


default search action
Kybernetes, Volume 37
Volume 37, Number 1, 2008
- Brian H. Rudall, C. J. H. Mann:
Cybernetic systems for management applications. 7-16 - Alex M. Andrew:
Fusion power; centralized computing. 17-19 - Jon-Arild Johannessen:
Explaining institutional change: aspects of an innovation in the new institutional economy. 20-35 - Tung-Hsiang Chou, John A. Vassar, Binshan Lin
:
Knowledge management via ontology development in accounting. 36-48 - Janet K. Durgin, Joseph S. Sherif:
The semantic web: a catalyst for future e-business. 49-65 - Amy H. I. Lee, He-Yau Kang:
A mixed 0-1 integer programming for inventory model: A case study of TFT-LCD manufacturing company in Taiwan. 66-82 - Helmut Nechansky
:
Elements of a cybernetic epistemology: Decisions, control and principles of societal organization. 83-93 - Uri Fidelman:
The cybernetics of learning mathematics and computer sciences. 94-103 - Gaspar Mora
, Yves Cherruault:
A new approach to the reduction of multiple integrals to simple ones using Chebyshev's kernels. 104-119 - Higinio Mora Mora
, Miguel Lloret-Climent
, Francisco Vives-Macià:
A metric approach for comparing DNA sequences. 120-126 - Richard S. Segall, Gauri S. Guha, Sarath A. Nonis:
Data mining of environmental stress tolerances on plants. 127-148 - Yi Lin, Dillon Forrest:
Economic yoyos and never-perfect value systems. 149-165 - Issam M. Kouatli
:
Definition and selection of fuzzy sets in genetic-fuzzy systems using the concept of fuzzimetric arcs. 166-181
Volume 37, Number 2, 2008
- B. H. Rudall, C. J. H. Mann:
Developing innovative systems. 205-211 - Alex M. Andrew:
Digital patient; CYBCOM discussion. 212-214 - Tatjana Mlakar, Matjaz Mulej:
On the concept of the "control systems theory" as a new model of systemic consideration. 215-225 - Wei-Feng Tung, Soe-Tsyr Yuan:
A service design framework for value co-production: insight from mutualism perspective. 226-240 - Klemen Kavcic, Mitja I. Tavcar:
Planning successful partnership in the process of outsourcing. 241-249 - Jon-Arild Johannessen, Johan Olaisen:
A systemic critique of neoclassical utility theory. 250-257 - Andrew Adamatzky:
Growing spanning trees in plasmodium machines. 258-264 - Helmut Nechansky
:
The cybernetics of social change - and history. 265-281 - A. G. Bache:
Prosthotology: the science of prosthetics and orthotics. 282-296 - Yi Lin, Dillon Forrest:
Economic yoyos and Becker's Rotten Kid theorem. 297-314 - Shaher Momani
, Vedat Suat Ertürk:
Solving a system of fourth-order obstacle boundary value problems by differential transform method. 315-325 - Ali Sahin, Idris Dag, Bülent Saka:
A B-spline algorithm for the numerical solution of Fisher's equation. 326-342 - Khosrow Maleknejad
, Saeed Sohrabi, Yaser Rostami
:
Application of wavelet transform analysis in medical frames compression. 343-351 - Mehrdad Lakestani
, Mehdi Dehghan
:
A new technique for solution of a parabolic inverse problem. 352-364
Volume 37, Numbers 3/4, 2008
- Yi Lin, Wujia Zhu, Ningsheng Gong, Guoping Du:
Systemic yoyo structure in human thoughts and the fourth crisis in mathematics. 387-423 - Wujia Zhu, Yi Lin, Ningsheng Gong, Guoping Du:
Descriptive definitions of potential and actual infinities. 424-432 - Wujia Zhu, Yi Lin, Ningsheng Gong, Guoping Du:
Wide-range co-existence of potential and actual infinities in modern mathematics. 433-437 - Wujia Zhu, Yi Lin, Ningsheng Gong, Guoping Du:
Modern system of mathematics and a pair of hidden contradictions in its foundation. 438-445 - Wujia Zhu, Yi Lin, Guoping Du, Ningsheng Gong:
The inconsistency of countable infinite sets. 446-452 - Wujia Zhu, Yi Lin, Guoping Du, Ningsheng Gong:
Inconsistency of uncountable infinite sets under ZFC framework. 453-457 - Wujia Zhu, Yi Lin, Guoping Du, Ningsheng Gong:
Modern system of mathematics and special Cauchy theater in its theoretical foundation. 458-464 - Wujia Zhu, Yi Lin, Guoping Du, Ningsheng Gong:
Modern system of mathematics and general Cauchy theater in its theoretical foundation. 465-468 - Wujia Zhu, Yi Lin, Ningsheng Gong, Guoping Du:
Cauchy theater phenomenon in diagonal method and test principle of finite positional differences. 469-473 - Wujia Zhu, Yi Lin, Ningsheng Gong, Guoping Du:
New Berkeley paradox in the theory of limits. 474-481 - Wujia Zhu, Yi Lin, Guoping Du, Ningsheng Gong:
The inconsistency of the natural number system. 482-488 - Wujia Zhu, Yi Lin, Guoping Du, Ningsheng Gong:
Mathematical system of potential infinities (I) - preparation. 489-493 - Wujia Zhu, Yi Lin, Guoping Du, Ningsheng Gong:
Mathematical system of potential infinities (II) - formal systems of logical basis. 494-504 - Wujia Zhu, Yi Lin, Guoping Du, Ningsheng Gong:
Mathematical system of potential infinities (III) - meta theory of logical basis. 505-515 - Wujia Zhu, Yi Lin, Guoping Du, Ningsheng Gong:
Mathematical system of potential infinities (IV) - set theoretic foundation. 516-525 - Wujia Zhu, Yi Lin, Ningsheng Gong, Guoping Du:
Problem of infinity between predicates and infinite sets. 526-533 - Wujia Zhu, Yi Lin, Ningsheng Gong, Guoping Du:
Intension and structure of actually infinite, rigid sets. 534-542 - B. H. Rudall, C. J. H. Mann:
The challenges of tracking and protecting data. 543-549 - Alex M. Andrew:
Dealing with spam: more on climate change. 550-553
Volume 37, Number 5, 2008
- Anatoliy A. Platonov
:
Concurrent software-hardware optimisation of adaptive estimating, identifying and filtering systems. 590-607 - Adam Lozowicki, Teresa Lozowicka Stupnicka, Dorota Lozowicka
:
High-precision state feedback control systems for linear and non-linear plants. 608-622 - Abdykappar A. Ashimov, Kenzhegaly Sagadiyev, Yuriy V. Borovskiy
, Nurlan Iskakov, Askar Ashimov:
On the market economy development parametrical regulation theory. 623-636 - Tohru Kawabe
:
RHC method for application to BMI-based systems. 637-651 - Jerzy Józefczyk:
Worst-case allocation algorithms in a complex of operations with interval parameters. 652-676 - Donat Orski, Maciej Hojda:
Decision making under uncertainty for a class of production systems with serial and parallel operations. 677-692 - Dariusz Gasior:
QoS rate allocation in computer networks under uncertainty. 693-712
Volume 37, Number 6, 2008
- B. H. Rudall, C. J. H. Mann:
The challenges of the information society. 721-728 - Alex M. Andrew:
Arabic calligraphy: phishing. 729-731 - Marina Shaduri:
Principle of holography in complex adaptive systems. 732-738 - Chen Wu, Xiaohua Hu, Jingyu Yang:
On blocks and coverings based on semi-equivalence relation in pansystems methodology. 739-748 - F. Guechi, H. Mekias:
A cybernetic approach to the problem of pouring flows. 749-756 - Yi Lin, Dillon Forrest:
Economic yoyos, parasites and child labor. 757-767 - Elçin Yusufoglu, Baris Erbas
:
Numerical expansion methods for solving Fredholm-Volterra type linear integral equations by interpolation and quadrature rules. 768-785 - Mehdi Dehghan
, Reza Mazrooei-Sebdani:
Some characteristics of solutions of a class of rational difference equations. 786-796 - Francisco Gallego Lupiáñez
:
On neutrosophic topology. 797-800 - Aitor Bilbao-Guillerna, Manuel de la Sen
, Santiago Alonso-Quesada
:
A new approach to the study of controlled systems: Multiestimation adaptive discrete control with multirate sampling. 801-826
Volume 37, Number 7, 2008
- Maurice Yolles, B. Roy Frieden, G. Kemp:
Toward a formal theory of socioculture: A yin-yang information-based theory of social change. 850-909 - Randolph C. Rach:
A new definition of the Adomian polynomials. 910-955 - Stefan Walter:
Understanding the time dimension in resource management. 956-977 - Wei-Lun Chang
:
A value-based pricing system for strategic co-branding goods. 978-996 - Ozan Çakir:
The grey extent analysis. 997-1015 - Steven E. Wallis
:
Emerging order in CAS theory: mapping some perspectives. 1016-1029 - Joan Carles Micó
, Antonio Caselles, Pantaleón D. Romero
:
Space-time dynamical models. 1030-1058 - B. H. Rudall, C. J. H. Mann:
New initiatives for new technologies. 1059-1065 - Alex M. Andrew:
Cybernetics and e-democracy. 1066-1068
Volume 37, Number 8, 2008
- B. H. Rudall, C. J. H. Mann:
New perspectives for research and development. 1085-1090 - Alex M. Andrew:
Spam, biometrics and a blog. 1091-1093 - Ludovic-Alexandre Vidal
, Franck Marle:
Understanding project complexity: implications on project management. 1094-1110 - Francisco A. Pujol
, Higinio Mora Mora
, José Luis Sánchez, Antonio Jimeno
:
A client/server implementation of an encryption system for fingerprint user authentication. 1111-1119 - Mario Iván Tarride, R. Ariel Zamorano, S. Nicolás Varela, M. Julia González:
Healthy organizations: toward a diagnostic method. 1120-1150 - Maryam Tayefeh Mahmoudi
, Kambiz Badie, Mahmood Kharrat:
Text organization via projection from researcher-space onto text-space. 1151-1164 - Mehdi Dehghan
, Akbar Mohebbi:
Solution of the two dimensional second biharmonic equation with high-order accuracy. 1165-1179 - Vedat Suat Ertürk, Shaher Momani
:
Solutions to the problem of prey and predator and the epidemic model via differential transform method. 1180-1188 - Amjad Alipanah
, Mehdi Dehghan
:
Solution of population balance equations via rationalized Haar functions. 1189-1196
Volume 37, Numbers 9/10, 2008
- Xiaoping Bai, Hongming Wang:
A new grey decision dynamic model based on cybernetics knowledge for complex system optimization analyzing and its practical application. 1218-1226 - Wujun Cao, Peiying He, Jinfeng Wang:
Construction and analysis of contract feasible set under quantity-discount contract. 1227-1233 - Dejun Chen, Zude Zhou, Rui Hu:
Research on the inventory scheduling model based on agent-oriented Petri net in supply chain. 1234-1241 - Dejun Chen, Zude Zhou, Yingzhe Ma, D. T. Pham:
Modeling of RBAC-based access control of virtual enterprise. 1242-1249 - Dejun Chen, Zude Zhou, D. T. Pham:
Research on the grey relational evaluation method of core competencies of virtual enterprise members. 1250-1256 - Wenbo Chen:
A class of strong deviation theorems for continuous random variables sequence. 1257-1263 - Chen Wu, Lijuan Wang:
An improved limited and variable precision rough set model for rule acquisition based on pansystems methodology. 1264-1271 - Yuehua Chen, Wei Yao:
Study on investment scale control of urban construction process by the method of grey systems. 1272-1278 - Aihua Fan, Zhongzhi Wang, Fangqing Ding:
Some limit theorems of runs to the continuous-valued sequence. 1279-1286 - Jun Fan, Zhitang Li, Wei Nie:
Design, modeling and simulation of a novel directional MAC protocol for ad hoc networks. 1287-1296 - Shuqiong Fang, Baoan Yang, Yin Yu:
Construction of evaluation index system of national energy security based on CAS theory and PSR model. 1297-1307 - Jian-zhi Gao, Yao Zhao, He-ling Ma, Yuan-Xia Sun:
Theoretical analysis on coordinated development of urban transport system. 1308-1314 - Zhiyuan Ge, Ping Gao
:
Studies on traffic effects of high-speed ring road in city center. 1315-1321 - Li-Ping He, Fu-Zheng Qu:
Possibility and evidence theory-based design optimization: an overview. 1322-1330 - Ping He
, Zhongsheng Hua
:
Compensation analysis with additive DEA model. 1331-1338 - Xubiao He
, Pu Gong, Chunxun Xie:
Research on internal credit ratings for listed companies. 1339-1348 - Yuemin Hou, Linhong Ji:
Six-stage design framework. 1349-1358 - Hongpu Hu, Wannian Liang, Aimin Guo, Xuemei An, Ping Zhou, Junli Wang, Yi Lin:
Automated management and evaluation system for community health service. 1359-1366 - Hongpu Hu, Wannian Liang, Yadong Wang, Xuemei An, Ping Zhou, Junhong Li, Lili Sang, Yi Lin:
Constructing automated installation application system of community health service based on FoxPro8.0. 1367-1373 - Xianfeng Huang, Dongguo Shao, Wenquan Gu:
Multi-objective chaotic optimization algorithm and its application in optimal water resources deployment. 1374-1382 - Jinlin Huang, Zhangming Li, Guihe Tang:
Application of the catastrophe theory in ascertainment of vertical bearing capacity of single pile. 1383-1392 - Xiangzhao Huang, Hu Wan
, Hongtao Zhou:
The synergetic model of the controlling tactics to network financial information security. 1393-1400 - Yanghua Jin, Biao Nie, Yuchun Xiao:
Theoretical model and application of multilevel modeling in the research of social system. 1401-1408 - Kong Fanliang, Wang Guizhi, Ping Yu:
Certain martingale methods of parameter estimation in dynamic system. 1409-1416 - Yushou Kong, Lingling Ji, Changyu Wang, Liguo Li, Liming Zeng:
A new technique of non-linear statistic prediction and its application in atmospheric systems. 1417-1424 - Zheng Kou
, Yanhong Zhou, Xiaoli Qiang:
Human influenza: a virus classification using a probabilistic neural network. 1425-1430 - Fang Li:
Multiplicative perturbations of incomplete second order abstract differential equations. 1431-1437 - Haixia Li, He Lin, Yongli Li, Aiping Wu:
Granularity research based on panweighted field of pansystems. 1438-1443 - Huaishu Li, Lizhong Song, Yanhui Lai:
Discrete variable structure control and its application to ship autopilot. 1444-1450 - Mei Li, Wen-Bo Wei, Ming Deng
, Wen-Ju Yuan, Qi-Sheng Zhang:
Application model of pseudo-random correlation method in electrical prospecting. 1451-1456 - Brian H. Rudall, C. J. H. Mann:
Innovative systems for research and development. 1457-1462 - Alex M. Andrew:
Spam and JavaScript, future of the web. 1463-1465 - Alex M. Andrew:
Archives, mathematics encyclopaedia, dancing robots, ASC. 1466-1468 - Thiago Turchetti Maia, Antônio de Pádua Braga
, André Carlos Ponce de Leon Ferreira de Carvalho
:
Hybrid classification algorithms based on boosting and support vector machines. 1469-1491 - Ralf Östermark:
Scalability of the genetic hybrid algorithm on a parallel supercomputer. 1492-1507 - Damijan Prosenak, Matjaz Mulej, Boris Snoj:
A requisitely holistic approach to marketing in terms of social well-being. 1508-1529 - Olusegun Folorunso, Shawn Oluwafemi Ogunseye:
Challenges in the adoption of visualization system: a survey. 1530-1541 - Davorin Kralj:
Dialectal system approach supporting environmental innovation for sustainable development. 1542-1560 - Rafael R. Torrealba, Gerardo Fernández-López
, Juan C. Grieco:
Towards the development of knee prostheses: review of current researches. 1561-1576

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.