International Journal of Innovative Computing, Information and Control (IJICIC)
ISSN 1349-418X



Volume 8, Number 4, April 2012

Local Directional Pattern (LDP) for Face Recognition
2423
Taskeed Jabid, Md. Hasanul Kabir and Oksam Chae
Full Text



Fault Detection for State-Delay Fuzzy Systems Subject to Random Communication Delay
2439
Xiaomei Zhang, Zhenjuan Zhang and Guoping Lu
Full Text



A Multi-Agent Architecture for Distributed Services and Applications
2453
Juan M. Corchado, Dante I. Tapia and Javier Bajo
Full Text



High Capacity Robust Audio Watermarking Scheme Based on FFT and Linear Regression
2477
Mehdi Fallahpour and David Megias
Full Text



Cellular Learning Automata for Mining Customer Behaviour in Shopping Activity
2491
Mansour Esmaeilpour, Vahideh Naderifar and Zarina Shukur
Full Text



Robustness in Dynamic Constraint Satisfaction Problems
2513
Laura Climent, Miguel A. Salido and Federico Barber
Full Text



Modeling and Simulation of Fuzzy Logic Controller-Based Model Reference Adaptive Controller
2533
R. Prakash and R. Anita
Full Text



A Simplified Recursive Dynamic PCA Based Monitoring Scheme for Imperial Smelting Process
2551
Zhikun Hu, Zhiwen Chen, Changchun Hua, Weihua Gui, Chunhua Yang and Steven X. Ding
Full Text



Evaluating Service Quality of Mobile Application Stores: A Comparison of Three Telecommunication Companies in Taiwan
2563
Li-Jen Yang, Tzu-Chuan Chou and Ji-Feng Ding
Full Text



Optimal Inventory Model with Fuzzy Perfective Rate, Demand Rate, and Purchasing Cost under Immediate Return for Defective Items
2583
Wen-Kai Kevin Hsu
Full Text



Multi-Recognition Combined Security System for Intelligent Car Electronics
2599
Gwo-Jia Jong, Peng-Liang Peng and Gwo-Jiun Horng
Full Text



On Pole Placement in LMI Region for Descriptor Linear Systems
2613
Jianjun Bai, Hongye Su, Jing Wang and Bingxin Shi
Full Text



A Novel Method for Driver Inattention Detection Using Driver Operation Signals
2625
Md Rizal Othman, Zhong Zhang, Takashi Imamura and Tetsuo Miyake
Full Text



A Secure and Efficiency ID-Based Authenticated Key Agreement Scheme Based on Elliptic Curve Cryptosystem for Mobile Devices
2637
Eun-Jun Yoon, Sung-Bae Choi and Kee-Young Yoo
Full Text



The Matrix Power Function and Its Application to Block Cipher S-Box Construction
2655
Eligijus Sakalauskas and Kestutis Luksys
Full Text



Performance Enhancement of the Differential Evolution Algorithm Using Local Search and a Self-Adaptive Scaling Factor
2665
Ching-Hung Lee, Che-Ting Kuo and Hao-Han Chang
Full Text



Bio-Inspired Multilayered and Multilanguage Arabic Script Character Recognition System
2681
Muhammad Imran Razzak, Syed Afaq Husain, Abdulrahman A. Mirza and Muhammad Khurram Khan
Full Text



Robust H-infinity Control for Networked Systems with Parameter Uncertainties and Multiple Stochastic Sensors and Actuators Faults
2693
Songlin Hu, Dong Yue, Jinliang Liu and Zhaoping Du
Full Text



Data Zooming for the Detection of Outliers and Subsequence Discords
2705
Jamal Ameen and Rawshan Basha
Full Text



A Study on Efficient Group-Oriented Signature Schemes for Realistic Application Environment
2713
Yu-Fang Chung, Tzer-Long Chen, Tzer-Shyong Chen and Chih-Sheng Chen
Full Text



Secure Business Process Modelling of SOA Applications Using ``UML-SOA-Sec''
2729
Muhammad Qaiser Saleem, Jafreezal Jaafar and Mohd Fadzil Hassan
Full Text



Usability Based Reliable and Cashless Payment System (RCPS)
2747
Shafiq ur Rehman, Jane Coughlan and Zahid Halim
Full Text



Video Surveillance Using Facial Features-Based Tracking
2761
Ibrahim Hemdan, Stephen Karungaru and Kenji Terada
Full Text



Using a Low Pass Filter to Recover Three-Dimensional Shape from Focus in the Presence of Noise
2777
Mannan Saeed Muhammad, Husna Mutahira and Tae-Sun Choi
Full Text



Improving Performance of ACO Algorithms Using Crossover Mechanism Based on Best Tours Graph
2789
Aybars Ugur and Dogan Aydin
Full Text



The Multi-Target Fire Distribution Strategy Research of the Anti-Air Fire Based on the Genetic Algorithm
2803
Chengsheng Pan, Yang Zhang, Li Yang and Shaoming Qiu
Full Text



Efficient Distributed Face Recognition in Wireless Sensor Network
2811
Muhammad Imran Razzak, Basem. A. Elmogy, Muhammad Khurram Khan and Khaled Alghathbar
Full Text



An Efficient Content Based Image Retrieval Method for Retrieving Images
2823
Quynh Nguyen Huu, Ha Nguyen Thi Thu and Tao Ngo Quoc
Full Text



A Robust and Real-Time Visual Speech Recognition for Smartphone Application
2837
Min Gyu Song, Md Tariquzzaman, Jin Young Kim, Seong Taek Hwang and Seung Ho Choi
Full Text



Recognizing Pathogenic Antibodies in SLE Using General Regression Neural Networks
2855
Mohamad Hasan Bahari, Asad Azemi, Mir Mojtaba Mirsalehi, Mahmoud Mahmoudi and Morteza Khadime
Full Text



Application of Type-2 Fuzzy Logic to Rule-Based Intrusion Alert Correlation Detection
2865
Chenn-Jung Huang, Kai-Wen Hu, Heng-Ming Chen, Tao-Ku Chang, Yun-Cheng Luo and Yih-Jhe Lien
Full Text



NURBS Curve Fitting Using Artificial Immune System
2875
Erkan Ulker
Full Text



New Results on Asymptotic and Robust Stability of Genetic Regulatory Networks with Time-Varying Delays
2889
Ruixia Yan and Jinliang Liu
Full Text



Design of a Dual-Input Buck-Boost Converter for Mobile Back-Lighting Applications
2901
Kei Eguchi, Sawai Pongswatd, Amphawan Julsereewong, Ichirou Oota, Shinya Terada and Hirofumi Sasaki
Full Text



PolaritySpam: Propagating Content-Based Information Through a Web-Graph to Detect Web-Spam
2915
F. Javier Ortega, Jose A. Troyano, Fermin L. Cruz and Carlos G. Vallejo
Full Text



Improved Arithmetic of Two-Position Fast Initial Alignment for SINS Using Unscented Kalman Filter
2929
Ji-zhou Lai, Jian Xiong, Jian-ye Liu and Bin Jiang
Full Text




Copyright (c) Since 2004 ICIC International, All rights reserved.