


default search action
Cognitive Systems Research, Volume 57
Volume 57, October 2019
- Yazhong Deng:
Construction of ideal model of social development under the political background of mind philosophy. 1-10 - Xiangmin Li:
Characteristics and rules of college English education based on cognitive process simulation. 11-19 - Weidong Huang, Xiang Xiao, Mengqiang Xu:
Design and implementation of domain-specific cognitive system based on question similarity algorithm. 20-24 - Tangwei Teng, Liuting Qin:
Analysis of regional environment and regional innovation strategy based on cybernetics. 25-31 - Xiaohong Zhang
, Xuejiao Wang, Florentin Smarandache
, Tèmítópé Gbóláhàn Jaíyéolá
, TieYan Lian:
Singular neutrosophic extended triplet groups and generalized groups. 32-40 - Xinyang Zhang, Meng Zhou:
Construction of CCZ transform for quadratic APN functions. 41-45 - A. Muthukrishnan
, J. Charles Rajesh kumar, Vinod Kumar, M. Kanagaraj:
Internet of image things-discrete wavelet transform and Gabor wavelet transform based image enhancement resolution technique for IoT satellite applications. 46-53 - Weijun Zhu, Joel J. P. C. Rodrigues, Jianwei Niu
, Mingliang Xu, Qinglei Zhou:
Mimic automata: A novel formal model for mimic computing. 54-65 - Varun Kumar Tiwari, Mohammad Farukh Hashmi
, Avinash G. Keskar
, N. C. Shivaprakash:
Speaker identification using multi-modal i-vector approach for varying length speech in voice interactive systems. 66-77 - N. Susitha, Ravi Subban:
Reliable pupil detection and iris segmentation algorithm based on SPS. 78-84 - Jiyou Li:
Government accounting optimization based on computational linguistics. 85-91 - Weijun Zhu, Joel J. P. C. Rodrigues, Jianwei Niu
, Qinglei Zhou, Yafei Li, Mingliang Xu, Bohu Huang:
Detecting air-gapped attacks using machine learning. 92-100 - S. Anthony Jesudurai, A. Senthilkumar:
An improved energy efficient cluster head selection protocol using the double cluster heads and data fusion methods for IoT applications. 101-106 - Hongbing Ouyang, Xiaowei Zhang, Hongju Yan:
Index tracking based on deep neural network. 107-114 - A. S. Ajith, T. Latha:
Neutrosophic data formation using Gaussian filter based costas coding for wireless communication systems. 115-125 - (Withdrawn) IoT individual privacy features analysis based on convolutional neural network. 126-130
- Ganesh Kumar Chellamani
, Premanand Venkatesh Chandramani:
Demand response management system with discrete time window using supervised learning algorithm. 131-138 - Yong Ma, Rongxia Zhang, Tongqiang Zong:
Law, discipline and governance based on cognitive process simulation - analysis of legal forms in the modern rights relationship. 139-146 - Rachna Jain
, Nikita Jain, Akshay Aggarwal, D. Jude Hemanth:
Convolutional neural network based Alzheimer's disease classification from magnetic resonance brain images. 147-159 - Johannes Nauta
, Christof Mahieu
, Christophe Michiels, Femke Ongenae, Femke De Backere
, Filip De Turck
, Yara Khaluf
, Pieter Simoens
:
Pro-active positioning of a social robot intervening upon behavioral disturbances of persons with dementia in a smart nursing home. 160-174 - Peide Liu, Qaisar Khan, Tahir Mahmood
:
Multiple-attribute decision making based on single-valued neutrosophic Schweizer-Sklar prioritized aggregation operator. 175-196 - Rashed Refaat
, Ibrahim Mahmoud El-Henawy:
Innovative method to evaluate quality management system audit results' using single value neutrosophic number. 197-206 - Robert H. Wortham
, Swen E. Gaudl
, Joanna J. Bryson
:
Instinct: A biologically inspired reactive planner for intelligent embedded systems. 207-215 - Mohamed Abdel-Basset
, Asmaa Atef, Florentin Smarandache
:
A hybrid neutrosophic multiple criteria group decision making approach for project selection. 216-227 - Yizhuo Zhang:
Application of improved BP neural network based on e-commerce supply chain network data in the forecast of aquatic product export volume. 228-235 - T. Thamaraimanalan
, P. Sampath:
A low power fuzzy logic based variable resolution ADC for wireless ECG monitoring systems. 236-245

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.