Design of a Radioactive Source Sampler Based on CPAC Bin Yang and Zhenyu Wang Fuzzy Logic Method for Evaluation of Difficulty Level of Exam and Student Graduation Rusmiari Vision-Based Obstacle Avoidance Controller Design for Mobile Robot by Using Single

17. Improvement and Application of Initial Value of Non-equidistant GM1,1 Model Youxin Luo

113-118 18. Non-equidistant GRM1,1 Generated by Accumulated Generating Operation of Reciprocal Number and its Application Youxin Luo, and 119-123

19. Based on RFID Products Information Tracing Anti-counterfeiting Strategy Design and Application

Jiao Yabing 124-129 20. Person Name Recognition for Uyghur Using Conditional Random Fields Muhtar Arkin, Abdurahim Mahmut and Askar Hamdulla 130-136 21. Supply Chain Coordination Research under a Fuzzy Decision Environment Shengju Sang 137-142 22. The Echelon Pattern and Its Key Technologies of Urban Circle Solid Waste Disposal Xuhui Li, Gangyan Li, Guowen Sun, Huiping Shi and Baoan Yang 143-149 23. A Fitting Approach to Mend Defective Urban Traffic Flow Information Based on SARBF Neural Networks Ning Chen, Weibing Weng and Xing Xu 150-155 24. Predicting the Severity of Breast Masses with Data Mining Methods Sahar A. Mokhtar and Alaa M. Elsayad 160-168 25. Fusion of Physical Extraction Parameter Model Optical and SAR Data for Flood Detection Wawan Setiawan and Wiweka 169-176

26. A Search Algorithm Oriented to XML Keywords Xingyuan Li

177-183 27. Application of equivalent permeability in numerical simulation of horizontal wells in bottom water reservoirs Li-Feng Li, Bing-Bing Wang and Xiang-An Yue 184-189

28. An Improved Cost-Efficient Thinning Algorithm for Digital Image Liang Jia and Zhenjie Hou

190-197 29. Data Mining Framework for Direct Marketing: A Case Study of Bank Marketing Lilian Sing\oei and Jiayang Wang 198-203

30. The Implementation of Univariate and Bivariate B-Spline Interpolation Method in Continuous

Dian Pratiwi 204-210

31. Design of a Radioactive Source Sampler Based on CPAC Bin Yang and Zhenyu Wang

211-216 32. Android-based Java Programming for Mobile Phone LED Control Yi-Jen Mon 217-222

33. Fuzzy Logic Method for Evaluation of Difficulty Level of Exam and Student Graduation Rusmiari

223-229 34. Application of optimal control theory to an SEIR model with immigration of infectives Elhia Mohamed 230-236 35. Profit-Aware DVFS Enabled Resource Management of IaaS Cloud Shahzad Ali 237-247

36. Vision-Based Obstacle Avoidance Controller Design for Mobile Robot by Using Single Camera

Yi-Jen Mon 248-250 37. Post-processing of Engineering Analysis Results for Visualization in VR System Stoyan Maleshkov and Dimo Chotrov 258-263 38. Parallel and distributed closed regular pattern mining in large databases M.Sreedevi and L S S Reddy 264-269

39. Dynamic Forensics Model based on Ontology and Context Information Baoxian Jia and Weiqiang Yang

270-272 40. Peripheral Contour Feature Based On-line Handwritten Uyghur Character Recognition Zulpiya Kahar, Mayire Ibrayim and Askar Hamdulla 273-278

41. Modified TCP Protocol for Wireless Sensor Networks Hesham Abusaimeh and Mohammad Shkoukani

279-285 42. Differential Evolution with u+T-Selection Technique Miao-Miao Liu, Pan Huo and Wen-Yin Gong 286-293

43. ANFIS Transient Control for Double Inverted Pendulum System Yi-Jen Mon

294-297 44. Dynamic Analysis for Video Based Smoke Detection Chen Junzhou, You Yong and Peng Qiang 298-304 45. Design and Simulation of Gate Driver Circuit Using Pulse Transformer Daizhuang Wang, Haifeng Dai and Zechang Sun 305-310 46. Studied and Their Application of Vibration Control Technologies Ying Sun, Yuesheng Gu and Hegen Xiong 311-318 47. An Ensemble Monte Carlo Model to Calculate Photocurrent of MSM Photodetector Mohammad Soroosh and Yasser Amiri 319-324 48. Evaluation of a Proposed Intelligent Transportation Framework using Computer Network Concepts: A Case Study for Hajj-Pilgrim Traffic Monitoring and Control Omar Tayan and Abdullah Al-Binali 325-330

49. A New Scheme Based Biometric to Protect Location Privacy in Wireless Body Area Networks