ISSN 1881-803X
ICIC Express Letters
An International Journal of Research and Surveys



Home
Editorial Board
Aims & Scope
Information for Authors
Subscription
ICIC-ELB
IJICIC



Volume 7, Issue 2, February 2013

An Application of Machine Learning on the Network Security Model
291-296
Hai-Chen Wang, Xiang-Mo Zhao and Hai-Sheng Wang




Combining Ant Colony Optimization with Genetic Algorithm for Vehicle Routing Problem with Time Windows
297-302
Qiulei Ding, Xiangpei Hu and Yang Jiang




A New Method for Feature Selection of Radio Abnormal Signal
303-309
Xuan Zhou, Zheng Pei, Penghui Liu, Sen Zhao and Qiang Li




Fingerprint Prediction Using Statistical and Machine Learning Methods
311-316
Promise Molale, Bhekisipho Twala and Solly Seeletse




A Study on Visualization of Opening Flower Based on Morphological Model and L-System
317-322
Fuxi Shi and Jun Chen




Improved Center-Symmetric LTP Integrating with Color Histogram for Robust Mean Shift Tracking
323-329
Dan Zhang, Di Hou and Rong Xin




Multiple Failure Modes and Effects Analysis of Gas Turbine Based on Similarity Measure
331-336
Huadong Yang and Hong Xu




A Design Method for a Control System to Attenuate Unknown State Disturbances Using Disturbance Observers
337-342
Jie Hu, Kou Yamada, Tatsuya Sakanushi, Hongfei Wang, Yuki Nakui and Yusuke Atsuta




Real-Time Database Query Monitoring Method Using Vehicle Black Box Function
343-348
Young Ran Hong and Dongsoo Kim




A Comparative Study between Box-Jenkins and Artificial Neural Networks Modeling Schemes in Predictions of Taiwan's Currency
349-353
Yuehjen E. Shao and Wen Hao Lee




The Parameterization of all Multiple-Input/Multiple-Output Plants Stabilized by an Integral Controller
355-360
Takaaki Hagiwara, Kou Yamada, Satoshi Aoyama, An Chinh Hoang and Hui Huo




Fuzzy Multi-Characteristic Pattern Recognition Method Based on Rough Fuzzy Numbers
361-367
Yanhui Bi, Xiaodong Liu and Xinghua Feng




Background Net Approach for Text Categorization Based on Contextual Association as Term Co-Occurrence
369-375
Sio-Long Lo and Liya Ding




A Fuzzy Normal Estimation Method for Mass Point Clouds of Denture
377-382
Yanju Liu and Yongde Zhang




Modeling on Express Freight and Workforce Size Considering Service Quality and Delay Losses
383-388
Xuping Wang, Kai Yang and Zilai Sun




A Model for Cardinal Direction Relations in 3D Space
389-395
Miao Wang, Xiaole Liu and Yanju Liu




A Genetic Algorithm Approach for Planning Load Transfer Points in Primary Distribution Networks
397-402
Wei-tzer Huang, Kai-chao Yao, Der-fa Chen and Wen-chih Yang




Adaptive Synchronization for Two Nonlinearly Coupled Complex Dynamical Networks with Uncertain Parameters
403-408
Qing Zhang and Zhengquan Yang




Approximation Quality of Fuzzy Preference Rough Sets and Its Application in Radio Signal Recognition
409-415
Jie Yang, Zichun Chen, Zheng Pei, Penghui Liu and Xinzi Ma




Design MIMO Control Systems with Non-Gaussian Delays and Noises
417-422
Jianhua Zhang, Mifeng Ren, Guolian Hou and Mei Yu




A Novel Adaptive Neural Control for Uncertain Unified Chaotic Systems
423-428
Huanqing Wang, Bing Chen and Chong Lin




A New Method for Structure Equation Model Parameter Estimation
429-433
Jian-Jun Wang, Xiao-Cong Cui, Si-Yu Chen and Zhan Li




PSO-Based Specified Structure Mixed H2/H-infinity Multiple PHEV Controllers for Robust Frequency Control in Interconnected Power Systems with Large Wind Farms
435-441
Chalotorn Rattanapornchai and Issarachai Ngamroo




Depth Map Enhancement Based on Adaptive Joint Trilateral Filter
443-448
Li Li, Hua Yan and Youen Zhao




Assessing the Lifetime Performance of Rayleigh Products under Progressively Type II Right Censored Samples
449-454
Chin-Chuan Wu and Li-Ching Chen




Minkowski Sum Modeling of Polyhedra Based on VRML
455-460
Jianfei Zhang, Xijuan Guo and Qingjia Geng




An Efficient Collision Detection Algorithm of Convex Polygons Based on Minkowski Sum
461-464
Qingjia Geng, Xijuan Guo, Jianfei Zhang and Buying Zhang




An Improved Smooth Bayesian Classification Method on Text
465-469
Wei Wang, Shiqun Yin, Chao Liu and Miao Zhang




Scenario-Based Allocating of Relief Medical Supplies for Large-Scale Disasters
471-478
Junhu Ruan, Xuping Wang and Yan Shi




Knowledge and Data Engineering: Fuzzy Approach and Genetic Algorithms for Clustering Beta-Thalassemia of Knowledge Based Diagnosis Decision Support System
479-484
Patcharaporn Paokanta, Napat Harnpornchai, Nopasit Chakpitak, Somdet Srichairatanakool and Michele Ceccarelli




Concept Space Mining of Human-Thinking Simulated Control
485-491
Peijin Wang




A New Algorithm for Conflicting Evidence Based on Gray Correlation
493-498
Jia Jia, Wen Jiang, Zhenjian Li, Dejie Duanmu and Xin Fan




A Novel Weighted Combination Method of Conflicting Evidences
499-504
Dejie Duanmu, Wen Jiang, Xin Fan, Zhenjian Li and Cuicui Wu




Fault Diagnosis in Condition of Imbalanced Samples Using Candidate Set Relevance Vector Machine
505-512
Hui Yi, Yufang Liu, Guangming Zhang, Bin Jiang and Xiaofeng Song




LMI-Based Robust Fault-Tolerant Control for Networked Control Systems
513-518
Jianwei Liu, Bin Jiang, Ke Zhang and Zehui Mao




Feature Integration Using Principal Component Analysis for Heart Rate Variability Analysis
519-526
Chuan-Wei Ting and Ching-Yao Wang




An Agent-Based Approach for Software Self-Adaptation
527-534
Yu Zhou, Jidong Ge and Jun Hu




Microarray Missing Value Estimation by Local Bayesian Principal Component Analysis
535-539
Fanchi Meng and Cheng Cai




A New Approach to Cope with Software Evolution Using Knowware System Concepts
541-546
Ashok Swarnalatha and Liya Ding




Analysis and Disposal on Over Current Fault of Synchronous Motor with Parameter Differences
547-552
Jiesheng Wang and Zhenlong Xuan




Novel View for Fractional Fourier Transform and the Applications on Optical Image Encryption
553-558
Lin-Lin Tang and Jeng-Shyang Pan




Verification of Real-Time Models with Hierarchical Extensions
559-564
Yu Zhou and Zhiqiu Huang




Ladybird Skin Region Detection Based on Bayesian Classifier
565-570
Yongli Dai and Cheng Cai




Direct Chosen-Ciphertext-Attack Hierarchical Computing Technique for Identity-Based Encryption
571-576
Leyou Zhang, Qing Wu and Yupu Hu




Word Sense Disambiguation and Knowledge Discovery of English Modal Verb Can
577-582
Jianping Yu, Nan Chen, Rui Sun, Wenxue Hong and Shaoxiong Li




A Human-Robot Interaction Based Building Map Method on Aldebaran Nao
583-587
Shuhua Liu and Chih-Cheng Hung




The Study of Intelligent Traffic Control System Based on Ethernet
589-594
Wen-ge Ma, Hang Liu and Jin Yan





Copyright (c) Since 2007 ICIC International, All rights reserved.