| Local Directional Pattern (LDP) for Face Recognition | 2423 |
|
| Taskeed Jabid, Md. Hasanul Kabir and Oksam Chae | ||
| Fault Detection for State-Delay Fuzzy Systems Subject to Random Communication Delay | 2439 |
|
| Xiaomei Zhang, Zhenjuan Zhang and Guoping Lu | ||
| A Multi-Agent Architecture for Distributed Services and Applications | 2453 |
|
| Juan M. Corchado, Dante I. Tapia and Javier Bajo | ||
| High Capacity Robust Audio Watermarking Scheme Based on FFT and Linear Regression | 2477 |
|
| Mehdi Fallahpour and David Megias | ||
| Cellular Learning Automata for Mining Customer Behaviour in Shopping Activity | 2491 |
|
| Mansour Esmaeilpour, Vahideh Naderifar and Zarina Shukur | ||
| Robustness in Dynamic Constraint Satisfaction Problems | 2513 |
|
| Laura Climent, Miguel A. Salido and Federico Barber | ||
| Modeling and Simulation of Fuzzy Logic Controller-Based Model Reference Adaptive Controller | 2533 |
|
| R. Prakash and R. Anita | ||
| A Simplified Recursive Dynamic PCA Based Monitoring Scheme for Imperial Smelting Process | 2551 |
|
| Zhikun Hu, Zhiwen Chen, Changchun Hua, Weihua Gui, Chunhua Yang and Steven X. Ding | ||
| Evaluating Service Quality of Mobile Application Stores: A Comparison of Three Telecommunication Companies in Taiwan | 2563 |
|
| Li-Jen Yang, Tzu-Chuan Chou and Ji-Feng Ding | ||
| Optimal Inventory Model with Fuzzy Perfective Rate, Demand Rate, and Purchasing Cost under Immediate Return for Defective Items | 2583 |
|
| Wen-Kai Kevin Hsu | ||
| Multi-Recognition Combined Security System for Intelligent Car Electronics | 2599 |
|
| Gwo-Jia Jong, Peng-Liang Peng and Gwo-Jiun Horng | ||
| On Pole Placement in LMI Region for Descriptor Linear Systems | 2613 |
|
| Jianjun Bai, Hongye Su, Jing Wang and Bingxin Shi | ||
| A Novel Method for Driver Inattention Detection Using Driver Operation Signals | 2625 |
|
| Md Rizal Othman, Zhong Zhang, Takashi Imamura and Tetsuo Miyake | ||
| A Secure and Efficiency ID-Based Authenticated Key Agreement Scheme Based on Elliptic Curve Cryptosystem for Mobile Devices | 2637 |
|
| Eun-Jun Yoon, Sung-Bae Choi and Kee-Young Yoo | ||
| The Matrix Power Function and Its Application to Block Cipher S-Box Construction | 2655 |
|
| Eligijus Sakalauskas and Kestutis Luksys | ||
| Performance Enhancement of the Differential Evolution Algorithm Using Local Search and a Self-Adaptive Scaling Factor | 2665 |
|
| Ching-Hung Lee, Che-Ting Kuo and Hao-Han Chang | ||
| Bio-Inspired Multilayered and Multilanguage Arabic Script Character Recognition System | 2681 |
|
| Muhammad Imran Razzak, Syed Afaq Husain, Abdulrahman A. Mirza and Muhammad Khurram Khan | ||
| Robust H-infinity Control for Networked Systems with Parameter Uncertainties and Multiple Stochastic Sensors and Actuators Faults | 2693 |
|
| Songlin Hu, Dong Yue, Jinliang Liu and Zhaoping Du | ||
| Data Zooming for the Detection of Outliers and Subsequence Discords | 2705 |
|
| Jamal Ameen and Rawshan Basha | ||
| A Study on Efficient Group-Oriented Signature Schemes for Realistic Application Environment | 2713 |
|
| Yu-Fang Chung, Tzer-Long Chen, Tzer-Shyong Chen and Chih-Sheng Chen | ||
| Secure Business Process Modelling of SOA Applications Using ``UML-SOA-Sec'' | 2729 |
|
| Muhammad Qaiser Saleem, Jafreezal Jaafar and Mohd Fadzil Hassan | ||
| Usability Based Reliable and Cashless Payment System (RCPS) | 2747 |
|
| Shafiq ur Rehman, Jane Coughlan and Zahid Halim | ||
| Video Surveillance Using Facial Features-Based Tracking | 2761 |
|
| Ibrahim Hemdan, Stephen Karungaru and Kenji Terada | ||
| Using a Low Pass Filter to Recover Three-Dimensional Shape from Focus in the Presence of Noise | 2777 |
|
| Mannan Saeed Muhammad, Husna Mutahira and Tae-Sun Choi | ||
| Improving Performance of ACO Algorithms Using Crossover Mechanism Based on Best Tours Graph | 2789 |
|
| Aybars Ugur and Dogan Aydin | ||
| The Multi-Target Fire Distribution Strategy Research of the Anti-Air Fire Based on the Genetic Algorithm | 2803 |
|
| Chengsheng Pan, Yang Zhang, Li Yang and Shaoming Qiu | ||
| Efficient Distributed Face Recognition in Wireless Sensor Network | 2811 |
|
| Muhammad Imran Razzak, Basem. A. Elmogy, Muhammad Khurram Khan and Khaled Alghathbar | ||
| An Efficient Content Based Image Retrieval Method for Retrieving Images | 2823 |
|
| Quynh Nguyen Huu, Ha Nguyen Thi Thu and Tao Ngo Quoc | ||
| A Robust and Real-Time Visual Speech Recognition for Smartphone Application | 2837 |
|
| Min Gyu Song, Md Tariquzzaman, Jin Young Kim, Seong Taek Hwang and Seung Ho Choi | ||
| Recognizing Pathogenic Antibodies in SLE Using General Regression Neural Networks | 2855 |
|
| Mohamad Hasan Bahari, Asad Azemi, Mir Mojtaba Mirsalehi, Mahmoud Mahmoudi and Morteza Khadime | ||
| Application of Type-2 Fuzzy Logic to Rule-Based Intrusion Alert Correlation Detection | 2865 |
|
| Chenn-Jung Huang, Kai-Wen Hu, Heng-Ming Chen, Tao-Ku Chang, Yun-Cheng Luo and Yih-Jhe Lien | ||
| NURBS Curve Fitting Using Artificial Immune System | 2875 |
|
| Erkan Ulker | ||
| New Results on Asymptotic and Robust Stability of Genetic Regulatory Networks with Time-Varying Delays | 2889 |
|
| Ruixia Yan and Jinliang Liu | ||
| Design of a Dual-Input Buck-Boost Converter for Mobile Back-Lighting Applications | 2901 |
|
| Kei Eguchi, Sawai Pongswatd, Amphawan Julsereewong, Ichirou Oota, Shinya Terada and Hirofumi Sasaki | ||
| PolaritySpam: Propagating Content-Based Information Through a Web-Graph to Detect Web-Spam | 2915 |
|
| F. Javier Ortega, Jose A. Troyano, Fermin L. Cruz and Carlos G. Vallejo | ||
| Improved Arithmetic of Two-Position Fast Initial Alignment for SINS Using Unscented Kalman Filter | 2929 |
|
| Ji-zhou Lai, Jian Xiong, Jian-ye Liu and Bin Jiang |