Normalized IV-Distance, IV-Similarity Measure, IV-Entropy and IV-Inclusion Measure of Interval-Valued Fuzzy Sets and Their Relationship |
1405-1410 |
Wenyi Zeng, Yibin Zhao and Xianchuan Yu |
|
|
|
Electro-Ocular Measurement and Control Technique by Integrating Virtual Instrument |
1411-1416 |
Kai-Chao Yao and Wei-Tzer Huang |
|
|
|
Normal Vector-Controlled Particle Swarm Optimization Algorithm for Solving Bi-Level Linear Programming Problem |
1417-1423 |
Ren-Jieh Kuo, C. C. Huang and Tung-Lai Hu |
|
|
|
An Empirical Study of the Relationship between Complementary Resources and IT Capability: A Resource-Based Perspective |
1425-1430 |
Wenli Li, Shijie Li and Yulong Ke |
|
|
|
Forecasting in Time Series Based on Generalized Fuzzy Logical Relationship |
1431-1438 |
Wangren Qiu, Xiaodong Liu and Lidong Wang |
|
|
|
A Novel Image Encryption Algorithm Based on Double Hyper-Chaotic Systems |
1439-1444 |
Enzeng Dong, Zaiping Chen, Zengqiang Chen, Haifen Li and Chengyi Xia |
|
|
|
Design of an Inductor-Based WLED Driver Using Clean Energy Power Supplies |
1445-1450 |
Kei Eguchi, Sawai Pongswatd, Toshiya Watanabe, Hongbing Zhu, Kitti Tirasesth and Hirofumi Sasaki |
|
|
|
Proposal for Fuzzy-Based 3D Region Growing Method and Its Application for Computer-Aided Diagnosis System |
1451-1455 |
Tatsushi Tokuyasu, Takashi Shuto, Kenji Yufu, Shotaro Kanao, Akira Marui and Masashi Komeda |
|
|
|
Virtual Unitary-ESPRIT Algorithm for Joint DOD and DOA Estimation in Bistatic MIMO Radar |
1457-1463 |
Fulai Liu, Changyin Sun, Jinkuan Wang and Ruiyan Du |
|
|
|
Situation Distributions in a Special 3-Person 0-1 Game with Entropy |
1465-1469 |
Dianyu Jiang |
|
|
|
Fuzzy Similarity Inference Method and Its Application in Fuzzy System Modeling |
1471-1476 |
Degang Wang, Wenyan Song and Hongxing Li |
|
|
|
Word Sense Disambiguation of English Modal Verbs by Support Vector Machines |
1477-1482 |
Jianping Yu, Liang Huang and Jilin Fu |
|
|
|
Two-Way Query Log: A Block-Level Continuous Data Protection Indexing Structure |
1483-1488 |
Guangjun Wu, Shupeng Wang, Binxing Fang, Xiaochun Yun and Xiangzhan Yu |
|
|
|
The Enhancement of Stereoscopic Image and Hologram Based on Post-Processing of Depth and Color |
1489-1494 |
Hyunjun Choi, Dong Hoi Kim, Kwanwook Lee and Manbae Kim |
|
|
|
Infrared Small Target Detection and Tracking Based on Mathematical Morphology |
1495-1500 |
Xiangzhi Bai, Fugen Zhou, Ting Jin and Zhaoying Liu |
|
|
|
Rendezvous of Multi-Agents with Nonlinear Inner-Coupling Functions |
1501-1507 |
Qing Zhang, Zhengquan Yang and Zengqiang Chen |
|
|
|
The Parameterization of all Disturbance Observers for Discrete-Time Systems |
1509-1514 |
Iwanori Murakami, Kou Yamada, Tatsuya Sakanushi, Takaaki Hagiwara, Yoshinori Ando, Da Zhi Gong and Masahiko Kobayashi |
|
|
|
Tolerance and Similarity Relations in Definition of Rough Approximations |
1515-1520 |
Liping An and Zengqiang Chen |
|
|
|
Adaptive Support of e-Portfolio Knowledge for Student Ubiquitous Learning |
1521-1527 |
Chih-Kun Ke, Wei-Tu Chen and Mei-Yu Wu |
|
|
|
A New Computation Method of the Geometric Properties for Range Data |
1529-1535 |
Yi An, Cheng Shao, Xiaoliang Wang and Zhuohan Li |
|
|
|
The Optimization of Decision Tree Building Algorithm in Topological Relations Query |
1537-1542 |
Wenbin Wang, Wenyuan Liu and Shiwei Gao |
|
|
|
Decoupling Control of 2-Link Manipulator |
1543-1548 |
Linfeng Lan and Ryuichi Oguro |
|
|
|
Stopping Automated Injection Attack Tools Based on Navigational Behavior |
1549-1554 |
Jan-Min Chen |
|
|
|
A Collaborative Distributed Strategy for Target Tracking in Wireless Sensor Networks |
1555-1560 |
Qinghua Gao, Minglu Jin, Jie Wang and Wenlong Liu |
|
|
|
A Model for Position Relation between Regions |
1561-1566 |
Miao Wang and Zhongxiao Hao |
|
|
|
Fuzzy Concept Lattice Construction and Bordat Method |
1567-1572 |
Yinghui Huang, Guanyu Li and Dan Wang |
|
|
|
Determining the Sources of Variance Shifts in a Multivariate Process Using Flexible Discriminant Analysis |
1573-1578 |
Yuehjen E. Shao, Hsiao-Yun Huang and Ying-Jen Chen |
|
|
|
Set Stabilization of Chua's Circuit via Hybrid Control Strategy |
1579-1584 |
Xiangze Lin, Yongqian Ding and Shihua Li |
|
|
|
An Efficient Motion Estimation Algorithm for H.264/AVC Encoder by Using New Searching Strategy |
1585-1590 |
Jinqing Qi, Hao Wu and Yan Yu |
|
|
|
An Improved Hammerstein Predistorter for Power Amplifier with Memory Effects |
1591-1596 |
Xiujie Si, Minglu Jin and Wenlong Liu |
|
|
|
A Hybrid Audio Watermarking Technique in Cepstrum Domain |
1597-1602 |
Shinfeng D. Lin, Chao-Cyun Huang and Jia-Hong Lin |
|
|
|
Clustering Over an Evolving Data Stream Based on Grid Density and Correlation |
1603-1609 |
Jiadong Ren, Binlei Cai and Changzhen Hu |
|
|
|
A High Curvature Bias Correction Method for the Ellipse Fitting |
1611-1617 |
Peipei Li, Caiming Zhang, Yu Wei and Kunpeng Wang |
|
|
|
A Hierarchical SLAM Algorithm Characterized with Event-Driven Property |
1619-1624 |
Xuefeng Dai, Lina Zhao and Yuan Guo |
|
|
|
An Efficient Incremental Algorithm for Mining Web Navigation Patterns with Dynamic Thresholds |
1625-1630 |
Jia-Ching Ying and Vincent S. Tseng |
|
|
|
A Pluggable and Flexible Framework for Access Control |
1631-1636 |
Limin Shen, Chengzhong Song and Dianlong You |
|
|
|
An RFID-Based Learning System Supporting Ubiquitous Context-Aware Bloom's Cognition Knowledge Analysis |
1637-1642 |
Wen-Chih Chang, Te-Hua Wang and An-Sheng Li |
|
|
|
Vulnerability Exploitability Quantitative Evaluation for Network Information System |
1643-1648 |
Hongyu Yang and Lixia Xie |
|
|
|
An Adaptive Selection Scheme of Forwarding Nodes in Wireless Sensor Networks Using a Chaotic Neural Network |
1649-1655 |
Tomoyuki Sasaki, Hidehiro Nakano, Akihide Utani, Arata Miyauchi and Hisao Yamamoto |
|
|
|
Effects of the Consecutive Speed Humps on Chaotic Vibration of a Nonlinear Vehicle Model |
1657-1664 |
Fei Liu, Shan Liang, Qin Zhu and Qinyu Xiong |
|
|
|
Forecast the Amount of Import and Export in Vietnam by Applying Grey Method |
1665-1670 |
Jui-Fang Chang, Tien-Chin Wang, Truong Ngoc Anh and Wan-Tseng Chang |
|
|
|
Conditional Anonymous Compact E-Cash with Auditable Tracing |
1671-1675 |
Qian Wang |
|
|
|
Using Feature Attribute to Filter Noise in Radio Signal Recognition |
1677-1682 |
Chao Zhang, Zheng Pei, Jianmei Cheng and Hongbao Cao |
|
|
|
Algorithms Comparison for Weak GPS Signal Tracking Based on KF |
1683-1688 |
Xiyuan Chen, Zhe Liu, Xuefen Zhu and Lin Fang |
|
|
|
Adaptive Fuzzy Backstepping Output Feedback Control for Nonlinear Systems with Unknown Sign of High-Frequency Gain |
1689-1693 |
Changliang Liu, Shaocheng Tong and Yongming Li |
|
|
|
A Double-Stepping Run-Length Algorithm for Fast Circle Drawing |
1695-1700 |
Lianqiang Niu, Binghong Li, Haiwen Feng and Tianxiang Zhu |
|
|
|
Supply Chain Optimization Model Based on Process and Generalized Inverse Optimization Methods |
1701-1707 |
Xiangbin Zhang, Youyi Ni and Yamin Yuan |
|
|
|
Efficient Deblocking Filter Architecture for High-Resolution Applications of H.264/AVC |
1709-1715 |
Tomohiro Akita, Naoyuki Hirai, Tian Song, and Takashi Shimamoto |
|
|
|
Dual Slope Analog-to-Digital Converter Using Simple CCII-Based Integrator |
1717-1722 |
Krit Smerpitak, Amphawan Julsereewong and Hirofumi Sasaki |
|
|
|
Backstepping Controller Design for a Manipulator with Compliance |
1723-1728 |
Cheng-Yi Chen, Marvin H.-M. Cheng and Chien-Hua Lee |
|
|
|
Shrinkage Estimated Adaptive Nearest Neighbor for Hyperspectral Image Classification |
1729-1734 |
Hsiao-Yun Huang, Yuehjen E. Shao and Yung-Hsu Li |
|
|
|