Home | Editorial Board | Aims & Scope | Information for Authors | Subscription | ICIC-EL | IJICIC |
Mining the Telecom Marketing Information to Optimizing the Customer Retention Strategies | 1-6 |
|
Hao-En Chueh, Shun-Chueh Lin and Nien-Yi Jan | ||
Threshold Model of High and Low Oil Price Periods for Two Stock Market Returns: Empirical Study of Shanghai's and Shenzhen's Stock Markets | 7-12 |
|
Wann-Jyi Horng and Hai-Lin Lu | ||
A Method for Small Sample Size Face Recognition Based on Kernel Discriminant Analysis with Two Subspaces | 13-18 |
|
Minghua Zhao, Zhenghao Shi and Yinghui Wang | ||
A Comprehensive Model to Assess E-Commerce Security Based on AHP and Evidential Reasoning: First Results | 19-24 |
|
Yajuan Zhang, Xinyang Deng, Wen Jiang and Yong Deng | ||
Incremental Learning of MQDF for Writer Adaptation | 25-30 |
|
Kai Ding, Lianwen Jin, Gang Liu, Jinglian Gao and Zhonghao Mei | ||
An Active Management Framework for Automatic Fault Detection and Elimination in Distributed Systems | 31-35 |
|
Zhonglei Fan | ||
Design of a Battery Equalizer Using Level-Shift Circuits | 37-42 |
|
Kei Eguchi, Tatsuya Sugimura, Toshiya Watanabe and Hirofumi Sasaki | ||
The Scheduling Strategy of Concurrent Request in Distributed Railway Interlocking System | 43-48 |
|
Xinhong Hei and Na Ouyang | ||
Study of Battery Charger Using Contactless Transmission System | 49-56 |
|
Kuen-Cheng Wang, Che-Wei Hsu, Yu-Lin Juan, I-Ching Yang and Tsair-Rong Chen | ||
A Method for Lung Nodules Detection Using KPCA and Template Matching Algorithm | 57-62 |
|
Zhenghao Shi, Fengxia Wang, Hedong Wang, Minghua Zhao, Yinghui Wang and Quanzhu Yao | ||
Application of Forecasting Models and Residual Control Charts for False Alarms Determination of a PCB Process | 63-68 |
|
Yuehjen E. Shao, Yini Lin, Chia-Ding Hou and Chih-Jen Yang | ||
Lung Segmentation in Chest Radiographs Using Double Localizing Region-Based Active Contours | 69-74 |
|
Zhenghao Shi, Li Li, Hedong Wang, Fengxia Wang, Minghua Zhao, Yinghui Wang and Quanzhu Yao | ||
High-Capacity Lossless Data Hiding Using a Novel Method | 75-80 |
|
Ching-Yu Yang and Wu-Chih Hu | ||
Design and Implementation of Industry Wireless Gateway Prototype | 81-88 |
|
Guangen Gao, Quanli Liu and Wei Wang | ||
Applying PCB Configuration to Wireless Mouse Power | 89-94 |
|
Chao-Shui Lin, Tsung-Jung Li, Shih-Chang Chen, Yi-Nung Chung and Tsair-Rong Chen | ||
An Anti-Occlusion Object Tracking Algorithm Based on Mean Shift and Particle Filter | 95-100 |
|
Kun Xu and Lanying Guo | ||
Registration of Head CT and MR Image Sets Based on Optimal Retrieval of Volume of Interests | 101-106 |
|
Yutaro Yamamura, Kouhei Harada, Hyoungseop Kim, Joo Kooi Tan, Seiji Ishikawa and Akiyoshi Yamamoto | ||
Applying Contactless Power Transfer System to Linear Track | 107-112 |
|
Shih-Chieh Tsai, Sheng-Guo Lin, Kun-Fang Huang, Kuen-Hung Hsieh and Tsair-Rong Chen | ||
Extraction of Parallel Translation Expressions for English-Writing Support Systems | 113-118 |
|
Qing Ma, Shinya Sakagami and Masaki Murata | ||
Optimizing the Patrol Routing Problem with Multiple Cars: An Effective Evolutionary Approach | 119-124 |
|
Yi-Chih Hsieh and Yung-Cheng Lee | ||
A Dividing Ratio Changeable Digital PLL Using Multi-Phase Clock VCO Unaffected by Input Frequency Change | 125-130 |
|
Hirotoshi Sasaki, Kuniaki Fujimoto, Hirofumi Sasaki and Mitsutoshi Yahara | ||
Bubble Popping System Using Vibro-Tactile Mouse for Augmented Reality | 131-136 |
|
Daun Jung, Kwanwook Lee and Manbae Kim | ||
Local Multi-Contextual Hidden Markov Model in the Nonsubsampled Contourlet Domain for Image Denoising | 137-142 |
|
Xiaohong Shen, Yulin Zhang and Gaoshan Wang | ||
Knowledge Agglomeration of Emergency Decision-Making Based on Principle of Water Collection on Spider Silk | 143-148 |
|
Lindu Zhao | ||
Empirical Research on the Influence of Human's Mental State on Knowledge Transfer Efficiency | 149-154 |
|
Chunmei Han and Wenping Wang | ||
A Matching Algorithm for Context-Based Knowledge Support towards Foreigners in China | 155-163 |
|
Xiangpei Hu, Khalil Al-mekhlafi, Lijun Sun and Ziguang Zheng | ||
Digital Image Hiding Arithmetic Based on Hermite Chaotic Neural Networks | 165-170 |
|
Ajin Zou, Yixiang Luo, Dongqing Xie and Lingxi Peng | ||
A New Approach for Fingerprint Image Enhancement in Frequency Domain | 171-176 |
|
JuCheng Yang | ||
Determination of the Senses of English Modal Verb Will by Fuzzy C-Means Cluster | 177-182 |
|
Jianping Yu, Liang Huang, Deming Mei, Wenxue Hong and Hongyu Liu | ||
An Effective Adaptive Patch-Based Texture Transfer Algorithm Using Particle Swarm Optimization | 183-188 |
|
Chung-Ming Kuo, Wei-Han Chang, Min-Yuan Fang and Guan-Da Huang | ||
Hiding Traces of the Inconsistent Block Artifact Grid in JPEG Images | 189-194 |
|
Shen Wang, Bian Yang and Xiamu Niu | ||
2D Principal Component Analysis Using a Novel Learning Algorithm | 195-201 |
|
Liang-Hwa Chen, Po-Lun Chang and Fei-Hu Hsieh | ||
Cost Aggregation for Stereo Matching with Trace-Based Diffusion | 203-208 |
|
Li Li, Cai-Ming Zhang and Hua Yan | ||
Key Frame Extraction from Motion Capture Data Based on GPU | 209-214 |
|
Pengjie Wang, Mingmin Zhang, Haiyu Song, Haiwei Wang, Mingliang Xu and Gengdai Liu | ||
Discrete-Time Designs for Load Swing Control of an Overhead Crane | 215-220 |
|
Prapart Ukakimaparn, Pittaya Pannil, Krit Smerpitak, Kitti Tirasesth, Thanit Trisuwannawat, Nariyuki Kodani and Shigeto Ouchi | ||
Implementation of a Robot Inspection System for Substation Equipment Based on Pioneer 3-AT | 221-226 |
|
Kezhi Wang, Shan Liang, Huibo Bi and Xiaodong Xian | ||
Control of Inverted Pendulum Based on Vision Sensor | 227-234 |
|
Yuanqing Xia, Wen Xie, Xiaoyun Wang and Xuan Xiao | ||
Ambulatory Estimation of Muscle Forces of Lower Limbs in a Rehabilitation Robot System | 235-240 |
|
Tao Liu, Yoshio Inoue, Kyoko Shibata and Enguo Cao | ||
A Picture Similarity Computing Comparison System | 241-246 |
|
Chin Jung Huang and Tsai Cheng Li | ||
A B-Spline Based Watermark Approach for Human Mocap Data | 247-252 |
|
Boxiang Xiao, Xinyu Guo and Chunjiang Zhao | ||
An Image-Based Landslide Monitoring System | 253-258 |
|
Chi-Chang Huang, Cheng-Pei Tsai, Ming-Chih Lu and Tien-Yu Tang | ||
N-Time Encoding Method for Hiding Multiple Images | 259-264 |
|
Kuang Tsan Lin | ||
The Embedded System Design for the Status of Electric Equipment Monitoring | 265-271 |
|
Yi-Yu Lu, Wen-Bin Lin, Cheng-Shion Shieh and Huann-Keng Chiang | ||
A* Searching Algorithm Based Path Planning of Mobile Robots | 273-278 |
|
Kuo-Lan Su, Cheng-Yun Chung, Yi-Lin Liao and Jr-Hung Guo |