| Home | Editorial Board | Aims & Scope | Information for Authors | Subscription | ICIC-ELB | IJICIC |
| Has CEPA Increased Stock Market Dependence between Hong Kong and China? The Application of Conditional Copula Technique | 2461-2466 |
|
| Chung-Chu Chuang and Jeff T. C. Lee | ||
| A Delegation-Based User Authentication Protocol in PCSs Providing a Fair Charging System in Telecom Services | 2467-2473 |
|
| Jeng-Ping Lin and Ren-Chiun Wang | ||
| Periodic Phenomenon in a Delayed HIV Model for Primary Infection | 2475-2480 |
|
| Kejun Zhuang | ||
| Return Contract with Imperfect Quality and Fuzzy Demand in a Two-Stage Supply Chain | 2481-2489 |
|
| Shengju Sang | ||
| Feedback Control of Quasi-Linear Parabolic Distributed Parameter Systems | 2491-2496 |
|
| Hailong Xing, Xiaozhu Zhong and Wenshan Cui | ||
| Research on Fuzzy Adaptive PI Speed Controller Based on GA in DTC System | 2497-2503 |
|
| Kai Xu, Shanchao Liu and Chuhong Liu | ||
| Study of Online Modeling of Earth Pressure in Chamber of Shield Tunneling Machine Based on LS-SVM | 2505-2510 |
|
| Xuanyu Liu, Mi Li and Limin Wang | ||
| The Enhanced Intuitionistic Fuzzy Entropy and Similarity Measures Based on Tangent Function and Their Application in Medical Diagnosis | 2511-2516 |
|
| Qidi Sui and Min Sun | ||
| The Robust H-infinity Control for a Class of Uncertain Neutral Singular Systems with Nonlinear Perturbations | 2517-2524 |
|
| Lianqing Su, Qing Fan, Jiqing Qiu, Xinguo An and Long Zhao | ||
| An Improved TOA Estimation in IR-UWB System | 2525-2530 |
|
| Fangqiu Wang, Xiaofei Zhang and Chen Chen | ||
| Similarity Measures Induced by Some Transformation Methods Based on Entropy Measures | 2531-2537 |
|
| Dewen Liu and Min Sun | ||
| A Feedback Linearization Current Control for Shunt Active Power Filter Using Sliding Mode Controller | 2539-2544 |
|
| Juntao Fei and Tianhua Li | ||
| Evaluation of Hand Gesture by Optical Flow Analysis | 2545-2550 |
|
| Siyu Bo and Xiaoping Cheng | ||
| Cellular Ant Algorithm for the Vehicle Routing Problem with Time Windows | 2551-2556 |
|
| Yuanzhi Wang | ||
| Forgery Detection in Surveillance Video Using Optical Flow Based Motion Analysis | 2557-2562 |
|
| Wei Zhang, Leida Li, Xuewei Wang and Jianping Li | ||
| Plagiarism Detection in Programming Exercises Using a Markov Model Approach | 2563-2568 |
|
| Tsung-Te Lin and Sho-Huan Tung | ||
| Constructing Knowledge Practices of Classifying Initial Public Offering Returns by Using a Hybrid Rule-Based Rough Set Classifier | 2569-2574 |
|
| You-Shyang Chen | ||
| A Reversible Data Hiding Scheme for JPEG Images | 2575-2580 |
|
| Xianquan Zhang, Chunqiang Yu, Xiaoyun Wang, Feng Ding and Zhenjun Tang | ||
| Parameter-Adaptive Image Segmentation Based on Variational Level Set Method | 2581-2585 |
|
| Jing Liu, Xiaomei Zhu and Chao Liu | ||
| Intuitionistic Fuzzy Normalized Ordered Weighted Geometric Bonferroni Mean Operator with Its Application in Talent Introduction | 2587-2593 |
|
| Li Yue and Min Sun | ||
| The Prediction and Simulation of Electric Vehicles and Fuel Vehicles Based on System Dynamics | 2595-2600 |
|
| Shuyong Liu, Shengwei Li, Tao Wang, Ming Zeng and Na Li | ||
| Partitioning the Universe of Discourse by Information Granule and Forecasting in Fuzzy Time Series | 2601-2607 |
|
| Lizhu Wang, Xiaodong Liu and Zhubin Sun | ||
| An Authorship Attribution Forensic Method for Web Information | 2609-2613 |
|
| Jianbin Ma, Ying Li, Guifa Teng and Yuxin Zhang | ||
| Multi-Focus Image Fusion Based on Nonsubsampled Contourlet Transform | 2615-2620 |
|
| Zhe Chen, Xuanmin Wang and Bayi Qu | ||
| A New Method of Identifying Influential Nodes in Complex Network Based on Evidence Theory | 2621-2626 |
|
| Cai Gao, Daijun Wei, Chuan Cui and Yong Deng | ||
| A Tracking Algorithm for Maneuvering Target Based on Improved Current Statistical Model | 2627-2632 |
|
| Guangjun He, Hang Lv, Bin Liu and Baoquan Li | ||
| Path Selection Scheme Based on Autonomous Learning | 2633-2638 |
|
| Chang Liu, Fei Song, Sidong Zhang and Huan Yan | ||
| A New Approach for Information Hiding in RGB Color Images with Improved PSNR and Hiding Capacity | 2639-2644 |
|
| Mamta Juneja and Parvinder Singh Sandhu | ||
| An Improved Robust and Efficient Level Set Algorithm for Image Segmentation | 2645-2651 |
|
| Haiying Liu and Binpeng Wang | ||
| Comments on "An SVD Audio Watermarking Approach Using Chaotic Encrypted Images" | 2653-2656 |
|
| Baiying Lei, Tianfu Wang, Siping Chen, Dong Ni and Haijun Lei | ||
| Boundary Control for a Class of Coupled ODE-HPDEs | 2657-2662 |
|
| Xiaoguang Li and Jinkun Liu | ||
| A 2GSample/s 8b Track-and-Hold Amplifier in 0.18mm SiGe BiCMOS Technology | 2663-2668 |
|
| Yi Zhang, Qiao Meng, Li Zhang and Wei Li | ||
| Conflicting Evidence Combination Based on Evidence Distance and Weighted Balance Evidence Theory | 2669-2674 |
|
| Shiyu Chen, Xinyang Deng, Chuan Cui and Yong Deng |