


default search action
International Journal of Reasoning-based Intelligent Systems, Volume 7
Volume 7, Numbers 1/2, 2015
- Leoneed M. Kirilov, Vassil Guliashki, Krassimira Genova, Peter Zhivkov, Boris Staykov, Daniel Vatov:

Interactive environment WebOptim for solving multiple-objective problems using scalarising and evolutionary approaches. 4-15 - Monika Simjanoska, Sasko Ristov

, Marjan Gusev
, Goran Velkoski:
PPMaaS: performance-based pricing model as a service. 16-25 - Vesna Gega, Pece J. Mitrevski

:
Using generalised stochastic Petri nets to model and analyse search behaviour patterns. 26-34 - Stojanche Panov, Saso Koceski

:
Metaheuristic global path planning algorithm for mobile robots. 35-41 - Mitko Kostov

, Violeta Kostova, Ramona Markoska:
AGV guidance system simulations with a programmable robotics kit. 42-46 - Biljana Samardzic

, Bojana M. Zlatkovic:
Chaos modelling and simulation of cascade connected nonlinear electrical systems using MATLAB/Bondsim. 47-54 - Tanya Titova, Veselin Nachev, Chavdar Damyanov:

Non-destructive diagnosis of food products using neural-genetic algorithm. 55-61 - Marija Agatonovic, Zoran Stankovic, Nebojsa Doncov

, Bratislav Milovanovic, Ivan Milovanovic:
Neural network model for 2D DOA estimation of two coherent sources. 62-69 - Lidia T. Jordanova, Lyubomir B. Laskov, Dobri Dobrev:

Improvement of noise immunity of satellite DVB channel. 70-77 - Antoaneta Popova, Johan Garcia, Nikolay N. Neshov

, Ivo R. Draganov
, Darko Brodic
:
Finding URLs in images by text extraction in DCT domain, recognition and matching in dictionary. 78-92 - Ali Benafia, Ramdane Maamri, Zaïdi Sahnoun, Sara Benafia:

Content-based indexing of visual information in the web pages. 93-113 - Roumen K. Kountchev, Roumiana A. Kountcheva:

Hierarchical SVD-based image decomposition with tree structure. 114-129 - S. Uma Maheswari, D. Jude Hemanth

:
Discrete ripplet transform based steganography system for imaging applications. 130-135
Volume 7, Numbers 3/4, 2015
- Xiaohui Wang:

The architecture design of commercial banks' ex-post supervision systems. 140-144 - Zebiao Shan, Yaowu Shi, Lanxiang Zhu:

Application of fractional order PID in controlling constant current. 145-151 - Chuanbao Du, Houde Quan, Peizhang Cui:

Improved quantum-inspired cuckoo search algorithm based on self-adapting adjusting of search range. 152-160 - Trisiladevi C. Nagavi

, Nagappa U. Bhajantri:
Enhanced perceptual feature space with context drift information for query by humming system. 161-170 - Haifeng Lin, Anna Jiang:

A light-weight linear coding cipher model for rechargeable wireless sensor networks. 171-176 - Jiali Du, Pingfang Yu:

Machine learning techniques for decoding GP sentences: effects of processing breakdown. 177-185 - Sunan Wang, Yingying Li, Xin Zhao, Bin Wang:

Intrusion detection system design of cloud computing based on abnormal traffic identification. 186-192 - Chun Yan, Yiwei Qiu, Liangyu Zhang, Wei Liu:

The study of modelling problems of GLM for outstanding claims reserving based on prediction error of reserve. 193-199 - Jiuyuan Huo

, Yaonan Zhang, Hongxing Zhao:
An improved artificial bee colony algorithm for numerical functions. 200-208 - Qinli An, Jianfeng Chen, Zhonghai Yin:

Study on cellular iterative location algorithm with Gaussian noise. 209-213 - Wengang Zhou, Yingchun Qi, Hailin Pei:

Improvement in multiple nodes positioning accuracy for wireless sensor networks based on unknown transmitted powers. 214-220 - Srilatha Chebrolu

, Sriram G. Sanjeevi:
Forward tentative selection with backward propagation of selection decision algorithm for attribute reduction in rough set theory. 221-243 - B. K. Tripathy

, K. R. Arun:
A new approach to soft sets, soft multisets and their properties. 244-253 - Anitarani Brahma

, Suvasini Panigrahi:
A new approach to intrusion detection in databases by using artificial neuro fuzzy inference system. 254-260 - S. Sowmya Kamath

, V. S. Ananthanarayana:
A bio-inspired, incremental clustering algorithm for semantics-based web service discovery. 261-275 - Meriem Djezzar, Zizette Boufaïda:

Ontological classification of individuals: a multi-viewpoints approach. 276-285 - Khaira Tazir, Yamina Mohamed Ben Ali

:
Colouring graph by the kernel P system. 286-295 - Panneer Prabhavathy, B. K. Tripathy

:
An integrated covering-based rough fuzzy set clustering approach for sequential data. 296-304 - P. Gayathri, Natarajan Jaisankar:

Automatic annotation generation of medical documents for effective medical information retrieval. 305-314 - Mingxin Gan, Le Li:

Motif-Plus: incorporation of network motifs into top-n friendship recommendations. 315-324 - K. V. Shahnaz, C. K. Ali:

Firefly algorithm assisted multi-user detection for OFDM/SDMA uplink system. 325-329 - Anita Brigit Mathew

, S. D. Madhu Kumar
:
Novel research framework on SN's NoSQL databases for efficient query processing. 330-338

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














