| Home | Editorial Board | Aims & Scope | Information for Authors | Subscription | ICIC-ELB | IJICIC |
| Heuristic Algorithm Based on Discernibility Matrix for Generating all Reductions | 893-898 |
|
| Zhiguo Huang, Yuanxiang Li, Xiaoji Yang and Gang Liu | ||
| Incentive Design under Uncertainty in Tacit Knowledge Sharing | 899-904 |
|
| Gaoshan Wang and Xin Zhang | ||
| The Relationships Among IV-Similarity Measure, IV-Entropy and IV-Inclusion Measure of Interval-Valued Fuzzy Sets | 905-910 |
|
| Wenyi Zeng, Yibin Zhao and Ping Guo | ||
| Robust Actuator Fault Diagnosis and Tolerant Control for Satellite Attitude Control Systems | 911-918 |
|
| Yuehua Cheng, Bin Jiang, Jun Sun, Yanping Fu and Zhifeng Gao | ||
| Mining Frequent Closed Itemsets Based on Projection Array and Closed Itemsets Lattice | 919-924 |
|
| Haitao He, Haiyan Cao, Jiadong Ren and Changzhen Hu | ||
| A User Profile Injection Attack Detection Algorithm Based on Normal Cloud Model and PCA | 925-930 |
|
| Fuzhi Zhang, Dongyan Jia and Jinbo Chao | ||
| Dynamic Analysis and Simulation of Single-Closed-Loop Mechanism with a Screw Pair | 931-936 |
|
| Xijuan Guo and Yanping Fu | ||
| T-S Fuzzy Controller for a Class of Nonlinear Systems with Uncertainties and Disturbances | 937-943 |
|
| Hugang Han and Shoji Katagiri | ||
| Networked H-infinity Output Tracking Control Based on QoS | 945-952 |
|
| Jun Kang | ||
| The Parameterization of all Disturbance Observers for Plants with Any Input and Output Disturbances | 953-958 |
|
| Yoshinori Ando, Kou Yamada, Tatsuya Sakanushi, Takaaki Hagiwara, Nghia Thi Mai, Iwanori Murakami, Yuki Nakui and Hua Zhuang Lin | ||
| The Parameterization of all Robust Stabilizing Simple Repetitive Controllers with the Specified Input-Output Characteristic | 959-964 |
|
| Tatsuya Sakanushi, Kou Yamada, Takaaki Hagiwara, Yoshinori Ando, Iwanori Murakami and Shun Matsuura | ||
| A Design Method for Robust Stabilizing Multi-Period Repetitive Controllers for Time-Delay Plants with the Specified Input-Output Characteristic | 965-970 |
|
| Yoshinori Ando, Kou Yamada, Tatsuya Sakanushi, Nghia Thi Mai, Takaaki Hagiwara, Shun Yamamoto and Nhan Luong Thanh Nguyen | ||
| A Decomposition Approach for Identifying the Sources of Variance Shifts in a Multivariate Process | 971-975 |
|
| Yuehjen E. Shao, Chia-Ding Hou, Chien-Hui Chao and Ying-Jen Chen | ||
| Research on the Window-Expanded Query Algorithm Based on SABX-Tree | 977-983 |
|
| Yongshan Liu, Weijie Gu, Shiwei Gao and Hui Zhang | ||
| Rendezvous of Multi-Agents with Time Delay and Network Connectivity Preservation | 985-991 |
|
| Zhengquan Yang, Qing Zhang, Zuolian Jiang and Zengqiang Chen | ||
| Efficient ID-Based Online/Offline Encryption Scheme in the Standard Model | 993-998 |
|
| Yang Ming and Xiaoqin Shen | ||
| Non-Coding Background Sequences Modeling Based on Bayesian Hypothesis Testing | 999-1004 |
|
| Qian Liu, San-Yang Liu and Li-Fang Liu | ||
| A Novel Classification Based on Competitive Co-Evolutionary Algorithm | 1005-1010 |
|
| Ruihua Chang, Xiaodong Mu and Xiaowei Shen | ||
| Research on Semantic Method of Library Resources' Organizing | 1011-1017 |
|
| Yao Liu, Xue-Fei Chen, Zhifang Sui, Yongwei Hu and Qingliang Zhao | ||
| ITS Image De-Noising Integrated Model Based on Partial Differential Equation | 1019-1024 |
|
| Lixin Shen, Jing Liu, Shufang Xu, Changfeng Yuan and Tingting Tao | ||
| Knowledge Modeling and Semantic Retrieval for Traffic Information Based on Fuzzy Ontology and SPARQL | 1025-1029 |
|
| Jun Zhai, Yan Chen and Jianfeng Li | ||
| Time-Varying Sliding Mode Control for Air-Breathing Hypersonic Vehicles | 1031-1036 |
|
| Qunya Yin, Jianqiang Yi and Xiangmin Tan | ||
| A Study on the Integration of QFD-PMMM in Cloud Computing System Quality | 1037-1043 |
|
| Chih-Had Chen, Shing-Han Li, Mark Hwang and Jang-Ruey Tzeng | ||
| An Efficient Heuristic Scheduling Algorithm for Optimal Job Allocation in Computational Grids | 1045-1050 |
|
| Wanneng Shu, Lixin Ding and Shenwen Wang | ||
| Relation Extraction Based on Multi-View Ensemble Algorithm | 1051-1056 |
|
| Jing Qiu, Liehuang Zhu and Junkang Hao | ||
| Aggregation of Interval Numbers in Group Decision Making | 1057-1062 |
|
| Yong Deng, Jiyi Wu, Xiaohong Sun, Peida Xu and Yajuan Zhang | ||
| Using PCA for Predicting Protein Subcellular Localization of Gram-Negative Bacteria Based on Pseudo Amino Acid Composition | 1063-1068 |
|
| Yanhong Wang, Chaobing He, Lidong Wang, Zhao Wang, Jiang Tian and Junwei Ma | ||
| FMLKNN: A Fuzzy Membership Function Based K-Nearest Neighbor Approach for Multi-Label Classification | 1069-1075 |
|
| Jung-Yi Jiang and Shie-Jue Lee | ||
| Synchronization of Spatiotemporal Chaos via Sliding Mode Control | 1077-1082 |
|
| Congyan Chen and Chengzhuan Jiang | ||
| Dynamic Environment Modeling and Path Planning for Mobile Robot | 1083-1088 |
|
| Wei-dong Chen, Yan-xiang Yang, Qi-guang Zhu and Chun-fang Wang | ||
| How to Measure Software Flexibility | 1089-1093 |
|
| Si-wei Peng, Li-min Shen and Hui Liu | ||
| Risk Assessment of Semiconductor Manufacturing Capacity Planning Based on Value-at-Risk Theory | 1095-1099 |
|
| Bo Li and Yang Cao | ||
| A Password Authentication Scheme with Forward Secrecy | 1101-1105 |
|
| Yung-Cheng Lee and Yi-Chih Hsieh | ||
| Fuzzy Identification Based on Monotonicity and Interval Type-2 Fuzzy Logic | 1107-1113 |
|
| Tiechao Wang, Jianqiang Yi and Chengdong Li | ||
| Predicting the Compressive Strength of Concrete Using Rebound Method and Artificial Neural Network | 1115-1120 |
|
| Jianming Liu, Huijian Li and Changjun He | ||
| Concrete Compressive Strength Prediction Using Rebound and Core Drilling Synthetic Method through Artificial Neural Networks | 1121-1127 |
|
| Huijian Li, Jianming Liu and Changjun He | ||
| Design of a Trajectory Tracking Controller for Uncertain Nonlinear Systems via the Model-Deviation Compensation Strategy | 1129-1135 |
|
| Xiaojie Sun, Hua Ye and Shumin Fei | ||
| CFO Matrix Method and Performance Analysis for Carrier Frequency Offset Estimation in OFDMA Uplink | 1137-1144 |
|
| Ruiyan Du, Jinkuan Wang, Liqun Shan and Fulai Liu | ||
| Optimal Combination of Conflicting Evidence Based on Genetic Algorithm | 1145-1150 |
|
| Wen Jiang, Jinye Peng and Yong Deng | ||
| Expected Gain Based Early Warning for Real-Time Process Monitoring | 1151-1156 |
|
| Bokyoung Kang, Dongsoo Kim and Suk-Ho Kang | ||
| Network Intrusion Detection Using Neural Networks and Multi-Attribute Decision Making Method | 1157-1162 |
|
| Huayang Wu and Xin Guan | ||
| Robust Adaptive Neural Speed Tracking Control for the Induction Motor Drive System | 1163-1169 |
|
| Jinpeng Yu, Yumei Ma, Bing Chen, Haisheng Yu and Songfeng Pan | ||
| A Novel Algorithm for Motif Discovery | 1171-1176 |
|
| Zhiru Chen, Wenxue Hong, Lufang Tian and Changwu Wang | ||
| Class Information Couple with Free Combination of Stem for Predicting RNA Secondary Structure | 1177-1182 |
|
| Changwu Wang, Tao Liu, Yongwei Jia, Baowen Wang and Wenyuan Liu | ||
| A Second-Order Cone Programming Method for the Design of FIR Filters with Discrete Coefficients | 1183-1189 |
|
| Xuewen Mu and Yaling Zhang | ||
| Incentive Mechanism of Special Knowledge Sharing for Two Clients with Complementary Knowledge | 1191-1197 |
|
| Mingzheng Wang, Changyan Shao and Mengru Ma |