| Home | Editorial Board | Aims & Scope | Information for Authors | Subscription | ICIC-ELB | IJICIC |
| A Clustering Ensemble Framework Based On System Energy Theory | 851-856 |
|
| Jian Hu and Xiang-Yang Li | ||
| Triangular Fuzzy Number Method for Robot Non-Vision Multi-Sensor Fusion | 857-862 |
|
| Shuping Wan | ||
| Design of Comfortable Working Environment on Bed for Bedridden People | 863-868 |
|
| Kazuhiro Koshi, Hitomi Umeda, Kazuo Nagata, Kimiyasu Kiyota, Masazumi Miyoshi and Hiroaki Koga | ||
| Numerical Computation for Identifying Nash Equilibria Using Shapley's Labeling Method | 869-875 |
|
| Naoki Shiba | ||
| Multi-Agent Simulation of Fund Circulation in an Artificial Economic System Involving Self-Adjusting Mechanism of Price, Production and Investment | 877-884 |
|
| Shigeaki Ogibayashi and Kousei Takashima | ||
| Automatic Path Search for Roving Robot Using Reinforcement Learning | 885-892 |
|
| Shigeharu Miyata, Akira Yanou, Hitomi Nakamura and Shin Takehara | ||
| Slope-Walking of a Biped Robot with K Nearest Neighbor Method | 893-898 |
|
| Junichi Nagasue, Yasuo Konishi, Nozomu Araki, Takao Sato and Hiroyuki Ishigaki | ||
| Nonlinear Control of an Underactuated Two-Link Planar Manipulator Using Unstable Property of Zerodynamics | 899-906 |
|
| Tomohiro Henmi, Sinsaku Izumi, Mingcong Deng and Akira Inoue | ||
| Grasp and Transport Control of a Chopsticks-Type Robot | 907-916 |
|
| Yojiro Yamasaki, Toru Tsumugiwa and Ryuichi Yokogawa | ||
| Extraction of Aortic Aneurysm Volume Data Based on 3-D Region Growing Method | 917-922 |
|
| Tatsushi Tokuyasu, Norihiro Abe, Akira Marui, Shotaro Kanao and Masashi Komeda | ||
| Visualization and Analysis of Mental States Based on Photoplethysmogram | 923-928 |
|
| Ying Li and Keiichi Horio | ||
| An Evidential Reasoning Approach for Learning Object Recommendation with Uncertainty | 929-935 |
|
| Noppamas Pukkhem and Wiwat Vatanawood | ||
| Multi Domain Features Based Classification of Mammogram Images Using SVM and MLP | 937-942 |
|
| A. Jaffar, B. Ahmed, N. Naveed, A. Hussain, F. Jabeen and A. M. Mirza | ||
| Restoration of Distribution Networks with Asynchronous Wind Generators | 943-948 |
|
| Li-jun Yang and Zhi-gang Lu | ||
| GDTR: A Graph-Based Domain Terms Ranking Model | 949-955 |
|
| Chunhui Zhang, Yiming Zhou, Zhoujun Li, Wenhan Chao, Lei Shen and Qiao Sun | ||
| Development of Graphical Human Interface Technology for Use in Mechatronics Experimental Module | 957-962 |
|
| Wen-Jye Shyr | ||
| Robust AVR Design Based on Mixed H2/H\/Pole Placement Using Linear Matrix Inequality (LMI) | 963-971 |
|
| Mosleh M. Al-Harthi | ||
| Robust Fuzzy Control of Nonlinear Discrete Fuzzy Impulsive Delayed Systems | 973-978 |
|
| Haibo Jiang, Caigen Zhou and Jianjiang Yu | ||
| A Novel Logistic-Based Image Encryption Scheme | 979-984 |
|
| Guodong Ye | ||
| Improved Orthogonal Matching Pursuit Algorithm with Application to Learning Dictionary | 985-991 |
|
| Ronggen Yang and Mingwu Ren | ||
| Tsallis Cross Entropy Based Automatic Threshold Selection | 993-998 |
|
| Fangyan Nie, Chao Gao, Yongcai Guo and Min Gan | ||
| Nonparametric Kernel Discriminant Analysis for Face Recognition under Varying Lighting Conditions | 999-1004 |
|
| Jun-Bao Li | ||
| Classification of Stego and PS Images Based on Wavelet Decomposition and Filtering | 1005-1010 |
|
| Xiangyang Luo, Fenlin Liu, Xiongfei He and Chunfang Yang | ||
| Image Encryption Based on DNA Splicing System and Henon Model | 1011-1018 |
|
| Changjun Zhou, Xiaopeng Wei, Qiang Zhang and Bin Wang | ||
| The Optimization Coverage Control Strategy Based on Genetic Algorithm in Wireless Sensor Networks | 1019-1024 |
|
| Wei Qu, Jinkuan Wang, Xu Zhao and Zhigang Liu | ||
| Decomposition Based Efficient Algorithms for Knowledge Reduction | 1025-1032 |
|
| Na Jiao, Duoqian Miao and Hongyun Zhang | ||
| A RBF Neural Network Based Optimization Model and Its Application in Mechanical Manufacturing Production Plan | 1033-1038 |
|
| Jiangang Yi and Yao Li | ||
| An Evolutionary Algorithm for Solving Dynamic Nonlinear Constrained Optimization | 1039-1044 |
|
| Chun-an Liu | ||
| A Method to Analyze the Difference of CAD Files | 1045-1051 |
|
| Linghao Zou, Dongming Guo, Hang Gao, Changle Sun and Hui Wang | ||
| Mechanized Analysis of Verifiable Multi-Secret Sharing in the Applied Pi-Calculus | 1053-1058 |
|
| Hui Zhao, Mingchu Li, Kouichi Sakurai and Yizhi Ren | ||
| Image Thresholding Algorithm Based on Image Gradient and Fuzzy Set Distance | 1059-1063 |
|
| Xijuan Guo, Huanhuan Zhang and Zheng Chang | ||
| HNS: Hierarchical Name System | 1065-1070 |
|
| Fuhong Lin, Changjia Chen, Ke Xiong and Hongke Zhang | ||
| Hungry Particle Swarm Optimization | 1071-1076 |
|
| Xingjuan Cai and Zhihua Cui | ||
| Model Building and Numerical Optimization for the FM-BEM Frictional Contact System | 1077-1082 |
|
| Chunxiao Yu, Yunfeng Mu and Yiming Chen | ||
| Reference View Generating of Traffic Intersection | 1083-1088 |
|
| Yu Wang and Jien Kato | ||
| Oscillation for Second-Order Neutral Difference Equations with Several Delays | 1089-1094 |
|
| Xiaozhu Zhong, Guoqin Li and Yan Shi | ||
| Equilibrium Policies Model of Ordering and Pricing in a Three-Tier Supply Chain Network | 1095-1100 |
|
| Junxiu Jia, Hua Li and Xiangpei Hu |