default search action
Cognitive Systems Research, Volume 57
Volume 57, October 2019
- Yazhong Deng:
Construction of ideal model of social development under the political background of mind philosophy. 1-10 - Xiangmin Li:
Characteristics and rules of college English education based on cognitive process simulation. 11-19 - Weidong Huang, Xiang Xiao, Mengqiang Xu:
Design and implementation of domain-specific cognitive system based on question similarity algorithm. 20-24 - Tangwei Teng, Liuting Qin:
Analysis of regional environment and regional innovation strategy based on cybernetics. 25-31 - Xiaohong Zhang, Xuejiao Wang, Florentin Smarandache, Tèmítópé Gbóláhàn Jaíyéolá, TieYan Lian:
Singular neutrosophic extended triplet groups and generalized groups. 32-40 - Xinyang Zhang, Meng Zhou:
Construction of CCZ transform for quadratic APN functions. 41-45 - A. Muthukrishnan, J. Charles Rajesh kumar, Vinod Kumar, M. Kanagaraj:
Internet of image things-discrete wavelet transform and Gabor wavelet transform based image enhancement resolution technique for IoT satellite applications. 46-53 - Weijun Zhu, Joel J. P. C. Rodrigues, Jianwei Niu, Mingliang Xu, Qinglei Zhou:
Mimic automata: A novel formal model for mimic computing. 54-65 - Varun Kumar Tiwari, Mohammad Farukh Hashmi, Avinash G. Keskar, N. C. Shivaprakash:
Speaker identification using multi-modal i-vector approach for varying length speech in voice interactive systems. 66-77 - N. Susitha, Ravi Subban:
Reliable pupil detection and iris segmentation algorithm based on SPS. 78-84 - Jiyou Li:
Government accounting optimization based on computational linguistics. 85-91 - Weijun Zhu, Joel J. P. C. Rodrigues, Jianwei Niu, Qinglei Zhou, Yafei Li, Mingliang Xu, Bohu Huang:
Detecting air-gapped attacks using machine learning. 92-100 - S. Anthony Jesudurai, A. Senthilkumar:
An improved energy efficient cluster head selection protocol using the double cluster heads and data fusion methods for IoT applications. 101-106 - Hongbing Ouyang, Xiaowei Zhang, Hongju Yan:
Index tracking based on deep neural network. 107-114 - A. S. Ajith, T. Latha:
Neutrosophic data formation using Gaussian filter based costas coding for wireless communication systems. 115-125 - (Withdrawn) IoT individual privacy features analysis based on convolutional neural network. 126-130
- Ganesh Kumar Chellamani, Premanand Venkatesh Chandramani:
Demand response management system with discrete time window using supervised learning algorithm. 131-138 - Yong Ma, Rongxia Zhang, Tongqiang Zong:
Law, discipline and governance based on cognitive process simulation - analysis of legal forms in the modern rights relationship. 139-146 - Rachna Jain, Nikita Jain, Akshay Aggarwal, D. Jude Hemanth:
Convolutional neural network based Alzheimer's disease classification from magnetic resonance brain images. 147-159 - Johannes Nauta, Christof Mahieu, Christophe Michiels, Femke Ongenae, Femke De Backere, Filip De Turck, Yara Khaluf, Pieter Simoens:
Pro-active positioning of a social robot intervening upon behavioral disturbances of persons with dementia in a smart nursing home. 160-174 - Peide Liu, Qaisar Khan, Tahir Mahmood:
Multiple-attribute decision making based on single-valued neutrosophic Schweizer-Sklar prioritized aggregation operator. 175-196 - Rashed Refaat, Ibrahim Mahmoud El-Henawy:
Innovative method to evaluate quality management system audit results' using single value neutrosophic number. 197-206 - Robert H. Wortham, Swen E. Gaudl, Joanna J. Bryson:
Instinct: A biologically inspired reactive planner for intelligent embedded systems. 207-215 - Mohamed Abdel-Basset, Asmaa Atef, Florentin Smarandache:
A hybrid neutrosophic multiple criteria group decision making approach for project selection. 216-227 - Yizhuo Zhang:
Application of improved BP neural network based on e-commerce supply chain network data in the forecast of aquatic product export volume. 228-235 - T. Thamaraimanalan, P. Sampath:
A low power fuzzy logic based variable resolution ADC for wireless ECG monitoring systems. 236-245
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.