FULL PAPERS | ||
Verification for Commonality or Specificity of Brain Representations Related to the Different Evaluation Criteria | 1553 |
|
Keita Mitani and Yukinobu Hoshino DOI: 10.24507/ijicic.14.05.1553 | Full Text | |
Modeling Parallel Business Process Using Modified Time-Based Alpha Miner | 1565 |
|
Yutika Amelia Effendi and Riyanarto Sarno DOI: 10.24507/ijicic.14.05.1565 | Full Text | |
The Data-Driven Fuzzy Cognitive Map Model and Its Application to Prediction of Time Series | 1583 |
|
Dan Shan, Wei Lu and Jianhua Yang DOI: 10.24507/ijicic.14.05.1583 | Full Text | |
Optimized Memory Allocator for Hot-Size Allocations | 1603 |
|
Xiuhong Li and Gulila Altenbek DOI: 10.24507/ijicic.14.05.1603 | Full Text | |
Finite-Time State Tracking Control with Unmeasured State and Various Boundaries | 1617 |
|
Dongsheng Chen, Zhiqiang Wang and Jian Li DOI: 10.24507/ijicic.14.05.1617 | Full Text | |
Outlier Detection with Enhanced Angle-Based Outlier Factor in High-Dimensional Data Stream | 1633 |
|
Zhaoyu Shou, Hao Tian, Simin Li and Fengbo Zou DOI: 10.24507/ijicic.14.05.1633 | Full Text | |
A Price-Based Mechanism for Online Buyer Coalition by Genetic Algorithms | 1653 |
|
Anon Sukstrienwong DOI: 10.24507/ijicic.14.05.1653 | Full Text | |
On the Stability of Two New Recursive 2D-Roesser-Based Discrete Models with Spatial and Time Delays | 1681 |
|
Manuel De la Sen and Asier Ibeas DOI: 10.24507/ijicic.14.05.1681 | Full Text | |
Efficient Serial Concatenation of Symbol by Symbol and Word by Word Decoders | 1709 |
|
Said Nouh and Bouchaib Aylaj DOI: 10.24507/ijicic.14.05.1709 | Full Text | |
Three-Dimensional Adaptive Dynamic Surface Guidance Law against Maneuvering Targets with Input Constraints and Second-Order Dynamics Autopilot | 1725 |
|
Lijing Wang, Weizhi Jin and Guiying Li DOI: 10.24507/ijicic.14.05.1725 | Full Text | |
A Small Direct SC AC-AC Converter with Cascade Topology | 1741 |
|
Kei Eguchi, Farzin Asadi, Kyoka Kuwahara, Takaaki Ishibashi and Ichirou Oota DOI: 10.24507/ijicic.14.05.1741 | Full Text | |
A Real-Time Rolling Approach to Perceiving the Time Point of Possibly Abnormal Consumption of Oil | 1755 |
|
Lijun Sun, Fangfang Li, Yaxian Zhou, Yunchan Feng and Xiangpei Hu DOI: 10.24507/ijicic.14.05.1755 | Full Text | |
A Fuzzy Model for Chaotic Time Series Prediction | 1767 |
|
Matiwos Nigusie Alemu DOI: 10.24507/ijicic.14.05.1767 | Full Text | |
The Performance of Adaptive Tuning Piecewise Cubic Hermite Interpolation Model for Signal-to-Noise Ratio Estimation | 1787 |
|
Kok Swee Sim, Zhi Xuan Yeap, Fung Fung Ting and Chih Ping Tso DOI: 10.24507/ijicic.14.05.1787 | Full Text | |
Novel Double Integral Inequalities and Their Application to Stability of Delayed Systems | 1805 |
|
Xinge Liu, Qiaoling Xu, Xiaofan Liu, Meilan Tang and Fengxian Wang DOI: 10.24507/ijicic.14.05.1805 | Full Text | |
A Heuristic Algorithm Based on Expectation Efficiency for 0-1 Knapsack Problem | 1833 |
|
Lingling Zhang and Jianhui Lv DOI: 10.24507/ijicic.14.05.1833 | Full Text | |
Visual Object Tracking with Saliency Refiner and Adaptive Updating | 1855 |
|
Wei Zhang, Baosheng Kang, Shunli Zhang and Mei Gao DOI: 10.24507/ijicic.14.05.1855 | Full Text | |
Improved Bat Algorithm with Novel Search Mechanism and One-Dimensional Perturbation Local Search Strategy | 1877 |
|
Haibo Zhu, Yukun Wang and Yong Zhang DOI: 10.24507/ijicic.14.05.1877 | Full Text | |
Indonesian Text Document Similarity Detection System Using Rabin-Karp and Confix-Stripping Algorithms | 1893 |
|
Deardo Dibrianto Sinaga and Seng Hansun DOI: 10.24507/ijicic.14.05.1893 | Full Text | |
Mathematical Models at the Olympic Games to Predict Road Events | 1905 |
|
Marylu Garcia Galvan, Arnulfo Luevanos Rojas, Sandra Lopez Chavarria, Manuel Medina Elizondo, Jose Benito Rivera Mendoza Arturo Manuel Galindo Borrego, Gabriel Aguilera Mancilla and Jorge Luis Vazquez Lundez DOI: 10.24507/ijicic.14.05.1905 | Full Text | |
Incremental Fuzzy Sliding Mode Control of Pneumatic Muscle Actuators | 1917 |
|
Chia-Jui Chiang and Ying-Chen Chen DOI: 10.24507/ijicic.14.05.1917 | Full Text | |
Characteristic Similarity of Production Key Elements Greatly Affecting Profit of a Productive Business | 1929 |
|
Kenji Shirai and Yoshinori Amano DOI: 10.24507/ijicic.14.05.1929 | Full Text | |
Authentication Method in Software-Defined Network Based on Ciphertext-Policy Attributes Encryption | 1947 |
|
Ali Alshahrani, Khaled Suwais and Basil Alkasasbeh DOI: 10.24507/ijicic.14.05.1947 | Full Text | |
SHORT PAPERS | ||
Parameter Estimation for the Three-Parameter Burr-XII Distribution under Accelerated Life Testing with Type I Censoring Using Particle Swarm Optimization Algorithm | 1959 |
|
Hua Xin, Jianping Zhu and Tzong-Ru Tsai DOI: 10.24507/ijicic.14.05.1959 | Full Text | |
Video Resolution Enhancement Using Deep Neural Networks and Intensity Based Registrations | 1969 |
|
Gholamreza Anbarjafari DOI: 10.24507/ijicic.14.05.1969 | Full Text |