Home | Editorial Board | Aims & Scope | Information for Authors | Subscription | ICIC-EL | IJICIC |
A New Method for Absolute Value Equations Based on Harmony Search Algorithm | 1231-1236 |
|
Longquan Yong, Sanyang Liu, Shemin Zhang and Fang'an Deng | ||
A Prediction-Correction Method for Co-Coercive Variational Inequality Problems with Separable Operators in Traffic Assignment Problems | 1237-1243 |
|
Li Yue, Min Sun and Jihuan Ding | ||
Faults Diagnosis Based on Support Vector Machines with Parameters Optimization | 1245-1252 |
|
Chenghua Shi, Yapeng Wang and Honglei Zhang | ||
An Effective Attack Classification Scheme for Intrusion Detection Systems Using Bayesian Analysis Techniques | 1253-1259 |
|
Shuyue Wu, Jie Yu, Xiaoping Fan and Xiaodong Tang | ||
A Method for Attribute Reduction Using Rough Set Theory and Improved Particle Swarm Optimization | 1261-1266 |
|
Xingwen Liu, Dianhong Wang, Liangxiao Jiang and Fenxiong Chen | ||
Digital Acceleration Control Method for Path Tracking Control of an Autonomous Mobile Robot | 1267-1272 |
|
Yina Wang, Shuoyu Wang, Renpeng Tan and Yinlai Jiang | ||
A Parallel-MLFMA Method with the Domain Decomposition | 1273-1278 |
|
Xingang Wang, Bin Cheng and Weiqin Tong | ||
A Text Classifier Based on Cloud Model | 1279-1284 |
|
Yixing Liao, Xuezeng Pan and Wenyu Zhang | ||
Bayesian Network Learning for the Medicine Aid Diagnosis Analysis | 1285-1290 |
|
Jianfei Zhang, Shuangcheng Wang, Lijun Tian and Ning Wang | ||
An Experimental Investigation of the Competition Impact on Risk Attitude | 1291-1295 |
|
Meiping Huang, Xianyu Wang, Yingsheng Su and Huan Zhang | ||
Image Encryption Using Mapping Array and Random Division | 1297-1302 |
|
Zhenjun Tang, Weiwei Lan, Yumin Dai and Jinzhen He | ||
A Novel Quantum-Inspired Evolutionary Algorithm Based on EDA | 1303-1308 |
|
Jie Qian | ||
Combining PSO and Iterative MUSIC Searching DOA Estimation for the CDMA System | 1309-1314 |
|
Jhih-Chung Chang and Ann-Chen Chang | ||
Simulation for Disassembly Planning of Used-Product in Reverse Supply Chain | 1315-1320 |
|
Qiaolun Gu and Tiegang Gao | ||
Research and Application of Multi-Embedded System Cooperative Control for Plate Leveler | 1321-1326 |
|
Hongjie Li, Qingxue Huang, Xiulian Gong, Changjiang Ju, Jianmei Wang and Liye Fu | ||
Personalized Information Retrieval in Specific Domain | 1327-1332 |
|
Chunyan Liang | ||
Engineering Project Risk Rating Based on Matter-Element Model and Extension Analysis | 1333-1337 |
|
Cunbin Li, Yang Yang, Wenjun Chen and Zhe Du | ||
The Study of the Nuclear Power Economic Evaluation Index System Based on RBF Neural Network | 1339-1344 |
|
Jicheng Liu, Yajuan Yang and Suhua Wang | ||
Low-Carbon Contribution Effects Analysis Model of Power Supply Enterprises Based on Fuzzy Comprehensive Assessment Method and Its Application | 1345-1350 |
|
Ming Zeng, Chunwu Chen, Qingyu Liu and Xiaoli Zhu | ||
Investment Pattern and Economics Benefits Analysis of Distributed Generation | 1351-1356 |
|
Ming Zeng, Zhiwei Ma, Hongzhi Liu and Kun Zhang | ||
Government Investment Projects Collusion Supervision Based on the Prospect Theory | 1357-1362 |
|
Yunna Wu, Yisheng Yang, Tiantian Feng, Lirong Liu and Ruhang Xu | ||
Digital Plant Colony Modeling Based on 3D Digitization | 1363-1367 |
|
Boxiang Xiao, Weiliang Wen, Xinyu Guo and Shenglian Lu | ||
Automatic Transmission Idling Control Based on Discrete-Time Sliding Mode Controller | 1369-1374 |
|
Guangqiang Wu and Leilei Wang | ||
Performance Evaluation of Batch Median for Simulation Output Analysis | 1375-1380 |
|
Zhan Bao, Peng Shi and Ming Yang | ||
Quantitative Analysis on Core Frame Structure in Large-Scale Software | 1381-1386 |
|
Hui Li, Hai Zhao, Jiuqiang Xu, Wei Cai and Jun Ai | ||
Data Selection Algorithm for LVCSR's Semi-Supervised Incremental Learning | 1387-1392 |
|
Haifeng Li, Tian Zhang, Lin Ma and Maozu Guo | ||
A Strong RFID Authentication Protocol Based on Quadratic Residues and Key Array | 1393-1398 |
|
Xiuwei Xuan, Jianfu Teng and Yu Bai | ||
On the Security of Improved Low-Computation Partially Blind Signatures | 1399-1405 |
|
Hsiu-Feng Lin, Chiou-Yueh Gun and Chih-Ying Chen | ||
A Fine-Grained Access Control Scheme for Secure Video Multicast | 1407-1412 |
|
Lo-Yao Yeh, Jee-Gong Chang and Yi-Lang Tsai | ||
Integrating the CART and Support Vector Machines Approach for Information Disclosure Prediction | 1413-1418 |
|
Der-Jang Chi, Ching-Chiang Yeh, Ming-Cheng Lai and Lon-Fon Shieh | ||
Setpoint Filters for Minimizing Overshoot for Low Order Processes | 1419-1425 |
|
V. Vijayan, C. Selvakumar and Rames C. Panda | ||
Knee Pain Detection Technology Using Magnetic Resonance Images | 1427-1432 |
|
Tun Chang Lu, Wan-Chun Liu, Chao-Hsing Hsu, Chung-Lain Lu and Yi-Nung Chung | ||
A Multi-Objective Evolutionary Algorithm for Reverse Logistics Network Design | 1433-1438 |
|
Bo He and He Huang | ||
A Prediction-Based Data Collection Method in Wireless Sensor Network Using Kalman Filter | 1439-1446 |
|
Yunsheng Liu and Zheng Wang | ||
Non-Fragile H-infinity Filtering for a Class of Sampled-Data System with Long Time-Delay | 1447-1452 |
|
Shi-gang Wang, Jun-feng Wu |