Home | Editorial Board | Aims & Scope | Information for Authors | Subscription | ICIC-ELB | IJICIC |
High-Capacity Reversible Data Hiding Scheme for Optimal Common-Bitplane BTC-Compressed Color Images | 4251-4256 |
|
Zhi-Fang Chen, Zhe-Ming Lu and Yu-Xin Su | ||
Search for Better Random Forests with an Tree Selection Method | 4257-4262 |
|
Baoxun Xu, Yunming Ye, Qiang Wang and Junjie Li | ||
Motion Correction in fMRI via Local Rigid Transform | 4263-4268 |
|
Sen Liu, Jiexin Pu, Hongyi Zhang and Li Zhao | ||
Novel Asymptotic Stability Analysis for Neural Networks with Multiple Time-Varying Delays | 4269-4275 |
|
Tiheng Qin, Yonggang Chen and Jingben Yin | ||
Face Recognition Based on Enhanced Supervised Neighborhood Preserving Projection | 4277-4282 |
|
Chunming Xu | ||
A Path Planning Method Based on Improved Genetic Algorithm for Mobile Robot in Static Environment | 4283-4290 |
|
Chuanling Liu, Xianyong Wei and Jingyu Yang | ||
An Efficient Data Hiding Scheme Based on Magic Cube | 4291-4296 |
|
Rui Sun, Shengli Yang and Wenjun Zeng | ||
A Fuzzy Selective Rate Congestion Control in Wired/Wireless Internet Environments | 4297-4302 |
|
Xinhao Yang and Ze Li | ||
Random Forest for Imbalanced Microarray Data Classification by Weighting Strategy | 4303-4308 |
|
Hualong Yu, Shang Gao and Bin Qin | ||
The Study of Stock Indexes Relationship between Taiwan and China Markets - Considering China Concept Stocks and Number of Significant Periods | 4309-4313 |
|
Feng-Jenq Lin and Ming-Han Hsieh | ||
Experimental Research on Millimeter-Wave Radiometric Imaging for Concealed Contraband Detection | 4315-4321 |
|
Taiyang Hu, Zelong Xiao and Jianzhong Xu | ||
Comparison of Variance Reduction Techniques for Steady-State Simulation Analysis | 4323-4328 |
|
Ming Yang and Peng Shi | ||
Efficient Text Representation via Weighted Co-Contributions of Terms on Class Tendency | 4329-4336 |
|
Yuan Ping, Yajian Zhou, Huina Li and Yixian Yang | ||
Quantized Control for Parameter Uncertain Systems with Limited Information | 4337-4344 |
|
Fang Jin, Qing-Quan Liu and Yong-Ping Hao | ||
Research on Transmission Zeros for a Class of Non-Square Systems | 4345-4350 |
|
Shin-Ju Chen, Jong-Lick Lin and Sung-Pei Yang | ||
Adaptive Logic-Based Switched Observer for Chaotic Synchronization | 4351-4357 |
|
Junxia Chu | ||
Resource Allocation and Adjustment with Genetic Algorithm in Virtual Computing Systems | 4359-4366 |
|
Xiao Jun Chen, Jing Zhang, Jun Huai Li and Xiang Li | ||
Robust Guaranteed Cost Fault-Tolerant Control of Networked Control System | 4367-4374 |
|
Jun Kang | ||
Failure Detection and Fault Correction Models Considering Testing Effort and Imperfect Debugging | 4375-4380 |
|
Nan Zhang, Gang Cui and Hongwei Liu | ||
Brief Review of Autonomous Surface Crafts | 4381-4386 |
|
Jiang Zhao, Weisheng Yan and Xuelian Jin | ||
An Improved Coupled Simulated Annealing | 4387-4393 |
|
Yalan Zhou | ||
Integrating Artificial Intelligence Solutions into Interfaces of Online Knowledge Production | 4395-4401 |
|
Mihaly Heder | ||
Research on Genetic Algorithm Strategy Selection for Function Optimization Based on Function Cluster | 4403-4408 |
|
Xue Li, Yingan Cui, Duwu Cui and Xuetong Wang | ||
Education Clustering Model for Surveillance System Using ILM Algorithm | 4409-4414 |
|
Sageemas Na Wichian, Suwimon Wongwanich and Patharawut Saengsiri | ||
Improved Group-Oriented Digital Signature Schemes Based on Elliptic Curve Cryptography | 4415-4419 |
|
Yu-Hao Chuang, Wesley Shu, Kevin C. Hsu and Chien-Lung Hsu | ||
Evacuation Model of Campus Emergency Events Based on Cell Transmission Model | 4421-4426 |
|
Zhuomo Lu and Kaipeng Gao | ||
A Novel Method of Transforming Controlled Unfolding Net into Equivalent Closed-Loop Petri Net | 4427-4432 |
|
Guoqiang Zeng, Chongwei Zheng and Zhengjiang Zhang | ||
Uniformly Strong Persistence of a Discrete Nonlinear Asymptotically Periodic Ecological System | 4433-4438 |
|
Weiguo Wang and Hongying Lu | ||
Study on Control Performance and Energy Recovery Efficiency of Hydraulic Hybrid Excavator | 4439-4444 |
|
Wei Shen and Jihai Jiang | ||
An Approximate Calculation Method for Eigenvector Centrality Measure of Complex Network | 4445-4450 |
|
Cai-Hua Li, Shi-Ze Guo, Zhe-Ming Lu and Guang-Yu Kang | ||
Point Pattern Matching Algorithm with O(nlogn) Time | 4451-4456 |
|
Xiaoyun Wang, Fangyuan Qin, Lianyuan Jiang, Zhenjun Tang and Xianquan Zhang | ||
On the Performance of Option Pricing Models under Bounded Stretch Parameter | 4457-4465 |
|
Po-yuan Chen | ||
Robust Watermarking Algorithm Based on Improved Hilbert-Huang Transformation | 4467-4472 |
|
Minghui Deng, Qingshuang Zeng and Sibo Li | ||
Modeling and Resolving Lock Contention for Multi-Threaded Systems | 4473-4478 |
|
Yang Zhang and Shahnawaz Talpur | ||
Fire Detection by Static Image Characteristics of the Light Blue Flame Using ROI-Based Color Intensity Composition Detection Algorithm | 4479-4486 |
|
Aung Kyaw Soe and Xianku Zhang | ||
Iterative Algorithms for Solving Three-Order Approximative Algebraic Equation Based on Homotopy Analysis Method | 4487-4494 |
|
Guangming Zhou and Pingmin Zhu | ||
An Approach to the Reduct Problem Using Axiomatic Fuzzy Sets Theory | 4495-4502 |
|
Angelo Dan Menga Ebonzo and Xiaodong Liu | ||
A Coarse-to-Fine Correction Method for Seriously Oblique Remote Sensing Image | 4503-4509 |
|
Chunyuan Wang, Yanfeng Gu and Ye Zhang | ||
Early Warning System for Tobacco Warehouse Based on Wireless Sensor Networks | 4511-4518 |
|
Wei Qu, Yongyi Zhao, Bingyang Shang and Bo Song | ||
Set Pair Community Situation Analysis and Dynamic Mining Algorithms of Web Social Network | 4519-4524 |
|
Chunying Zhang, Jingfeng Guo and Ruitao Liang | ||
Generalized Gaussian Support Vector Regression | 4525-4534 |
|
Meng Zhang, Shaoquan Yu and Lihua Fu | ||
Fragments Based Tracking Method with Robust and Adaptive Mean Shift | 4535-4540 |
|
Ruxi Xiang, Jianwei Li and Xuchu Wang | ||
An Adaptive H-infinity Synchronization Scheme for Secure Communication | 4541-4546 |
|
Xiejin Liu, Wei Xiang and Yugao Huangfu | ||
MiRNA Prediction Algorithm Based on Geodesic Distance | 4547-4551 |
|
Baowen Wang, Xiaoyan Feng,Changwu Wang and Wenyuan Liu | ||
Direct Routh Approximation Method for Order Reduction of Discrete-Time Interval Systems | 4553-4558 |
|
M. Sivakumar and N. Vijaya Anand |