A Clustering Ensemble Framework Based On System Energy Theory |
851-856 |
Jian Hu and Xiang-Yang Li |
|
|
|
Triangular Fuzzy Number Method for Robot Non-Vision Multi-Sensor Fusion |
857-862 |
Shuping Wan |
|
|
|
Design of Comfortable Working Environment on Bed for Bedridden People |
863-868 |
Kazuhiro Koshi, Hitomi Umeda, Kazuo Nagata, Kimiyasu Kiyota, Masazumi Miyoshi and Hiroaki Koga |
|
|
|
Numerical Computation for Identifying Nash Equilibria Using Shapley's Labeling Method |
869-875 |
Naoki Shiba |
|
|
|
Multi-Agent Simulation of Fund Circulation in an Artificial Economic System Involving Self-Adjusting Mechanism of Price, Production and Investment |
877-884 |
Shigeaki Ogibayashi and Kousei Takashima |
|
|
|
Automatic Path Search for Roving Robot Using Reinforcement Learning |
885-892 |
Shigeharu Miyata, Akira Yanou, Hitomi Nakamura and Shin Takehara |
|
|
|
Slope-Walking of a Biped Robot with K Nearest Neighbor Method |
893-898 |
Junichi Nagasue, Yasuo Konishi, Nozomu Araki, Takao Sato and Hiroyuki Ishigaki |
|
|
|
Nonlinear Control of an Underactuated Two-Link Planar Manipulator Using Unstable Property of Zerodynamics |
899-906 |
Tomohiro Henmi, Sinsaku Izumi, Mingcong Deng and Akira Inoue |
|
|
|
Grasp and Transport Control of a Chopsticks-Type Robot |
907-916 |
Yojiro Yamasaki, Toru Tsumugiwa and Ryuichi Yokogawa |
|
|
|
Extraction of Aortic Aneurysm Volume Data Based on 3-D Region Growing Method |
917-922 |
Tatsushi Tokuyasu, Norihiro Abe, Akira Marui, Shotaro Kanao and Masashi Komeda |
|
|
|
Visualization and Analysis of Mental States Based on Photoplethysmogram |
923-928 |
Ying Li and Keiichi Horio |
|
|
|
An Evidential Reasoning Approach for Learning Object Recommendation with Uncertainty |
929-935 |
Noppamas Pukkhem and Wiwat Vatanawood |
|
|
|
Multi Domain Features Based Classification of Mammogram Images Using SVM and MLP |
937-942 |
A. Jaffar, B. Ahmed, N. Naveed, A. Hussain, F. Jabeen and A. M. Mirza |
|
|
|
Restoration of Distribution Networks with Asynchronous Wind Generators |
943-948 |
Li-jun Yang and Zhi-gang Lu |
|
|
|
GDTR: A Graph-Based Domain Terms Ranking Model |
949-955 |
Chunhui Zhang, Yiming Zhou, Zhoujun Li, Wenhan Chao, Lei Shen and Qiao Sun |
|
|
|
Development of Graphical Human Interface Technology for Use in Mechatronics Experimental Module |
957-962 |
Wen-Jye Shyr |
|
|
|
Robust AVR Design Based on Mixed H2/H\/Pole Placement Using Linear Matrix Inequality (LMI) |
963-971 |
Mosleh M. Al-Harthi |
|
|
|
Robust Fuzzy Control of Nonlinear Discrete Fuzzy Impulsive Delayed Systems |
973-978 |
Haibo Jiang, Caigen Zhou and Jianjiang Yu |
|
|
|
A Novel Logistic-Based Image Encryption Scheme |
979-984 |
Guodong Ye |
|
|
|
Improved Orthogonal Matching Pursuit Algorithm with Application to Learning Dictionary |
985-991 |
Ronggen Yang and Mingwu Ren |
|
|
|
Tsallis Cross Entropy Based Automatic Threshold Selection |
993-998 |
Fangyan Nie, Chao Gao, Yongcai Guo and Min Gan |
|
|
|
Nonparametric Kernel Discriminant Analysis for Face Recognition under Varying Lighting Conditions |
999-1004 |
Jun-Bao Li |
|
|
|
Classification of Stego and PS Images Based on Wavelet Decomposition and Filtering |
1005-1010 |
Xiangyang Luo, Fenlin Liu, Xiongfei He and Chunfang Yang |
|
|
|
Image Encryption Based on DNA Splicing System and Henon Model |
1011-1018 |
Changjun Zhou, Xiaopeng Wei, Qiang Zhang and Bin Wang |
|
|
|
The Optimization Coverage Control Strategy Based on Genetic Algorithm in Wireless Sensor Networks |
1019-1024 |
Wei Qu, Jinkuan Wang, Xu Zhao and Zhigang Liu |
|
|
|
Decomposition Based Efficient Algorithms for Knowledge Reduction |
1025-1032 |
Na Jiao, Duoqian Miao and Hongyun Zhang |
|
|
|
A RBF Neural Network Based Optimization Model and Its Application in Mechanical Manufacturing Production Plan |
1033-1038 |
Jiangang Yi and Yao Li |
|
|
|
An Evolutionary Algorithm for Solving Dynamic Nonlinear Constrained Optimization |
1039-1044 |
Chun-an Liu |
|
|
|
A Method to Analyze the Difference of CAD Files |
1045-1051 |
Linghao Zou, Dongming Guo, Hang Gao, Changle Sun and Hui Wang |
|
|
|
Mechanized Analysis of Verifiable Multi-Secret Sharing in the Applied Pi-Calculus |
1053-1058 |
Hui Zhao, Mingchu Li, Kouichi Sakurai and Yizhi Ren |
|
|
|
Image Thresholding Algorithm Based on Image Gradient and Fuzzy Set Distance |
1059-1063 |
Xijuan Guo, Huanhuan Zhang and Zheng Chang |
|
|
|
HNS: Hierarchical Name System |
1065-1070 |
Fuhong Lin, Changjia Chen, Ke Xiong and Hongke Zhang |
|
|
|
Hungry Particle Swarm Optimization |
1071-1076 |
Xingjuan Cai and Zhihua Cui |
|
|
|
Model Building and Numerical Optimization for the FM-BEM Frictional Contact System |
1077-1082 |
Chunxiao Yu, Yunfeng Mu and Yiming Chen |
|
|
|
Reference View Generating of Traffic Intersection |
1083-1088 |
Yu Wang and Jien Kato |
|
|
|
Oscillation for Second-Order Neutral Difference Equations with Several Delays |
1089-1094 |
Xiaozhu Zhong, Guoqin Li and Yan Shi |
|
|
|
Equilibrium Policies Model of Ordering and Pricing in a Three-Tier Supply Chain Network |
1095-1100 |
Junxiu Jia, Hua Li and Xiangpei Hu |
|