Artificial Intelligence and Computational Intelligence

Third International Conference, AICI 2011, Taiyuan, China, September 24-25, 2011, Proceedings, Part II

Editors:

ISBN: 978-3-642-23886-4 (Print) 978-3-642-23887-1 (Online)

Table of contents (89 chapters)

previous Page of 5
  1. Front Matter

    Pages -

  2. Heuristic Searching Methods

    1. No Access

      Book Chapter

      Pages 1-10

      A Novel Artificial Bee Colony Algorithm Based on Attraction Pheromone for the Multidimensional Knapsack Problems

    2. No Access

      Book Chapter

      Pages 11-18

      Intelligence Optimization in Parameter Identification of the Border Irrigation Model

    3. No Access

      Book Chapter

      Pages 19-25

      A Multi-MetaHeuristic Combined ACS-TSP System

    4. No Access

      Book Chapter

      Pages 26-33

      Indoor Positioning Data Obstacle Avoidance and Visualization Framework Based on A* Algorithm

    5. No Access

      Book Chapter

      Pages 34-41

      Power Mean Based Crossover Rate Adaptive Differential Evolution

  3. Immune Computation

    1. No Access

      Book Chapter

      Pages 42-52

      Multi-objective Path Planning for Space Exploration Robot Based on Chaos Immune Particle Swarm Optimization Algorithm

    2. No Access

      Book Chapter

      Pages 53-60

      A Distributed Surveillance Model for Network Security Inspired by Immunology

    3. No Access

      Book Chapter

      Pages 61-68

      A Fault Model Centered Modeling Framework for Self-healing Computing Systems

    4. No Access

      Book Chapter

      Pages 69-74

      Research of Immune Intrusion Detection Algorithm Based on Semi-supervised Clustering

  4. Information Security

    1. No Access

      Book Chapter

      Pages 75-84

      Robust Digital Image Watermarking in DWT-SVD Domain

    2. No Access

      Book Chapter

      Pages 85-92

      An Algorithm of Task Scheduling in Survivability

    3. No Access

      Book Chapter

      Pages 93-100

      A Generic Construction for Proxy Signature Scheme

    4. No Access

      Book Chapter

      Pages 101-107

      Secure Negotiation Approach for Share-Secret-Key of Kerberos Service

  5. Information Theory

    1. No Access

      Book Chapter

      Pages 108-115

      Pulse Amplitude Modulation Time-Hopping Spread-Spectrum Based on Balance Gold Sequences

    2. No Access

      Book Chapter

      Pages 116-123

      Improving LD-aCELP’s Gain Filter

    3. No Access

      Book Chapter

      Pages 124-129

      Decidability on Dube’s Self-similar Fractals

  6. Intelligent Control

    1. No Access

      Book Chapter

      Pages 130-140

      The Expression of Control Law for Zone Constraints Predictive Control

    2. No Access

      Book Chapter

      Pages 141-148

      Research of Networked Control System Based on Fuzzy Immune PID Controller

    3. No Access

      Book Chapter

      Pages 149-157

      A New Type of Adaptive Neural Network Fuzzy Controller in the Double Inverted Pendulum System

    4. No Access

      Book Chapter

      Pages 158-165

      Adaptive Tracking Control for a Class of Perturbed Nonlinear Time-Delay Systems

previous Page of 5