17. Improvement and Application of Initial Value of Non-equidistant GM1,1 Model Youxin Luo
113-118 18. Non-equidistant GRM1,1 Generated by Accumulated Generating Operation of
Reciprocal Number and its Application
Youxin Luo, and 119-123
19. Based on RFID Products Information Tracing Anti-counterfeiting Strategy Design and Application
Jiao Yabing 124-129
20. Person Name Recognition for Uyghur Using Conditional Random Fields Muhtar Arkin, Abdurahim Mahmut and Askar Hamdulla
130-136 21. Supply Chain Coordination Research under a Fuzzy Decision Environment
Shengju Sang 137-142
22. The Echelon Pattern and Its Key Technologies of Urban Circle Solid Waste Disposal Xuhui Li, Gangyan Li, Guowen Sun, Huiping Shi and Baoan Yang
143-149 23. A Fitting Approach to Mend Defective Urban Traffic Flow Information Based on SARBF
Neural Networks
Ning Chen, Weibing Weng and Xing Xu 150-155
24. Predicting the Severity of Breast Masses with Data Mining Methods Sahar A. Mokhtar and Alaa M. Elsayad
160-168 25. Fusion of Physical Extraction Parameter Model Optical and SAR Data for Flood
Detection
Wawan Setiawan and Wiweka 169-176
26. A Search Algorithm Oriented to XML Keywords Xingyuan Li
177-183 27. Application of equivalent permeability in numerical simulation of horizontal wells in
bottom water reservoirs
Li-Feng Li, Bing-Bing Wang and Xiang-An Yue 184-189
28. An Improved Cost-Efficient Thinning Algorithm for Digital Image Liang Jia and Zhenjie Hou
190-197 29. Data Mining Framework for Direct Marketing: A Case Study of Bank Marketing
Lilian Sing\oei and Jiayang Wang 198-203
30. The Implementation of Univariate and Bivariate B-Spline Interpolation Method in Continuous
Dian Pratiwi 204-210
31. Design of a Radioactive Source Sampler Based on CPAC Bin Yang and Zhenyu Wang
211-216 32. Android-based Java Programming for Mobile Phone LED Control
Yi-Jen Mon 217-222
33. Fuzzy Logic Method for Evaluation of Difficulty Level of Exam and Student Graduation Rusmiari
223-229
34. Application of optimal control theory to an SEIR model with immigration of infectives Elhia Mohamed
230-236 35. Profit-Aware DVFS Enabled Resource Management of IaaS Cloud
Shahzad Ali 237-247
36. Vision-Based Obstacle Avoidance Controller Design for Mobile Robot by Using Single Camera
Yi-Jen Mon 248-250
37. Post-processing of Engineering Analysis Results for Visualization in VR System Stoyan Maleshkov and Dimo Chotrov
258-263 38. Parallel and distributed closed regular pattern mining in large databases
M.Sreedevi and L S S Reddy 264-269
39. Dynamic Forensics Model based on Ontology and Context Information Baoxian Jia and Weiqiang Yang
270-272 40. Peripheral Contour Feature Based On-line Handwritten Uyghur Character Recognition
Zulpiya Kahar, Mayire Ibrayim and Askar Hamdulla 273-278
41. Modified TCP Protocol for Wireless Sensor Networks Hesham Abusaimeh and Mohammad Shkoukani
279-285 42. Differential Evolution with u+T-Selection Technique
Miao-Miao Liu, Pan Huo and Wen-Yin Gong 286-293
43. ANFIS Transient Control for Double Inverted Pendulum System Yi-Jen Mon
294-297 44. Dynamic Analysis for Video Based Smoke Detection
Chen Junzhou, You Yong and Peng Qiang 298-304
45. Design and Simulation of Gate Driver Circuit Using Pulse Transformer Daizhuang Wang, Haifeng Dai and Zechang Sun
305-310 46. Studied and Their Application of Vibration Control Technologies
Ying Sun, Yuesheng Gu and Hegen Xiong 311-318
47. An Ensemble Monte Carlo Model to Calculate Photocurrent of MSM Photodetector Mohammad Soroosh and Yasser Amiri
319-324 48. Evaluation of a Proposed Intelligent Transportation Framework using Computer
Network Concepts: A Case Study for Hajj-Pilgrim Traffic Monitoring and Control
Omar Tayan and Abdullah Al-Binali 325-330
49. A New Scheme Based Biometric to Protect Location Privacy in Wireless Body Area Networks