A Comparison of Heuristic Approaches to the Travelling Salesman Problem |
279-283 |
Udom Janjarassuk |
|
|
|
Noise Averaging Effect of Privacy-Preserving Data Mining in Time-Series Databases |
285-291 |
Yang-Sae Moon, Hea-Suk Kim and Sang-Pil Kim |
|
|
|
Secure Identity-Based Ad Hoc Protocols for Mobile Networks |
293-298 |
Leyou Zhang, Yupu Hu and Qing Wu |
|
|
|
Robust H-infinity Control for Uncertain Nonlinear Singular Systems with Time-Varying Delay |
299-304 |
Jiqing Qiu, Yanjun Wang, Xiaoming Du, Yanchun Zhao and Yuming Guo |
|
|
|
Off-Line Divisible E-Cash with All Nodes Spendable |
305-310 |
Hongli Zhang, Jiuhong Wang, Jie Zhang and Wenyuan Liu |
|
|
|
Emergency Resource Location and Allocation under Uncertainty of Disaster Degree |
311-316 |
Xuping Wang, Li Dong, Chao Ma and Mingtian Chen |
|
|
|
Analysis on Information Value Factors that Influence Satisfaction with Wireless Internet Service in South Korea -- Focused on a Comparison between the Years 2003 and 2010 |
317-322 |
Mincheol Kim, Youngbae Yang and Nyamsuren Davaadorj |
|
|
|
Possibility of Activating the City's Central Commercial Businesses |
323-328 |
Toshihiko Gima |
|
|
|
IT Service Vendor Screening Contract Based on Principal-Agent Theory |
329-335 |
Mingzheng Wang and Changyan Shao |
|
|
|
Hidden-Node-Based NNE for Financial Decision Applications |
337-341 |
Jin Tian, Minqiang Li and Fuzan Chen |
|
|
|
SOP (Skyline on the Path) Algorithm for Moving Objects |
343-348 |
Wookey Lee, David Y. Jang and Taesoo Lim |
|
|
|
A Hybrid SVM-FLC Approach to MAP Speaker Adaptation for Speech Recognition |
349-354 |
Ing-Jr Ding |
|
|
|
Missing Value Imputation Using Genetic Algorithm |
355-360 |
Kairung Hengpraphrom, Sageemas Na Wichian and Phayung Meesad |
|
|
|
Design and Simulation of Setting Pharmaceutical Service Fee without Drug Addition in Public Hospital |
361-366 |
Bing Xu, Zuiyi Shen and Juying Zeng |
|
|
|
Genetic Programming Based Robust Image Watermarking Using Wavelet and Morton Order |
367-372 |
Almas Abbasi, Zahoor Jan, Arfan Jaffar and Anwar M. Mirza |
|
|
|
Strategic Partnership-Based Reconfiguration of Express Package Service Network with Extension of Consolidation Terminal Capacity |
373-378 |
Chang Seong Ko, Eun Mi Yoon, Ki Ho Chung and Hyun Jeung Ko |
|
|
|
Research on Identification of Relative Pair for Product Reviews |
379-384 |
Qian Wang and Xiao-Hua Chen |
|
|
|
A Fuzzy Set-Theoretic Approach to the Weak Strategic Alliance for the Survival of Multiple Service Centers in Express Courier Services |
385-389 |
Ki Ho Chung, Hyun Jeung Ko, Friska Natalia Ferdinand and Chang Seong Ko |
|
|
|
Measuring RFID Visibility via a Concept of Information Freshness |
391-396 |
Hoontae Kim, Youngjin Kim and Minsoo Ki |
|
|
|
Research on Relationship of the Brand Equity, Brand Relationship and Brand Loyalty for Mobile Shopping Site -- Based on Customers' Perspective |
397-403 |
Hui Guan, Yunfu Huo and Yujun Feng |
|
|
|
Wap Equity: Scale Development and Validation |
405-411 |
Hui Guan, Xia Xie, Yunfu Huo and Yujun Feng |
|
|
|
Improvement on Backbone Nodes' Many-to-One Communication Collision Algorithm in Satellite Network |
413-418 |
Chengsheng Pan, Haiyan Liu and Wei Yan |
|
|
|
Service-Oriented RED Algorithm |
419-424 |
Li Yang, Chengsheng Pan, Chunling Liu and Hui Guo |
|
|
|
Adaptive Fuzzy Tracking Control for Induction Motors via Backstepping |
425-431 |
Jinpeng Yu, Yumei Ma, Bing Chen and Haisheng Yu |
|
|
|
A Global Trust-Based Reputation Model in Multi-Hop Networks |
433-438 |
Kun Wang, Jianmin Bao and Meng Wu |
|
|
|
Product Fuzzy Recommendation of Online Reviews Based on Consumer Psychological Motives |
439-445 |
Zhengkui Lin, Narisa Zhao, Ying Liu, De-li Yang and Yuan Li |
|
|
|
Controllability of Fractional Impulsive Neutral Evolution Integrodifferential Inclusions with State-Dependent Delay in Banach Spaces |
447-454 |
Zhixin Tai and Xingcheng Wang |
|
|
|
Spindle and Workpiece Information Collecting for Industrial Internet of Things |
455-459 |
Yuqing Chen, Ge Guo, Ying Hu, Bo Ning and Wenchao Wang |
|
|
|
The Design and Application of Wireless Ad Hoc Maritime Communications System |
461-466 |
Yu Gong, Xudong Wang, Rongxi He, Fuwen Pang and Chunli Gao |
|
|
|
An Empirical Study of DRER Model in Managing Temporal RFID Data |
467-472 |
Lijuan Niu, Rong Chen, Xingqiang Zhou and Hong Yang |
|
|
|
Correlation Models of Interdependency and Protection in Critical Infrastructure Networks |
473-478 |
Yanxin Wang and Xiangyang Li |
|
|
|
A State Space-Based Solution Approach to Disruption Management Problems in the Distribution Industry |
479-484 |
Minfang Huang, Yanxin Wang, Xiangpei Hu and Yanan Wang |
|
|
|
A Novel Modulation Technology Suitable for Wireless Sensor Network |
485-490 |
Mingyan He, Dequn Liang, Jinli Wang and Jingli Zhang |
|
|
|
Ultimately Uniformly Bounded Adaptive Tracking Fuzzy Control for Nonlinear System with Unknown Dead-Zone |
491-496 |
Junsheng Ren, Xianku Zhang and Jianchuan Yin |
|
|
|
Marine Market Forecasting Using Extension Neural Network |
497-502 |
Wei Li, Zhengjiang Liu and Jiaxuan Yang |
|
|
|
A Two-Stage Semi-Supervised Weighted Naive Credal Classification Model |
503-508 |
Rui-Hua Qi and De-Li Yang |
|
|
|
A Risk Evaluation Method for Real Estate Investment Based on Linguistic Variables |
509-516 |
Minghe Wang and Peide Liu |
|
|
|
A Survey on Autonomic Self-Optimizing Systems |
517-523 |
Shanta Rangaswamy and Gangadhara T. Shobha |
|
|
|
Error Estimation for HR-Adaptive Boundary Element Method -- A New Approach |
525-530 |
Yiming Chen, Dongmei Jin and Zhiquan Zhou |
|
|
|
The New Conjugate Gradient Method to Additive GARCH Model |
531-536 |
Rui Shan, Peiliang Li and Jing Fan |
|
|
|
Sensor and Actuator Fault Estimation for Satellite Attitude System by Augmenting System State Approach |
537-544 |
Yuehua Cheng, Bin Jiang, Yanping Fu and Zhifeng Gao |
|
|
|
Construction of the Membership Function of a Fuzzy Number |
545-549 |
Hemanta K. Baruah |
|
|
|
Patient Safety Management: RFID Technology to Improve Emergency Room Medical Care Quality |
551-555 |
Chia-Chen Chao, Hsuan-Ku Liu and Chang-I Chen |
|
|
|
Multilevel Image Thresholding Selection Based on the Firefly Algorithm |
557-562 |
Ming-Huwi Horng and Ting-Wei Jiang |
|
|
|