Default Cover Image

2012 Third International Conference on Innovations in Bio-Inspired Computing and Applications (IBICA)

Sept. 26 2012 to Sept. 28 2012

Kaohsiung

Table of Contents

[Cover art]Freely available from IEEE.pp. C4-C4
[Title page i]Freely available from IEEE.pp. i-i
[Title page iii]Freely available from IEEE.pp. iii-iii
[Copyright notice]Freely available from IEEE.pp. iv-iv
Table of contentsFreely available from IEEE.pp. v-x
PrefaceFreely available from IEEE.pp. xi-xi
Organizing CommitteeFreely available from IEEE.pp. xii-xiii
Program CommitteeFreely available from IEEE.pp. xiv-xv
Binary Particle Swarm Optimization for TDMA Broadcast Scheduling ProblemFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
A Fast Bee Colony Optimization for Traveling Salesman ProblemFull-text access may be available. Sign in or learn about subscription options.pp. 7-12
Constructing a Markov Chain on Particle Swarm OptimizerFull-text access may be available. Sign in or learn about subscription options.pp. 13-18
A Multistart Simulated Annealing Algorithm for the Quadratic Assignment ProblemFull-text access may be available. Sign in or learn about subscription options.pp. 19-23
A Bio-Inspired Algorithm for Solving the Scheduling Problems with Redundant MoldsFull-text access may be available. Sign in or learn about subscription options.pp. 24-28
Swarm Refinement PSO for Solving N-queens ProblemFull-text access may be available. Sign in or learn about subscription options.pp. 29-33
A Novel Self-Organizing Map for Text Document OrganizationFull-text access may be available. Sign in or learn about subscription options.pp. 39-44
An Enhanced FUFP-Tree Maintenance Approach for Transaction DeletionFull-text access may be available. Sign in or learn about subscription options.pp. 45-50
A Dynamic Bit-vector Approach for Efficiently Mining Inter-sequence PatternsFull-text access may be available. Sign in or learn about subscription options.pp. 51-56
Handling Missing Data in Extended Possibility-based Fuzzy Relational DatabasesFull-text access may be available. Sign in or learn about subscription options.pp. 57-62
Assessment of Hypervisor and Shared Storage for Cloud Computing ServerFull-text access may be available. Sign in or learn about subscription options.pp. 67-72
Analysis of Characteristics Using Wavelet Transform for Simultaneous Faults in Electrical Power SystemFull-text access may be available. Sign in or learn about subscription options.pp. 93-97
An Expandable Genetic Cell Array for Global Optimization of Continuous Multimodal FunctionsFull-text access may be available. Sign in or learn about subscription options.pp. 98-103
A Study on Optimizing Execution Time and Code Size in Iterative CompilationFull-text access may be available. Sign in or learn about subscription options.pp. 104-109
Multi-mode Resource-Constrained Project Scheduling by Ant Colony Optimization with a Dynamic Tournament StrategyFull-text access may be available. Sign in or learn about subscription options.pp. 110-115
Multiobjective Evolutionary Algorithm for Lifetime Extension and Loading Balancing of Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 116-121
Design of Stable IIR Filter by Improved Genetic AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 122-126
A Personalized Sleep Quality Assessment Mechanism Based on Sleep Pattern AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 133-138
Robust Little Flame Detection on Real-Time Video Surveillance SystemFull-text access may be available. Sign in or learn about subscription options.pp. 139-143
A Novel Image Retrieval Technique Based on Salient Image FeaturesFull-text access may be available. Sign in or learn about subscription options.pp. 148-155
Using Hybrid Artificial Bee Colony Algorithm to Extend Wireless Sensor Network LifetimeFull-text access may be available. Sign in or learn about subscription options.pp. 156-161
Assessing Sustainability in Manufacturing Using a Fuzzy Expert SystemFull-text access may be available. Sign in or learn about subscription options.pp. 162-167
A Fuzzy Decision-Making Model for Supplier Selection of LogisticsFull-text access may be available. Sign in or learn about subscription options.pp. 168-171
Risk Evaluation of Plant Locations of Taiwanese FDI in ChinaFull-text access may be available. Sign in or learn about subscription options.pp. 181-184
Prediction of Asian Steel Price Index Using Fuzzy Time SeriesFull-text access may be available. Sign in or learn about subscription options.pp. 185-188
Design of a Wireless Power Transfer for Contactless Charging System Using Bio-Inspired AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 189-194
Design of Lithium-Ion Battery Charging System Enhanced with Wolf Pack AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 195-200
An Intelligent Design and Management Tool for Power InvertersFull-text access may be available. Sign in or learn about subscription options.pp. 201-205
Artificial Immune Memory: Perspectives on Internal Image with Antibody DynamicsFull-text access may be available. Sign in or learn about subscription options.pp. 212-217
A Hybrid PSO-Based Algorithm for Solving DNA Fragment Assembly ProblemFull-text access may be available. Sign in or learn about subscription options.pp. 223-228
Temporal Data Mining for Nursing Schedule ManagementFull-text access may be available. Sign in or learn about subscription options.pp. 229-234
Binding in Human Antibody-DNA Interface: A Computer-Simulation StudyFull-text access may be available. Sign in or learn about subscription options.pp. 235-240
Performance Measurement of IEEE 802.15.4 MAC on Different 3D TerrainsFull-text access may be available. Sign in or learn about subscription options.pp. 246-251
A Specification-Based Intrusion Detection Model for Wireless Ad Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 252-257
On-line Discriminative Feature Selection in Particle Filter TrackingFull-text access may be available. Sign in or learn about subscription options.pp. 262-267
Design of Composite Image Filters Using Interactive Genetic ProgrammingFull-text access may be available. Sign in or learn about subscription options.pp. 274-279
Pulse Coupled Neural Networks and Image Morphology for Mammogram PreprocessingFull-text access may be available. Sign in or learn about subscription options.pp. 286-290
Multiple Evolvable Hardware Image Filters by Analyzing Noise Types with Fuzzy RelationsFull-text access may be available. Sign in or learn about subscription options.pp. 291-296
Automatic Analysis of HER-2/neu Immunohistochemistry in Breast CancerFull-text access may be available. Sign in or learn about subscription options.pp. 297-300
Analysis of Similarity Coefficients in Fuzzy Node Fuzzy Graph and Its ApplicationFull-text access may be available. Sign in or learn about subscription options.pp. 301-306
Computational Complexity Theoretical Analyses on Cryptographic Algorithms for Computer Security ApplicationFull-text access may be available. Sign in or learn about subscription options.pp. 307-311
Personalized Facets for Semantic Search Using Linked Open Data with Social NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 312-317
Confining Edge Types in K-anonymization of Shortest PathsFull-text access may be available. Sign in or learn about subscription options.pp. 318-322
Use Critical Sub-graph to Optimize the In-building Shortest Path AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 323-328
Two Kinds of Weak-tie Strategy for Design Business OpportunityFull-text access may be available. Sign in or learn about subscription options.pp. 329-333
An Identification of Technology Opportunity on Dye-Sensitized Solar CellFull-text access may be available. Sign in or learn about subscription options.pp. 334-339
A Department Professional Competence Evaluation SystemFull-text access may be available. Sign in or learn about subscription options.pp. 340-343
Chance Discovery in Teaching of EFL Writing Using Weak Tie to Innovation Model (WTTI Model)Full-text access may be available. Sign in or learn about subscription options.pp. 344-349
Qualitative Text Mining in Student's Service Learning DiaryFull-text access may be available. Sign in or learn about subscription options.pp. 350-354
Author indexFreely available from IEEE.pp. 355-357
[Publisher's information]Freely available from IEEE.pp. 358-358
Showing 75 out of 75