Home | Editorial Board | Aims & Scope | Information for Authors | Subscription | ICIC-ELB | IJICIC |
Easy Tuning of Robust PID Controllers Based on the Design-Oriented Sine Wave Type Identification | 563-572 |
|
Stefan Bucz, Ladislav Maric, Ladislav Harsanyi and Vojtech Vesely | ||
Comprehensive Evaluation of Software Understandability | 573-577 |
|
Jin-Cherng Lin and Kuo-Chiang Wu | ||
Unknown Different Parameters Perturbation Based on LMI | 579-585 |
|
M. H. Refan, M. Sha Sadeghi and M. Sojoodi | ||
Stabilization of 2D Discrete Saturated Systems by State Feedback Control | 587-593 |
|
Abdellah Benzaouia, Fouad Mesquine, Mohamed Benhayoun, Abdelaziz Hmamed and Fernando Tadeo | ||
Wavelet-Based Hemodynamic Analyzing Method for fMRI Data | 595-600 |
|
Sen Liu, Jiexin Pu, Hongyi Zhang and Li Zhao | ||
Target Tracking Algorithm in the Presence of Unknown Noise | 601-606 |
|
Yong Shi and Chongzhao Han | ||
Bayesian Filtering Algorithm on the Measurement Noise Contamination | 607-612 |
|
Yingchun Song, Shenying Hui, Jie Liu and Dongfang Lin | ||
Modified Projective Synchronization of Uncertain Chaotic Systems with Input Dead-Zone Nonlinearities | 613-619 |
|
Fang Zhu, Wei Xiang and Zhifeng Gao | ||
Fuzzy Clustering Image Segmentation Based on PSO | 621-626 |
|
Yong Zhang, Ying Mi and Dan Huang | ||
A Novel Service Architecture for Data-Center Networks | 627-632 |
|
Hengkui Wu, Deyun Gao, Fuhong Lin and Hongke Zhang | ||
The Study of Vehicle Existence Detection Based on Inter-Frame Similarity Evaluation Algorithm | 633-637 |
|
Yan Liu, Yaping Dai and Zhongjian Dai | ||
Delay-Dependent Stability of Discrete-Time for a Class of Networked Control System: Switched System Approach | 639-645 |
|
Ming Wang and Hongyan Chu | ||
Fuzzy Action Association Rules Mining | 647-653 |
|
Jian Hu and Jinhua Sun | ||
Unsupervised Anomalous Behavior Detection Using Spatial-Temporal Interest Points | 655-660 |
|
Xudong Zhu and Zhijing Liu | ||
A Design of Adaptive Track Controller for Underwater Vehicle | 661-666 |
|
Xin Song and Zao-Jian Zou | ||
FECG Extraction Using Wavelet Denoising and Neural Networks Approach | 667-673 |
|
Ying Yin, Mao Ye, Yuanxiang Zhu and Dongxiao Ren | ||
An Enhanced-Security Fair Payment Protocol Based on Mobile Agent | 675-679 |
|
Changwu Wang, Xiuxian Zheng, Yali Si and Wenyuan Liu | ||
The Divisible E-Cash Based on ECC with Direct Computation | 681-685 |
|
Baowen Wang, Jiuhong Wang, Yali Si and Wenyuan Liu | ||
Towards an Efficient DHT-Based Identifier-to-Locator Separation Approach | 687-691 |
|
Hengkui Wu, Deyun Gao, Dong Yang and Hongke Zhang | ||
Control of Chaotic Systems by Chaotic Social Cognitive Optimization | 693-699 |
|
Jianke Zhang, Sanyang Liu, Yanping Chen and Rongxi Wang | ||
A Set of Machine Learning Methods for Inducing Translation Templates with Grammar-Semantic Type Constraints | 701-706 |
|
Jiexu Hun, Yu Cao and Xiaowei Guan | ||
Adaptive Control for a Class of Nonlinear Pure-Feedback Systems Based on Partition of Unity Back-Stepping Approach | 707-712 |
|
Liang Luo, Yinhe Wang, Yongqing Fan and Yun Zhang | ||
Images Segmentation with Improved PCNN by Differential Evolution | 713-717 |
|
Changming Zhu, Haibo Liu, Jing Shen, Guochang Gu, Jun Ni and Yanbo Li | ||
A General Decrementing Service Policy in the Geom/G/1 Queueing Model with Multiple Adaptive Vacations | 719-726 |
|
Caimin Wei, Zongbao Zou and Jianjun Wang | ||
A New Similarity Degree of Digital Watermarks | 727-731 |
|
Li Li, David Zhang and Liuzhao Ruan | ||
Image Data Field Model for Edge Detection | 733-739 |
|
Tao Wu and Yan Gao | ||
Nonlinear Filtering Approaches Based Pose, Motion and Variable Focal Length Estimation in Monocular Active Vision | 741-745 |
|
Xuedong Wu, Yaonan Wang and Zhiyu Zhu | ||
Extending Phrased-Based SMT with Dependency Based Reordering Model | 747-752 |
|
Shui Liu, Sheng Li, Tiejun Zhao and Shiqi Li | ||
Efficient Identity-Based Authenticated Multiple Key Exchange Protocol Based on Elliptic Curve Pairings | 753-758 |
|
Zuowen Tan | ||
A Retrial Queue with Batch Arrivals, J Vacations and Server Breakdowns | 759-765 |
|
Peishu Chen, Yijuan Zhu and Weicai Peng | ||
Adaptive Fuzzy Control Design of Ship's Autopilot with Rudder Dynamics | 767-773 |
|
Cheng Liu, Tieshan Li and Naxin Chen | ||
Interior Point Algorithms for Monotone Linear Complementarity Problem | 775-781 |
|
Longquan Yong | ||
LMI Condition of Robust D Stability for Singular Systems with Polytopic Uncertainties | 783-789 |
|
Jianjun Bai, Hongye Su and Jinfeng Gao | ||
Trust Reasoning and Optimization Based on Associate Petri Net | 791-796 |
|
Xianwen Fang, Chungang Yan, Xiaoqin Fan and Zhixiang Yin | ||
A Top-Down Algorithm for Finding Principal Curves from Complex Patterns Data | 797-802 |
|
Hongyun Zhang, Duoqian Miao and Chen Xie | ||
Provably Semi-Statically Secure Broadcast Signcryption Scheme with Small Ciphertext | 803-808 |
|
Ximing Li, Bo Yang and Mingwu Zhang | ||
On the Improvements of Particle Swarm Optimization for Global Optimization | 809-815 |
|
Chunxia Yang and Nuo Wang | ||
Experimental Study of a New Self-Adaptive Stator Flux Linkage Observer | 817-822 |
|
Haifeng Wei and Hongping Jia | ||
Improved Wavelet-Based Contourlet Transform and Its Application to Image Fusion | 823-828 |
|
Chun-hai Hu and Pai Zhang | ||
A Solution to Blind Flooding and Space Contention Problems in Ad Hoc Wireless Network | 829-834 |
|
Jianwei Liao | ||
Dense Sigma Set Representation for Pedestrian Detection | 835-840 |
|
Xiaopeng Hong, Hong Chang, Shiguang Shan, Xilin Chen and Wen Gao | ||
Generalized Difference Matrix-Based Attribute Reduction Algorithm | 841-846 |
|
Yitian Xu, Zhiquan Qi and Laisheng Wang | ||
Dependent Source Signals Separation Using Cook's NonGaussianity Measure | 847-852 |
|
Keying Liu, Rui Li and Fasong Wang | ||
Ontology Mapping Negotiation Based on an Extended Value-Based Argumentation Framework | 853-858 |
|
Ying Wang, Rubo Zhang and Jibao Lai | ||
Scale Saliency Based Synchronization for Invariant Image Watermarking | 859-864 |
|
Leida Li and Jeng-Shyang Pan | ||
Threshold Selection Based on Fuzzy Tsallis Entropy and Differential Evolution Algorithm | 865-871 |
|
Fangyan Nie, Chao Gao, Yongcai Guo and Min Gan | ||
A New (lambda, gamma, alpha )-Type Strong Convex Function and Its Differentiability for Convex Analysis | 873-877 |
|
Yanfang Lv | ||
Hiding Data Reversibility in a Palette Image | 879-885 |
|
Shu-Chien Huang and Yih-Kai Lin | ||
An Empirical Study of Constructing a Logistics Service Quality Model of B2C Internet Store | 887-892 |
|
Bing Zheng, Yunfu Huo and Yujun Feng |