Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
IUCE
IUCE 2009
Generate Citations
2009 International Symposium on Intelligent Ubiquitous Computing and Education, IUCE
May 15 2009 to May 16 2009
Chengdu
Table of Contents
Conference Information
Freely available from IEEE.
pp. xv-xvii
Papers
[Copyright notice]
Freely available from IEEE.
pp. iv
Papers
Table of contents
Freely available from IEEE.
pp. v-xiv
Papers
Title Page i
Freely available from IEEE.
pp. i
Papers
Title Page iii
Freely available from IEEE.
pp. iii
Papers
A GA-Based Feature Extraction and Its Application
Full-text access may be available. Sign in or learn about subscription options.
pp. 3-5
by
Yu Zhefu
,
Lu Huibiao
,
Jia Chuanying
Papers
A Service-oriented Component Composition Approach Based on Ant Colony Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 6-8
by
Ling Daoming
,
Zhou Xiangbing
Papers
An Improved Scheduling Algorithm for Grid Tasks
Full-text access may be available. Sign in or learn about subscription options.
pp. 9-12
by
Li Wenzheng
,
Zhang Wenyue
Papers
ESB Infrastructure's Autonomous Mechanism of SOA
Full-text access may be available. Sign in or learn about subscription options.
pp. 13-17
by
Rui Wen
,
Yaping Ma
,
Xiaoqing Chen
Papers
GA and RBF Based Real-Time FDD for Refrigeration Units
Full-text access may be available. Sign in or learn about subscription options.
pp. 22-25
by
Yonghong Huang
,
Jihong Zhan
Papers
ARTMAP-Based Data Mining Approach and Its Application to Library Book Recommendation
Full-text access may be available. Sign in or learn about subscription options.
pp. 26-29
by
Xuejun Yang
,
Hongchun Zeng
,
Yonghong Huang
Papers
An Improved Clonal Selection Algorithm for Job Shop Scheduling
Full-text access may be available. Sign in or learn about subscription options.
pp. 34-37
by
Hong Lu
,
Jing Yang
License Plate Recognition Algorithm Based on Radial Basis Function Neural Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 38-41
by
Weihua Wang
Papers
A Perimeter-Based Noise Filter Algorithm for Vehicle Recognition
Full-text access may be available. Sign in or learn about subscription options.
pp. 42-45
by
Weihua Wang
Papers
The Approach of Real-time Monitoring Based on Background Subtraction
Full-text access may be available. Sign in or learn about subscription options.
pp. 46-49
by
Weihua Wang
Papers
The Research and Implementation of the Full Text Endorsement and Traces Reservation Technology on B/S Mode
Full-text access may be available. Sign in or learn about subscription options.
pp. 50-53
by
Zhu Ai-hong
,
He Hai-yan
,
Lu Guo
Papers
Research and Realization of a Centralized Document Management Model Based on ASP.NET
Full-text access may be available. Sign in or learn about subscription options.
pp. 54-56
by
Zhu Ai-hong
,
He Hai-yan
Papers
Application of Support Vector Machine to Capital Flow Risks Prediction
Full-text access may be available. Sign in or learn about subscription options.
pp. 57-60
by
Xiping Wang
Papers
Classification of Motor Imagery EEG Signals Based on Energy Entropy
Full-text access may be available. Sign in or learn about subscription options.
pp. 61-64
by
Dan Xiao
,
Zhengdong Mu
,
Jianfeng Hu
Papers
Research and Application of Interval Number Multiple Attribute Decision Making
Full-text access may be available. Sign in or learn about subscription options.
pp. 65-68
by
Hualong Zhao
Papers
Software Engineering and Thought Originality
Full-text access may be available. Sign in or learn about subscription options.
pp. 69-72
by
Yu Gao
,
Xiangzhong Feng
Papers
EPMA Image Fusion Scheme Based on Contourlet Transform
Full-text access may be available. Sign in or learn about subscription options.
pp. 73-76
by
Li Xiang
,
Tang Wei
Papers
Rapid Discriminating Algorithm of Fabric Flaw Based on Texture Rule
Full-text access may be available. Sign in or learn about subscription options.
pp. 77-80
by
Xiuchen Wang
Papers
Algorithm Research for the Noise of Information Extraction Based Vision and DOM Tree
Full-text access may be available. Sign in or learn about subscription options.
pp. 81-84
by
Tieli Sun
,
Zhiying Li
,
Yanji Liu
,
Zhenghong Liu
Papers
Temperature Modeling Study for High Precision Gyroscope Based on Neural Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 85-87
by
Qian Zhang
,
Xiao-fang Liu
,
Jun Zhan
,
Gui-ming Chen
Papers
The Tracking Dynamical Evolutionary Algorithm for Dynamic Environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 88-91
by
Suming Liu
,
Qiang Zhao
,
Yumei Zhang
Papers
SCQR - A P2P Query Routing Algorithm Based on Semantic Cluster
Full-text access may be available. Sign in or learn about subscription options.
pp. 92-96
by
Shiyao Jin
,
Gui-Ming Zhu
Papers
Identifying the Nucleus Residues in Proteins by Network Approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 97-100
by
Haiyan Li
Papers
Prediction of Hydrophobic Core Residues Based on Network Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 101-104
by
Haiyan Li
Papers
The Application of Balanced Scorecard and Neural Network on the Performance Evaluation for Enterprises
Full-text access may be available. Sign in or learn about subscription options.
pp. 105-108
by
Yao Gu
,
Lan Guo
,
Qingyu Sun
Papers
Fair Security Protocols with Off-line TTP
Full-text access may be available. Sign in or learn about subscription options.
pp. 109-112
by
Xi Wang
,
Xiangming Wen
,
Changxin Liang
,
Ye Liu
,
Xinqi Lin
Papers
An Improved Anti-Spam Method TOMO Based on Challenge-Response Technology
Full-text access may be available. Sign in or learn about subscription options.
pp. 113-116
by
Peng Li
,
Miao Liu
,
Fan Zhang
,
Chunming Tang
Papers
Research on Case Retrieval Model Based on Rough Set Theory and BP Neural Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 117-120
by
Xiaohui Wang
Papers
New Trend of Protein Secondary Structure Prediction
Full-text access may be available. Sign in or learn about subscription options.
pp. 121-124
by
Yun Zhai
,
Bingru Yang
,
Lijun Wang
,
Bing An
Papers
An Improved Fuzzy Support Vector Machine
Full-text access may be available. Sign in or learn about subscription options.
pp. 125-128
by
Xiaoling Xiao
,
Xiang Zhang
Papers
A NAT Traversal Mechanism for Peer-To-Peer Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 129-132
by
Zepeng Zhang
,
Xiangming Wen
,
Wei Zheng
Papers
Wavelet and Cellular Automata Based Image De-noising Method for Wire Bonding
Full-text access may be available. Sign in or learn about subscription options.
pp. 133-136
by
Fanzhi Kong
,
Wenbin Ma
Papers
Design of Power Transformer Fault Diagnosis Model Based on Support Vector Machine
Full-text access may be available. Sign in or learn about subscription options.
pp. 137-140
by
Tao Liu
,
Zhijie Wang
Papers
Predictive on the Shearing Property of Fabrics Based on Flexible Neural Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 141-144
by
Suyi Liu
,
Qian Wan
,
Yin Cui
Papers
Fabric Weave Design Based on Cellular Automata Theory
Full-text access may be available. Sign in or learn about subscription options.
pp. 145-147
by
Liu Suyi
,
Wan Qian
,
Zhang Heng
Papers
Design and Implement of Common Network Security Scanning System
Full-text access may be available. Sign in or learn about subscription options.
pp. 148-151
by
Wentao Liu
Papers
Interactive Intelligent Analysis Method: An Application of Criminal Investigation
Full-text access may be available. Sign in or learn about subscription options.
pp. 152-155
by
Zengtang Qu
,
Ping He
Papers
An Improved Algorithm of Vector Data Compression
Full-text access may be available. Sign in or learn about subscription options.
pp. 156-159
by
Chen Feixiang
,
Qi Jiandong
,
Zhao Ming
Papers
A Talent Classification Method Based on SVM
Full-text access may be available. Sign in or learn about subscription options.
pp. 160-163
by
Jing Ye
,
Hua Hu
,
ChunLai Chai
Papers
A Framework for the Information Management System of Mandarin Test
Full-text access may be available. Sign in or learn about subscription options.
pp. 164-167
by
Chunting Yang
,
Yang Liu
,
Zhigang Cheng
Papers
Automatic Pronunciation Scoring for Mandarin Proficiency Test Based on Speech Recognition
Full-text access may be available. Sign in or learn about subscription options.
pp. 168-171
by
Yang Liu
,
Chunting Yang
,
Weifeng Ma
Papers
Towards Efficient Collaborative Component-Based Software Unit Testing via Extend E-CARGO Model-Based Activity Dependence Identification
Full-text access may be available. Sign in or learn about subscription options.
pp. 172-175
by
Bin Xu
Papers
Role Clarification in Software Unit Testing for Middle Scale Database Interface Components
Full-text access may be available. Sign in or learn about subscription options.
pp. 176-179
by
Yun Ling
,
Bin Xu
Papers
A Research and Practice of Agile Unified Requirement Modeling
Full-text access may be available. Sign in or learn about subscription options.
pp. 180-184
by
Huang ShuiYuan
,
Duan LongZhen
,
Xie Jun
,
Tao JunCai
,
Chen GuiXiang
Papers
Prediction of Protein Coding Regions by Support Vector Machine
Full-text access may be available. Sign in or learn about subscription options.
pp. 185-188
by
Guo Shuo
,
Zhu Yi-sheng
Papers
A New Beamforming Algorithm Based on Spherical Uncertainty Set
Full-text access may be available. Sign in or learn about subscription options.
pp. 189-192
by
Jingkai Wang
,
Cunhai Pan
,
Dongtao Li
,
Peng Zhao
Papers
Mechanism Design on Incentives and Constraints for Construction Project Bidding
Full-text access may be available. Sign in or learn about subscription options.
pp. 193-197
by
Liu Jianbing
,
Li Zhiming
,
Ren Hong
Papers
Analysis on Employment of Graduate with BP Neural Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 198-201
by
Xiaotao Wang
,
Wang Ping
,
Xiaobo Wang
Papers
On-line Handwritten Signature Verification Based on Two Levels Back Propagation Neural Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 202-205
by
Zhan Enqi
,
Guo Jinxu
,
Zheng Jianbin
,
Ma Chan
,
Wang Linjuan
Papers
An Improved Image Compression Algorithm for Noise Image
Full-text access may be available. Sign in or learn about subscription options.
pp. 206-209
by
Jinxu Guo
,
Yong Chen
Papers
Detection of Fabric Defect Based on Optimal Tree Structure of Wavelet Decomposition
Full-text access may be available. Sign in or learn about subscription options.
pp. 210-213
by
HuiYu Jiang
,
Min Dong
,
Wei Li
Notice of Retraction: Study on the Relationship of University Innovation Education and College Students Enterprising
Full-text access may be available. Sign in or learn about subscription options.
pp. 275-276
by
Guojiang Gao
,
Guoqing Lu
,
Wenmei Liu
,
Yongsheng Li
,
Ming Yang
Papers
Multi-hop AODV-2T
Full-text access may be available. Sign in or learn about subscription options.
pp. 214-217
by
Mayuree Lerwatechakul
,
Harisavan Somnuk
Papers
Research on Fault Location of Aircraft Cable Based on Neural Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 218-221
by
Xudong Shi
,
Xiaolin Liu
,
Heyan Pei
Papers
Evolving Bidding Strategies Using Self-Adaptation Genetic Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 222-225
by
Gan Kim Soon
,
Patricia Anthony
,
Jason Teo
,
Chin Kim On
Papers
Feature Selection for Density-Based Clustering
Full-text access may be available. Sign in or learn about subscription options.
pp. 226-229
by
Yun Ling
,
Chongyi Ye
Papers
A Quadratically Convergent Algorithm for Generalized Linear Complementarity Problem on Supply Chain Equilibrium Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 230-233
by
Hongchun Sun
Papers
The Collaborative Filtering Recommendation Algorithm Based on BP Neural Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 234-236
by
DanEr Chen
Papers
Fuzzy Neural Network Model and its Application in Teaching Quality Evaluation
Full-text access may be available. Sign in or learn about subscription options.
pp. 239-242
by
Changjun Zhu
,
Lihong Li
Papers
Intercollegiate Collaborative Online Learning of Mindmap
Full-text access may be available. Sign in or learn about subscription options.
pp. 243-246
by
Li Cuibai
Papers
Application of KM on College Instruction
Full-text access may be available. Sign in or learn about subscription options.
pp. 247-249
by
Li Cuibai
Papers
Network Teaching and Learning Modes Based on Internet for Deaf Students
Full-text access may be available. Sign in or learn about subscription options.
pp. 250-253
by
Li Qiang
,
Bao Guodong
Papers
An Evaluation Model of Web-Based Distance Education for the Deaf Undergraduate
Full-text access may be available. Sign in or learn about subscription options.
pp. 254-257
by
Li Qiang
,
Ma Ming
Papers
The Virtual Laboratory System on Law Education
Full-text access may be available. Sign in or learn about subscription options.
pp. 258-261
by
Lu Ling
,
Wang Lei
Papers
Teaching Innovation and Practice for the Capacity-Training as the Goal to the Digital Image Processing Course
Full-text access may be available. Sign in or learn about subscription options.
pp. 262-264
by
Wang Lei
,
Chen Gongxin
,
Yang Yong
,
Lu Ling
Papers
Research and Practice of Visual Teaching for Three Basic Characteristics of Object-Oriented Concepts
Full-text access may be available. Sign in or learn about subscription options.
pp. 265-267
by
Xiong Jianying
,
Yao Leiyue
Papers
Design and Implementation of the Subject-Based Learning Website
Full-text access may be available. Sign in or learn about subscription options.
pp. 268-270
by
Hua Pang
,
Shu Yang
,
Jianhui Wang
Papers
Investigation and Analysis on the Use of Multimedia in the College Physical Education
Full-text access may be available. Sign in or learn about subscription options.
pp. 271-274
by
Xu Lei
,
Zhang Wei
Papers
Research on the Experimental Education of Technical Courses in the Information Age
Full-text access may be available. Sign in or learn about subscription options.
pp. 277-280
by
Hui-wen Leng
,
Dong-xing Wang
,
Yue Li
,
Bao-shun Li
Papers
Web-Based Education Technology and Application in the Rural Basic Education
Full-text access may be available. Sign in or learn about subscription options.
pp. 281-284
by
Minghong Chen
,
Gang Li
,
Zhenhua Feng
Papers
Discussion on Computer-Based Teaching Methods
Full-text access may be available. Sign in or learn about subscription options.
pp. 285-287
by
Qun Wang
,
Yong Yu
,
Yan Yu
Papers
Exploration in Innovation about Computer Teaching Based on Cultivation Mode for Applied Talents
Full-text access may be available. Sign in or learn about subscription options.
pp. 288-290
by
Yunxiang Liu
,
Gao Jun
,
Li Shensu
,
Yinjie Liu
Papers
A Study of Different Background Language Songs on Memory Task Performance
Full-text access may be available. Sign in or learn about subscription options.
pp. 291-294
by
Xuemin Zhang
,
Li Chuchu
,
Zhang Jing
,
Ma Xiyu
Papers
Research of Accuracy and Stability on Computer Timing Control in Behavioral and Cognitive Neuroscience
Full-text access may be available. Sign in or learn about subscription options.
pp. 295-299
by
Xuemin Zhang
,
Xueming Lu
,
Yunfeng Zhang
,
Pan Lian
Papers
Application and Effectiveness of a Multimedia and Network Technology in Engineering Thermodynamics Bilingual Education
Full-text access may be available. Sign in or learn about subscription options.
pp. 300-303
by
Zhihong Tang
,
Qiang Li
,
Feng Cheng
,
Xiaojuan Liang
Papers
Research on Spatial Location Unit Distribution Model in Pervasive Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 311-314
by
Hai-Cheng Li
Papers
A Game-Theoretic Data Assignment Scheme for P2PVoD System
Full-text access may be available. Sign in or learn about subscription options.
pp. 315-318
by
Fang Xia
,
Xingwei Liu
,
Huaping Liu
Papers
A Novel Multi-Touch Human-Computer-Interface Based on Binocular Stereo Vision
Full-text access may be available. Sign in or learn about subscription options.
pp. 319-323
by
Xing Jian-guo
,
Wang Wen-long
,
Zhao Wen-min
,
Huang Jing
Papers
Research of a Class of Security Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 324-326
by
Jiemin Zhao
Papers
Phenomenons and Methods: Uncertainty in Internal Symmetry Nets with Backpropagation in Image Processing
Full-text access may be available. Sign in or learn about subscription options.
pp. 327-330
by
Guanzhong Li
Papers
A Novel Wheeze Detection Method for Wearable Monitoring Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 331-334
by
Jianmin Zhang
,
Wee Ser
,
Jufeng Yu
,
T.T. Zhang
Papers
Network Monitoring Based on Community Structure Change
Full-text access may be available. Sign in or learn about subscription options.
pp. 337-340
by
Cai Jun
,
Yu Shun-zheng
Papers
Method for Security Enhancement of Cognitive Radio Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 341-344
by
Wang Lina
,
Wang Yijiang
Semantic Based Resource Retrieval Algorithm for Networked Manufacturing
Full-text access may be available. Sign in or learn about subscription options.
pp. 408-413
by
Zheng-cheng Wang
,
Li Xiao Peng
Papers
Similarity Degree-Based Mobility Pattern Aware Routing in DTNs
Full-text access may be available. Sign in or learn about subscription options.
pp. 345-348
by
Lei Yin
,
Yuanda Cao
,
Wei He
Papers
General-purpose Identity Hiding Schemes for Ad-hoc Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 349-352
by
Shushan Zhao
,
Akshai Aggarwal
Papers
Multi-agent Coordination Based on Contract Net Protocol
Full-text access may be available. Sign in or learn about subscription options.
pp. 353-357
by
Defu Sun
,
Juhua Wu
Papers
Improved Algorithm of Unstructured P2P Network Topology Structure
Full-text access may be available. Sign in or learn about subscription options.
pp. 358-361
by
Zong Hu
Papers
A Smart Card Remote Authenticated Key Agreement Protocol for Multi-servers Using Pairings
Full-text access may be available. Sign in or learn about subscription options.
pp. 362-365
by
Xi Li
,
Hanping Hu
,
Wei Zhu
,
Mingxing He
Papers
State of the Art in Cross-Layer Design for Cognitive Radio Wireless Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 366-369
by
Yanbing Liu
,
Qin Zhou
Papers
Performance Analysis of Short Message Service
Full-text access may be available. Sign in or learn about subscription options.
pp. 370-373
by
Liu Pu
Papers
Design of Wireless Communication Protocol for Home LAN
Full-text access may be available. Sign in or learn about subscription options.
pp. 374-377
by
Liu Pu
Papers
On the Global Asymptotic Stability Problem of a Class of Wireless Communication Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 378-380
by
Jiemin Zhao
Papers
Performance Analysis and Evaluation of Handover in Mobile IPv6
Full-text access may be available. Sign in or learn about subscription options.
pp. 381-384
by
Xinyi Wu
,
Gang Nie
Papers
Discuss of User Identification Technology in DSL Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 385-388
by
Zeng Xiyang
,
Cheng Chuanqing
Showing 100 out of 149
Load More
Load All