


default search action
International Journal of Computational Intelligence Systems, Volume 5
Volume 5, Number 1, 2012
- Hui Zhao, Mingchu Li, Kouichi Sakurai, Yizhi Ren, Jonathan Z. Sun, Fengying Wang:

A Finite Equivalence of Verifiable Multi-secret Sharing. 1-12 - Ebru Turanoglu

, Ihsan Kaya
, Cengiz Kahraman:
Fuzzy Acceptance Sampling and Characteristic Curves. 13-29 - Guojun Mao, Xindong Wu, Xuxian Jiang:

Intrusion Detection Models Based on Data Mining. 30-38 - Adel Akbarimajd, Akbar Hassanzadeh:

Autonomously Implemented Versatile Path Planning for Mobile Robots Based on Cellular Automata and Ant Colony. 39-52 - Chi-Man Pun

, Ning-Yu An, C. L. Philip Chen
:
Region-based Image Segmentation by Watershed Partition and DCT Energy Compaction. 53-64 - Quande Qin

, Li Li, Rongjun Li, Ben Niu:
PSOPB: A Two-population Particle Swarm Optimizer Mimicking Facultative Bio-parasitic Behavior. 65-75 - Bin Li, Jing Zhang, Lianfang Tian, Li Tan, Shijie Xiang, Shanxing Ou:

Intelligent Recognition of Lung Nodule Combining Rule-based and C-SVM Classifiers. 76-92 - Hong-Zhong Huang, Xudong Zhang, Debiao Meng

, Yu Liu, Yanfeng Li:
A New Multidisciplinary Design Optimization Method Accounting for Discrete and Continuous Variables under Aleatory and Epistemic Uncertainties. 93-110 - Leopoldo Altamirano Robles

, María Cristina Riff, Ignacio Araya, Lorraine Trilling
:
Anesthesiology Nurse Scheduling using Particle Swarm Optimization. 111-125 - Jaime Cano-Belmán, Roger Z. Ríos-Mercado

, M. Angélica Salazar-Aguilar
:
Commercial Territory Design for a Distribution Firm with New Constructive and Destructive Heuristics. 126-147 - Bo Cheng, Chengwen Zhang

, Junliang Chen:
Design of Service Net based Correctness Verification Approach for Multimedia Conferencing Service Orchestration. 148-162 - Yibo Chen, Chanle Wu, Xiaojun Guo, Jiyan Wu:

Semantic Learning Service Personalized. 163-172 - Zhirui Lu, Juan Carlos Augusto, Jun Liu

, Hui Wang
:
A Linguistic Truth-Value Temporal Reasoning (LTR) System and its Application to the Design of an Intelligent Environment. 173-196 - Songhua Liu, Junying Zhang, Caiying Ding:

Informative Energy Metric for Similarity Measure in reproducing Kernel Hilbert Spaces. 197-208
Volume 5, Number 2, 2012
Guest Editorial
- Rafael Alcalá

, Yusuke Nojima
, Hisao Ishibuchi
, Francisco Herrera
:
Special Issue on Evolutionary Fuzzy Systems. 209-211
- Antonio González Muñoz

, Raúl Pérez
, Yoel Caises, Enrique Leyva:
An Efficient Inductive Genetic Learning Algorithm for Fuzzy Relational Rules. 212-230 - Krzysztof Trawinski

, Oscar Cordón
, Arnaud Quirin
:
A Study on the Use of Multiobjective Genetic Algorithms for Classifier Selection in FURIA-based Fuzzy Multiclassifiers. 231-253 - Dimitris G. Stavrakoudis, Georgia N. Galidaki

, Ioannis Z. Gitas
, John B. Theocharis:
Reducing the Complexity of Genetic Fuzzy Classifiers in Highly-Dimensional Classification Problems. 254-275 - Ana M. Palacios, Luciano Sánchez

, Inés Couso
:
Equalizing imbalanced imprecise datasets for genetic fuzzy classifiers. 276-296 - Antonio A. Márquez

, Francisco Alfredo Márquez
, Antonio Peregrín
:
A Mechanism to Improve the Interpretability of Linguistic Fuzzy Systems with Adaptive Defuzzification based on the use of a Multi-objective Evolutionary Algorithm. 297-321 - Jun Chen, Mahdi Mahfouf:

Improving Transparency in Approximate Fuzzy Modeling Using Multi-objective Immune-Inspired Optimisation. 322-342 - Chun-Hao Chen, Tzung-Pei Hong

, Vincent S. Tseng:
Finding Pareto-front Membership Functions in Fuzzy Data Mining. 343-354 - Cristóbal J. Carmona

, Pedro González
, María José Gacto
, María José del Jesus
:
Genetic lateral tuning for subgroup discovery with fuzzy rules using the algorithm NMEEF-SD. 355-367 - Francisco Chávez de la O

, Francisco Fernández, María José Gacto
, Rafael Alcalá
:
Automatic Laser Pointer Detection Algorithm for Environment Control Device Systems Based on Template Matching and Genetic Tuning of Fuzzy Rule-Based Systems. 368-386 - Àngela Nebot, Francisco Mugica, Félix Castro, Jesús Antonio Acosta Sarmiento:

Genetic Learning of Fuzzy Parameters in Predictive and Decision Support Modelling. 387-402
Volume 5, Number 3, 2012
- Hajar Mousannif

, Ismail Khalil:
Cooperative Data Management in Wireless Sensor Networks. 403-412 - Lin Gao, Xingsheng Gu:

A Novel Real-coded Quantum-inspired Genetic Algorithm and Its Application in Data Reconciliation. 413-420 - Andrew Clarke, Eric Pardede

, Robert Steele:
External and Distributed Databases: Efficient and Secure XML Query Assurance. 421-433 - David Taniar

, J. Wenny Rahayu, Olena Daly, Hong-Quang Nguyen:
Mining Hierarchical Negative Association Rules. 434-451 - Ramón González del Campo, Luis Garmendia, Ronald R. Yager:

Specificity for interval-valued fuzzy sets. 452-459 - Yiqing Miao, David W. Rooney, Quan Gan:

Artificial Neural Network for Compositional Ionic Liquid Viscosity Prediction. 460-471 - Samiur Arif, Ismail Khalil, Stephan Olariu:

On a Versatile Stochastic Growth Model. 472-482 - Junli Li, Yang Lou

, Yuhui Shi:
An Optimization Algorithm Based on Binary Difference and Gravitational Evolution. 483-493 - M. Arfan Jaffar, Sultan Zia, Ghazanfar Latif

, Anwar M. Mirza
, Irfan Mehmood
, Naveed Ejaz
, Sung Wook Baik
:
Anisotropic Diffusion based Brain MRI Segmentation and 3D Reconstruction. 494-504 - Wuying Liu, Ting Wang:

Utilizing Multi-Field Text Features for Efficient Email Spam Filtering. 505-518 - Qiansheng Zhang, Hongyan Xing, Lihua Wu:

Entropy, Similarity Measure, Inclusion Measure of Intuitionistic Fuzzy Sets and Their Relationships. 519-529 - Michael Kampouridis

, Edward P. K. Tsang:
Investment Opportunities Forecasting: Extending the Grammar of a GP-based Tool. 530-541 - Zaiwu Gong, Chonglan Guo, Yuanyuan He:

Group decision making methods of the incomplete IFPRs and IPRs. 542-552 - Omer Atli, Cengiz Kahraman:

Aircraft Maintenance Planning Using Fuzzy Critical Path Analysis. 553-567 - Mansour Sheikhan

, Ehsan Hemmati
:
PSO-Optimized Hopfield Neural Network-Based Multipath Routing for Mobile Ad-hoc Networks. 568-581 - Piotr Bródka

, Przemyslaw Kazienko
, Katarzyna Musial, Krzysztof Skibicki:
Analysis of Neighbourhoods in Multi-layered Dynamic Social Networks. 582-596 - Milos Jovanovic

, Milan Vukicevic
, Milos Milovanovic
, Miroslav Minovic
:
Using data mining on student behavior and cognitive style data for improving e-learning systems: a case study. 597-610
Volume 5, Number 4, 2012
- Mehmet Ekmekçioglu, Ahmet Can Kutlu:

A Fuzzy Hybrid Approach for Fuzzy Process FMEA: An Application to a Spindle Manufacturing Process. 611-626 - Hanbing Liu, Yubo Jiao, Yafeng Gong:

A fuzzy logic-based damage identification method for simply-supported bridge using modal shape ratios. 627-638 - Ibrahim M. Hamed, Ashraf Saad Hussein

, Mohamed F. Tolba
:
An Intelligent Model for Stock Market Prediction. 639-652 - Jordi Conesa

, Santi Caballé
, David Gañán
, Josep Prieto
:
Exploiting the Semantic Web to Represent Information from On-line Collaborative Learning. 653-667 - Mingyu You, Jia-Ming Liu, Guo-Zheng Li

, Yan Chen:
Embedded Feature Selection for Multi-label Classification of Music Emotions. 668-678 - Israel González-Carrasco

, Ricardo Colomo-Palacios
, José Luis López Cuadrado, Francisco José García-Peñalvo
:
SEffEst: Effort estimation in software projects using fuzzy logic and neural networks. 679-699 - Catarina B. Santiago

, João Lobato Oliveira
, Luís Paulo Reis
, Armando Sousa
, Fabien Gouyon
:
Overcoming Motor-Rate Limitations in Online Synchronized Robot Dancing. 700-713 - Kairui Cao, Xiao Zhi Gao, Xianlin Huang, Xiaojun Ban:

Stability Analysis of a Type of T-S Fuzzy Control Systems Using Off-Axis Circle Criterion. 714-722 - Xiong Li, Yonglong Chen, Zhiming Dong:

Qualitative Description and Quantitative Optimization of Tactical Reconnaissance Agents System Organization. 723-734 - Steve Kansheng Shi, Lemin Li:

A Close-to-linear Topic Detection Algorithm using Relative Entropy based Relevance Model and Inverted Indices Retrieval. 735-744 - Eugénia Moreira Bernardino, Anabela Moreira Bernardino, Juan Manuel Sánchez-Pérez, Juan Antonio Gómez Pulido

, Miguel Ángel Vega Rodríguez
:
Evolutionary Swarm based algorithms to minimise the link cost in Communication Networks. 745-761 - Juan Miguel Medina

, Carlos D. Barranco
, Jesús R. Campaña
, Sergio Jaime-Castillo:
On Modeling the Behavior of Comparators for Complex Fuzzy Objects in a Fuzzy Object-Relational Database Management System. 762-774 - Allel Hadjali, Amine Mokhtari, Olivier Pivert:

A Fuzzy-Rule-Based Model for Handling Contextual Preference Queries. 775-788 - Patrick Bosc, Olivier Pivert, Grégory Smits:

An Approach to Database Preference Queries Based on an Outranking Relation. 789-804
Volume 5, Number 5, 2012
- Yixian Yang, Fuji Ren:

Foreword: Computational Intelligence for Network Control and Security. 805-807
- Lingxi Peng, Dongqing Xie, Ying Gao, Wenbin Chen, Fufang Li, Wu Wen, Jue Wu:

An Immune-inspired Adaptive Automated Intrusion Response System Model. 808-815 - Hong Peng, Shi-yuan Fu, Limin Meng, Xia Liu:

A Novel Location-aided Routing Algorithm for Mobile Ad Hoc Network with a Small Expenditure on Route-Discovery. 816-823 - Ya-Li Liu, Xiaolin Qin, Bohan Li, Liu Liang:

A Forward-secure Grouping-proof Protocol for Multiple RFID Tags. 824-833 - Min Lei, Haipeng Peng, Chunyu Yang, Lixiang Li

:
Synchronization of Time-Delay Chaotic System in Presence of Noise. 834-840 - Haiyang Hu, Zhongjin Li, Liguo Huang

, Hua Hu:
Statistical Mechanisms for Detecting Malicious Behaviors in Resource Allocation from Non-cooperative P2P Environments. 841-850 - Jinxin Zhang, Mangui Liang, Shujuan Wang:

A Credibility-based Congestion Control Scheme and its Performance Evaluation. 851-859 - Jianfeng Lu, Jianmin Han, Wei Chen, Jinwei Hu:

Safety and Availability Checking for User Authorization Queries in RBAC. 860-867 - Ming Wan, Ying Liu, Jianqiang Tang, Hongke Zhang, Si-yu Lin:

Locator/Identifier Separation: Comparison and Analysis on the Mitigation of Worm Propagation. 868-877 - Liangyu Luan, Yingfang Fu, Peng Xiao, Lingxi Peng:

Watch-Nodes-Based Wormhole Attacks Detection in Wireless Mesh Networks. 878-886 - Qian Xiao, Kangfeng Zheng, Shoushan Luo, Xu Cui:

A Secure Network Coding-based Data Gathering Model and Its Protocol in Wireless Sensor Networks. 887-895 - Wei Li, Dawu Gu, Xiaoling Xia, Chen Zhao, Zhiqiang Liu, Ya Liu, Qingju Wang:

Single Byte Differential Fault Analysis on the LED Lightweight Cipher in the Wireless Sensor Network. 896-904 - Yu Yang, Shang-bao Gong, Yucui Guo, Min Lei, Yan Yang:

A Complex Estimation Function based on Community Reputation for On-line Transaction Systems. 905-912
- Dengpan Ye:

Recent advances in the Intelligence technology and Security applications Guest edited by Dengpan Ye. 913
- Ting Zhang, Jingsha He

, Yang Zhang:
Secure Sensor Localization in Wireless Sensor Networks based on Neural Network. 914-923 - Songzhu Mei, Zhiying Wang, Yong Cheng, Jiangchun Ren, Jiangjiang Wu, Jie Zhou:

Trusted Bytecode Virtual Machine Module: A Novel Method for Dynamic Remote Attestation in Cloud Computing. 924-932 - Qian Zhao, Xueying Liu, Shujun Wei:

An Improved Population Migration Algorithm for Solving Multi-Objective Optimization Problems. 933-941 - Shunan Ma, Jingsha He

, Xunbo Shuai:
An Access Control Method based on Scenario Trust. 942-952 - Dengpan Ye, Zhuo Wei, Xuhua Ding, Robert H. Deng

:
Scalable Content Authentication in H.264/SVC Videos Using Perceptual Hashing based on Dempster-Shafer theory. 953-963 - Yunji Zhao

, Hailong Pei:
Model Update Particle Filter for Multiple Objects Detection and Tracking. 964-974 - Yajuan Xie, Shanzhen Yi, Zhongqian Tang, Dengpan Ye:

Uncertainty Multi-source Information Fusion for Intelligent Flood Risk Analysis Based on Random Set Theory. 975-984
Volume 5, Number 6, 2012
- Xiong Li, Zhiming Dong, Hao Wang, Qingchao Meng, Zhentian Wang, Yiwei Zhang:

A Novel Approach to Selecting Contractor in Agent-based Multi-sensor Battlefield Reconnaissance Simulation. 985-995 - Lucia Agud-Albesa

, Raquel Garcia Catalán, Susana Díaz
, Esteban Induráin
, Susana Montes:
Numerical representability of fuzzy total preorders. 996-1009 - Xibei Yang, Yanqin Zhang, Jing-Yu Yang:

Local and Global Measurements of MGRS Rules. 1010-1024 - Guillermo Sánchez-Díaz

, Manuel Lazo-Cortés
, Iván Piza-Dávila:
A Fast Implementation for the Typical Testor Property Identification Based on an Accumulative Binary Tuple. 1025-1039 - Anping Zhao, Yan Ma:

Constructing Service Semantic Link Network Based on the Probabilistic Graphical Model. 1040-1051 - Hien T. Nguyen

, Tru Hoang Cao:
Named Entity Disambiguation: a Hybrid Approach. 1052-1067 - Jose Enrique Pons, Nicolás Marín

, Olga Pons, Christophe Billiet, Guy De Tré
:
A Relational Model for the Possibilistic Valid-time Approach. 1068-1088 - Carmen Martínez-Cruz

, Ignacio J. Blanco
, Maria-Amparo Vila
:
An Ontology as a Tool for Representing Fuzzy Data in Relational Databases. 1089-1108 - Seda Yanik Ugurlu

, Özlem Cosgun, Yeliz Ekinci:
A Dynamic Pricing Model for a Maritime Transportation Service Provider. 1109-1119 - Xingxing He

, Yang Xu, Jun Liu
, Shuwei Chen:
α-Generalized lock resolution method in linguistic truth-valued lattice-valued logic. 1120-1134 - Yingchao Shao, Keyun Qin:

Fuzzy Soft Sets and Fuzzy Soft Lattices. 1135-1147 - Golnaz Vakili, Siavash Khorsandi, Thanasis G. Papaioannou

:
A Self-organized Mechanism of Resource Allocation in P2P Systems. 1148-1159 - Congjun Rao, Xinlin Wu:

Optimization Decision Method for Procuring Divisible Goods. 1160-1172 - Shuibing He, Xianbin Xu, Yuanhua Yang:

Oasa: An Active Storage Architecture for Object-based Storage System. 1173-1183 - G. Vijay Chakaravarthy, S. Marimuthu, A. Naveen Sait:

Comparison of Firefly algorithm and Artificial Immune System algorithm for lot streaming in m-machine flow shop scheduling. 1184-1199

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














