Proceedings of the 2013 The International Conference on Artificial Intelligence and Software Engineering (ICAISE 2013)
142 authors
- Azar, Ghassan M.
- Information Security based on Resource Conflict with SSH Architecture
- Baddir, Mudabbir
- Effective and Efficient ways of Hybridizing GA with various methods while reviewing a wide variety of Hybrid Genetic Approaches.
- Bai, Yanqi
- Research on the Conceptual Modeling Method Base on System Six-view and Ontology
- Balasubramanian, C.
- AMDS: Sentence Extraction Based Proficient Framework for Multi-Document Summarization
- Bao, Jiandong
- A robust region_based active contours model for image segmentation
- Cen, Yong
- Research and Development on Supply Chain Collaboration Management System
- Chang, Jishi
- The design and implementation of satellite communication signal spectrum automatic monitoring System
- Chen, Daijiang
- Based on RFID and NFC technology Retail Chain Supermarket Mobile Checkout Mode Research
- Chen, Lei
- Rehabilitation evaluation model of a rehabilitation robot Based on fuzzy comprehensive evaluation
- Chen, Li
- A New DFT-HQ Channel Estimation Algorithm in OFDM Systems for Sparse Multipath Channels
- Chen, Shaochuan
- Research on KAAS-based Social Knowledge Collaboration Service Mechanism and Application
- Chen, Xuemin
- Competitive Decision Algorithm for the Rooted Delay-constrained Minimum Spanning Tree
- Cheng, Gongxun
- Ceramic Products Recommendation Based Improved Collaborative Filtering
- Chiu, Chinhsin
- The Effect of Tourism Competitiveness relating to Tourist Arrivals and Revenue in East Asia
- Chu, Lingwei
- An Adaptive Bayesian Network Inference Algorithm for Network Situation Awareness
- Deng, Jicai
- The Research of Image Feature Matching Method Based on CH-SURF
- Dong, Cheng
- An Adaptive Bayesian Network Inference Algorithm for Network Situation Awareness
- Du, Xiaoming
- Study on the Method of CGF Intelligent Decision-making
- Fan, Maoyan
- Study on dielectric property of BST of gradient thick films
- Feng, Chen
- Stereo Image Watermarking Method for Authentication with Self-Recovery Capability
- Fu, Chunchang
- A Solution of Indoor Positioning System
- Gao, Jinchun
- A New DFT-HQ Channel Estimation Algorithm in OFDM Systems for Sparse Multipath Channels
- Geetha, S.
- AMDS: Sentence Extraction Based Proficient Framework for Multi-Document Summarization
- Gong, Yaxing
- Convergence and Parameters Analysis of Shuffled Frog Leaping Algorithm
- Gu, Chuang
- Research on the Conceptual Modeling Method Base on System Six-view and Ontology
- Guan, Yalin
- Demonstration of an optical switch based on SOA-MZI operation at 10 Gbit/s
- Hao, Shengyue
- Water demand forecasting based on adaptive extreme learning machine
- Ho, Yo-Sung
- Stereo Image Watermarking Method for Authentication with Self-Recovery Capability
- Hsieh, Yaju
- The Effect of Tourism Competitiveness relating to Tourist Arrivals and Revenue in East Asia
- Hu, Zhonghui
- On-Line Modeling of AUV’s Maneuvering Motion Based on Sliding Window SVM
- Huang, Runfeng
- Secure Mechanism for Remote Bitstream Updates of Reconfigurable Computing Platform
- Huang, Wenquan
- Rehabilitation evaluation model of a rehabilitation robot Based on fuzzy comprehensive evaluation
- Jia, Jinming
- Water demand forecasting based on adaptive extreme learning machine
- Jiang, Fan
- A robust region_based active contours model for image segmentation
- Jiang, Gangyi
- Stereo Image Watermarking Method for Authentication with Self-Recovery Capability
- Li, Aili
- Design and Implementation of the Inference Machine of an Intelligent Ultrasonic Emulsification Instrument
- Li, Haohao
- Minimizing the Number of Tardy Jobs with Gammadistributed Processing Times
- Li, Huiying
- Ceramic Products Recommendation Based Improved Collaborative Filtering
- Li, Jie
- An Adaptive Bayesian Network Inference Algorithm for Network Situation Awareness
- Li, Rui
- Neural network and improved method for wind power prediction
- Li, Wei
- TOLERANCE-CONTROL SOLUTIONS TO INTERVAL LINEAR EQUATIONS
- Li, Wei
- Checking Strong Optimality of Interval Linear Programming
- Li, Xia
- Functionally Equivalent Clone Detection Using IOT-Behavior Algorithm
- Lin, Laichu
- The Effect of Tourism Competitiveness relating to Tourist Arrivals and Revenue in East Asia
- Liu, Mandan
- Fusion Recognition Fingerprints and Handwritten Signature Recognition Fusion Based on the Bayesian Algorithm
- Liu, Mingbo
- The design and implementation of satellite communication signal spectrum automatic monitoring System
- Liu, Yuanan
- A New DFT-HQ Channel Estimation Algorithm in OFDM Systems for Sparse Multipath Channels
- Liu, Yucong
- Rehabilitation evaluation model of a rehabilitation robot Based on fuzzy comprehensive evaluation
- Lu, Xiaoyuan
- An Adaptive Bayesian Network Inference Algorithm for Network Situation Awareness
- Luo, Jiajia
- Checking Strong Optimality of Interval Linear Programming
- Ma, Peijun
- Functionally Equivalent Clone Detection Using IOT-Behavior Algorithm
- Maqbool, Nafisa
- Effective and Efficient ways of Hybridizing GA with various methods while reviewing a wide variety of Hybrid Genetic Approaches.
- Ning, Aibing
- Competitive Decision Algorithm for the Rooted Delay-constrained Minimum Spanning Tree
- Niu, Linhua
- Malicious Code Detection Based on Software Fingerprint
- Niu, Linhua
- The Infuence Of Noisy Data On Skype Traffic Classification
- Pang, Yongjie
- On-Line Modeling of AUV’s Maneuvering Motion Based on Sliding Window SVM
- Ping, Gu
- Study on the Method of CGF Intelligent Decision-making
- Qi, Binghui
- ERWD: A Measure for Nearest-Neighbor Search in Undirected Graph
- Qian, Ailin
- A numerical method for nonlinear inverse heat conduction problem
- Qu, Yanwen
- Interacting Multiple Gaussian Particle Filter
- Rao, Yuan
- Research on KAAS-based Social Knowledge Collaboration Service Mechanism and Application
- Ruan, Fugui
- Based on RFID and NFC technology Retail Chain Supermarket Mobile Checkout Mode Research
- Shang, Shuqi
- Expert System of Fault Diagnosis of Dry-mixed Mortar Fieldbus Control System
- Shiyue, Zhang
- A Data Fusion Algorithm Based on Improved LEACH Clustering Routing for Wireless Sensor Network
- Srinivasagan, K.G.
- AMDS: Sentence Extraction Based Proficient Framework for Multi-Document Summarization
- Su, Xiaohong
- Functionally Equivalent Clone Detection Using IOT-Behavior Algorithm
- Sujiatanti, Septia Hardy
- Application Analysis of Wall and Deck Numerical of Modelling Composite Ship EN AC-AlSi10Mg (b)+SiC*/15p By Using ANSYS ver. 12.0
- Sun, Wanghu
- Research on the Conceptual Modeling Method Base on System Six-view and Ontology
- Sun, Wei
- Systematic Analysis on Pipeline Leak Detection and Location
- Sun, Yushan
- On-Line Modeling of AUV’s Maneuvering Motion Based on Sliding Window SVM
- Sun, Zegang
- Rehabilitation evaluation model of a rehabilitation robot Based on fuzzy comprehensive evaluation
- Tao, Linjing
- Study on the Model of Quality Safety Information Diffusion
- Tian, Li
- TOLERANCE-CONTROL SOLUTIONS TO INTERVAL LINEAR EQUATIONS
- Tian, Shuchao
- Study on the Method of CGF Intelligent Decision-making
- Tjahjanti, P.H.
- Application Analysis of Wall and Deck Numerical of Modelling Composite Ship EN AC-AlSi10Mg (b)+SiC*/15p By Using ANSYS ver. 12.0
- Tu, Xuyan
- Design and Implementation of the Inference Machine of an Intelligent Ultrasonic Emulsification Instrument
- Wang, Dongwei
- Expert System of Fault Diagnosis of Dry-mixed Mortar Fieldbus Control System
- Wang, Guangfu
- A numerical method for nonlinear inverse heat conduction problem
- Wang, Jiasheng
- Expert System of Fault Diagnosis of Dry-mixed Mortar Fieldbus Control System
- Wang, Jing
- Stereo Image Watermarking Method for Authentication with Self-Recovery Capability
- Wang, Lianguo
- Convergence and Parameters Analysis of Shuffled Frog Leaping Algorithm
- Wang, Ling
- Fuzzy Control of Obstacle Avoidance for Mobile Robot Based on Single Chip Microcomputer
- Wang, Ning
- The research and development of Cross-fault site based information systems
- Wang, Qin
- TOLERANCE-CONTROL SOLUTIONS TO INTERVAL LINEAR EQUATIONS
- Wang, Ruidong
- Demonstration of an optical switch based on SOA-MZI operation at 10 Gbit/s
- Wang, Ruiqi
- The research and development of Cross-fault site based information systems
- Wang, Tiantian
- Functionally Equivalent Clone Detection Using IOT-Behavior Algorithm
- Wang, Wenyong
- ICA and BP neural network based fingerprint recognition
- Wang, Xiangsheng
- Optimizing Gaze Typing with Pupil Size for People with Severe Motor Disabilities
- Wang, Xiaodong
- A Data Fusion Algorithm Based on Improved LEACH Clustering Routing for Wireless Sensor Network
- Wang, Xiaodong
- Stereo Image Watermarking Method for Authentication with Self-Recovery Capability
- Wang, Yin
- Information Security based on Resource Conflict with SSH Architecture
- Wang, Zhaodi
- The Research of Image Feature Matching Method Based on CH-SURF
- Wang, Zhong
- The design and implementation of satellite communication signal spectrum automatic monitoring System
- Wei, Junyin
- ERWD: A Measure for Nearest-Neighbor Search in Undirected Graph
- Wei, Zhou
- Information Security based on Resource Conflict with SSH Architecture
- Wu, Jiande
- A Data Fusion Algorithm Based on Improved LEACH Clustering Routing for Wireless Sensor Network
- Xie, Gang
- A New DFT-HQ Channel Estimation Algorithm in OFDM Systems for Sparse Multipath Channels
- Xiong, Xiaohua
- Competitive Decision Algorithm for the Rooted Delay-constrained Minimum Spanning Tree
- Xu, Xuefeng
- Study on the Method of CGF Intelligent Decision-making