| Home | Editorial Board | Aims & Scope | Information for Authors | Subscription | ICIC-ELB | IJICIC |
| Easy Tuning of Robust PID Controllers Based on the Design-Oriented Sine Wave Type Identification | 563-572 |
|
| Stefan Bucz, Ladislav Maric, Ladislav Harsanyi and Vojtech Vesely | ||
| Comprehensive Evaluation of Software Understandability | 573-577 |
|
| Jin-Cherng Lin and Kuo-Chiang Wu | ||
| Unknown Different Parameters Perturbation Based on LMI | 579-585 |
|
| M. H. Refan, M. Sha Sadeghi and M. Sojoodi | ||
| Stabilization of 2D Discrete Saturated Systems by State Feedback Control | 587-593 |
|
| Abdellah Benzaouia, Fouad Mesquine, Mohamed Benhayoun, Abdelaziz Hmamed and Fernando Tadeo | ||
| Wavelet-Based Hemodynamic Analyzing Method for fMRI Data | 595-600 |
|
| Sen Liu, Jiexin Pu, Hongyi Zhang and Li Zhao | ||
| Target Tracking Algorithm in the Presence of Unknown Noise | 601-606 |
|
| Yong Shi and Chongzhao Han | ||
| Bayesian Filtering Algorithm on the Measurement Noise Contamination | 607-612 |
|
| Yingchun Song, Shenying Hui, Jie Liu and Dongfang Lin | ||
| Modified Projective Synchronization of Uncertain Chaotic Systems with Input Dead-Zone Nonlinearities | 613-619 |
|
| Fang Zhu, Wei Xiang and Zhifeng Gao | ||
| Fuzzy Clustering Image Segmentation Based on PSO | 621-626 |
|
| Yong Zhang, Ying Mi and Dan Huang | ||
| A Novel Service Architecture for Data-Center Networks | 627-632 |
|
| Hengkui Wu, Deyun Gao, Fuhong Lin and Hongke Zhang | ||
| The Study of Vehicle Existence Detection Based on Inter-Frame Similarity Evaluation Algorithm | 633-637 |
|
| Yan Liu, Yaping Dai and Zhongjian Dai | ||
| Delay-Dependent Stability of Discrete-Time for a Class of Networked Control System: Switched System Approach | 639-645 |
|
| Ming Wang and Hongyan Chu | ||
| Fuzzy Action Association Rules Mining | 647-653 |
|
| Jian Hu and Jinhua Sun | ||
| Unsupervised Anomalous Behavior Detection Using Spatial-Temporal Interest Points | 655-660 |
|
| Xudong Zhu and Zhijing Liu | ||
| A Design of Adaptive Track Controller for Underwater Vehicle | 661-666 |
|
| Xin Song and Zao-Jian Zou | ||
| FECG Extraction Using Wavelet Denoising and Neural Networks Approach | 667-673 |
|
| Ying Yin, Mao Ye, Yuanxiang Zhu and Dongxiao Ren | ||
| An Enhanced-Security Fair Payment Protocol Based on Mobile Agent | 675-679 |
|
| Changwu Wang, Xiuxian Zheng, Yali Si and Wenyuan Liu | ||
| The Divisible E-Cash Based on ECC with Direct Computation | 681-685 |
|
| Baowen Wang, Jiuhong Wang, Yali Si and Wenyuan Liu | ||
| Towards an Efficient DHT-Based Identifier-to-Locator Separation Approach | 687-691 |
|
| Hengkui Wu, Deyun Gao, Dong Yang and Hongke Zhang | ||
| Control of Chaotic Systems by Chaotic Social Cognitive Optimization | 693-699 |
|
| Jianke Zhang, Sanyang Liu, Yanping Chen and Rongxi Wang | ||
| A Set of Machine Learning Methods for Inducing Translation Templates with Grammar-Semantic Type Constraints | 701-706 |
|
| Jiexu Hun, Yu Cao and Xiaowei Guan | ||
| Adaptive Control for a Class of Nonlinear Pure-Feedback Systems Based on Partition of Unity Back-Stepping Approach | 707-712 |
|
| Liang Luo, Yinhe Wang, Yongqing Fan and Yun Zhang | ||
| Images Segmentation with Improved PCNN by Differential Evolution | 713-717 |
|
| Changming Zhu, Haibo Liu, Jing Shen, Guochang Gu, Jun Ni and Yanbo Li | ||
| A General Decrementing Service Policy in the Geom/G/1 Queueing Model with Multiple Adaptive Vacations | 719-726 |
|
| Caimin Wei, Zongbao Zou and Jianjun Wang | ||
| A New Similarity Degree of Digital Watermarks | 727-731 |
|
| Li Li, David Zhang and Liuzhao Ruan | ||
| Image Data Field Model for Edge Detection | 733-739 |
|
| Tao Wu and Yan Gao | ||
| Nonlinear Filtering Approaches Based Pose, Motion and Variable Focal Length Estimation in Monocular Active Vision | 741-745 |
|
| Xuedong Wu, Yaonan Wang and Zhiyu Zhu | ||
| Extending Phrased-Based SMT with Dependency Based Reordering Model | 747-752 |
|
| Shui Liu, Sheng Li, Tiejun Zhao and Shiqi Li | ||
| Efficient Identity-Based Authenticated Multiple Key Exchange Protocol Based on Elliptic Curve Pairings | 753-758 |
|
| Zuowen Tan | ||
| A Retrial Queue with Batch Arrivals, J Vacations and Server Breakdowns | 759-765 |
|
| Peishu Chen, Yijuan Zhu and Weicai Peng | ||
| Adaptive Fuzzy Control Design of Ship's Autopilot with Rudder Dynamics | 767-773 |
|
| Cheng Liu, Tieshan Li and Naxin Chen | ||
| Interior Point Algorithms for Monotone Linear Complementarity Problem | 775-781 |
|
| Longquan Yong | ||
| LMI Condition of Robust D Stability for Singular Systems with Polytopic Uncertainties | 783-789 |
|
| Jianjun Bai, Hongye Su and Jinfeng Gao | ||
| Trust Reasoning and Optimization Based on Associate Petri Net | 791-796 |
|
| Xianwen Fang, Chungang Yan, Xiaoqin Fan and Zhixiang Yin | ||
| A Top-Down Algorithm for Finding Principal Curves from Complex Patterns Data | 797-802 |
|
| Hongyun Zhang, Duoqian Miao and Chen Xie | ||
| Provably Semi-Statically Secure Broadcast Signcryption Scheme with Small Ciphertext | 803-808 |
|
| Ximing Li, Bo Yang and Mingwu Zhang | ||
| On the Improvements of Particle Swarm Optimization for Global Optimization | 809-815 |
|
| Chunxia Yang and Nuo Wang | ||
| Experimental Study of a New Self-Adaptive Stator Flux Linkage Observer | 817-822 |
|
| Haifeng Wei and Hongping Jia | ||
| Improved Wavelet-Based Contourlet Transform and Its Application to Image Fusion | 823-828 |
|
| Chun-hai Hu and Pai Zhang | ||
| A Solution to Blind Flooding and Space Contention Problems in Ad Hoc Wireless Network | 829-834 |
|
| Jianwei Liao | ||
| Dense Sigma Set Representation for Pedestrian Detection | 835-840 |
|
| Xiaopeng Hong, Hong Chang, Shiguang Shan, Xilin Chen and Wen Gao | ||
| Generalized Difference Matrix-Based Attribute Reduction Algorithm | 841-846 |
|
| Yitian Xu, Zhiquan Qi and Laisheng Wang | ||
| Dependent Source Signals Separation Using Cook's NonGaussianity Measure | 847-852 |
|
| Keying Liu, Rui Li and Fasong Wang | ||
| Ontology Mapping Negotiation Based on an Extended Value-Based Argumentation Framework | 853-858 |
|
| Ying Wang, Rubo Zhang and Jibao Lai | ||
| Scale Saliency Based Synchronization for Invariant Image Watermarking | 859-864 |
|
| Leida Li and Jeng-Shyang Pan | ||
| Threshold Selection Based on Fuzzy Tsallis Entropy and Differential Evolution Algorithm | 865-871 |
|
| Fangyan Nie, Chao Gao, Yongcai Guo and Min Gan | ||
| A New (lambda, gamma, alpha )-Type Strong Convex Function and Its Differentiability for Convex Analysis | 873-877 |
|
| Yanfang Lv | ||
| Hiding Data Reversibility in a Palette Image | 879-885 |
|
| Shu-Chien Huang and Yih-Kai Lin | ||
| An Empirical Study of Constructing a Logistics Service Quality Model of B2C Internet Store | 887-892 |
|
| Bing Zheng, Yunfu Huo and Yujun Feng |