default search action
Applied Intelligence, Volume 48
Volume 48, Number 1, January 2018
- Lidia Bononi Paiva Tomaz, Rita Maria da Silva Julia, Valquiria Aparecida Rosa Duarte:
A multiagent player system composed by expert agents in specific game stages operating in high performance environment. 1-22 - Yitian Xu, Qian Wang, Xinying Pang, Ying Tian:
Maximum margin of twin spheres machine with pinball loss for imbalanced data classification. 23-34 - Ricardo Martín, Ricardo Aler, Inés María Galván:
A filter attribute selection method based on local reliable information. 35-45 - Peng Wu, Shuhan Liu, Ligang Zhou, Huayou Chen:
A fuzzy group decision making model with trapezoidal fuzzy preference relations based on compatibility measure and COWGA operator. 46-67 - Nihat Tak, Atif A. Evren, Mujgan Tez, Erol Egrioglu:
Recurrent type-1 fuzzy functions approach for time series forecasting. 68-77 - Mohammad Ebrahim Samie, Ali Hamzeh:
Change-aware community detection approach for dynamic social networks. 78-96 - Javidan Kazemi Kordestani, Hossein Abedi Firouzjaee, Mohammad Reza Meybodi:
An adaptive bi-flight cuckoo search with variable nests for continuous dynamic optimization problems. 97-117 - Xiaojun Bi, Chao Wang:
A niche-elimination operation based NSGA-III algorithm for many-objective optimization. 118-141 - Xiaomeng Han, Qun Dai:
Batch-normalized Mlpconv-wise supervised pre-training network in network. 142-155 - Changpeng Wang, Wei Wei, Jiang-She Zhang, Houbing Song:
Robust face recognition via discriminative and common hybrid dictionary learning. 156-165 - Zahid Mehmood, Toqeer Mahmood, Muhammad Arshad Javid:
Content-based image retrieval and semantic automatic image annotation based on the weighted average of triangular histograms using support vector machine. 166-181 - Erik Cuevas, Primitivo Díaz, Omar Ávalos, Daniel Zaldivar, Marco Antonio Pérez Cisneros:
Nonlinear system identification based on ANFIS-Hammerstein model using Gravitational search algorithm. 182-203 - Shobhanjana Kalita, Arindam Karmakar, Shyamanta M. Hazarika:
Efficient extraction of spatial relations for extended objects vis-à-vis human activity recognition in video. 204-219 - Fu Zhang, Zong Min Ma, Qiang Tong, Jingwei Cheng:
Storing fuzzy description logic ontology knowledge bases in fuzzy relational databases. 220-242 - Maryam Abaszade, Sohrab Effati:
Stochastic support vector regression with probabilistic constraints. 243-256
Volume 48, Number 2, February 2018
- Xiangfu Zhao, Dantong Ouyang, Liming Zhang:
Computing all minimal hitting sets by subset recombination. 257-270 - Ali Mohammad Saghiri, Mohammad Reza Meybodi:
An adaptive super-peer selection algorithm considering peers capacity utilizing asynchronous dynamic cellular learning automata. 271-299 - Mayur Rajaram Parate, Vishal R. Satpute, Kishor M. Bhurchandi:
Global-patch-hybrid template-based arbitrary object tracking with integral channel features. 300-314 - Hadi Tabatabaee Malazi, Mohammad Davari:
Combining emerging patterns with random forest for complex activity recognition in smart homes. 315-330 - Ling Sun, Jian Bao, Yangyang Chen, Mingming Yang:
Research on parameter selection method for support vector machines. 331-342 - Harish Garg, Rishu Arora:
Generalized and group-based generalized intuitionistic fuzzy soft sets with applications in decision-making. 343-356 - José García, Broderick Crawford, Ricardo Soto, Carlos Castro, Fernando Paredes:
A k-means binarization framework applied to multidimensional knapsack problem. 357-380 - Minyoung Kim:
A maximum-likelihood and moment-matching density estimator for crowd-sourcing label prediction. 381-389 - Yong-Ping Zhao, Peng-Peng Xi, Bing Li, Zhi-Qiang Li:
Sparse kernel minimum squared error using Householder transformation and givens rotation. 390-415 - Antonino Feitosa Neto, Anne M. P. Canuto:
An exploratory study of mono and multi-objective metaheuristics to ensemble of classifiers. 416-431 - Xiangli Li, Qiong Han, Baozhi Qiu:
A clustering algorithm with affine space-based boundary detection. 432-444 - Hossam Faris, Ibrahim Aljarah, Seyedali Mirjalili:
Improved monarch butterfly optimization for unconstrained global search and neural network training. 445-464 - Fahimeh Ghasemian, Kamran Zamanifar, Nasser Ghasem-Aghaee:
An evolutionary non-linear ranking algorithm for ranking scientific collaborations. 465-481 - Hamed Fazlollahtabar, Samaneh Hassanli:
Hybrid cost and time path planning for multiple autonomous guided vehicles. 482-498 - Roan Thi Ngan, Mumtaz Ali, Le Hoang Son:
δ-equality of intuitionistic fuzzy sets: a new proximity measure and applications in medical diagnosis. 499-525
Volume 48, Number 3, March 2018
- Arghavan Moradi Dakhel, Hadi Tabatabaee Malazi, Mehregan Mahdavi:
A social recommender system using item asymmetric correlation. 527-540 - Faxiang Zhang, Jing Hua, Yimin Li:
Indirect adaptive type-2 bionic fuzzy control. 541-554 - Youcef Gheraibia, Khaoula Djafri, Habiba Krimou:
Ant colony algorithm for automotive safety integrity level allocation. 555-569 - Mohammad Mehdi Daliri Khomami, Alireza Rezvanian, Negin Bagherpour, Mohammad Reza Meybodi:
Minimum positive influence dominating set and its application in influence maximization: a learning automata approach. 570-593 - Xiaojuan Huang, Li Zhang, Bangjun Wang, Fanzhang Li, Zhao Zhang:
Feature clustering based support vector machine recursive feature elimination for gene selection. 594-607 - Asma Moubaiddin, Imad Salah, Nadim Obeid:
A temporal modal defeasible logic for formalizing social commitments in dialogue and argumentation models. 608-627 - Shailendra Pratap Singh, Anoj Kumar:
Multiobjective differential evolution using homeostasis based mutation for application in software cost estimation. 628-650 - Ying Huo, Peng Qiu, Jiyou Zhai, Dajuan Fan, Huanfeng Peng:
Multi-objective service composition model based on cost-effective optimization. 651-669 - Alaa Tharwat, Aboul Ella Hassanien:
Chaotic antlion algorithm for parameter optimization of support vector machine. 670-686 - Mukesh Mann, Pradeep Tomar, Om Prakash Sangwan:
Bio-inspired metaheuristics: evolving and prioritizing software test data. 687-702 - Bingyi Kang, Yong Deng, Rehan Sadiq:
Total utility of Z-number. 703-729 - Xiaotang Zhou, Jihong Ouyang, Ximing Li:
Two time-efficient gibbs sampling inference algorithms for biterm topic model. 730-754 - Mehran Safayani, Seyed Hashem Ahmadi, Homayun Afrabandpey, Abdolreza Mirzaei:
An EM based probabilistic two-dimensional CCA with application to face recognition. 755-770 - Goutam Sen, Mohan Krishnamoorthy:
Discrete particle swarm optimization algorithms for two variants of the static data segment location problem. 771-790 - Sungdo Kim, Byeong Min Mun, Suk Joo Bae:
Data depth based support vector machines for predicting corporate bankruptcy. 791-804
Volume 48, Number 4, April 2018
- Seyedeh Zahra Mirjalili, Seyedali Mirjalili, Shahrzad Saremi, Hossam Faris, Ibrahim Aljarah:
Grasshopper optimization algorithm for multi-objective optimization problems. 805-820 - José Augusto Baranauskas, Oscar Picchi Netto, Sérgio Ricardo Nozawa, Alessandra Alaniz Macedo:
A tree-based algorithm for attribute selection. 821-833 - Luciana Balieiro Cosme, Marcos F. S. V. D'Angelo, Walmir M. Caminhas, Shen Yin, Reinaldo M. Palhares:
A novel fault prognostic approach based on particle filters and differential evolution. 834-853 - Dong Wu, Xiang Liu, Feng Xue, Hanqing Zheng, Yehang Shou, Wen Jiang:
A new medical diagnosis method based on Z-numbers. 854-867 - Youwei Wang, Lizhou Feng, Jianming Zhu:
Novel artificial bee colony based feature selection method for filtering redundant information. 868-885 - Shashank Pathak, Luca Pulina, Armando Tacchella:
Verification and repair of control policies for safe reinforcement learning. 886-908 - Reza Vafashoar, Mohammad Reza Meybodi:
Multi swarm optimization algorithm with adaptive connectivity degree. 909-941 - Y. Ramu Naidu, Akshay K. Ojha:
A space transformational invasive weed optimization for solving fixed-point problems. 942-952 - Fangju Jiang, Qinggong Ma:
Multi-attribute group decision making under probabilistic hesitant fuzzy environment with application to evaluate the transformation efficiency. 953-965 - Christos Anagnostopoulos, Kostas Kolomvatsos:
Predictive intelligence to the edge through approximate collaborative context reasoning. 966-991 - Chong Zhou, Guangming Dai, Maocai Wang:
Enhanced θ dominance and density selection based evolutionary algorithm for many-objective optimization problems. 992-1012 - Mustapha Bouakkaz, Youcef Ouinten, Sabine Loudcher, Philippe Fournier-Viger:
Efficiently mining frequent itemsets applied for textual aggregation. 1013-1019 - Jaume Jordán, Alejandro Torreño, Mathijs de Weerdt, Eva Onaindia:
A better-response strategy for self-interested planning agents. 1020-1040 - Huiru Wang, Zhijian Zhou, Yitian Xu:
An improved ν-twin bounded support vector machine. 1041-1053 - Mina Ghavipour, Mohammad Reza Meybodi:
A streaming sampling algorithm for social activity networks using fixed structure learning automata. 1054-1081
Volume 48, Number 5, May 2018
- Hamido Fujita, Ali Selamat:
Editorial for the special issue: Knowledge-based systems and data science. 1083-1085 - Sidra Ijaz, Faheel A. Hashmi, Sohail Asghar, Masoom Alam:
Vector Based Genetic Algorithm to optimize predictive analysis in network security. 1086-1096 - Huorong Ren, Xiujuan Liao, Zhiwu Li, Abdulrahman Al-Ahmari:
Anomaly detection using piecewise aggregate approximation in the amplitude domain. 1097-1110 - Wenxin Liang, Xiao Li, Xiaosong He, Xinyue Liu, Xianchao Zhang:
Supervised ranking framework for relationship prediction in heterogeneous information networks. 1111-1127 - Spencer Polk, B. John Oommen:
Challenging state-of-the-art move ordering with Adaptive Data Structures. 1128-1147 - Linh T. T. Nguyen, Bay Vo, Loan T. T. Nguyen, Philippe Fournier-Viger, Ali Selamat:
ETARM: an efficient top-k association rule mining algorithm. 1148-1160 - Gajo Petrovic, Hamido Fujita:
SpringBoard: game-agnostic tool for scenario editing with meta-programming support. 1161-1175 - Orestes Appel, Francisco Chiclana, Jenny Carter, Hamido Fujita:
Successes and challenges in developing a hybrid approach to sentiment analysis. 1176-1188 - Orcan Alpar, Ondrej Krejcar:
Online signature verification by spectrogram analysis. 1189-1199 - José Portillo-Portillo, Roberto Leyva, Victor Sanchez, Gabriel Sanchez-Perez, Héctor Pérez-Meana, Jesus Olivares-Mercado, Karina Toscano-Medina, Mariko Nakano-Miyatake:
A view-invariant gait recognition algorithm based on a joint-direct linear discriminant analysis. 1200-1217 - Nurulhuda Zainuddin, Ali Selamat, Roliana Ibrahim:
Hybrid sentiment classification on twitter aspect-based sentiment analysis. 1218-1232 - Sidahmed Mokeddem:
A fuzzy classification model for myocardial infarction risk assessment. 1233-1250 - Najwa Abu Bakar, Ali Selamat:
Agent systems verification : systematic literature review and mapping. 1251-1274 - María Gutiérrez-Salcedo, María Ángeles Martínez, José Antonio Moral-Muñoz, Enrique Herrera-Viedma, Manuel J. Cobo:
Some bibliometric procedures for analyzing and evaluating research fields. 1275-1287 - Andrew Tzer-Yeu Chen, Morteza Biglari-Abhari, Kevin I-Kai Wang, Abdesselam Bouzerdoum, Fok Hing Chi Tivive:
Convolutional neural network acceleration with hardware/software co-design. 1288-1301 - Hassan Ali Mohammadi Motlagh, Behrouz Minaei-Bidgoli, Ali Akbar Parvizi Fard:
Design and implementation of a web-based fuzzy expert system for diagnosing depressive disorder. 1302-1313 - Huilian Fan, Yuanchang Zhong, Guangpu Zeng:
Overlapping community detection based on discrete biogeography optimization. 1314-1326 - Tuong Le, Anh Nguyen, Bao Huynh, Bay Vo, Witold Pedrycz:
Mining constrained inter-sequence patterns: a novel approach to cope with item constraints. 1327-1343 - Pawel Sitek, Jaroslaw Wikarek:
A multi-level approach to ubiquitous modeling and solving constraints in combinatorial optimization problems in production and distribution. 1344-1367 - Manish Sharma, Dipankar Deb, U. Rajendra Acharya:
A novel three-band orthogonal wavelet filter bank method for an automated identification of alcoholic EEG signals. 1368-1378 - Joel E. W. Koh, Eddie-Yin-Kwee Ng, Sulatha V. Bhandary, Augustinus Laude, U. Rajendra Acharya:
Automated detection of retinal health using PHOG and SURF features extracted from fundus images. 1379-1393 - Fanhui Kong, Jian Li:
The promotion strategy of supply chain flexibility based on deep belief network. 1394-1405
Volume 48, Number 6, June 2018
- Mansoureh Maadi, Mohammad Javidnia, Rohollah Ramezani:
Modified Cuckoo Optimization Algorithm (MCOA) to solve Precedence Constrained Sequencing Problem (PCSP). 1407-1422 - Mehdi Gaham, Brahim Bouzouia, Nouara Achour:
An effective operations permutation-based discrete harmony search approach for the flexible job shop scheduling problem with makespan criterion. 1423-1441 - Zahra Zojaji, Mohammad Mehdi Ebadzadeh:
Semantic schema modeling for genetic programming using clustering of building blocks. 1442-1460 - Piyabute Fuangkhon:
Parallel reduced multi-class contour preserving classification. 1461-1490 - Loan T. T. Nguyen, Ngoc Thanh Nguyen, Bay Vo, Hung Son Nguyen:
Efficient method for updating class association rules in dynamic datasets with record deletion. 1491-1505 - Jingwei Zhu, Xiaodan Wang, Yafei Song:
A new distance between BPAs based on the power-set-distribution pignistic probability function. 1506-1518 - Aleksandra Klasnja-Milicevic, Mirjana Ivanovic, Boban Vesin, Zoran Budimac:
Enhancing e-learning systems with personalized recommendation based on collaborative tagging techniques. 1519-1535 - Esmaeel Radkani, Sattar Hashemi, Alireza Keshavarz-Haddad, Maryam Amir Haeri:
An entropy-based distance measure for analyzing and detecting metamorphic malware. 1536-1546 - Jiacang Ho, Dae-Ki Kang:
One-class naïve Bayes with duration feature ranking for accurate user authentication using keystroke dynamics. 1547-1564 - Qingyi Pan, Xiaoying Wang:
Independent travel recommendation algorithm based on analytical hierarchy process and simulated annealing for professional tourist. 1565-1581 - Jie Cao, Baoqun Yin, Xiaonong Lu, Yu Kang, Xin Chen:
A modified artificial bee colony approach for the 0-1 knapsack problem. 1582-1595 - Mahamed G. H. Omran, Maurice Clerc:
APS 9: an improved adaptive population-based simplex method for real-world engineering optimization problems. 1596-1608 - Ali Adeli, Ali Broumandnia:
Image steganalysis using improved particle swarm optimization based feature selection. 1609-1622 - George Hatzivasilis, Ioannis Papaefstathiou, Dimitris Plexousakis, Charalampos Manifavas, Nikos Papadakis:
AmbISPDM - Managing embedded systems in ambient environments and disaster mitigation planning. 1623-1643 - Ping Jiang, Yahui Zhang, Qi Zhou, Xinyu Shao, Jiexiang Hu, Leshi Shu:
An adaptive sampling strategy for Kriging metamodel based on Delaunay triangulation and TOPSIS. 1644-1656
Volume 48, Number 7, July 2018
- Sukanta Nama, Apu Kumar Saha:
A new hybrid differential evolution algorithm with self-adaptation for function optimization. 1657-1671 - Xiaodan Wang, Yafei Song:
Uncertainty measure in evidence theory with its applications. 1672-1688 - Yikun Yang, Bintang Yang, Muqing Niu:
Adaptive infinite impulse response system identification using opposition based hybrid coral reefs optimization algorithm. 1689-1706 - Huizhen Zhao, Fuxian Liu, Longyue Li, Chang Luo:
A novel softplus linear unit for deep convolutional neural networks. 1707-1720 - Waddah Waheeb, Rozaida Ghazali, Abir Jaafar Hussain:
Dynamic ridge polynomial neural network with Lyapunov function for time series forecasting. 1721-1738 - Animesh Kumar Paul, Pintu Chandra Shill, Md. Rafiqul Islam Rabin, Kazuyuki Murase:
Adaptive weighted fuzzy rule-based system for the risk level assessment of heart disease. 1739-1756 - Xuhui Zhu, Zhiwei Ni, Meiying Cheng, Feifei Jin, Jingming Li, Gary R. Weckman:
Selective ensemble based on extreme learning machine and improved discrete artificial fish swarm algorithm for haze forecast. 1757-1775 - Li Zhang, Xingning Lu:
New fast feature selection methods based on multiple support vector data description. 1776-1790 - Toqeer Mahmood, Zahid Mehmood, Mohsin Shah, Zakir Khan:
An efficient forensic technique for exposing region duplication forgery in digital images. 1791-1801 - Jipeng Qiang, Yun Li, Yunhao Yuan, Xindong Wu:
Short text clustering based on Pitman-Yor process mixture model. 1802-1812 - Shanping Qiao, Baoqiang Yan, Jing Li:
Ensemble learning for protein multiplex subcellular localization prediction based on weighted KNN with different features. 1813-1824 - Santosh Kumar Das, Sachin Tripathi:
Adaptive and intelligent energy efficient routing for transparent heterogeneous ad-hoc network by fusion of game theory and linear programming. 1825-1845 - Hong Wang, Jianxin Wang, Lifeng Zhou:
A survival ensemble of extreme learning machine. 1846-1858 - Quang-Huy Duong, Philippe Fournier-Viger, Heri Ramampiaro, Kjetil Nørvåg, Thu-Lan Dam:
Efficient high utility itemset mining using buffered utility-lists. 1859-1877 - Li Zhang, Weida Zhou, Bangjun Wang, Zhao Zhang, Fanzhang Li:
Applying 1-norm SVM with squared loss to gene selection for cancer classification. 1878-1890 - Shujuan Ji, Haiyan Ma, Yongquan Liang, Ho-fung Leung, Chun-jin Zhang:
Correction to: A whitelist and blacklist-based co-evolutionary strategy for defensing against multifarious trust attacks. 1891
Volume 48, Number 8, August 2018
- Spencer Polk, B. John Oommen:
Novel threat-based AI strategies that incorporate adaptive data structures for multi-player board games. 1893-1911 - M. Alex Syaekhoni, Chanseung Lee, Young S. Kwon:
Analyzing customer behavior from shopping path data using operation edit distance. 1912-1932 - Baekjin Kim, Donghyeon Yu, Joong-Ho Won:
Comparative study of computational algorithms for the Lasso with high-dimensional, highly correlated data. 1933-1952 - Jong-June Jeon, Hosik Choi:
The sparse Luce model. 1953-1964 - Abbas Akkasi, Ekrem Varoglu, Nazife Dimililer:
Balanced undersampling: a novel sentence-based undersampling method to improve recognition of named entities in chemical and biomedical text. 1965-1978 - Mahmuda Rahman, Jae C. Oh:
Graph bandit for diverse user coverage in online recommendation. 1979-1995 - Khalida Guesmia, Boustia Narhimene:
OrBAC from access control model to access usage model. 1996-2016 - Zaineb Liouane, Tayeb Lemlouma, Philippe Roose, Frédéric Weis, Hassani Messaoud: