Volume 5, Number 2, February 2011

A Comparison of Heuristic Approaches to the Travelling Salesman Problem 279-283
Udom Janjarassuk  
   
Noise Averaging Effect of Privacy-Preserving Data Mining in Time-Series Databases 285-291
Yang-Sae Moon, Hea-Suk Kim and Sang-Pil Kim  
   
Secure Identity-Based Ad Hoc Protocols for Mobile Networks 293-298
Leyou Zhang, Yupu Hu and Qing Wu  
   
Robust H-infinity Control for Uncertain Nonlinear Singular Systems with Time-Varying Delay 299-304
Jiqing Qiu, Yanjun Wang, Xiaoming Du, Yanchun Zhao and Yuming Guo  
   
Off-Line Divisible E-Cash with All Nodes Spendable 305-310
Hongli Zhang, Jiuhong Wang, Jie Zhang and Wenyuan Liu  
   
Emergency Resource Location and Allocation under Uncertainty of Disaster Degree 311-316
Xuping Wang, Li Dong, Chao Ma and Mingtian Chen  
   
Analysis on Information Value Factors that Influence Satisfaction with Wireless Internet Service in South Korea -- Focused on a Comparison
between the Years 2003 and 2010
317-322
Mincheol Kim, Youngbae Yang and Nyamsuren Davaadorj  
   
Possibility of Activating the City's Central Commercial Businesses 323-328
Toshihiko Gima  
   
IT Service Vendor Screening Contract Based on Principal-Agent Theory 329-335
Mingzheng Wang and Changyan Shao  
   
Hidden-Node-Based NNE for Financial Decision Applications 337-341
Jin Tian, Minqiang Li and Fuzan Chen  
   
SOP (Skyline on the Path) Algorithm for Moving Objects 343-348
Wookey Lee, David Y. Jang and Taesoo Lim  
   
A Hybrid SVM-FLC Approach to MAP Speaker Adaptation for Speech Recognition 349-354
Ing-Jr Ding  
   
Missing Value Imputation Using Genetic Algorithm 355-360
Kairung Hengpraphrom, Sageemas Na Wichian and Phayung Meesad  
   
Design and Simulation of Setting Pharmaceutical Service Fee without Drug Addition in Public Hospital 361-366
Bing Xu, Zuiyi Shen and Juying Zeng  
   
Genetic Programming Based Robust Image Watermarking Using Wavelet and Morton Order 367-372
Almas Abbasi, Zahoor Jan, Arfan Jaffar and Anwar M. Mirza  
   
Strategic Partnership-Based Reconfiguration of Express Package Service Network with Extension of Consolidation Terminal Capacity 373-378
Chang Seong Ko, Eun Mi Yoon, Ki Ho Chung and Hyun Jeung Ko  
   
Research on Identification of Relative Pair for Product Reviews 379-384
Qian Wang and Xiao-Hua Chen  
   
A Fuzzy Set-Theoretic Approach to the Weak Strategic Alliance for the Survival of Multiple Service Centers in Express Courier Services 385-389
Ki Ho Chung, Hyun Jeung Ko, Friska Natalia Ferdinand and Chang Seong Ko  
   
Measuring RFID Visibility via a Concept of Information Freshness 391-396
Hoontae Kim, Youngjin Kim and Minsoo Ki  
   
Research on Relationship of the Brand Equity, Brand Relationship and Brand Loyalty for Mobile Shopping Site -- Based on Customers' Perspective 397-403
Hui Guan, Yunfu Huo and Yujun Feng  
   
Wap Equity: Scale Development and Validation 405-411
Hui Guan, Xia Xie, Yunfu Huo and Yujun Feng  
   
Improvement on Backbone Nodes' Many-to-One Communication Collision Algorithm in Satellite Network 413-418
Chengsheng Pan, Haiyan Liu and Wei Yan  
   
Service-Oriented RED Algorithm 419-424
Li Yang, Chengsheng Pan, Chunling Liu and Hui Guo  
   
Adaptive Fuzzy Tracking Control for Induction Motors via Backstepping 425-431
Jinpeng Yu, Yumei Ma, Bing Chen and Haisheng Yu  
   
A Global Trust-Based Reputation Model in Multi-Hop Networks 433-438
Kun Wang, Jianmin Bao and Meng Wu  
   
Product Fuzzy Recommendation of Online Reviews Based on Consumer Psychological Motives 439-445
Zhengkui Lin, Narisa Zhao, Ying Liu, De-li Yang and Yuan Li  
   
Controllability of Fractional Impulsive Neutral Evolution Integrodifferential Inclusions with State-Dependent Delay in Banach Spaces 447-454
Zhixin Tai and Xingcheng Wang  
   
Spindle and Workpiece Information Collecting for Industrial Internet of Things 455-459
Yuqing Chen, Ge Guo, Ying Hu, Bo Ning and Wenchao Wang  
   
The Design and Application of Wireless Ad Hoc Maritime Communications System 461-466
Yu Gong, Xudong Wang, Rongxi He, Fuwen Pang and Chunli Gao  
   
An Empirical Study of DRER Model in Managing Temporal RFID Data 467-472
Lijuan Niu, Rong Chen, Xingqiang Zhou and Hong Yang  
   
Correlation Models of Interdependency and Protection in Critical Infrastructure Networks 473-478
Yanxin Wang and Xiangyang Li  
   
A State Space-Based Solution Approach to Disruption Management Problems in the Distribution Industry 479-484
Minfang Huang, Yanxin Wang, Xiangpei Hu and Yanan Wang  
   
A Novel Modulation Technology Suitable for Wireless Sensor Network 485-490
Mingyan He, Dequn Liang, Jinli Wang and Jingli Zhang  
   
Ultimately Uniformly Bounded Adaptive Tracking Fuzzy Control for Nonlinear System with Unknown Dead-Zone 491-496
Junsheng Ren, Xianku Zhang and Jianchuan Yin  
   
Marine Market Forecasting Using Extension Neural Network 497-502
Wei Li, Zhengjiang Liu and Jiaxuan Yang  
   
A Two-Stage Semi-Supervised Weighted Naive Credal Classification Model 503-508
Rui-Hua Qi and De-Li Yang  
   
A Risk Evaluation Method for Real Estate Investment Based on Linguistic Variables 509-516
Minghe Wang and Peide Liu  
   
A Survey on Autonomic Self-Optimizing Systems 517-523
Shanta Rangaswamy and Gangadhara T. Shobha  
   
Error Estimation for HR-Adaptive Boundary Element Method -- A New Approach 525-530
Yiming Chen, Dongmei Jin and Zhiquan Zhou  
   
The New Conjugate Gradient Method to Additive GARCH Model 531-536
Rui Shan, Peiliang Li and Jing Fan  
   
Sensor and Actuator Fault Estimation for Satellite Attitude System by Augmenting System State Approach 537-544
Yuehua Cheng, Bin Jiang, Yanping Fu and Zhifeng Gao  
   
Construction of the Membership Function of a Fuzzy Number 545-549
Hemanta K. Baruah  
   
Patient Safety Management: RFID Technology to Improve Emergency Room Medical Care Quality 551-555
Chia-Chen Chao, Hsuan-Ku Liu and Chang-I Chen  
   
Multilevel Image Thresholding Selection Based on the Firefly Algorithm 557-562
Ming-Huwi Horng and Ting-Wei Jiang  
   

Copyright (c) Since 2007 ICIC International. All rights reserved.