default search action
Intelligent Automation & Soft Computing, Volume 17
Volume 17, Number 1, 2011
- Youhui Zhang, Hongyi Wang, Dongsheng Wang, Weimin Zheng:
Employing Object-Based Storage Devices to Embed File Access Control in Storage. 1-11 - Kristjan Basa, Andrej Zemva:
Simulation and Verification of a Dynamic Model of the Electric Forklift Truck. 13-30 - Yu-Chin Liu, Ping-Yu Hsu:
Discovering Accurate and Common Characteristic Rules from Large Tables. 31-40 - Félix Gómez Mármol, Gregorio Martínez Pérez, Javier G. Marín-Blázquez:
Meta-Tacs: A Trust Model Demonstration Of Robustness Through A Genetic Algorithm. 41-59 - Mohamed Saad, Sanaa A. Muhaureq:
Joint Routing and Radio Resource Management in Multihop Cellular Networks Using Particle Swarm Optimization. 61-70 - Junichiro Yoshimoto, Masa-aki Sato, Shin Ishii:
Bayesian Normalized Gaussian Network and Hierarchical Model Selection Method. 71-94 - Edgar N. Sánchez, Luis J. Ricalde, Reza Langari, Danial Shahmirzadi:
Rollover Prediction and Control in Heavy Vehicles Via Recurrent High Order Neural Networks. 95-107
Volume 17, Number 2, 2011
- Matthew A. Joordens, Mohammad Jamshidi:
Design Of A Prototype Underwater Research Platform For Swarm Robotics. 111-132 - Daohang Sha, Vladimir B. Bajic:
An Optimized Recursive Learning Algorithm for Three-Layer Feedforward Neural Networks For Mimo Nonlinear System Identifications. 133-147 - Piotr Borkowski, Zenon Zwierzewicz:
Ship Course-Keeping Algorithm Based On Knowledge Base. 149-163 - B. M. Mohan:
Fuzzy Pid Control Via Modified Takagi-Sugeno Rules. 165-174 - Zhi-Xian Chen, Hao Huang:
A Hybrid Method for Intrusion Detection With Ga-Based Feature Selection. 175-186 - Shiguo Lian, Frank Y. Shih:
A Special Section of Intelligent Automation and Soft computing - Soft Computing For Copyright Protection. 189-190 - Zhiyong Zhang, Qingqi Pei, Jianfeng Ma, Lin Yang:
Game-Theoretic Analyses and Simulations of Adoptions of Security Policies for Drm in Contents Sharing Scenario. 191-203 - Xi Chen, Shiguo Lian:
On the Secure Watermark Embedding Scheme Based on Selective Encryption. 205-217 - Xia Li, Lingjun Liu, Na Wang, Jeng-Shyang Pan:
A New Robust Watermarking Scheme Based on Shuffled Frog Leaping Algorithm. 219-231 - Xinpeng Zhang, Shuozhong Wang, Guorui Feng:
Reversible Visible Watermarhing with Lossless Data Embedding Based on Difference Value Shift. 233-243 - Shinfeng D. Lin, Zong-Lin Yang:
Hierarchical Fragile Watermarking Scheme For Image Authentication. 245-255 - Venkata Gopal Edupuganti, Frank Y. Shih, I-Cheng Chang:
An Efficient Block-Based Fragile Watermarking System for Tamper Localization and Recovery. 257-267 - I-Cheng Chang, Chieh-Jung Hsieh:
Image Forgery Using An Enhanced Bayesian Matting Algorithm. 269-281
Volume 17, Number 3, 2011
- Ying-Kuei Yang, Chien-Nan Lee, Horng-Lin Shieh:
A Robust Fuzzy Clustering Approach and its Application to Principal Component Analysis. 1-11 - (Withdrawn) An Intelligent and Automatic Face Shape Prediction System From Fingerprints. 309-317
- Tomasz Praczyk:
Forming Neural Networks by Means of Assembler Encoding-Preliminary Report. 319-331 - Li-Hong Juang:
A New Mixed Least Mean Square and Least Mean Fourth Algorithm for Multilayer Perceptron Fast Training. 333-341 - Qinglei Hu:
Simultaneous Vibration Reduction and Attitude Control of Flexible Spacecraft with On-Off Actuators. 343-354 - Yih-Fang Chang, Truong-Giang Nguyen:
Optimal-Feedrate Interpolation for Machining Parametric Curves. 355-368 - Mehdi Farrokhrooz, Mahmood Karimi:
Marine Vessels Acoustic Radiated Noise Classification in Passive Sonar Using Probabilistic Neural Network and Spectral Features. 369-383 - Jong-Yih Kuo, Fu-Chu Huang:
A Hybrid Approach for Multi-Agent Learning Systems. 385-399
Volume 17, Number 4, 2011
- Cemal Okan Sakar, Goksel Demir, Olcay Kursun, Hüseyin Özdemir, Gökmen Altay, Senay Yalçin:
Feature Selection For The Prediction Of Tropospheric Ozone Concentration Using A Wrapper Method. 403-413 - Erik Cuevas, Daniel Zaldivar, Marco Antonio Pérez Cisneros, Edgar N. Sánchez, Marte A. Ramírez-Ortegón:
Robust Fuzzy Corner Detector. 415-429 - Hui-Ya Li, Yao-Jung Yeh, Wen-Jyi Hwang:
Fast KNN Classification Based On Softcore Cpu And Reconfigurable Hardware. 431-446 - Hei-Chia Wang, Tian-Hsiang Huang, Chia-Tzung Liu:
Automatic Summarization Based On Automaticallyinduced Ontology. 447-463 - Shi-Jay Chen:
Fuzzy Information Retrieval Based On A New Similarity Measure Of Generalized Fuzzy Numbers. 465-476 - Seta Bogosyan:
A Sliding Mode Based Neural Network For Data Fusion And Estimation Using Multiple Sensors. 477-493
Volume 17, Number 5, 2011
Editorials
- Tingyao Jiang, Dong Ren, Simon X. Yang:
A Special Issue of Intelligent Automation and Soft Computing - Theoretical Investigation Of Dependable Computing. 493-495
- Junqing Liu, Dan-gui Xie, Dong Ren, Yong Liu, Shuifa Sun:
Edge-Based Blotch Identification Algorithm In Archive Film Restoration. 497-507 - Xinsai Wang, Yu Liu, Jing He:
Automatic Segmentation Of Infrared Image Based On x2 Distribution. 509-517 - Yuan Tian, Chunjiang Zhao, Shenglian Lu, Xinyu Guo:
Multiple Classifier Combination For Recognition Of Wheat Leaf Diseases. 519-529 - Jingcheng Zhang, Juhua Luo, Wenjiang Huang, Jihua Wang:
Continuous Wavelet Analysis Based Spectral Feature Selection For Winter Wheat Yellow Rust Detection. 531-540 - Hongwei Wang, Zhibo Wu, Xiaozong Yang, Hongwei Liu:
A Novel Aco-Based Multicast Path Algorithm In Hypercube Networks. 541-549 - Feng Xu, Xin Lv, Likun Jia:
A New Verifiable Threshold Decryption Scheme Without Trusted Center. 551-558 - Chunyan Hou, Gang Cui, Hongwei Liu, Lian-Ke Zhou:
A Hybrid Queueing Model With Imperfect Debugging For Component Software Reliability Analysis. 559-570 - Xiaofeng Ding, Lizhong Xu, Xin Wang, Guofang Lv, Xuewen Wu:
Roubust Visual Object Tracking Using Covariance Features In Quasi-Monte Carlo Filter. 571-582 - Huan-Huan Song, Shu-zong Wang, Li-Bing Shao, Li Chen, Xiaofang Zhang:
Fast Navigation-Placement Tree Algorithm For Reconfigurable Computing System. 583-593 - Dawei Wang, Yibo Xue, Yingfei Dong:
Anomaly Detection Using Neighborhood Negative Selection. 595-605 - Guangming Dai, Maocai Wang, Lei Peng, Ruijie Qin:
Implementation And Optimization For Tate Pairing. 607-617 - Xiuling Zhou, Ping Guo, C. L. Philip Chen:
Speed Up Reliability Model Optimization With Hypervolume Contribution Calculating Algorithm. 619-629 - Yuanyuan Fu, Dong Ren, Guangzhu Xu, Simon X. Yang:
Weighted Fusion Of Gradient, Vertical Gradient And Horizontal Gradient In Logarithm Domain For Face Recognition Under Varying Lighting. 631-642 - Jianting Zhou, Jianxi Yang:
Analysis Of Bridge Safety Assessment With Correlation Between Measuring Points For Bridge Health Monitoring. 643-650 - Tingyao Jiang, Xiao Chen, Dewei Shu:
An Improved Integrated Tender Evaluation Method Based On Analytic Hierarchy Process. 651-658
Volume 17, Number 6, 2011
Editorials
- Dong Ren, Tingyao Jiang, Simon X. Yang:
A Special Issue of Intelligent Automation and Soft Computing - Applications of Dependable Computing. 661-663
- Tingyao Jiang, Heng Yu, Lele Cui:
A Novel Security Mechanism for Hybrid Encryption in Mineral Management Information System. 665-674 - Xiaohui Chen, Jing He, Jinpeng Chen:
An Improved Localization Algorithm for Wireless Sensor Network. 675-685 - Dong Ren, Yuanyuan Fu, Fangmin Dong, Guangzhu Xu:
A Robust Processing Chain for Face Recognition under Varying Illumination. 687-699 - Xiaodong Yang, Weihong Cui, Hao Yang, Cunjun Li, Wenjiang Huang, Jihua Wang:
Integrating Geospatial Web Services Into Enterprise Business System based on Service Intelligent Agents and Bayesian Network. 701-711 - Shuang'E Zhou, Guoping Xiong:
Task Synchronization Process based on Petri Net. 713-724 - Nianhua Yang, Huiqun Yu, Hua Sun, Zhilin Qian:
Modeling Activity Diagrams with Extended Petri Nets. 725-735 - Chuang Ma, Hongwei Liu, Haiying Zhou, Zhibo Wu, Xiao-Zong Yang, Xi-Bo Xiao:
A Fault-Tolerant Algorithm of Wireless Sensor Network Based on Recoverable Nodes. 737-747 - Xihong Su, Zhibo Wu, Hongwei Liu, Xiaozong Yang, Xiao-Zong Yang:
Reliability Analysis Of SA based Software Deployment with Consideration of System Deployment. 749-758 - Weipeng Jing, Zhibo Wu, Hongwei Liu, Jian Dong:
An Effective Bi-Criteria and Contention Awareness Scheduling in Heterogeneous Distributed Systems. 759-769 - Yu Hu, Zhongliang Chen, Xiaowei Li:
Oware: Operand width Aware Redundant Execution for Whole-Processor Error Detection. 771-780 - Renbin Xiao, Xiaoguang Gong, Tongyang Yu:
A Simulation Approach To The Control Mechanism Of Individual And Web Site In Malware Spread. 781-792 - Xingyao Hao, Yuchun Pan:
Accuracy Analysis Of Earthwork Calculation Based On Triangulated Irregular Network (Tin). 793-802 - Jie Yin, Jianhui Jiang, Yue Liu:
AC-RMT: A Fault-Tolerance Smt Architecture Based On Asynchronous Checkpoint. 803-813 - Jun Zhou, Yongjun Xu, Xiaowei Li:
A Security Mechanism For RFID With Dependable Proxy. 815-825
Volume 17, Number 7, 2011
Editorials
- Lizhong Xu, Xiaofang Li, Simon X. Yang:
A Special Issue of Intelligent Automation and Soft Computing - Intelligent Information Processing And System Optimization. 829-831
- Jingguo Wang, Yangmin Li:
Traching Control Of A Redundant Manipulator With The Assistance Of Tactile Sensing. 833-845 - Guojun Tan, Hui Zhang, Miaowang Qian, Rui-Wen Yu:
Optimization Of Three-Phase Pwm Rectifier Robust Control System Based On Improved PSO Algorithm. 847-858 - Renbin Xiao, Tongyang Yu:
A Multi-Agent Simulation Approach To Rumor Spread In Virtual Commnunity Based On Social Network. 859-869 - Chenming Li, Fengzhou Wang, Xiaodong Wei, Zhenli Ma:
Solution Method Of Optimal Scheme Set For Water Resources Scheduling Group Decision-Mahing Based On Multi-Agent Computation. 871-883 - Xiaofang Li, Yanhong Sun, Ming Tang, Xijun Yan, Yanping Kang:
A Neural Network-Based Intelligent Image Target Identification Method And Its Performance Analysis. 885-896 - Wei Huang, Xingnan Zhang, Jianying Wang:
Multi-Agent System Computing And Simulation Of Inter-Basin Water Transfer. 897-908 - Huibin Wang, Shengnan Zheng, Xin Wang:
An Approach for Target Detection and Extraction Based on Biological Vision. 909-921 - Zixue Qiu, Xiaojun Wu, Wenming Zhang:
An Svm Method of Lda and its Kernel Algorithm With Application to Face Recognition. 923-933 - Shenghong Hu, Yufu Jia, Shenglong Tan:
Content-Aware Retargeting For Soccer Video Adaptation. 935-944 - Aiye Shi, Min Tang:
Fusion of Ikonos Imagery Based on Maximum Likelihood Estimation. 945-956 - Shengyong Chen, Zhongjie Wang, Hanyang Tong, Sheng Liu, Beiwei Zhang:
Optimal Feature Matching for 3D Reconstruction by Combination of Global and Local Information. 957-968 - Weihong Cui, Yi Zhang:
An Effective Graph-Based Hierarchy Image Segmentation. 969-981 - Xiaofeng Liao, Yongji Wang, Liping Ding, Jian Gu:
Extended Probabilistic Latent Semantic Analysis Model For Topics In Time-Stamped Images. 997-1007 - Wenjie Pan, Chaoying Jiang, Yuanju Tang, Simon X. Yang:
Tobacco Dry Weight Estimation Based On Artificial Neural Network. 997-1007 - Jianting Zhou, Jianxi Yang:
Prediction Of Bridge Life Based On Svm Pattern Recognition. 1009-1016
Volume 17, Number 8, 2011
Editorials
- Lizhong Xu, Xiaofang Li, Simon X. Yang:
Guest Editorial - Wireless Network and Communication Signal Processing. 1019-1021
- Yingchi Mao, Xiaofang Li, Simon X. Yang:
An Effective Data Gathering Scheme in Heterogeneous Energy Wireless Sensor Networks. 1023-1034 - Jing-Jing Gui, Jinshuang Wang, Yusen Zhang, Tao Zhang:
Formal Threat Analysis for Ad-Hoc Routing Protocol: Modelling and Checking the Sybil Attack. 1035-1047 - Xijun Yan, Yadong Li, Shufang Xu:
A Mac Protocol of Single Covered -Multiple Sensors Monitoring System. 1049-1061 - Hongsong Chen, Zhongchuan Fu:
A Novel Trust Routing Scheme Based on Node Behaviour Evaluation for Mobile AD Hoc Networks. 1063-1074 - Shuo Shi, Hao Sun, Xuemai Gu, Yanjun Jiang:
A Novel Rssi-Based Position Algorithm for Wireless Sensor Networks and Design of an Experimental System. 1075-1085 - Yueheng Li, Cheng Cheng, Guoping Tan:
A Novel Square Antenna Array to Improve the Capacity Stability of 4-Element Compact Mimo Systems. 1087-1098 - Huibin Wang, Lili Zhang, Jie Shen, Jie Yang:
A Self-Organizational Back-Off Algorithm Based on Local Topology Analysis. 1099-1111 - Enjie Ding, Duan Zhao, Xiao Li:
Research on the Radio Waves Propagation in Complex Coal Mine Workface. 1113-1123 - Fang Wang, Zhaocheng Wang, Yong Li, Lieguang Zeng:
Reliable Multi-Path Routing With Bandwidth and Delay Constraints. 1125-1137 - Pengyu Zeng, Yong Jiang:
An Effective Network Coding Strategy With Scalable Video Coding for Peer-to-Peer Streaming. 1139-1151 - Wuyao Shen, Xingming Zhang, Shubin Mai, Lei Huang, Xueyun Liu, Chong Zhang, Huai-xi Chen:
The Research of A New Streaming Media Network Architecture Based on the Fusion of P2P And CDN. 1153-1165 - Aiye Shi, Chenrong Huang, Mengxi Xu, Fengchen Huang:
Image Super-Resolution Fusion Based on Hyperacutiy Mechanism and Half Quadratic Markov Random Field. 1167-1178 - Xinyu Yuan, Ying Li, ShuiGuang Deng, Jie Chen:
Improved Affine Partition Algorithm for Compile-Time and Runtime Performance. 1179-1191 - Guang Hu, ZhiLei Chai, Shi-liang Tu:
Automatic Memory Management for Embedded Real-Time Java Processor Jpor-32. 1193-1205 - Yan Lv, Min Wu, Qi Lei, Zhuo-Yun Nie:
Soft Sensor Based on a Pso-Bp Neural Network for a Titanium Billet Furnace-Temperature. 1207-1216
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.