FULL PAPERS | ||
Human Detection Using Color Contrast-Based Histograms of Oriented Gradients | 1211 |
|
Ryo Matsumura and Akitoshi Hanazawa DOI: 10.24507/ijicic.15.04.1211 | Full Text | |
Overhead Crane: An Adaptive Particle Filter for Anti-Sway Closed-Loop and Collision Detection Using Computer Vision | 1223 |
|
Roberto Paolo Luigi Caporali DOI: 10.24507/ijicic.15.04.1223 | Full Text | |
Fuzzy Least Absolute Regression Analysis Based on Mellin Transforms | 1243 |
|
Qiyong Chen and Yanbing Gong DOI: 10.24507/ijicic.15.04.1243 | Full Text | |
Integrated Fault Estimation and Fault-Tolerant Control for Rigid Spacecraft Attitude System with Multiple Actuator Faults | 1255 |
|
Xiaobo Zhang, Zhifeng Gao, Moshu Qian and Lang Bai DOI: 10.24507/ijicic.15.04.1255 | Full Text | |
An SDN-Based Measurement Scheme to Build Delay Database for Time-Sensitive Network Scheduling | 1271 |
|
Zhengyi Jia, Jinlin Wang, Xiao Chen, Yiqiang Sheng and Kang Zheng DOI: 10.24507/ijicic.15.04.1271 | Full Text | |
Query Method for Nearest Region of Spatial Line Segment Based on Hilbert Curve Grid | 1287 |
|
Liping Zhang, Lingling Ren, Xiaohong Hao and Song Li DOI: 10.24507/ijicic.15.04.1287 | Full Text | |
Face Recognition Using Shearlets Edges Fusion | 1309 |
|
Huixian Yang, Weifa Gan, Fan Chen and Xiaoxiao Li DOI: 10.24507/ijicic.15.04.1309 | Full Text | |
Time and Frequency Components Analysis of Network Traffic Data Using Continuous Wavelet Transform to Detect Anomalies | 1323 |
|
Mohammed Alharbi and Marwan Ali Albahar DOI: 10.24507/ijicic.15.04.1323 | Full Text | |
Combining Projection Algorithm and Scenario Approach for Virtual Reference Feedback Tuning Control | 1337 |
|
Hong Jiang and Jianhong Wang DOI: 10.24507/ijicic.15.04.1337 | Full Text | |
Early Stopping Fault Diagnosis Agreement on Wireless Sensor Network of IoT | 1351 |
|
Shu-Ching Wang, Wei-Shu Hsiung, Mao-Lun Chiang and Yao-Te Tsai DOI: 10.24507/ijicic.15.04.1351 | Full Text | |
Robust Gain Scheduled Controller Design with Hard Input Constraints. Frequency Domain Approach | 1365 |
|
Vojtech Vesely, Jakub Osusky and Danica Rosinova DOI: 10.24507/ijicic.15.04.1365 | Full Text | |
Prediction of Network Protocol Data Flow Based on a Recurrent Neural Network | 1381 |
|
Yuan Wang, Xiao Chen and Xiaozhou Ye DOI: 10.24507/ijicic.15.04.1381 | Full Text | |
Car-Following Model: A Computer-Vision-Based Calibration Method | 1397 |
|
Fergyanto Efendy Gunawan DOI: 10.24507/ijicic.15.04.1397 | Full Text | |
Cyberspace Attack Detection Based on Advanced Initialized Recurrent Neural Network | 1413 |
|
Chaopeng Li, Yiqiang Sheng and Jinlin Wang DOI: 10.24507/ijicic.15.04.1413 | Full Text | |
Study on Centroid Type-Reduction of General Type-2 Fuzzy Logic Systems with Enhanced Opposite Direction Searching Algorithms | 1425 |
|
Yang Chen DOI: 10.24507/ijicic.15.04.1425 | Full Text | |
Iris Features via Fractal Functions for Authentication Protocols | 1441 |
|
Nadia M. G. Al-Saidi, Arkan J. Mohammed, Razi J. Al-Azawi and Aqeel H. Ali DOI: 10.24507/ijicic.15.04.1441 | Full Text | |
Modularity Maximization for Community Detection in Networks Using Competitive Hopfield Neural Network | 1455 |
|
Jin Ding, Yongzhi Sun, Ping Tan and Yong Ning DOI: 10.24507/ijicic.15.04.1455 | Full Text | |
Static Output Feedback Controller for Continuous-Time Fuzzy Systems | 1469 |
|
Redouane Chaibi, El Houssaine Tissir, Abdelaziz Hmamed, El Mostafa El Adel and Mustapha Ouladsine DOI: 10.24507/ijicic.15.04.1469 | Full Text | |
An Adaptive VMD Method Based on Improved GOA to Extract Early Fault Feature of Rolling Bearings | 1485 |
|
Chengjiang Zhou, Jun Ma, Jiande Wu and Xuyi Yuan DOI: 10.24507/ijicic.15.04.1485 | Full Text | |
BBM Algorithm for Signed Mixed Domination in Cartesian Product of Cycles | 1507 |
|
Hong Gao, Enmao Liu, Yuansheng Yang and Wei Liu DOI: 10.24507/ijicic.15.04.1507 | Full Text | |
The Effect of Stimulus Pattern, Color Combination and Flicker Frequency on Steady-State Visual Evoked Potentials Topography | 1521 |
|
Kazuhiko Goto, Takenao Sugi, Hiroki Fukuda, Takao Yamasaki, Shozo Tobimatsu and Yoshinobu Goto DOI: 10.24507/ijicic.15.04.1521 | Full Text | |
A Risk Pre-Warning Mechanism of Chinese High-Tech Industries Based on International Intellectual Property Barriers | 1531 |
|
Yan Zhang, Minghao Jin and Xiaofan Li DOI: 10.24507/ijicic.15.04.1531 | Full Text | |
An Improved Pupil Localization Technique for Real-Time Video-Oculography under Extreme Eyelid Occlusion | 1547 |
|
Sunu Wibirama, Igi Ardiyanto, Thoriq Satriya, Teguh Bharata Adji, Noor Akhmad Setiawan and Muhammad Taufiq Setiawan DOI: 10.24507/ijicic.15.04.1547 | Full Text | |
An Efficient Matrix Embedding Technique by Using Submatrix Transform for Grayscale Images | 1565 |
|
Hsi-Yuan Chang, Jyun-Jie Wang, Chi-Yuan Lin and Chin-Hsing Chen DOI: 10.24507/ijicic.15.04.1565 | Full Text | |
SHORT PAPERS | ||
A Novel Classification & Repairing Framework for Irregular Model Reconstruction Using Mass Point Clouds Based on Fuzzy Inference | 1581 |
|
Yanju Liu, Huiyu Zhang, Cheng Li, Honglie Zhang and Jiaxing Liu DOI: 10.24507/ijicic.15.04.1581 | Full Text | |
Research on Automatic Computational Model of Technology Life Cycle Based on Domain Ontology | 1591 |
|
Yao Liu, Qian Zhang and Yi Huang DOI: 10.24507/ijicic.15.04.1591 | Full Text | |
Newsvendor System Neglect Revisited Using an Enhanced Normative Method | 1601 |
|
Zhiru Juan, Haiyan Wang and An-Jin Shie DOI: 10.24507/ijicic.15.04.1601 | Full Text |