Heuristic Algorithm Based on Discernibility Matrix for Generating all Reductions |
893-898 |
Zhiguo Huang, Yuanxiang Li, Xiaoji Yang and Gang Liu |
|
|
|
Incentive Design under Uncertainty in Tacit Knowledge Sharing |
899-904 |
Gaoshan Wang and Xin Zhang |
|
|
|
The Relationships Among IV-Similarity Measure, IV-Entropy and IV-Inclusion Measure of Interval-Valued Fuzzy Sets |
905-910 |
Wenyi Zeng, Yibin Zhao and Ping Guo |
|
|
|
Robust Actuator Fault Diagnosis and Tolerant Control for Satellite Attitude Control Systems |
911-918 |
Yuehua Cheng, Bin Jiang, Jun Sun, Yanping Fu and Zhifeng Gao |
|
|
|
Mining Frequent Closed Itemsets Based on Projection Array and Closed Itemsets Lattice |
919-924 |
Haitao He, Haiyan Cao, Jiadong Ren and Changzhen Hu |
|
|
|
A User Profile Injection Attack Detection Algorithm Based on Normal Cloud Model and PCA |
925-930 |
Fuzhi Zhang, Dongyan Jia and Jinbo Chao |
|
|
|
Dynamic Analysis and Simulation of Single-Closed-Loop Mechanism with a Screw Pair |
931-936 |
Xijuan Guo and Yanping Fu |
|
|
|
T-S Fuzzy Controller for a Class of Nonlinear Systems with Uncertainties and Disturbances |
937-943 |
Hugang Han and Shoji Katagiri |
|
|
|
Networked H-infinity Output Tracking Control Based on QoS |
945-952 |
Jun Kang |
|
|
|
The Parameterization of all Disturbance Observers for Plants with Any Input and Output Disturbances |
953-958 |
Yoshinori Ando, Kou Yamada, Tatsuya Sakanushi, Takaaki Hagiwara, Nghia Thi Mai, Iwanori Murakami, Yuki Nakui and Hua Zhuang Lin |
|
|
|
The Parameterization of all Robust Stabilizing Simple Repetitive Controllers with the Specified Input-Output Characteristic |
959-964 |
Tatsuya Sakanushi, Kou Yamada, Takaaki Hagiwara, Yoshinori Ando, Iwanori Murakami and Shun Matsuura |
|
|
|
A Design Method for Robust Stabilizing Multi-Period Repetitive Controllers for Time-Delay Plants with the Specified Input-Output Characteristic |
965-970 |
Yoshinori Ando, Kou Yamada, Tatsuya Sakanushi, Nghia Thi Mai, Takaaki Hagiwara, Shun Yamamoto and Nhan Luong Thanh Nguyen |
|
|
|
A Decomposition Approach for Identifying the Sources of Variance Shifts in a Multivariate Process |
971-975 |
Yuehjen E. Shao, Chia-Ding Hou, Chien-Hui Chao and Ying-Jen Chen |
|
|
|
Research on the Window-Expanded Query Algorithm Based on SABX-Tree |
977-983 |
Yongshan Liu, Weijie Gu, Shiwei Gao and Hui Zhang |
|
|
|
Rendezvous of Multi-Agents with Time Delay and Network Connectivity Preservation |
985-991 |
Zhengquan Yang, Qing Zhang, Zuolian Jiang and Zengqiang Chen |
|
|
|
Efficient ID-Based Online/Offline Encryption Scheme in the Standard Model |
993-998 |
Yang Ming and Xiaoqin Shen |
|
|
|
Non-Coding Background Sequences Modeling Based on Bayesian Hypothesis Testing |
999-1004 |
Qian Liu, San-Yang Liu and Li-Fang Liu |
|
|
|
A Novel Classification Based on Competitive Co-Evolutionary Algorithm |
1005-1010 |
Ruihua Chang, Xiaodong Mu and Xiaowei Shen |
|
|
|
Research on Semantic Method of Library Resources' Organizing |
1011-1017 |
Yao Liu, Xue-Fei Chen, Zhifang Sui, Yongwei Hu and Qingliang Zhao |
|
|
|
ITS Image De-Noising Integrated Model Based on Partial Differential Equation |
1019-1024 |
Lixin Shen, Jing Liu, Shufang Xu, Changfeng Yuan and Tingting Tao |
|
|
|
Knowledge Modeling and Semantic Retrieval for Traffic Information Based on Fuzzy Ontology and SPARQL |
1025-1029 |
Jun Zhai, Yan Chen and Jianfeng Li |
|
|
|
Time-Varying Sliding Mode Control for Air-Breathing Hypersonic Vehicles |
1031-1036 |
Qunya Yin, Jianqiang Yi and Xiangmin Tan |
|
|
|
A Study on the Integration of QFD-PMMM in Cloud Computing System Quality |
1037-1043 |
Chih-Had Chen, Shing-Han Li, Mark Hwang and Jang-Ruey Tzeng |
|
|
|
An Efficient Heuristic Scheduling Algorithm for Optimal Job Allocation in Computational Grids |
1045-1050 |
Wanneng Shu, Lixin Ding and Shenwen Wang |
|
|
|
Relation Extraction Based on Multi-View Ensemble Algorithm |
1051-1056 |
Jing Qiu, Liehuang Zhu and Junkang Hao |
|
|
|
Aggregation of Interval Numbers in Group Decision Making |
1057-1062 |
Yong Deng, Jiyi Wu, Xiaohong Sun, Peida Xu and Yajuan Zhang |
|
|
|
Using PCA for Predicting Protein Subcellular Localization of Gram-Negative Bacteria Based on Pseudo Amino Acid Composition |
1063-1068 |
Yanhong Wang, Chaobing He, Lidong Wang, Zhao Wang, Jiang Tian and Junwei Ma |
|
|
|
FMLKNN: A Fuzzy Membership Function Based K-Nearest Neighbor Approach for Multi-Label Classification |
1069-1075 |
Jung-Yi Jiang and Shie-Jue Lee |
|
|
|
Synchronization of Spatiotemporal Chaos via Sliding Mode Control |
1077-1082 |
Congyan Chen and Chengzhuan Jiang |
|
|
|
Dynamic Environment Modeling and Path Planning for Mobile Robot |
1083-1088 |
Wei-dong Chen, Yan-xiang Yang, Qi-guang Zhu and Chun-fang Wang |
|
|
|
How to Measure Software Flexibility |
1089-1093 |
Si-wei Peng, Li-min Shen and Hui Liu |
|
|
|
Risk Assessment of Semiconductor Manufacturing Capacity Planning Based on Value-at-Risk Theory |
1095-1099 |
Bo Li and Yang Cao |
|
|
|
A Password Authentication Scheme with Forward Secrecy |
1101-1105 |
Yung-Cheng Lee and Yi-Chih Hsieh |
|
|
|
Fuzzy Identification Based on Monotonicity and Interval Type-2 Fuzzy Logic |
1107-1113 |
Tiechao Wang, Jianqiang Yi and Chengdong Li |
|
|
|
Predicting the Compressive Strength of Concrete Using Rebound Method and Artificial Neural Network |
1115-1120 |
Jianming Liu, Huijian Li and Changjun He |
|
|
|
Concrete Compressive Strength Prediction Using Rebound and Core Drilling Synthetic Method through Artificial Neural Networks |
1121-1127 |
Huijian Li, Jianming Liu and Changjun He |
|
|
|
Design of a Trajectory Tracking Controller for Uncertain Nonlinear Systems via the Model-Deviation Compensation Strategy |
1129-1135 |
Xiaojie Sun, Hua Ye and Shumin Fei |
|
|
|
CFO Matrix Method and Performance Analysis for Carrier Frequency Offset Estimation in OFDMA Uplink |
1137-1144 |
Ruiyan Du, Jinkuan Wang, Liqun Shan and Fulai Liu |
|
|
|
Optimal Combination of Conflicting Evidence Based on Genetic Algorithm |
1145-1150 |
Wen Jiang, Jinye Peng and Yong Deng |
|
|
|
Expected Gain Based Early Warning for Real-Time Process Monitoring |
1151-1156 |
Bokyoung Kang, Dongsoo Kim and Suk-Ho Kang |
|
|
|
Network Intrusion Detection Using Neural Networks and Multi-Attribute Decision Making Method |
1157-1162 |
Huayang Wu and Xin Guan |
|
|
|
Robust Adaptive Neural Speed Tracking Control for the Induction Motor Drive System |
1163-1169 |
Jinpeng Yu, Yumei Ma, Bing Chen, Haisheng Yu and Songfeng Pan |
|
|
|
A Novel Algorithm for Motif Discovery |
1171-1176 |
Zhiru Chen, Wenxue Hong, Lufang Tian and Changwu Wang |
|
|
|
Class Information Couple with Free Combination of Stem for Predicting RNA Secondary Structure |
1177-1182 |
Changwu Wang, Tao Liu, Yongwei Jia, Baowen Wang and Wenyuan Liu |
|
|
|
A Second-Order Cone Programming Method for the Design of FIR Filters with Discrete Coefficients |
1183-1189 |
Xuewen Mu and Yaling Zhang |
|
|
|
Incentive Mechanism of Special Knowledge Sharing for Two Clients with Complementary Knowledge |
1191-1197 |
Mingzheng Wang, Changyan Shao and Mengru Ma |
|
|
|