| Home | Editorial Board | Aims & Scope | Information for Authors | Subscription | ICIC-ELB | IJICIC |
| High-Capacity Reversible Data Hiding Scheme for Optimal Common-Bitplane BTC-Compressed Color Images | 4251-4256 |
|
| Zhi-Fang Chen, Zhe-Ming Lu and Yu-Xin Su | ||
| Search for Better Random Forests with an Tree Selection Method | 4257-4262 |
|
| Baoxun Xu, Yunming Ye, Qiang Wang and Junjie Li | ||
| Motion Correction in fMRI via Local Rigid Transform | 4263-4268 |
|
| Sen Liu, Jiexin Pu, Hongyi Zhang and Li Zhao | ||
| Novel Asymptotic Stability Analysis for Neural Networks with Multiple Time-Varying Delays | 4269-4275 |
|
| Tiheng Qin, Yonggang Chen and Jingben Yin | ||
| Face Recognition Based on Enhanced Supervised Neighborhood Preserving Projection | 4277-4282 |
|
| Chunming Xu | ||
| A Path Planning Method Based on Improved Genetic Algorithm for Mobile Robot in Static Environment | 4283-4290 |
|
| Chuanling Liu, Xianyong Wei and Jingyu Yang | ||
| An Efficient Data Hiding Scheme Based on Magic Cube | 4291-4296 |
|
| Rui Sun, Shengli Yang and Wenjun Zeng | ||
| A Fuzzy Selective Rate Congestion Control in Wired/Wireless Internet Environments | 4297-4302 |
|
| Xinhao Yang and Ze Li | ||
| Random Forest for Imbalanced Microarray Data Classification by Weighting Strategy | 4303-4308 |
|
| Hualong Yu, Shang Gao and Bin Qin | ||
| The Study of Stock Indexes Relationship between Taiwan and China Markets - Considering China Concept Stocks and Number of Significant Periods | 4309-4313 |
|
| Feng-Jenq Lin and Ming-Han Hsieh | ||
| Experimental Research on Millimeter-Wave Radiometric Imaging for Concealed Contraband Detection | 4315-4321 |
|
| Taiyang Hu, Zelong Xiao and Jianzhong Xu | ||
| Comparison of Variance Reduction Techniques for Steady-State Simulation Analysis | 4323-4328 |
|
| Ming Yang and Peng Shi | ||
| Efficient Text Representation via Weighted Co-Contributions of Terms on Class Tendency | 4329-4336 |
|
| Yuan Ping, Yajian Zhou, Huina Li and Yixian Yang | ||
| Quantized Control for Parameter Uncertain Systems with Limited Information | 4337-4344 |
|
| Fang Jin, Qing-Quan Liu and Yong-Ping Hao | ||
| Research on Transmission Zeros for a Class of Non-Square Systems | 4345-4350 |
|
| Shin-Ju Chen, Jong-Lick Lin and Sung-Pei Yang | ||
| Adaptive Logic-Based Switched Observer for Chaotic Synchronization | 4351-4357 |
|
| Junxia Chu | ||
| Resource Allocation and Adjustment with Genetic Algorithm in Virtual Computing Systems | 4359-4366 |
|
| Xiao Jun Chen, Jing Zhang, Jun Huai Li and Xiang Li | ||
| Robust Guaranteed Cost Fault-Tolerant Control of Networked Control System | 4367-4374 |
|
| Jun Kang | ||
| Failure Detection and Fault Correction Models Considering Testing Effort and Imperfect Debugging | 4375-4380 |
|
| Nan Zhang, Gang Cui and Hongwei Liu | ||
| Brief Review of Autonomous Surface Crafts | 4381-4386 |
|
| Jiang Zhao, Weisheng Yan and Xuelian Jin | ||
| An Improved Coupled Simulated Annealing | 4387-4393 |
|
| Yalan Zhou | ||
| Integrating Artificial Intelligence Solutions into Interfaces of Online Knowledge Production | 4395-4401 |
|
| Mihaly Heder | ||
| Research on Genetic Algorithm Strategy Selection for Function Optimization Based on Function Cluster | 4403-4408 |
|
| Xue Li, Yingan Cui, Duwu Cui and Xuetong Wang | ||
| Education Clustering Model for Surveillance System Using ILM Algorithm | 4409-4414 |
|
| Sageemas Na Wichian, Suwimon Wongwanich and Patharawut Saengsiri | ||
| Improved Group-Oriented Digital Signature Schemes Based on Elliptic Curve Cryptography | 4415-4419 |
|
| Yu-Hao Chuang, Wesley Shu, Kevin C. Hsu and Chien-Lung Hsu | ||
| Evacuation Model of Campus Emergency Events Based on Cell Transmission Model | 4421-4426 |
|
| Zhuomo Lu and Kaipeng Gao | ||
| A Novel Method of Transforming Controlled Unfolding Net into Equivalent Closed-Loop Petri Net | 4427-4432 |
|
| Guoqiang Zeng, Chongwei Zheng and Zhengjiang Zhang | ||
| Uniformly Strong Persistence of a Discrete Nonlinear Asymptotically Periodic Ecological System | 4433-4438 |
|
| Weiguo Wang and Hongying Lu | ||
| Study on Control Performance and Energy Recovery Efficiency of Hydraulic Hybrid Excavator | 4439-4444 |
|
| Wei Shen and Jihai Jiang | ||
| An Approximate Calculation Method for Eigenvector Centrality Measure of Complex Network | 4445-4450 |
|
| Cai-Hua Li, Shi-Ze Guo, Zhe-Ming Lu and Guang-Yu Kang | ||
| Point Pattern Matching Algorithm with O(nlogn) Time | 4451-4456 |
|
| Xiaoyun Wang, Fangyuan Qin, Lianyuan Jiang, Zhenjun Tang and Xianquan Zhang | ||
| On the Performance of Option Pricing Models under Bounded Stretch Parameter | 4457-4465 |
|
| Po-yuan Chen | ||
| Robust Watermarking Algorithm Based on Improved Hilbert-Huang Transformation | 4467-4472 |
|
| Minghui Deng, Qingshuang Zeng and Sibo Li | ||
| Modeling and Resolving Lock Contention for Multi-Threaded Systems | 4473-4478 |
|
| Yang Zhang and Shahnawaz Talpur | ||
| Fire Detection by Static Image Characteristics of the Light Blue Flame Using ROI-Based Color Intensity Composition Detection Algorithm | 4479-4486 |
|
| Aung Kyaw Soe and Xianku Zhang | ||
| Iterative Algorithms for Solving Three-Order Approximative Algebraic Equation Based on Homotopy Analysis Method | 4487-4494 |
|
| Guangming Zhou and Pingmin Zhu | ||
| An Approach to the Reduct Problem Using Axiomatic Fuzzy Sets Theory | 4495-4502 |
|
| Angelo Dan Menga Ebonzo and Xiaodong Liu | ||
| A Coarse-to-Fine Correction Method for Seriously Oblique Remote Sensing Image | 4503-4509 |
|
| Chunyuan Wang, Yanfeng Gu and Ye Zhang | ||
| Early Warning System for Tobacco Warehouse Based on Wireless Sensor Networks | 4511-4518 |
|
| Wei Qu, Yongyi Zhao, Bingyang Shang and Bo Song | ||
| Set Pair Community Situation Analysis and Dynamic Mining Algorithms of Web Social Network | 4519-4524 |
|
| Chunying Zhang, Jingfeng Guo and Ruitao Liang | ||
| Generalized Gaussian Support Vector Regression | 4525-4534 |
|
| Meng Zhang, Shaoquan Yu and Lihua Fu | ||
| Fragments Based Tracking Method with Robust and Adaptive Mean Shift | 4535-4540 |
|
| Ruxi Xiang, Jianwei Li and Xuchu Wang | ||
| An Adaptive H-infinity Synchronization Scheme for Secure Communication | 4541-4546 |
|
| Xiejin Liu, Wei Xiang and Yugao Huangfu | ||
| MiRNA Prediction Algorithm Based on Geodesic Distance | 4547-4551 |
|
| Baowen Wang, Xiaoyan Feng,Changwu Wang and Wenyuan Liu | ||
| Direct Routh Approximation Method for Order Reduction of Discrete-Time Interval Systems | 4553-4558 |
|
| M. Sivakumar and N. Vijaya Anand |