ISSN 2185-2766
ICIC Express Letters, Part B: Applications
An International Journal of Research and Surveys



Home
Editorial Board
Aims & Scope
Information for Authors
Subscription
ICIC-EL
IJICIC


Volume 2, Issue 6, December 2011

A New Method for Absolute Value Equations Based on Harmony Search Algorithm
1231-1236
Longquan Yong, Sanyang Liu, Shemin Zhang and Fang'an Deng




A Prediction-Correction Method for Co-Coercive Variational Inequality Problems with Separable Operators in Traffic Assignment Problems
1237-1243
Li Yue, Min Sun and Jihuan Ding




Faults Diagnosis Based on Support Vector Machines with Parameters Optimization
1245-1252
Chenghua Shi, Yapeng Wang and Honglei Zhang




An Effective Attack Classification Scheme for Intrusion Detection Systems Using Bayesian Analysis Techniques
1253-1259
Shuyue Wu, Jie Yu, Xiaoping Fan and Xiaodong Tang




A Method for Attribute Reduction Using Rough Set Theory and Improved Particle Swarm Optimization
1261-1266
Xingwen Liu, Dianhong Wang, Liangxiao Jiang and Fenxiong Chen




Digital Acceleration Control Method for Path Tracking Control of an Autonomous Mobile Robot
1267-1272
Yina Wang, Shuoyu Wang, Renpeng Tan and Yinlai Jiang




A Parallel-MLFMA Method with the Domain Decomposition
1273-1278
Xingang Wang, Bin Cheng and Weiqin Tong




A Text Classifier Based on Cloud Model
1279-1284
Yixing Liao, Xuezeng Pan and Wenyu Zhang




Bayesian Network Learning for the Medicine Aid Diagnosis Analysis
1285-1290
Jianfei Zhang, Shuangcheng Wang, Lijun Tian and Ning Wang




An Experimental Investigation of the Competition Impact on Risk Attitude
1291-1295
Meiping Huang, Xianyu Wang, Yingsheng Su and Huan Zhang




Image Encryption Using Mapping Array and Random Division
1297-1302
Zhenjun Tang, Weiwei Lan, Yumin Dai and Jinzhen He




A Novel Quantum-Inspired Evolutionary Algorithm Based on EDA
1303-1308
Jie Qian




Combining PSO and Iterative MUSIC Searching DOA Estimation for the CDMA System
1309-1314
Jhih-Chung Chang and Ann-Chen Chang




Simulation for Disassembly Planning of Used-Product in Reverse Supply Chain
1315-1320
Qiaolun Gu and Tiegang Gao




Research and Application of Multi-Embedded System Cooperative Control for Plate Leveler
1321-1326
Hongjie Li, Qingxue Huang, Xiulian Gong, Changjiang Ju, Jianmei Wang and Liye Fu




Personalized Information Retrieval in Specific Domain
1327-1332
Chunyan Liang




Engineering Project Risk Rating Based on Matter-Element Model and Extension Analysis
1333-1337
Cunbin Li, Yang Yang, Wenjun Chen and Zhe Du




The Study of the Nuclear Power Economic Evaluation Index System Based on RBF Neural Network
1339-1344
Jicheng Liu, Yajuan Yang and Suhua Wang




Low-Carbon Contribution Effects Analysis Model of Power Supply Enterprises Based on Fuzzy Comprehensive Assessment Method and Its Application
1345-1350
Ming Zeng, Chunwu Chen, Qingyu Liu and Xiaoli Zhu




Investment Pattern and Economics Benefits Analysis of Distributed Generation
1351-1356
Ming Zeng, Zhiwei Ma, Hongzhi Liu and Kun Zhang




Government Investment Projects Collusion Supervision Based on the Prospect Theory
1357-1362
Yunna Wu, Yisheng Yang, Tiantian Feng, Lirong Liu and Ruhang Xu




Digital Plant Colony Modeling Based on 3D Digitization
1363-1367
Boxiang Xiao, Weiliang Wen, Xinyu Guo and Shenglian Lu




Automatic Transmission Idling Control Based on Discrete-Time Sliding Mode Controller
1369-1374
Guangqiang Wu and Leilei Wang




Performance Evaluation of Batch Median for Simulation Output Analysis
1375-1380
Zhan Bao, Peng Shi and Ming Yang




Quantitative Analysis on Core Frame Structure in Large-Scale Software
1381-1386
Hui Li, Hai Zhao, Jiuqiang Xu, Wei Cai and Jun Ai




Data Selection Algorithm for LVCSR's Semi-Supervised Incremental Learning
1387-1392
Haifeng Li, Tian Zhang, Lin Ma and Maozu Guo




A Strong RFID Authentication Protocol Based on Quadratic Residues and Key Array
1393-1398
Xiuwei Xuan, Jianfu Teng and Yu Bai




On the Security of Improved Low-Computation Partially Blind Signatures
1399-1405
Hsiu-Feng Lin, Chiou-Yueh Gun and Chih-Ying Chen




A Fine-Grained Access Control Scheme for Secure Video Multicast
1407-1412
Lo-Yao Yeh, Jee-Gong Chang and Yi-Lang Tsai




Integrating the CART and Support Vector Machines Approach for Information Disclosure Prediction
1413-1418
Der-Jang Chi, Ching-Chiang Yeh, Ming-Cheng Lai and Lon-Fon Shieh




Setpoint Filters for Minimizing Overshoot for Low Order Processes
1419-1425
V. Vijayan, C. Selvakumar and Rames C. Panda




Knee Pain Detection Technology Using Magnetic Resonance Images
1427-1432
Tun Chang Lu, Wan-Chun Liu, Chao-Hsing Hsu, Chung-Lain Lu and Yi-Nung Chung




A Multi-Objective Evolutionary Algorithm for Reverse Logistics Network Design
1433-1438
Bo He and He Huang




A Prediction-Based Data Collection Method in Wireless Sensor Network Using Kalman Filter
1439-1446
Yunsheng Liu and Zheng Wang




Non-Fragile H-infinity Filtering for a Class of Sampled-Data System with Long Time-Delay
1447-1452
Shi-gang Wang, Jun-feng Wu





Copyright (c) Since 2010 ICIC International, All rights reserved.