| Home | Editorial Board | Aims & Scope | Information for Authors | Subscription | ICIC-ELB | IJICIC |
| The Research of Stock Forecasting Based on Wavelet Denoising and BP-RBF Combination Neural Network | 1981-1986 |
|
| Rui Shan, Haibo Dai, Fei Jin and Jinxia Wei | ||
| Hessian-LoG: A Novel Dot Enhancement Filter | 1987-1992 |
|
| Zhenghao Shi, Minghua Zhao, Yinghui Wang, Lifeng He, Kenji Suzuki, Chenwang Jin and Ming Zhang | ||
| Rain Removal from Video Using Dark Channel Prior and Guided Filter | 1993-1998 |
|
| Jing Xu, Wei Zhao, Peng Liu and Xianglong Tang | ||
| An Improved Harmony Search Algorithm for Absolute Value Equations with Normal Distribution | 1999-2004 |
|
| Longquan Yong, Yan Zhu, Guanghua Zhang and Tao Zhou | ||
| Comparison of Wavelet, Contourlet and Dual-Tree Complex Wavelet for Palmprint Recognition | 2005-2010 |
|
| Xiaopeng Wei, Jianyang Liu, Jianxin Zhang and Qiang Zhang | ||
| Generalized Interval-Valued Intuitionistic Trapezoidal Fuzzy Correlated Weighted Averaging Operator by Means of Choquet Integrals and Its Application to Multiple Attribute Decision Making | 2011-2017 |
|
| Hongchun Sun and Min Sun | ||
| Option-Based Modelling of Technology Choices and Bank Performance | 2019-2024 |
|
| Wei-Ming Hung and Jyh-Horng Lin | ||
| Design and Implementation of ZigBee Network Layer Protocol Based on Embedded ARM/TinyOS Platform | 2025-2031 |
|
| Quanli Liu, Guangen Gao, Gang Li and Wei Wang | ||
| Aspect Ratio Invariant Visual Cryptography Scheme with Flexible Size Expansion | 2033-2038 |
|
| Peng Li, Pei-Jun Ma and Dong Li | ||
| Nonlinear Dynamics in Heterogeneous Cournot Duopoly with Risk-Averse Agent | 2039-2044 |
|
| Ruiwu Yu and Renbin Xiao | ||
| Efficient ECC-Based Key Management Scheme for Secure Multicast in Heterogeneous Sensor Networks | 2045-2050 |
|
| Chin-I Lee, Tzong-Chen Wu, Hung-Yu Chien and Kuo-Yu Tsai | ||
| Further Cryptanalysis of Huang-Wei's Efficient Remote User Authentication Scheme with Smart Cards | 2051-2056 |
|
| Wen-Gong Shieh and Wen-Bing Horng | ||
| An Efficient Ant Colony Optimization for Real Parameter Optimization | 2057-2063 |
|
| Li-Qing Zhao, Zi-Xuan Luo, Zhi-Qiang Chen and Rong-Long Wang | ||
| Finite Memory Filtering for Power Control in Broadband Wireless Data Networks | 2065-2070 |
|
| Pyung Soo Kim | ||
| Modeling and Analysis for Availability Management of P2P Storage Systems with Eager Repair Policy | 2071-2078 |
|
| Shunfu Jin and Lingling Chen | ||
| Approach for Building Ontology Automatically Based on Wikipedia | 2079-2084 |
|
| Tianji Wu, Kui Xiao and Xiaohu Tan | ||
| A Haptic Bimanual Interface for 3D B-Spline Curve Manipulation | 2085-2089 |
|
| Zhan Gao, Jiehua Wang and Xiang Gu | ||
| Reliability Analysis of Embedded Software System Considering Component Reliability of Weibull Distribution | 2091-2097 |
|
| Tao Liu, Zhenzhou Ji, Qing Wang and Suxia Zhu | ||
| One-Pass Testing Algorithm for Solving Underflow and Overflow Problems in Reversible Watermarking | 2099-2104 |
|
| Te-Cheng Hsu, Cheng-Yeh Chen, Wen-Shyong Hsieh, Nan-Tung Chen and John Y. Chiang | ||
| A One-Parameter Family of Intuitionistic Fuzzy Entropy Based on Cosine Function | 2105-2111 |
|
| Jing Liu and Min Sun | ||
| A Simple Unifying Approach of Designing the Sinusoidal Oscillator | 2113-2117 |
|
| Chung-Cheng Chen, Ting-Li Chien, Ying-Chen Chen, Kuan-Yu Chou and Yi-Hsiang Tseng | ||
| Resource Reservation Based on Relaxed Strategy in Network Computing Systems | 2119-2124 |
|
| Peng Xiao, Ning Han and Zhe Huang | ||
| Quantized Feedback Control of Linear Quadratic Gaussian Systems under Communication Constraints | 2125-2131 |
|
| Fang Jin, Qing-Quan Liu and Gui-Hong Tao | ||
| Particle Swarm Optimization with Neighborhood Search for Multimodal Optimization Problems | 2133-2140 |
|
| Dingcai Shen, Yuanxiang Li and Yu Sun | ||
| Cross-Language Speech Emotion Recognition in German and Chinese | 2141-2146 |
|
| Chengwei Huang, Dong Han, Yongqiang Bao, Hua Yu and Li Zhao | ||
| The Precision for Fluid Flow Model of Window-Size Behavior of the Transmission Control Protocol | 2147-2152 |
|
| Hui Wang, Zhenzhou Ji, Huijie Qiao and Yandong Sun | ||
| Optimal Control Problems for the Stochastic SIR Model under Vaccination | 2153-2160 |
|
| Masaaki Ishikawa | ||
| New Results on Robust H-infinity Control for Markovian Jump Linear Systems with Time-Delay | 2161-2166 |
|
| Xiang Teng | ||
| Soap Header Extensions for Cross Domain SaaS Security | 2167-2172 |
|
| Yangpeng Zhu, Jing Zhang and Junhuai Li | ||
| Route Selection for Dangerous Goods Transportation under Uncertain Environment | 2173-2178 |
|
| Daijun Wei, Bingyi Kang and Yong Deng | ||
| Pyramid Difference Reversible Image Watermarking Scheme | 2179-2184 |
|
| Chien-Chang Chen | ||
| New Admissibility Condition of Discrete-Time Singular Systems with Commensurate Delays | 2185-2190 |
|
| Yongyun Shao, Xiaodong Liu and Xin Sun | ||
| Collision Analysis of Human Visual System Based Image Hashing | 2191-2196 |
|
| Zhenjun Tang, Xianquan Zhang and Zhixin Li | ||
| Forecasting Enrollments Based on Fuzzy-Trend of Axiomatic Fuzzy Set Membership Degrees | 2197-2204 |
|
| Lili Tao, Xiaodong Liu and Yan Chen | ||
| Solution Algorithm for Unit Commitment | 2205-2210 |
|
| Takayuki Shiina | ||
| A New Simple Thermoelectric Temperature Controlled Box System | 2211-2218 |
|
| Hsin-Hung Chang, Fu-Tai Wang and Chung-Cheng Chen |