


default search action
ICGEC 2014: Nanchang City, China
- Hui Sun, Chin-Yu Yang, Chun-Wei Lin

, Jeng-Shyang Pan
, Václav Snásel, Ajith Abraham:
Genetic and Evolutionary Computing - Proceeding of the Eighth International Conference on Genetic and Evolutionary Computing, ICGEC 2014, October 18-20, 2014, Nanchang, China. Advances in Intelligent Systems and Computing 329, Springer 2015, ISBN 978-3-319-12285-4
Nature Inspired Constrained Optimization
- Jia Zhao, Li Lü, Hui Sun:

Artificial Bee Colony Using Opposition-Based Learning. 3-10 - Hui Luan, Zhihong Xia:

Theorem of Existence and Uniqueness of Fixed Points of Monotone Operators. 11-17 - Kai Yang, Zhuhong Zhang:

Adaptive Sampling Detection Based Immune Optimization Approach and Its Application to Chance Constrained Programming. 19-28 - Wenhai Luo, Yanfang Zhu, Tao Hong:

Characteristic Analysis and Management of Human Resource in EPC Project. 29-36 - Tien-Szu Pan, Thi-Kien Dao, Trong-The Nguyen, Shu-Chuan Chu

:
Hybrid Particle Swarm Optimization with Bat Algorithm. 37-47 - Jeng-Shyang Pan

, Haibin Wang, Hongnan Zhao, Lin-Lin Tang:
Interaction Artificial Bee Colony Based Load Balance Method in Cloud Computing. 49-57 - XiaoLin Xiong, XinMing Xiang:

Command Center Operation Miss Root Cause Analysis. 59-65
Recent Advances on Evolutionary Optimization Technologies
- Jianguo Wang:

A New Cat Swarm Optimization with Adaptive Parameter Control. 69-78 - Si-Ling Wang, Bao-Wei Song, Gui-Lin Duan:

Multi-objective Nondominated Sorting Invasive Weed Optimization Algorithm for the Permanent Magnet Brushless Direct Current Motor Design. 79-87 - Jie Li, Rui Shen:

An Evolutionary Approach to Tower of Hanoi Problem. 89-98 - Václav Snásel, Pavel Krömer

:
Multipopulational Metaheuristic Approaches to Real-Parameter Optimization. 99-108 - Thi-Kien Dao, Tien-Szu Pan, Trong-The Nguyen, Shu-Chuan Chu

:
Evolved Bat Algorithm for Solving the Economic Load Dispatch Problem. 109-119 - Zhenyu Meng

, Jeng-Shyang Pan
:
A Simple and Accurate Global Optimizer for Continuous Spaces Optimization. 121-129 - Jihua Wang, Ximing Cai

, Albert J. Valocchi
:
Spatial Evolutionary Algorithm for Large-Scale Groundwater Management. 131-142
Wearable Computing and Intelligent Data Hiding
- Ching-Yu Yang, Wen-Fong Wang:

Block-Based Colour Image Steganography Using Smart Pixel-Adjustment. 145-154 - Wen-Fong Wang, Ching-Yu Yang, Ji-Ting Guo:

A Sport Recognition Method with Utilizing Less Motion Sensors. 155-167 - Kuang Tsan Lin:

Information Hiding Based on Binary Encoding Methods and Linear Transformation Scrambling Techniques. 169-177 - Brian K. Lien, Shan-Kang Chen, Wei-Sheng Wang, Kuan-Pang King:

Dispersed Data Hiding Using Hamming Code with Recovery Capability. 179-187 - Tzu-Chuen Lu

, Chun-Ya Tseng, Chun-Chih Huang, Kuang-Mao Deng:
16-Bit DICOM Medical Images Lossless Hiding Scheme Based on Edge Sensing Prediction Mechanism. 189-196 - Yung-Chen Chou, Shu-Huan Chen, Min-Rui Hou:

A Quality Improving Scheme for VQ Decompressed Image Based on DCT. 197-206 - Xinhua Yang, Jianlong Yang:

Research of Image Enhancement Algorithm Based on Multi-scale Retinex. 207-215 - Chien-Sheng Huang, Ching-Huang Lin, Chien-Yue Chen, Shao-Ciang Gan, Guan-Syuan Hong:

The HRV Analysis on e-Book Reading. 217-222
Image Processing and Intelligent Applications
- John H. Drake, Ender Özcan

, Edmund K. Burke
:
Modified Choice Function Heuristic Selection for the Multidimensional Knapsack Problem. 225-234 - Susmit Bagchi

:
A Distributed Computational Model of State of Consciousness. 235-245 - Yulong Qiao, Ying Zhao:

Rotation Invariant Texture Classification Using Principal Direction Estimation. 247-256 - Dingli Yang, Yulin Zhang, Rendong Ji, Yazhou Li, Liqun Huangfu, Yudong Yang:

An Improved Spatial Histogram and Particle Filter Face Tracking. 257-267 - Zhihua Xie, Zhengzi Wang:

Joint Encoding of Multi-scale LBP for Infrared Face Recognition. 269-276 - Shi-Huang Chen, Jeng-Shyang Pan

, Kaixuan Lu, Huarong Xu:
Driving Behavior Analysis of Multiple Information Fusion Based on AdaBoost. 277-285 - Ke Li, Yongteng Wang:

The Study and Application of IT Projects Management and Control Model for Enterprise Group. 287-297
Intelligent Multimedia Tools and Applications
- Wen-Pinn Fang

, Wen-Chi Peng, Yu-Jui Hu, Chun Li, Shang-Kuan Chen:
A Data Hiding Method for Image Retargeting. 301-308 - Cheng-Wei Huang, Ran-Zan Wang

, Shang-Kuan Chen, Wen-Pinn Fang:
Rendering 3D Solid Model. 309-316 - Chii-Jen Chen

, You-Wei Wang, Sheng-Fang Huang, Yi-Shiung Horng:
Greedy Active Contour Detection for Median Nerve on Strain Sonographic Images. 317-324 - Haixia Li, Jian Ding

, Dongming Nie, Linlin Tang:
One Decomposition Method of Concept Lattice. 325-333 - Weixiong Chen, Lailong Zou, Juan Liu, Xiaochen Yang:

The Evaluation Method for Enterprise Group Information Planning and Implementation Based on PDCA Cycle. 335-341 - Thi Thi Zin, Pyke Tin, Hiromitsu Hama, Takashi Toriu:

A New Look into Web Page Ranking Systems. 343-351 - Zhichun Li, Yong Zheng:

Seismic Qualification of Telecommunication System in Nuclear Power Plant. 353-358
Technologies for Next-Generation Network Environments
- Bing-Zhe He, Kuan-Ling Huang, Hung-Min Sun, Raylin Tso

:
A Virtual Network Guard System Based on Cloud Computing Environments. 361-370 - Tsu-Yang Wu

, Jeng-Shyang Pan
, Chien-Ming Chen
, Chun-Wei Lin
:
Towards SQL Injection Attacks Detection Mechanism Using Parse Tree. 371-380 - Tao Sun, Xingjie Zhu, Jeng-Shyang Pan

, Jiajun Wen, Fanqiang Meng:
No-Reference Image Quality Assessment in Spatial Domain. 381-388 - Eric Ke Wang, Tsu-Yang Wu

, Chien-Ming Chen
, Yuming Ye, Zhujin Zhang, Futai Zou:
MDPAS: Markov Decision Process Based Adaptive Security for Sensors in Internet of Things. 389-397 - Xiu Li, Huimin Wang, Xinwei Yan:

Accurate Recommendation Based on Opinion Mining. 399-408 - Lu-Xiong Xu, Chao-Fan Xie

, Lin Xu:
Reliability Analysis on Parallel System with N Element Obeying Exponential Distribution. 409-418 - Haijun Guo, Tao Tang, Di Wu:

The Research of Private Network Secure Interconnection Scheme in Large-Scaled Enterprises. 419-426

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














