| Risk Sensitive FIR Filters for Stochastic Discrete-Time State Space Models | 1 |
|
| Soohee Han | ||
| Michigan Versus Pittsburg Approach: A Comparison for Market Selection Problem | 13 |
|
| Ata-Ul-Waheed and A. R. Baig | ||
| To Bound Search Space and Boost Performance of Learning Classifier Systems: A Rough Set Approach | 33 |
|
| Farzaneh Shoeleh, Ali Hamzeh and Sattar Hashemi | ||
| A Scalable Routing for Delay-Tolerant Heterogeneous Networks | 49 |
|
| Chenn-Jung Huang, Heng-Ming Chen, Chin-Fa Lin, Jia-Jian Liao, Kai-Wen Hu, Dian-Xiu Yang, Chun-Hua Chen and Yi-Ta Chuang | ||
| Control Design for Tele-Operation System with Time-Varying and Stochastic Communication Delays | 61 |
|
| Yu Kang, Zhijun Li, Weike Shang and Hongsheng Xi | ||
| Prioritizing Service Attributes for Improvement Using Fuzzy Zone of Tolerance | 75 |
|
| Hung-Chung Chang, Gin-Shuh Liang, Ching-Wu Chu and Chen-Hui Chou | ||
| Resonance Vibration Analysis in Double Acting Arm Using FEM with PSO Based Non-Uniform Refinement | 91 |
|
| Somyot Kaitwanidvilai and Issarachai Ngamroo | ||
| HERMIT: A New Methodology for Creating Autonomous Software Deployment Packages | 107 |
|
| Umar Manzoor, Samia Nefti and AH Jones | ||
| Master-Slave Chaos Synchronization Using an Adaptive Dynamic Sliding-Mode Neural Control System | 121 |
|
| Chun-Fei Hsu, Chien-Jung Chiu and Jang-Zern Tsai | ||
| A New Data Hiding Scheme Based on DNA Sequence | 139 |
|
| Cheng Guo, Chin-Chen Chang and Zhi-Hui Wang | ||
| A Fast Randomized Method for Efficient Circle/Arc Detection | 151 |
|
| Shih-Hsuan Chiu, Kuo-Hung Lin, Che-Yen Wen, Jun-Huei Lee and Hung-Ming Chen | ||
| A Global Color Transfer Scheme between Images Based on Multiple Regression Analysis | 167 |
|
| Chen-Chung Liu | ||
| Modified Integral Projection Method for Eye Detection Using Dynamic Time Warping | 187 |
|
| Somaya Adwan and Hamzah Arof | ||
| Modified Particle Swarm Optimization with Time Varying Velocity Vector | 201 |
|
| Radha Thangaraj, Millie Pant, Ajith Abraham and Vaclav Snasel | ||
| An Optimized Face Recognition System Using Stable Orthogonalization | 219 |
|
| Imtiaz Ahmed Sajid, Mohammad Mansoor Ahmed and Mohammad Sagheer | ||
| GPSO: A Framework for Optimization of Genetic Programming Classifier Expressions for Binary Classification Using Particle Swarm Optimization | 233 |
|
| Hajira Jabeen and Abdul Rauf Baig | ||
| Business Process Auditing on an SOA Foundation | 243 |
|
| Shing-Han Li, Shih-Chih Chen, Chung-Chiang Hu, Wei-Shou Wu and Mark Hwang | ||
| Comparison of Measuring Information Leakage for Fully Probabilistic Systems | 255 |
|
| Donghong Sun, Yunchuan Guo, Lihua Yin and Changzhen Hu | ||
| Multi-Objective Optimization for PID Controller Tuning Using the Global Ranking Genetic Algorithm | 269 |
|
| Mohd Rahairi Rani, Hazlina Selamat, Hairi Zamzuri and Zuwairie Ibrahim | ||
| Predicting Sequential Pattern Changes in Data Streams | 285 |
|
| I-Hui Li, Jyun-Yao Huang and I-En Liao | ||
| Automatic Text Extraction, Removal and Inpainting of Complex Document Images | 303 |
|
| Yen-Lin Chen | ||
| A Binary Image Hiding-Compression Method Using BFT Linear Quadtree and Logic-Spectra | 329 |
|
| Yu-An Ho, Yung-Kuan Chan, Chwei-Shyong Tsai, Yen-Ping Chu and Hsien-Chu Wu | ||
| Robust Adaptive Fuzzy Sliding Mode Control for a Class of Uncertain Discrete-Time Nonlinear Systems | 347 |
|
| Tsung-Chih Lin, Shuo-Wen Chang and Chao-Hsing Hsu | ||
| Selection of Proper Artificial Neural Networks for Fault Classification on Single Circuit Transmission Line | 361 |
|
| Sulee Bunjongjit and Atthapol Ngaopitakkul | ||
| Apply the Modulus Function to Secret Image Sharing | 375 |
|
| Chi-Shiang Chan, Chih-Yang Lin and Yu-Hsuan Lin | ||
| Password Cracking Based on Special Keyboard Patterns | 387 |
|
| Hsien-Cheng Chou, Hung-Chang Lee, Chih-Wen Hsueh and Fei-Pei Lai | ||
| Design of Stable and Quadratic-Optimal Static Output Feedback Controllers for TS-Fuzzy-Model-Based Control Systems: An Integrative Computational Approach | 403 |
|
| Wen-Hsien Ho, Shinn-Horng Chen, I-Te Chen, Jyh-Horng Chou and Chun-Chin Shu | ||
| A New Algorithm for Finding all Minimal Cuts in Modified Networks | 419 |
|
| Wei-Chang Yeh, Hsiao-Chang Ho, Yi-Chun Chen and Yuan-Ming Yeh | ||
| Constructing a T-Way Interaction Test Suite Using the Particle Swarm Optimization Approach | 431 |
|
| Bestoun S. Ahmed, Kamal Z. Zamli and Chee Peng Lim | ||
| Mining Condensed Sets of Frequent Episodes with More Accurate Frequencies from Complex Sequences | 453 |
|
| Min Gan and Honghua Dai | ||
| Real-Time Waste Paper Grading Using CBR Approach | 471 |
|
| Mohammad Osiur Rahman, Aini Hussain, Edgar Scavino, M A Hannan and Hassan Basri | ||
| Architecture Based Software Quality Maintenance Ripple Effect Analysis | 489 |
|
| Sajid Anwar, Awais Adnan, Masoom Alam, Tamleek Ali Tanveer, Muhammad Ali, Muhammad Ramzan, Arfan Jaffer, Arshad Ali Shahid and Abdul Rauf |