


default search action
International Journal of Computational Intelligence Studies, Volume 9
Volume 9, Numbers 1/2, 2020
- Anis Cherfi
, Kaouther Nouira, Ahmed Ferchichi:
MC4.5 decision tree algorithm: an improved use of continuous attributes. 4-17 - Ameni Azzouz
, Meriem Ennigrou, Lamjed Ben Said:
Solving flexible job-shop problem with sequence dependent setup time and learning effects using an adaptive genetic algorithm. 18-32 - Jihene Younes
, Hadhemi Achour, Emna Souissi, Ahmed Ferchichi:
Contributions to the automatic processing of the user-generated Tunisian dialect on the social web. 33-51 - Abir Chaabani, Lamjed Ben Said:
A co-evolutionary decomposition-based algorithm for the bi-level knapsack optimisation problem. 52-67 - Ilhem Feddaoui, Faîçal Felhi, Jalel Akaichi:
Web service selection based on QoS and user profile. 68-84 - Ines Sbai, Olfa Limam, Saoussen Krichen:
An effective genetic algorithm for solving the capacitated vehicle routing problem with two-dimensional loading constraint. 85-106 - Ilhem Souissi
, Nadia Ben Azzouna, Lamjed Ben Said:
A multi-level study for trust management models assessment in VANETs. 107-127 - Nikolaos D. Almalis, George A. Tsihrintzis, Ioannis Papaioannou:
Handling the crowd avoidance problem in job recommendation systems integrating FoDRA. 128-145 - Ioannis G. Tsoulos, Alexandros T. Tzallas, Markos G. Tsipouras, Vasileios Christou, Dimitrios G. Tsalikakis:
Stopping rules for a parallel genetic algorithm. 146-160 - Ioannis G. Tsoulos:
Creating classification rules using grammatical evolution. 161-171 - Ganesh M. Kakandikar, Vilas M. Nandedkar:
Multi-objective optimisation of thickness and strain distribution for automotive component in forming process. 172-184
Volume 9, Number 3, 2020
- Mohammed Kaicer:
Information technology performance management by artificial intelligence in microfinance institutions: an overview. 186-189 - Mehdi Moukhafi, Khalid El Yassini, Seddik Bri:
Intelligent intrusion detection system using multilayer perceptron optimised by genetic algorithm. 190-199 - Hind Ziani, Nourddine Enneya:
QoE in video streaming over ad hoc networks: comparison and analysis of AODV and OLSR routing protocols. 200-219 - Mohammed Yahyaoui, Souad Amjad, Lamia Benameur, Ismail Jellouli:
Efficient of bitmap join indexes for optimising star join queries in relational data warehouses. 220-233 - Shreyas J.
, Jumnal Anand, S. M. Dilip Kumar, K. R. Venugopal:
Application of computational intelligence techniques for internet of things: an extensive survey. 234-288
Volume 9, Number 4, 2020
- Shubha Puthran, Ketan Shah:
Intrusion detection using data mining. 292-306 - B. N. Jagadesh, A. V. S. N. Murty:
An integrated approach for multimodal biometric recognition system using Pearson type-II (beta) distribution. 307-319 - K. Lakshmanarao, Hima Bindu Maringanti:
IbPaKdE: identity-based pairing free authenticated key and data exchange protocol for wireless sensor networks. 320-335 - Madhavi B. Desai, S. V. Patel, Vipul H. Mistry:
DCT statistics and pixel correlation-based blind image steganalysis for identification of covert communication. 336-354 - Jayashree Agarkhed, Yogita Dattatraya Patil, Siddarama R. Patil:
Adaptive QoS constraint-based service differentiated routing in wireless sensor network. 355-370

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.