callback( { "result":{ "query":":facetid:toc:\"db/conf/iscid/iscid2009-2.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"73.01" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"138", "@dc":"138", "@oc":"138", "@id":"43408709", "text":":facetid:toc:db/conf/iscid/iscid2009-2.bht" } }, "hits":{ "@total":"138", "@computed":"138", "@sent":"138", "@first":"0", "hit":[{ "@score":"1", "@id":"5174249", "info":{"authors":{"author":[{"@pid":"07/7766","text":"Xingli Bai"},{"@pid":"96/6626","text":"Yuanping Zhang"}]},"title":"The Research on an Improved Fast SVM Classification Algorithm.","venue":"ISCID","pages":"300-303","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/BaiZ09","doi":"10.1109/ISCID.2009.221","ee":"https://doi.org/10.1109/ISCID.2009.221","url":"https://dblp.org/rec/conf/iscid/BaiZ09"}, "url":"URL#5174249" }, { "@score":"1", "@id":"5174250", "info":{"authors":{"author":{"@pid":"08/7761","text":"Xinyuan Cai"}},"title":"Principles of Human-Computer Interaction in Game Design.","venue":"ISCID","pages":"92-95","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/Cai09","doi":"10.1109/ISCID.2009.171","ee":"https://doi.org/10.1109/ISCID.2009.171","url":"https://dblp.org/rec/conf/iscid/Cai09"}, "url":"URL#5174250" }, { "@score":"1", "@id":"5174251", "info":{"authors":{"author":[{"@pid":"79/7762","text":"Limei Cai"},{"@pid":"50/7760","text":"Jiansheng Qian"}]},"title":"A Method for Detecting Miners in Underground Coal Mine Videos.","venue":"ISCID","pages":"127-130","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/CaiQ09","doi":"10.1109/ISCID.2009.180","ee":"https://doi.org/10.1109/ISCID.2009.180","url":"https://dblp.org/rec/conf/iscid/CaiQ09"}, "url":"URL#5174251" }, { "@score":"1", "@id":"5174253", "info":{"authors":{"author":[{"@pid":"54/2780","text":"Zheng Chang"},{"@pid":"18/7761","text":"Guangming Zhu"}]},"title":"Application on Express Delivery of an Immune Genetic Algorithm Based on Machine Learning.","venue":"ISCID","pages":"165-167","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/ChangZ09","doi":"10.1109/ISCID.2009.189","ee":"https://doi.org/10.1109/ISCID.2009.189","url":"https://dblp.org/rec/conf/iscid/ChangZ09"}, "url":"URL#5174253" }, { "@score":"1", "@id":"5174258", "info":{"authors":{"author":[{"@pid":"c/MaoChen-2","text":"Mao Chen 0002"},{"@pid":"03/7766","text":"Guotao Hu"},{"@pid":"36/6789","text":"Chao Yu"},{"@pid":"22/7761","text":"Xicheng Peng"}]},"title":"Design and Development of a Teaching System Based on Super Sketchpad.","venue":"ISCID","pages":"57-59","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/ChenHYP09","doi":"10.1109/ISCID.2009.163","ee":"https://doi.org/10.1109/ISCID.2009.163","url":"https://dblp.org/rec/conf/iscid/ChenHYP09"}, "url":"URL#5174258" }, { "@score":"1", "@id":"5174260", "info":{"authors":{"author":[{"@pid":"72/7763","text":"Jinglian Chen"},{"@pid":"27/1736-4","text":"Wenbin Li 0004"},{"@pid":"46/7765","text":"Lifang Ma"}]},"title":"Effects of Water Bag of Forest Fire Suppression Hand Pump on Body Balance.","venue":"ISCID","pages":"429-432","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/ChenLM09","doi":"10.1109/ISCID.2009.253","ee":"https://doi.org/10.1109/ISCID.2009.253","url":"https://dblp.org/rec/conf/iscid/ChenLM09"}, "url":"URL#5174260" }, { "@score":"1", "@id":"5174263", "info":{"authors":{"author":[{"@pid":"13/1103","text":"Jinyu Chen"},{"@pid":"07/4227","text":"Tong Zhang"}]},"title":"Research and Implementation of Role-Based Access Control Model Based on Partition Number.","venue":"ISCID","pages":"6-9","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/ChenZ09","doi":"10.1109/ISCID.2009.150","ee":"https://doi.org/10.1109/ISCID.2009.150","url":"https://dblp.org/rec/conf/iscid/ChenZ09"}, "url":"URL#5174263" }, { "@score":"1", "@id":"5174265", "info":{"authors":{"author":[{"@pid":"57/7485","text":"Xiaorong Cheng"},{"@pid":"29/5010","text":"Hong Liu"}]},"title":"Personalized Services Research Based on Web Data Mining Technology.","venue":"ISCID","pages":"177-180","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/ChengL09","doi":"10.1109/ISCID.2009.192","ee":"https://doi.org/10.1109/ISCID.2009.192","url":"https://dblp.org/rec/conf/iscid/ChengL09"}, "url":"URL#5174265" }, { "@score":"1", "@id":"5174267", "info":{"authors":{"author":[{"@pid":"81/6824","text":"Wenjin Dai"},{"@pid":"83/7765","text":"Youhui Xie"}]},"title":"Development of DC Spark-over Voltage Measuring Instrument for Gas Discharge Tube with Zooming Input Voltage.","venue":"ISCID","pages":"465-468","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/DaiX09","doi":"10.1109/ISCID.2009.262","ee":"https://doi.org/10.1109/ISCID.2009.262","url":"https://dblp.org/rec/conf/iscid/DaiX09"}, "url":"URL#5174267" }, { "@score":"1", "@id":"5174268", "info":{"authors":{"author":[{"@pid":"35/7764","text":"Yongbin Dai"},{"@pid":"67/4294","text":"Weidong Yang"},{"@pid":"34/7760","text":"Qinghua Liang"},{"@pid":"94/7764","text":"Shaofu Wang"},{"@pid":"73/1844","text":"Ming Zhang"}]},"title":"Generic Model Predictive Control Strategy Based on Integrated Weighted Least Square Support Vector Machines.","venue":"ISCID","pages":"216-220","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/DaiYLWZ09","doi":"10.1109/ISCID.2009.201","ee":"https://doi.org/10.1109/ISCID.2009.201","url":"https://dblp.org/rec/conf/iscid/DaiYLWZ09"}, "url":"URL#5174268" }, { "@score":"1", "@id":"5174271", "info":{"authors":{"author":[{"@pid":"19/3323","text":"Quansheng Dou"},{"@pid":"52/1213","text":"Zhongzhi Shi"},{"@pid":"77/377","text":"Bin Yang"},{"@pid":"71/7764","text":"Zhongyao Liu"}]},"title":"Power Load Forecasting Model Based on Knowledge Discovery for Heilongjiang Province.","venue":"ISCID","pages":"42-45","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/DouSYL09","doi":"10.1109/ISCID.2009.159","ee":"https://doi.org/10.1109/ISCID.2009.159","url":"https://dblp.org/rec/conf/iscid/DouSYL09"}, "url":"URL#5174271" }, { "@score":"1", "@id":"5174272", "info":{"authors":{"author":[{"@pid":"31/7761","text":"Danfeng Du"},{"@pid":"44/5119","text":"Ma Yan"},{"@pid":"32/7762","text":"Xiurong Guo"},{"@pid":"78/7759","text":"Huaimin Lu"}]},"title":"Application of Fuzzy Self-Adapting Kalman Filter in the Control System of an Eradicating Stump Robot.","venue":"ISCID","pages":"364-367","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/DuYGL09","doi":"10.1109/ISCID.2009.237","ee":"https://doi.org/10.1109/ISCID.2009.237","url":"https://dblp.org/rec/conf/iscid/DuYGL09"}, "url":"URL#5174272" }, { "@score":"1", "@id":"5174275", "info":{"authors":{"author":[{"@pid":"03/7763","text":"Mei Duan"},{"@pid":"42/7761","text":"Jinhao Liu"}]},"title":"Track Correlation Algorithm Based on Neural Network.","venue":"ISCID","pages":"181-185","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/DuanL09","doi":"10.1109/ISCID.2009.193","ee":"https://doi.org/10.1109/ISCID.2009.193","url":"https://dblp.org/rec/conf/iscid/DuanL09"}, "url":"URL#5174275" }, { "@score":"1", "@id":"5174280", "info":{"authors":{"author":[{"@pid":"76/5841","text":"Weixin Gao"},{"@pid":"66/7759","text":"Lianmin Sun"},{"@pid":"63/5290","text":"Xiangyang Mu"},{"@pid":"27/104-4","text":"Nan Tang 0004"},{"@pid":"26/2086","text":"Xiaomeng Wu"}]},"title":"X Ray Image Enhancement Technology for Steel Pipe Welding Based on Hopfield Neural Network.","venue":"ISCID","pages":"107-110","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/GaoSMTW09","doi":"10.1109/ISCID.2009.175","ee":"https://doi.org/10.1109/ISCID.2009.175","url":"https://dblp.org/rec/conf/iscid/GaoSMTW09"}, "url":"URL#5174280" }, { "@score":"1", "@id":"5174281", "info":{"authors":{"author":[{"@pid":"43/7762","text":"Yunguang Gao"},{"@pid":"65/7762","text":"Shicheng Wang"},{"@pid":"50/1185","text":"Zhiguo Liu"}]},"title":"Automatic Fault Detection and Diagnosis for Sensor Based on KPCA.","venue":"ISCID","pages":"135-138","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/GaoWL09","doi":"10.1109/ISCID.2009.182","ee":"https://doi.org/10.1109/ISCID.2009.182","url":"https://dblp.org/rec/conf/iscid/GaoWL09"}, "url":"URL#5174281" }, { "@score":"1", "@id":"5174282", "info":{"authors":{"author":[{"@pid":"43/7762","text":"Yunguang Gao"},{"@pid":"65/7762","text":"Shicheng Wang"},{"@pid":"41/7764","text":"Shunbo Liu"}]},"title":"Automatic Clustering Based on GA-FCM for Pattern Recognition.","venue":"ISCID","pages":"146-149","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/GaoWL09a","doi":"10.1109/ISCID.2009.184","ee":"https://doi.org/10.1109/ISCID.2009.184","url":"https://dblp.org/rec/conf/iscid/GaoWL09a"}, "url":"URL#5174282" }, { "@score":"1", "@id":"5174283", "info":{"authors":{"author":[{"@pid":"26/7762","text":"Yinhan Gao"},{"@pid":"33/3881","text":"Jun Xie"},{"@pid":"51/239","text":"Jie Liang"}]},"title":"A Method of Signal Feature Extraction and Sound Quality Evaluation Correlation Analysis.","venue":"ISCID","pages":"258-261","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/GaoXL09","doi":"10.1109/ISCID.2009.211","ee":"https://doi.org/10.1109/ISCID.2009.211","url":"https://dblp.org/rec/conf/iscid/GaoXL09"}, "url":"URL#5174283" }, { "@score":"1", "@id":"5174284", "info":{"authors":{"author":[{"@pid":"26/7762","text":"Yinhan Gao"},{"@pid":"33/3881","text":"Jun Xie"},{"@pid":"86/5008","text":"Mingrui Wei"}]},"title":"Structure Optimization Design of Cantilever Beam in the Piezoresistive Acceleration Sensor Based on Artificial Neural Network.","venue":"ISCID","pages":"254-257","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/GaoXW09","doi":"10.1109/ISCID.2009.210","ee":"https://doi.org/10.1109/ISCID.2009.210","url":"https://dblp.org/rec/conf/iscid/GaoXW09"}, "url":"URL#5174284" }, { "@score":"1", "@id":"5174285", "info":{"authors":{"author":[{"@pid":"84/7760","text":"Yongge Gao"},{"@pid":"95/7763","text":"Yongchen Yang"}]},"title":"The Mechanism Study of Serious Gas Explosion Accident at Coal Face.","venue":"ISCID","pages":"239-241","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/GaoY09","doi":"10.1109/ISCID.2009.206","ee":"https://doi.org/10.1109/ISCID.2009.206","url":"https://dblp.org/rec/conf/iscid/GaoY09"}, "url":"URL#5174285" }, { "@score":"1", "@id":"5174288", "info":{"authors":{"author":{"@pid":"54/4084","text":"Ling Guo"}},"title":"Insurance Credit Evaluation Incorporated Qualitative and Quantitative Information.","venue":"ISCID","pages":"68-72","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/Guo09","doi":"10.1109/ISCID.2009.166","ee":"https://doi.org/10.1109/ISCID.2009.166","url":"https://dblp.org/rec/conf/iscid/Guo09"}, "url":"URL#5174288" }, { "@score":"1", "@id":"5174289", "info":{"authors":{"author":[{"@pid":"92/4275","text":"Yuan Guo"},{"@pid":"60/7760","text":"Weijian Qu"}]},"title":"An Optical Fiber Sensor System of On-line Detecting Roll Wear and Software Imitation.","venue":"ISCID","pages":"103-106","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/GuoQ09","doi":"10.1109/ISCID.2009.174","ee":"https://doi.org/10.1109/ISCID.2009.174","url":"https://dblp.org/rec/conf/iscid/GuoQ09"}, "url":"URL#5174289" }, { "@score":"1", "@id":"5174291", "info":{"authors":{"author":[{"@pid":"69/7765","text":"Xiaobao Han"},{"@pid":"32/662","text":"Zhongsheng Wang"}]},"title":"Convex Polyhedron Construction Based Parameter Estimation for Aero-engine Polynomial Linear Parameter Varying System.","venue":"ISCID","pages":"279-282","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/HanW09","doi":"10.1109/ISCID.2009.216","ee":"https://doi.org/10.1109/ISCID.2009.216","url":"https://dblp.org/rec/conf/iscid/HanW09"}, "url":"URL#5174291" }, { "@score":"1", "@id":"5174292", "info":{"authors":{"author":[{"@pid":"85/7765","text":"Shun Han"},{"@pid":"22/3326","text":"Haiyang Wang"},{"@pid":"82/5713","text":"Li-zhen Cui"}]},"title":"A User Experience-Oriented Service Discovery Method with Clustering Technology.","venue":"ISCID","pages":"64-67","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/HanWC09","doi":"10.1109/ISCID.2009.165","ee":"https://doi.org/10.1109/ISCID.2009.165","url":"https://dblp.org/rec/conf/iscid/HanWC09"}, "url":"URL#5174292" }, { "@score":"1", "@id":"5174293", "info":{"authors":{"author":[{"@pid":"47/7765","text":"Zhidong Han"},{"@pid":"58/5311","text":"Zhiliang Wang"},{"@pid":"17/6716","text":"Zhangyan Xu"}]},"title":"New Algorithm for Computing Tolerance Matrix.","venue":"ISCID","pages":"376-379","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/HanWX09","doi":"10.1109/ISCID.2009.240","ee":"https://doi.org/10.1109/ISCID.2009.240","url":"https://dblp.org/rec/conf/iscid/HanWX09"}, "url":"URL#5174293" }, { "@score":"1", "@id":"5174295", "info":{"authors":{"author":[{"@pid":"68/7759","text":"Xianzhong He"},{"@pid":"70/7759","text":"Yanjie Guo"}]},"title":"The Online Monitoring System in Wet Zinc Metallurgy Leaching Process Based on Fieldbus.","venue":"ISCID","pages":"262-265","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/HeG09","doi":"10.1109/ISCID.2009.212","ee":"https://doi.org/10.1109/ISCID.2009.212","url":"https://dblp.org/rec/conf/iscid/HeG09"}, "url":"URL#5174295" }, { "@score":"1", "@id":"5174296", "info":{"authors":{"author":[{"@pid":"68/7759","text":"Xianzhong He"},{"@pid":"70/7759","text":"Yanjie Guo"}]},"title":"The Monitoring System of Zinc Metallurgy Leaching Process.","venue":"ISCID","pages":"489-492","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/HeG09a","doi":"10.1109/ISCID.2009.268","ee":"https://doi.org/10.1109/ISCID.2009.268","url":"https://dblp.org/rec/conf/iscid/HeG09a"}, "url":"URL#5174296" }, { "@score":"1", "@id":"5174298", "info":{"authors":{"author":[{"@pid":"91/7720","text":"Hongjiang He"},{"@pid":"23/6253","text":"Qingqing Wang"},{"@pid":"42/4661","text":"Mingxing He"}]},"title":"Design of Power Quality Monitoring System Based on DSP.","venue":"ISCID","pages":"345-348","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/HeWH09","doi":"10.1109/ISCID.2009.232","ee":"https://doi.org/10.1109/ISCID.2009.232","url":"https://dblp.org/rec/conf/iscid/HeWH09"}, "url":"URL#5174298" }, { "@score":"1", "@id":"5174299", "info":{"authors":{"author":[{"@pid":"44/7763","text":"Yuemin Hou"},{"@pid":"56/4329","text":"Linhong Ji"}]},"title":"Design Assistant with Neural Networks.","venue":"ISCID","pages":"441-445","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/HouJ09","doi":"10.1109/ISCID.2009.256","ee":"https://doi.org/10.1109/ISCID.2009.256","url":"https://dblp.org/rec/conf/iscid/HouJ09"}, "url":"URL#5174299" }, { "@score":"1", "@id":"5174300", "info":{"authors":{"author":[{"@pid":"95/3286","text":"Hong Hou"},{"@pid":"01/7760","text":"Guifang You"},{"@pid":"56/1795","text":"Qinbao Song"},{"@pid":"08/2279","text":"Kegang Hao"}]},"title":"The Research of Metrics Repository for Business Process Metrics.","venue":"ISCID","pages":"168-171","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/HouYSH09","doi":"10.1109/ISCID.2009.190","ee":"https://doi.org/10.1109/ISCID.2009.190","url":"https://dblp.org/rec/conf/iscid/HouYSH09"}, "url":"URL#5174300" }, { "@score":"1", "@id":"5174305", "info":{"authors":{"author":[{"@pid":"93/3653","text":"Jinghua Huang"},{"@pid":"21/7760","text":"Zhenchong Wang"},{"@pid":"67/7763","text":"Mei Yuan"},{"@pid":"92/7765","text":"Youwen Bao"}]},"title":"Meteorological Data Analyze Base on K-means Algorithm.","venue":"ISCID","pages":"60-63","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/HuangWYB09","doi":"10.1109/ISCID.2009.164","ee":"https://doi.org/10.1109/ISCID.2009.164","url":"https://dblp.org/rec/conf/iscid/HuangWYB09"}, "url":"URL#5174305" }, { "@score":"1", "@id":"5174311", "info":{"authors":{"author":[{"@pid":"96/5501","text":"Tiejun Jiang"},{"@pid":"09/7760","text":"Huaiqiang Zhang"},{"@pid":"90/7764","text":"Jinlu Bian"}]},"title":"An Economic Analysis Method of Weapon System Based on Weighted Feature Selection.","venue":"ISCID","pages":"172-176","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/JiangZB09","doi":"10.1109/ISCID.2009.191","ee":"https://doi.org/10.1109/ISCID.2009.191","url":"https://dblp.org/rec/conf/iscid/JiangZB09"}, "url":"URL#5174311" }, { "@score":"1", "@id":"5174317", "info":{"authors":{"author":[{"@pid":"61/7762","text":"Gang Ke"},{"@pid":"16/2061","text":"Jie Ling"},{"@pid":"74/7765","text":"Yanjun Hao"},{"@pid":"19/7763","text":"Hongqi Liao"},{"@pid":"87/933","text":"Zhaoxia Yang"}]},"title":"Research and Implemention of File Protection System Based on Improved Role-Based Access Control.","venue":"ISCID","pages":"242-245","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/KeLHLY09","doi":"10.1109/ISCID.2009.207","ee":"https://doi.org/10.1109/ISCID.2009.207","url":"https://dblp.org/rec/conf/iscid/KeLHLY09"}, "url":"URL#5174317" }, { "@score":"1", "@id":"5174319", "info":{"authors":{"author":[{"@pid":"33/5448","text":"Jian Li"},{"@pid":"20/7763","text":"Xiuhua Chen"},{"@pid":"59/3767","text":"Hai Wang"}]},"title":"Comparison of Artificial Neural Networks with Response Surface Models in Characterizing the Impact Damage Resistance of Sandwich Airframe Structures.","venue":"ISCID","pages":"210-215","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/LiCW09","doi":"10.1109/ISCID.2009.200","ee":"https://doi.org/10.1109/ISCID.2009.200","url":"https://dblp.org/rec/conf/iscid/LiCW09"}, "url":"URL#5174319" }, { "@score":"1", "@id":"5174324", "info":{"authors":{"author":[{"@pid":"09/7132","text":"Honggang Li"},{"@pid":"28/7762","text":"Hongbiao Li"}]},"title":"The Design of Self-Adjusted Role in the Game.","venue":"ISCID","pages":"421-424","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/LiL09d","doi":"10.1109/ISCID.2009.251","ee":"https://doi.org/10.1109/ISCID.2009.251","url":"https://dblp.org/rec/conf/iscid/LiL09d"}, "url":"URL#5174324" }, { "@score":"1", "@id":"5174327", "info":{"authors":{"author":[{"@pid":"63/1571","text":"Yanling Li"},{"@pid":"76/5341","text":"Anping Liu"},{"@pid":"14/5505","text":"Li Xiao"}]},"title":"Existence and Stability of Periodic Solution for Impulsive Hopfield Neural Networks.","venue":"ISCID","pages":"417-420","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/LiLX09","doi":"10.1109/ISCID.2009.250","ee":"https://doi.org/10.1109/ISCID.2009.250","url":"https://dblp.org/rec/conf/iscid/LiLX09"}, "url":"URL#5174327" }, { "@score":"1", "@id":"5174328", "info":{"authors":{"author":[{"@pid":"90/6996-1","text":"Shaobo Li 0001"},{"@pid":"75/7717","text":"Weijie Pan"},{"@pid":"25/7713","text":"Guanci Yang"},{"@pid":"09/7765","text":"Linna Chen"}]},"title":"Optimization of 3G Wireless Network Using Genetic Programming.","venue":"ISCID","pages":"131-134","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/LiPYC09","doi":"10.1109/ISCID.2009.181","ee":"https://doi.org/10.1109/ISCID.2009.181","url":"https://dblp.org/rec/conf/iscid/LiPYC09"}, "url":"URL#5174328" }, { "@score":"1", "@id":"5174329", "info":{"authors":{"author":[{"@pid":"96/6628","text":"Ran Li"},{"@pid":"30/1826","text":"Min Qu"}]},"title":"Industrial Design: Impetus from .","venue":"ISCID","pages":"387-389","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/LiQ09","doi":"10.1109/ISCID.2009.243","ee":"https://doi.org/10.1109/ISCID.2009.243","url":"https://dblp.org/rec/conf/iscid/LiQ09"}, "url":"URL#5174329" }, { "@score":"1", "@id":"5174330", "info":{"authors":{"author":[{"@pid":"86/7761","text":"Hongting Li"},{"@pid":"52/7763","text":"Songling Sang"},{"@pid":"75/3158","text":"Zhe Wang"},{"@pid":"21/7763","text":"Liezhong Ge"}]},"title":"Effect of the Number of Candidate Characters on the Performance of Chinese Characters Input.","venue":"ISCID","pages":"481-484","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/LiSWG09","doi":"10.1109/ISCID.2009.266","ee":"https://doi.org/10.1109/ISCID.2009.266","url":"https://dblp.org/rec/conf/iscid/LiSWG09"}, "url":"URL#5174330" }, { "@score":"1", "@id":"5174331", "info":{"authors":{"author":[{"@pid":"75/1458","text":"Kun Li"},{"@pid":"04/3253","text":"Lixin Tang"}]},"title":"A Tabu Search Algorithm for the Integrated Truck Scheduling and Storage Allocation in Quay.","venue":"ISCID","pages":"275-278","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/LiT09","doi":"10.1109/ISCID.2009.215","ee":"https://doi.org/10.1109/ISCID.2009.215","url":"https://dblp.org/rec/conf/iscid/LiT09"}, "url":"URL#5174331" }, { "@score":"1", "@id":"5174333", "info":{"authors":{"author":[{"@pid":"96/4282","text":"Rui Li"},{"@pid":"72/7761","text":"Xian-mei Wei"},{"@pid":"62/7764","text":"Xue-wei Yu"}]},"title":"The Improvement of C4.5 Algorithm and Case Study.","venue":"ISCID","pages":"190-192","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/LiWY09","doi":"10.1109/ISCID.2009.195","ee":"https://doi.org/10.1109/ISCID.2009.195","url":"https://dblp.org/rec/conf/iscid/LiWY09"}, "url":"URL#5174333" }, { "@score":"1", "@id":"5174336", "info":{"authors":{"author":[{"@pid":"96/7765","text":"Xue-Bin Li"},{"@pid":"16/7765","text":"Xiao-Ling Yu"}]},"title":"Influence of Learning Rate and Neuron Number on Prediction of Animal Phenotype Value Using Back-Propagation Artificial Neural Network.","venue":"ISCID","pages":"270-274","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/LiY09","doi":"10.1109/ISCID.2009.214","ee":"https://doi.org/10.1109/ISCID.2009.214","url":"https://dblp.org/rec/conf/iscid/LiY09"}, "url":"URL#5174336" }, { "@score":"1", "@id":"5174337", "info":{"authors":{"author":[{"@pid":"14/1395","text":"Liang Li"},{"@pid":"58/7673","text":"Guangming Yu"},{"@pid":"36/7386","text":"Shibao Lu"},{"@pid":"75/7764","text":"Yong Hong"},{"@pid":"12/7673","text":"Xuesong Chu"}]},"title":"Harmony Search Algorithm with Dynamic Adaptation for the Determination of Minimum Factor of Safety of Soil Slopes.","venue":"ISCID","pages":"3-5","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/LiYLHC09","doi":"10.1109/ISCID.2009.149","ee":"https://doi.org/10.1109/ISCID.2009.149","url":"https://dblp.org/rec/conf/iscid/LiYLHC09"}, "url":"URL#5174337" }, { "@score":"1", "@id":"5174339", "info":{"authors":{"author":[{"@pid":"18/6855","text":"Xiaoyu Li"},{"@pid":"67/7761","text":"Dexi Zhang"}]},"title":"Multiparty Information Delay Protocol Using Open-Destination Teleportation.","venue":"ISCID","pages":"115-118","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/LiZ09a","doi":"10.1109/ISCID.2009.177","ee":"https://doi.org/10.1109/ISCID.2009.177","url":"https://dblp.org/rec/conf/iscid/LiZ09a"}, "url":"URL#5174339" }, { "@score":"1", "@id":"5174340", "info":{"authors":{"author":[{"@pid":"40/7761","text":"Xingdong Li"},{"@pid":"43/7760","text":"Xingqiang Zhao"}]},"title":"Study on Checking Hidden Danger Information Flow of Coal Mining.","venue":"ISCID","pages":"372-375","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/LiZ09b","doi":"10.1109/ISCID.2009.239","ee":"https://doi.org/10.1109/ISCID.2009.239","url":"https://dblp.org/rec/conf/iscid/LiZ09b"}, "url":"URL#5174340" }, { "@score":"1", "@id":"5174342", "info":{"authors":{"author":[{"@pid":"60/7762","text":"Huiping Liang"},{"@pid":"53/7765","text":"Rongbing Mu"}]},"title":"Research on the Teaching of Design Course Based on Computer Network Platform.","venue":"ISCID","pages":"349-351","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/LiangM09","doi":"10.1109/ISCID.2009.233","ee":"https://doi.org/10.1109/ISCID.2009.233","url":"https://dblp.org/rec/conf/iscid/LiangM09"}, "url":"URL#5174342" }, { "@score":"1", "@id":"5174343", "info":{"authors":{"author":[{"@pid":"50/6759","text":"Liang Zhang"},{"@pid":"76/1584","text":"Xin Zhang"},{"@pid":"98/1774","text":"Yi Tian"},{"@pid":"229/8706","text":"Xinn Zhang"}]},"title":"Intelligent Energy Management Based on the Driving Cycle Sensitivity Identification Using SVM.","venue":"ISCID","pages":"513-516","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/LiangXYX09","doi":"10.1109/ISCID.2009.274","ee":"https://doi.org/10.1109/ISCID.2009.274","url":"https://dblp.org/rec/conf/iscid/LiangXYX09"}, "url":"URL#5174343" }, { "@score":"1", "@id":"5174344", "info":{"authors":{"author":[{"@pid":"156/9281","text":"Ligen Yao"},{"@pid":"81/8614","text":"Cairong Zhao"}]},"title":"The Study on Fuzzy Comprehensive Evaluation Model of Enterprise's Core Competence Based on BSC.","venue":"ISCID","pages":"457-460","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/LigenC09","doi":"10.1109/ISCID.2009.260","ee":"https://doi.org/10.1109/ISCID.2009.260","url":"https://dblp.org/rec/conf/iscid/LigenC09"}, "url":"URL#5174344" }, { "@score":"1", "@id":"5174347", "info":{"authors":{"author":{"@pid":"75/1219","text":"Hongwu Liu"}},"title":"A QPSO Based Multiuser Detection for Antenna-Diversity-Aided MC-CDMA Systems.","venue":"ISCID","pages":"477-480","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/Liu09a","doi":"10.1109/ISCID.2009.265","ee":"https://doi.org/10.1109/ISCID.2009.265","url":"https://dblp.org/rec/conf/iscid/Liu09a"}, "url":"URL#5174347" }, { "@score":"1", "@id":"5174350", "info":{"authors":{"author":[{"@pid":"42/7761","text":"Jinhao Liu"},{"@pid":"87/7763","text":"Qingqing Huang"},{"@pid":"76/7765","text":"Jiangming Kan"},{"@pid":"75/7762","text":"Jingyan Xue"},{"@pid":"93/7763","text":"Yinan He"},{"@pid":"16/6344","text":"Bo Pang"}]},"title":"Height Servo System for Straw-Checkerboard Sand Barriers Paving Robot.","venue":"ISCID","pages":"338-340","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/LiuHKXHP09","doi":"10.1109/ISCID.2009.230","ee":"https://doi.org/10.1109/ISCID.2009.230","url":"https://dblp.org/rec/conf/iscid/LiuHKXHP09"}, "url":"URL#5174350" }, { "@score":"1", "@id":"5174354", "info":{"authors":{"author":[{"@pid":"72/2590","text":"Jing Liu"},{"@pid":"76/5341","text":"Anping Liu"},{"@pid":"73/7762","text":"Qingxia Ma"}]},"title":"Existence and Uniqueness of Solution for Impulsive Cellular Neural Networks.","venue":"ISCID","pages":"413-416","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/LiuLM09","doi":"10.1109/ISCID.2009.249","ee":"https://doi.org/10.1109/ISCID.2009.249","url":"https://dblp.org/rec/conf/iscid/LiuLM09"}, "url":"URL#5174354" }, { "@score":"1", "@id":"5174357", "info":{"authors":{"author":[{"@pid":"33/7760","text":"Hongli Liu"},{"@pid":"95/1799","text":"Feng Qiu"},{"@pid":"94/6774","text":"Linlin Wang"},{"@pid":"74/7759","text":"Haipeng Shi"}]},"title":"The Implementation of the Virtual Tourism Teaching System.","venue":"ISCID","pages":"225-228","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/LiuQWS09","doi":"10.1109/ISCID.2009.203","ee":"https://doi.org/10.1109/ISCID.2009.203","url":"https://dblp.org/rec/conf/iscid/LiuQWS09"}, "url":"URL#5174357" }, { "@score":"1", "@id":"5174358", "info":{"authors":{"author":[{"@pid":"22/7765","text":"ChunNian Liu"},{"@pid":"55/1960","text":"Hua Xiao"}]},"title":"A Study on Semantic Grid Information Services Oriented Regional Library Consortia.","venue":"ISCID","pages":"505-508","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/LiuX09","doi":"10.1109/ISCID.2009.272","ee":"https://doi.org/10.1109/ISCID.2009.272","url":"https://dblp.org/rec/conf/iscid/LiuX09"}, "url":"URL#5174358" }, { "@score":"1", "@id":"5174359", "info":{"authors":{"author":[{"@pid":"12/7761","text":"Shuangyin Liu"},{"@pid":"51/7762","text":"Longqin Xu"}]},"title":"Study on Key Technology of Subtropical Characterized Agricultural Intelligent Service System.","venue":"ISCID","pages":"561-565","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/LiuX09a","doi":"10.1109/ISCID.2009.286","ee":"https://doi.org/10.1109/ISCID.2009.286","url":"https://dblp.org/rec/conf/iscid/LiuX09a"}, "url":"URL#5174359" }, { "@score":"1", "@id":"5174360", "info":{"authors":{"author":[{"@pid":"29/5010","text":"Hong Liu"},{"@pid":"35/3","text":"Gengui Zhou"}]},"title":"Minimum Spanning Tree Problem Research Based on Genetic Algorithm.","venue":"ISCID","pages":"197-201","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/LiuZ09","doi":"10.1109/ISCID.2009.197","ee":"https://doi.org/10.1109/ISCID.2009.197","url":"https://dblp.org/rec/conf/iscid/LiuZ09"}, "url":"URL#5174360" }, { "@score":"1", "@id":"5174367", "info":{"authors":{"author":[{"@pid":"99/1234","text":"Yang Mei"},{"@pid":"50/7764","text":"Jia Lebin"}]},"title":"Study on Kansei Engineering and its Application to Product Design.","venue":"ISCID","pages":"525-528","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/MeiL09","doi":"10.1109/ISCID.2009.277","ee":"https://doi.org/10.1109/ISCID.2009.277","url":"https://dblp.org/rec/conf/iscid/MeiL09"}, "url":"URL#5174367" }, { "@score":"1", "@id":"5174370", "info":{"authors":{"author":[{"@pid":"35/7761","text":"Feng Ni"},{"@pid":"47/7763","text":"Ming-Zhe Wang"},{"@pid":"63/7764","text":"Jing-Jing Liao"},{"@pid":"87/7762","text":"Jing-Dan Zhou"}]},"title":"Enhancing DoDAF with a HCPN Executable Model to Support Validation.","venue":"ISCID","pages":"283-287","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/NiWLZ09","doi":"10.1109/ISCID.2009.217","ee":"https://doi.org/10.1109/ISCID.2009.217","url":"https://dblp.org/rec/conf/iscid/NiWLZ09"}, "url":"URL#5174370" }, { "@score":"1", "@id":"5174371", "info":{"authors":{"author":[{"@pid":"20/6682","text":"Jin Nie"},{"@pid":"72/5749","text":"Lei Zhou"},{"@pid":"68/363","text":"Chuan Wang"}]},"title":"RFID and E-commerce Privacy Protection.","venue":"ISCID","pages":"111-114","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/NieZW09","doi":"10.1109/ISCID.2009.176","ee":"https://doi.org/10.1109/ISCID.2009.176","url":"https://dblp.org/rec/conf/iscid/NieZW09"}, "url":"URL#5174371" }, { "@score":"1", "@id":"5174380", "info":{"authors":{"author":[{"@pid":"58/5942","text":"Zhiyi Qu"},{"@pid":"33/2321","text":"Yanmin Liu"},{"@pid":"91/112","text":"Ying Liu"},{"@pid":"68/7761","text":"Kang Jiu"},{"@pid":"67/6351","text":"Yong Chen"}]},"title":"A Porn Video Detecting Method Based on Motion Features Using HMM.","venue":"ISCID","pages":"461-464","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/QuLLJC09","doi":"10.1109/ISCID.2009.261","ee":"https://doi.org/10.1109/ISCID.2009.261","url":"https://dblp.org/rec/conf/iscid/QuLLJC09"}, "url":"URL#5174380" }, { "@score":"1", "@id":"5174385", "info":{"authors":{"author":[{"@pid":"83/7764","text":"Huang Qun"},{"@pid":"15/7764","text":"Zhang Nana"}]},"title":"Product Creative Design of Home Bathroom under the Guidance of the Idea of Universal Design.","venue":"ISCID","pages":"100-102","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/QunN09","doi":"10.1109/ISCID.2009.173","ee":"https://doi.org/10.1109/ISCID.2009.173","url":"https://dblp.org/rec/conf/iscid/QunN09"}, "url":"URL#5174385" }, { "@score":"1", "@id":"5174386", "info":{"authors":{"author":[{"@pid":"68/7762","text":"Shijie Ren"},{"@pid":"54/3643","text":"Xin Su"}]},"title":"A Wavelet-Tree-Based Watermarking Method Using Fast ICA.","venue":"ISCID","pages":"162-164","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/RenS09","doi":"10.1109/ISCID.2009.188","ee":"https://doi.org/10.1109/ISCID.2009.188","url":"https://dblp.org/rec/conf/iscid/RenS09"}, "url":"URL#5174386" }, { "@score":"1", "@id":"5174387", "info":{"authors":{"author":[{"@pid":"05/7628","text":"Enzhong Shan"},{"@pid":"79/292-1","text":"Bin Dai 0001"},{"@pid":"35/2811","text":"Jinze Song"},{"@pid":"96/7762","text":"Zhenping Sun"}]},"title":"A Dynamic RRT Path Planning Algorithm Based on B-Spline.","venue":"ISCID","pages":"25-29","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/ShanDSS09","doi":"10.1109/ISCID.2009.155","ee":"https://doi.org/10.1109/ISCID.2009.155","url":"https://dblp.org/rec/conf/iscid/ShanDSS09"}, "url":"URL#5174387" }, { "@score":"1", "@id":"5174388", "info":{"authors":{"author":[{"@pid":"25/7761","text":"Zongkai Shao"},{"@pid":"23/7763","text":"Yuedong Zhan"}]},"title":"Adaptive Fuzzy Sliding Mode Control for Brushless Doubly Fed Machine.","venue":"ISCID","pages":"73-77","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/ShaoZ09","doi":"10.1109/ISCID.2009.167","ee":"https://doi.org/10.1109/ISCID.2009.167","url":"https://dblp.org/rec/conf/iscid/ShaoZ09"}, "url":"URL#5174388" }, { "@score":"1", "@id":"5174392", "info":{"authors":{"author":[{"@pid":"38/7765","text":"Xinyu Shen"},{"@pid":"29/7201","text":"Limin Meng"},{"@pid":"25/7019","text":"Yifan Wu"},{"@pid":"82/1512-2","text":"Kai Zhou 0002"},{"@pid":"11/5325","text":"Yuhua Zhang"}]},"title":"Research on Energy-Aware Routing Protocol Based on Min Cost Max Flow Algorithm for Mobile Ad Hoc Networks.","venue":"ISCID","pages":"30-33","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/ShenMWZZ09","doi":"10.1109/ISCID.2009.156","ee":"https://doi.org/10.1109/ISCID.2009.156","url":"https://dblp.org/rec/conf/iscid/ShenMWZZ09"}, "url":"URL#5174392" }, { "@score":"1", "@id":"5174393", "info":{"authors":{"author":[{"@pid":"16/7760","text":"Jinrong Shen"},{"@pid":"38/7763","text":"Jiacai Song"}]},"title":"Design of Low Power Intelligent Compound Switch for Reactive Power Compensation Based on Single-chip ATMEGA16L.","venue":"ISCID","pages":"123-126","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/ShenS09","doi":"10.1109/ISCID.2009.179","ee":"https://doi.org/10.1109/ISCID.2009.179","url":"https://dblp.org/rec/conf/iscid/ShenS09"}, "url":"URL#5174393" }, { "@score":"1", "@id":"5174395", "info":{"authors":{"author":[{"@pid":"18/2294","text":"Fengxi Song"},{"@pid":"z/DavidZhang","text":"David Zhang 0001"}]},"title":"The Negative Effects of Whitening Transformation in Face Recognition.","venue":"ISCID","pages":"437-440","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/SongZ09","doi":"10.1109/ISCID.2009.255","ee":"https://doi.org/10.1109/ISCID.2009.255","url":"https://dblp.org/rec/conf/iscid/SongZ09"}, "url":"URL#5174395" }, { "@score":"1", "@id":"5174396", "info":{"authors":{"author":[{"@pid":"18/2294","text":"Fengxi Song"},{"@pid":"32/7763","text":"Rubin Zheng"}]},"title":"Uncorrelated Discriminant Vectors vs. Orthogonal Discriminant Vectors in Appearance-Based Face Recognition.","venue":"ISCID","pages":"446-449","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/SongZ09a","doi":"10.1109/ISCID.2009.257","ee":"https://doi.org/10.1109/ISCID.2009.257","url":"https://dblp.org/rec/conf/iscid/SongZ09a"}, "url":"URL#5174396" }, { "@score":"1", "@id":"5174398", "info":{"authors":{"author":[{"@pid":"94/7759","text":"Jin-guang Sun"},{"@pid":"20/6417","text":"Wei He"}]},"title":"RST Invarian Watermarking Scheme Based on SIFT Feature and Pseudo-Zernike Moment.","venue":"ISCID","pages":"10-13","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/SunH09","doi":"10.1109/ISCID.2009.151","ee":"https://doi.org/10.1109/ISCID.2009.151","url":"https://dblp.org/rec/conf/iscid/SunH09"}, "url":"URL#5174398" }, { "@score":"1", "@id":"5174400", "info":{"authors":{"author":[{"@pid":"23/7764","text":"Xiaoyu Sun"},{"@pid":"83/6597","text":"Yongchuan Tang"}]},"title":"Automatic Music Emotion Classification Using a New Classification Algorithm.","venue":"ISCID","pages":"540-542","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/SunT09","doi":"10.1109/ISCID.2009.281","ee":"https://doi.org/10.1109/ISCID.2009.281","url":"https://dblp.org/rec/conf/iscid/SunT09"}, "url":"URL#5174400" }, { "@score":"1", "@id":"5174408", "info":{"authors":{"author":{"@pid":"78/2022","text":"Kai Wang"}},"title":"Research of the Affective Responses to Product's Texture Based on the Kansei Evaluation.","venue":"ISCID","pages":"352-355","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/Wang09b","doi":"10.1109/ISCID.2009.234","ee":"https://doi.org/10.1109/ISCID.2009.234","url":"https://dblp.org/rec/conf/iscid/Wang09b"}, "url":"URL#5174408" }, { "@score":"1", "@id":"5174409", "info":{"authors":{"author":{"@pid":"72/6811","text":"Bo Wang"}},"title":"Error Resilience Techniques for Wireless Video Transmission.","venue":"ISCID","pages":"485-488","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/Wang09c","doi":"10.1109/ISCID.2009.267","ee":"https://doi.org/10.1109/ISCID.2009.267","url":"https://dblp.org/rec/conf/iscid/Wang09c"}, "url":"URL#5174409" }, { "@score":"1", "@id":"5174411", "info":{"authors":{"author":[{"@pid":"36/5588","text":"Yanming Wang"},{"@pid":"00/7764","text":"Yuanping Cheng"},{"@pid":"98/7765","text":"Jingwei Ji"},{"@pid":"34/7763","text":"Guoqing Zhu"}]},"title":"Estimation of Absorption Coefficients for One-Dimensional Non-uniform Medium Using Particle Swarm Optimization.","venue":"ISCID","pages":"469-472","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/WangCJZ09","doi":"10.1109/ISCID.2009.263","ee":"https://doi.org/10.1109/ISCID.2009.263","url":"https://dblp.org/rec/conf/iscid/WangCJZ09"}, "url":"URL#5174411" }, { "@score":"1", "@id":"5174412", "info":{"authors":{"author":[{"@pid":"93/4144","text":"Jinggang Wang"},{"@pid":"64/7714","text":"Meixia Du"},{"@pid":"20/7715","text":"Xiaoxia Gao"},{"@pid":"97/4765","text":"Jin Zhao"},{"@pid":"78/7712","text":"Zhenjiang Yin"},{"@pid":"20/6165","text":"Yi Man"}]},"title":"The Feasibility Analysis of a New Air-Conditioning System.","venue":"ISCID","pages":"14-16","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/WangDGZYM09","doi":"10.1109/ISCID.2009.152","ee":"https://doi.org/10.1109/ISCID.2009.152","url":"https://dblp.org/rec/conf/iscid/WangDGZYM09"}, "url":"URL#5174412" }, { "@score":"1", "@id":"5174416", "info":{"authors":{"author":[{"@pid":"62/1463","text":"Xu-Yang Wang"},{"@pid":"181/2821","text":"Ming Li"}]},"title":"Modeling of One-Campus-ID System Based on UML.","venue":"ISCID","pages":"17-20","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/WangL09a","doi":"10.1109/ISCID.2009.153","ee":"https://doi.org/10.1109/ISCID.2009.153","url":"https://dblp.org/rec/conf/iscid/WangL09a"}, "url":"URL#5174416" }, { "@score":"1", "@id":"5174418", "info":{"authors":{"author":[{"@pid":"82/7634","text":"Hairui Wang"},{"@pid":"51/4056","text":"Ya Li"},{"@pid":"67/950","text":"Xinjie Li"}]},"title":"A Mobile Agent Based General Model for Web Testing.","venue":"ISCID","pages":"158-161","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/WangLL09","doi":"10.1109/ISCID.2009.187","ee":"https://doi.org/10.1109/ISCID.2009.187","url":"https://dblp.org/rec/conf/iscid/WangLL09"}, "url":"URL#5174418" }, { "@score":"1", "@id":"5174419", "info":{"authors":{"author":[{"@pid":"06/2293","text":"Rui Wang"},{"@pid":"01/5401","text":"Bin Sun"}]},"title":"Design of Flexible Scheduling System Based on an Improved Genetic Algorithm.","venue":"ISCID","pages":"312-315","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/WangS09","doi":"10.1109/ISCID.2009.224","ee":"https://doi.org/10.1109/ISCID.2009.224","url":"https://dblp.org/rec/conf/iscid/WangS09"}, "url":"URL#5174419" }, { "@score":"1", "@id":"5174420", "info":{"authors":{"author":[{"@pid":"78/6727","text":"Zhen Wang"},{"@pid":"83/784-2","text":"Zhiqiang Wei 0002"}]},"title":"A Comparative Study of Feature Selection for SVM in Video Text Detection.","venue":"ISCID","pages":"552-556","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/WangW09","doi":"10.1109/ISCID.2009.284","ee":"https://doi.org/10.1109/ISCID.2009.284","url":"https://dblp.org/rec/conf/iscid/WangW09"}, "url":"URL#5174420" }, { "@score":"1", "@id":"5174421", "info":{"authors":{"author":[{"@pid":"07/7765","text":"Guo Wang"},{"@pid":"03/7764","text":"Songlin Yang"},{"@pid":"27/7017","text":"Peng Chen"}]},"title":"The Analysis of Intelligent Water-Jet Propulsion System Optimization on Self-Service Gliding-Hydrofoil Craft.","venue":"ISCID","pages":"250-253","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/WangYC09","doi":"10.1109/ISCID.2009.209","ee":"https://doi.org/10.1109/ISCID.2009.209","url":"https://dblp.org/rec/conf/iscid/WangYC09"}, "url":"URL#5174421" }, { "@score":"1", "@id":"5174424", "info":{"authors":{"author":[{"@pid":"125/8189","text":"Jun Wang"},{"@pid":"80/2266","text":"Jia Zhang"},{"@pid":"99/7763","text":"Huang-Chang Xu"}]},"title":"Local Prediction of Complex Time Series Based on Support Vector Machine and Differential Evolution Algorithm.","venue":"ISCID","pages":"425-428","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/WangZX09","doi":"10.1109/ISCID.2009.252","ee":"https://doi.org/10.1109/ISCID.2009.252","url":"https://dblp.org/rec/conf/iscid/WangZX09"}, "url":"URL#5174424" }, { "@score":"1", "@id":"5174425", "info":{"authors":{"author":[{"@pid":"08/42","text":"Qiming Wang"},{"@pid":"09/1447","text":"Tianxiang Zhou"},{"@pid":"89/6043","text":"Weiyuan Zhang"}]},"title":"Study Apparel Made to Measure Based on 3D Body Scanner.","venue":"ISCID","pages":"493-496","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/WangZZ09","doi":"10.1109/ISCID.2009.269","ee":"https://doi.org/10.1109/ISCID.2009.269","url":"https://dblp.org/rec/conf/iscid/WangZZ09"}, "url":"URL#5174425" }, { "@score":"1", "@id":"5174426", "info":{"authors":{"author":[{"@pid":"86/7759","text":"Shichuan Wei"},{"@pid":"33/7765","text":"Shaolei Zhao"},{"@pid":"35/295","text":"Jian Liu"}]},"title":"Behavior Decision-Making Model by Petri Net for Submarine Torpedo Attack.","venue":"ISCID","pages":"78-81","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/WeiZL09","doi":"10.1109/ISCID.2009.168","ee":"https://doi.org/10.1109/ISCID.2009.168","url":"https://dblp.org/rec/conf/iscid/WeiZL09"}, "url":"URL#5174426" }, { "@score":"1", "@id":"5174429", "info":{"authors":{"author":[{"@pid":"49/6925","text":"Zhi-jun Wu"},{"@pid":"78/7760","text":"Liangzhi Li 0003"},{"@pid":"05/7760","text":"Cheng-ai Na"}]},"title":"Scenario-Based User's Needs Discovery for Creative Product Design.","venue":"ISCID","pages":"368-371","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/WuLN09","doi":"10.1109/ISCID.2009.238","ee":"https://doi.org/10.1109/ISCID.2009.238","url":"https://dblp.org/rec/conf/iscid/WuLN09"}, "url":"URL#5174429" }, { "@score":"1", "@id":"5174431", "info":{"authors":{"author":[{"@pid":"16/0","text":"Min Wu"},{"@pid":"76/6392","text":"Li Tao"}]},"title":"The Analysis of Green Design's Ethical Philosophy.","venue":"ISCID","pages":"119-122","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/WuT09","doi":"10.1109/ISCID.2009.178","ee":"https://doi.org/10.1109/ISCID.2009.178","url":"https://dblp.org/rec/conf/iscid/WuT09"}, "url":"URL#5174431" }, { "@score":"1", "@id":"5174433", "info":{"authors":{"author":[{"@pid":"42/7762","text":"Weibing Xiao"},{"@pid":"72/4243","text":"Shunqi Mei"}]},"title":"Study on Information Management System of Rapier Loom.","venue":"ISCID","pages":"150-152","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/XiaoM09","doi":"10.1109/ISCID.2009.185","ee":"https://doi.org/10.1109/ISCID.2009.185","url":"https://dblp.org/rec/conf/iscid/XiaoM09"}, "url":"URL#5174433" }, { "@score":"1", "@id":"5174434", "info":{"authors":{"author":[{"@pid":"51/6470","text":"Ying Xie"},{"@pid":"64/1676","text":"Wanli Zuo"},{"@pid":"84/3377","text":"Fengling He"},{"@pid":"94/3104-9","text":"Ying Wang 0009"}]},"title":"Automatic Deep Web Query Results Extraction Based on Tag Trees.","venue":"ISCID","pages":"308-311","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/XieZHW09","doi":"10.1109/ISCID.2009.223","ee":"https://doi.org/10.1109/ISCID.2009.223","url":"https://dblp.org/rec/conf/iscid/XieZHW09"}, "url":"URL#5174434" }, { "@score":"1", "@id":"5174435", "info":{"authors":{"author":[{"@pid":"39/3530-4","text":"Li Xiong 0004"},{"@pid":"61/1303","text":"Hengqing Tong"}]},"title":"Customer Satisfaction Index Assessment Based on Cloud Computing.","venue":"ISCID","pages":"330-333","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/XiongT09","doi":"10.1109/ISCID.2009.228","ee":"https://doi.org/10.1109/ISCID.2009.228","url":"https://dblp.org/rec/conf/iscid/XiongT09"}, "url":"URL#5174435" }, { "@score":"1", "@id":"5174438", "info":{"authors":{"author":{"@pid":"54/1474","text":"Chen Xu"}},"title":"Expression of Design Implication for the Products in the Digital Environment.","venue":"ISCID","pages":"153-157","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/Xu09","doi":"10.1109/ISCID.2009.186","ee":"https://doi.org/10.1109/ISCID.2009.186","url":"https://dblp.org/rec/conf/iscid/Xu09"}, "url":"URL#5174438" }, { "@score":"1", "@id":"5174440", "info":{"authors":{"author":[{"@pid":"40/7760","text":"Yanke Xu"},{"@pid":"60/7764","text":"Yumeng Han"}]},"title":"A Study on an Improved Guidance Law Which is Insensitive to the Time-to-Go Estimation Error.","venue":"ISCID","pages":"246-249","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/XuH09","doi":"10.1109/ISCID.2009.208","ee":"https://doi.org/10.1109/ISCID.2009.208","url":"https://dblp.org/rec/conf/iscid/XuH09"}, "url":"URL#5174440" }, { "@score":"1", "@id":"5174441", "info":{"authors":{"author":[{"@pid":"63/1534","text":"Xu Yang"},{"@pid":"30/7765","text":"Hiroyuki Kumehara"}]},"title":"Radial Basis Function Network Based Monitoring of Tool Wear States.","venue":"ISCID","pages":"521-524","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/XuK09","doi":"10.1109/ISCID.2009.276","ee":"https://doi.org/10.1109/ISCID.2009.276","url":"https://dblp.org/rec/conf/iscid/XuK09"}, "url":"URL#5174441" }, { "@score":"1", "@id":"5174444", "info":{"authors":{"author":[{"@pid":"64/4216","text":"Xiao Xu"},{"@pid":"21/1509-1","text":"Hailong Sun 0001"},{"@pid":"40/1491","text":"Xiang Li"},{"@pid":"72/4184","text":"Chao Zhou"}]},"title":"A Basing on Model-Driven Framework of Service-Oriented Software Production Line.","venue":"ISCID","pages":"139-145","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/XuSLZ09","doi":"10.1109/ISCID.2009.183","ee":"https://doi.org/10.1109/ISCID.2009.183","url":"https://dblp.org/rec/conf/iscid/XuSLZ09"}, "url":"URL#5174444" }, { "@score":"1", "@id":"5174447", "info":{"authors":{"author":[{"@pid":"17/6716","text":"Zhangyan Xu"},{"@pid":"52/5115","text":"Wenhao Shu"},{"@pid":"46/999","text":"Bo Yang"}]},"title":"New Algorithm for Computing the Core Based on Information Entropy.","venue":"ISCID","pages":"383-386","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/XuSY09","doi":"10.1109/ISCID.2009.242","ee":"https://doi.org/10.1109/ISCID.2009.242","url":"https://dblp.org/rec/conf/iscid/XuSY09"}, "url":"URL#5174447" }, { "@score":"1", "@id":"5174449", "info":{"authors":{"author":[{"@pid":"99/88","text":"Yufa Xu"},{"@pid":"19/7765","text":"Ziyang Zuo"},{"@pid":"21/4350","text":"Guochu Chen"}]},"title":"Application of Information Entropy Based on Random Set Theory to the Fault Diagnosis of Wind Turbine Generating Units.","venue":"ISCID","pages":"46-48","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/XuZC09","doi":"10.1109/ISCID.2009.160","ee":"https://doi.org/10.1109/ISCID.2009.160","url":"https://dblp.org/rec/conf/iscid/XuZC09"}, "url":"URL#5174449" }, { "@score":"1", "@id":"5174450", "info":{"authors":{"author":[{"@pid":"93/10082","text":"Zhengyu Xue"},{"@pid":"33/7763","text":"YinHai Fan"},{"@pid":"61/7759","text":"MingBao Jiang"},{"@pid":"64/4731","text":"Lixin Shen"}]},"title":"A Detection Method for Bearing Faults of Marine Motors Based on Data Mining Algorithm.","venue":"ISCID","pages":"34-37","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/XueFJS09","doi":"10.1109/ISCID.2009.157","ee":"https://doi.org/10.1109/ISCID.2009.157","url":"https://dblp.org/rec/conf/iscid/XueFJS09"}, "url":"URL#5174450" }, { "@score":"1", "@id":"5174452", "info":{"authors":{"author":[{"@pid":"92/1942","text":"Rui Yang"},{"@pid":"22/4111","text":"Hong Cai"},{"@pid":"73/1844","text":"Ming Zhang"}]},"title":"Research and Design of Short Message Service System Based on ARM and GPRS.","venue":"ISCID","pages":"229-232","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/YangCZ09","doi":"10.1109/ISCID.2009.204","ee":"https://doi.org/10.1109/ISCID.2009.204","url":"https://dblp.org/rec/conf/iscid/YangCZ09"}, "url":"URL#5174452" }, { "@score":"1", "@id":"5174453", "info":{"authors":{"author":[{"@pid":"92/1942","text":"Rui Yang"},{"@pid":"22/4111","text":"Hong Cai"},{"@pid":"73/1844","text":"Ming Zhang"}]},"title":"Research and Implement of Ethernet Interface Based on Embedded System.","venue":"ISCID","pages":"288-291","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/YangCZ09a","doi":"10.1109/ISCID.2009.218","ee":"https://doi.org/10.1109/ISCID.2009.218","url":"https://dblp.org/rec/conf/iscid/YangCZ09a"}, "url":"URL#5174453" }, { "@score":"1", "@id":"5174455", "info":{"authors":{"author":[{"@pid":"56/7711","text":"Song-lin Yang"},{"@pid":"04/3001","text":"Yan Wu"},{"@pid":"12/7762","text":"Lian-xiang Ma"},{"@pid":"80/7762","text":"Hong-qin Zhang"},{"@pid":"45/849","text":"Mi Li"}]},"title":"Optimization of Synthetical Fundamental Mechanics Properties of the High-Speed Monohull Vessel and its Method.","venue":"ISCID","pages":"304-307","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/YangWMZL09","doi":"10.1109/ISCID.2009.222","ee":"https://doi.org/10.1109/ISCID.2009.222","url":"https://dblp.org/rec/conf/iscid/YangWMZL09"}, "url":"URL#5174455" }, { "@score":"1", "@id":"5174457", "info":{"authors":{"author":[{"@pid":"87/3259","text":"Weiming Yang"},{"@pid":"24/6437","text":"Jinhui Xu"},{"@pid":"71/7759","text":"Yingjian Yan"},{"@pid":"73/4566","text":"Kai Liu"}]},"title":"Research on Time Randomization of AES against Differential Power Analysis.","venue":"ISCID","pages":"536-539","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/YangXYL09","doi":"10.1109/ISCID.2009.280","ee":"https://doi.org/10.1109/ISCID.2009.280","url":"https://dblp.org/rec/conf/iscid/YangXYL09"}, "url":"URL#5174457" }, { "@score":"1", "@id":"5174459", "info":{"authors":{"author":[{"@pid":"63/1587","text":"Kun Yang"},{"@pid":"40/7765","text":"Jingang Zhai"}]},"title":"Particle Swarm Optimization Algorithms for Optimal Scheduling of Water Supply Systems.","venue":"ISCID","pages":"509-512","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/YangZ09","doi":"10.1109/ISCID.2009.273","ee":"https://doi.org/10.1109/ISCID.2009.273","url":"https://dblp.org/rec/conf/iscid/YangZ09"}, "url":"URL#5174459" }, { "@score":"1", "@id":"5174460", "info":{"authors":{"author":[{"@pid":"55/7761","text":"Shanliang Yao"},{"@pid":"52/6752","text":"Qinghong Guo"}]},"title":"Study on the Enterprise Design Management of External Cooperation.","venue":"ISCID","pages":"207-209","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/YaoG09","doi":"10.1109/ISCID.2009.199","ee":"https://doi.org/10.1109/ISCID.2009.199","url":"https://dblp.org/rec/conf/iscid/YaoG09"}, "url":"URL#5174460" }, { "@score":"1", "@id":"5174462", "info":{"authors":{"author":[{"@pid":"90/7760","text":"Xiao Ye"},{"@pid":"52/1775","text":"Xin Lv"}]},"title":"Study on Value Optimization Design's Application in Industrial Design.","venue":"ISCID","pages":"454-456","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/YeL09","doi":"10.1109/ISCID.2009.259","ee":"https://doi.org/10.1109/ISCID.2009.259","url":"https://dblp.org/rec/conf/iscid/YeL09"}, "url":"URL#5174462" }, { "@score":"1", "@id":"5174463", "info":{"authors":{"author":[{"@pid":"85/7763","text":"Xianjun Yi"},{"@pid":"24/7761","text":"Cuimei Liu"}]},"title":"Platinum Resistance High-Precision Nonlinear Correction Based on Genetic Algorithm.","venue":"ISCID","pages":"21-24","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/YiL09","doi":"10.1109/ISCID.2009.154","ee":"https://doi.org/10.1109/ISCID.2009.154","url":"https://dblp.org/rec/conf/iscid/YiL09"}, "url":"URL#5174463" }, { "@score":"1", "@id":"5174464", "info":{"authors":{"author":[{"@pid":"20/7761","text":"Liya Yi"},{"@pid":"53/7764","text":"Xiaolei Lu"},{"@pid":"87/4858","text":"Jinjun Wang"},{"@pid":"81/2320","text":"Benxiong Huang"}]},"title":"Image Deblurring with Impulse Noise Using Split Bregman Algorithm.","venue":"ISCID","pages":"233-238","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/YiLWH09","doi":"10.1109/ISCID.2009.205","ee":"https://doi.org/10.1109/ISCID.2009.205","url":"https://dblp.org/rec/conf/iscid/YiLWH09"}, "url":"URL#5174464" }, { "@score":"1", "@id":"5174465", "info":{"authors":{"author":[{"@pid":"98/1774","text":"Yi Tian"},{"@pid":"76/1584","text":"Xin Zhang"},{"@pid":"50/6759","text":"Liang Zhang"},{"@pid":"229/8706","text":"Xinn Zhang"}]},"title":"Intelligent Energy Management Based on Driving Cycle Identification Using Fuzzy Neural Network.","venue":"ISCID","pages":"501-504","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/YiXLX09","doi":"10.1109/ISCID.2009.271","ee":"https://doi.org/10.1109/ISCID.2009.271","url":"https://dblp.org/rec/conf/iscid/YiXLX09"}, "url":"URL#5174465" }, { "@score":"1", "@id":"5174466", "info":{"authors":{"author":[{"@pid":"97/3685","text":"Jianchuan Yin"},{"@pid":"75/2871","text":"Fang Dong"},{"@pid":"43/4639","text":"Nini Wang"}]},"title":"Modified Gram-Schmidt Algorithm for Extreme Learning Machine.","venue":"ISCID","pages":"517-520","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/YinDW09","doi":"10.1109/ISCID.2009.275","ee":"https://doi.org/10.1109/ISCID.2009.275","url":"https://dblp.org/rec/conf/iscid/YinDW09"}, "url":"URL#5174466" }, { "@score":"1", "@id":"5174467", "info":{"authors":{"author":[{"@pid":"87/6465","text":"Wei You"},{"@pid":"18/7763","text":"Song Fan"},{"@pid":"87/7759","text":"Songlin Wang"},{"@pid":"66/7762","text":"Chuanli Yan"},{"@pid":"73/7765","text":"Xiangzhou Zhu"},{"@pid":"r/JunRao","text":"Jun Rao"}]},"title":"Predicting the Dielectric Constants of (Zr0.7Sn0.3)TiO4 Ceramics Using Artificial Neural Network.","venue":"ISCID","pages":"395-399","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/YouFWYZR09","doi":"10.1109/ISCID.2009.245","ee":"https://doi.org/10.1109/ISCID.2009.245","url":"https://dblp.org/rec/conf/iscid/YouFWYZR09"}, "url":"URL#5174467" }, { "@score":"1", "@id":"5174469", "info":{"authors":{"author":[{"@pid":"87/6465","text":"Wei You"},{"@pid":"15/7761","text":"Zhen Qiao"},{"@pid":"61/413","text":"Xiaoxia Li"},{"@pid":"13/7763","text":"Fan Feng"},{"@pid":"18/7762","text":"Weiei Huo"},{"@pid":"71/3583","text":"Haibo Wang"}]},"title":"Predicting the Aging Rate of Capacity in Ni/H Battery Using Artificial Neural Network.","venue":"ISCID","pages":"400-404","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/YouQLFHW09","doi":"10.1109/ISCID.2009.246","ee":"https://doi.org/10.1109/ISCID.2009.246","url":"https://dblp.org/rec/conf/iscid/YouQLFHW09"}, "url":"URL#5174469" }, { "@score":"1", "@id":"5174470", "info":{"authors":{"author":[{"@pid":"87/6465","text":"Wei You"},{"@pid":"05/1958","text":"Kun Wang"},{"@pid":"35/7760","text":"Huixiao Li"},{"@pid":"21/5140","text":"Yang Jia"},{"@pid":"48/7761","text":"Xiaoqin Wu"},{"@pid":"53/7760","text":"Yaning Du"}]},"title":"Classification of DNA Sequences Basing on the Dinucleotide Compositions.","venue":"ISCID","pages":"390-394","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/YouWLJWD09","doi":"10.1109/ISCID.2009.244","ee":"https://doi.org/10.1109/ISCID.2009.244","url":"https://dblp.org/rec/conf/iscid/YouWLJWD09"}, "url":"URL#5174470" }, { "@score":"1", "@id":"5174471", "info":{"authors":{"author":[{"@pid":"87/6465","text":"Wei You"},{"@pid":"05/1958","text":"Kun Wang"},{"@pid":"35/7760","text":"Huixiao Li"},{"@pid":"21/5140","text":"Yang Jia"},{"@pid":"48/7761","text":"Xiaoqin Wu"},{"@pid":"53/7760","text":"Yaning Du"}]},"title":"Prediction of the Coal and Gas Outburst by Neural Network.","venue":"ISCID","pages":"405-408","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/YouWLJWD09a","doi":"10.1109/ISCID.2009.247","ee":"https://doi.org/10.1109/ISCID.2009.247","url":"https://dblp.org/rec/conf/iscid/YouWLJWD09a"}, "url":"URL#5174471" }, { "@score":"1", "@id":"5174472", "info":{"authors":{"author":[{"@pid":"87/6465","text":"Wei You"},{"@pid":"181/2842","text":"Yang Wang"},{"@pid":"13/7764","text":"Baoan Wo"},{"@pid":"62/7760","text":"Shuiqing Lv"},{"@pid":"37/7760","text":"Aili Zhan"},{"@pid":"34/7765","text":"Wenjing Sun"}]},"title":"Recognition of Coronary Heart Disease Patients by RBF Neural Network Basing on Contents of Microelements in Human Blood.","venue":"ISCID","pages":"409-412","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/YouWWLZS09","doi":"10.1109/ISCID.2009.248","ee":"https://doi.org/10.1109/ISCID.2009.248","url":"https://dblp.org/rec/conf/iscid/YouWWLZS09"}, "url":"URL#5174472" }, { "@score":"1", "@id":"5174473", "info":{"authors":{"author":{"@pid":"93/7762","text":"Quanyong Yu"}},"title":"A New Financial Investment Management Method Based on Knowledge Management.","venue":"ISCID","pages":"341-344","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/Yu09","doi":"10.1109/ISCID.2009.231","ee":"https://doi.org/10.1109/ISCID.2009.231","url":"https://dblp.org/rec/conf/iscid/Yu09"}, "url":"URL#5174473" }, { "@score":"1", "@id":"5174475", "info":{"authors":{"author":[{"@pid":"03/2764","text":"Xuefeng Yu"},{"@pid":"93/4664","text":"Xiaowei Zhang"},{"@pid":"98/7760","text":"Lili Mu"},{"@pid":"52/2586","text":"Kui Yu"}]},"title":"Application of Fuzzy Dynamic Programming Model in the Coordination Analysis and Allocation of Regional Water Resources.","venue":"ISCID","pages":"202-206","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/YuZMY09","doi":"10.1109/ISCID.2009.198","ee":"https://doi.org/10.1109/ISCID.2009.198","url":"https://dblp.org/rec/conf/iscid/YuZMY09"}, "url":"URL#5174475" }, { "@score":"1", "@id":"5174477", "info":{"authors":{"author":[{"@pid":"64/7763","text":"Guohui Zeng"},{"@pid":"33/7207","text":"Qizhong Liu"}]},"title":"An Intelligent Fuzzy Method for MPPT of Photovoltaic Arrays.","venue":"ISCID","pages":"356-359","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/ZengL09","doi":"10.1109/ISCID.2009.235","ee":"https://doi.org/10.1109/ISCID.2009.235","url":"https://dblp.org/rec/conf/iscid/ZengL09"}, "url":"URL#5174477" }, { "@score":"1", "@id":"5174478", "info":{"authors":{"author":[{"@pid":"79/3131","text":"Xiaoqing Zeng"},{"@pid":"05/7761","text":"Qipeng Xiong"},{"@pid":"04/7762","text":"Decun Dong"},{"@pid":"65/7760","text":"Jingjing Guo"}]},"title":"Development of Fatigue Driving Detection Method Based on Fuzzy Control Logic.","venue":"ISCID","pages":"96-99","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/ZengXDG09","doi":"10.1109/ISCID.2009.172","ee":"https://doi.org/10.1109/ISCID.2009.172","url":"https://dblp.org/rec/conf/iscid/ZengXDG09"}, "url":"URL#5174478" }, { "@score":"1", "@id":"5174479", "info":{"authors":{"author":[{"@pid":"38/7760","text":"Yifan Zeng"},{"@pid":"37/1091","text":"Yan Yang"},{"@pid":"17/7765","text":"Mingfu Jiang"}]},"title":"Study on Weak Signal Detecting Technology in High-Temperature Superconducting Resistance Measurement.","venue":"ISCID","pages":"38-41","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/ZengYJ09","doi":"10.1109/ISCID.2009.158","ee":"https://doi.org/10.1109/ISCID.2009.158","url":"https://dblp.org/rec/conf/iscid/ZengYJ09"}, "url":"URL#5174479" }, { "@score":"1", "@id":"5174483", "info":{"authors":{"author":{"@pid":"20/4718","text":"Guozheng Zhang"}},"title":"A Unified Model of Trust in E-commerce Relationship Development.","venue":"ISCID","pages":"473-476","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/Zhang09c","doi":"10.1109/ISCID.2009.264","ee":"https://doi.org/10.1109/ISCID.2009.264","url":"https://dblp.org/rec/conf/iscid/Zhang09c"}, "url":"URL#5174483" }, { "@score":"1", "@id":"5174484", "info":{"authors":{"author":{"@pid":"20/4718","text":"Guozheng Zhang"}},"title":"Research on Supplier Selection Based on Fuzzy Sets Group Decision.","venue":"ISCID","pages":"529-531","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/Zhang09d","doi":"10.1109/ISCID.2009.278","ee":"https://doi.org/10.1109/ISCID.2009.278","url":"https://dblp.org/rec/conf/iscid/Zhang09d"}, "url":"URL#5174484" }, { "@score":"1", "@id":"5174485", "info":{"authors":{"author":[{"@pid":"96/7759","text":"Qi-yi Zhang"},{"@pid":"74/7764","text":"Shu-chun Chang"}]},"title":"An Improved Crossover Operator of Genetic Algorithm.","venue":"ISCID","pages":"82-86","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/ZhangC09","doi":"10.1109/ISCID.2009.169","ee":"https://doi.org/10.1109/ISCID.2009.169","url":"https://dblp.org/rec/conf/iscid/ZhangC09"}, "url":"URL#5174485" }, { "@score":"1", "@id":"5174488", "info":{"authors":{"author":[{"@pid":"05/3499","text":"Jing Zhang"},{"@pid":"94/7762","text":"Shaowei Feng"},{"@pid":"64/7761","text":"Hanguo Cui"}]},"title":"Optimized NURBS Curve and Surface Fitting Using Simulated Annealing.","venue":"ISCID","pages":"324-329","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/ZhangFC09","doi":"10.1109/ISCID.2009.227","ee":"https://doi.org/10.1109/ISCID.2009.227","url":"https://dblp.org/rec/conf/iscid/ZhangFC09"}, "url":"URL#5174488" }, { "@score":"1", "@id":"5174491", "info":{"authors":{"author":[{"@pid":"69/2745","text":"Hua Zhang"},{"@pid":"60/3031","text":"Feng Kong"},{"@pid":"82/7759","text":"Xiuwei Fu"},{"@pid":"02/621","text":"Dongdong Zhang"}]},"title":"The Application of RBF-NN with Improvements in Clustering Algorithm Based on Ant Colony Optimization in PID Control.","venue":"ISCID","pages":"266-269","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/ZhangKFZ09","doi":"10.1109/ISCID.2009.213","ee":"https://doi.org/10.1109/ISCID.2009.213","url":"https://dblp.org/rec/conf/iscid/ZhangKFZ09"}, "url":"URL#5174491" }, { "@score":"1", "@id":"5174493", "info":{"authors":{"author":[{"@pid":"05/3499","text":"Jing Zhang"},{"@pid":"07/7760","text":"Hui Rong"},{"@pid":"50/2736","text":"Chunhong Zhang"},{"@pid":"69/7762","text":"Fenghong Xiang"},{"@pid":"73/6851","text":"Yunsheng Zhang"}]},"title":"Creditability Modeling of Distributed Embedded System Based on Real-Time Interaction Specification.","venue":"ISCID","pages":"543-546","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/ZhangRZXZ09","doi":"10.1109/ISCID.2009.282","ee":"https://doi.org/10.1109/ISCID.2009.282","url":"https://dblp.org/rec/conf/iscid/ZhangRZXZ09"}, "url":"URL#5174493" }, { "@score":"1", "@id":"5174497", "info":{"authors":{"author":[{"@pid":"89/5992","text":"Li Zhang"},{"@pid":"27/7764","text":"RuLin Wang"},{"@pid":"00/6528","text":"Lili Zhang"},{"@pid":"02/7765","text":"Kui Kui Liu"}]},"title":"Research on Infrared Methane Detecting System Based on Support Vector Machines Used in Mine.","venue":"ISCID","pages":"450-453","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/ZhangWZL09","doi":"10.1109/ISCID.2009.258","ee":"https://doi.org/10.1109/ISCID.2009.258","url":"https://dblp.org/rec/conf/iscid/ZhangWZL09"}, "url":"URL#5174497" }, { "@score":"1", "@id":"5174499", "info":{"authors":{"author":[{"@pid":"05/3499","text":"Jing Zhang"},{"@pid":"62/3960","text":"Feng Yan"},{"@pid":"50/2736","text":"Chunhong Zhang"},{"@pid":"07/7760","text":"Hui Rong"},{"@pid":"69/7762","text":"Fenghong Xiang"}]},"title":"High Dependability Design Framework in Real-Time Embedded Control Software.","venue":"ISCID","pages":"547-551","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/ZhangYZRX09","doi":"10.1109/ISCID.2009.283","ee":"https://doi.org/10.1109/ISCID.2009.283","url":"https://dblp.org/rec/conf/iscid/ZhangYZRX09"}, "url":"URL#5174499" }, { "@score":"1", "@id":"5174501", "info":{"authors":{"author":[{"@pid":"67/7760","text":"Jinxue Zhang"},{"@pid":"73/1844","text":"Ming Zhang"}]},"title":"Research and Design of Embedded Tank Car Monitoring System Based on ARM9.","venue":"ISCID","pages":"292-295","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/ZhangZ09a","doi":"10.1109/ISCID.2009.219","ee":"https://doi.org/10.1109/ISCID.2009.219","url":"https://dblp.org/rec/conf/iscid/ZhangZ09a"}, "url":"URL#5174501" }, { "@score":"1", "@id":"5174502", "info":{"authors":{"author":[{"@pid":"43/6657","text":"Jin Zhang"},{"@pid":"12/7765","text":"Hongqiao Zhou"},{"@pid":"07/6613","text":"Zhuoning Chen"},{"@pid":"93/7764","text":"Xiaoguang Yan"}]},"title":"A Model Driven Approach for Developing PDM-Based Integrated Systems.","venue":"ISCID","pages":"532-535","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/ZhangZCY09","doi":"10.1109/ISCID.2009.279","ee":"https://doi.org/10.1109/ISCID.2009.279","url":"https://dblp.org/rec/conf/iscid/ZhangZCY09"}, "url":"URL#5174502" }, { "@score":"1", "@id":"5174503", "info":{"authors":{"author":[{"@pid":"65/7764","text":"XuePing Zhang"},{"@pid":"80/7765","text":"YanXia Zhu"},{"@pid":"28/5824","text":"Nan Hua"}]},"title":"Privacy Parallel Algorithm for Mining Association Rules and its Application in HRM.","venue":"ISCID","pages":"296-299","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/ZhangZH09","doi":"10.1109/ISCID.2009.220","ee":"https://doi.org/10.1109/ISCID.2009.220","url":"https://dblp.org/rec/conf/iscid/ZhangZH09"}, "url":"URL#5174503" }, { "@score":"1", "@id":"5174504", "info":{"authors":{"author":[{"@pid":"37/4356-1","text":"Xiaodong Zhang 0001"},{"@pid":"82/7762","text":"Yumei Zhao"},{"@pid":"31/1970","text":"Yan Ma"}]},"title":"The Research and Realization of IEEE 802.1X and Account.","venue":"ISCID","pages":"334-337","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/ZhangZM09","doi":"10.1109/ISCID.2009.229","ee":"https://doi.org/10.1109/ISCID.2009.229","url":"https://dblp.org/rec/conf/iscid/ZhangZM09"}, "url":"URL#5174504" }, { "@score":"1", "@id":"5174505", "info":{"authors":{"author":[{"@pid":"37/4356-1","text":"Xiaodong Zhang 0001"},{"@pid":"82/7762","text":"Yumei Zhao"},{"@pid":"31/1970","text":"Yan Ma"}]},"title":"Research on the Next-Generation Internet Transition Technology.","venue":"ISCID","pages":"380-382","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/ZhangZM09a","doi":"10.1109/ISCID.2009.241","ee":"https://doi.org/10.1109/ISCID.2009.241","url":"https://dblp.org/rec/conf/iscid/ZhangZM09a"}, "url":"URL#5174505" }, { "@score":"1", "@id":"5174506", "info":{"authors":{"author":[{"@pid":"51/7764","text":"Goayu Zhang"},{"@pid":"05/7765","text":"Zhizhao Zhou"},{"@pid":"78/6138","text":"Huan Zhou"}]},"title":"The High Frequency Traffic Flow Analysis.","venue":"ISCID","pages":"221-224","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/ZhangZZ09","doi":"10.1109/ISCID.2009.202","ee":"https://doi.org/10.1109/ISCID.2009.202","url":"https://dblp.org/rec/conf/iscid/ZhangZZ09"}, "url":"URL#5174506" }, { "@score":"1", "@id":"5174507", "info":{"authors":{"author":[{"@pid":"01/7765","text":"Shupei Zhang"},{"@pid":"11/5267","text":"Youkun Zhang"},{"@pid":"97/8704","text":"Lei Zhang"},{"@pid":"64/7486","text":"Qingnian Wang"}]},"title":"Optimize Ratio Control Strategy of CVT for Non-steady Working Condition.","venue":"ISCID","pages":"87-91","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/ZhangZZW09","doi":"10.1109/ISCID.2009.170","ee":"https://doi.org/10.1109/ISCID.2009.170","url":"https://dblp.org/rec/conf/iscid/ZhangZZW09"}, "url":"URL#5174507" }, { "@score":"1", "@id":"5174509", "info":{"authors":{"author":[{"@pid":"90/3554","text":"Lifeng Zhao"},{"@pid":"07/7763","text":"Yunqing Li"}]},"title":"The Integrated Intelligent Systems Based on Multidisciplinary Design Optimization for Engine Design.","venue":"ISCID","pages":"53-56","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/ZhaoL09a","doi":"10.1109/ISCID.2009.162","ee":"https://doi.org/10.1109/ISCID.2009.162","url":"https://dblp.org/rec/conf/iscid/ZhaoL09a"}, "url":"URL#5174509" }, { "@score":"1", "@id":"5174511", "info":{"authors":{"author":[{"@pid":"70/3758-2","text":"Ji Zhao 0002"},{"@pid":"68/5216-8","text":"Jun Sun 0008"},{"@pid":"81/4590-1","text":"Wenbo Xu 0001"}]},"title":"Application of Online System Identification Based on Improved Quantum-Behaved Particle Swarm Optimization.","venue":"ISCID","pages":"186-189","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/ZhaoSX09","doi":"10.1109/ISCID.2009.194","ee":"https://doi.org/10.1109/ISCID.2009.194","url":"https://dblp.org/rec/conf/iscid/ZhaoSX09"}, "url":"URL#5174511" }, { "@score":"1", "@id":"5174513", "info":{"authors":{"author":[{"@pid":"63/5422","text":"Liang Zhao"},{"@pid":"83/6597","text":"Yongchuan Tang"}]},"title":"Comparison of MTR Escape Design in Different Regions.","venue":"ISCID","pages":"557-560","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/ZhaoT09a","doi":"10.1109/ISCID.2009.285","ee":"https://doi.org/10.1109/ISCID.2009.285","url":"https://dblp.org/rec/conf/iscid/ZhaoT09a"}, "url":"URL#5174513" }, { "@score":"1", "@id":"5174514", "info":{"authors":{"author":[{"@pid":"71/6948","text":"Jianjun Zhao"},{"@pid":"42/7764","text":"Weixing Xu"},{"@pid":"39/7763","text":"Yandong Hou"},{"@pid":"53/7761","text":"Hongliang Tian"},{"@pid":"09/1365","text":"Xin Li"}]},"title":"The Application of Improved D-S Evidence Theory to Single-Phase Fault Line Selection.","venue":"ISCID","pages":"193-196","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/ZhaoXHTL09","doi":"10.1109/ISCID.2009.196","ee":"https://doi.org/10.1109/ISCID.2009.196","url":"https://dblp.org/rec/conf/iscid/ZhaoXHTL09"}, "url":"URL#5174514" }, { "@score":"1", "@id":"5174515", "info":{"authors":{"author":[{"@pid":"82/7765","text":"Hongqing Zhao"},{"@pid":"31/7763","text":"Yanzhen Yang"},{"@pid":"47/2158","text":"Gang Xie"}]},"title":"Study a New Mesh Simplification Method in Reverse Engineering.","venue":"ISCID","pages":"320-323","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/ZhaoYX09","doi":"10.1109/ISCID.2009.226","ee":"https://doi.org/10.1109/ISCID.2009.226","url":"https://dblp.org/rec/conf/iscid/ZhaoYX09"}, "url":"URL#5174515" }, { "@score":"1", "@id":"5174516", "info":{"authors":{"author":[{"@pid":"82/7765","text":"Hongqing Zhao"},{"@pid":"31/7763","text":"Yanzhen Yang"},{"@pid":"45/2129","text":"Qinmin Yang"}]},"title":"An Adaptive Hybrid Surfaces Mesh Subdivision.","venue":"ISCID","pages":"316-319","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/ZhaoYY09","doi":"10.1109/ISCID.2009.225","ee":"https://doi.org/10.1109/ISCID.2009.225","url":"https://dblp.org/rec/conf/iscid/ZhaoYY09"}, "url":"URL#5174516" }, { "@score":"1", "@id":"5174517", "info":{"authors":{"author":[{"@pid":"94/6503","text":"Tong Zhao"},{"@pid":"92/7760","text":"Pin Zhao"}]},"title":"Output Feedback for a Class of Non-affine Nonlinear System via Neural Networks.","venue":"ISCID","pages":"49-52","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/ZhaoZ09","doi":"10.1109/ISCID.2009.161","ee":"https://doi.org/10.1109/ISCID.2009.161","url":"https://dblp.org/rec/conf/iscid/ZhaoZ09"}, "url":"URL#5174517" }, { "@score":"1", "@id":"5174519", "info":{"authors":{"author":{"@pid":"83/126","text":"Qunyi Zhou"}},"title":"The Electrocardiogram Classification Research on Electrocardiogram RR Interval Variation.","venue":"ISCID","pages":"497-500","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/Zhou09","doi":"10.1109/ISCID.2009.270","ee":"https://doi.org/10.1109/ISCID.2009.270","url":"https://dblp.org/rec/conf/iscid/Zhou09"}, "url":"URL#5174519" }, { "@score":"1", "@id":"5174524", "info":{"authors":{"author":[{"@pid":"38/1660","text":"Zhengxin Zhou"},{"@pid":"96/175","text":"Zhihong Zhao"},{"@pid":"55/7763","text":"Zhaofeng Geng"}]},"title":"A 1/f Noise Method for Fabric Wrinkle Shape Detection.","venue":"ISCID","pages":"360-363","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/ZhouZG09","doi":"10.1109/ISCID.2009.236","ee":"https://doi.org/10.1109/ISCID.2009.236","url":"https://dblp.org/rec/conf/iscid/ZhouZG09"}, "url":"URL#5174524" }, { "@score":"1", "@id":"5174526", "info":{"authors":{"author":[{"@pid":"27/7625","text":"Yufeng Zhu"},{"@pid":"58/7622","text":"Shijian Zhou"},{"@pid":"04/7625","text":"Deyan Zang"}]},"title":"Discussion of Radon in Uranium Mining Disaster Model Based on Artificial Neural Network.","venue":"ISCID","pages":"433-436","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/iscid/ZhuZZ09","doi":"10.1109/ISCID.2009.254","ee":"https://doi.org/10.1109/ISCID.2009.254","url":"https://dblp.org/rec/conf/iscid/ZhuZZ09"}, "url":"URL#5174526" } ] } } } )