Home | Editorial Board | Aims & Scope | Information for Authors | Subscription | ICIC-EL | IJICIC |
Extending Fuzzy Soft Sets with Fuzzy Description Logics | 1001-1007 |
|
Wenxiang Gu, Guoyuan Li and Minghao Yin | ||
A Block-Based MGM for Object Detection in Complex Scenes | 1009-1014 |
|
Hongguang Sun, Bingnan Shang, Shuhua Liu and Chao Fang | ||
A New Qualitative Spatial Reasoning Model for Natural Language Understanding | 1015-1020 |
|
Xiaohua Song and Dantong Ouyang | ||
An Out-of-Core Model for Large Terrain Based on Right-Triangle Irregular Network | 1021-1026 |
|
Huijie Zhang, Zhiqiang Ma, Ming Zhang, Hongguang Sun and Yanwen Li | ||
The Robust Synchronization Problem of Complex Dynamical Networks | 1027-1032 |
|
Jingwei Deng, Kaiying Deng, Yingxing Li and Tieli Sun | ||
A Complete Coverage Path Planning Based on Boustrophedon and Grassfire | 1033-1038 |
|
Shuhua Liu, Lu Yin, XueMin Sun, Xue Yang and Hongguang Sun | ||
A Fast Improved KNN Algorithm Based on the Tree Structure | 1039-1044 |
|
Fengqin Yang, Xu Zhou, Di Wu and Tieli Sun | ||
Full Lifecycle Resource Protection in Composite Web Service with XACML | 1045-1050 |
|
Ziyi Su and Frederique Biennier | ||
Reconstruction Attack for Randomized Graph via Link Prediction | 1051-1056 |
|
Riming Zhang, Wanyang Xie, Shanshan Wang, Zhiguo Zhou and Tieying Zhu | ||
The Provenance Analysis Based on Self-Organizing Neural Network Improved by Immune Algorithm | 1057-1062 |
|
Yunliang Yu, Ye Bai, Tingting Zhang and Xin Wang | ||
Neighborhood Pixel Grayscale Ratio Method for Weak Low-Contrast Target Recognition | 1063-1068 |
|
Xiaoxin Sun and Tieli Sun | ||
An Architecture for Mobile P2P File Sharing Services | 1069-1074 |
|
Bo Li, Yiding Wang, Jian Zhang, Baole Niu, Xiulin Huang, Zhiqiang Ma and Guifu Yang | ||
Improving the B3LYP Absorption Energies by Using the Neural Network Ensemble and K-Nearest Neighbor Approach | 1075-1080 |
|
Hui Li, Yinghua Lu, Zhiguo Zhou and Ting Gao | ||
An Improved Mapping Algorithm of Cube Panorama Based on PV3D | 1081-1086 |
|
Zhiguo Zhou, Chunyan Deng, Liyan Pang and Congying Xu | ||
Verilog Combinational Equivalence Checking Based on SMT Constraint Solver | 1087-1092 |
|
Hailin Zeng, Dantong Ouyang, Yuehua Zhang, Liming Zhang and Guiling Zhang | ||
Semantic Preprocessing for Deep Web Query Interface Based on Instance | 1093-1098 |
|
Yunge Mao, Jian Chen and Hao Liang | ||
Research on Ontology-Based Short Text Classification | 1099-1104 |
|
Yingjie Jiang, Tieli Sun, Huai Pan and Di Wu | ||
Applications of Schema Theory in E-Commerce Teaching | 1105-1110 |
|
Wei Zhao, Chunyan Qiu and Tiezheng Sun | ||
A Novel Attention Model for Salient Object Detection in Videos | 1111-1116 |
|
Jun Kong, Yanxiao Qi and Miao Qi | ||
An Improved KNN Algorithm Based on Multi-Attribute Classification | 1117-1122 |
|
Hongliang Zhang, Liangjun Li, Tienan Li and Feng Yang | ||
A Knowledge-Driven Approach for Document Clustering | 1123-1129 |
|
Xiquan Yang, Lin Yue, Chang Liu, Caifeng Zou and Yukun Tian | ||
Comparison Study of Integrated Evolutionary Computing Algorithms in Serial and in Parallel | 1131-1136 |
|
Yanwen Li, Renchu Guan, Zhiqiang Ma, Huijie Zhang, Zhiguo Zhou, Yanchun Liang and Xiaohu Shi | ||
Image Based Rendering of Chinese Painting | 1137-1142 |
|
Yi Cao and Zhengxuan Wang | ||
Rough Description Logics with Concrete Domain | 1143-1149 |
|
Lei Liu, Tingting Zou and Shuai Lv | ||
Detection User's Long-Term Interest Based on Ebbinghaus Forgetting Carve | 1151-1155 |
|
Na Luo and Fuyu Yuan | ||
K-Means Clustering Algorithm Based on Equilibrium Restrictions in the Vehicle Routing Problem | 1157-1162 |
|
Guangcai Cui and Shengping Tao | ||
An Improved Approach to Compute Semantic Similarity Based on Ontology | 1163-1167 |
|
Tieli Sun, Siya Chen, Di Wu, Fengqin Yang and Qian Yin | ||
Particle Filter Guided SVM Based Visual Tracking | 1169-1174 |
|
Yuru Wang, Jingbo Zhang and Ting Gao | ||
Multi-Exposure Images Matching Based on Improved SIFT | 1175-1180 |
|
Ming Zhang, Jiehua Hu, Caixia Zheng and Jianzhong Wang | ||
Dissipative Output-Feedback Controller Design for Discrete-Time Systems with Nonlinear Perturbation | 1181-1187 |
|
You Zhang, Zhiqiang Ma, Wenfeng Han and Ming Zhang | ||
Eliminating Repeated Constraint Checks in MaxRPC Algorithms | 1189-1194 |
|
Jinsong Guo, Zhanshan Li, Liang Zhang and Xuena Geng | ||
Knowledge-Chip: A Novel Approach to Personalized e-Learning Service Provision | 1195-1200 |
|
Yanlin Zheng and Luyi Li | ||
Accurate Prediction of Absorption Energies Based on Principal Component Analysis and Neural Network | 1201-1206 |
|
Ting Gao, Hui Li and Ying-Hua Lu | ||
GSM Network Optimization Based on SOFM Neural Network | 1207-1212 |
|
Yiran Cao, Yanwen Li, Xiaohu Shi, Renchu Guan and Yanchun Liang | ||
Reversible Data Hiding for BTC-Compressed Color Images Using Difference Expansion | 1213-1218 |
|
Zhi-Fang Chen, Yu-Xin Su and Zhe-Ming Lu | ||
Adaptive Total Variation Model for Image Inpainting and Denoising | 1219-1224 |
|
Zhaolin Lu, Jiansheng Qian and Leida Li | ||
Invariant Feature Based Image Watermarking Resistent to Geometric Distortions | 1225-1230 |
|
Leida Li, Jianying Zhang and Jiansheng Qian |