| Home | Editorial Board | Aims & Scope | Information for Authors | Subscription | ICIC-EL | IJICIC |
| A New Method for Absolute Value Equations Based on Harmony Search Algorithm | 1231-1236 |
|
| Longquan Yong, Sanyang Liu, Shemin Zhang and Fang'an Deng | ||
| A Prediction-Correction Method for Co-Coercive Variational Inequality Problems with Separable Operators in Traffic Assignment Problems | 1237-1243 |
|
| Li Yue, Min Sun and Jihuan Ding | ||
| Faults Diagnosis Based on Support Vector Machines with Parameters Optimization | 1245-1252 |
|
| Chenghua Shi, Yapeng Wang and Honglei Zhang | ||
| An Effective Attack Classification Scheme for Intrusion Detection Systems Using Bayesian Analysis Techniques | 1253-1259 |
|
| Shuyue Wu, Jie Yu, Xiaoping Fan and Xiaodong Tang | ||
| A Method for Attribute Reduction Using Rough Set Theory and Improved Particle Swarm Optimization | 1261-1266 |
|
| Xingwen Liu, Dianhong Wang, Liangxiao Jiang and Fenxiong Chen | ||
| Digital Acceleration Control Method for Path Tracking Control of an Autonomous Mobile Robot | 1267-1272 |
|
| Yina Wang, Shuoyu Wang, Renpeng Tan and Yinlai Jiang | ||
| A Parallel-MLFMA Method with the Domain Decomposition | 1273-1278 |
|
| Xingang Wang, Bin Cheng and Weiqin Tong | ||
| A Text Classifier Based on Cloud Model | 1279-1284 |
|
| Yixing Liao, Xuezeng Pan and Wenyu Zhang | ||
| Bayesian Network Learning for the Medicine Aid Diagnosis Analysis | 1285-1290 |
|
| Jianfei Zhang, Shuangcheng Wang, Lijun Tian and Ning Wang | ||
| An Experimental Investigation of the Competition Impact on Risk Attitude | 1291-1295 |
|
| Meiping Huang, Xianyu Wang, Yingsheng Su and Huan Zhang | ||
| Image Encryption Using Mapping Array and Random Division | 1297-1302 |
|
| Zhenjun Tang, Weiwei Lan, Yumin Dai and Jinzhen He | ||
| A Novel Quantum-Inspired Evolutionary Algorithm Based on EDA | 1303-1308 |
|
| Jie Qian | ||
| Combining PSO and Iterative MUSIC Searching DOA Estimation for the CDMA System | 1309-1314 |
|
| Jhih-Chung Chang and Ann-Chen Chang | ||
| Simulation for Disassembly Planning of Used-Product in Reverse Supply Chain | 1315-1320 |
|
| Qiaolun Gu and Tiegang Gao | ||
| Research and Application of Multi-Embedded System Cooperative Control for Plate Leveler | 1321-1326 |
|
| Hongjie Li, Qingxue Huang, Xiulian Gong, Changjiang Ju, Jianmei Wang and Liye Fu | ||
| Personalized Information Retrieval in Specific Domain | 1327-1332 |
|
| Chunyan Liang | ||
| Engineering Project Risk Rating Based on Matter-Element Model and Extension Analysis | 1333-1337 |
|
| Cunbin Li, Yang Yang, Wenjun Chen and Zhe Du | ||
| The Study of the Nuclear Power Economic Evaluation Index System Based on RBF Neural Network | 1339-1344 |
|
| Jicheng Liu, Yajuan Yang and Suhua Wang | ||
| Low-Carbon Contribution Effects Analysis Model of Power Supply Enterprises Based on Fuzzy Comprehensive Assessment Method and Its Application | 1345-1350 |
|
| Ming Zeng, Chunwu Chen, Qingyu Liu and Xiaoli Zhu | ||
| Investment Pattern and Economics Benefits Analysis of Distributed Generation | 1351-1356 |
|
| Ming Zeng, Zhiwei Ma, Hongzhi Liu and Kun Zhang | ||
| Government Investment Projects Collusion Supervision Based on the Prospect Theory | 1357-1362 |
|
| Yunna Wu, Yisheng Yang, Tiantian Feng, Lirong Liu and Ruhang Xu | ||
| Digital Plant Colony Modeling Based on 3D Digitization | 1363-1367 |
|
| Boxiang Xiao, Weiliang Wen, Xinyu Guo and Shenglian Lu | ||
| Automatic Transmission Idling Control Based on Discrete-Time Sliding Mode Controller | 1369-1374 |
|
| Guangqiang Wu and Leilei Wang | ||
| Performance Evaluation of Batch Median for Simulation Output Analysis | 1375-1380 |
|
| Zhan Bao, Peng Shi and Ming Yang | ||
| Quantitative Analysis on Core Frame Structure in Large-Scale Software | 1381-1386 |
|
| Hui Li, Hai Zhao, Jiuqiang Xu, Wei Cai and Jun Ai | ||
| Data Selection Algorithm for LVCSR's Semi-Supervised Incremental Learning | 1387-1392 |
|
| Haifeng Li, Tian Zhang, Lin Ma and Maozu Guo | ||
| A Strong RFID Authentication Protocol Based on Quadratic Residues and Key Array | 1393-1398 |
|
| Xiuwei Xuan, Jianfu Teng and Yu Bai | ||
| On the Security of Improved Low-Computation Partially Blind Signatures | 1399-1405 |
|
| Hsiu-Feng Lin, Chiou-Yueh Gun and Chih-Ying Chen | ||
| A Fine-Grained Access Control Scheme for Secure Video Multicast | 1407-1412 |
|
| Lo-Yao Yeh, Jee-Gong Chang and Yi-Lang Tsai | ||
| Integrating the CART and Support Vector Machines Approach for Information Disclosure Prediction | 1413-1418 |
|
| Der-Jang Chi, Ching-Chiang Yeh, Ming-Cheng Lai and Lon-Fon Shieh | ||
| Setpoint Filters for Minimizing Overshoot for Low Order Processes | 1419-1425 |
|
| V. Vijayan, C. Selvakumar and Rames C. Panda | ||
| Knee Pain Detection Technology Using Magnetic Resonance Images | 1427-1432 |
|
| Tun Chang Lu, Wan-Chun Liu, Chao-Hsing Hsu, Chung-Lain Lu and Yi-Nung Chung | ||
| A Multi-Objective Evolutionary Algorithm for Reverse Logistics Network Design | 1433-1438 |
|
| Bo He and He Huang | ||
| A Prediction-Based Data Collection Method in Wireless Sensor Network Using Kalman Filter | 1439-1446 |
|
| Yunsheng Liu and Zheng Wang | ||
| Non-Fragile H-infinity Filtering for a Class of Sampled-Data System with Long Time-Delay | 1447-1452 |
|
| Shi-gang Wang, Jun-feng Wu |