Volume 2, Number 6, December 2011

A New Method for Absolute Value Equations Based on Harmony Search Algorithm 1231-1236
Longquan Yong, Sanyang Liu, Shemin Zhang and Fang'an Deng  
   
A Prediction-Correction Method for Co-Coercive Variational Inequality Problems with Separable Operators in Traffic Assignment Problems 1237-1243
Li Yue, Min Sun and Jihuan Ding  
   
Faults Diagnosis Based on Support Vector Machines with Parameters Optimization 1245-1252
Chenghua Shi, Yapeng Wang and Honglei Zhang  
   
An Effective Attack Classification Scheme for Intrusion Detection Systems Using Bayesian Analysis Techniques 1253-1259
Shuyue Wu, Jie Yu, Xiaoping Fan and Xiaodong Tang  
   
A Method for Attribute Reduction Using Rough Set Theory and Improved Particle Swarm Optimization 1261-1266
Xingwen Liu, Dianhong Wang, Liangxiao Jiang and Fenxiong Chen  
   
Digital Acceleration Control Method for Path Tracking Control of an Autonomous Mobile Robot 1267-1272
Yina Wang, Shuoyu Wang, Renpeng Tan and Yinlai Jiang  
   
A Parallel-MLFMA Method with the Domain Decomposition 1273-1278
Xingang Wang, Bin Cheng and Weiqin Tong  
   
A Text Classifier Based on Cloud Model 1279-1284
Yixing Liao, Xuezeng Pan and Wenyu Zhang  
   
Bayesian Network Learning for the Medicine Aid Diagnosis Analysis 1285-1290
Jianfei Zhang, Shuangcheng Wang, Lijun Tian and Ning Wang  
   
An Experimental Investigation of the Competition Impact on Risk Attitude 1291-1295
Meiping Huang, Xianyu Wang, Yingsheng Su and Huan Zhang  
   
Image Encryption Using Mapping Array and Random Division 1297-1302
Zhenjun Tang, Weiwei Lan, Yumin Dai and Jinzhen He  
   
A Novel Quantum-Inspired Evolutionary Algorithm Based on EDA 1303-1308
Jie Qian  
   
Combining PSO and Iterative MUSIC Searching DOA Estimation for the CDMA System 1309-1314
Jhih-Chung Chang and Ann-Chen Chang  
   
Simulation for Disassembly Planning of Used-Product in Reverse Supply Chain 1315-1320
Qiaolun Gu and Tiegang Gao  
   
Research and Application of Multi-Embedded System Cooperative Control for Plate Leveler 1321-1326
Hongjie Li, Qingxue Huang, Xiulian Gong, Changjiang Ju, Jianmei Wang and Liye Fu  
   
Personalized Information Retrieval in Specific Domain 1327-1332
Chunyan Liang  
   
Engineering Project Risk Rating Based on Matter-Element Model and Extension Analysis 1333-1337
Cunbin Li, Yang Yang, Wenjun Chen and Zhe Du  
   
The Study of the Nuclear Power Economic Evaluation Index System Based on RBF Neural Network 1339-1344
Jicheng Liu, Yajuan Yang and Suhua Wang  
   
Low-Carbon Contribution Effects Analysis Model of Power Supply Enterprises Based on Fuzzy Comprehensive Assessment Method and Its Application 1345-1350
Ming Zeng, Chunwu Chen, Qingyu Liu and Xiaoli Zhu  
   
Investment Pattern and Economics Benefits Analysis of Distributed Generation 1351-1356
Ming Zeng, Zhiwei Ma, Hongzhi Liu and Kun Zhang  
   
Government Investment Projects Collusion Supervision Based on the Prospect Theory 1357-1362
Yunna Wu, Yisheng Yang, Tiantian Feng, Lirong Liu and Ruhang Xu  
   
Digital Plant Colony Modeling Based on 3D Digitization 1363-1367
Boxiang Xiao, Weiliang Wen, Xinyu Guo and Shenglian Lu  
   
Automatic Transmission Idling Control Based on Discrete-Time Sliding Mode Controller 1369-1374
Guangqiang Wu and Leilei Wang  
   
Performance Evaluation of Batch Median for Simulation Output Analysis 1375-1380
Zhan Bao, Peng Shi and Ming Yang  
   
Quantitative Analysis on Core Frame Structure in Large-Scale Software 1381-1386
Hui Li, Hai Zhao, Jiuqiang Xu, Wei Cai and Jun Ai  
   
Data Selection Algorithm for LVCSR's Semi-Supervised Incremental Learning 1387-1392
Haifeng Li, Tian Zhang, Lin Ma and Maozu Guo  
   
A Strong RFID Authentication Protocol Based on Quadratic Residues and Key Array 1393-1398
Xiuwei Xuan, Jianfu Teng and Yu Bai  
   
On the Security of Improved Low-Computation Partially Blind Signatures 1399-1405
Hsiu-Feng Lin, Chiou-Yueh Gun and Chih-Ying Chen  
   
A Fine-Grained Access Control Scheme for Secure Video Multicast 1407-1412
Lo-Yao Yeh, Jee-Gong Chang and Yi-Lang Tsai  
   
Integrating the CART and Support Vector Machines Approach for Information Disclosure Prediction 1413-1418
Der-Jang Chi, Ching-Chiang Yeh, Ming-Cheng Lai and Lon-Fon Shieh  
   
Setpoint Filters for Minimizing Overshoot for Low Order Processes 1419-1425
V. Vijayan, C. Selvakumar and Rames C. Panda  
   
Knee Pain Detection Technology Using Magnetic Resonance Images 1427-1432
Tun Chang Lu, Wan-Chun Liu, Chao-Hsing Hsu, Chung-Lain Lu and Yi-Nung Chung  
   
A Multi-Objective Evolutionary Algorithm for Reverse Logistics Network Design 1433-1438
Bo He and He Huang  
   
A Prediction-Based Data Collection Method in Wireless Sensor Network Using Kalman Filter 1439-1446
Yunsheng Liu and Zheng Wang  
   
Non-Fragile H-infinity Filtering for a Class of Sampled-Data System with Long Time-Delay 1447-1452
Shi-gang Wang, Jun-feng Wu  
   

Copyright (c) Since 2010 ICIC International. All rights reserved.