Spatiotemporal LBP and Shape Feature for Human Activity Representation and Recognition | 1 |
|
Sk. Md. Masudul Ahsan, Joo Kooi Tan, Hyoungseop Kim and Seiji Ishikawa DOI: 10.24507/ijicic.12.01.1 | Full Text | |
S-REITs' Performance Forecast Using a Small Sample Model Associating Support Vector Machine with Vector Auto-Regression Model | 15 |
|
Xianning Wang, Xue Xiao and Zhi Xiao DOI: 10.24507/ijicic.12.01.15 | Full Text | |
A Mathematical Model of Elastic Curve for Simply Supported Beams Subjected to a Concentrated Load Taking into Account the Shear Deformations | 41 |
|
Arnulfo Luevanos Rojas, Sandra Lopez Chavarria, Manuel Medina Elizondo and Vitaly V. Kalashnikov DOI: 10.24507/ijicic.12.01.41 | Full Text | |
New Investigations into the MFS for 2D Inverse Laplace Problems | 55 |
|
Fuzhang Wang and Juan Zhang DOI: 10.24507/ijicic.12.01.55 | Full Text | |
A Dynamic Bandwidth Management Scheme for High-Speed Networks | 67 |
|
Jui-Pin Yang and Yi-Chang Zhuang DOI: 10.24507/ijicic.12.01.67 | Full Text | |
Dynamics for a Stochastic Two-Species Competitive Model of Plankton Alleopathy | 77 |
|
Yueling Guo DOI: 10.24507/ijicic.12.01.77 | Full Text | |
Mutual Exclusion Role Constraint Mining Based on Weight in Role-Based Access Control System | 91 |
|
Xiaopu Ma, Jianfang Wang, Li Zhao and Ruixuan Li DOI: 10.24507/ijicic.12.01.91 | Full Text | |
The Immune Fuzzy PID Stripper Temperature Control Algorithm Based on Chaotic Optimization | 103 |
|
Shuzhi Gao, Xiaofeng Wu, Guicheng Wang and Guoguang Zhang DOI: 10.24507/ijicic.12.01.103 | Full Text | |
A New Inpainting Method for Object Removal Based on Patch Local Feature and Sparse Representation | 113 |
|
Lei Zhang, Baosheng Kang, Benting Liu and Zhenhua Bao DOI: 10.24507/ijicic.12.01.113 | Full Text | |
Analysis of Production Processes Using a Lead-Time Function | 125 |
|
Kenji Shirai and Yoshinori Amano DOI: 10.24507/ijicic.12.01.125 | Full Text | |
High-Performance Information Processing in Distributed Computing Systems | 139 |
|
Valery Skliarov, Artjom Rjabov, Iouliia Skliarova and Alexander Sudnitson DOI: 10.24507/ijicic.12.01.139 | Full Text | |
Robust Controller Design with Hard Input Constraints. Time Domain Approach | 161 |
|
Vojtech Vesely and Adrian Ilka DOI: 10.24507/ijicic.12.01.161 | Full Text | |
Characteristics Approach of Thin-Film CIGS PV Cells with Conventional Mono-Crystalline Silicon Model | 171 |
|
Syafaruddin, Faizal Arya Samman, Alfian, Muh. Aksa Idris, Siti Hamnah Ahsan and Satriani Latief DOI: 10.24507/ijicic.12.01.171 | Full Text | |
Single Input Fuzzy Logic Controller for Flexible Joint Manipulator | 181 |
|
Mohd Riduwan Ghazali, Zuwairie Ibrahim, Mohd Helmi Suid, Muhammad Salihin Saealal and Mohd Zaidi Mohd Tumari DOI: 10.24507/ijicic.12.01.181 | Full Text | |
Self-Repairing PI/PID Control against Sensor Failures | 193 |
|
Masanori Takahashi DOI: 10.24507/ijicic.12.01.193 | Full Text | |
Solving a Class of Quadratic Programs with Linear Complementarity Constraints via a Majorized Penalty Approach | 203 |
|
Shiyun Wang, Yong-Jin Liu and Li Wang DOI: 10.24507/ijicic.12.01.203 | Full Text | |
Optimal Nodes Combination of a Wavelet Packet Tree for Phonocardiogram Signal Analysis | 215 |
|
Lotfi Hamza Cherif and Sidi Mohammed Debbal DOI: 10.24507/ijicic.12.01.215 | Full Text | |
Joint Estimation of Parameters, States and Time Delay Based on Singular Pencil Model | 225 |
|
Shiwen Tong, Dianwei Qian and Jianjun Fang DOI: 10.24507/ijicic.12.01.225 | Full Text | |
Load-Aware Based Independent Information Services for Heterogeneous Handover | 243 |
|
Yihan Xu, Jun Song, Junhui Li, Gin-Xian Kok and Keisuke Utsu DOI: 10.24507/ijicic.12.01.243 | Full Text | |
MR-ECOCD: An Edge Clustering Algorithm for Overlapping Community Detection on Large-Scale Network Using MapReduce | 263 |
|
Haitao He, Peng Zhang, Jun Dong and Jiadong Ren DOI: 10.24507/ijicic.12.01.263 | Full Text | |
Approaches to Multiple Attribute Group Decision Making with Multi-Granularity Linguistic Term Sets | 275 |
|
Xueyang Zhang and Zhoujing Wang DOI: 10.24507/ijicic.12.01.275 | Full Text | |
Resource Allocation Algorithm for Power Line Communication System with Imperfect CSI | 293 |
|
Yaohui Wu, Youming Li and Liping Jin DOI: 10.24507/ijicic.12.01.293 | Full Text | |
A Novel Analysis Approach of Quantum Transmission Algorithm with Blind Detection Method | 307 |
|
Skander Aris, Abderraouf Messai, Nadjim Merabtine, Malek Benslama and Al-Ani Kinan DOI: 10.24507/ijicic.12.01.307 | Full Text | |
Design of a Robust H-infinity Controller for a Load-Frequency Power System | 321 |
|
Betania G. da S. Filha, Alexandre C. de Castro, Fernando A. Moreira and Jose Mario Araujo DOI: 10.24507/ijicic.12.01.321 | Full Text | |
The Role of Imputation in Detecting Fraudulent Financial Reporting | 333 |
|
Stephen Obakeng Moepya, Sharat Saurabh Akhoury, Fulufhelo Vincent Nelwamondo and Bhekisipho Twala DOI: 10.24507/ijicic.12.01.333 | Full Text |