


default search action
Intelligent Automation & Soft Computing, Volume 17
Volume 17, Number 1, 2011
- Youhui Zhang, Hongyi Wang, Dongsheng Wang, Weimin Zheng:

Employing Object-Based Storage Devices to Embed File Access Control in Storage. 1-11 - Kristjan Basa, Andrej Zemva:

Simulation and Verification of a Dynamic Model of the Electric Forklift Truck. 13-30 - Yu-Chin Liu, Ping-Yu Hsu

:
Discovering Accurate and Common Characteristic Rules from Large Tables. 31-40 - Félix Gómez Mármol, Gregorio Martínez Pérez, Javier G. Marín-Blázquez

:
Meta-Tacs: A Trust Model Demonstration Of Robustness Through A Genetic Algorithm. 41-59 - Mohamed Saad, Sanaa A. Muhaureq:

Joint Routing and Radio Resource Management in Multihop Cellular Networks Using Particle Swarm Optimization. 61-70 - Junichiro Yoshimoto

, Masa-aki Sato, Shin Ishii
:
Bayesian Normalized Gaussian Network and Hierarchical Model Selection Method. 71-94 - Edgar N. Sánchez, Luis J. Ricalde

, Reza Langari, Danial Shahmirzadi:
Rollover Prediction and Control in Heavy Vehicles Via Recurrent High Order Neural Networks. 95-107
Volume 17, Number 2, 2011
- Matthew A. Joordens, Mohammad Jamshidi:

Design Of A Prototype Underwater Research Platform For Swarm Robotics. 111-132 - Daohang Sha, Vladimir B. Bajic

:
An Optimized Recursive Learning Algorithm for Three-Layer Feedforward Neural Networks For Mimo Nonlinear System Identifications. 133-147 - Piotr Borkowski

, Zenon Zwierzewicz
:
Ship Course-Keeping Algorithm Based On Knowledge Base. 149-163 - B. M. Mohan:

Fuzzy Pid Control Via Modified Takagi-Sugeno Rules. 165-174 - Zhi-Xian Chen, Hao Huang:

A Hybrid Method for Intrusion Detection With Ga-Based Feature Selection. 175-186 - Shiguo Lian, Frank Y. Shih:

A Special Section of Intelligent Automation and Soft computing - Soft Computing For Copyright Protection. 189-190 - Zhiyong Zhang, Qingqi Pei, Jianfeng Ma, Lin Yang:

Game-Theoretic Analyses and Simulations of Adoptions of Security Policies for Drm in Contents Sharing Scenario. 191-203 - Xi Chen, Shiguo Lian:

On the Secure Watermark Embedding Scheme Based on Selective Encryption. 205-217 - Xia Li, Lingjun Liu, Na Wang, Jeng-Shyang Pan

:
A New Robust Watermarking Scheme Based on Shuffled Frog Leaping Algorithm. 219-231 - Xinpeng Zhang, Shuozhong Wang, Guorui Feng:

Reversible Visible Watermarhing with Lossless Data Embedding Based on Difference Value Shift. 233-243 - Shinfeng D. Lin, Zong-Lin Yang:

Hierarchical Fragile Watermarking Scheme For Image Authentication. 245-255 - Venkata Gopal Edupuganti, Frank Y. Shih, I-Cheng Chang:

An Efficient Block-Based Fragile Watermarking System for Tamper Localization and Recovery. 257-267 - I-Cheng Chang, Chieh-Jung Hsieh:

Image Forgery Using An Enhanced Bayesian Matting Algorithm. 269-281
Volume 17, Number 3, 2011
- Ying-Kuei Yang, Chien-Nan Lee, Horng-Lin Shieh:

A Robust Fuzzy Clustering Approach and its Application to Principal Component Analysis. 1-11 - (Withdrawn) An Intelligent and Automatic Face Shape Prediction System From Fingerprints. 309-317

- Tomasz Praczyk

:
Forming Neural Networks by Means of Assembler Encoding-Preliminary Report. 319-331 - Li-Hong Juang:

A New Mixed Least Mean Square and Least Mean Fourth Algorithm for Multilayer Perceptron Fast Training. 333-341 - Qinglei Hu:

Simultaneous Vibration Reduction and Attitude Control of Flexible Spacecraft with On-Off Actuators. 343-354 - Yih-Fang Chang, Truong-Giang Nguyen

:
Optimal-Feedrate Interpolation for Machining Parametric Curves. 355-368 - Mehdi Farrokhrooz, Mahmood Karimi

:
Marine Vessels Acoustic Radiated Noise Classification in Passive Sonar Using Probabilistic Neural Network and Spectral Features. 369-383 - Jong-Yih Kuo, Fu-Chu Huang:

A Hybrid Approach for Multi-Agent Learning Systems. 385-399
Volume 17, Number 4, 2011
- Cemal Okan Sakar

, Goksel Demir
, Olcay Kursun
, Hüseyin Özdemir
, Gökmen Altay, Senay Yalçin:
Feature Selection For The Prediction Of Tropospheric Ozone Concentration Using A Wrapper Method. 403-413 - Erik Cuevas, Daniel Zaldivar, Marco Antonio Pérez Cisneros

, Edgar N. Sánchez, Marte A. Ramírez-Ortegón:
Robust Fuzzy Corner Detector. 415-429 - Hui-Ya Li, Yao-Jung Yeh, Wen-Jyi Hwang:

Fast KNN Classification Based On Softcore Cpu And Reconfigurable Hardware. 431-446 - Hei-Chia Wang, Tian-Hsiang Huang, Chia-Tzung Liu:

Automatic Summarization Based On Automaticallyinduced Ontology. 447-463 - Shi-Jay Chen:

Fuzzy Information Retrieval Based On A New Similarity Measure Of Generalized Fuzzy Numbers. 465-476 - Seta Bogosyan:

A Sliding Mode Based Neural Network For Data Fusion And Estimation Using Multiple Sensors. 477-493
Volume 17, Number 5, 2011
Editorials
- Tingyao Jiang, Dong Ren, Simon X. Yang

:
A Special Issue of Intelligent Automation and Soft Computing - Theoretical Investigation Of Dependable Computing. 493-495
- Junqing Liu, Dan-gui Xie, Dong Ren, Yong Liu, Shuifa Sun:

Edge-Based Blotch Identification Algorithm In Archive Film Restoration. 497-507 - Xinsai Wang, Yu Liu, Jing He:

Automatic Segmentation Of Infrared Image Based On x2 Distribution. 509-517 - Yuan Tian, Chunjiang Zhao, Shenglian Lu, Xinyu Guo:

Multiple Classifier Combination For Recognition Of Wheat Leaf Diseases. 519-529 - Jingcheng Zhang, Juhua Luo

, Wenjiang Huang, Jihua Wang:
Continuous Wavelet Analysis Based Spectral Feature Selection For Winter Wheat Yellow Rust Detection. 531-540 - Hongwei Wang, Zhibo Wu, Xiaozong Yang, Hongwei Liu:

A Novel Aco-Based Multicast Path Algorithm In Hypercube Networks. 541-549 - Feng Xu, Xin Lv, Likun Jia:

A New Verifiable Threshold Decryption Scheme Without Trusted Center. 551-558 - Chunyan Hou, Gang Cui, Hongwei Liu, Lian-Ke Zhou:

A Hybrid Queueing Model With Imperfect Debugging For Component Software Reliability Analysis. 559-570 - Xiaofeng Ding, Lizhong Xu, Xin Wang, Guofang Lv, Xuewen Wu:

Roubust Visual Object Tracking Using Covariance Features In Quasi-Monte Carlo Filter. 571-582 - Huan-Huan Song, Shu-zong Wang, Li-Bing Shao, Li Chen, Xiaofang Zhang:

Fast Navigation-Placement Tree Algorithm For Reconfigurable Computing System. 583-593 - Dawei Wang, Yibo Xue, Yingfei Dong:

Anomaly Detection Using Neighborhood Negative Selection. 595-605 - Guangming Dai, Maocai Wang, Lei Peng, Ruijie Qin:

Implementation And Optimization For Tate Pairing. 607-617 - Xiuling Zhou, Ping Guo

, C. L. Philip Chen
:
Speed Up Reliability Model Optimization With Hypervolume Contribution Calculating Algorithm. 619-629 - Yuanyuan Fu, Dong Ren, Guangzhu Xu, Simon X. Yang:

Weighted Fusion Of Gradient, Vertical Gradient And Horizontal Gradient In Logarithm Domain For Face Recognition Under Varying Lighting. 631-642 - Jianting Zhou, Jianxi Yang:

Analysis Of Bridge Safety Assessment With Correlation Between Measuring Points For Bridge Health Monitoring. 643-650 - Tingyao Jiang, Xiao Chen, Dewei Shu:

An Improved Integrated Tender Evaluation Method Based On Analytic Hierarchy Process. 651-658
Volume 17, Number 6, 2011
Editorials
- Dong Ren, Tingyao Jiang, Simon X. Yang

:
A Special Issue of Intelligent Automation and Soft Computing - Applications of Dependable Computing. 661-663
- Tingyao Jiang, Heng Yu, Lele Cui:

A Novel Security Mechanism for Hybrid Encryption in Mineral Management Information System. 665-674 - Xiaohui Chen

, Jing He, Jinpeng Chen:
An Improved Localization Algorithm for Wireless Sensor Network. 675-685 - Dong Ren, Yuanyuan Fu, Fangmin Dong, Guangzhu Xu:

A Robust Processing Chain for Face Recognition under Varying Illumination. 687-699 - Xiaodong Yang, Weihong Cui, Hao Yang, Cunjun Li, Wenjiang Huang, Jihua Wang:

Integrating Geospatial Web Services Into Enterprise Business System based on Service Intelligent Agents and Bayesian Network. 701-711 - Shuang'E Zhou, Guoping Xiong:

Task Synchronization Process based on Petri Net. 713-724 - Nianhua Yang, Huiqun Yu, Hua Sun, Zhilin Qian:

Modeling Activity Diagrams with Extended Petri Nets. 725-735 - Chuang Ma

, Hongwei Liu, Haiying Zhou, Zhibo Wu, Xiao-Zong Yang, Xi-Bo Xiao:
A Fault-Tolerant Algorithm of Wireless Sensor Network Based on Recoverable Nodes. 737-747 - Xihong Su, Zhibo Wu, Hongwei Liu, Xiaozong Yang, Xiao-Zong Yang:

Reliability Analysis Of SA based Software Deployment with Consideration of System Deployment. 749-758 - Weipeng Jing, Zhibo Wu, Hongwei Liu, Jian Dong:

An Effective Bi-Criteria and Contention Awareness Scheduling in Heterogeneous Distributed Systems. 759-769 - Yu Hu, Zhongliang Chen, Xiaowei Li:

Oware: Operand width Aware Redundant Execution for Whole-Processor Error Detection. 771-780 - Renbin Xiao, Xiaoguang Gong, Tongyang Yu:

A Simulation Approach To The Control Mechanism Of Individual And Web Site In Malware Spread. 781-792 - Xingyao Hao, Yuchun Pan:

Accuracy Analysis Of Earthwork Calculation Based On Triangulated Irregular Network (Tin). 793-802 - Jie Yin, Jianhui Jiang, Yue Liu:

AC-RMT: A Fault-Tolerance Smt Architecture Based On Asynchronous Checkpoint. 803-813 - Jun Zhou, Yongjun Xu, Xiaowei Li:

A Security Mechanism For RFID With Dependable Proxy. 815-825
Volume 17, Number 7, 2011
Editorials
- Lizhong Xu, Xiaofang Li, Simon X. Yang

:
A Special Issue of Intelligent Automation and Soft Computing - Intelligent Information Processing And System Optimization. 829-831
- Jingguo Wang, Yangmin Li

:
Traching Control Of A Redundant Manipulator With The Assistance Of Tactile Sensing. 833-845 - Guojun Tan, Hui Zhang

, Miaowang Qian, Rui-Wen Yu:
Optimization Of Three-Phase Pwm Rectifier Robust Control System Based On Improved PSO Algorithm. 847-858 - Renbin Xiao, Tongyang Yu:

A Multi-Agent Simulation Approach To Rumor Spread In Virtual Commnunity Based On Social Network. 859-869 - Chenming Li, Fengzhou Wang, Xiaodong Wei, Zhenli Ma:

Solution Method Of Optimal Scheme Set For Water Resources Scheduling Group Decision-Mahing Based On Multi-Agent Computation. 871-883 - Xiaofang Li, Yanhong Sun, Ming Tang, Xijun Yan, Yanping Kang:

A Neural Network-Based Intelligent Image Target Identification Method And Its Performance Analysis. 885-896 - Wei Huang, Xingnan Zhang, Jianying Wang:

Multi-Agent System Computing And Simulation Of Inter-Basin Water Transfer. 897-908 - Huibin Wang, Shengnan Zheng, Xin Wang:

An Approach for Target Detection and Extraction Based on Biological Vision. 909-921 - Zixue Qiu, Xiaojun Wu, Wenming Zhang:

An Svm Method of Lda and its Kernel Algorithm With Application to Face Recognition. 923-933 - Shenghong Hu, Yufu Jia, Shenglong Tan:

Content-Aware Retargeting For Soccer Video Adaptation. 935-944 - Aiye Shi, Min Tang:

Fusion of Ikonos Imagery Based on Maximum Likelihood Estimation. 945-956 - Shengyong Chen, Zhongjie Wang, Hanyang Tong, Sheng Liu, Beiwei Zhang:

Optimal Feature Matching for 3D Reconstruction by Combination of Global and Local Information. 957-968 - Weihong Cui, Yi Zhang:

An Effective Graph-Based Hierarchy Image Segmentation. 969-981 - Xiaofeng Liao, Yongji Wang, Liping Ding, Jian Gu:

Extended Probabilistic Latent Semantic Analysis Model For Topics In Time-Stamped Images. 997-1007 - Wenjie Pan, Chaoying Jiang, Yuanju Tang, Simon X. Yang

:
Tobacco Dry Weight Estimation Based On Artificial Neural Network. 997-1007 - Jianting Zhou, Jianxi Yang

:
Prediction Of Bridge Life Based On Svm Pattern Recognition. 1009-1016
Volume 17, Number 8, 2011
Editorials
- Lizhong Xu, Xiaofang Li, Simon X. Yang

:
Guest Editorial - Wireless Network and Communication Signal Processing. 1019-1021
- Yingchi Mao, Xiaofang Li, Simon X. Yang

:
An Effective Data Gathering Scheme in Heterogeneous Energy Wireless Sensor Networks. 1023-1034 - Jing-Jing Gui, Jinshuang Wang, Yusen Zhang, Tao Zhang:

Formal Threat Analysis for Ad-Hoc Routing Protocol: Modelling and Checking the Sybil Attack. 1035-1047 - Xijun Yan, Yadong Li, Shufang Xu:

A Mac Protocol of Single Covered -Multiple Sensors Monitoring System. 1049-1061 - Hongsong Chen, Zhongchuan Fu:

A Novel Trust Routing Scheme Based on Node Behaviour Evaluation for Mobile AD Hoc Networks. 1063-1074 - Shuo Shi, Hao Sun, Xuemai Gu, Yanjun Jiang:

A Novel Rssi-Based Position Algorithm for Wireless Sensor Networks and Design of an Experimental System. 1075-1085 - Yueheng Li, Cheng Cheng, Guoping Tan:

A Novel Square Antenna Array to Improve the Capacity Stability of 4-Element Compact Mimo Systems. 1087-1098 - Huibin Wang, Lili Zhang, Jie Shen, Jie Yang:

A Self-Organizational Back-Off Algorithm Based on Local Topology Analysis. 1099-1111 - Enjie Ding, Duan Zhao, Xiao Li:

Research on the Radio Waves Propagation in Complex Coal Mine Workface. 1113-1123 - Fang Wang, Zhaocheng Wang, Yong Li, Lieguang Zeng:

Reliable Multi-Path Routing With Bandwidth and Delay Constraints. 1125-1137 - Pengyu Zeng, Yong Jiang:

An Effective Network Coding Strategy With Scalable Video Coding for Peer-to-Peer Streaming. 1139-1151 - Wuyao Shen, Xingming Zhang, Shubin Mai, Lei Huang, Xueyun Liu, Chong Zhang, Huai-xi Chen:

The Research of A New Streaming Media Network Architecture Based on the Fusion of P2P And CDN. 1153-1165 - Aiye Shi, Chenrong Huang, Mengxi Xu, Fengchen Huang:

Image Super-Resolution Fusion Based on Hyperacutiy Mechanism and Half Quadratic Markov Random Field. 1167-1178 - Xinyu Yuan, Ying Li, ShuiGuang Deng, Jie Chen:

Improved Affine Partition Algorithm for Compile-Time and Runtime Performance. 1179-1191 - Guang Hu, ZhiLei Chai, Shi-liang Tu:

Automatic Memory Management for Embedded Real-Time Java Processor Jpor-32. 1193-1205 - Yan Lv, Min Wu, Qi Lei, Zhuo-Yun Nie:

Soft Sensor Based on a Pso-Bp Neural Network for a Titanium Billet Furnace-Temperature. 1207-1216

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














