Home | Editorial Board | Aims & Scope | Information for Authors | Subscription | ICIC-ELB | IJICIC |
The Research of Stock Forecasting Based on Wavelet Denoising and BP-RBF Combination Neural Network | 1981-1986 |
|
Rui Shan, Haibo Dai, Fei Jin and Jinxia Wei | ||
Hessian-LoG: A Novel Dot Enhancement Filter | 1987-1992 |
|
Zhenghao Shi, Minghua Zhao, Yinghui Wang, Lifeng He, Kenji Suzuki, Chenwang Jin and Ming Zhang | ||
Rain Removal from Video Using Dark Channel Prior and Guided Filter | 1993-1998 |
|
Jing Xu, Wei Zhao, Peng Liu and Xianglong Tang | ||
An Improved Harmony Search Algorithm for Absolute Value Equations with Normal Distribution | 1999-2004 |
|
Longquan Yong, Yan Zhu, Guanghua Zhang and Tao Zhou | ||
Comparison of Wavelet, Contourlet and Dual-Tree Complex Wavelet for Palmprint Recognition | 2005-2010 |
|
Xiaopeng Wei, Jianyang Liu, Jianxin Zhang and Qiang Zhang | ||
Generalized Interval-Valued Intuitionistic Trapezoidal Fuzzy Correlated Weighted Averaging Operator by Means of Choquet Integrals and Its Application to Multiple Attribute Decision Making | 2011-2017 |
|
Hongchun Sun and Min Sun | ||
Option-Based Modelling of Technology Choices and Bank Performance | 2019-2024 |
|
Wei-Ming Hung and Jyh-Horng Lin | ||
Design and Implementation of ZigBee Network Layer Protocol Based on Embedded ARM/TinyOS Platform | 2025-2031 |
|
Quanli Liu, Guangen Gao, Gang Li and Wei Wang | ||
Aspect Ratio Invariant Visual Cryptography Scheme with Flexible Size Expansion | 2033-2038 |
|
Peng Li, Pei-Jun Ma and Dong Li | ||
Nonlinear Dynamics in Heterogeneous Cournot Duopoly with Risk-Averse Agent | 2039-2044 |
|
Ruiwu Yu and Renbin Xiao | ||
Efficient ECC-Based Key Management Scheme for Secure Multicast in Heterogeneous Sensor Networks | 2045-2050 |
|
Chin-I Lee, Tzong-Chen Wu, Hung-Yu Chien and Kuo-Yu Tsai | ||
Further Cryptanalysis of Huang-Wei's Efficient Remote User Authentication Scheme with Smart Cards | 2051-2056 |
|
Wen-Gong Shieh and Wen-Bing Horng | ||
An Efficient Ant Colony Optimization for Real Parameter Optimization | 2057-2063 |
|
Li-Qing Zhao, Zi-Xuan Luo, Zhi-Qiang Chen and Rong-Long Wang | ||
Finite Memory Filtering for Power Control in Broadband Wireless Data Networks | 2065-2070 |
|
Pyung Soo Kim | ||
Modeling and Analysis for Availability Management of P2P Storage Systems with Eager Repair Policy | 2071-2078 |
|
Shunfu Jin and Lingling Chen | ||
Approach for Building Ontology Automatically Based on Wikipedia | 2079-2084 |
|
Tianji Wu, Kui Xiao and Xiaohu Tan | ||
A Haptic Bimanual Interface for 3D B-Spline Curve Manipulation | 2085-2089 |
|
Zhan Gao, Jiehua Wang and Xiang Gu | ||
Reliability Analysis of Embedded Software System Considering Component Reliability of Weibull Distribution | 2091-2097 |
|
Tao Liu, Zhenzhou Ji, Qing Wang and Suxia Zhu | ||
One-Pass Testing Algorithm for Solving Underflow and Overflow Problems in Reversible Watermarking | 2099-2104 |
|
Te-Cheng Hsu, Cheng-Yeh Chen, Wen-Shyong Hsieh, Nan-Tung Chen and John Y. Chiang | ||
A One-Parameter Family of Intuitionistic Fuzzy Entropy Based on Cosine Function | 2105-2111 |
|
Jing Liu and Min Sun | ||
A Simple Unifying Approach of Designing the Sinusoidal Oscillator | 2113-2117 |
|
Chung-Cheng Chen, Ting-Li Chien, Ying-Chen Chen, Kuan-Yu Chou and Yi-Hsiang Tseng | ||
Resource Reservation Based on Relaxed Strategy in Network Computing Systems | 2119-2124 |
|
Peng Xiao, Ning Han and Zhe Huang | ||
Quantized Feedback Control of Linear Quadratic Gaussian Systems under Communication Constraints | 2125-2131 |
|
Fang Jin, Qing-Quan Liu and Gui-Hong Tao | ||
Particle Swarm Optimization with Neighborhood Search for Multimodal Optimization Problems | 2133-2140 |
|
Dingcai Shen, Yuanxiang Li and Yu Sun | ||
Cross-Language Speech Emotion Recognition in German and Chinese | 2141-2146 |
|
Chengwei Huang, Dong Han, Yongqiang Bao, Hua Yu and Li Zhao | ||
The Precision for Fluid Flow Model of Window-Size Behavior of the Transmission Control Protocol | 2147-2152 |
|
Hui Wang, Zhenzhou Ji, Huijie Qiao and Yandong Sun | ||
Optimal Control Problems for the Stochastic SIR Model under Vaccination | 2153-2160 |
|
Masaaki Ishikawa | ||
New Results on Robust H-infinity Control for Markovian Jump Linear Systems with Time-Delay | 2161-2166 |
|
Xiang Teng | ||
Soap Header Extensions for Cross Domain SaaS Security | 2167-2172 |
|
Yangpeng Zhu, Jing Zhang and Junhuai Li | ||
Route Selection for Dangerous Goods Transportation under Uncertain Environment | 2173-2178 |
|
Daijun Wei, Bingyi Kang and Yong Deng | ||
Pyramid Difference Reversible Image Watermarking Scheme | 2179-2184 |
|
Chien-Chang Chen | ||
New Admissibility Condition of Discrete-Time Singular Systems with Commensurate Delays | 2185-2190 |
|
Yongyun Shao, Xiaodong Liu and Xin Sun | ||
Collision Analysis of Human Visual System Based Image Hashing | 2191-2196 |
|
Zhenjun Tang, Xianquan Zhang and Zhixin Li | ||
Forecasting Enrollments Based on Fuzzy-Trend of Axiomatic Fuzzy Set Membership Degrees | 2197-2204 |
|
Lili Tao, Xiaodong Liu and Yan Chen | ||
Solution Algorithm for Unit Commitment | 2205-2210 |
|
Takayuki Shiina | ||
A New Simple Thermoelectric Temperature Controlled Box System | 2211-2218 |
|
Hsin-Hung Chang, Fu-Tai Wang and Chung-Cheng Chen |