Home | Editorial Board | Aims & Scope | Information for Authors | Subscription | ICIC-ELB | IJICIC |
Heuristic Algorithm Based on Discernibility Matrix for Generating all Reductions | 893-898 |
|
Zhiguo Huang, Yuanxiang Li, Xiaoji Yang and Gang Liu | ||
Incentive Design under Uncertainty in Tacit Knowledge Sharing | 899-904 |
|
Gaoshan Wang and Xin Zhang | ||
The Relationships Among IV-Similarity Measure, IV-Entropy and IV-Inclusion Measure of Interval-Valued Fuzzy Sets | 905-910 |
|
Wenyi Zeng, Yibin Zhao and Ping Guo | ||
Robust Actuator Fault Diagnosis and Tolerant Control for Satellite Attitude Control Systems | 911-918 |
|
Yuehua Cheng, Bin Jiang, Jun Sun, Yanping Fu and Zhifeng Gao | ||
Mining Frequent Closed Itemsets Based on Projection Array and Closed Itemsets Lattice | 919-924 |
|
Haitao He, Haiyan Cao, Jiadong Ren and Changzhen Hu | ||
A User Profile Injection Attack Detection Algorithm Based on Normal Cloud Model and PCA | 925-930 |
|
Fuzhi Zhang, Dongyan Jia and Jinbo Chao | ||
Dynamic Analysis and Simulation of Single-Closed-Loop Mechanism with a Screw Pair | 931-936 |
|
Xijuan Guo and Yanping Fu | ||
T-S Fuzzy Controller for a Class of Nonlinear Systems with Uncertainties and Disturbances | 937-943 |
|
Hugang Han and Shoji Katagiri | ||
Networked H-infinity Output Tracking Control Based on QoS | 945-952 |
|
Jun Kang | ||
The Parameterization of all Disturbance Observers for Plants with Any Input and Output Disturbances | 953-958 |
|
Yoshinori Ando, Kou Yamada, Tatsuya Sakanushi, Takaaki Hagiwara, Nghia Thi Mai, Iwanori Murakami, Yuki Nakui and Hua Zhuang Lin | ||
The Parameterization of all Robust Stabilizing Simple Repetitive Controllers with the Specified Input-Output Characteristic | 959-964 |
|
Tatsuya Sakanushi, Kou Yamada, Takaaki Hagiwara, Yoshinori Ando, Iwanori Murakami and Shun Matsuura | ||
A Design Method for Robust Stabilizing Multi-Period Repetitive Controllers for Time-Delay Plants with the Specified Input-Output Characteristic | 965-970 |
|
Yoshinori Ando, Kou Yamada, Tatsuya Sakanushi, Nghia Thi Mai, Takaaki Hagiwara, Shun Yamamoto and Nhan Luong Thanh Nguyen | ||
A Decomposition Approach for Identifying the Sources of Variance Shifts in a Multivariate Process | 971-975 |
|
Yuehjen E. Shao, Chia-Ding Hou, Chien-Hui Chao and Ying-Jen Chen | ||
Research on the Window-Expanded Query Algorithm Based on SABX-Tree | 977-983 |
|
Yongshan Liu, Weijie Gu, Shiwei Gao and Hui Zhang | ||
Rendezvous of Multi-Agents with Time Delay and Network Connectivity Preservation | 985-991 |
|
Zhengquan Yang, Qing Zhang, Zuolian Jiang and Zengqiang Chen | ||
Efficient ID-Based Online/Offline Encryption Scheme in the Standard Model | 993-998 |
|
Yang Ming and Xiaoqin Shen | ||
Non-Coding Background Sequences Modeling Based on Bayesian Hypothesis Testing | 999-1004 |
|
Qian Liu, San-Yang Liu and Li-Fang Liu | ||
A Novel Classification Based on Competitive Co-Evolutionary Algorithm | 1005-1010 |
|
Ruihua Chang, Xiaodong Mu and Xiaowei Shen | ||
Research on Semantic Method of Library Resources' Organizing | 1011-1017 |
|
Yao Liu, Xue-Fei Chen, Zhifang Sui, Yongwei Hu and Qingliang Zhao | ||
ITS Image De-Noising Integrated Model Based on Partial Differential Equation | 1019-1024 |
|
Lixin Shen, Jing Liu, Shufang Xu, Changfeng Yuan and Tingting Tao | ||
Knowledge Modeling and Semantic Retrieval for Traffic Information Based on Fuzzy Ontology and SPARQL | 1025-1029 |
|
Jun Zhai, Yan Chen and Jianfeng Li | ||
Time-Varying Sliding Mode Control for Air-Breathing Hypersonic Vehicles | 1031-1036 |
|
Qunya Yin, Jianqiang Yi and Xiangmin Tan | ||
A Study on the Integration of QFD-PMMM in Cloud Computing System Quality | 1037-1043 |
|
Chih-Had Chen, Shing-Han Li, Mark Hwang and Jang-Ruey Tzeng | ||
An Efficient Heuristic Scheduling Algorithm for Optimal Job Allocation in Computational Grids | 1045-1050 |
|
Wanneng Shu, Lixin Ding and Shenwen Wang | ||
Relation Extraction Based on Multi-View Ensemble Algorithm | 1051-1056 |
|
Jing Qiu, Liehuang Zhu and Junkang Hao | ||
Aggregation of Interval Numbers in Group Decision Making | 1057-1062 |
|
Yong Deng, Jiyi Wu, Xiaohong Sun, Peida Xu and Yajuan Zhang | ||
Using PCA for Predicting Protein Subcellular Localization of Gram-Negative Bacteria Based on Pseudo Amino Acid Composition | 1063-1068 |
|
Yanhong Wang, Chaobing He, Lidong Wang, Zhao Wang, Jiang Tian and Junwei Ma | ||
FMLKNN: A Fuzzy Membership Function Based K-Nearest Neighbor Approach for Multi-Label Classification | 1069-1075 |
|
Jung-Yi Jiang and Shie-Jue Lee | ||
Synchronization of Spatiotemporal Chaos via Sliding Mode Control | 1077-1082 |
|
Congyan Chen and Chengzhuan Jiang | ||
Dynamic Environment Modeling and Path Planning for Mobile Robot | 1083-1088 |
|
Wei-dong Chen, Yan-xiang Yang, Qi-guang Zhu and Chun-fang Wang | ||
How to Measure Software Flexibility | 1089-1093 |
|
Si-wei Peng, Li-min Shen and Hui Liu | ||
Risk Assessment of Semiconductor Manufacturing Capacity Planning Based on Value-at-Risk Theory | 1095-1099 |
|
Bo Li and Yang Cao | ||
A Password Authentication Scheme with Forward Secrecy | 1101-1105 |
|
Yung-Cheng Lee and Yi-Chih Hsieh | ||
Fuzzy Identification Based on Monotonicity and Interval Type-2 Fuzzy Logic | 1107-1113 |
|
Tiechao Wang, Jianqiang Yi and Chengdong Li | ||
Predicting the Compressive Strength of Concrete Using Rebound Method and Artificial Neural Network | 1115-1120 |
|
Jianming Liu, Huijian Li and Changjun He | ||
Concrete Compressive Strength Prediction Using Rebound and Core Drilling Synthetic Method through Artificial Neural Networks | 1121-1127 |
|
Huijian Li, Jianming Liu and Changjun He | ||
Design of a Trajectory Tracking Controller for Uncertain Nonlinear Systems via the Model-Deviation Compensation Strategy | 1129-1135 |
|
Xiaojie Sun, Hua Ye and Shumin Fei | ||
CFO Matrix Method and Performance Analysis for Carrier Frequency Offset Estimation in OFDMA Uplink | 1137-1144 |
|
Ruiyan Du, Jinkuan Wang, Liqun Shan and Fulai Liu | ||
Optimal Combination of Conflicting Evidence Based on Genetic Algorithm | 1145-1150 |
|
Wen Jiang, Jinye Peng and Yong Deng | ||
Expected Gain Based Early Warning for Real-Time Process Monitoring | 1151-1156 |
|
Bokyoung Kang, Dongsoo Kim and Suk-Ho Kang | ||
Network Intrusion Detection Using Neural Networks and Multi-Attribute Decision Making Method | 1157-1162 |
|
Huayang Wu and Xin Guan | ||
Robust Adaptive Neural Speed Tracking Control for the Induction Motor Drive System | 1163-1169 |
|
Jinpeng Yu, Yumei Ma, Bing Chen, Haisheng Yu and Songfeng Pan | ||
A Novel Algorithm for Motif Discovery | 1171-1176 |
|
Zhiru Chen, Wenxue Hong, Lufang Tian and Changwu Wang | ||
Class Information Couple with Free Combination of Stem for Predicting RNA Secondary Structure | 1177-1182 |
|
Changwu Wang, Tao Liu, Yongwei Jia, Baowen Wang and Wenyuan Liu | ||
A Second-Order Cone Programming Method for the Design of FIR Filters with Discrete Coefficients | 1183-1189 |
|
Xuewen Mu and Yaling Zhang | ||
Incentive Mechanism of Special Knowledge Sharing for Two Clients with Complementary Knowledge | 1191-1197 |
|
Mingzheng Wang, Changyan Shao and Mengru Ma |