Local Directional Pattern (LDP) for Face Recognition | 2423 |
|
Taskeed Jabid, Md. Hasanul Kabir and Oksam Chae | ||
Fault Detection for State-Delay Fuzzy Systems Subject to Random Communication Delay | 2439 |
|
Xiaomei Zhang, Zhenjuan Zhang and Guoping Lu | ||
A Multi-Agent Architecture for Distributed Services and Applications | 2453 |
|
Juan M. Corchado, Dante I. Tapia and Javier Bajo | ||
High Capacity Robust Audio Watermarking Scheme Based on FFT and Linear Regression | 2477 |
|
Mehdi Fallahpour and David Megias | ||
Cellular Learning Automata for Mining Customer Behaviour in Shopping Activity | 2491 |
|
Mansour Esmaeilpour, Vahideh Naderifar and Zarina Shukur | ||
Robustness in Dynamic Constraint Satisfaction Problems | 2513 |
|
Laura Climent, Miguel A. Salido and Federico Barber | ||
Modeling and Simulation of Fuzzy Logic Controller-Based Model Reference Adaptive Controller | 2533 |
|
R. Prakash and R. Anita | ||
A Simplified Recursive Dynamic PCA Based Monitoring Scheme for Imperial Smelting Process | 2551 |
|
Zhikun Hu, Zhiwen Chen, Changchun Hua, Weihua Gui, Chunhua Yang and Steven X. Ding | ||
Evaluating Service Quality of Mobile Application Stores: A Comparison of Three Telecommunication Companies in Taiwan | 2563 |
|
Li-Jen Yang, Tzu-Chuan Chou and Ji-Feng Ding | ||
Optimal Inventory Model with Fuzzy Perfective Rate, Demand Rate, and Purchasing Cost under Immediate Return for Defective Items | 2583 |
|
Wen-Kai Kevin Hsu | ||
Multi-Recognition Combined Security System for Intelligent Car Electronics | 2599 |
|
Gwo-Jia Jong, Peng-Liang Peng and Gwo-Jiun Horng | ||
On Pole Placement in LMI Region for Descriptor Linear Systems | 2613 |
|
Jianjun Bai, Hongye Su, Jing Wang and Bingxin Shi | ||
A Novel Method for Driver Inattention Detection Using Driver Operation Signals | 2625 |
|
Md Rizal Othman, Zhong Zhang, Takashi Imamura and Tetsuo Miyake | ||
A Secure and Efficiency ID-Based Authenticated Key Agreement Scheme Based on Elliptic Curve Cryptosystem for Mobile Devices | 2637 |
|
Eun-Jun Yoon, Sung-Bae Choi and Kee-Young Yoo | ||
The Matrix Power Function and Its Application to Block Cipher S-Box Construction | 2655 |
|
Eligijus Sakalauskas and Kestutis Luksys | ||
Performance Enhancement of the Differential Evolution Algorithm Using Local Search and a Self-Adaptive Scaling Factor | 2665 |
|
Ching-Hung Lee, Che-Ting Kuo and Hao-Han Chang | ||
Bio-Inspired Multilayered and Multilanguage Arabic Script Character Recognition System | 2681 |
|
Muhammad Imran Razzak, Syed Afaq Husain, Abdulrahman A. Mirza and Muhammad Khurram Khan | ||
Robust H-infinity Control for Networked Systems with Parameter Uncertainties and Multiple Stochastic Sensors and Actuators Faults | 2693 |
|
Songlin Hu, Dong Yue, Jinliang Liu and Zhaoping Du | ||
Data Zooming for the Detection of Outliers and Subsequence Discords | 2705 |
|
Jamal Ameen and Rawshan Basha | ||
A Study on Efficient Group-Oriented Signature Schemes for Realistic Application Environment | 2713 |
|
Yu-Fang Chung, Tzer-Long Chen, Tzer-Shyong Chen and Chih-Sheng Chen | ||
Secure Business Process Modelling of SOA Applications Using ``UML-SOA-Sec'' | 2729 |
|
Muhammad Qaiser Saleem, Jafreezal Jaafar and Mohd Fadzil Hassan | ||
Usability Based Reliable and Cashless Payment System (RCPS) | 2747 |
|
Shafiq ur Rehman, Jane Coughlan and Zahid Halim | ||
Video Surveillance Using Facial Features-Based Tracking | 2761 |
|
Ibrahim Hemdan, Stephen Karungaru and Kenji Terada | ||
Using a Low Pass Filter to Recover Three-Dimensional Shape from Focus in the Presence of Noise | 2777 |
|
Mannan Saeed Muhammad, Husna Mutahira and Tae-Sun Choi | ||
Improving Performance of ACO Algorithms Using Crossover Mechanism Based on Best Tours Graph | 2789 |
|
Aybars Ugur and Dogan Aydin | ||
The Multi-Target Fire Distribution Strategy Research of the Anti-Air Fire Based on the Genetic Algorithm | 2803 |
|
Chengsheng Pan, Yang Zhang, Li Yang and Shaoming Qiu | ||
Efficient Distributed Face Recognition in Wireless Sensor Network | 2811 |
|
Muhammad Imran Razzak, Basem. A. Elmogy, Muhammad Khurram Khan and Khaled Alghathbar | ||
An Efficient Content Based Image Retrieval Method for Retrieving Images | 2823 |
|
Quynh Nguyen Huu, Ha Nguyen Thi Thu and Tao Ngo Quoc | ||
A Robust and Real-Time Visual Speech Recognition for Smartphone Application | 2837 |
|
Min Gyu Song, Md Tariquzzaman, Jin Young Kim, Seong Taek Hwang and Seung Ho Choi | ||
Recognizing Pathogenic Antibodies in SLE Using General Regression Neural Networks | 2855 |
|
Mohamad Hasan Bahari, Asad Azemi, Mir Mojtaba Mirsalehi, Mahmoud Mahmoudi and Morteza Khadime | ||
Application of Type-2 Fuzzy Logic to Rule-Based Intrusion Alert Correlation Detection | 2865 |
|
Chenn-Jung Huang, Kai-Wen Hu, Heng-Ming Chen, Tao-Ku Chang, Yun-Cheng Luo and Yih-Jhe Lien | ||
NURBS Curve Fitting Using Artificial Immune System | 2875 |
|
Erkan Ulker | ||
New Results on Asymptotic and Robust Stability of Genetic Regulatory Networks with Time-Varying Delays | 2889 |
|
Ruixia Yan and Jinliang Liu | ||
Design of a Dual-Input Buck-Boost Converter for Mobile Back-Lighting Applications | 2901 |
|
Kei Eguchi, Sawai Pongswatd, Amphawan Julsereewong, Ichirou Oota, Shinya Terada and Hirofumi Sasaki | ||
PolaritySpam: Propagating Content-Based Information Through a Web-Graph to Detect Web-Spam | 2915 |
|
F. Javier Ortega, Jose A. Troyano, Fermin L. Cruz and Carlos G. Vallejo | ||
Improved Arithmetic of Two-Position Fast Initial Alignment for SINS Using Unscented Kalman Filter | 2929 |
|
Ji-zhou Lai, Jian Xiong, Jian-ye Liu and Bin Jiang |