default search action
Search dblp for Publications
export results for "toc:db/journals/ijcistudies/ijcistudies6.bht:"
@article{DBLP:journals/ijcistudies/AbdelwahabGW17, author = {Sarah Abdelwahab and Tarek Gaber and Mohamed Wahed}, title = {Trust-based security models in wireless sensor networks: a survey}, journal = {Int. J. Comput. Intell. Stud.}, volume = {6}, number = {2/3}, pages = {245--266}, year = {2017}, url = {https://doi.org/10.1504/IJCISTUDIES.2017.10010048}, doi = {10.1504/IJCISTUDIES.2017.10010048}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcistudies/AbdelwahabGW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcistudies/ArtikisS17, author = {Constantinos Artikis and John Sorros}, title = {Random contractions in proactive and intelligent behaviour}, journal = {Int. J. Comput. Intell. Stud.}, volume = {6}, number = {1}, pages = {29--39}, year = {2017}, url = {https://doi.org/10.1504/IJCISTUDIES.2017.10007032}, doi = {10.1504/IJCISTUDIES.2017.10007032}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcistudies/ArtikisS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcistudies/ChatterjeeSDASH17, author = {Sankhadeep Chatterjee and Sarbartha Sarkar and Nilanjan Dey and Amira S. Ashour and Soumya Sen and Aboul Ella Hassanien}, title = {Application of cuckoo search in water quality prediction using artificial neural network}, journal = {Int. J. Comput. Intell. Stud.}, volume = {6}, number = {2/3}, pages = {229--244}, year = {2017}, url = {https://doi.org/10.1504/IJCISTUDIES.2017.10010042}, doi = {10.1504/IJCISTUDIES.2017.10010042}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcistudies/ChatterjeeSDASH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcistudies/DattaDP17, author = {Somak Datta and Deepanshu and Dilip Kumar Pratihar}, title = {Modelling of input-output relationships of metal inert gas welding process using soft computing-based approaches}, journal = {Int. J. Comput. Intell. Stud.}, volume = {6}, number = {1}, pages = {1--28}, year = {2017}, url = {https://doi.org/10.1504/IJCISTUDIES.2017.10007030}, doi = {10.1504/IJCISTUDIES.2017.10007030}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcistudies/DattaDP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcistudies/ElhosenyMDH17, author = {Mohamed Elhoseny and Noura Metawa and Ashraf Darwish and Aboul Ella Hassanien}, title = {Intelligent information system to ensure quality in higher education institutions, towards an automated e-university}, journal = {Int. J. Comput. Intell. Stud.}, volume = {6}, number = {2/3}, pages = {115--149}, year = {2017}, url = {https://doi.org/10.1504/IJCISTUDIES.2017.10010025}, doi = {10.1504/IJCISTUDIES.2017.10010025}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcistudies/ElhosenyMDH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcistudies/ElhosenySAR17, author = {Mohamed Elhoseny and Ahmed S. Salama and Ahmed Abdelaziz and Alaa Mohamed Riad}, title = {Intelligent systems based on loud computing for healthcare services: a survey}, journal = {Int. J. Comput. Intell. Stud.}, volume = {6}, number = {2/3}, pages = {157--188}, year = {2017}, url = {https://doi.org/10.1504/IJCISTUDIES.2017.10010029}, doi = {10.1504/IJCISTUDIES.2017.10010029}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcistudies/ElhosenySAR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcistudies/IchimuraUK17, author = {Takumi Ichimura and Takuya Uemoto and Shin Kamada}, title = {Altruistic behaviours-based recommendation system of tourist information from smartphone application to {SNS} community}, journal = {Int. J. Comput. Intell. Stud.}, volume = {6}, number = {4}, pages = {270--287}, year = {2017}, url = {https://doi.org/10.1504/IJCISTUDIES.2017.10010609}, doi = {10.1504/IJCISTUDIES.2017.10010609}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcistudies/IchimuraUK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcistudies/KamadaI17, author = {Shin Kamada and Takumi Ichimura}, title = {Fine tuning of adaptive learning of deep belief network for misclassification and its knowledge acquisition}, journal = {Int. J. Comput. Intell. Stud.}, volume = {6}, number = {4}, pages = {333--348}, year = {2017}, url = {https://doi.org/10.1504/IJCISTUDIES.2017.10010610}, doi = {10.1504/IJCISTUDIES.2017.10010610}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcistudies/KamadaI17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcistudies/KoutanisTS17, author = {Dimitris Koutanis and George A. Tsihrintzis and Dionisios N. Sotiropoulos}, title = {Identifying and managing risks in the development of online educational software for social media use}, journal = {Int. J. Comput. Intell. Stud.}, volume = {6}, number = {1}, pages = {68--97}, year = {2017}, url = {https://doi.org/10.1504/IJCISTUDIES.2017.10007058}, doi = {10.1504/IJCISTUDIES.2017.10007058}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcistudies/KoutanisTS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcistudies/NagaoS17, author = {Masahiro Nagao and Hirohisa Seki}, title = {An {FCA} approach to mining quantitative association rules from multi-relational data}, journal = {Int. J. Comput. Intell. Stud.}, volume = {6}, number = {4}, pages = {366--383}, year = {2017}, url = {https://doi.org/10.1504/IJCISTUDIES.2017.10010616}, doi = {10.1504/IJCISTUDIES.2017.10010616}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcistudies/NagaoS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcistudies/Nayak17, author = {Biswojit Nayak}, title = {A secure ID-based signcryption scheme based on elliptic curve cryptography}, journal = {Int. J. Comput. Intell. Stud.}, volume = {6}, number = {2/3}, pages = {150--156}, year = {2017}, url = {https://doi.org/10.1504/IJCISTUDIES.2017.10010026}, doi = {10.1504/IJCISTUDIES.2017.10010026}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcistudies/Nayak17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcistudies/NishioKHT17, author = {Toshiki Nishio and Jun{-}ichi Kushida and Akira Hara and Tetsuyuki Takahama}, title = {Particle swarm optimisation with dynamic search strategies based on rank correlation}, journal = {Int. J. Comput. Intell. Stud.}, volume = {6}, number = {4}, pages = {311--332}, year = {2017}, url = {https://doi.org/10.1504/IJCISTUDIES.2017.10010617}, doi = {10.1504/IJCISTUDIES.2017.10010617}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcistudies/NishioKHT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcistudies/PaulMDG17, author = {Avijit Paul and Amrita Mukherjee and Apurba Das and Kuntal Ghosh}, title = {Computational intelligence in telecommunication networks: a review}, journal = {Int. J. Comput. Intell. Stud.}, volume = {6}, number = {2/3}, pages = {189--228}, year = {2017}, url = {https://doi.org/10.1504/IJCISTUDIES.2017.10010030}, doi = {10.1504/IJCISTUDIES.2017.10010030}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcistudies/PaulMDG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcistudies/SanoS17, author = {Natsuki Sano and Tomomichi Suzuki}, title = {Efficient hyper parameter selection for support vector regression using orthogonal array}, journal = {Int. J. Comput. Intell. Stud.}, volume = {6}, number = {1}, pages = {40--51}, year = {2017}, url = {https://doi.org/10.1504/IJCISTUDIES.2017.10007038}, doi = {10.1504/IJCISTUDIES.2017.10007038}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcistudies/SanoS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcistudies/SotiropoulosPG17, author = {Dionisios N. Sotiropoulos and Demitrios E. Pournarakis and George M. Giaglis}, title = {SVM-based sentiment classification: a comparative study against state-of-the-art classifiers}, journal = {Int. J. Comput. Intell. Stud.}, volume = {6}, number = {1}, pages = {52--67}, year = {2017}, url = {https://doi.org/10.1504/IJCISTUDIES.2017.10007054}, doi = {10.1504/IJCISTUDIES.2017.10007054}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcistudies/SotiropoulosPG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcistudies/SubramanianA17, author = {Jayashree Subramanian and Britto Antony}, title = {Intelligent comfort management agent for smart residential buildings using an updated {Q} learning algorithm}, journal = {Int. J. Comput. Intell. Stud.}, volume = {6}, number = {2/3}, pages = {101--114}, year = {2017}, url = {https://doi.org/10.1504/IJCISTUDIES.2017.10010021}, doi = {10.1504/IJCISTUDIES.2017.10010021}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcistudies/SubramanianA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcistudies/TamuraKS17, author = {Keiichi Tamura and Hajime Kitakami and Tatsuhiro Sakai}, title = {Adaptive distributed modified extremal optimisation for maximising contact map overlap and its performance evaluation}, journal = {Int. J. Comput. Intell. Stud.}, volume = {6}, number = {4}, pages = {288--310}, year = {2017}, url = {https://doi.org/10.1504/IJCISTUDIES.2017.10010614}, doi = {10.1504/IJCISTUDIES.2017.10010614}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcistudies/TamuraKS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcistudies/YamadaS17, author = {Takaaki Yamada and Tatsuhiro Sato}, title = {Portfolio theory application to prediction correction of train arrival times}, journal = {Int. J. Comput. Intell. Stud.}, volume = {6}, number = {4}, pages = {349--365}, year = {2017}, url = {https://doi.org/10.1504/IJCISTUDIES.2017.10010615}, doi = {10.1504/IJCISTUDIES.2017.10010615}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcistudies/YamadaS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.