default search action
Computational Intelligence, Volume 36
Volume 36, Number 1, February 2020
- Pandian Vasant, Gerhard-Wilhelm Weber
, Igor S. Litvinchev:
Editorial. 2-3
- Alireza Goli
, Hasan Khademi Zare
, Reza Tavakkoli-Moghaddam
, Ahmad Sadegheih:
Multiobjective fuzzy mathematical model for a financially constrained closed-loop supply chain with labor employment. 4-34 - Kwon-Hee Lee
, Gyung-Il Jeong
, Seong-Hyeong Lee
:
An approximate optimization strategy using refined hybrid metamodel. 35-54 - Xiangyu Zeng, Stephen Berti
:
New optimization method based on energy management in microgrids based on energy storage systems and combined heat and power. 55-79 - Erfan Babaee Tirkolaee
, Shaghayegh Hadian, Gerhard-Wilhelm Weber
, Iraj Mahdavi:
A robust green traffic-based routing problem for perishable products distribution. 80-101 - Alok Kumar Shukla
:
Identification of cancerous gene groups from microarray data by employing adaptive genetic and support vector machine technique. 102-131 - Wonsiri Punurai
, Md Samdani Azad
, Nantiwat Pholdee
, Sujin Bureerat
, Chana Sinsabvarodom
:
A novel hybridized metaheuristic technique in enhancing the diagnosis of cross-sectional dent damaged offshore platform members. 132-150 - Liuwei Huo, Dingde Jiang
, Zhihan Lv
, Surjit Singh
:
An intelligent optimization-based traffic information acquirement approach to software-defined networking. 151-171 - Akash Tayal, Utku Kose
, Arun Solanki, Anand Nayyar
, Jose Antonio Marmolejo Saucedo
:
Efficiency analysis for stochastic dynamic facility layout problem using meta-heuristic, data envelopment analysis and machine learning. 172-202 - Mario Andrés Paredes-Valverde, Giner Alor-Hernández
, Jorge Luis García-Alcaraz
, María del Pilar Salas-Zárate, Luis Omar Colombo-Mendoza, José Luis Sánchez-Cervantes
:
IntelliHome: An internet of things-based system for electrical energy saving in smart home environment. 203-224 - Mahdi Mir, Mohammad Dayyani, Tole Sutikno
, Morteza Mohammadi Zanjireh
, Navid Razmjooy
:
Employing a Gaussian Particle Swarm Optimization method for tuning Multi Input Multi Output-fuzzy system as an integrated controller of a micro-grid with stability analysis. 225-258 - Shu Gong, Wei Gao
, Francis Abza
:
Brain tumor diagnosis based on artificial neural network and a chaos whale optimization algorithm. 259-275 - Milad Hematian
, Mir Mehdi Seyyed Esfahani, Iraj Mahdavi, Nezam Mahdavi-Amiri
, Javad Rezaeian:
A multiobjective integrated multiproject scheduling and multiskilled workforce assignment model considering learning effect under uncertainty. 276-296 - Süreyya Özögür-Akyüz
, Buse Çisil Otar, Pinar Karadayi Atas:
Ensemble cluster pruning via convex-concave programming. 297-319 - Nibedan Panda
, Santosh Kumar Majhi
:
Improved spotted hyena optimizer with space transformational search for training pi-sigma higher order neural network. 320-350 - Anan Banharnsakun
:
Artificial bee colony algorithm for content-based image retrieval. 351-367
Volume 36, Number 2, May 2020
- Julio Mendoza, Hélio Pedrini:
Detection and classification of lung nodules in chest X-ray images using deep convolutional neural networks. 370-401 - Venkatanareshbabu Kuppili, Diwakar Tripathi
, Damodar Reddy Edla
:
Credit score classification using spiking extreme learning machine. 402-426 - El-Sayed A. El-Dahshan
, Mahmoud M. Bassiouni
:
Intelligent methodologies for cardiac sound signals analysis and characterization in cepstrum and time-scale domains. 427-458 - Nuha Zamzami
, Rua Alsuroji, Oboh Eromonsele, Nizar Bouguila:
Proportional data modeling via selection and estimation of a finite mixture of scaled Dirichlet distributions. 459-485 - Fanghong Jian
, Jimmy Xiangji Huang
, Jiashu Zhao, Zhiwei Ying, Yuqi Wang:
A topic-based term frequency normalization framework to enhance probabilistic information retrieval. 486-521 - Ronan Assumpção Silva
, Alceu de Souza Britto Jr., Fabrício Enembreck
, Robert Sabourin, Luiz Eduardo Soares de Oliveira:
CSBF: A static ensemble fusion method based on the centrality score of complex networks. 522-556 - Anguraj S
, Shantharajah S. P, Jeba Emilyn J
:
A steganographic method based on optimized audio embedding technique for secure data communication in the internet of things. 557-573 - Sergio Peignier
, Christophe Rigotti, Guillaume Beslon
:
Evolutionary subspace clustering using variable genome length. 574-612 - Prasenjit Dutta, Mrinmoy Majumder
, Subhash Chandra Panja:
Optimization of material removal rate in wire EDM by polynomial neural network models. 613-636 - Shubham Dodia
, Damodar Reddy Edla
, Annushree Bablani
, Ramalingaswamy Cheruku
:
Lie detection using extreme learning machine: A concealed information test based on short-time Fourier transform and binary bat optimization using a novel fitness function. 637-658 - Ali Abbaszadeh Sori
, Ali Ebrahimnejad
, Homayun Motameni:
Elite artificial bees' colony algorithm to solve robot's fuzzy constrained routing problem. 659-681 - M. Saravanan
, P. Ganeshkumar:
Routing using reinforcement learning in vehicular ad hoc networks. 682-697 - Fanchao Kong
, Quanxin Zhu:
Antiperiodic dynamical behaviors of discontinuous neutral-type Cohen-Grossberg neural networks with mixed time delays. 698-719 - Lukas Esterle
, Peter R. Lewis:
Distributed autonomy and trade-offs in online multiobject k-coverage. 720-742 - Diego Fernandes de Araújo
, Carlos Eduardo Santos Pires, Dimas Cassimiro do Nascimento
:
Leveraging active learning to reduce human effort in the generation of ground-truth for entity resolution. 743-772 - G. Sumathi
, Akilandeswari Jeyapal
:
Improved fuzzy weighted-iterative association rule based ontology postprocessing in data mining for query recommendation applications. 773-782 - Arash Chaghari
, Mohammad-Reza Feizi-Derakhshi
, Mohammad Ali Balafar
:
The combination of term relations analysis and weighted frequent itemset model for multidocument summarization. 783-812 - Maria Antony Sahaya Sheela
, Rajendran Prabakaran
:
Improvement of battery lifetime in software-defined network using particle swarm optimization based cluster-head gateway switch routing protocol with fuzzy rules. 813-823 - Bagher Zarei
, Mohammad Reza Meybodi
:
Detecting community structure in complex networks using genetic algorithm based on object migrating automata. 824-860 - Mahesh G. Huddar
, Sanjeev S. Sannakki
, Vijay S. Rajpurohit
:
Multi-level feature optimization and multimodal contextual fusion for sentiment analysis and emotion classification. 861-881
Volume 36, Number 3, August 2020
- Romit S. Beed
, Arindam Roy, Sunita Sarkar
, Durba Bhattacharya
:
A hybrid multi-objective tour route optimization algorithm based on particle swarm optimization and artificial bee colony optimization. 884-909 - Nelly Elsayed
, Anthony S. Maida, Magdy A. Bayoumi:
Reduced-gate convolutional long short-term memory using predictive coding for spatiotemporal prediction. 910-939 - T. Rajesh Kumar
, G. R. Suresh
, S. Kanaga Subaraja, C. Karthikeyan:
Taylor-AMS features and deep convolutional neural network for converting nonaudible murmur to normal speech. 940-963 - Shiju George
, Ajit Kumar Santra:
An improved long short-term memory networks with Takagi-Sugeno fuzzy for traffic speed prediction considering abnormal traffic situation. 964-993 - Ramesh Kumaravelu
, Rajakumar Sadaiyandi, Anandamurugan Selvaraj, Jeeva Selvaraj
, Gayathiri Karthick:
Computationally efficient and secure anonymous authentication scheme for IoT-based mobile pay-TV systems. 994-1009 - Charanjeet Singh
, Anuj Sharma:
Modified online Newton step based on elementwise multiplication. 1010-1025 - Florentina Hristea, Mihaela Colhon
:
The long road from performing word sense disambiguation to successfully using it in information retrieval: An overview of the unsupervised approach. 1026-1062 - P. Kirubanantham
, G. Vijayakumar
:
Novel recommendation system based on long-term composition for adaptive web services. 1063-1077 - Shilaja Chandrasekaran
:
Multiobjective optimal power flow using interior search algorithm: A case study on a real-time electrical network. 1078-1096 - N. Saranya
, V. Manikandan:
On viability of detecting malwares online using ensemble classification method with performance metrics. 1097-1112 - Emilio Sansano-Sansano
, Raúl Montoliu, Óscar Belmonte Fernández
:
A study of deep neural networks for human activity recognition. 1113-1139 - Shahram Golzari
, Mojtaba Shabani Haji, Abdullah Khalili
:
Selecting effective features on prediction of delay in servicing ships arriving to ports using a combination of Clonal Selection and Grey Wolf Optimization algorithms - Case study: Shahid Rajaee port in Bandar Abbas. 1140-1160 - Ashish Kumar
, Mayank Saini, Aditi Sharan:
Aspect category detection using statistical and semantic association. 1161-1182 - Sze-Teng Liong, Yen-Chang Huang, Shu-Meng Lic, Zhongkai Huang, Jingyang Ma, Yee Siang Gan
:
Automatic traditional Chinese painting classification: A benchmarking analysis. 1183-1199 - Anitha Shanmugam
, Jayanthi Paramasivam:
A two-level authentication scheme for clone node detection in smart cities using Internet of things. 1200-1220 - Sivasankari Narasimhan
, Muthukumar Arunachalam
:
Bio-PUF-MAC authenticated encryption for iris biometrics. 1221-1241 - A Aalan Babu
, V. Mary Anita Rajam:
Water-body segmentation from satellite images using Kapur's entropy-based thresholding method. 1242-1260 - G. Premalatha
, Premanand Venkatesh Chandramani:
Improved gait recognition through gait energy image partitioning. 1261-1274 - K. Dhanasekaran
, P. Anandan, N. Kumaratharan:
A robust image steganography using teaching learning based optimization based edge detection model for smart cities. 1275-1289 - Merlin Linda George
, Themozhi Govindarajan, Kavitha Angamuthu Rajasekaran, Sudheer Reddy Bandi
:
A robust similarity based deep siamese convolutional neural network for gait recognition across views. 1290-1319 - Ornurai Sangsawang
, Sunarin Chanta
:
Capacitated single-allocation hub location model for a flood relief distribution network. 1320-1347 - Shuai Chen, Ling Huang, Zhiwen Lei, Shen Wang:
Research on personalized recommendation hybrid algorithm for interactive experience equipment. 1348-1373 - Santoshinee Mohapatra
, Pabitra Mohan Khilar:
Fault diagnosis in wireless sensor network using negative selection algorithm and support vector machine. 1374-1393 - Selmo Eduardo Rodrigues Junior
, Ginalber Luiz de Oliveira Serra:
Intelligent forecasting of time series based on evolving distributed Neuro-Fuzzy network. 1394-1413 - Sultan Ahmed, Malek Mouhoub
:
Conditional Preference Networks with User's Genuine Decisions. 1414-1442
Volume 36, Number 4, November 2020
- Usha Moorthy
, Usha Devi Gandhi
:
Usha Moorthy, Usha Devi Gandhi: Forest optimization algorithm-based feature selection using classifier ensemble. 1445-1462 - Jing Lu
, Shihong Wu, Zhiyu Xiang, Hanlei Cheng
:
Intelligent document-filling system on mobile devices by document classification and electronization. 1463-1479 - B. Durgalakshmi
, V. Vijayakumar:
Feature selection and classification using support vector machine and decision tree. 1480-1492 - M. Manoj Kumar, A. Alli Rani
, V. Sundaravazhuthi:
A computational algorithm based on biogeography-based optimization method for computing power system security constrains with multi FACTS devices. 1493-1511 - V. Sundaravazhuthi, A. Alli Rani
, M. Manoj Kumar:
A computing method-based rearrangement of network protocols to improvise quality factors of FACTS devices and sensors using Newton-Raphson technique. 1512-1526 - Sathish Kumar Mani, Iyapparaja Meenakshisundaram
:
Improving quality-of-service in fog computing through efficient resource allocation. 1527-1547 - Mohan Annamalai
, Kalaichelvan Gurumurthy:
Neural network prediction of bioleaching of metals from waste computer printed circuit boards using Levenberg-Marquardt algorithm. 1548-1568 - Anandamurugan Selvaraj, Jeeva Selvaraj
, Sivabalakrishnan Maruthaiappan, Gokulnath Chandra Babu
, Priyan Malarvizhi Kumar
:
L1 norm based pedestrian detection using video analytics technique. 1569-1579 - Azath Mubarakali
, Karthik Srinivasan, Reham Mukhalid, Subash C. B. Jaganathan, Ninoslav Marina
:
Security challenges in internet of things: Distributed denial of service attack detection using support vector machine-based expert systems. 1580-1592 - Xiaobo Peng
, Yanfen Chang:
Energy-efficient routing technique for reliable data transmission under the background of big data for disaster region. 1593-1608 - Yongyi Li
, Zhongqiang Yang, Kaixu Han:
Research on the clustering algorithm of ocean big data based on self-organizing neural network. 1609-1620 - Jianli Cao
, Zhikui Chen, Yuxin Wang, He Guo:
Parallel genetic algorithm for N-Queens problem based on message passing interface-compute unified device architecture. 1621-1637 - Xin Sun
, Xiaomin Ji:
Integrated kitchen design and optimization based on the improved particle swarm intelligent algorithm. 1638-1649 - Yang Song
, Yunzhan Gong:
Web service composition on IoT reliability test based on cross entropy. 1650-1662 - He Yongqiang
:
Study on the algorithm for smart community sensor network routing with adaptive optimization via cluster head election. 1663-1671 - Abdulrahman Saad Alqahtani
:
Lossless data transmission for Internet of things application over wireless multimedia sensor networks using enhanced and optimal path scheduling approach to maximizing the quality of service. 1672-1685 - Ling Sun, Xu Xu, Yanbin Yang
, Wei Liu, Jiahao Jin:
Knowledge mapping of supply chain risk research based on CiteSpace. 1686-1703 - Dong Guo
, Chuantao Wang
:
Sequence recommendation based on deep learning. 1704-1722 - B. Ponmudi
, G. Balasubramanian:
A computational method based on Gustafson-Kessel fuzzy clustering for a novel islanding detection for grid connected devices and sensors. 1723-1736 - Jing Li, Hai Tao
, Liu Shuhong
, Sinan Q. Salih, Jasni Mohamad Zain
, Liu Yankun
, Vivekananda G. N.
, M. Thanjaivadel:
Internet of things assisted condition-based support for smart manufacturing industry using learning technique. 1737-1754 - Huazhi Yuan, Hongjia Zhang
, Xuelian Liu, Xinlong Jiao:
Traffic wave model based on vehicle-infrastructure cooperative and vehicle communication data. 1755-1772 - Lihua Zhang
, Jingjing Li, Fangzhou Hu, Yang Huang, Jiayi Bai:
Smart grid data access control scheme based on blockchain. 1773-1784
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.