Home | Editorial Board | Aims & Scope | Information for Authors | Subscription | ICIC-ELB | IJICIC |
Normalized IV-Distance, IV-Similarity Measure, IV-Entropy and IV-Inclusion Measure of Interval-Valued Fuzzy Sets and Their Relationship | 1405-1410 |
|
Wenyi Zeng, Yibin Zhao and Xianchuan Yu | ||
Electro-Ocular Measurement and Control Technique by Integrating Virtual Instrument | 1411-1416 |
|
Kai-Chao Yao and Wei-Tzer Huang | ||
Normal Vector-Controlled Particle Swarm Optimization Algorithm for Solving Bi-Level Linear Programming Problem | 1417-1423 |
|
Ren-Jieh Kuo, C. C. Huang and Tung-Lai Hu | ||
An Empirical Study of the Relationship between Complementary Resources and IT Capability: A Resource-Based Perspective | 1425-1430 |
|
Wenli Li, Shijie Li and Yulong Ke | ||
Forecasting in Time Series Based on Generalized Fuzzy Logical Relationship | 1431-1438 |
|
Wangren Qiu, Xiaodong Liu and Lidong Wang | ||
A Novel Image Encryption Algorithm Based on Double Hyper-Chaotic Systems | 1439-1444 |
|
Enzeng Dong, Zaiping Chen, Zengqiang Chen, Haifen Li and Chengyi Xia | ||
Design of an Inductor-Based WLED Driver Using Clean Energy Power Supplies | 1445-1450 |
|
Kei Eguchi, Sawai Pongswatd, Toshiya Watanabe, Hongbing Zhu, Kitti Tirasesth and Hirofumi Sasaki | ||
Proposal for Fuzzy-Based 3D Region Growing Method and Its Application for Computer-Aided Diagnosis System | 1451-1455 |
|
Tatsushi Tokuyasu, Takashi Shuto, Kenji Yufu, Shotaro Kanao, Akira Marui and Masashi Komeda | ||
Virtual Unitary-ESPRIT Algorithm for Joint DOD and DOA Estimation in Bistatic MIMO Radar | 1457-1463 |
|
Fulai Liu, Changyin Sun, Jinkuan Wang and Ruiyan Du | ||
Situation Distributions in a Special 3-Person 0-1 Game with Entropy | 1465-1469 |
|
Dianyu Jiang | ||
Fuzzy Similarity Inference Method and Its Application in Fuzzy System Modeling | 1471-1476 |
|
Degang Wang, Wenyan Song and Hongxing Li | ||
Word Sense Disambiguation of English Modal Verbs by Support Vector Machines | 1477-1482 |
|
Jianping Yu, Liang Huang and Jilin Fu | ||
Two-Way Query Log: A Block-Level Continuous Data Protection Indexing Structure | 1483-1488 |
|
Guangjun Wu, Shupeng Wang, Binxing Fang, Xiaochun Yun and Xiangzhan Yu | ||
The Enhancement of Stereoscopic Image and Hologram Based on Post-Processing of Depth and Color | 1489-1494 |
|
Hyunjun Choi, Dong Hoi Kim, Kwanwook Lee and Manbae Kim | ||
Infrared Small Target Detection and Tracking Based on Mathematical Morphology | 1495-1500 |
|
Xiangzhi Bai, Fugen Zhou, Ting Jin and Zhaoying Liu | ||
Rendezvous of Multi-Agents with Nonlinear Inner-Coupling Functions | 1501-1507 |
|
Qing Zhang, Zhengquan Yang and Zengqiang Chen | ||
The Parameterization of all Disturbance Observers for Discrete-Time Systems | 1509-1514 |
|
Iwanori Murakami, Kou Yamada, Tatsuya Sakanushi, Takaaki Hagiwara, Yoshinori Ando, Da Zhi Gong and Masahiko Kobayashi | ||
Tolerance and Similarity Relations in Definition of Rough Approximations | 1515-1520 |
|
Liping An and Zengqiang Chen | ||
Adaptive Support of e-Portfolio Knowledge for Student Ubiquitous Learning | 1521-1527 |
|
Chih-Kun Ke, Wei-Tu Chen and Mei-Yu Wu | ||
A New Computation Method of the Geometric Properties for Range Data | 1529-1535 |
|
Yi An, Cheng Shao, Xiaoliang Wang and Zhuohan Li | ||
The Optimization of Decision Tree Building Algorithm in Topological Relations Query | 1537-1542 |
|
Wenbin Wang, Wenyuan Liu and Shiwei Gao | ||
Decoupling Control of 2-Link Manipulator | 1543-1548 |
|
Linfeng Lan and Ryuichi Oguro | ||
Stopping Automated Injection Attack Tools Based on Navigational Behavior | 1549-1554 |
|
Jan-Min Chen | ||
A Collaborative Distributed Strategy for Target Tracking in Wireless Sensor Networks | 1555-1560 |
|
Qinghua Gao, Minglu Jin, Jie Wang and Wenlong Liu | ||
A Model for Position Relation between Regions | 1561-1566 |
|
Miao Wang and Zhongxiao Hao | ||
Fuzzy Concept Lattice Construction and Bordat Method | 1567-1572 |
|
Yinghui Huang, Guanyu Li and Dan Wang | ||
Determining the Sources of Variance Shifts in a Multivariate Process Using Flexible Discriminant Analysis | 1573-1578 |
|
Yuehjen E. Shao, Hsiao-Yun Huang and Ying-Jen Chen | ||
Set Stabilization of Chua's Circuit via Hybrid Control Strategy | 1579-1584 |
|
Xiangze Lin, Yongqian Ding and Shihua Li | ||
An Efficient Motion Estimation Algorithm for H.264/AVC Encoder by Using New Searching Strategy | 1585-1590 |
|
Jinqing Qi, Hao Wu and Yan Yu | ||
An Improved Hammerstein Predistorter for Power Amplifier with Memory Effects | 1591-1596 |
|
Xiujie Si, Minglu Jin and Wenlong Liu | ||
A Hybrid Audio Watermarking Technique in Cepstrum Domain | 1597-1602 |
|
Shinfeng D. Lin, Chao-Cyun Huang and Jia-Hong Lin | ||
Clustering Over an Evolving Data Stream Based on Grid Density and Correlation | 1603-1609 |
|
Jiadong Ren, Binlei Cai and Changzhen Hu | ||
A High Curvature Bias Correction Method for the Ellipse Fitting | 1611-1617 |
|
Peipei Li, Caiming Zhang, Yu Wei and Kunpeng Wang | ||
A Hierarchical SLAM Algorithm Characterized with Event-Driven Property | 1619-1624 |
|
Xuefeng Dai, Lina Zhao and Yuan Guo | ||
An Efficient Incremental Algorithm for Mining Web Navigation Patterns with Dynamic Thresholds | 1625-1630 |
|
Jia-Ching Ying and Vincent S. Tseng | ||
A Pluggable and Flexible Framework for Access Control | 1631-1636 |
|
Limin Shen, Chengzhong Song and Dianlong You | ||
An RFID-Based Learning System Supporting Ubiquitous Context-Aware Bloom's Cognition Knowledge Analysis | 1637-1642 |
|
Wen-Chih Chang, Te-Hua Wang and An-Sheng Li | ||
Vulnerability Exploitability Quantitative Evaluation for Network Information System | 1643-1648 |
|
Hongyu Yang and Lixia Xie | ||
An Adaptive Selection Scheme of Forwarding Nodes in Wireless Sensor Networks Using a Chaotic Neural Network | 1649-1655 |
|
Tomoyuki Sasaki, Hidehiro Nakano, Akihide Utani, Arata Miyauchi and Hisao Yamamoto | ||
Effects of the Consecutive Speed Humps on Chaotic Vibration of a Nonlinear Vehicle Model | 1657-1664 |
|
Fei Liu, Shan Liang, Qin Zhu and Qinyu Xiong | ||
Forecast the Amount of Import and Export in Vietnam by Applying Grey Method | 1665-1670 |
|
Jui-Fang Chang, Tien-Chin Wang, Truong Ngoc Anh and Wan-Tseng Chang | ||
Conditional Anonymous Compact E-Cash with Auditable Tracing | 1671-1675 |
|
Qian Wang | ||
Using Feature Attribute to Filter Noise in Radio Signal Recognition | 1677-1682 |
|
Chao Zhang, Zheng Pei, Jianmei Cheng and Hongbao Cao | ||
Algorithms Comparison for Weak GPS Signal Tracking Based on KF | 1683-1688 |
|
Xiyuan Chen, Zhe Liu, Xuefen Zhu and Lin Fang | ||
Adaptive Fuzzy Backstepping Output Feedback Control for Nonlinear Systems with Unknown Sign of High-Frequency Gain | 1689-1693 |
|
Changliang Liu, Shaocheng Tong and Yongming Li | ||
A Double-Stepping Run-Length Algorithm for Fast Circle Drawing | 1695-1700 |
|
Lianqiang Niu, Binghong Li, Haiwen Feng and Tianxiang Zhu | ||
Supply Chain Optimization Model Based on Process and Generalized Inverse Optimization Methods | 1701-1707 |
|
Xiangbin Zhang, Youyi Ni and Yamin Yuan | ||
Efficient Deblocking Filter Architecture for High-Resolution Applications of H.264/AVC | 1709-1715 |
|
Tomohiro Akita, Naoyuki Hirai, Tian Song, and Takashi Shimamoto | ||
Dual Slope Analog-to-Digital Converter Using Simple CCII-Based Integrator | 1717-1722 |
|
Krit Smerpitak, Amphawan Julsereewong and Hirofumi Sasaki | ||
Backstepping Controller Design for a Manipulator with Compliance | 1723-1728 |
|
Cheng-Yi Chen, Marvin H.-M. Cheng and Chien-Hua Lee | ||
Shrinkage Estimated Adaptive Nearest Neighbor for Hyperspectral Image Classification | 1729-1734 |
|
Hsiao-Yun Huang, Yuehjen E. Shao and Yung-Hsu Li |