


default search action
9th HIS 2009: Shenyang, China - Volume 3
- Ge Yu, Mario Köppen, Shyi-Ming Chen, Xiamu Niu:

9th International Conference on Hybrid Intelligent Systems (HIS 2009), August 12-14, 2009, Shenyang, China. IEEE Computer Society 2009, ISBN 978-0-7695-3745-0
Theories and Applications for Peer-to-Peer Overlay Networks (4)
- Yingyan Teng, Xiaowei Wang, Zonggang He:

Design and Implementation of Interface Interactivity Based on Virtools and Serial Communication. 3-6 - Peng Wu, Jingjiao Li:

The Noise Removal on Rebound Signal of Linear Frequency. 7-9 - Yuan Gao, Dancheng Li, Chunyan Han, Zhiliang Zhu:

An Improved Network Topology Auto-layout Solution Based on Force-Directed Placement. 10-14 - Joydeb Roychoudhury, Tribeni Prasad Banerjee, Anup K. Bandopadhaya, Ajith Abraham:

Design Methodology of a Fault Aware Controller Using an Incipient Fault Diagonizer. 15-19 - Qinghui Wang, Lifeng Wei, Danbin Liu:

A P2P-Grid Model for Traversing NAT in SIP Communication. 20-23 - Deguo Yang, Lianqiang Niu, Xincun Wang:

A P2P-SIP Architecture for Real Time Stream Media Communication. 24-28 - Jinqing Cai, Xiuli Shao, Wenhui Ma:

Ontology Driven Semantic Search over Structure P2P Network. 29-34
Novel Approaches to Information Security Application (1)
- Chin-Chen Chang, Yeu-Pong Lai:

An Enhancement of JPEG Still Image Compression with Adaptive Linear Regression and Golomb-Rice Coding. 35-40 - Iuon-Chang Lin, Rui-Kun Luo, Shih-Chang Tsao:

An Efficient Mutual Authentication Protocol for RFID Systems. 41-45 - Zhidong Shen, Qiang Tong:

A Security Technology for Mobile Agent System Improved by Trusted Computing Platform. 46-50 - Hongfeng Zhu, Tianhua Liu, Jie Liu:

Robust and Simple Multi-server Authentication Protocol without Verification Table. 51-56 - Ali Selamat, Mohd Aizaini Maarof, Tey Yi Chin:

Fuzzy Mamdani Inference System Skin Detection. 57-62 - Bin Hu, Günther R. Raidl:

A Memetic Algorithm for the Generalized Minimum Vertex-Biconnected Network Problem. 63-68
Novel Approaches to Information Security Application (2)
- Wen-Chung Kuo, Lih-Chyau Wuu, Chia-Nian Shyi, Shao-Hung Kuo:

A Data Hiding Scheme with High Embedding Capacity Based on General Improving Exploiting Modification Direction Method. 69-72 - Ming-Ni Wu, Puu-An Juang, Yu-Chiang Li:

An Efficient VQ-Based Data Hiding Scheme Using Voronoi Clustering. 73-77 - Chia-Hsin Cheng, Guo-Jun Wen, Ling-Cheng Hsu, Yung-Fa Huang

:
Hyperbolic Tangent HNN Multiuser Detection in DS-UWB Systems. 78-82 - Jinfu Chen, Yansheng Lu, Xiaodong Xie:

CSTS: A Prototype Tool for Testing COM Component Security. 83-88 - Jaw-Shyang Wu, Tsung-En Lee, Ching-Sung Lu, Shung-Der Su:

An Autonomous Decision Approach for Fault Allocation and Service Restoration in Electrical Distribution Systems by Multi Agent System. 89-94 - Jianfeng Dong, Xiaofeng Wang, Feng Hu, Liyan Xiao:

A Novel Data Purification Algorithm Based on Outlier Mining. 95-98
Multi-source Data Process
- Wei Gao, Hai Zhao, Yanrong Cheng, Zhan Mei:

The Application Study on Data Fusion Technology in Classifying of Internal Component of Shells. 99-102 - Wei Gao, Jingxin Wen, Nan Jiang, Hai Zhao:

A Study of Data Fusion Based on Combining Rough Set with BP Neural Network. 103-106 - Xiao-dan Zhang, Zhendong Niu:

Study on Decision Classification Fusion Model. 107-109 - Chang-Xing Qi, Qing-Dong Du:

A Smart IVR System Based on Application Gateways. 110-115
Information Management & Knowledge Management (1)
- Hui Dong, Siwei Yu, Ying Jiang:

Knowledge Representation of Chinese Genealogical Record of VIPs in KMT and CPC. 116-120 - Yigang Zhou

, Hui Dong, Ziran Zhang:
An Open Source Toolkit for Grid Resources Scheduling in Digital Library. 121-124 - Hui Dong, Siwei Yu, Ying Jiang:

A Protege Plug-In for Modeling Dimensional Ontology. 125-128 - Qiang Li, Baoliang Mu:

A Novel Method to Detect Junk Mail Traffic. 129-133 - Der-Fa Chen, Kai-chao Yao:

A Novel Sliding-Mode Controller Design for a Matrix Converter Drive System. 134-137 - Jia-lin Ma, Xu Wei:

An Improved Anti-collision Algorithm in RFID System. 138-141 - Yan Zhang, Shurong Guo:

Research into Web-Based 4PL Supply Chain System Model of Multi-TPLs - Information-Based Model Suitable for Chinese TPL. 142-146 - Xiongwei Zhou, Feicheng Ma:

An Information Sharing Incentive Model in Supply Chain with Mixed Retail and E-tail Channels. 147-150
Information Management & Knowledge Management (2)
- Gang Li, Guangzeng Kou, Ercui Zhou, Ling Zhang:

Symmetric Trends: Optimal Local Context Window in Chinese Word Sense Disambiguation. 151-154 - Wenqing Yuan, Li Luo:

The Development and Evaluation of Internet Data Mining System. 155-159 - Shuwei Huang, Xueying Wang:

Influence of Organizational System to End-Users' Acceptance of ERP System in Chinese Enterprises. 160-164 - Huiyan Liu, Xueying Wang, Qizhe Quan:

Research on the Enterprise' Model of Information Lifecycle Management Based on Enterprise Architecture. 165-169 - Wenjing Tang, Haiying Xie, Cairong Wang:

The Strategy of Data Integration for Manufacturing Enterprises Based on Component Software Development. 170-173 - Feng Li, Cheng Liu:

Application Study of BP Neural Network on Stock Market Prediction. 174-178 - Feng Li, Qizhe Quan:

Study of Financial Risk Based on EVT. 179-182 - Xuedong Sun, Lianhao Zhang:

Basic Factors Design of Pedagogical Agent System in an Ecology View. 183-186
Information Management & Knowledge Management (3)
- Wen Li, Xin Li:

Design of a Personalized Learning System Based on Intelligent Agent for E-learning. 187-190 - Ying Zhao, Lili Wu:

Second Life: A New Window for E-learning. 191-194 - Yongjun Jing, Xin Li, Shaochun Zhong:

Research on Personalized Services for Users of Education Resources Net. 195-197 - Xinghui Wang:

Analysis of E-learning Influencing Factors Based on ISM. 198-201 - Yu Yan, Haiying Xie:

Research on the Application of Data Mining Technology in Insurance Informatization. 202-205 - Hailian Kou, Zhenggang Wan:

Research on E-Learning-Based Educational Technology Training Model for College Teachers. 206-210 - Zhenggang Wan, Hailian Kou:

A Study on the Construction of Quality Courses Network Based on HPT. 211-215 - Chunying Chen, Xiongwei Zhou, Jianzhong Zhang:

Web Data Mining System Based on Web Services. 216-220
Information Management & Knowledge Management (4)
- Kai-li Wang, Philippe Trigano:

Modeling Unit of Learning in Learning Management System and Learning Content Management System with User Preference. 221-225 - Xueying Wang, Ying Zhao:

An Enterprise Architecture Development Method in Chinese Manufacturing Industry. 226-230 - Lifeng Wei, Qinghui Wang, Hongwei Ren:

Software Design of Embedded VideoTelephone Based on PJSIP Stack. 231-234 - Hua Chen, Baolin Sun, Yue Zeng, Xianying He:

An Entropy-Based Fuzzy Controllers QoS Routing Algorithm in MANET. 235-239 - Dan Yang, Hong Wang, Yang Liu:

Dynamic Execution Strategy of Web Service Composition Based on e_SPDL and Service Container. 240-243 - Ping Yao:

Credit Scoring Using Ensemble Machine Learning. 244-246 - Shaoyun Wang, Qingjin Meng, Jingjian Wu:

The DCS of Waste Heat Power Generation of Cement Plant Based on Fuzzy Control. 247-251
Advanced Data Processing Technology (1)
- Baoyan Song, Pengfei Qin, Hao Wang, Weihong Xuan, Ge Yu:

bSpace: A Data Cleaning Approach for RFID Data Streams Based on Virtual Spatial Granularity. 252-256 - Xiaoli Li, Xiaoguang Li, Baoyan Song:

Effectively Answering Schema-Free XML Queries over Document-Centric Data. 257-261 - Shuzi Niu, Daling Wang, Shi Feng, Ge Yu:

An Improved Spectral Clustering Algorithm for Community Discovery. 262-267 - Yan Wang, Weihong Xuan, Wei Li, Baoyan Song, Xiaoguang Li:

A Real-Time Scheduling Strategy Based on Priority in Data Stream System. 268-272 - Derong Shen, Gaoshang Sun, Tiezheng Nie, Yue Kou:

DeepSearcher: A One-Time Searcher for Deep Web. 273-277 - ZhiHeng Liang:

A Classification Algorithm Based on an Association Rule of Multiple Frequent Item-Sets. 278-282 - Cheng-An Tai, Yung Lung Lee, Ching-Yuan Lin:

Public Participation Interface of Urban Disaster Prevention Spatial System Planning - Application of Google Earth. 283-288
Advanced Data Processing Technology (2)
- Jianmei Huang, Junchang Xin, Guoren Wang, Miao Li:

Efficient k-Dominant Skyline Processing in Wireless Sensor Networks. 289-294 - Xiaomei Dong, Xiaohua Li:

An Immune Based Relational Database Intrusion Detection Algorithm. 295-300 - Jingang Shi, Yubin Bao, Fangling Leng, Ge Yu:

Priority-Based Balance Scheduling in Real-Time Data Warehouse. 301-306 - Xiangguo Zhao, Junchang Xin, Ende Zhang:

XML Functional Dependency and Schema Normalization. 307-312 - Xin Li, Zhen Qin, Tao Yu:

Optimizing the QoS Performance of Fast Rerouting. 313-318 - Yunong Zhang

, Lingfeng Li, Yiwen Yang, Gongqin Ruan:
Euler Neural Network with Its Weight-Direct-Determination and Structure-Automatic-Determination Algorithms. 319-324 - Gaohua Liao, Junmei Xi:

Pipeline Weld Detection System Based on Machine Vision. 325-328
Design and Implementation of Control Systems
- Kai-chao Yao, Der-Fa Chen:

Establishment of New Electro-oculogram Measurement Technique by Integrating Virtual Instrument. 329-333 - Wei-Tzer Huang, Shiuan-Tai Chen:

Line Loss Reduction by Distribution System Upgrading from Radial to Normally Closed-Loop Arrangement. 334-339 - Ho-Lung Hung, Chuan-Wang Chang, Jyh-Horng Wen:

An Effective Hybrid PSOSA-Based Multi-user Detection for DS-CDMA Ultra-WideBand Communications Systems. 340-345 - Yanli Zhang, Xiaodong Liu, Xueying Wang:

A Novel Weighted Fuzzy Clustering Analysis Based on AFS Theory. 346-350 - Kai-chao Yao, Tai-li Chen, Yu-te Lian:

Virtual Spectrum Analyzer Design and Implementation. 351-354 - Quan Dong, Quan Li:

Current Control of BLDCM Based on Fuzzy Adaptive ADRC. 355-358 - Huan Shen, Shun Ming Li, Fang Chao Bo, Xiaodong Miao, Fang Pei Li, Hua Peng Zhou:

Vision Based Navigation System of Intelligent Vehicles: A Robust Object Tracking Approach. 359-364
Hybrid Intelligent Techniques for Power, Control and Communication (1)
- Mingyan Zhao, Hongbo Liu, Ajith Abraham, Emilio Corchado:

A Swarm-Based Rough Set Approach for Group Decision Support Systems. 365-369 - Sayan Ghosh, Debarati Kundu, Kaushik Suresh, Swagatam Das

, Ajith Abraham, Bijaya K. Panigrahi, Václav Snásel:
On Some Properties of the lbest Topology in Particle Swarm Optimization. 370-375 - Pavel Krömer

, Václav Snásel, Jan Platos
, Ajith Abraham:
Optimization of Turbo Codes by Differential Evolution and Genetic Algorithms. 376-381 - Jianli Ding, Xuesen Li, Guansheng Tong:

The Dynamic Immune Forecasting Method of the Airdrome Flight Delay under Considering the Stochastic Factors. 382-387 - Xue-Ling Song, Ying-bao Zhao, Chao-Ying Liu, Zhe-Ying Song:

Solenoid Valve Switching Characteristic Test System Design. 388-391 - Jing Ma, Zhiwei Gao

:
General Controller for a Class of Singular System Simultaneous Stabilization. 392-396
Hybrid Intelligent Techniques for Power, Control and Communication (2)
- Hesam Izakian, Ajith Abraham, Václav Snásel:

Scheduling Meta-Tasks in Distributed Heterogeneous Computing Systems: A Meta-Heuristic Particle Swarm Optimization Approach. 397-402 - V. Ravikumar Pandi, Bijaya K. Panigrahi, Manas Kumar Mallick, Ajith Abraham, Swagatam Das

:
Improved Harmony Search for Economic Power Dispatch. 403-408 - Da Wei Huang, Xue-Shan Han:

Study on Generation Companies' Bidding Strategy Based on Hybrid Intelligent Method. 409-412 - Kaisheng Zhang, Jiaan Zhang, Guofa Guo:

Research on Simulating-Human Intelligent Control Method for the Cold-Storage of Fruits and Vegetables. 413-415 - Supeng Zhu, Wenxing Fu, Jun Yang, Jianjun Luo:

Applying Genetic Algorithm to Optimization Parameters of Missile Control System. 416-419
Soft Computing for Image and Signal Processing
- Rong Wang, Lihua Li, Weijun Hong, Nan Yang:

A THz Image Edge Detection Method Based on Wavelet and Neural Network. 420-424 - Jing Bi, Kai Song, Hang Li:

The Level Filling Algorithm for Clockwise Edge. 425-427 - Rong Wang, Weijun Hong, Nan Yang:

The Research on Footprint Recognition Method Based on Wavelet and Fuzzy Neural Network. 428-432 - Lihua Li, Rong Wang, Jintao Li, Ge Wang:

The Research of ISOETRP Clustering Algorithm on Optical Mathematical Symbols Recognition. 433-436 - Yuhua Chai, Danting Zhao, Rong Wang:

A Soybean Image Noise Smoothing Method Using Multi-scale Morphology. 437-441 - Dong-Min Woo, Dong-Chul Park:

Rooftop Detection Based on 3D Line Data Using Fast Graph Search. 442-446 - Ze-Hong Li, Bin-Bin Liu, Li-Chun Wang:

The Research on Consolidated Financial Evaluation about Corporate Social Responsibility Based on Fuzzy-AHP. 447-450
Cross-Discipline Techniques (1)
- Shujing Zhou, Lanjing Liu, Chao Wu:

Application of LMBP Forecast Model in International Construction Claim. 451-456 - Thiago T. Angelico, Thais Santos Bueno, Silvio Bortoleto, Anderson Ravanello:

KDD on IVR Navigation Trees: Case Study. 457-459 - Chang-hong Shan, Zhong-ze Chen, Jin-xiong Jiang:

An All Digital Phase-Locked Loop System with High Performance on Wideband Frequency Tracking. 460-463 - Yunhong Gao, Yibo Li:

Fault Prediction Model Based on Phase Space Reconstruction and Least Squares Support Vector Machines. 464-467 - Xuelian Chen, Jingtao Hu, Liancheng Shan, Yaping Wang:

Extraction and Code of Drainage Network Based on Digital Elevation Model. 468-473 - Yue Zhang, Jie Liu, Hang Li:

An Implementation Strategy of Global OLTP Based on ODS in Heterogeneous Environment. 474-477 - Yuanyuan Zhang:

Exact Solutions for the Generalized Derivative Schrodinger Equation. 478-480
Cross-Discipline Techniques (2)
- Jian Tang, Wanchun Qu:

Forecasting Increment Control Methods in Regulated Period for the Temperature of Beer Fermentation. 481-484 - Wanchun Qu, Jian Tang:

Multi-point Calibration Detecting Method of Non-linear Analogue Quantity. 485-488 - Wusheng Zhao, Yongqing Fu, Qiang Lv:

The Turbo Equalization in Bit Interleaved Coded Modulation with Iterative Decoding. 489-492 - Yuting Zhao, Jeff Z. Pan, Yuan Ren:

Implementing and Evaluating a Rule-Based Approach to Querying Regular EL+ Ontologies. 493-498 - Jing Ma, Kun Ma:

Strong Simultaneous Stabilization for a Class of Generalized Linear System. 499-503 - Weibing Fan, Zhihua Cui, Jianchao Zeng:

Inertia Weight Selection Strategy Based on Lyapunov Stability Analysis. 504-509

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














