Home | Editorial Board | Aims & Scope | Information for Authors | Subscription | ICIC-ELB | IJICIC |
Exponential Stability of Switched Linear Systems with Mixed Time Delays | 2101-2109 |
|
El Houssaine Tissir | ||
The New Iterative Learning Control Algorithm Based on Vector Rotation for Discrete Time Systems | 2111-2117 |
|
Guangwei Xu and Cheng Shao | ||
Solving Combinatorial Optimization Problems by a Discrete Gravitational Search Algorithm | 2119-2127 |
|
Shangce Gao and Zheng Tang | ||
Adaptive Fuzzy Backstepping Control for a Class of Nonlinear Plants Preceded by Unknown Hysteresis | 2129-2135 |
|
Dezhi Feng, Huaguang Zhang and Ning Cao | ||
Solving Fuzzy Optimization Problems Using alpha-Cuts | 2137-2142 |
|
Hassan Mishast Nehi and Ali Daryab | ||
An Automatic Container Tracking System with the Application of Passive Electronic Seals and EPCglobal Network | 2143-2148 |
|
Chien-Wen Shen, Ming-Town Lee, James Perng and Carrie Wen | ||
Observer-Based Dynamic Feedback Control under Communication Constraints | 2149-2156 |
|
Qing-Quan Liu | ||
An Adaptive Target Tracking Scheme for Wireless Sensor Networks | 2157-2163 |
|
Qingzheng Xu and Lei Wang | ||
On the Minimal Siphons and Deadlock Prevention in the Petri Net Model of the Dining Philosopher's Problem | 2165-2171 |
|
ChunFu Zhong and ZhiWu Li | ||
Design and Implementation of the Network Information Filtering System | 2173-2178 |
|
Yuguo Liu and Zhenfang Zhu | ||
Hidden Information Rate of Information Hiding System Based on Spread Spectrum with Covariance Matrix Shaping | 2179-2184 |
|
Bin Yan and Yin-Jing Guo | ||
Measuring IP Repetition in Kademlia-Based Networks | 2185-2191 |
|
Xiangtao Liu, Kai Cai, Jingyuan Li and Xueqi Cheng | ||
Efficient Dynamic ID-Based Authentication for User Anonymity | 2193-2197 |
|
Kuo-Ching Liu, Hui-Feng Huang and Hui-Fang Chen | ||
Reliability Analysis of a Two-Unit Basic Model with a Repairman Who Operates a Single Vacation | 2199-2206 |
|
Renbin Liu and Zaiming Liu | ||
Artificial Bee Colony Algorithm for Multilevel Minimum Variance Thresholding | 2207-2213 |
|
Shu-Chien Huang | ||
Economic Order Quality Model with Immediate Return for Defective Items | 2215-2220 |
|
Wen-Kai Hsu and Hong-Fwu Yu | ||
Stability of Model-Based Networked System with Quantized Feedback | 2221-2228 |
|
Zhiwen Wang, Wei Pan and Ge Guo | ||
Research on Pricing and Coordination in Dual-Channel Supply Chain with Business Reputation | 2229-2234 |
|
Hui Ma, Deli Yang and Jianjun Wang | ||
Existence and Global Asymptotical Stability of Anti-Periodic Solution for Hopfield Neural Networks with Unbounded and Non-Lipschitz Activations | 2235-2241 |
|
Hongwen Xu, Huaiqin Wu and Chongyang Wu | ||
Trading Method of Total Permitted Pollution Discharge Capacity Based on Multi-Attribute Auction | 2243-2250 |
|
Congjun Rao, Yong Zhao and Xinlin Wu | ||
Block-Based Reversible Data Hiding | 2251-2255 |
|
Ching-Yu Yang, Chih-Hung Lin and Wu-Chih Hu | ||
A Distributed Group Rekeying Scheme Based on Trusted Computing | 2257-2262 |
|
Minmin Liu, Shixin Sun and Jing Liu | ||
A Unified Point of View for Pole Placement Formulas in Single-Input LTI Systems through the Analytical Solution of Lyapunov-Sylvester Equation | 2263-2268 |
|
Jose Mario Araujo and Carlos Eduardo Trabuco Dorea | ||
Risk-Driven Web Services Selection Based on Stochastic QoS | 2269-2274 |
|
Xiaodong Fu, Kun Yue, Ping Zou and Feng Wang | ||
Constant Quality Control of Wyner-Ziv Frames in DCT Domain Distributed Video Coding | 2275-2280 |
|
Hongbin Liu, Debin Zhao, Siwei Ma and Wen Gao | ||
Solving Multiobjective Bilevel Linear Programming by Multi-Parent Genetic Algorithm | 2281-2286 |
|
Liping Jia, Yuping Wang and Ning Dong | ||
SA Based Software Deployment Reliability Estimation Considering Component Reliability | 2287-2291 |
|
Xihong Su, Hongwei Liu, Zhibo Wu, Xiaozong Yang and Decheng Zuo | ||
Robust Stabilization of Nonlinear Uncertain Systems by Dynamic Output Feedback | 2293-2298 |
|
Jianxiong Li, Yiming Fang, Shengli Shi and Ru Chang | ||
A Multi-Objective Evolutionary Algorithm for Minimal Visual Coverage Path Problem in Raster Terrain | 2299-2304 |
|
Jie Li, Changwen Zheng and Xiaohui Hu | ||
Exact Observability and Exact Detectability of Discrete Stochastic Systems and Its Application | 2305-2311 |
|
Huiying Sun and Meng Li | ||
Spectral Clustering via Locality Sensitive Discriminant Information | 2313-2318 |
|
Chunming Xu | ||
An Innovative Certificate-Free Signature Algorithm by Bilinear Parings on Elliptic Curve | 2319-2325 |
|
Wenxue Tan and Xiping Wang | ||
A Descent Decomposition Method for Solving a Class of Variational Inequalities in Equilibrium Modeling | 2327-2332 |
|
Min Sun | ||
Method of Improved Bayes Discriminant for Multi-Sensors Data Fusion | 2333-2339 |
|
Shuping Wan | ||
A New Entropy Formula on Intuitionistic Fuzzy Sets | 2341-2345 |
|
Teng-San Shih and Jin-Shieh Su | ||
A General Method of Function Projective Synchronization with Parameter Perturbation | 2347-2352 |
|
Hongyue Du, Feng Li and Libin Gong | ||
A Novel Approach of Quantum Transmission Security Algorithm with Repetition Code | 2353-2358 |
|
Skander Aris, Abderraouf Messai, Malek Benslama, Nadjim Merabtine and Mosleh M. Elharti | ||
An Adaptive Color Fusion Method for Infrared and Visible Images | 2359-2364 |
|
Weihua He, Yongcai Guo and Chao Gao | ||
Intelligent Decision System Rescuing Calls with Short Lengths Facing a Handover Failure in Mobile Satellite Networks | 2365-2370 |
|
Wassila Kiamouche and Malek Benslama | ||
Delay-Dividing Approach for Absolute Stability of Time-Delay Lurie Control System | 2371-2376 |
|
Yanhong Jiang, Bin Yang and Cheng Shao | ||
Reliability Analysis of the Repair Facility for an N-Unit Series System with an Unreliable Repair Facility and Multiple Vacations | 2377-2384 |
|
Zaiming Liu and Renbin Liu | ||
Using Easy Methods to Derive the EPQ Model with Shortages and Variable Lead Time | 2385-2388 |
|
Yung-Fu Huang, Kuo-Lung Hou, Kuang-Hua Hsu and Ming-Hon Hwang | ||
A Self-Organizing Fuzzy CMAC Model for Classification Applications | 2389-2393 |
|
Chun-Cheng Peng and Cheng-Jian Lin | ||
Security Enhancement on an Exquisite Authenticated Key Agreement Scheme Using Smart Cards | 2395-2400 |
|
Jeng-Ping Lin and Jih-Ming Fu |