default search action
International Journal of Computational Intelligence Systems, Volume 5
Volume 5, Number 1, 2012
- Hui Zhao, Mingchu Li, Kouichi Sakurai, Yizhi Ren, Jonathan Z. Sun, Fengying Wang:
A Finite Equivalence of Verifiable Multi-secret Sharing. 1-12 - Ebru Turanoglu, Ihsan Kaya, Cengiz Kahraman:
Fuzzy Acceptance Sampling and Characteristic Curves. 13-29 - Guojun Mao, Xindong Wu, Xuxian Jiang:
Intrusion Detection Models Based on Data Mining. 30-38 - Adel Akbarimajd, Akbar Hassanzadeh:
Autonomously Implemented Versatile Path Planning for Mobile Robots Based on Cellular Automata and Ant Colony. 39-52 - Chi-Man Pun, Ning-Yu An, C. L. Philip Chen:
Region-based Image Segmentation by Watershed Partition and DCT Energy Compaction. 53-64 - Quande Qin, Li Li, Rongjun Li, Ben Niu:
PSOPB: A Two-population Particle Swarm Optimizer Mimicking Facultative Bio-parasitic Behavior. 65-75 - Bin Li, Jing Zhang, Lianfang Tian, Li Tan, Shijie Xiang, Shanxing Ou:
Intelligent Recognition of Lung Nodule Combining Rule-based and C-SVM Classifiers. 76-92 - Hong-Zhong Huang, Xudong Zhang, Debiao Meng, Yu Liu, Yanfeng Li:
A New Multidisciplinary Design Optimization Method Accounting for Discrete and Continuous Variables under Aleatory and Epistemic Uncertainties. 93-110 - Leopoldo Altamirano Robles, María Cristina Riff, Ignacio Araya, Lorraine Trilling:
Anesthesiology Nurse Scheduling using Particle Swarm Optimization. 111-125 - Jaime Cano-Belmán, Roger Z. Ríos-Mercado, M. Angélica Salazar-Aguilar:
Commercial Territory Design for a Distribution Firm with New Constructive and Destructive Heuristics. 126-147 - Bo Cheng, Chengwen Zhang, Junliang Chen:
Design of Service Net based Correctness Verification Approach for Multimedia Conferencing Service Orchestration. 148-162 - Yibo Chen, Chanle Wu, Xiaojun Guo, Jiyan Wu:
Semantic Learning Service Personalized. 163-172 - Zhirui Lu, Juan Carlos Augusto, Jun Liu, Hui Wang:
A Linguistic Truth-Value Temporal Reasoning (LTR) System and its Application to the Design of an Intelligent Environment. 173-196 - Songhua Liu, Junying Zhang, Caiying Ding:
Informative Energy Metric for Similarity Measure in reproducing Kernel Hilbert Spaces. 197-208
Volume 5, Number 2, 2012
Guest Editorial
- Rafael Alcalá, Yusuke Nojima, Hisao Ishibuchi, Francisco Herrera:
Special Issue on Evolutionary Fuzzy Systems. 209-211
- Antonio González Muñoz, Raúl Pérez, Yoel Caises, Enrique Leyva:
An Efficient Inductive Genetic Learning Algorithm for Fuzzy Relational Rules. 212-230 - Krzysztof Trawinski, Oscar Cordón, Arnaud Quirin:
A Study on the Use of Multiobjective Genetic Algorithms for Classifier Selection in FURIA-based Fuzzy Multiclassifiers. 231-253 - Dimitris G. Stavrakoudis, Georgia N. Galidaki, Ioannis Z. Gitas, John B. Theocharis:
Reducing the Complexity of Genetic Fuzzy Classifiers in Highly-Dimensional Classification Problems. 254-275 - Ana M. Palacios, Luciano Sánchez, Inés Couso:
Equalizing imbalanced imprecise datasets for genetic fuzzy classifiers. 276-296 - Antonio A. Márquez, Francisco Alfredo Márquez, Antonio Peregrín:
A Mechanism to Improve the Interpretability of Linguistic Fuzzy Systems with Adaptive Defuzzification based on the use of a Multi-objective Evolutionary Algorithm. 297-321 - Jun Chen, Mahdi Mahfouf:
Improving Transparency in Approximate Fuzzy Modeling Using Multi-objective Immune-Inspired Optimisation. 322-342 - Chun-Hao Chen, Tzung-Pei Hong, Vincent S. Tseng:
Finding Pareto-front Membership Functions in Fuzzy Data Mining. 343-354 - Cristóbal J. Carmona, Pedro González, María José Gacto, María José del Jesus:
Genetic lateral tuning for subgroup discovery with fuzzy rules using the algorithm NMEEF-SD. 355-367 - Francisco Chávez de la O, Francisco Fernández, María José Gacto, Rafael Alcalá:
Automatic Laser Pointer Detection Algorithm for Environment Control Device Systems Based on Template Matching and Genetic Tuning of Fuzzy Rule-Based Systems. 368-386 - Àngela Nebot, Francisco Mugica, Félix Castro, Jesús Antonio Acosta Sarmiento:
Genetic Learning of Fuzzy Parameters in Predictive and Decision Support Modelling. 387-402
Volume 5, Number 3, 2012
- Hajar Mousannif, Ismail Khalil:
Cooperative Data Management in Wireless Sensor Networks. 403-412 - Lin Gao, Xingsheng Gu:
A Novel Real-coded Quantum-inspired Genetic Algorithm and Its Application in Data Reconciliation. 413-420 - Andrew Clarke, Eric Pardede, Robert Steele:
External and Distributed Databases: Efficient and Secure XML Query Assurance. 421-433 - David Taniar, J. Wenny Rahayu, Olena Daly, Hong-Quang Nguyen:
Mining Hierarchical Negative Association Rules. 434-451 - Ramón González del Campo, Luis Garmendia, Ronald R. Yager:
Specificity for interval-valued fuzzy sets. 452-459 - Yiqing Miao, David W. Rooney, Quan Gan:
Artificial Neural Network for Compositional Ionic Liquid Viscosity Prediction. 460-471 - Samiur Arif, Ismail Khalil, Stephan Olariu:
On a Versatile Stochastic Growth Model. 472-482 - Junli Li, Yang Lou, Yuhui Shi:
An Optimization Algorithm Based on Binary Difference and Gravitational Evolution. 483-493 - M. Arfan Jaffar, Sultan Zia, Ghazanfar Latif, Anwar M. Mirza, Irfan Mehmood, Naveed Ejaz, Sung Wook Baik:
Anisotropic Diffusion based Brain MRI Segmentation and 3D Reconstruction. 494-504 - Wuying Liu, Ting Wang:
Utilizing Multi-Field Text Features for Efficient Email Spam Filtering. 505-518 - Qiansheng Zhang, Hongyan Xing, Lihua Wu:
Entropy, Similarity Measure, Inclusion Measure of Intuitionistic Fuzzy Sets and Their Relationships. 519-529 - Michael Kampouridis, Edward P. K. Tsang:
Investment Opportunities Forecasting: Extending the Grammar of a GP-based Tool. 530-541 - Zaiwu Gong, Chonglan Guo, Yuanyuan He:
Group decision making methods of the incomplete IFPRs and IPRs. 542-552 - Omer Atli, Cengiz Kahraman:
Aircraft Maintenance Planning Using Fuzzy Critical Path Analysis. 553-567 - Mansour Sheikhan, Ehsan Hemmati:
PSO-Optimized Hopfield Neural Network-Based Multipath Routing for Mobile Ad-hoc Networks. 568-581 - Piotr Bródka, Przemyslaw Kazienko, Katarzyna Musial, Krzysztof Skibicki:
Analysis of Neighbourhoods in Multi-layered Dynamic Social Networks. 582-596 - Milos Jovanovic, Milan Vukicevic, Milos Milovanovic, Miroslav Minovic:
Using data mining on student behavior and cognitive style data for improving e-learning systems: a case study. 597-610
Volume 5, Number 4, 2012
- Mehmet Ekmekçioglu, Ahmet Can Kutlu:
A Fuzzy Hybrid Approach for Fuzzy Process FMEA: An Application to a Spindle Manufacturing Process. 611-626 - Hanbing Liu, Yubo Jiao, Yafeng Gong:
A fuzzy logic-based damage identification method for simply-supported bridge using modal shape ratios. 627-638 - Ibrahim M. Hamed, Ashraf Saad Hussein, Mohamed F. Tolba:
An Intelligent Model for Stock Market Prediction. 639-652 - Jordi Conesa, Santi Caballé, David Gañán, Josep Prieto:
Exploiting the Semantic Web to Represent Information from On-line Collaborative Learning. 653-667 - Mingyu You, Jia-Ming Liu, Guo-Zheng Li, Yan Chen:
Embedded Feature Selection for Multi-label Classification of Music Emotions. 668-678 - Israel González-Carrasco, Ricardo Colomo Palacios, José Luis López Cuadrado, Francisco José García-Peñalvo:
SEffEst: Effort estimation in software projects using fuzzy logic and neural networks. 679-699 - Catarina B. Santiago, João Lobato Oliveira, Luís Paulo Reis, Armando Sousa, Fabien Gouyon:
Overcoming Motor-Rate Limitations in Online Synchronized Robot Dancing. 700-713 - Kairui Cao, Xiao Zhi Gao, Xianlin Huang, Xiaojun Ban:
Stability Analysis of a Type of T-S Fuzzy Control Systems Using Off-Axis Circle Criterion. 714-722 - Xiong Li, Yonglong Chen, Zhiming Dong:
Qualitative Description and Quantitative Optimization of Tactical Reconnaissance Agents System Organization. 723-734 - Steve Kansheng Shi, Lemin Li:
A Close-to-linear Topic Detection Algorithm using Relative Entropy based Relevance Model and Inverted Indices Retrieval. 735-744 - Eugénia Moreira Bernardino, Anabela Moreira Bernardino, Juan Manuel Sánchez-Pérez, Juan Antonio Gómez Pulido, Miguel Ángel Vega Rodríguez:
Evolutionary Swarm based algorithms to minimise the link cost in Communication Networks. 745-761 - Juan Miguel Medina, Carlos D. Barranco, Jesús R. Campaña, Sergio Jaime-Castillo:
On Modeling the Behavior of Comparators for Complex Fuzzy Objects in a Fuzzy Object-Relational Database Management System. 762-774 - Allel Hadjali, Amine Mokhtari, Olivier Pivert:
A Fuzzy-Rule-Based Model for Handling Contextual Preference Queries. 775-788 - Patrick Bosc, Olivier Pivert, Grégory Smits:
An Approach to Database Preference Queries Based on an Outranking Relation. 789-804
Volume 5, Number 5, 2012
- Yixian Yang, Fuji Ren:
Foreword: Computational Intelligence for Network Control and Security. 805-807
- Lingxi Peng, Dongqing Xie, Ying Gao, Wenbin Chen, Fufang Li, Wu Wen, Jue Wu:
An Immune-inspired Adaptive Automated Intrusion Response System Model. 808-815 - Hong Peng, Shi-yuan Fu, Limin Meng, Xia Liu:
A Novel Location-aided Routing Algorithm for Mobile Ad Hoc Network with a Small Expenditure on Route-Discovery. 816-823 - Ya-Li Liu, Xiaolin Qin, Bohan Li, Liu Liang:
A Forward-secure Grouping-proof Protocol for Multiple RFID Tags. 824-833 - Min Lei, Haipeng Peng, Chunyu Yang, Lixiang Li:
Synchronization of Time-Delay Chaotic System in Presence of Noise. 834-840 - Haiyang Hu, Zhongjin Li, Liguo Huang, Hua Hu:
Statistical Mechanisms for Detecting Malicious Behaviors in Resource Allocation from Non-cooperative P2P Environments. 841-850 - Jinxin Zhang, Mangui Liang, Shujuan Wang:
A Credibility-based Congestion Control Scheme and its Performance Evaluation. 851-859 - Jianfeng Lu, Jianmin Han, Wei Chen, Jinwei Hu:
Safety and Availability Checking for User Authorization Queries in RBAC. 860-867 - Ming Wan, Ying Liu, Jianqiang Tang, Hongke Zhang, Si-yu Lin:
Locator/Identifier Separation: Comparison and Analysis on the Mitigation of Worm Propagation. 868-877 - Liangyu Luan, Yingfang Fu, Peng Xiao, Lingxi Peng:
Watch-Nodes-Based Wormhole Attacks Detection in Wireless Mesh Networks. 878-886 - Qian Xiao, Kangfeng Zheng, Shoushan Luo, Xu Cui:
A Secure Network Coding-based Data Gathering Model and Its Protocol in Wireless Sensor Networks. 887-895 - Wei Li, Dawu Gu, Xiaoling Xia, Chen Zhao, Zhiqiang Liu, Ya Liu, Qingju Wang:
Single Byte Differential Fault Analysis on the LED Lightweight Cipher in the Wireless Sensor Network. 896-904 - Yu Yang, Shang-bao Gong, Yucui Guo, Min Lei, Yan Yang:
A Complex Estimation Function based on Community Reputation for On-line Transaction Systems. 905-912
- Dengpan Ye:
Recent advances in the Intelligence technology and Security applications Guest edited by Dengpan Ye. 913
- Ting Zhang, Jingsha He, Yang Zhang:
Secure Sensor Localization in Wireless Sensor Networks based on Neural Network. 914-923 - Songzhu Mei, Zhiying Wang, Yong Cheng, Jiangchun Ren, Jiangjiang Wu, Jie Zhou:
Trusted Bytecode Virtual Machine Module: A Novel Method for Dynamic Remote Attestation in Cloud Computing. 924-932 - Qian Zhao, Xueying Liu, Shujun Wei:
An Improved Population Migration Algorithm for Solving Multi-Objective Optimization Problems. 933-941 - Shunan Ma, Jingsha He, Xunbo Shuai:
An Access Control Method based on Scenario Trust. 942-952 - Dengpan Ye, Zhuo Wei, Xuhua Ding, Robert H. Deng:
Scalable Content Authentication in H.264/SVC Videos Using Perceptual Hashing based on Dempster-Shafer theory. 953-963 - Yunji Zhao, Hailong Pei:
Model Update Particle Filter for Multiple Objects Detection and Tracking. 964-974 - Yajuan Xie, Shanzhen Yi, Zhongqian Tang, Dengpan Ye:
Uncertainty Multi-source Information Fusion for Intelligent Flood Risk Analysis Based on Random Set Theory. 975-984
Volume 5, Number 6, 2012
- Xiong Li, Zhiming Dong, Hao Wang, Qingchao Meng, Zhentian Wang, Yiwei Zhang:
A Novel Approach to Selecting Contractor in Agent-based Multi-sensor Battlefield Reconnaissance Simulation. 985-995 - L. Agud, Raquel Garcia Catalán, Susana Díaz, Esteban Induráin, Susana Montes:
Numerical representability of fuzzy total preorders. 996-1009 - Xibei Yang, Yanqin Zhang, Jing-Yu Yang:
Local and Global Measurements of MGRS Rules. 1010-1024 - Guillermo Sánchez-Díaz, Manuel Lazo-Cortés, Iván Piza-Dávila:
A Fast Implementation for the Typical Testor Property Identification Based on an Accumulative Binary Tuple. 1025-1039 - Anping Zhao, Yan Ma:
Constructing Service Semantic Link Network Based on the Probabilistic Graphical Model. 1040-1051 - Hien T. Nguyen, Tru Hoang Cao:
Named Entity Disambiguation: a Hybrid Approach. 1052-1067 - Jose Enrique Pons, Nicolás Marín, Olga Pons, Christophe Billiet, Guy De Tré:
A Relational Model for the Possibilistic Valid-time Approach. 1068-1088 - Carmen Martínez-Cruz, Ignacio J. Blanco, Maria-Amparo Vila:
An Ontology as a Tool for Representing Fuzzy Data in Relational Databases. 1089-1108 - Seda Yanik Ugurlu, Özlem Cosgun, Yeliz Ekinci:
A Dynamic Pricing Model for a Maritime Transportation Service Provider. 1109-1119 - Xingxing He, Yang Xu, Jun Liu, Shuwei Chen:
α-Generalized lock resolution method in linguistic truth-valued lattice-valued logic. 1120-1134 - Yingchao Shao, Keyun Qin:
Fuzzy Soft Sets and Fuzzy Soft Lattices. 1135-1147 - Golnaz Vakili, Siavash Khorsandi, Thanasis G. Papaioannou:
A Self-organized Mechanism of Resource Allocation in P2P Systems. 1148-1159 - Congjun Rao, Xinlin Wu:
Optimization Decision Method for Procuring Divisible Goods. 1160-1172 - Shuibing He, Xianbin Xu, Yuanhua Yang:
Oasa: An Active Storage Architecture for Object-based Storage System. 1173-1183 - G. Vijay Chakaravarthy, S. Marimuthu, A. Naveen Sait:
Comparison of Firefly algorithm and Artificial Immune System algorithm for lot streaming in m-machine flow shop scheduling. 1184-1199
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.