A Role of Information Security Committee Based on Competing Values Framework |
767-773 |
Kunwoo Kim and Jungduk Kim |
Full Text |
DOI: 10.24507/icicel.10.04.767 |
|
|
|
A Study on the Methodology for Solving Social Problems through Literature Review |
775-783 |
Hong Joo Lee |
Full Text |
DOI: 10.24507/icicel.10.04.775 |
|
|
|
Sequential Selection among Auctions under Incomplete Information in Cognitive Radio Networks |
785-791 |
Jun Ma and Yonghong Zhang |
Full Text |
DOI: 10.24507/icicel.10.04.785 |
|
|
|
A Heuristic Rescue Method for Cold Chain Delivery Problem with an Accident of Vehicle Breakdown |
793-798 |
Zheng Wang and Lei Bao |
Full Text |
DOI: 10.24507/icicel.10.04.793 |
|
|
|
A Simulated Annealing Based Multistart Heuristic for the Set Covering Problem |
799-805 |
Lingxiao Xue and Geng Lin |
Full Text |
DOI: 10.24507/icicel.10.04.799 |
|
|
|
State Estimation for Networked Control Systems under Information Limitation |
807-812 |
Qingquan Liu |
Full Text |
DOI: 10.24507/icicel.10.04.807 |
|
|
|
A Novel Decision-Making Mechanism for Cloud Computing Environments |
813-818 |
Xu Wu and Feng Li |
Full Text |
DOI: 10.24507/icicel.10.04.813 |
|
|
|
Model and Analyze Plant Growth Affected by Water Deficits |
819-824 |
Songyang Li, Xiaodong Liu and Miao Wang |
Full Text |
DOI: 10.24507/icicel.10.04.819 |
|
|
|
A Systematic Design Procedure for Building Smart Digital Services and Spaces |
825-830 |
Taesoo Lim, Seung Sik Yoon and Dongsoo Kim |
Full Text |
DOI: 10.24507/icicel.10.04.825 |
|
|
|
The Research on Listed Tourism Companies Growth Based on Fuzzy Comprehensive Evaluation Model |
831-837 |
Weiling Su, Xinyuan Liu and Shanshan Zha |
Full Text |
DOI: 10.24507/icicel.10.04.831 |
|
|
|
P Systems-Based Fuzzy c-Means Clustering Algorithm with Local Spatial Information for Image Segmentation |
839-848 |
Jing Tan, Yanxiang Yang, Jun Wang, Ke Chen, Hong Peng and Ming Li |
Full Text |
DOI: 10.24507/icicel.10.04.839 |
|
|
|
An Improved Partheno-Genetic Algorithm for the Vehicle Routing Problem with Dynamic Demands and Time Windows |
849-855 |
Chenghua Shi, Tonglei Li, Fei Zhao and Xiaoqing Hu |
Full Text |
DOI: 10.24507/icicel.10.04.849 |
|
|
|
Research on Fuzzy Programming Method Based on Utility Frequency |
857-864 |
Fachao Li and Yingjun Li |
Full Text |
DOI: 10.24507/icicel.10.04.857 |
|
|
|
Hedgehog: Team Building System Estimating Effectiveness of Team |
865-870 |
Shuhei Miyake and Hajime Murao |
Full Text |
DOI: 10.24507/icicel.10.04.865 |
|
|
|
Analysis System Design for Knowledge Visualization Based on Manufacturing Data |
871-876 |
Jin Ma, Jong-Suk Ruth Lee, Kumwon Cho and Minjae Park |
Full Text |
DOI: 10.24507/icicel.10.04.871 |
|
|
|
Applying Real Time Image Recognition Technology to Apartment Parking Lot Security System |
877-882 |
Yi-Nung Chung, Tun-Chang Lu, Chao-Hsing Hsu and Shu-Yu Wu |
Full Text |
DOI: 10.24507/icicel.10.04.877 |
|
|
|
A Projection-Based Feature Extraction Algorithm for License Plate Recognition |
883-887 |
Cheng-Yu Yeh and Yi-Cheng Chen |
Full Text |
DOI: 10.24507/icicel.10.04.883 |
|
|
|
Stochastic Service Systems of Discrete-Time: Queue Length and Busy Period |
889-896 |
Yabo Wang, Yao Lin, Sufang Han and Zhenting Hou |
Full Text |
DOI: 10.24507/icicel.10.04.889 |
|
|
|
Research of Image Retrieval Based on Chain Code Histogram and Chain Code Spatial Distribution Entropy |
897-902 |
Wei Gao, Yan Song and Jingying Cai |
Full Text |
DOI: 10.24507/icicel.10.04.897 |
|
|
|
A New Side-Hole Acoustic Method to Identify Cast-in-Situ Piles Defect Types Based on W-PNN |
903-908 |
Bingxin Li, Huijian Li, Lixin Zhang and Chen Zhang |
Full Text |
DOI: 10.24507/icicel.10.04.903 |
|
|
|
Neimark-Sacker Bifurcation in a New Three-Dimensional Discrete Chaotic System |
909-914 |
Shuang Qin, Jiangang Zhang, Wenju Du and Jianning Yu |
Full Text |
DOI: 10.24507/icicel.10.04.909 |
|
|
|
Multi-Objective Optimal Tracking Performance of Networked Systems with Communication Constraints |
915-922 |
Jie Wu, Xinxiang Sun, Qingsheng Yang, Xisheng Zhan and Bo Wu |
Full Text |
DOI: 10.24507/icicel.10.04.915 |
|
|
|
Adaptive Dispatching Rule for Job Shop Scheduling Problem via Gene Expression Programming |
923-928 |
Liping Zhang, Qiuhua Tang and Peng Zheng |
Full Text |
DOI: 10.24507/icicel.10.04.923 |
|
|
|
Neural Network-Based Adaptive Tracking Control for Permanent Magnet Synchronous Motors with Iron Loss |
929-934 |
Wei Li, Yumei Ma, Jinpeng Yu, Xiaoling Wang and Lichao Liu |
Full Text |
DOI: 10.24507/icicel.10.04.929 |
|
|
|
Improved CPHD Filter Based on Weight Optimization |
935-942 |
Bo Li, Jianli Zhao, Yajun Wang and Lu Wang |
Full Text |
DOI: 10.24507/icicel.10.04.935 |
|
|
|
GPU-Based Rendering of Global Illumination Using Discretization of Radiosity Equation |
943-948 |
Wenjun Song, Jinhua Fu and Yang Zhang |
Full Text |
DOI: 10.24507/icicel.10.04.943 |
|
|
|
Information System Risk Control Method Based on Operation-Flow |
949-956 |
Hongyu Yang and Xiang Cheng |
Full Text |
DOI: 10.24507/icicel.10.04.949 |
|
|
|
Model and Application of Fuzzy Control Scientific and Technological Evaluation |
957-964 |
Hui Wang, Jing Wang and Baofeng Shi |
Full Text |
DOI: 10.24507/icicel.10.04.957 |
|
|
|
A Metaheuristic-Based Vehicle Routing for Intracity Container Transportation |
965-970 |
Pyung-Hoi Koo |
Full Text |
DOI: 10.24507/icicel.10.04.965 |
|
|
|
Improved Kernel Principal Component Analysis Algorithm for Network Intrusion Detection |
971-975 |
Dahui Li, Xin He and Xuefeng Dai |
Full Text |
DOI: 10.24507/icicel.10.04.971 |
|
|
|
The Modeling of Mobilization Work Process for Emergency Rescue Based on Stochastic Petri Net |
977-983 |
Huizhen Kong |
Full Text |
DOI: 10.24507/icicel.10.04.977 |
|
|
|
Research on Synthesizing Effect-Based Regression Method |
985-993 |
Fachao Li, Xiaoxiao Su and Chenxia Jin |
Full Text |
DOI: 10.24507/icicel.10.04.985 |
|
|
|
Assessing the Effectiveness of Directory Service Based Resource Management for SMEs in Korea |
995-1000 |
Sung-Jun Lee and Minsoo Kim |
Full Text |
DOI: 10.24507/icicel.10.04.995 |
|
|
|