International Journal of Innovative Computing, Information and Control (IJICIC)
ISSN 1349-418X



Volume 15, Number 4, August 2019

FULL PAPERS

Human Detection Using Color Contrast-Based Histograms of Oriented Gradients
1211
Ryo Matsumura and Akitoshi Hanazawa
DOI: 10.24507/ijicic.15.04.1211

Full Text



Overhead Crane: An Adaptive Particle Filter for Anti-Sway Closed-Loop and Collision Detection Using Computer Vision
1223
Roberto Paolo Luigi Caporali
DOI: 10.24507/ijicic.15.04.1223

Full Text



Fuzzy Least Absolute Regression Analysis Based on Mellin Transforms
1243
Qiyong Chen and Yanbing Gong
DOI: 10.24507/ijicic.15.04.1243

Full Text



Integrated Fault Estimation and Fault-Tolerant Control for Rigid Spacecraft Attitude System with Multiple Actuator Faults
1255
Xiaobo Zhang, Zhifeng Gao, Moshu Qian and Lang Bai
DOI: 10.24507/ijicic.15.04.1255

Full Text



An SDN-Based Measurement Scheme to Build Delay Database for Time-Sensitive Network Scheduling
1271
Zhengyi Jia, Jinlin Wang, Xiao Chen, Yiqiang Sheng and Kang Zheng
DOI: 10.24507/ijicic.15.04.1271

Full Text



Query Method for Nearest Region of Spatial Line Segment Based on Hilbert Curve Grid
1287
Liping Zhang, Lingling Ren, Xiaohong Hao and Song Li
DOI: 10.24507/ijicic.15.04.1287

Full Text



Face Recognition Using Shearlets Edges Fusion
1309
Huixian Yang, Weifa Gan, Fan Chen and Xiaoxiao Li
DOI: 10.24507/ijicic.15.04.1309

Full Text



Time and Frequency Components Analysis of Network Traffic Data Using Continuous Wavelet Transform to Detect Anomalies
1323
Mohammed Alharbi and Marwan Ali Albahar
DOI: 10.24507/ijicic.15.04.1323

Full Text



Combining Projection Algorithm and Scenario Approach for Virtual Reference Feedback Tuning Control
1337
Hong Jiang and Jianhong Wang
DOI: 10.24507/ijicic.15.04.1337

Full Text



Early Stopping Fault Diagnosis Agreement on Wireless Sensor Network of IoT
1351
Shu-Ching Wang, Wei-Shu Hsiung, Mao-Lun Chiang and Yao-Te Tsai
DOI: 10.24507/ijicic.15.04.1351

Full Text



Robust Gain Scheduled Controller Design with Hard Input Constraints. Frequency Domain Approach
1365
Vojtech Vesely, Jakub Osusky and Danica Rosinova
DOI: 10.24507/ijicic.15.04.1365

Full Text



Prediction of Network Protocol Data Flow Based on a Recurrent Neural Network
1381
Yuan Wang, Xiao Chen and Xiaozhou Ye
DOI: 10.24507/ijicic.15.04.1381

Full Text



Car-Following Model: A Computer-Vision-Based Calibration Method
1397
Fergyanto Efendy Gunawan
DOI: 10.24507/ijicic.15.04.1397

Full Text



Cyberspace Attack Detection Based on Advanced Initialized Recurrent Neural Network
1413
Chaopeng Li, Yiqiang Sheng and Jinlin Wang
DOI: 10.24507/ijicic.15.04.1413

Full Text



Study on Centroid Type-Reduction of General Type-2 Fuzzy Logic Systems with Enhanced Opposite Direction Searching Algorithms
1425
Yang Chen
DOI: 10.24507/ijicic.15.04.1425

Full Text



Iris Features via Fractal Functions for Authentication Protocols
1441
Nadia M. G. Al-Saidi, Arkan J. Mohammed, Razi J. Al-Azawi and Aqeel H. Ali
DOI: 10.24507/ijicic.15.04.1441

Full Text



Modularity Maximization for Community Detection in Networks Using Competitive Hopfield Neural Network
1455
Jin Ding, Yongzhi Sun, Ping Tan and Yong Ning
DOI: 10.24507/ijicic.15.04.1455

Full Text



Static Output Feedback Controller for Continuous-Time Fuzzy Systems
1469
Redouane Chaibi, El Houssaine Tissir, Abdelaziz Hmamed, El Mostafa El Adel and Mustapha Ouladsine
DOI: 10.24507/ijicic.15.04.1469

Full Text



An Adaptive VMD Method Based on Improved GOA to Extract Early Fault Feature of Rolling Bearings
1485
Chengjiang Zhou, Jun Ma, Jiande Wu and Xuyi Yuan
DOI: 10.24507/ijicic.15.04.1485

Full Text



BBM Algorithm for Signed Mixed Domination in Cartesian Product of Cycles
1507
Hong Gao, Enmao Liu, Yuansheng Yang and Wei Liu
DOI: 10.24507/ijicic.15.04.1507

Full Text



The Effect of Stimulus Pattern, Color Combination and Flicker Frequency on Steady-State Visual Evoked Potentials Topography
1521
Kazuhiko Goto, Takenao Sugi, Hiroki Fukuda, Takao Yamasaki, Shozo Tobimatsu and Yoshinobu Goto
DOI: 10.24507/ijicic.15.04.1521

Full Text



A Risk Pre-Warning Mechanism of Chinese High-Tech Industries Based on International Intellectual Property Barriers
1531
Yan Zhang, Minghao Jin and Xiaofan Li
DOI: 10.24507/ijicic.15.04.1531

Full Text



An Improved Pupil Localization Technique for Real-Time Video-Oculography under Extreme Eyelid Occlusion
1547
Sunu Wibirama, Igi Ardiyanto, Thoriq Satriya, Teguh Bharata Adji, Noor Akhmad Setiawan and Muhammad Taufiq Setiawan
DOI: 10.24507/ijicic.15.04.1547

Full Text



An Efficient Matrix Embedding Technique by Using Submatrix Transform for Grayscale Images
1565
Hsi-Yuan Chang, Jyun-Jie Wang, Chi-Yuan Lin and Chin-Hsing Chen
DOI: 10.24507/ijicic.15.04.1565

Full Text



SHORT PAPERS

A Novel Classification & Repairing Framework for Irregular Model Reconstruction Using Mass Point Clouds Based on Fuzzy Inference
1581
Yanju Liu, Huiyu Zhang, Cheng Li, Honglie Zhang and Jiaxing Liu
DOI: 10.24507/ijicic.15.04.1581

Full Text



Research on Automatic Computational Model of Technology Life Cycle Based on Domain Ontology
1591
Yao Liu, Qian Zhang and Yi Huang
DOI: 10.24507/ijicic.15.04.1591

Full Text



Newsvendor System Neglect Revisited Using an Enhanced Normative Method
1601
Zhiru Juan, Haiyan Wang and An-Jin Shie
DOI: 10.24507/ijicic.15.04.1601

Full Text




Copyright (c) Since 2004 ICIC International, All rights reserved.