| Home | Editorial Board | Aims & Scope | Information for Authors | Subscription | ICIC-ELB | IJICIC |
| Exponential Stability of Switched Linear Systems with Mixed Time Delays | 2101-2109 |
|
| El Houssaine Tissir | ||
| The New Iterative Learning Control Algorithm Based on Vector Rotation for Discrete Time Systems | 2111-2117 |
|
| Guangwei Xu and Cheng Shao | ||
| Solving Combinatorial Optimization Problems by a Discrete Gravitational Search Algorithm | 2119-2127 |
|
| Shangce Gao and Zheng Tang | ||
| Adaptive Fuzzy Backstepping Control for a Class of Nonlinear Plants Preceded by Unknown Hysteresis | 2129-2135 |
|
| Dezhi Feng, Huaguang Zhang and Ning Cao | ||
| Solving Fuzzy Optimization Problems Using alpha-Cuts | 2137-2142 |
|
| Hassan Mishast Nehi and Ali Daryab | ||
| An Automatic Container Tracking System with the Application of Passive Electronic Seals and EPCglobal Network | 2143-2148 |
|
| Chien-Wen Shen, Ming-Town Lee, James Perng and Carrie Wen | ||
| Observer-Based Dynamic Feedback Control under Communication Constraints | 2149-2156 |
|
| Qing-Quan Liu | ||
| An Adaptive Target Tracking Scheme for Wireless Sensor Networks | 2157-2163 |
|
| Qingzheng Xu and Lei Wang | ||
| On the Minimal Siphons and Deadlock Prevention in the Petri Net Model of the Dining Philosopher's Problem | 2165-2171 |
|
| ChunFu Zhong and ZhiWu Li | ||
| Design and Implementation of the Network Information Filtering System | 2173-2178 |
|
| Yuguo Liu and Zhenfang Zhu | ||
| Hidden Information Rate of Information Hiding System Based on Spread Spectrum with Covariance Matrix Shaping | 2179-2184 |
|
| Bin Yan and Yin-Jing Guo | ||
| Measuring IP Repetition in Kademlia-Based Networks | 2185-2191 |
|
| Xiangtao Liu, Kai Cai, Jingyuan Li and Xueqi Cheng | ||
| Efficient Dynamic ID-Based Authentication for User Anonymity | 2193-2197 |
|
| Kuo-Ching Liu, Hui-Feng Huang and Hui-Fang Chen | ||
| Reliability Analysis of a Two-Unit Basic Model with a Repairman Who Operates a Single Vacation | 2199-2206 |
|
| Renbin Liu and Zaiming Liu | ||
| Artificial Bee Colony Algorithm for Multilevel Minimum Variance Thresholding | 2207-2213 |
|
| Shu-Chien Huang | ||
| Economic Order Quality Model with Immediate Return for Defective Items | 2215-2220 |
|
| Wen-Kai Hsu and Hong-Fwu Yu | ||
| Stability of Model-Based Networked System with Quantized Feedback | 2221-2228 |
|
| Zhiwen Wang, Wei Pan and Ge Guo | ||
| Research on Pricing and Coordination in Dual-Channel Supply Chain with Business Reputation | 2229-2234 |
|
| Hui Ma, Deli Yang and Jianjun Wang | ||
| Existence and Global Asymptotical Stability of Anti-Periodic Solution for Hopfield Neural Networks with Unbounded and Non-Lipschitz Activations | 2235-2241 |
|
| Hongwen Xu, Huaiqin Wu and Chongyang Wu | ||
| Trading Method of Total Permitted Pollution Discharge Capacity Based on Multi-Attribute Auction | 2243-2250 |
|
| Congjun Rao, Yong Zhao and Xinlin Wu | ||
| Block-Based Reversible Data Hiding | 2251-2255 |
|
| Ching-Yu Yang, Chih-Hung Lin and Wu-Chih Hu | ||
| A Distributed Group Rekeying Scheme Based on Trusted Computing | 2257-2262 |
|
| Minmin Liu, Shixin Sun and Jing Liu | ||
| A Unified Point of View for Pole Placement Formulas in Single-Input LTI Systems through the Analytical Solution of Lyapunov-Sylvester Equation | 2263-2268 |
|
| Jose Mario Araujo and Carlos Eduardo Trabuco Dorea | ||
| Risk-Driven Web Services Selection Based on Stochastic QoS | 2269-2274 |
|
| Xiaodong Fu, Kun Yue, Ping Zou and Feng Wang | ||
| Constant Quality Control of Wyner-Ziv Frames in DCT Domain Distributed Video Coding | 2275-2280 |
|
| Hongbin Liu, Debin Zhao, Siwei Ma and Wen Gao | ||
| Solving Multiobjective Bilevel Linear Programming by Multi-Parent Genetic Algorithm | 2281-2286 |
|
| Liping Jia, Yuping Wang and Ning Dong | ||
| SA Based Software Deployment Reliability Estimation Considering Component Reliability | 2287-2291 |
|
| Xihong Su, Hongwei Liu, Zhibo Wu, Xiaozong Yang and Decheng Zuo | ||
| Robust Stabilization of Nonlinear Uncertain Systems by Dynamic Output Feedback | 2293-2298 |
|
| Jianxiong Li, Yiming Fang, Shengli Shi and Ru Chang | ||
| A Multi-Objective Evolutionary Algorithm for Minimal Visual Coverage Path Problem in Raster Terrain | 2299-2304 |
|
| Jie Li, Changwen Zheng and Xiaohui Hu | ||
| Exact Observability and Exact Detectability of Discrete Stochastic Systems and Its Application | 2305-2311 |
|
| Huiying Sun and Meng Li | ||
| Spectral Clustering via Locality Sensitive Discriminant Information | 2313-2318 |
|
| Chunming Xu | ||
| An Innovative Certificate-Free Signature Algorithm by Bilinear Parings on Elliptic Curve | 2319-2325 |
|
| Wenxue Tan and Xiping Wang | ||
| A Descent Decomposition Method for Solving a Class of Variational Inequalities in Equilibrium Modeling | 2327-2332 |
|
| Min Sun | ||
| Method of Improved Bayes Discriminant for Multi-Sensors Data Fusion | 2333-2339 |
|
| Shuping Wan | ||
| A New Entropy Formula on Intuitionistic Fuzzy Sets | 2341-2345 |
|
| Teng-San Shih and Jin-Shieh Su | ||
| A General Method of Function Projective Synchronization with Parameter Perturbation | 2347-2352 |
|
| Hongyue Du, Feng Li and Libin Gong | ||
| A Novel Approach of Quantum Transmission Security Algorithm with Repetition Code | 2353-2358 |
|
| Skander Aris, Abderraouf Messai, Malek Benslama, Nadjim Merabtine and Mosleh M. Elharti | ||
| An Adaptive Color Fusion Method for Infrared and Visible Images | 2359-2364 |
|
| Weihua He, Yongcai Guo and Chao Gao | ||
| Intelligent Decision System Rescuing Calls with Short Lengths Facing a Handover Failure in Mobile Satellite Networks | 2365-2370 |
|
| Wassila Kiamouche and Malek Benslama | ||
| Delay-Dividing Approach for Absolute Stability of Time-Delay Lurie Control System | 2371-2376 |
|
| Yanhong Jiang, Bin Yang and Cheng Shao | ||
| Reliability Analysis of the Repair Facility for an N-Unit Series System with an Unreliable Repair Facility and Multiple Vacations | 2377-2384 |
|
| Zaiming Liu and Renbin Liu | ||
| Using Easy Methods to Derive the EPQ Model with Shortages and Variable Lead Time | 2385-2388 |
|
| Yung-Fu Huang, Kuo-Lung Hou, Kuang-Hua Hsu and Ming-Hon Hwang | ||
| A Self-Organizing Fuzzy CMAC Model for Classification Applications | 2389-2393 |
|
| Chun-Cheng Peng and Cheng-Jian Lin | ||
| Security Enhancement on an Exquisite Authenticated Key Agreement Scheme Using Smart Cards | 2395-2400 |
|
| Jeng-Ping Lin and Jih-Ming Fu |