| Home | Editorial Board | Aims & Scope | Information for Authors | Subscription | ICIC-ELB | IJICIC |
| Normalized IV-Distance, IV-Similarity Measure, IV-Entropy and IV-Inclusion Measure of Interval-Valued Fuzzy Sets and Their Relationship | 1405-1410 |
|
| Wenyi Zeng, Yibin Zhao and Xianchuan Yu | ||
| Electro-Ocular Measurement and Control Technique by Integrating Virtual Instrument | 1411-1416 |
|
| Kai-Chao Yao and Wei-Tzer Huang | ||
| Normal Vector-Controlled Particle Swarm Optimization Algorithm for Solving Bi-Level Linear Programming Problem | 1417-1423 |
|
| Ren-Jieh Kuo, C. C. Huang and Tung-Lai Hu | ||
| An Empirical Study of the Relationship between Complementary Resources and IT Capability: A Resource-Based Perspective | 1425-1430 |
|
| Wenli Li, Shijie Li and Yulong Ke | ||
| Forecasting in Time Series Based on Generalized Fuzzy Logical Relationship | 1431-1438 |
|
| Wangren Qiu, Xiaodong Liu and Lidong Wang | ||
| A Novel Image Encryption Algorithm Based on Double Hyper-Chaotic Systems | 1439-1444 |
|
| Enzeng Dong, Zaiping Chen, Zengqiang Chen, Haifen Li and Chengyi Xia | ||
| Design of an Inductor-Based WLED Driver Using Clean Energy Power Supplies | 1445-1450 |
|
| Kei Eguchi, Sawai Pongswatd, Toshiya Watanabe, Hongbing Zhu, Kitti Tirasesth and Hirofumi Sasaki | ||
| Proposal for Fuzzy-Based 3D Region Growing Method and Its Application for Computer-Aided Diagnosis System | 1451-1455 |
|
| Tatsushi Tokuyasu, Takashi Shuto, Kenji Yufu, Shotaro Kanao, Akira Marui and Masashi Komeda | ||
| Virtual Unitary-ESPRIT Algorithm for Joint DOD and DOA Estimation in Bistatic MIMO Radar | 1457-1463 |
|
| Fulai Liu, Changyin Sun, Jinkuan Wang and Ruiyan Du | ||
| Situation Distributions in a Special 3-Person 0-1 Game with Entropy | 1465-1469 |
|
| Dianyu Jiang | ||
| Fuzzy Similarity Inference Method and Its Application in Fuzzy System Modeling | 1471-1476 |
|
| Degang Wang, Wenyan Song and Hongxing Li | ||
| Word Sense Disambiguation of English Modal Verbs by Support Vector Machines | 1477-1482 |
|
| Jianping Yu, Liang Huang and Jilin Fu | ||
| Two-Way Query Log: A Block-Level Continuous Data Protection Indexing Structure | 1483-1488 |
|
| Guangjun Wu, Shupeng Wang, Binxing Fang, Xiaochun Yun and Xiangzhan Yu | ||
| The Enhancement of Stereoscopic Image and Hologram Based on Post-Processing of Depth and Color | 1489-1494 |
|
| Hyunjun Choi, Dong Hoi Kim, Kwanwook Lee and Manbae Kim | ||
| Infrared Small Target Detection and Tracking Based on Mathematical Morphology | 1495-1500 |
|
| Xiangzhi Bai, Fugen Zhou, Ting Jin and Zhaoying Liu | ||
| Rendezvous of Multi-Agents with Nonlinear Inner-Coupling Functions | 1501-1507 |
|
| Qing Zhang, Zhengquan Yang and Zengqiang Chen | ||
| The Parameterization of all Disturbance Observers for Discrete-Time Systems | 1509-1514 |
|
| Iwanori Murakami, Kou Yamada, Tatsuya Sakanushi, Takaaki Hagiwara, Yoshinori Ando, Da Zhi Gong and Masahiko Kobayashi | ||
| Tolerance and Similarity Relations in Definition of Rough Approximations | 1515-1520 |
|
| Liping An and Zengqiang Chen | ||
| Adaptive Support of e-Portfolio Knowledge for Student Ubiquitous Learning | 1521-1527 |
|
| Chih-Kun Ke, Wei-Tu Chen and Mei-Yu Wu | ||
| A New Computation Method of the Geometric Properties for Range Data | 1529-1535 |
|
| Yi An, Cheng Shao, Xiaoliang Wang and Zhuohan Li | ||
| The Optimization of Decision Tree Building Algorithm in Topological Relations Query | 1537-1542 |
|
| Wenbin Wang, Wenyuan Liu and Shiwei Gao | ||
| Decoupling Control of 2-Link Manipulator | 1543-1548 |
|
| Linfeng Lan and Ryuichi Oguro | ||
| Stopping Automated Injection Attack Tools Based on Navigational Behavior | 1549-1554 |
|
| Jan-Min Chen | ||
| A Collaborative Distributed Strategy for Target Tracking in Wireless Sensor Networks | 1555-1560 |
|
| Qinghua Gao, Minglu Jin, Jie Wang and Wenlong Liu | ||
| A Model for Position Relation between Regions | 1561-1566 |
|
| Miao Wang and Zhongxiao Hao | ||
| Fuzzy Concept Lattice Construction and Bordat Method | 1567-1572 |
|
| Yinghui Huang, Guanyu Li and Dan Wang | ||
| Determining the Sources of Variance Shifts in a Multivariate Process Using Flexible Discriminant Analysis | 1573-1578 |
|
| Yuehjen E. Shao, Hsiao-Yun Huang and Ying-Jen Chen | ||
| Set Stabilization of Chua's Circuit via Hybrid Control Strategy | 1579-1584 |
|
| Xiangze Lin, Yongqian Ding and Shihua Li | ||
| An Efficient Motion Estimation Algorithm for H.264/AVC Encoder by Using New Searching Strategy | 1585-1590 |
|
| Jinqing Qi, Hao Wu and Yan Yu | ||
| An Improved Hammerstein Predistorter for Power Amplifier with Memory Effects | 1591-1596 |
|
| Xiujie Si, Minglu Jin and Wenlong Liu | ||
| A Hybrid Audio Watermarking Technique in Cepstrum Domain | 1597-1602 |
|
| Shinfeng D. Lin, Chao-Cyun Huang and Jia-Hong Lin | ||
| Clustering Over an Evolving Data Stream Based on Grid Density and Correlation | 1603-1609 |
|
| Jiadong Ren, Binlei Cai and Changzhen Hu | ||
| A High Curvature Bias Correction Method for the Ellipse Fitting | 1611-1617 |
|
| Peipei Li, Caiming Zhang, Yu Wei and Kunpeng Wang | ||
| A Hierarchical SLAM Algorithm Characterized with Event-Driven Property | 1619-1624 |
|
| Xuefeng Dai, Lina Zhao and Yuan Guo | ||
| An Efficient Incremental Algorithm for Mining Web Navigation Patterns with Dynamic Thresholds | 1625-1630 |
|
| Jia-Ching Ying and Vincent S. Tseng | ||
| A Pluggable and Flexible Framework for Access Control | 1631-1636 |
|
| Limin Shen, Chengzhong Song and Dianlong You | ||
| An RFID-Based Learning System Supporting Ubiquitous Context-Aware Bloom's Cognition Knowledge Analysis | 1637-1642 |
|
| Wen-Chih Chang, Te-Hua Wang and An-Sheng Li | ||
| Vulnerability Exploitability Quantitative Evaluation for Network Information System | 1643-1648 |
|
| Hongyu Yang and Lixia Xie | ||
| An Adaptive Selection Scheme of Forwarding Nodes in Wireless Sensor Networks Using a Chaotic Neural Network | 1649-1655 |
|
| Tomoyuki Sasaki, Hidehiro Nakano, Akihide Utani, Arata Miyauchi and Hisao Yamamoto | ||
| Effects of the Consecutive Speed Humps on Chaotic Vibration of a Nonlinear Vehicle Model | 1657-1664 |
|
| Fei Liu, Shan Liang, Qin Zhu and Qinyu Xiong | ||
| Forecast the Amount of Import and Export in Vietnam by Applying Grey Method | 1665-1670 |
|
| Jui-Fang Chang, Tien-Chin Wang, Truong Ngoc Anh and Wan-Tseng Chang | ||
| Conditional Anonymous Compact E-Cash with Auditable Tracing | 1671-1675 |
|
| Qian Wang | ||
| Using Feature Attribute to Filter Noise in Radio Signal Recognition | 1677-1682 |
|
| Chao Zhang, Zheng Pei, Jianmei Cheng and Hongbao Cao | ||
| Algorithms Comparison for Weak GPS Signal Tracking Based on KF | 1683-1688 |
|
| Xiyuan Chen, Zhe Liu, Xuefen Zhu and Lin Fang | ||
| Adaptive Fuzzy Backstepping Output Feedback Control for Nonlinear Systems with Unknown Sign of High-Frequency Gain | 1689-1693 |
|
| Changliang Liu, Shaocheng Tong and Yongming Li | ||
| A Double-Stepping Run-Length Algorithm for Fast Circle Drawing | 1695-1700 |
|
| Lianqiang Niu, Binghong Li, Haiwen Feng and Tianxiang Zhu | ||
| Supply Chain Optimization Model Based on Process and Generalized Inverse Optimization Methods | 1701-1707 |
|
| Xiangbin Zhang, Youyi Ni and Yamin Yuan | ||
| Efficient Deblocking Filter Architecture for High-Resolution Applications of H.264/AVC | 1709-1715 |
|
| Tomohiro Akita, Naoyuki Hirai, Tian Song, and Takashi Shimamoto | ||
| Dual Slope Analog-to-Digital Converter Using Simple CCII-Based Integrator | 1717-1722 |
|
| Krit Smerpitak, Amphawan Julsereewong and Hirofumi Sasaki | ||
| Backstepping Controller Design for a Manipulator with Compliance | 1723-1728 |
|
| Cheng-Yi Chen, Marvin H.-M. Cheng and Chien-Hua Lee | ||
| Shrinkage Estimated Adaptive Nearest Neighbor for Hyperspectral Image Classification | 1729-1734 |
|
| Hsiao-Yun Huang, Yuehjen E. Shao and Yung-Hsu Li |