Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
IBICA
IBICA 2012
Generate Citations
2012 Third International Conference on Innovations in Bio-Inspired Computing and Applications (IBICA)
Sept. 26 2012 to Sept. 28 2012
Kaohsiung
Table of Contents
[Cover art]
Freely available from IEEE.
pp. C4-C4
[Title page i]
Freely available from IEEE.
pp. i-i
[Title page iii]
Freely available from IEEE.
pp. iii-iii
[Copyright notice]
Freely available from IEEE.
pp. iv-iv
Table of contents
Freely available from IEEE.
pp. v-x
Preface
Freely available from IEEE.
pp. xi-xi
Organizing Committee
Freely available from IEEE.
pp. xii-xiii
Program Committee
Freely available from IEEE.
pp. xiv-xv
Binary Particle Swarm Optimization for TDMA Broadcast Scheduling Problem
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Sung-Soo Kim
,
Ji-Hwan Byeon
,
Hongbo Liu
,
Ajith Abraham
,
Hong Yu
A Fast Bee Colony Optimization for Traveling Salesman Problem
Full-text access may be available. Sign in or learn about subscription options.
pp. 7-12
by
Abba Suganda Girsang
,
Chun-Wei Tsai
,
Chu-Sing Yang
Constructing a Markov Chain on Particle Swarm Optimizer
Full-text access may be available. Sign in or learn about subscription options.
pp. 13-18
by
Chao-Wei Chou
,
Jiann-Horng Lin
,
Chorng-Horng Yang
,
Hsien-Leing Tsai
,
Ya-Hui Ou
A Multistart Simulated Annealing Algorithm for the Quadratic Assignment Problem
Full-text access may be available. Sign in or learn about subscription options.
pp. 19-23
by
Jiunn-Chin Wang
A Bio-Inspired Algorithm for Solving the Scheduling Problems with Redundant Molds
Full-text access may be available. Sign in or learn about subscription options.
pp. 24-28
by
Tzung-Pei Hong
,
Ting-I Chien
,
Yeong-Chyi Lee
,
Yu-Lung Wu
Swarm Refinement PSO for Solving N-queens Problem
Full-text access may be available. Sign in or learn about subscription options.
pp. 29-33
by
Yuh-Rau Wang
,
Hsieh-Liang Lin
,
Ling Yang
Fuzzy Cluster Analysis and Its Application on International Stock Prices
Full-text access may be available. Sign in or learn about subscription options.
pp. 34-38
by
Kaiji Motegi
,
Kimiaki Shinkai
,
Hiroaki Uesu
,
Shuya Kanagawa
,
Hsunhsun Chung
,
Kenichi Nagashima
A Novel Self-Organizing Map for Text Document Organization
Full-text access may be available. Sign in or learn about subscription options.
pp. 39-44
by
Hsin-Chang Yang
,
Chung-Hong Lee
An Enhanced FUFP-Tree Maintenance Approach for Transaction Deletion
Full-text access may be available. Sign in or learn about subscription options.
pp. 45-50
by
Chanh-Truc Tran
,
Bay Vo
,
Tzung-Pei Hong
,
Chun-Wei Lin
,
Bac Le
A Dynamic Bit-vector Approach for Efficiently Mining Inter-sequence Patterns
Full-text access may be available. Sign in or learn about subscription options.
pp. 51-56
by
Bay Vo
,
Minh-Thai Tran
,
Tzung-Pei Hong
,
Hieu Nguyen
,
Bac Le
Handling Missing Data in Extended Possibility-based Fuzzy Relational Databases
Full-text access may be available. Sign in or learn about subscription options.
pp. 57-62
by
Julie Yu-Chih Liu
,
Chiung-Hua Huang
A Hierarchical Clustering Method Based on Fuzzy-Number Similarity Measure Applied to a Problem of Grouping Profiles
Full-text access may be available. Sign in or learn about subscription options.
pp. 63-66
by
Shi-Jay Chen
,
Zhi-Yong Wang
Assessment of Hypervisor and Shared Storage for Cloud Computing Server
Full-text access may be available. Sign in or learn about subscription options.
pp. 67-72
by
Bao Rong Chang
,
Hsiu-Fen Tsai
,
Chi-Ming Chen
,
Zih-Yao Lin
,
Chien-Feng Huang
A Comparative Study of Regression and Evolution-Based Stock Selection Models for Investor Sentiment
Full-text access may be available. Sign in or learn about subscription options.
pp. 73-78
by
Chien-Feng Huang
,
Tsung-Nan Hsieh
,
Bao Rong Chang
,
Chih-Hsiang Chang
Retailer's Optimal Order and Payment Policies with Two-Level Trade Credit where Up-Stream Trade Credit Linked to Order Quantity
Full-text access may be available. Sign in or learn about subscription options.
pp. 79-84
by
Chih-Te Yang
,
Tien-Tsai Huang
,
Liang-Ho Chen
,
Liang-Yuh Ouyang
An Application of Discrete Wavelet Transform and Support Vector Machines Algorithm for Classification of Fault Types on Underground Cable
Full-text access may be available. Sign in or learn about subscription options.
pp. 85-88
by
A. Ngaopitakkul
,
C. Pothisarn
,
S. Bunjongjit
,
B. Suechoey
An Application of Discrete Wavelet Transform and Support Vector Machines Algorithm for Fault Locations in Underground Cable
Full-text access may be available. Sign in or learn about subscription options.
pp. 89-92
by
C. Apisit
,
C. Pothisarn
,
A. Ngaopitakkul
Analysis of Characteristics Using Wavelet Transform for Simultaneous Faults in Electrical Power System
Full-text access may be available. Sign in or learn about subscription options.
pp. 93-97
by
C. Pothisarn
,
A. Ngaopitakkul
An Expandable Genetic Cell Array for Global Optimization of Continuous Multimodal Functions
Full-text access may be available. Sign in or learn about subscription options.
pp. 98-103
by
Ting-Hua Chang
A Study on Optimizing Execution Time and Code Size in Iterative Compilation
Full-text access may be available. Sign in or learn about subscription options.
pp. 104-109
by
Yan-Quan Zhou
,
Nai-Wei Lin
Multi-mode Resource-Constrained Project Scheduling by Ant Colony Optimization with a Dynamic Tournament Strategy
Full-text access may be available. Sign in or learn about subscription options.
pp. 110-115
by
Chuan-Wen Chiang
,
Yu-Qing Huang
Multiobjective Evolutionary Algorithm for Lifetime Extension and Loading Balancing of Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 116-121
by
Chien-Chih Liao
Design of Stable IIR Filter by Improved Genetic Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 122-126
by
Shing-Tai Pan
,
Ching-Fa Chen
A Bio-Inspired Memetic Particle Swarm Optimization Algorithm for Multi-objective Optimization Problems
Full-text access may be available. Sign in or learn about subscription options.
pp. 127-132
by
Omar S. Soliman
,
Soad M. Mohamed
,
Elshimaa A. Ramadan
A Personalized Sleep Quality Assessment Mechanism Based on Sleep Pattern Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 133-138
by
Shiao-Ping Cheng
,
Hsing Mei
Robust Little Flame Detection on Real-Time Video Surveillance System
Full-text access may be available. Sign in or learn about subscription options.
pp. 139-143
by
Tai Yu Lai
,
Jong Yih Kuo
,
Yong-Yi Fanjiang
,
Shang-Pin Ma
,
Yi Han Liao
An Automatic Colonic Polyp Type Identification System by Narrow-Band Imaging and Focal Zone Features of Vascular Shapes and Patterns
Full-text access may be available. Sign in or learn about subscription options.
pp. 144-147
by
Chien-Chang Hsu
,
Zhong-Ye Yang
,
Chen-Ming Hsu
A Novel Image Retrieval Technique Based on Salient Image Features
Full-text access may be available. Sign in or learn about subscription options.
pp. 148-155
by
Kuo-Lung Hung
,
Chieh-Hsien Lu
Using Hybrid Artificial Bee Colony Algorithm to Extend Wireless Sensor Network Lifetime
Full-text access may be available. Sign in or learn about subscription options.
pp. 156-161
by
Rung-Ching Chen
,
Wei-Lung Chang
,
Chia-Fen Shieh
,
Cliff C. Zou
Assessing Sustainability in Manufacturing Using a Fuzzy Expert System
Full-text access may be available. Sign in or learn about subscription options.
pp. 162-167
by
Swee S. Kuik
,
Sev V. Nagalingam
,
Yousef Amer
A Fuzzy Decision-Making Model for Supplier Selection of Logistics
Full-text access may be available. Sign in or learn about subscription options.
pp. 168-171
by
Yu-Jie Wang
,
Tzeu-Chen Han
,
Chao-Shun Kao
Application of I-S Model in Assessment of Military Supply Transportation by Sea in Outlying Islands of Taiwan
Full-text access may be available. Sign in or learn about subscription options.
pp. 172-176
by
Tzeu-Chen Han
,
Arthur Sung
,
Chien-Chang Chou
A Study of the Relationship of Corporate Governance and Stock Price of the Marine Industry in Taiwan: Using the Ohlson Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 177-180
by
Yuh-Ling Su
,
Chien-Ting Liu
Risk Evaluation of Plant Locations of Taiwanese FDI in China
Full-text access may be available. Sign in or learn about subscription options.
pp. 181-184
by
Chien-Chang Chou
,
Jeng-Ming Yih
,
Tzeu-Chen Han
,
Yuh-Ling Su
,
Yu-Jie Wang
,
Ji-Feng Ding
,
Ming-Tao Chou
Prediction of Asian Steel Price Index Using Fuzzy Time Series
Full-text access may be available. Sign in or learn about subscription options.
pp. 185-188
by
Ming-Tao Chou
Design of a Wireless Power Transfer for Contactless Charging System Using Bio-Inspired Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 189-194
by
Shyh-Jier Huang
,
Tsong-Shing Lee
,
Cheng-Tao Hsieh
Design of Lithium-Ion Battery Charging System Enhanced with Wolf Pack Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 195-200
by
Te-Chun Hung
,
Shyh-Jier Huang
,
Fu-Sheng Pai
,
Chen-Wei Ku
An Intelligent Design and Management Tool for Power Inverters
Full-text access may be available. Sign in or learn about subscription options.
pp. 201-205
by
Yeong-Chau Kuo
,
Li-Jen Liu
,
Wei-Hsiang Tung
,
Yi-Ming Huang
,
Su-Hau Ho
A Bio-inspired Optimization Algorithm for Modeling the Dynamics of Biological Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 206-211
by
Jiann-Horng Lin
,
Chao-Wei Chou
,
Chorng-Horng Yang
,
Hsien-Leing Tsai
,
I-Ho Lee
Artificial Immune Memory: Perspectives on Internal Image with Antibody Dynamics
Full-text access may be available. Sign in or learn about subscription options.
pp. 212-217
by
Chung-Ming Ou
,
Chung-Jen Ou
Potential Protein Targets and Toxicological Mechanism of Persistent Organic Polluntant Perfluorooctanesulfonate
Full-text access may be available. Sign in or learn about subscription options.
pp. 218-222
by
Xiaofeng Huang
,
Tongcheng Cao
,
Guohua Zhao
A Hybrid PSO-Based Algorithm for Solving DNA Fragment Assembly Problem
Full-text access may be available. Sign in or learn about subscription options.
pp. 223-228
by
Ko-Wei Huang
,
Jui-Le Chen
,
Chu-Sing Yang
Temporal Data Mining for Nursing Schedule Management
Full-text access may be available. Sign in or learn about subscription options.
pp. 229-234
by
Shusaku Tsumoto
,
Shoji Hirano
,
Haruko Iwata
Binding in Human Antibody-DNA Interface: A Computer-Simulation Study
Full-text access may be available. Sign in or learn about subscription options.
pp. 235-240
by
Zhi-Yuan Su
,
Yeng-Tseng Wang
Artificial Neural Network Model for Predicting 5-year Mortality after Surgery for Hepatocellular Carcinoma and Performance Comparison with Logistic Regression Model: A Nationwide Taiwan Database Study
Full-text access may be available. Sign in or learn about subscription options.
pp. 241-245
by
Wan-Ting Hung
,
King-Teh Lee
,
Shih-Chin Wang
,
Wen-Hsien Ho
,
Su-Ching Chang
,
Jhi-Joung Wang
,
Ding-Ping Sun
,
Hao-Hsien Lee
,
Chong-Chi Chiu
,
Hon-Yi Shi
Performance Measurement of IEEE 802.15.4 MAC on Different 3D Terrains
Full-text access may be available. Sign in or learn about subscription options.
pp. 246-251
by
Tsun-Wei Chang
,
Mu-Sheng Lin
A Specification-Based Intrusion Detection Model for Wireless Ad Hoc Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 252-257
by
Hsiao-Ching Lin
,
Ming-Kung Sun
,
Han-Wei Huang
,
Chin-Yang Henry Tseng
,
Hui-Tang Lin
Performance of Multiuser TAS/MRC Systems with a High Selection Gain in Severe Fading Channels
Full-text access may be available. Sign in or learn about subscription options.
pp. 258-261
by
Chia-Chun Hung
,
Ching-Tai Chiang
,
Chen-Sen Ouyang
,
Rong-Ching Wu
,
C. Lee
On-line Discriminative Feature Selection in Particle Filter Tracking
Full-text access may be available. Sign in or learn about subscription options.
pp. 262-267
by
Yuan-Li Liu
,
Chin-Shiuh Shieh
A Full-Reachability Network to Connect Isolated Nodes in Wireless Sensor Networks -- An Application of Finding Escape-Path in Blaze Scene
Full-text access may be available. Sign in or learn about subscription options.
pp. 268-273
by
Che-Hung Lin
,
Chun-Wei Tseng
,
Yi-Syuan Song
,
Yi-Ting Chen
,
Mong-Fong Horng
,
Wen-Chuan Chang
Design of Composite Image Filters Using Interactive Genetic Programming
Full-text access may be available. Sign in or learn about subscription options.
pp. 274-279
by
Jingye Ma
,
Hideyuki Takagi
Remote Sensing Satellite Images Classification Using Support Vector Machine and Particle Swarm Optimization
Full-text access may be available. Sign in or learn about subscription options.
pp. 280-285
by
Omar S. Soliman
,
Amira S. Mahmoud
,
Safaa M. Hassan
Pulse Coupled Neural Networks and Image Morphology for Mammogram Preprocessing
Full-text access may be available. Sign in or learn about subscription options.
pp. 286-290
by
James Wolfer
Multiple Evolvable Hardware Image Filters by Analyzing Noise Types with Fuzzy Relations
Full-text access may be available. Sign in or learn about subscription options.
pp. 291-296
by
Chih-Hung Wu
,
Chien-Jung Chen
,
Chin Yuan Chiang
,
You-Dong Huang
Automatic Analysis of HER-2/neu Immunohistochemistry in Breast Cancer
Full-text access may be available. Sign in or learn about subscription options.
pp. 297-300
by
Chuan-Yu Chang
,
Ya-Chi Huang
,
Chien-Chuan Ko
Analysis of Similarity Coefficients in Fuzzy Node Fuzzy Graph and Its Application
Full-text access may be available. Sign in or learn about subscription options.
pp. 301-306
by
Hiroaki Uesu
,
Shuya Kanagawa
,
Kimiaki Shinkai
,
Kenichi Nagashima
Computational Complexity Theoretical Analyses on Cryptographic Algorithms for Computer Security Application
Full-text access may be available. Sign in or learn about subscription options.
pp. 307-311
by
Chia-Long Wu
,
Chen-Hao Hu
Personalized Facets for Semantic Search Using Linked Open Data with Social Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 312-317
by
Tuong Le
,
Bay Vo
,
Trong Hai Duong
Confining Edge Types in K-anonymization of Shortest Paths
Full-text access may be available. Sign in or learn about subscription options.
pp. 318-322
by
Yu-Chuan Tsai
,
Shyue-Liang Wang
,
Hung-Yu Kao
,
Tzung-Pei Hong
Use Critical Sub-graph to Optimize the In-building Shortest Path Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 323-328
by
Hong Yu
,
Mengyu Li
,
Tong Liu
,
Zijian Ning
Two Kinds of Weak-tie Strategy for Design Business Opportunity
Full-text access may be available. Sign in or learn about subscription options.
pp. 329-333
by
Chao-Fu Hong
,
Mu-Hua Lin
,
Hsiao-Fang Yang
,
Tzu-Fu Chiu
An Identification of Technology Opportunity on Dye-Sensitized Solar Cell
Full-text access may be available. Sign in or learn about subscription options.
pp. 334-339
by
Tzu-Fu Chiu
,
Chao-Fu Hong
,
Chun-An Pai
,
Shih-Wei Yang
A Department Professional Competence Evaluation System
Full-text access may be available. Sign in or learn about subscription options.
pp. 340-343
by
Hsuan-Pu Chang
,
Chia-Ling Hsu
,
Ren-Her Wang
,
Wei-Ting Chang
Chance Discovery in Teaching of EFL Writing Using Weak Tie to Innovation Model (WTTI Model)
Full-text access may be available. Sign in or learn about subscription options.
pp. 344-349
by
Irene Su
Qualitative Text Mining in Student's Service Learning Diary
Full-text access may be available. Sign in or learn about subscription options.
pp. 350-354
by
Chia-Ling Hsu
,
Ya-Fung Chang
Author index
Freely available from IEEE.
pp. 355-357
[Publisher's information]
Freely available from IEEE.
pp. 358-358
Showing 75 out of 75