Default Cover Image

2009 International Symposium on Intelligent Ubiquitous Computing and Education, IUCE

May 15 2009 to May 16 2009

Chengdu

Table of Contents

Conference InformationFreely available from IEEE.pp. xv-xvii
Papers
[Copyright notice]Freely available from IEEE.pp. iv
Papers
Table of contentsFreely available from IEEE.pp. v-xiv
Papers
Title Page iFreely available from IEEE.pp. i
Papers
Title Page iiiFreely available from IEEE.pp. iii
Papers
A GA-Based Feature Extraction and Its ApplicationFull-text access may be available. Sign in or learn about subscription options.pp. 3-5
Papers
A Service-oriented Component Composition Approach Based on Ant Colony AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 6-8
Papers
An Improved Scheduling Algorithm for Grid TasksFull-text access may be available. Sign in or learn about subscription options.pp. 9-12
Papers
ESB Infrastructure's Autonomous Mechanism of SOAFull-text access may be available. Sign in or learn about subscription options.pp. 13-17
Papers
GA and RBF Based Real-Time FDD for Refrigeration UnitsFull-text access may be available. Sign in or learn about subscription options.pp. 22-25
Papers
ARTMAP-Based Data Mining Approach and Its Application to Library Book RecommendationFull-text access may be available. Sign in or learn about subscription options.pp. 26-29
Papers
An Improved Clonal Selection Algorithm for Job Shop SchedulingFull-text access may be available. Sign in or learn about subscription options.pp. 34-37
License Plate Recognition Algorithm Based on Radial Basis Function Neural NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 38-41
Papers
A Perimeter-Based Noise Filter Algorithm for Vehicle RecognitionFull-text access may be available. Sign in or learn about subscription options.pp. 42-45
Papers
The Approach of Real-time Monitoring Based on Background SubtractionFull-text access may be available. Sign in or learn about subscription options.pp. 46-49
Papers
The Research and Implementation of the Full Text Endorsement and Traces Reservation Technology on B/S ModeFull-text access may be available. Sign in or learn about subscription options.pp. 50-53
Papers
Research and Realization of a Centralized Document Management Model Based on ASP.NETFull-text access may be available. Sign in or learn about subscription options.pp. 54-56
Papers
Application of Support Vector Machine to Capital Flow Risks PredictionFull-text access may be available. Sign in or learn about subscription options.pp. 57-60
Papers
Classification of Motor Imagery EEG Signals Based on Energy EntropyFull-text access may be available. Sign in or learn about subscription options.pp. 61-64
Papers
Research and Application of Interval Number Multiple Attribute Decision MakingFull-text access may be available. Sign in or learn about subscription options.pp. 65-68
Papers
Software Engineering and Thought OriginalityFull-text access may be available. Sign in or learn about subscription options.pp. 69-72
Papers
EPMA Image Fusion Scheme Based on Contourlet TransformFull-text access may be available. Sign in or learn about subscription options.pp. 73-76
Papers
Rapid Discriminating Algorithm of Fabric Flaw Based on Texture RuleFull-text access may be available. Sign in or learn about subscription options.pp. 77-80
Papers
Algorithm Research for the Noise of Information Extraction Based Vision and DOM TreeFull-text access may be available. Sign in or learn about subscription options.pp. 81-84
Papers
Temperature Modeling Study for High Precision Gyroscope Based on Neural NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 85-87
Papers
The Tracking Dynamical Evolutionary Algorithm for Dynamic EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 88-91
Papers
SCQR - A P2P Query Routing Algorithm Based on Semantic ClusterFull-text access may be available. Sign in or learn about subscription options.pp. 92-96
Papers
Identifying the Nucleus Residues in Proteins by Network ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 97-100
Papers
Prediction of Hydrophobic Core Residues Based on Network AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 101-104
Papers
The Application of Balanced Scorecard and Neural Network on the Performance Evaluation for EnterprisesFull-text access may be available. Sign in or learn about subscription options.pp. 105-108
Papers
Fair Security Protocols with Off-line TTPFull-text access may be available. Sign in or learn about subscription options.pp. 109-112
Papers
An Improved Anti-Spam Method TOMO Based on Challenge-Response TechnologyFull-text access may be available. Sign in or learn about subscription options.pp. 113-116
Papers
Research on Case Retrieval Model Based on Rough Set Theory and BP Neural NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 117-120
Papers
New Trend of Protein Secondary Structure PredictionFull-text access may be available. Sign in or learn about subscription options.pp. 121-124
Papers
An Improved Fuzzy Support Vector MachineFull-text access may be available. Sign in or learn about subscription options.pp. 125-128
Papers
A NAT Traversal Mechanism for Peer-To-Peer NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 129-132
Papers
Wavelet and Cellular Automata Based Image De-noising Method for Wire BondingFull-text access may be available. Sign in or learn about subscription options.pp. 133-136
Papers
Design of Power Transformer Fault Diagnosis Model Based on Support Vector MachineFull-text access may be available. Sign in or learn about subscription options.pp. 137-140
Papers
Predictive on the Shearing Property of Fabrics Based on Flexible Neural NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 141-144
Papers
Fabric Weave Design Based on Cellular Automata TheoryFull-text access may be available. Sign in or learn about subscription options.pp. 145-147
Papers
Design and Implement of Common Network Security Scanning SystemFull-text access may be available. Sign in or learn about subscription options.pp. 148-151
Papers
Interactive Intelligent Analysis Method: An Application of Criminal InvestigationFull-text access may be available. Sign in or learn about subscription options.pp. 152-155
Papers
An Improved Algorithm of Vector Data CompressionFull-text access may be available. Sign in or learn about subscription options.pp. 156-159
Papers
A Talent Classification Method Based on SVMFull-text access may be available. Sign in or learn about subscription options.pp. 160-163
Papers
A Framework for the Information Management System of Mandarin TestFull-text access may be available. Sign in or learn about subscription options.pp. 164-167
Papers
Automatic Pronunciation Scoring for Mandarin Proficiency Test Based on Speech RecognitionFull-text access may be available. Sign in or learn about subscription options.pp. 168-171
Papers
Towards Efficient Collaborative Component-Based Software Unit Testing via Extend E-CARGO Model-Based Activity Dependence IdentificationFull-text access may be available. Sign in or learn about subscription options.pp. 172-175
Papers
Role Clarification in Software Unit Testing for Middle Scale Database Interface ComponentsFull-text access may be available. Sign in or learn about subscription options.pp. 176-179
Papers
A Research and Practice of Agile Unified Requirement ModelingFull-text access may be available. Sign in or learn about subscription options.pp. 180-184
Papers
Prediction of Protein Coding Regions by Support Vector MachineFull-text access may be available. Sign in or learn about subscription options.pp. 185-188
Papers
A New Beamforming Algorithm Based on Spherical Uncertainty SetFull-text access may be available. Sign in or learn about subscription options.pp. 189-192
Papers
Mechanism Design on Incentives and Constraints for Construction Project BiddingFull-text access may be available. Sign in or learn about subscription options.pp. 193-197
Papers
Analysis on Employment of Graduate with BP Neural NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 198-201
Papers
On-line Handwritten Signature Verification Based on Two Levels Back Propagation Neural NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 202-205
Papers
An Improved Image Compression Algorithm for Noise ImageFull-text access may be available. Sign in or learn about subscription options.pp. 206-209
Papers
Detection of Fabric Defect Based on Optimal Tree Structure of Wavelet DecompositionFull-text access may be available. Sign in or learn about subscription options.pp. 210-213
Papers
Multi-hop AODV-2TFull-text access may be available. Sign in or learn about subscription options.pp. 214-217
Papers
Research on Fault Location of Aircraft Cable Based on Neural NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 218-221
Papers
Evolving Bidding Strategies Using Self-Adaptation Genetic AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 222-225
Papers
Feature Selection for Density-Based ClusteringFull-text access may be available. Sign in or learn about subscription options.pp. 226-229
Papers
A Quadratically Convergent Algorithm for Generalized Linear Complementarity Problem on Supply Chain Equilibrium ModelFull-text access may be available. Sign in or learn about subscription options.pp. 230-233
Papers
The Collaborative Filtering Recommendation Algorithm Based on BP Neural NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 234-236
Papers
Fuzzy Neural Network Model and its Application in Teaching Quality EvaluationFull-text access may be available. Sign in or learn about subscription options.pp. 239-242
Papers
Intercollegiate Collaborative Online Learning of MindmapFull-text access may be available. Sign in or learn about subscription options.pp. 243-246
Papers
Application of KM on College InstructionFull-text access may be available. Sign in or learn about subscription options.pp. 247-249
Papers
Network Teaching and Learning Modes Based on Internet for Deaf StudentsFull-text access may be available. Sign in or learn about subscription options.pp. 250-253
Papers
An Evaluation Model of Web-Based Distance Education for the Deaf UndergraduateFull-text access may be available. Sign in or learn about subscription options.pp. 254-257
Papers
The Virtual Laboratory System on Law EducationFull-text access may be available. Sign in or learn about subscription options.pp. 258-261
Papers
Teaching Innovation and Practice for the Capacity-Training as the Goal to the Digital Image Processing CourseFull-text access may be available. Sign in or learn about subscription options.pp. 262-264
Papers
Research and Practice of Visual Teaching for Three Basic Characteristics of Object-Oriented ConceptsFull-text access may be available. Sign in or learn about subscription options.pp. 265-267
Papers
Design and Implementation of the Subject-Based Learning WebsiteFull-text access may be available. Sign in or learn about subscription options.pp. 268-270
Papers
Investigation and Analysis on the Use of Multimedia in the College Physical EducationFull-text access may be available. Sign in or learn about subscription options.pp. 271-274
Papers
Research on the Experimental Education of Technical Courses in the Information AgeFull-text access may be available. Sign in or learn about subscription options.pp. 277-280
Papers
Web-Based Education Technology and Application in the Rural Basic EducationFull-text access may be available. Sign in or learn about subscription options.pp. 281-284
Papers
Discussion on Computer-Based Teaching MethodsFull-text access may be available. Sign in or learn about subscription options.pp. 285-287
Papers
Exploration in Innovation about Computer Teaching Based on Cultivation Mode for Applied TalentsFull-text access may be available. Sign in or learn about subscription options.pp. 288-290
Papers
A Study of Different Background Language Songs on Memory Task PerformanceFull-text access may be available. Sign in or learn about subscription options.pp. 291-294
Papers
Research of Accuracy and Stability on Computer Timing Control in Behavioral and Cognitive NeuroscienceFull-text access may be available. Sign in or learn about subscription options.pp. 295-299
Papers
Research on Spatial Location Unit Distribution Model in Pervasive ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 311-314
Papers
A Game-Theoretic Data Assignment Scheme for P2PVoD SystemFull-text access may be available. Sign in or learn about subscription options.pp. 315-318
Papers
A Novel Multi-Touch Human-Computer-Interface Based on Binocular Stereo VisionFull-text access may be available. Sign in or learn about subscription options.pp. 319-323
Papers
Research of a Class of Security SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 324-326
Papers
Phenomenons and Methods: Uncertainty in Internal Symmetry Nets with Backpropagation in Image ProcessingFull-text access may be available. Sign in or learn about subscription options.pp. 327-330
Papers
A Novel Wheeze Detection Method for Wearable Monitoring SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 331-334
Papers
Network Monitoring Based on Community Structure ChangeFull-text access may be available. Sign in or learn about subscription options.pp. 337-340
Papers
Method for Security Enhancement of Cognitive Radio SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 341-344
Semantic Based Resource Retrieval Algorithm for Networked ManufacturingFull-text access may be available. Sign in or learn about subscription options.pp. 408-413
Papers
Similarity Degree-Based Mobility Pattern Aware Routing in DTNsFull-text access may be available. Sign in or learn about subscription options.pp. 345-348
Papers
General-purpose Identity Hiding Schemes for Ad-hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 349-352
Papers
Multi-agent Coordination Based on Contract Net ProtocolFull-text access may be available. Sign in or learn about subscription options.pp. 353-357
Papers
Improved Algorithm of Unstructured P2P Network Topology StructureFull-text access may be available. Sign in or learn about subscription options.pp. 358-361
Papers
A Smart Card Remote Authenticated Key Agreement Protocol for Multi-servers Using PairingsFull-text access may be available. Sign in or learn about subscription options.pp. 362-365
Papers
State of the Art in Cross-Layer Design for Cognitive Radio Wireless NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 366-369
Papers
Performance Analysis of Short Message ServiceFull-text access may be available. Sign in or learn about subscription options.pp. 370-373
Papers
Design of Wireless Communication Protocol for Home LANFull-text access may be available. Sign in or learn about subscription options.pp. 374-377
Papers
On the Global Asymptotic Stability Problem of a Class of Wireless Communication SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 378-380
Papers
Performance Analysis and Evaluation of Handover in Mobile IPv6Full-text access may be available. Sign in or learn about subscription options.pp. 381-384
Papers
Discuss of User Identification Technology in DSL NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 385-388
Showing 100 out of 149