International Journal of Innovative Computing, Information and Control (IJICIC)
ISSN 1349-418X

Volume 8, Number 11, November 2012

Extraction and Screening of Knee Joint Vibroarthrographic Signals Using the Independent Component Analysis Method
Jien-Chen Chen, Pi-Cheng Tung, Shih-Fong Huang, Shu-Wei Wu and Shih-Lin Lin
Full Text

WikiIdRank: An Unsupervised Approach for Entity Linking Based on Instance Co-Occurrence
Norberto Fernandez, Jesus A. Fisteus, Luis Sanchez and Damaris Fuentes-Lorenzo
Full Text

General Pattern Learning and Recognition Using Genetically-Optimized Training of a Biased ARTMAP Ensemble Voting System
Chu Kiong Loo, Wei Shiung Liew and Md. Shohel Sayeed
Full Text

Energy-Efficient Reprogramming in WSN Using Constructive Neural Networks
Daniel Urda Munoz, Eduardo Canete Carmona, Jose Luis Subirats Contreras, Leonardo Franco, Luis Manuel Llopis Torres and Jose Manuel Jerez Aragones
Full Text

A Supervised Learning Approach for Automatic Keyphrase Extraction
Muhammad Abulaish and Tarique Anwar
Full Text

A Cross-Layer Control Method for Network Lifetime Maximization in Wireless Sensor Networks
Jain-Shing Liu
Full Text

Robust Speed Control for a Variable Speed Wind Turbine
Oscar Barambones, Jose Maria Gonzalez de Durana and Manuel De la Sen
Full Text

The Multi-Hop Cluster Transmission of Information Method for Solving the Low Connectivity Problem in Wireless Sensor Networks with Non-Uniform Density
Ali Shanoon, Tat-Chee Wan and Wafaa Obeed
Full Text

Multi-Function Automatic Measurement Platform
Kai-Chao Yao, Jiunn-Shiou Fang and Wei-Tzer Huang
Full Text

A Collaborative Fuzzy-Neural System for Global CO2 Concentration Forecasting
Toly Chen
Full Text

The Optimal Parameter Design for a Blood Supply Chain System by the Taguchi Method
Yi-Chang Li and Hung-Chang Liao
Full Text

An Effective Application of Contextual Information Using Adjacency Pairs and a Discourse Stack for Speech-Act Classification
Kyungsun Kim, Youngjoong Ko and Jungyun Seo
Full Text

Emotion Recognition by a Novel Triangular Facial Feature Extraction Method
Kuan-Chieh Huang, Yau-Hwang Kuo and Mong-Fong Horng
Full Text

Backstepping Control Design for a Continuous-Stirred Tank
Saleh Alshamali and Mohamed Zribi
Full Text

Implementation of PID Controller Tuning Using Differential Evolution and Genetic Algorithms
Mohd Sazli Saad, Hishamuddin Jamaluddin and Intan Zaurah Mat Darus
Full Text

MagicLearning: A Serious Game for Learning Based in a Magic World
Pedro J. Munoz-Merino, Francisco Martinez Sanchez, Mario Munoz-Organero and Carlos Delgado Kloos
Full Text

Using Multi-Angles Evolutionary Algorithms for Training TSK-Type Neuro-Fuzzy Networks
Pei-Chia Hung, Sheng-Fuu Lin and Yung-Chi Hsu
Full Text

DSM: A Data Service Middleware for Sharing Data in Peer-to-Peer Computing Environments
Sofien Gannouni, Mutaz Beraka and Hassan Mathkour
Full Text

An Integration Framework for Haptic Feedback to Improve Facial Expression on Virtual Human
Ahmad Hoirul Basori, Abdullah Bade, Mohd Shahrizal Sunar, Nadzaari Saari, Daut Daman and Md Sah Hj Salam
Full Text

New Intermediate Quaternion Based Control of Spacecraft: Part II - Global Attitude Tracking
Wen Chuan Cai and Yong Duan Song
Full Text

An Evaluation Model of Information Security Management of Medical Staff
Kuo-Hsiung Liao and Hao-En Chueh
Full Text

An Approach for User Authentication on Non-Keyboard Devices Using Mouse Click Characteristics and Statistical-Based Classification
Cheng-Jung Tsai, Ting-Yi Chang, Yu-Ju Yang, Meng-Sung Wu and Yu-Chiang Li
Full Text

Fast Hashing Function Based on Multi-Pipeline Hash Construction (MPHC)
Ola A. Al-wesabi, Azman Samsudin and Nibras Abdullah
Full Text

Mining Roles Using Attributes of Permissions
Ruixuan Li, Wei Wang, Xiaopu Ma, Xiwu Gu and Kunmei Wen
Full Text

Risk-Based Decision Making for Public Key Infrastructures Using Fuzzy Logic
Carlos Ganan, Jose L. Munoz, Oscar Esparza, Jorge Mata-Diaz and Juanjo Alins
Full Text

An Efficient Sealed-Bid Auction Protocol with Bid Privacy and Bidder Privacy
Wenbo Shi
Full Text

A Trust Mechanism for Web Services Registries Data Exchanging
Chi-Hua Chen, Ding-Yuan Cheng, Bon-Yeh Lin, Yin-Jung Lu and Chi-Chun Lo
Full Text

Towards Formal Security Analysis of Decentralized Information Flow Control Policies
Zhi Yang, Lihua Yin, Shuyuan Jin and MiYi Duan
Full Text

Privacy-Preserving Authentication Using Fingerprint
Quan Feng, Fei Su and Anni Cai
Full Text

Information Security Risk Assessment: Bayesian Prioritization for AHP Group Decision Making
Zeynep Filiz Eren-Dogu and Can Cengiz Celikoglu
Full Text

Technical Issues and Challenges of Biometric Applications as Access Control Tools of Information Security
Sharifah Mumtazah Syed Ahmad, Borhanuddin Mohd Ali and Wan Azizun Wan Adnan
Full Text

Copyright (c) Since 2004 ICIC International, All rights reserved.