Home | Editorial Board | Aims & Scope | Information for Authors | Subscription | ICIC-ELB | IJICIC |
An Application of Machine Learning on the Network Security Model | 291-296 |
|
Hai-Chen Wang, Xiang-Mo Zhao and Hai-Sheng Wang | ||
Combining Ant Colony Optimization with Genetic Algorithm for Vehicle Routing Problem with Time Windows | 297-302 |
|
Qiulei Ding, Xiangpei Hu and Yang Jiang | ||
A New Method for Feature Selection of Radio Abnormal Signal | 303-309 |
|
Xuan Zhou, Zheng Pei, Penghui Liu, Sen Zhao and Qiang Li | ||
Fingerprint Prediction Using Statistical and Machine Learning Methods | 311-316 |
|
Promise Molale, Bhekisipho Twala and Solly Seeletse | ||
A Study on Visualization of Opening Flower Based on Morphological Model and L-System | 317-322 |
|
Fuxi Shi and Jun Chen | ||
Improved Center-Symmetric LTP Integrating with Color Histogram for Robust Mean Shift Tracking | 323-329 |
|
Dan Zhang, Di Hou and Rong Xin | ||
Multiple Failure Modes and Effects Analysis of Gas Turbine Based on Similarity Measure | 331-336 |
|
Huadong Yang and Hong Xu | ||
A Design Method for a Control System to Attenuate Unknown State Disturbances Using Disturbance Observers | 337-342 |
|
Jie Hu, Kou Yamada, Tatsuya Sakanushi, Hongfei Wang, Yuki Nakui and Yusuke Atsuta | ||
Real-Time Database Query Monitoring Method Using Vehicle Black Box Function | 343-348 |
|
Young Ran Hong and Dongsoo Kim | ||
A Comparative Study between Box-Jenkins and Artificial Neural Networks Modeling Schemes in Predictions of Taiwan's Currency | 349-353 |
|
Yuehjen E. Shao and Wen Hao Lee | ||
The Parameterization of all Multiple-Input/Multiple-Output Plants Stabilized by an Integral Controller | 355-360 |
|
Takaaki Hagiwara, Kou Yamada, Satoshi Aoyama, An Chinh Hoang and Hui Huo | ||
Fuzzy Multi-Characteristic Pattern Recognition Method Based on Rough Fuzzy Numbers | 361-367 |
|
Yanhui Bi, Xiaodong Liu and Xinghua Feng | ||
Background Net Approach for Text Categorization Based on Contextual Association as Term Co-Occurrence | 369-375 |
|
Sio-Long Lo and Liya Ding | ||
A Fuzzy Normal Estimation Method for Mass Point Clouds of Denture | 377-382 |
|
Yanju Liu and Yongde Zhang | ||
Modeling on Express Freight and Workforce Size Considering Service Quality and Delay Losses | 383-388 |
|
Xuping Wang, Kai Yang and Zilai Sun | ||
A Model for Cardinal Direction Relations in 3D Space | 389-395 |
|
Miao Wang, Xiaole Liu and Yanju Liu | ||
A Genetic Algorithm Approach for Planning Load Transfer Points in Primary Distribution Networks | 397-402 |
|
Wei-tzer Huang, Kai-chao Yao, Der-fa Chen and Wen-chih Yang | ||
Adaptive Synchronization for Two Nonlinearly Coupled Complex Dynamical Networks with Uncertain Parameters | 403-408 |
|
Qing Zhang and Zhengquan Yang | ||
Approximation Quality of Fuzzy Preference Rough Sets and Its Application in Radio Signal Recognition | 409-415 |
|
Jie Yang, Zichun Chen, Zheng Pei, Penghui Liu and Xinzi Ma | ||
Design MIMO Control Systems with Non-Gaussian Delays and Noises | 417-422 |
|
Jianhua Zhang, Mifeng Ren, Guolian Hou and Mei Yu | ||
A Novel Adaptive Neural Control for Uncertain Unified Chaotic Systems | 423-428 |
|
Huanqing Wang, Bing Chen and Chong Lin | ||
A New Method for Structure Equation Model Parameter Estimation | 429-433 |
|
Jian-Jun Wang, Xiao-Cong Cui, Si-Yu Chen and Zhan Li | ||
PSO-Based Specified Structure Mixed H2/H-infinity Multiple PHEV Controllers for Robust Frequency Control in Interconnected Power Systems with Large Wind Farms | 435-441 |
|
Chalotorn Rattanapornchai and Issarachai Ngamroo | ||
Depth Map Enhancement Based on Adaptive Joint Trilateral Filter | 443-448 |
|
Li Li, Hua Yan and Youen Zhao | ||
Assessing the Lifetime Performance of Rayleigh Products under Progressively Type II Right Censored Samples | 449-454 |
|
Chin-Chuan Wu and Li-Ching Chen | ||
Minkowski Sum Modeling of Polyhedra Based on VRML | 455-460 |
|
Jianfei Zhang, Xijuan Guo and Qingjia Geng | ||
An Efficient Collision Detection Algorithm of Convex Polygons Based on Minkowski Sum | 461-464 |
|
Qingjia Geng, Xijuan Guo, Jianfei Zhang and Buying Zhang | ||
An Improved Smooth Bayesian Classification Method on Text | 465-469 |
|
Wei Wang, Shiqun Yin, Chao Liu and Miao Zhang | ||
Scenario-Based Allocating of Relief Medical Supplies for Large-Scale Disasters | 471-478 |
|
Junhu Ruan, Xuping Wang and Yan Shi | ||
Knowledge and Data Engineering: Fuzzy Approach and Genetic Algorithms for Clustering Beta-Thalassemia of Knowledge Based Diagnosis Decision Support System | 479-484 |
|
Patcharaporn Paokanta, Napat Harnpornchai, Nopasit Chakpitak, Somdet Srichairatanakool and Michele Ceccarelli | ||
Concept Space Mining of Human-Thinking Simulated Control | 485-491 |
|
Peijin Wang | ||
A New Algorithm for Conflicting Evidence Based on Gray Correlation | 493-498 |
|
Jia Jia, Wen Jiang, Zhenjian Li, Dejie Duanmu and Xin Fan | ||
A Novel Weighted Combination Method of Conflicting Evidences | 499-504 |
|
Dejie Duanmu, Wen Jiang, Xin Fan, Zhenjian Li and Cuicui Wu | ||
Fault Diagnosis in Condition of Imbalanced Samples Using Candidate Set Relevance Vector Machine | 505-512 |
|
Hui Yi, Yufang Liu, Guangming Zhang, Bin Jiang and Xiaofeng Song | ||
LMI-Based Robust Fault-Tolerant Control for Networked Control Systems | 513-518 |
|
Jianwei Liu, Bin Jiang, Ke Zhang and Zehui Mao | ||
Feature Integration Using Principal Component Analysis for Heart Rate Variability Analysis | 519-526 |
|
Chuan-Wei Ting and Ching-Yao Wang | ||
An Agent-Based Approach for Software Self-Adaptation | 527-534 |
|
Yu Zhou, Jidong Ge and Jun Hu | ||
Microarray Missing Value Estimation by Local Bayesian Principal Component Analysis | 535-539 |
|
Fanchi Meng and Cheng Cai | ||
A New Approach to Cope with Software Evolution Using Knowware System Concepts | 541-546 |
|
Ashok Swarnalatha and Liya Ding | ||
Analysis and Disposal on Over Current Fault of Synchronous Motor with Parameter Differences | 547-552 |
|
Jiesheng Wang and Zhenlong Xuan | ||
Novel View for Fractional Fourier Transform and the Applications on Optical Image Encryption | 553-558 |
|
Lin-Lin Tang and Jeng-Shyang Pan | ||
Verification of Real-Time Models with Hierarchical Extensions | 559-564 |
|
Yu Zhou and Zhiqiu Huang | ||
Ladybird Skin Region Detection Based on Bayesian Classifier | 565-570 |
|
Yongli Dai and Cheng Cai | ||
Direct Chosen-Ciphertext-Attack Hierarchical Computing Technique for Identity-Based Encryption | 571-576 |
|
Leyou Zhang, Qing Wu and Yupu Hu | ||
Word Sense Disambiguation and Knowledge Discovery of English Modal Verb Can | 577-582 |
|
Jianping Yu, Nan Chen, Rui Sun, Wenxue Hong and Shaoxiong Li | ||
A Human-Robot Interaction Based Building Map Method on Aldebaran Nao | 583-587 |
|
Shuhua Liu and Chih-Cheng Hung | ||
The Study of Intelligent Traffic Control System Based on Ethernet | 589-594 |
|
Wen-ge Ma, Hang Liu and Jin Yan |