Paper Title
Page
  | Authors: Shao Hsien Chen, Sen Chieh Su, Po Chun Chang, Shuo Yan Chou, Kong King Shieh
Chapter 2: Industrial Engineering
Abstract:Nickel-base superalloy is a special super heat resistant alloy developed by U.S in 1970s. It is mainly applied to turbine parts as well as...
155
  | Authors: Da Ke Wu, Chun Yan Xie
Chapter 3: Computational Methods for Engineering
Abstract:Leafminer is one of pest of many vegetables, and the damage may cover so much of the leaf that the plant is unable to function, and yields...
163
  | Authors: Yong Li, Jian Ping Yin, En Zhu
Chapter 3: Computational Methods for Engineering
Abstract:Multibiometric fusion is an active research area for many years. Score normalization is to transform the scores from different matchers to a...
168
  | Authors: Szu Lin Su, Yi Wen Su, Ho Nien Shou, Chien Sheng Chen
Chapter 3: Computational Methods for Engineering
Abstract:When there is non-line-of-sight (NLOS) path between the mobile station (MS) and base stations (BSs), it is possible to integrate many kinds...
173
  | Authors: De Xi Zhang, Xiao Yu Li
Chapter 3: Computational Methods for Engineering
Abstract:In this paper we provide an information delay protocol using non-orthogonal quantum states. One person can send the other person some...
178
  | Authors: Tian Gong Pan, Da Yong Li
Chapter 3: Computational Methods for Engineering
Abstract:3D Arnold cat map can be applied in image encryption, and it has more security and better effect. However, its period is fixed. The original...
183
  | Authors: Wen Juan He, Jing Liu, Yuan Yi Hu, Jing Yi Wang
Chapter 3: Computational Methods for Engineering
Abstract:The paper presents an imperceptible and robust digital watermarking algorithm using a combination of the DWT-DCT , which improves the...
188
  | Authors: Guang Song Guo, Yuan Peng Liu
Chapter 3: Computational Methods for Engineering
Abstract:For the problem that interactive genetic algorithms lack a way of measuring uncertainty of comment, a method with grey level for uncertainty...
193
  | Authors: Xiu Ying Yu, Da Ke He
Chapter 3: Computational Methods for Engineering
Abstract:Multi-signcryption can meet the requirement of message signcryption with muti-participant. Since the existing identity-based...
198
  | Authors: Hong Bo Zhang, Yi Jiang
Chapter 3: Computational Methods for Engineering
Abstract:To improve the efficiency of Internet intrusion detection, data mining is adopted in intrusion detection. The paper introduces the concept of...
204
Showing 31 to 40 of 81 Paper Titles