Proceedings of the 2013 The International Conference on Artificial Intelligence and Software Engineering (ICAISE 2013)
142 authors
- Yan, Han
- Stochastic Simulation of River Water Quality Risk assessment under Coupling Effect of Reclaimed Water Recharge and Inner Source Release
- Yan, Huaizhi
- Enterprise Network Business Process Incompatible Vulnerability Detection Method Based on FPN Model
- Yang, Changniu
- Rehabilitation evaluation model of a rehabilitation robot Based on fuzzy comprehensive evaluation
- Yang, Hongmei
- Spontaneous Construction of higher order Voronoi Diagram
- Yang, Qibin
- Systematic Analysis on Pipeline Leak Detection and Location
- Yang, Ranbing
- Expert System of Fault Diagnosis of Dry-mixed Mortar Fieldbus Control System
- Yang, Xiaojie
- Fusion Recognition Fingerprints and Handwritten Signature Recognition Fusion Based on the Bayesian Algorithm
- Yang, Xuhui
- Discussion on SME Financial Management Problems and Countermeasures
- Yang, Yenwen
- Cognitive Component Analysis of Basic Mathematics Achievement Assessment
- Yang, Yunfei
- The Number of Economic Relations Analysis of Regional per Capita GDP and Quality Level in China
- Yang, Yunfei
- Study on the Model of Quality Safety Information Diffusion
- Yang, Zhiwen
- Design and Implementation of the Inference Machine of an Intelligent Ultrasonic Emulsification Instrument
- Ye, Wenwen
- Enterprise Network Business Process Incompatible Vulnerability Detection Method Based on FPN Model
- Yeh, Minglang
- The Effect of Tourism Competitiveness relating to Tourist Arrivals and Revenue in East Asia
- Yin, Changfeng
- Application of Count Data Models in Inbound Tourism Source Markets based on Data mining technology
- Yin, Huaying
- Spontaneous Construction of higher order Voronoi Diagram
- Yin, Zhimin
- Malicious Code Detection Based on Software Fingerprint
- Yin, Zhimin
- The Infuence Of Noisy Data On Skype Traffic Classification
- Yu, Mei
- Stereo Image Watermarking Method for Authentication with Self-Recovery Capability
- Yu, Su
- Information Security based on Resource Conflict with SSH Architecture
- Yu, Xiangzhan
- Malicious Code Detection Based on Software Fingerprint
- Yu, Xiangzhan
- The Infuence Of Noisy Data On Skype Traffic Classification
- Yue, Wenchao
- The research and development of Cross-fault site based information systems
- Zeng, Xingbin
- Stereo Image Watermarking Method for Authentication with Self-Recovery Capability
- Zhang, Chaoyong
- Effective and Efficient ways of Hybridizing GA with various methods while reviewing a wide variety of Hybrid Genetic Approaches.
- Zhang, Guocheng
- On-Line Modeling of AUV’s Maneuvering Motion Based on Sliding Window SVM
- Zhang, Huan
- Expert System of Fault Diagnosis of Dry-mixed Mortar Fieldbus Control System
- Zhang, Lifang
- Study on dielectric property of BST of gradient thick films
- Zhang, Mingxi
- ERWD: A Measure for Nearest-Neighbor Search in Undirected Graph
- Zhang, Ruoxi
- Discussion on SME Financial Management Problems and Countermeasures
- Zhang, Siqing
- Based on the improved AdaBoost OCSVM integrated application in image retrieval
- Zhang, Wuyi
- The Number of Economic Relations Analysis of Regional per Capita GDP and Quality Level in China
- Zhang, Wuyi
- Study on the Model of Quality Safety Information Diffusion
- Zhang, Xueming
- Research on the Conceptual Modeling Method Base on System Six-view and Ontology
- Zhang, Yilai
- Ceramic Products Recommendation Based Improved Collaborative Filtering
- Zhao, Lei
- The Research on the Performance Evaluation of Civil Servant Based on Competency Model
- Zhao, Lu
- ICA and BP neural network based fingerprint recognition
- Zheng, Run
- Based on the improved AdaBoost OCSVM integrated application in image retrieval
- Zheng, Xuefeng
- Design and Implementation of the Inference Machine of an Intelligent Ultrasonic Emulsification Instrument
- Zhou, Qinglei
- Secure Mechanism for Remote Bitstream Updates of Reconfigurable Computing Platform
- Zhou, Yunyun
- Fusion Recognition Fingerprints and Handwritten Signature Recognition Fusion Based on the Bayesian Algorithm
- Zou, Zhihong
- Stochastic Simulation of River Water Quality Risk assessment under Coupling Effect of Reclaimed Water Recharge and Inner Source Release