| Home | Editorial Board | Aims & Scope | Information for Authors | Subscription | ICIC-ELB | IJICIC |
| An Application of Machine Learning on the Network Security Model | 291-296 |
|
| Hai-Chen Wang, Xiang-Mo Zhao and Hai-Sheng Wang | ||
| Combining Ant Colony Optimization with Genetic Algorithm for Vehicle Routing Problem with Time Windows | 297-302 |
|
| Qiulei Ding, Xiangpei Hu and Yang Jiang | ||
| A New Method for Feature Selection of Radio Abnormal Signal | 303-309 |
|
| Xuan Zhou, Zheng Pei, Penghui Liu, Sen Zhao and Qiang Li | ||
| Fingerprint Prediction Using Statistical and Machine Learning Methods | 311-316 |
|
| Promise Molale, Bhekisipho Twala and Solly Seeletse | ||
| A Study on Visualization of Opening Flower Based on Morphological Model and L-System | 317-322 |
|
| Fuxi Shi and Jun Chen | ||
| Improved Center-Symmetric LTP Integrating with Color Histogram for Robust Mean Shift Tracking | 323-329 |
|
| Dan Zhang, Di Hou and Rong Xin | ||
| Multiple Failure Modes and Effects Analysis of Gas Turbine Based on Similarity Measure | 331-336 |
|
| Huadong Yang and Hong Xu | ||
| A Design Method for a Control System to Attenuate Unknown State Disturbances Using Disturbance Observers | 337-342 |
|
| Jie Hu, Kou Yamada, Tatsuya Sakanushi, Hongfei Wang, Yuki Nakui and Yusuke Atsuta | ||
| Real-Time Database Query Monitoring Method Using Vehicle Black Box Function | 343-348 |
|
| Young Ran Hong and Dongsoo Kim | ||
| A Comparative Study between Box-Jenkins and Artificial Neural Networks Modeling Schemes in Predictions of Taiwan's Currency | 349-353 |
|
| Yuehjen E. Shao and Wen Hao Lee | ||
| The Parameterization of all Multiple-Input/Multiple-Output Plants Stabilized by an Integral Controller | 355-360 |
|
| Takaaki Hagiwara, Kou Yamada, Satoshi Aoyama, An Chinh Hoang and Hui Huo | ||
| Fuzzy Multi-Characteristic Pattern Recognition Method Based on Rough Fuzzy Numbers | 361-367 |
|
| Yanhui Bi, Xiaodong Liu and Xinghua Feng | ||
| Background Net Approach for Text Categorization Based on Contextual Association as Term Co-Occurrence | 369-375 |
|
| Sio-Long Lo and Liya Ding | ||
| A Fuzzy Normal Estimation Method for Mass Point Clouds of Denture | 377-382 |
|
| Yanju Liu and Yongde Zhang | ||
| Modeling on Express Freight and Workforce Size Considering Service Quality and Delay Losses | 383-388 |
|
| Xuping Wang, Kai Yang and Zilai Sun | ||
| A Model for Cardinal Direction Relations in 3D Space | 389-395 |
|
| Miao Wang, Xiaole Liu and Yanju Liu | ||
| A Genetic Algorithm Approach for Planning Load Transfer Points in Primary Distribution Networks | 397-402 |
|
| Wei-tzer Huang, Kai-chao Yao, Der-fa Chen and Wen-chih Yang | ||
| Adaptive Synchronization for Two Nonlinearly Coupled Complex Dynamical Networks with Uncertain Parameters | 403-408 |
|
| Qing Zhang and Zhengquan Yang | ||
| Approximation Quality of Fuzzy Preference Rough Sets and Its Application in Radio Signal Recognition | 409-415 |
|
| Jie Yang, Zichun Chen, Zheng Pei, Penghui Liu and Xinzi Ma | ||
| Design MIMO Control Systems with Non-Gaussian Delays and Noises | 417-422 |
|
| Jianhua Zhang, Mifeng Ren, Guolian Hou and Mei Yu | ||
| A Novel Adaptive Neural Control for Uncertain Unified Chaotic Systems | 423-428 |
|
| Huanqing Wang, Bing Chen and Chong Lin | ||
| A New Method for Structure Equation Model Parameter Estimation | 429-433 |
|
| Jian-Jun Wang, Xiao-Cong Cui, Si-Yu Chen and Zhan Li | ||
| PSO-Based Specified Structure Mixed H2/H-infinity Multiple PHEV Controllers for Robust Frequency Control in Interconnected Power Systems with Large Wind Farms | 435-441 |
|
| Chalotorn Rattanapornchai and Issarachai Ngamroo | ||
| Depth Map Enhancement Based on Adaptive Joint Trilateral Filter | 443-448 |
|
| Li Li, Hua Yan and Youen Zhao | ||
| Assessing the Lifetime Performance of Rayleigh Products under Progressively Type II Right Censored Samples | 449-454 |
|
| Chin-Chuan Wu and Li-Ching Chen | ||
| Minkowski Sum Modeling of Polyhedra Based on VRML | 455-460 |
|
| Jianfei Zhang, Xijuan Guo and Qingjia Geng | ||
| An Efficient Collision Detection Algorithm of Convex Polygons Based on Minkowski Sum | 461-464 |
|
| Qingjia Geng, Xijuan Guo, Jianfei Zhang and Buying Zhang | ||
| An Improved Smooth Bayesian Classification Method on Text | 465-469 |
|
| Wei Wang, Shiqun Yin, Chao Liu and Miao Zhang | ||
| Scenario-Based Allocating of Relief Medical Supplies for Large-Scale Disasters | 471-478 |
|
| Junhu Ruan, Xuping Wang and Yan Shi | ||
| Knowledge and Data Engineering: Fuzzy Approach and Genetic Algorithms for Clustering Beta-Thalassemia of Knowledge Based Diagnosis Decision Support System | 479-484 |
|
| Patcharaporn Paokanta, Napat Harnpornchai, Nopasit Chakpitak, Somdet Srichairatanakool and Michele Ceccarelli | ||
| Concept Space Mining of Human-Thinking Simulated Control | 485-491 |
|
| Peijin Wang | ||
| A New Algorithm for Conflicting Evidence Based on Gray Correlation | 493-498 |
|
| Jia Jia, Wen Jiang, Zhenjian Li, Dejie Duanmu and Xin Fan | ||
| A Novel Weighted Combination Method of Conflicting Evidences | 499-504 |
|
| Dejie Duanmu, Wen Jiang, Xin Fan, Zhenjian Li and Cuicui Wu | ||
| Fault Diagnosis in Condition of Imbalanced Samples Using Candidate Set Relevance Vector Machine | 505-512 |
|
| Hui Yi, Yufang Liu, Guangming Zhang, Bin Jiang and Xiaofeng Song | ||
| LMI-Based Robust Fault-Tolerant Control for Networked Control Systems | 513-518 |
|
| Jianwei Liu, Bin Jiang, Ke Zhang and Zehui Mao | ||
| Feature Integration Using Principal Component Analysis for Heart Rate Variability Analysis | 519-526 |
|
| Chuan-Wei Ting and Ching-Yao Wang | ||
| An Agent-Based Approach for Software Self-Adaptation | 527-534 |
|
| Yu Zhou, Jidong Ge and Jun Hu | ||
| Microarray Missing Value Estimation by Local Bayesian Principal Component Analysis | 535-539 |
|
| Fanchi Meng and Cheng Cai | ||
| A New Approach to Cope with Software Evolution Using Knowware System Concepts | 541-546 |
|
| Ashok Swarnalatha and Liya Ding | ||
| Analysis and Disposal on Over Current Fault of Synchronous Motor with Parameter Differences | 547-552 |
|
| Jiesheng Wang and Zhenlong Xuan | ||
| Novel View for Fractional Fourier Transform and the Applications on Optical Image Encryption | 553-558 |
|
| Lin-Lin Tang and Jeng-Shyang Pan | ||
| Verification of Real-Time Models with Hierarchical Extensions | 559-564 |
|
| Yu Zhou and Zhiqiu Huang | ||
| Ladybird Skin Region Detection Based on Bayesian Classifier | 565-570 |
|
| Yongli Dai and Cheng Cai | ||
| Direct Chosen-Ciphertext-Attack Hierarchical Computing Technique for Identity-Based Encryption | 571-576 |
|
| Leyou Zhang, Qing Wu and Yupu Hu | ||
| Word Sense Disambiguation and Knowledge Discovery of English Modal Verb Can | 577-582 |
|
| Jianping Yu, Nan Chen, Rui Sun, Wenxue Hong and Shaoxiong Li | ||
| A Human-Robot Interaction Based Building Map Method on Aldebaran Nao | 583-587 |
|
| Shuhua Liu and Chih-Cheng Hung | ||
| The Study of Intelligent Traffic Control System Based on Ethernet | 589-594 |
|
| Wen-ge Ma, Hang Liu and Jin Yan |