Home | Editorial Board | Aims & Scope | Information for Authors | Subscription | ICIC-ELB | IJICIC |
The Fifth-Order WENO Method with Non-Uniform Adaptive Mesh | 1527-1534 |
|
Maryam Arab Ameri and Raziyeh Javaheri Afif | ||
Distributed Recursive Filtering for Spatially Interconnected Systems with Randomly Occurred Missing Measurements | 1535-1540 |
|
Bai Li | ||
Segment-Based Static Feature Analysis and Recognition of Emotional Speech for Manned Space Mission | 1541-1546 |
|
Jun Wang, Bin Wu, Chengwei Huang, Haibo Qin, Cheng Zha and Li Zhao | ||
An Immune Network Classifier Based on Pair Wise Antigens | 1547-1552 |
|
Zelin Deng, Guanzheng Tan and Pei He | ||
Hopf Bifurcation Analysis of a Complicated Hyperchaotic System | 1553-1559 |
|
Kejun Zhuang | ||
Effects of Slab Deformation on Reduction Gradient in Reduction Zone | 1561-1566 |
|
Xueliang Shi, Tingzhi Ren, Xin Jin, Dawei Liu and Yulin Zhang | ||
Study on Ultra-Lightweight RFID Authentication Protocol Based Crossover | 1567-1572 |
|
Zongyin Du, Guoan Zhang and Honglin Yuan | ||
A Game Theory Based Energy Efficiency Routing Algorithm for Wireless Sensor Networks | 1573-1578 |
|
Yanqi Chen, Xiaoyu Wang, Yuan Huang and Xingwei Liu | ||
Ranking Twitter Users Based on Their Retweet Probability | 1579-1583 |
|
Xue Zeng and Yue Wu | ||
Global Asymptotic Stability of an N-Patch Predator-Prey System | 1585-1592 |
|
Yanqiu Li and Jizhang Fan | ||
An Efficient Role-Based Access Control Approach in IRBAC 2000 | 1593-1598 |
|
Xiaopu Ma, Ning Cheng, Li Zhao and Ruixuan Li | ||
Phase Synchronization of Fractional-Order Chua's Chaotic System | 1599-1605 |
|
Junhai Luo and Heng Liu | ||
Research of Corn Seeds Contour Detection Algorithm Based on BEMD and Soft Morphology | 1607-1611 |
|
Yanqiu Wang and Xiaofei Yan | ||
A Method of Human Detection and Statistics Based on Monocular Vision | 1613-1618 |
|
Qing Ye, Rentao Gu and Yuefeng Ji | ||
Some Characterizations of Prime Q-Fuzzy Ideals of Ordered Semigroups | 1619-1626 |
|
Jian Tang | ||
A Sequence Clustering Method for Analyzing Software Fault Feature | 1627-1632 |
|
Yanyan Wang, Yanning Wang and Jiadong Ren | ||
Improvement of the Chaotic Image Encryption Effect Based on Unary Polynomial Transformation | 1633-1638 |
|
Ling Wu, Hong Chen and Kai Yang | ||
Content-Based Fast Query for PDF Document Data on MapReduce | 1639-1644 |
|
Hengliang Shi, Chongguang Ren, Lei Zhang and Tao Huang | ||
Novel Properties of Spread Spectrum Sequence in Digital Watermarking | 1645-1651 |
|
Jian Wang and Nan Jiang | ||
Optimal Strategies for Integrated Pricing, Marketing and Production Planning by Geometric Programming | 1653-1658 |
|
Guoli Liu, Tong Ye and Wei Wang | ||
Ant Colony Intelligence for Flexible Manufacturing Scheduling in the Framework of Contract-Net Protocol | 1659-1663 |
|
Yingzi Wei, Kanfeng Gu and Lijuan Qin | ||
A Novel Clustering Algorithm Based on Partition for Mass Data | 1665-1670 |
|
Zhaojiang Ren, Yanbo Liu, Kaiyu Jin and Shida Zhang | ||
A New Stabilization Approach to Sampled-Data Systems with Inputs Missing | 1671-1676 |
|
Zhongning Lu, Zhanlei Shang and Xunlin Zhu | ||
An Efficient Subspace Clustering Algorithm Based on Attribute Relativity and DBSCAN | 1677-1682 |
|
Qiang Zeng, Yunyue Bai, Haitao He and Jiadong Ren | ||
Research on the Algorithm for Euclidean Shortest Paths of Visiting Line Segments in the Plane | 1683-1688 |
|
Lijuan Wang, Bo Jiang, Qi Wei and Dandan He | ||
New Classification Method of Combining kNN and Structurally Regularized SVM | 1689-1695 |
|
Xuchu Wang, Yanmin Niu, Li-Wen Tan and Shao-Xiang Zhang | ||
Power-Rate-Distortion Optimization for Mobile Sign Language Video Encoding | 1697-1702 |
|
Xiaolei Chen, Aihua Zhang, Dongmei Lin and Xinzhu Yang | ||
A New Approach of Fault Line Detection in Small Current Grounding System | 1703-1709 |
|
Bo Li | ||
Particle Swarm Optimization with Opposition-Based Learning and Parent Centric Crossover | 1711-1717 |
|
Chen Chen and Xiaoting Ma | ||
Customer Heterogeneity and Intertemporal Pricing | 1719-1724 |
|
Biyu Lv and Jiantong Zhang | ||
Learning from the Imbalanced Data Based on Quantum Evolutionary | 1725-1729 |
|
Kuoyi Shao, Yun Zhai, Haifeng Sui and Changsheng Zhang | ||
Failure Mode and Effects Analysis Using Dempster-Shafer Theory and D Numbers Methodology | 1731-1736 |
|
Yuxian Du, Xinyang Deng and Yong Deng | ||
A Threshold Proxy Blind Signature Scheme Based on CL-PKC | 1737-1742 |
|
Lingyun Zhao, Fangai Liu and Zhenfang Zhu | ||
Evaluation Model of Business Project Overall Risks Based on Follower Banks | 1743-1748 |
|
Guotai Chi and Zhanjiang Li | ||
DWCSPMDS: Mining Dual Weighted Closed Sequential Patterns over Data Streams | 1749-1754 |
|
Xiaobing Hao, Gaowei Han, Weina Li and Jiadong Ren | ||
Damage Simulation of 3D Four-Directional Braided Composites | 1755-1760 |
|
Fangfang Zhang and Cai Liu | ||
Numerical Simulation Research on Stretch-Bending Springback of Sheet Metal in Different Loading Methods | 1761-1766 |
|
Ruixue Zhai, Zhiping Qian and Jun Zhao | ||
Document Cluster Ensemble Method Using the Spectral Clustering | 1767-1773 |
|
Ye Tian and Peng Yang | ||
Research on the Reactive Power Optimization of Power System with Distributed Generation | 1775-1780 |
|
Baoguo Li, Weiguo Guan, Pijie Jiang and Baochun Lu |