default search action
9th HIS 2009: Shenyang, China - Volume 3
- Ge Yu, Mario Köppen, Shyi-Ming Chen, Xiamu Niu:
9th International Conference on Hybrid Intelligent Systems (HIS 2009), August 12-14, 2009, Shenyang, China. IEEE Computer Society 2009, ISBN 978-0-7695-3745-0
Theories and Applications for Peer-to-Peer Overlay Networks (4)
- Yingyan Teng, Xiaowei Wang, Zonggang He:
Design and Implementation of Interface Interactivity Based on Virtools and Serial Communication. 3-6 - Peng Wu, Jingjiao Li:
The Noise Removal on Rebound Signal of Linear Frequency. 7-9 - Yuan Gao, Dancheng Li, Chunyan Han, Zhiliang Zhu:
An Improved Network Topology Auto-layout Solution Based on Force-Directed Placement. 10-14 - Joydeb Roychoudhury, Tribeni Prasad Banerjee, Anup K. Bandopadhaya, Ajith Abraham:
Design Methodology of a Fault Aware Controller Using an Incipient Fault Diagonizer. 15-19 - Qinghui Wang, Lifeng Wei, Danbin Liu:
A P2P-Grid Model for Traversing NAT in SIP Communication. 20-23 - Deguo Yang, Lianqiang Niu, Xincun Wang:
A P2P-SIP Architecture for Real Time Stream Media Communication. 24-28 - Jinqing Cai, Xiuli Shao, Wenhui Ma:
Ontology Driven Semantic Search over Structure P2P Network. 29-34
Novel Approaches to Information Security Application (1)
- Chin-Chen Chang, Yeu-Pong Lai:
An Enhancement of JPEG Still Image Compression with Adaptive Linear Regression and Golomb-Rice Coding. 35-40 - Iuon-Chang Lin, Rui-Kun Luo, Shih-Chang Tsao:
An Efficient Mutual Authentication Protocol for RFID Systems. 41-45 - Zhidong Shen, Qiang Tong:
A Security Technology for Mobile Agent System Improved by Trusted Computing Platform. 46-50 - Hongfeng Zhu, Tianhua Liu, Jie Liu:
Robust and Simple Multi-server Authentication Protocol without Verification Table. 51-56 - Ali Selamat, Mohd Aizaini Maarof, Tey Yi Chin:
Fuzzy Mamdani Inference System Skin Detection. 57-62 - Bin Hu, Günther R. Raidl:
A Memetic Algorithm for the Generalized Minimum Vertex-Biconnected Network Problem. 63-68
Novel Approaches to Information Security Application (2)
- Wen-Chung Kuo, Lih-Chyau Wuu, Chia-Nian Shyi, Shao-Hung Kuo:
A Data Hiding Scheme with High Embedding Capacity Based on General Improving Exploiting Modification Direction Method. 69-72 - Ming-Ni Wu, Puu-An Juang, Yu-Chiang Li:
An Efficient VQ-Based Data Hiding Scheme Using Voronoi Clustering. 73-77 - Chia-Hsin Cheng, Guo-Jun Wen, Ling-Cheng Hsu, Yung-Fa Huang:
Hyperbolic Tangent HNN Multiuser Detection in DS-UWB Systems. 78-82 - Jinfu Chen, Yansheng Lu, Xiaodong Xie:
CSTS: A Prototype Tool for Testing COM Component Security. 83-88 - Jaw-Shyang Wu, Tsung-En Lee, Ching-Sung Lu, Shung-Der Su:
An Autonomous Decision Approach for Fault Allocation and Service Restoration in Electrical Distribution Systems by Multi Agent System. 89-94 - Jianfeng Dong, Xiaofeng Wang, Feng Hu, Liyan Xiao:
A Novel Data Purification Algorithm Based on Outlier Mining. 95-98
Multi-source Data Process
- Wei Gao, Hai Zhao, Yanrong Cheng, Zhan Mei:
The Application Study on Data Fusion Technology in Classifying of Internal Component of Shells. 99-102 - Wei Gao, Jingxin Wen, Nan Jiang, Hai Zhao:
A Study of Data Fusion Based on Combining Rough Set with BP Neural Network. 103-106 - Xiao-dan Zhang, Zhen-dong Niu:
Study on Decision Classification Fusion Model. 107-109 - Chang-Xing Qi, Qing-Dong Du:
A Smart IVR System Based on Application Gateways. 110-115
Information Management & Knowledge Management (1)
- Hui Dong, Siwei Yu, Ying Jiang:
Knowledge Representation of Chinese Genealogical Record of VIPs in KMT and CPC. 116-120 - Yigang Zhou, Hui Dong, Ziran Zhang:
An Open Source Toolkit for Grid Resources Scheduling in Digital Library. 121-124 - Hui Dong, Siwei Yu, Ying Jiang:
A Protege Plug-In for Modeling Dimensional Ontology. 125-128 - Qiang Li, Baoliang Mu:
A Novel Method to Detect Junk Mail Traffic. 129-133 - Der-Fa Chen, Kai-chao Yao:
A Novel Sliding-Mode Controller Design for a Matrix Converter Drive System. 134-137 - Jia-lin Ma, Xu Wei:
An Improved Anti-collision Algorithm in RFID System. 138-141 - Yan Zhang, Shurong Guo:
Research into Web-Based 4PL Supply Chain System Model of Multi-TPLs - Information-Based Model Suitable for Chinese TPL. 142-146 - Xiongwei Zhou, Feicheng Ma:
An Information Sharing Incentive Model in Supply Chain with Mixed Retail and E-tail Channels. 147-150
Information Management & Knowledge Management (2)
- Gang Li, Guangzeng Kou, Ercui Zhou, Ling Zhang:
Symmetric Trends: Optimal Local Context Window in Chinese Word Sense Disambiguation. 151-154 - Wenqing Yuan, Li Luo:
The Development and Evaluation of Internet Data Mining System. 155-159 - Shuwei Huang, Xueying Wang:
Influence of Organizational System to End-Users' Acceptance of ERP System in Chinese Enterprises. 160-164 - Huiyan Liu, Xueying Wang, Qizhe Quan:
Research on the Enterprise' Model of Information Lifecycle Management Based on Enterprise Architecture. 165-169 - Wenjing Tang, Haiying Xie, Cairong Wang:
The Strategy of Data Integration for Manufacturing Enterprises Based on Component Software Development. 170-173 - Feng Li, Cheng Liu:
Application Study of BP Neural Network on Stock Market Prediction. 174-178 - Feng Li, Qizhe Quan:
Study of Financial Risk Based on EVT. 179-182 - Xuedong Sun, Lianhao Zhang:
Basic Factors Design of Pedagogical Agent System in an Ecology View. 183-186
Information Management & Knowledge Management (3)
- Wen Li, Xin Li:
Design of a Personalized Learning System Based on Intelligent Agent for E-learning. 187-190 - Ying Zhao, Lili Wu:
Second Life: A New Window for E-learning. 191-194 - Yongjun Jing, Xin Li, Shaochun Zhong:
Research on Personalized Services for Users of Education Resources Net. 195-197 - Xinghui Wang:
Analysis of E-learning Influencing Factors Based on ISM. 198-201 - Yu Yan, Haiying Xie:
Research on the Application of Data Mining Technology in Insurance Informatization. 202-205 - Hailian Kou, Zhenggang Wan:
Research on E-Learning-Based Educational Technology Training Model for College Teachers. 206-210 - Zhenggang Wan, Hailian Kou:
A Study on the Construction of Quality Courses Network Based on HPT. 211-215 - Chunying Chen, Xiongwei Zhou, Jianzhong Zhang:
Web Data Mining System Based on Web Services. 216-220
Information Management & Knowledge Management (4)
- Kai-li Wang, Philippe Trigano:
Modeling Unit of Learning in Learning Management System and Learning Content Management System with User Preference. 221-225 - Xueying Wang, Ying Zhao:
An Enterprise Architecture Development Method in Chinese Manufacturing Industry. 226-230 - Lifeng Wei, Qinghui Wang, Hongwei Ren:
Software Design of Embedded VideoTelephone Based on PJSIP Stack. 231-234 - Hua Chen, Baolin Sun, Yue Zeng, Xianying He:
An Entropy-Based Fuzzy Controllers QoS Routing Algorithm in MANET. 235-239 - Dan Yang, Hong Wang, Yang Liu:
Dynamic Execution Strategy of Web Service Composition Based on e_SPDL and Service Container. 240-243 - Ping Yao:
Credit Scoring Using Ensemble Machine Learning. 244-246 - Shaoyun Wang, Qingjin Meng, Jingjian Wu:
The DCS of Waste Heat Power Generation of Cement Plant Based on Fuzzy Control. 247-251
Advanced Data Processing Technology (1)
- Baoyan Song, Pengfei Qin, Hao Wang, Weihong Xuan, Ge Yu:
bSpace: A Data Cleaning Approach for RFID Data Streams Based on Virtual Spatial Granularity. 252-256 - Xiaoli Li, Xiaoguang Li, Baoyan Song:
Effectively Answering Schema-Free XML Queries over Document-Centric Data. 257-261 - Shuzi Niu, Daling Wang, Shi Feng, Ge Yu:
An Improved Spectral Clustering Algorithm for Community Discovery. 262-267 - Yan Wang, Weihong Xuan, Wei Li, Baoyan Song, Xiaoguang Li:
A Real-Time Scheduling Strategy Based on Priority in Data Stream System. 268-272 - Derong Shen, Gaoshang Sun, Tiezheng Nie, Yue Kou:
DeepSearcher: A One-Time Searcher for Deep Web. 273-277 - ZhiHeng Liang:
A Classification Algorithm Based on an Association Rule of Multiple Frequent Item-Sets. 278-282 - Cheng-An Tai, Yung Lung Lee, Ching-Yuan Lin:
Public Participation Interface of Urban Disaster Prevention Spatial System Planning - Application of Google Earth. 283-288
Advanced Data Processing Technology (2)
- Jianmei Huang, Junchang Xin, Guoren Wang, Miao Li:
Efficient k-Dominant Skyline Processing in Wireless Sensor Networks. 289-294 - Xiaomei Dong, Xiaohua Li:
An Immune Based Relational Database Intrusion Detection Algorithm. 295-300 - Jingang Shi, Yubin Bao, Fangling Leng, Ge Yu:
Priority-Based Balance Scheduling in Real-Time Data Warehouse. 301-306 - Xiangguo Zhao, Junchang Xin, Ende Zhang:
XML Functional Dependency and Schema Normalization. 307-312 - Xin Li, Zhen Qin, Tao Yu:
Optimizing the QoS Performance of Fast Rerouting. 313-318 - Yunong Zhang, Lingfeng Li, Yiwen Yang, Gongqin Ruan:
Euler Neural Network with Its Weight-Direct-Determination and Structure-Automatic-Determination Algorithms. 319-324 - Gaohua Liao, Junmei Xi:
Pipeline Weld Detection System Based on Machine Vision. 325-328
Design and Implementation of Control Systems
- Kai-chao Yao, Der-Fa Chen:
Establishment of New Electro-oculogram Measurement Technique by Integrating Virtual Instrument. 329-333 - Wei-Tzer Huang, Shiuan-Tai Chen:
Line Loss Reduction by Distribution System Upgrading from Radial to Normally Closed-Loop Arrangement. 334-339 - Ho-Lung Hung, Chuan-Wang Chang, Jyh-Horng Wen:
An Effective Hybrid PSOSA-Based Multi-user Detection for DS-CDMA Ultra-WideBand Communications Systems. 340-345 - Yanli Zhang, Xiaodong Liu, Xueying Wang:
A Novel Weighted Fuzzy Clustering Analysis Based on AFS Theory. 346-350 - Kai-chao Yao, Tai-li Chen, Yu-te Lian:
Virtual Spectrum Analyzer Design and Implementation. 351-354 - Quan Dong, Quan Li:
Current Control of BLDCM Based on Fuzzy Adaptive ADRC. 355-358 - Huan Shen, Shun Ming Li, Fang Chao Bo, Xiaodong Miao, Fang Pei Li, Hua Peng Zhou:
Vision Based Navigation System of Intelligent Vehicles: A Robust Object Tracking Approach. 359-364
Hybrid Intelligent Techniques for Power, Control and Communication (1)
- Mingyan Zhao, Hongbo Liu, Ajith Abraham, Emilio Corchado:
A Swarm-Based Rough Set Approach for Group Decision Support Systems. 365-369 - Sayan Ghosh, Debarati Kundu, Kaushik Suresh, Swagatam Das, Ajith Abraham, Bijaya K. Panigrahi, Václav Snásel:
On Some Properties of the lbest Topology in Particle Swarm Optimization. 370-375 - Pavel Krömer, Václav Snásel, Jan Platos, Ajith Abraham:
Optimization of Turbo Codes by Differential Evolution and Genetic Algorithms. 376-381 - Jianli Ding, Xuesen Li, Guansheng Tong:
The Dynamic Immune Forecasting Method of the Airdrome Flight Delay under Considering the Stochastic Factors. 382-387 - Xue-Ling Song, Ying-bao Zhao, Chao-Ying Liu, Zhe-Ying Song:
Solenoid Valve Switching Characteristic Test System Design. 388-391 - Jing Ma, Zhiwei Gao:
General Controller for a Class of Singular System Simultaneous Stabilization. 392-396
Hybrid Intelligent Techniques for Power, Control and Communication (2)
- Hesam Izakian, Ajith Abraham, Václav Snásel:
Scheduling Meta-Tasks in Distributed Heterogeneous Computing Systems: A Meta-Heuristic Particle Swarm Optimization Approach. 397-402 - V. Ravikumar Pandi, Bijaya K. Panigrahi, Manas Kumar Mallick, Ajith Abraham, Swagatam Das:
Improved Harmony Search for Economic Power Dispatch. 403-408 - Da Wei Huang, Xue-Shan Han:
Study on Generation Companies' Bidding Strategy Based on Hybrid Intelligent Method. 409-412 - Kaisheng Zhang, Jiaan Zhang, Guofa Guo:
Research on Simulating-Human Intelligent Control Method for the Cold-Storage of Fruits and Vegetables. 413-415 - Supeng Zhu, Wenxing Fu, Jun Yang, Jianjun Luo:
Applying Genetic Algorithm to Optimization Parameters of Missile Control System. 416-419
Soft Computing for Image and Signal Processing
- Rong Wang, Lihua Li, Weijun Hong, Nan Yang:
A THz Image Edge Detection Method Based on Wavelet and Neural Network. 420-424 - Jing Bi, Kai Song, Hang Li:
The Level Filling Algorithm for Clockwise Edge. 425-427 - Rong Wang, Weijun Hong, Nan Yang:
The Research on Footprint Recognition Method Based on Wavelet and Fuzzy Neural Network. 428-432 - Lihua Li, Rong Wang, Jintao Li, Ge Wang:
The Research of ISOETRP Clustering Algorithm on Optical Mathematical Symbols Recognition. 433-436 - Yuhua Chai, Danting Zhao, Rong Wang:
A Soybean Image Noise Smoothing Method Using Multi-scale Morphology. 437-441 - Dong-Min Woo, Dong-Chul Park:
Rooftop Detection Based on 3D Line Data Using Fast Graph Search. 442-446 - Ze-Hong Li, Bin-Bin Liu, Li-Chun Wang:
The Research on Consolidated Financial Evaluation about Corporate Social Responsibility Based on Fuzzy-AHP. 447-450
Cross-Discipline Techniques (1)
- Shujing Zhou, Lanjing Liu, Chao Wu:
Application of LMBP Forecast Model in International Construction Claim. 451-456 - Thiago T. Angelico, Thais Santos Bueno, Silvio Bortoleto, Anderson Ravanello:
KDD on IVR Navigation Trees: Case Study. 457-459 - Chang-hong Shan, Zhong-ze Chen, Jin-xiong Jiang:
An All Digital Phase-Locked Loop System with High Performance on Wideband Frequency Tracking. 460-463 - Yunhong Gao, Yibo Li:
Fault Prediction Model Based on Phase Space Reconstruction and Least Squares Support Vector Machines. 464-467 - Xuelian Chen, Jingtao Hu, Liancheng Shan, Yaping Wang:
Extraction and Code of Drainage Network Based on Digital Elevation Model. 468-473 - Yue Zhang, Jie Liu, Hang Li:
An Implementation Strategy of Global OLTP Based on ODS in Heterogeneous Environment. 474-477 - Yuanyuan Zhang:
Exact Solutions for the Generalized Derivative Schrodinger Equation. 478-480
Cross-Discipline Techniques (2)
- Jian Tang, Wanchun Qu:
Forecasting Increment Control Methods in Regulated Period for the Temperature of Beer Fermentation. 481-484 - Wanchun Qu, Jian Tang:
Multi-point Calibration Detecting Method of Non-linear Analogue Quantity. 485-488 - Wusheng Zhao, Yongqing Fu, Qiang Lv:
The Turbo Equalization in Bit Interleaved Coded Modulation with Iterative Decoding. 489-492 - Yuting Zhao, Jeff Z. Pan, Yuan Ren:
Implementing and Evaluating a Rule-Based Approach to Querying Regular EL+ Ontologies. 493-498 - Jing Ma, Kun Ma:
Strong Simultaneous Stabilization for a Class of Generalized Linear System. 499-503 - Weibing Fan, Zhihua Cui, Jianchao Zeng:
Inertia Weight Selection Strategy Based on Lyapunov Stability Analysis. 504-509
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.