


default search action
ICGEC 2011: Kinmen, Taiwan / Xiamen, China
- Junzo Watada, Pau-Choo Chung, Jim-Min Lin, Chin-Shiuh Shieh, Jeng-Shyang Pan:

Fifth International Conference on Genetic and Evolutionary Computing, ICGEC 2011, Kinmen, Taiwan / Xiamen, China, August 29 - September 1, 2011. IEEE Computer Society 2011, ISBN 978-1-4577-0817-6 - Yuh-Ming Cheng:

Construct an Online Contest Game-Based Learning System for Junior High School Students. 1-4 - Chien-Shiang Hong, Chuen-Ching Wang, Shen-Chuan Tai, Ya-Chiung Luo:

Object-Based Error Concealment in 3D Video. 5-8 - Bae-Ling Chen, Wen-Chung Kuo, Lih-Chyau Wuu:

Security on the Design of RFID Access Control Protocol Using the Strategy of Indefinite-Index and Challenge-Response. 9-12 - Shi-Huang Chen, Jhing-Fa Wang, YuRu Wei, John Shang, Shao-Yu Kao:

The Implementation of Real-Time On-line Vehicle Diagnostics and Early Fault Estimation System. 13-16 - Chien-Chou Lin, Chun-Ting Chang:

A Fast Shape Context Matching Using Indexing. 17-20 - Kai-Yi Chin, Chin-Hsien Wu, Zeng-Wei Hong

:
A Humanoid Robot as a Teaching Assistant for Primary Education. 21-24 - Yuan-Hsiang Lin, Chih-Fong Lin, Chong-Rong Wu, Yuan-Chang Hsu, He-Zhong You:

Intelligent Physiological Monitoring and Feedback System for Driver Safety. 25-28 - Ming-Hung Tsai, Chung-Fan Liu, Wei-Chih Shen:

Computer Aided Diagnosis for Evaluating Colorectal Mucosal Lesions Using Narrow-Band Imaging. 29-32 - Chuan-Yen Chiang, Yen-Lin Chen

, Chao-Wei Yu, Shyan-Ming Yuan
, Zeng-Wei Hong
:
An Efficient Component-Based Framework for Intelligent Home-Care System Design with Video and Physiological Monitoring Machineries. 33-36 - Jong-Shin Chen, Zong-Yi Lyu, Zeng-Wen Hong:

An Efficient Cluster Head Selection Strategy for Wireless Sensor Network. 37-40 - Chuan-Pin Lu, Jui-Pin Li, Wei-Yi Liou, Hung-Ming Chen:

The Development of Smart Assistive Technology Devices for Urinary Catheterization Monitoring. 41-44 - Mao-Lun Chiang

, Y. R. Chen, C. B. Lin, Y. C. Chang:
Dynamic Dispatching Mechanism for Differentiated Services in Cloud Clusters. 45-48 - Chia-Fen Hsieh, Yung-Fa Huang

, Rung-Ching Chen:
A Light-Weight Ranger Intrusion Detection System on Wireless Sensor Networks. 49-52 - Li-Hua Li, Fu-Ming Lee, Tsung-Jen Pu, Chih-Wei Chen:

A Personalized Pair-Recommendation Approach Using Mobile Message Ontology. 53-56 - Wei Kuang Lai, Kai-Ting Yang, Meng-Chong Li:

Bus Assisted Connectionless Routing Protocol for Metropolitan VANET. 57-60 - Guan-Hsiung Liaw, Yen-Tung Yeh:

A TDMA Medium Access Control Mechanism for IEEE 802.11-Based Wireless Networks. 61-64 - Wei Kuang Lai, Yuh-Chung Lin

, Tsung-Han Chen, Chin-Shiuh Shieh:
Load-Balance Directed Diffusion in Wireless Sensor Networks. 65-68 - Qingxiang Feng, Kuo-Kun Tseng, Jeng-Shyang Pan, Peng Cheng

, Charles Chen:
New Anti-phishing Method with Two Types of Passwords in OpenID System. 69-72 - Iyad Amro, Wasel Ghanem

:
GSM Automatic Frequency Planning with the Aid of Genetic Algorithms. 73-76 - Bao Rong Chang, Hsiu Fen Tsai, Zih-Yao Lin, Chi-Ming Chen:

Access Security on Cloud Computing Implemented in Hadoop System. 77-80 - Hui-Hsin Huang:

The Estimation of Mixture Customer Interpurchase Length. 81-83 - Chih-Te Yang

, Hsiu-Feng Yen, Tien-Tsai Huang, Liang-Ho Chen:
The Optimal Order and Payment Policies with Discount Cash Flows Analysis under Two Levels of Trade Credit Policy. 84-88 - Yan Pei

, Hideyuki Takagi
:
Accelerating Evolutionary Computation with Elite Obtained in Projected One-Dimensional Spaces. 89-92 - Ahmad Faramarzi, Kamel Sabahi

:
Recurrent Fuzzy Neural Network for DC-Motor Control. 93-96 - Praveen Kumar Shukla

, Surya Prakash Tripathi:
A Survey on Interpretability-Accuracy (I-A) Trade-Off in Evolutionary Fuzzy Systems. 97-101 - Jessica Lowell, Sergey Grabkovsky, Kir Birger:

Comparison of NEAT and HyperNEAT Performance on a Strategic Decision-Making Problem. 102-105 - Ingo Schwab, Norbert Link:

Reusable Knowledge from Symbolic Regression Classification. 106-109 - Chiou-Mei Chen:

The Role of Channel Experience in Enhancing Technology Transfer. 110-113 - Hung-Yu Wang, Chun-Wei Chiu, Hung-Yuan Tseng, Hsieh-Wei Lee:

Design of Low Adder Cost FIR Digital Filters Using Graph Representation. 118-121 - Fariborz Ahmadi, Reza Tati, Soraia Ahmadi, Veria Hossaini:

New Hardware Engine for Genetic Algorithms. 122-126 - Rodrigo H. Ordóñez-Hurtado, Manuel A. Duarte-Mermoud

:
A Methodology for Determining the Non-existence of Common Quadratic Lyapunov Functions for Pairs of Stable Systems. 127-130 - Kamel Sabahi

:
Application of ANN Technique for DC-Motor Control by Using FEL Approaches. 131-134 - Churng-Jou Tsai, Wei-Chih Chen, Chia-Hsun Lin, Jinn-Kwei Guo, Chun-Lin Lu:

An Asymmetry Printed WLAN/WiMax Dipole Antenna. 135-138 - Tzu-Ching Chia, Chun-Lin Lu:

Design and Implementation of the Microcontroller Control System for Vertical-Garden Applications. 139-141 - Chun-Han Yang, Kuo-Sheng Cheng, Jue-Long Wang, Ko-Long Lin:

The Daily Activity Analysis of Patient with Cardiovascular Diseases at Home. 142-145 - Ozer Ozdikis:

Genetic Algorithms with Random Coordinates for Route Planning on a 3D Terrain. 146-149 - Chi Nung Chu, Yu Ting Huang:

Assistive Technology for the Struggling Learner: Chinese PCS Editing Processor. 150-152 - Jiann-Gwo Doong:

Step-Locked Data Transformation in Personal Filing Systems. 153-156 - Sheng-Wen Chen, Chung-Huang Yang, Chien-Tsung Liu:

Design and Implementation of Live SD Acquisition Tool in Android Smart Phone. 157-162 - Babatunde B. Akinkuolie, Chia Feng Lin, Shyan-Ming Yuan

:
A Cross-Platform Mobile Learning System Using QT SDK Framework. 163-167 - Ya-Fen Chang, Jhih-Yi Lin, Yuo-Ju Yen:

Comments on a Secret-Key-Privacy-Preserving Authentication and Key Agreement Scheme. 168-171 - Yuan-Yu Tsai, Chi-Shiang Chan:

A Novel Cluster-Based Difference Expansion Transform for Lossless Data Hiding. 172-175 - Chih-Yang Lin, Wei-Wen Chang, Yi-Hui Chen:

Intelligent Projector System Based on Computer Vision. 176-179 - Jen-Ho Yang, Chin-Chen Chang, Chih-Hung Wang:

An Efficient V-Fairness (t, n) Threshold Secret Sharing Scheme. 180-183 - Wen-Chuan Wu, Chun-Yang Chen:

Detection System of Smoking Behavior Based on Face Analysis. 184-187 - Wen-Chuan Wu, Yi-Pei Hsieh:

Quantization- and Prediction-Based Image Authentication and Recovery. 188-191 - Yi-Hui Chen, Chi-Wei Lan, Chiao-Chih Huang:

A Verifiable Visual Cryptography Scheme. 192-195 - Hsin-Lung Wu, Jen-Chun Chang, Te-Chih Chou, Wei-Ming Lai:

A New Scheme for Data Hiding on Halftone Images. 196-199 - Jau-Ji Shen, Wei-Cheng Huang:

The First Robust Image Tamper Detection Scheme under Brightness. 200-203 - Min-Hao Wu, Fu-Hau Hsu, Cheng-Hsing Yang, Shiuh-Jeng Wang:

Reversible Watermarking Scheme with Visibility Using Randomize Distance. 204-207 - Chin-Feng Lee, Ming-Chi Shih:

Reversible Data Hiding Based on VQ Compression Code. 208-211 - Sheng Xiang Fan, Jieh-Shan Yeh, Yaw-Ling Lin

:
Hybrid Temporal Pattern Mining with Time Grain on Stock Index. 212-215 - Chien-Lung Chan

, Cheng-Yang Lee, Nan-Ping Yang, Sheng-Yuan Shen:
Classification Method Incorporating Decision Tree with Particle Swarm Optimization. 216-219 - Shih-Fong Ciou, Raylin Tso

:
A Privacy Preserved Two-Party Equality Testing Protocol. 220-223 - Chia Feng Lin, Shyan-Ming Yuan

:
The Design and Evaluation of GPU Based Memory Database. 224-231 - Chiou-Yng Lee

, Pramod Kumar Meher:
Speeding up Subquadratic Finite Field Multiplier over GF(2m) Generated by Trinomials Using Toeplitz Matrix-Vector with Inner Product Formula. 232-236 - Che Wun Chiou, Jim-Min Lin, Chiou-Yng Lee

, Chi-Ting Ma:
Novel Mastrovito Multiplier over GF(2m) Using Trinomial. 237-242 - Chih-Yung Chen:

A Framework for the RFID Information Security and Privacy Protection. 243-246 - Yung-Hui Chen, Lawrence Y. Deng:

Event Mining and Indexing in Basketball Video. 247-251 - Deng-Yuan Huang, Ta-Wei Lin, Wu-Chih Hu, Mu-Song Chen:

Eye Detection Based on Skin Color Analysis with Different Poses under Varying Illumination Environment. 252-255 - Hsuan-Ming Feng, Ji-Hwei Horng

:
VQ-Based Fuzzy Compression Systems Designs through Bacterial Foraging Particle Swarm Optimization Algorithm. 256-259 - Chuan-Yu Chang, Heng-Yi Liao:

Automatic Facial Skin Defects Detection and Recognition System. 260-263 - Hui-To Lin, Lin Huang, Su Hwa:

Probe Mastery Knowledge in E-learning Model with Web Technology - The Effective Factors by Flow Theory. 264-275 - Wen-Pinn Fang, Shun-Yi Pen:

A Mobile Phone Base Sensory Integration Training Software. 276-278 - Chii-Jen Chen

, You-Wei Wang:
A Preoperative 3D Computer-Aided Diagnosis System for Lung Tumor. 279-282 - Chung-Ming Ou, Chung-Ren Ou:

Immunity-Inspired Host-Based Intrusion Detection Systems. 283-286 - Ryohei Funaki, Hideyuki Takagi

:
Application of Gravity Vectors and Moving Vectors for the Acceleration of Both Differential Evolution and Interactive Differential Evolution. 287-290 - Lizhong Jin, Jie Jia, Dong Chen, Fengyun Li, Zhicao Dong, Xue Feng:

Research on Architecture, Cross-Layer MAC Protocol for Wireless Sensor Networks. 291-294 - Chunxiao Liu, Guiran Chang, Jie Jia, Lizhong Jin, Fengyun Li:

A Load Balanced Routing Protocol Based on Ant Colony Algorithm for Wireless Mesh Networks. 295-298 - Chengjun Jin, Guiran Chang, Wei Cheng, Huiyan Jiang:

Improved Particle Swarm Optimization for Fuzzy Neural Network Traning. 299-302 - Jie Li, Xingwei Wang, Feng Li, Jie Jia:

Efficient Traffic Aware Multipath Routing Algorithm in Cognitive Networks. 303-306 - Chuan Wang, Lizhong Jin, Na Zhou:

A Vertical Search Engine for Energy Conservation and Environmental Protection. 307-310 - Dong Chen, Guiran Chang, Lizhong Jin, Xiaodong Ren, Jiajia Li, Fengyun Li:

A Novel Secure Architecture for the Internet of Things. 311-314 - Fei Li, Bin Zhang, Liang Ge:

Composite Service Adaptation Supported Environmental Monitoring System. 315-318 - Xianghui Zhou, Wei Wan:

Evaluation of Intrusion Detection System Based on Evaluation Model. 319-322 - Bixin Hu:

A Multi-objective Evolution Algorithm Based Oil Field Stimulation Measure Programming. 323-326 - Zhen-Ping Xu, Ming-Jiang Li:

An Improved Algorithm for the Numerical Filtering Algorithm of Inverse Laplace Transforms. 327-329 - Qiang Yang, Yanhong Hu:

Application of Improved Apriori Algorithm on Educational Information. 330-332 - Youfu Du, Ming Zhao, Yanhong Hu:

Applied Research on Discriminative-Adaptive Neural Network Algorithm in Indoor Positioning System. 333-336 - Zhengqiang Wang, Ming Zhao, Xin-e Li:

Constrained CMA-Based Blind Multiuser Detection for DS-CDMA UWB in a Realistic Indoor Channel. 337-340 - Fengyun Li, Guiran Chang, Fuxiang Gao, Lan Yao:

A Novel Cooperation Mechanism to Enforce Security in Wireless Sensor Networks. 341-344 - Ming Zhao, Zhenyu Meng

, Kuo-Kun Tseng, Jeng-Shyang Pan, Chih-Yu Hsu
:
Symmetry Auto-detection Based on Contour and Corner Models. 345-349 - Yuncai Zhou:

Research on Properties and Application of B-net. 350-352 - Feng Lu, Xin Li:

RCBA: An Efficient Annotation Tool for Community E-Learning. 353-356 - Hanyun Wen:

Application of Information Fusion Method Based on Generalized Regression Neural Network in Hydrocarbon Reservoir Evaluation Studies. 357-360 - Yanrong Cui:

Evacuation Model Based on Ellipse Sound Wave Diffusion. 361-364 - Jie Hu, Kai Wang, Lei Wu:

Design of Remote Video Monitoring System Based on Arm-Linux Platform and HTTP Protocol. 365-368 - Kuo-Kun Tseng, Wei Wei, Jeng-Shyang Pan, Chih-Yu Hsu

, Shuo-Tsung Chen:
Evolutionary Interval Fingerprint for Wireless Network. 369-372 - FuFu Zeng, Kuo-Kun Tseng, Ming Zhao, Jeng-Shyang Pan, Huang-Nan Huang

, Chih-Yu Hsu
, Shuo-Tsung Chen:
Biometric Electrocardiogram Card for Access Control System. 373-376 - Chenxue Wang, Junzo Watada:

Robust Color Image Segmentation by Karhunen-Loeve Transform Based Otsu Multi-thresholding and K-means Clustering. 377-380 - Tanatch Tangsajanaphakul, Junzo Watada:

Fuzzy Game-Based Real Option Analysis in Competitive Investment Situation. 381-384 - Zhenyuan Xu, Junzo Watada, Zalili Binti Musa:

Particle Filter-Based Height Estimation in Human Tracking. 385-388 - Wu Mingnan, Junzo Watada, Zuwairie Ibrahim

, Marzuki Khalid:
Building a Memetic Algorithm Based Support Vector Machine for Imbalaced Classification. 389-392 - Zhi-Gang Wu, Hao Luo, Shuzhuang Zhang, Tao Zhang:

TCP Connection Management Model in Complex Topology Network. 393-396

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














