Volume 6, Number 8, August 2012

The Research of Stock Forecasting Based on Wavelet Denoising and BP-RBF Combination Neural Network 1981-1986
Rui Shan, Haibo Dai, Fei Jin and Jinxia Wei  
   
Hessian-LoG: A Novel Dot Enhancement Filter 1987-1992
Zhenghao Shi, Minghua Zhao, Yinghui Wang, Lifeng He, Kenji Suzuki, Chenwang Jin and Ming Zhang  
   
Rain Removal from Video Using Dark Channel Prior and Guided Filter 1993-1998
Jing Xu, Wei Zhao, Peng Liu and Xianglong Tang  
   
An Improved Harmony Search Algorithm for Absolute Value Equations with Normal Distribution 1999-2004
Longquan Yong, Yan Zhu, Guanghua Zhang and Tao Zhou  
   
Comparison of Wavelet, Contourlet and Dual-Tree Complex Wavelet for Palmprint Recognition 2005-2010
Xiaopeng Wei, Jianyang Liu, Jianxin Zhang and Qiang Zhang  
   
Generalized Interval-Valued Intuitionistic Trapezoidal Fuzzy Correlated Weighted Averaging Operator by Means of Choquet Integrals and Its Application to Multiple Attribute Decision Making 2011-2017
Hongchun Sun and Min Sun  
   
Option-Based Modelling of Technology Choices and Bank Performance 2019-2024
Wei-Ming Hung and Jyh-Horng Lin  
   
Design and Implementation of ZigBee Network Layer Protocol Based on Embedded ARM/TinyOS Platform 2025-2031
Quanli Liu, Guangen Gao, Gang Li and Wei Wang  
   
Aspect Ratio Invariant Visual Cryptography Scheme with Flexible Size Expansion 2033-2038
Peng Li, Pei-Jun Ma and Dong Li  
   
Nonlinear Dynamics in Heterogeneous Cournot Duopoly with Risk-Averse Agent 2039-2044
Ruiwu Yu and Renbin Xiao  
   
Efficient ECC-Based Key Management Scheme for Secure Multicast in Heterogeneous Sensor Networks 2045-2050
Chin-I Lee, Tzong-Chen Wu, Hung-Yu Chien and Kuo-Yu Tsai  
   
Further Cryptanalysis of Huang-Wei's Efficient Remote User Authentication Scheme with Smart Cards 2051-2056
Wen-Gong Shieh and Wen-Bing Horng  
   
An Efficient Ant Colony Optimization for Real Parameter Optimization 2057-2063
Li-Qing Zhao, Zi-Xuan Luo, Zhi-Qiang Chen and Rong-Long Wang  
   
Finite Memory Filtering for Power Control in Broadband Wireless Data Networks 2065-2070
Pyung Soo Kim  
   
Modeling and Analysis for Availability Management of P2P Storage Systems with Eager Repair Policy 2071-2078
Shunfu Jin and Lingling Chen  
   
Approach for Building Ontology Automatically Based on Wikipedia 2079-2084
Tianji Wu, Kui Xiao and Xiaohu Tan  
   
A Haptic Bimanual Interface for 3D B-Spline Curve Manipulation 2085-2089
Zhan Gao, Jiehua Wang and Xiang Gu  
   
Reliability Analysis of Embedded Software System Considering Component Reliability of Weibull Distribution 2091-2097
Tao Liu, Zhenzhou Ji, Qing Wang and Suxia Zhu  
   
One-Pass Testing Algorithm for Solving Underflow and Overflow Problems in Reversible Watermarking 2099-2104
Te-Cheng Hsu, Cheng-Yeh Chen, Wen-Shyong Hsieh, Nan-Tung Chen and John Y. Chiang  
   
A One-Parameter Family of Intuitionistic Fuzzy Entropy Based on Cosine Function 2105-2111
Jing Liu and Min Sun  
   
A Simple Unifying Approach of Designing the Sinusoidal Oscillator 2113-2117
Chung-Cheng Chen, Ting-Li Chien, Ying-Chen Chen, Kuan-Yu Chou and Yi-Hsiang Tseng  
   
Resource Reservation Based on Relaxed Strategy in Network Computing Systems 2119-2124
Peng Xiao, Ning Han and Zhe Huang  
   
Quantized Feedback Control of Linear Quadratic Gaussian Systems under Communication Constraints 2125-2131
Fang Jin, Qing-Quan Liu and Gui-Hong Tao  
   
Particle Swarm Optimization with Neighborhood Search for Multimodal Optimization Problems 2133-2140
Dingcai Shen, Yuanxiang Li and Yu Sun  
   
Cross-Language Speech Emotion Recognition in German and Chinese 2141-2146
Chengwei Huang, Dong Han, Yongqiang Bao, Hua Yu and Li Zhao  
   
The Precision for Fluid Flow Model of Window-Size Behavior of the Transmission Control Protocol 2147-2152
Hui Wang, Zhenzhou Ji, Huijie Qiao and Yandong Sun  
   
Optimal Control Problems for the Stochastic SIR Model under Vaccination< 2153-2160
Masaaki Ishikawa  
   
New Results on Robust H-infinity Control for Markovian Jump Linear Systems with Time-Delay 2161-2166
Xiang Teng  
   
Soap Header Extensions for Cross Domain SaaS Security 2167-2172
Yangpeng Zhu, Jing Zhang and Junhuai Li  
   
Route Selection for Dangerous Goods Transportation under Uncertain Environment 2173-2178
Daijun Wei, Bingyi Kang and Yong Deng  
   
Pyramid Difference Reversible Image Watermarking Scheme 2179-2184
Chien-Chang Chen  
   
New Admissibility Condition of Discrete-Time Singular Systems with Commensurate Delays 2185-2190
Yongyun Shao, Xiaodong Liu and Xin Sun  
   
Collision Analysis of Human Visual System Based Image Hashing 2191-2196
Zhenjun Tang, Xianquan Zhang and Zhixin Li  
   
Forecasting Enrollments Based on Fuzzy-Trend of Axiomatic Fuzzy Set Membership Degrees 2197-2204
Lili Tao, Xiaodong Liu and Yan Chen  
   
Solution Algorithm for Unit Commitment 2205-2210
Takayuki Shiina  
   
A New Simple Thermoelectric Temperature Controlled Box System 2211-2218
Hsin-Hung Chang, Fu-Tai Wang and Chung-Cheng Chen  
   

Copyright (c) Since 2007 ICIC International. All rights reserved.