Juanjo Alins | Full Text | |
An Efficient Sealed-Bid Auction Protocol with Bid Privacy and Bidder Privacy | 7943 |
|
Wenbo Shi | Full Text | |
A Trust Mechanism for Web Services Registries Data Exchanging | 7955 |
|
Chi-Hua Chen, Ding-Yuan Cheng, Bon-Yeh Lin, Yin-Jung Lu and Chi-Chun Lo | Full Text | |
Towards Formal Security Analysis of Decentralized Information Flow Control Policies | 7969 |
|
Zhi Yang, Lihua Yin, Shuyuan Jin and MiYi Duan | Full Text | |
Privacy-Preserving Authentication Using Fingerprint | 7983 |
|
Quan Feng, Fei Su and Anni Cai | Full Text | |
Information Security Risk Assessment: Bayesian Prioritization for AHP Group Decision Making | 8001 |
|
Zeynep Filiz Eren-Dogu and Can Cengiz Celikoglu | Full Text | |
Technical Issues and Challenges of Biometric Applications as Access Control Tools of Information Security | 8015 |
|
Sharifah Mumtazah Syed Ahmad, Borhanuddin Mohd Ali and Wan Azizun Wan Adnan | Full Text |