callback( { "result":{ "query":":facetid:stream:\"streams/journals/ijaip\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"251.09" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"668", "@dc":"668", "@oc":"668", "@id":"43351760", "text":":facetid:stream:streams/journals/ijaip" } }, "hits":{ "@total":"668", "@computed":"668", "@sent":"668", "@first":"0", "hit":[{ "@score":"1", "@id":"13870", "info":{"authors":{"author":[{"@pid":"278/3744","text":"N. Lakshmipathi Anantha"},{"@pid":"157/3062","text":"Bhanu Prakash Battula"}]},"title":"An exploratory data analysis on rating data using recommender system algorithms.","venue":"Int. J. Adv. Intell. Paradigms","volume":"27","number":"1","pages":"43-60","year":"2024","type":"Journal Articles","access":"closed","key":"journals/ijaip/AnanthaB24","doi":"10.1504/IJAIP.2024.136787","ee":"https://doi.org/10.1504/IJAIP.2024.136787","url":"https://dblp.org/rec/journals/ijaip/AnanthaB24"}, "url":"URL#13870" }, { "@score":"1", "@id":"13871", "info":{"authors":{"author":[{"@pid":"264/4520","text":"J. Anudeep"},{"@pid":"264/4458","text":"G. Kowshik"},{"@pid":"265/4891","text":"G. I. Aswath"},{"@pid":"198/4011","text":"Shriram K. Vasudevan"}]},"title":"An IoT-based accident severity detection for automobiles with alerting the appropriate location of the accident - an innovative attempt.","venue":"Int. J. Adv. Intell. Paradigms","volume":"27","number":"1","pages":"29-42","year":"2024","type":"Journal Articles","access":"closed","key":"journals/ijaip/AnudeepKAV24","doi":"10.1504/IJAIP.2024.136786","ee":"https://doi.org/10.1504/IJAIP.2024.136786","url":"https://dblp.org/rec/journals/ijaip/AnudeepKAV24"}, "url":"URL#13871" }, { "@score":"1", "@id":"13872", "info":{"authors":{"author":[{"@pid":"370/3009","text":"S. Nagendra Babu"},{"@pid":"370/3114","text":"J. Jebamalar Tamilselvi"}]},"title":"Map Reduce approach for road accident data analysis using data mining techniques.","venue":"Int. J. Adv. Intell. Paradigms","volume":"27","number":"1","pages":"1-17","year":"2024","type":"Journal Articles","access":"closed","key":"journals/ijaip/BabuT24","doi":"10.1504/IJAIP.2024.136784","ee":"https://doi.org/10.1504/IJAIP.2024.136784","url":"https://dblp.org/rec/journals/ijaip/BabuT24"}, "url":"URL#13872" }, { "@score":"1", "@id":"13873", "info":{"authors":{"author":[{"@pid":"333/5709","text":"Ajay Kumar Dubey"},{"@pid":"59/9018","text":"Vimal Mishra"}]},"title":"Analysis of performance and trust in load balancing algorithm in cloud computing environment.","venue":"Int. J. Adv. Intell. Paradigms","volume":"27","number":"2","pages":"91-103","year":"2024","type":"Journal Articles","access":"closed","key":"journals/ijaip/DubeyM24","doi":"10.1504/IJAIP.2024.137185","ee":"https://doi.org/10.1504/IJAIP.2024.137185","url":"https://dblp.org/rec/journals/ijaip/DubeyM24"}, "url":"URL#13873" }, { "@score":"1", "@id":"13874", "info":{"authors":{"author":[{"@pid":"370/2409","text":"Ahmed S. Elmotelb"},{"@pid":"291/2148","text":"Bahaa T. Shabana"},{"@pid":"10/7097","text":"Ibrahim M. El-Henawy"}]},"title":"Integration of GIS&WSN for an intelligent traffic signal.","venue":"Int. J. Adv. Intell. Paradigms","volume":"27","number":"2","pages":"104-128","year":"2024","type":"Journal Articles","access":"closed","key":"journals/ijaip/ElmotelbSE24","doi":"10.1504/IJAIP.2024.137186","ee":"https://doi.org/10.1504/IJAIP.2024.137186","url":"https://dblp.org/rec/journals/ijaip/ElmotelbSE24"}, "url":"URL#13874" }, { "@score":"1", "@id":"13875", "info":{"authors":{"author":[{"@pid":"117/3459","text":"Shikha Gupta"},{"@pid":"30/9561","text":"Satbir Jain"},{"@pid":"38/4522","text":"Mohit Agarwal"},{"@pid":"228/5039","text":"Nalin Nanda"}]},"title":"An encryption approach to improve the security and performance of data by integrating AES with a modified OTP technique.","venue":"Int. J. Adv. Intell. Paradigms","volume":"27","number":"2","pages":"129-149","year":"2024","type":"Journal Articles","access":"closed","key":"journals/ijaip/GuptaJAN24","doi":"10.1504/IJAIP.2024.137187","ee":"https://doi.org/10.1504/IJAIP.2024.137187","url":"https://dblp.org/rec/journals/ijaip/GuptaJAN24"}, "url":"URL#13875" }, { "@score":"1", "@id":"13876", "info":{"authors":{"author":[{"@pid":"370/2752","text":"C. G. Naveen Kumar"},{"@pid":"60/7866","text":"C. Chandrasekar"}]},"title":"Advanced cryptography technique in certificateless environment using SDBAES.","venue":"Int. J. Adv. Intell. Paradigms","volume":"27","number":"1","pages":"61-71","year":"2024","type":"Journal Articles","access":"closed","key":"journals/ijaip/KumarC24","doi":"10.1504/IJAIP.2024.136788","ee":"https://doi.org/10.1504/IJAIP.2024.136788","url":"https://dblp.org/rec/journals/ijaip/KumarC24"}, "url":"URL#13876" }, { "@score":"1", "@id":"13877", "info":{"authors":{"author":[{"@pid":"09/6036","text":"Abolfazl Lakdashti"},{"@pid":"140/7654","text":"Hossein Rashmanlou"},{"@pid":"205/1748","text":"P. K. Kishore Kumar"},{"@pid":"183/5969","text":"Ganesh Ghorai"},{"@pid":"44/1276","text":"Madhumangal Pal"}]},"title":"Some results on edge irregular product vague graphs.","venue":"Int. J. Adv. Intell. Paradigms","volume":"27","number":"1","pages":"18-28","year":"2024","type":"Journal Articles","access":"closed","key":"journals/ijaip/LakdashtiRKGP24","doi":"10.1504/IJAIP.2024.136785","ee":"https://doi.org/10.1504/IJAIP.2024.136785","url":"https://dblp.org/rec/journals/ijaip/LakdashtiRKGP24"}, "url":"URL#13877" }, { "@score":"1", "@id":"13878", "info":{"authors":{"author":[{"@pid":"130/3588","text":"I. Praveen"},{"@pid":"300/9989","text":"S. S. Aravind Vishnu"},{"@pid":"130/3632","text":"M. Sethumadhavan 0001"}]},"title":"An efficient composable 1-out-of-2 oblivious transfer scheme using vector decomposition.","venue":"Int. J. Adv. Intell. Paradigms","volume":"27","number":"2","pages":"178-194","year":"2024","type":"Journal Articles","access":"closed","key":"journals/ijaip/PraveenVS24","doi":"10.1504/IJAIP.2024.137190","ee":"https://doi.org/10.1504/IJAIP.2024.137190","url":"https://dblp.org/rec/journals/ijaip/PraveenVS24"}, "url":"URL#13878" }, { "@score":"1", "@id":"13879", "info":{"authors":{"author":[{"@pid":"216/0827","text":"Sowmya Lakshmi B. S"},{"@pid":"216/1450","text":"Shambhavi B. R"}]},"title":"State-of-the-art automatic machine transliteration systems for Indic scripts: a comparative report.","venue":"Int. J. Adv. Intell. Paradigms","volume":"27","number":"2","pages":"150-177","year":"2024","type":"Journal Articles","access":"closed","key":"journals/ijaip/SR24","doi":"10.1504/IJAIP.2024.137188","ee":"https://doi.org/10.1504/IJAIP.2024.137188","url":"https://dblp.org/rec/journals/ijaip/SR24"}, "url":"URL#13879" }, { "@score":"1", "@id":"13880", "info":{"authors":{"author":[{"@pid":"368/7345","text":"Sivakannan Subramani"},{"@pid":"14/11463","text":"G. Thirugnanam"},{"@pid":"251/8899","text":"N. Prabakaran"},{"@pid":"370/2860","text":"J. Bennilo Fernandes"}]},"title":"Robust medical image watermarking technique using integer wavelet transform and shearlet transform with BSVD.","venue":"Int. J. Adv. Intell. Paradigms","volume":"27","number":"1","pages":"72-81","year":"2024","type":"Journal Articles","access":"closed","key":"journals/ijaip/SubramaniTPF24","doi":"10.1504/IJAIP.2024.136789","ee":"https://doi.org/10.1504/IJAIP.2024.136789","url":"https://dblp.org/rec/journals/ijaip/SubramaniTPF24"}, "url":"URL#13880" }, { "@score":"1", "@id":"13881", "info":{"authors":{"author":[{"@pid":"370/2741","text":"Anand Kumar Yadav"},{"@pid":"120/0847","text":"Anil Kumar Malviya"}]},"title":"Regression test case prioritisation using genetic algorithm.","venue":"Int. J. Adv. Intell. Paradigms","volume":"27","number":"1","pages":"82-90","year":"2024","type":"Journal Articles","access":"closed","key":"journals/ijaip/YadavM24","doi":"10.1504/IJAIP.2024.136790","ee":"https://doi.org/10.1504/IJAIP.2024.136790","url":"https://dblp.org/rec/journals/ijaip/YadavM24"}, "url":"URL#13881" }, { "@score":"1", "@id":"148226", "info":{"authors":{"author":{"@pid":"179/3543","text":"Viacheslav Abrosimov"}},"title":"An ant colony algorithm of recurrent target assignment for a group of control objects.","venue":"Int. J. Adv. Intell. Paradigms","volume":"25","number":"3/4","pages":"312-323","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijaip/Abrosimov23","doi":"10.1504/IJAIP.2023.132379","ee":"https://doi.org/10.1504/IJAIP.2023.132379","url":"https://dblp.org/rec/journals/ijaip/Abrosimov23"}, "url":"URL#148226" }, { "@score":"1", "@id":"148227", "info":{"authors":{"author":[{"@pid":"182/8784","text":"Shruti Aggarwal"},{"@pid":"60/3358","text":"Paramvir Singh"}]},"title":"Software fault prediction using hybrid swarm intelligent cuckoo and bat-based k-means++ clustering technique.","venue":"Int. J. Adv. Intell. Paradigms","volume":"25","number":"3/4","pages":"341-359","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijaip/AggarwalS23","doi":"10.1504/IJAIP.2023.132373","ee":"https://doi.org/10.1504/IJAIP.2023.132373","url":"https://dblp.org/rec/journals/ijaip/AggarwalS23"}, "url":"URL#148227" }, { "@score":"1", "@id":"148228", "info":{"authors":{"author":[{"@pid":"338/4654","text":"N. S. Anil"},{"@pid":"125/1604","text":"D. N. Chandrappa"}]},"title":"Satellite image matching and registration using affine transformation and hybrid feature descriptors.","venue":"Int. J. Adv. Intell. Paradigms","volume":"24","number":"1/2","pages":"126-144","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijaip/AnilC23","doi":"10.1504/IJAIP.2021.10035732","ee":"https://doi.org/10.1504/IJAIP.2021.10035732","url":"https://dblp.org/rec/journals/ijaip/AnilC23"}, "url":"URL#148228" }, { "@score":"1", "@id":"148229", "info":{"authors":{"author":[{"@pid":"168/3231","text":"A. Baskar"},{"@pid":"38/9572","text":"T. Gireesh Kumar"}]},"title":"Automatic face enhancement technique using sigmoid normalisation based on single scale Retinex algorithm.","venue":"Int. J. Adv. Intell. Paradigms","volume":"26","number":"1","pages":"1-13","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijaip/BaskarK23","doi":"10.1504/IJAIP.2023.133252","ee":"https://doi.org/10.1504/IJAIP.2023.133252","url":"https://dblp.org/rec/journals/ijaip/BaskarK23"}, "url":"URL#148229" }, { "@score":"1", "@id":"148230", "info":{"authors":{"author":[{"@pid":"338/4539","text":"Uma Bhardwaj"},{"@pid":"18/7797","text":"Priti Sharma"}]},"title":"Email spam detection using bagging and boosting of machine learning classifiers.","venue":"Int. J. Adv. Intell. Paradigms","volume":"24","number":"1/2","pages":"229-253","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijaip/BhardwajS23","doi":"10.1504/IJAIP.2023.10052961","ee":"https://doi.org/10.1504/IJAIP.2023.10052961","url":"https://dblp.org/rec/journals/ijaip/BhardwajS23"}, "url":"URL#148230" }, { "@score":"1", "@id":"148231", "info":{"authors":{"author":{"@pid":"236/3948","text":"Thulasi Bikku"}},"title":"Fuzzy associated trust-based data security in cloud computing by mining user behaviour.","venue":"Int. J. Adv. Intell. Paradigms","volume":"25","number":"3/4","pages":"382-397","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijaip/Bikku23","doi":"10.1504/IJAIP.2023.132377","ee":"https://doi.org/10.1504/IJAIP.2023.132377","url":"https://dblp.org/rec/journals/ijaip/Bikku23"}, "url":"URL#148231" }, { "@score":"1", "@id":"148232", "info":{"authors":{"author":[{"@pid":"146/8479","text":"Tomás Buriánek"},{"@pid":"00/9798","text":"Sebastián Basterrech"}]},"title":"Improving the flexible neural tree model with swarm intelligence.","venue":"Int. J. Adv. Intell. Paradigms","volume":"25","number":"3/4","pages":"360-373","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijaip/BurianekB23","doi":"10.1504/IJAIP.2023.132376","ee":"https://doi.org/10.1504/IJAIP.2023.132376","url":"https://dblp.org/rec/journals/ijaip/BurianekB23"}, "url":"URL#148232" }, { "@score":"1", "@id":"148233", "info":{"authors":{"author":[{"@pid":"83/7480","text":"M. Dakshayini"},{"@pid":"252/0084","text":"P. M. Rekha"}]},"title":"Effective resource monitoring and management system for cloud environment.","venue":"Int. J. Adv. Intell. Paradigms","volume":"26","number":"3/4","pages":"231-244","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijaip/DakshayiniR23","doi":"10.1504/IJAIP.2023.135861","ee":"https://doi.org/10.1504/IJAIP.2023.135861","url":"https://dblp.org/rec/journals/ijaip/DakshayiniR23"}, "url":"URL#148233" }, { "@score":"1", "@id":"148234", "info":{"authors":{"author":[{"@pid":"271/0452","text":"Sanchali Das"},{"@pid":"199/3394-1","text":"Prakash Mohan 0001"},{"@pid":"365/2456","text":"Saroj K. Rajak"},{"@pid":"127/3488","text":"Swapan Debbarma"}]},"title":"Music mood taxonomy generation and classification of Christian Kokborok song: an audio-based approach.","venue":"Int. J. Adv. Intell. Paradigms","volume":"26","number":"2","pages":"197-209","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijaip/DasMRD23","doi":"10.1504/IJAIP.2023.135030","ee":"https://doi.org/10.1504/IJAIP.2023.135030","url":"https://dblp.org/rec/journals/ijaip/DasMRD23"}, "url":"URL#148234" }, { "@score":"1", "@id":"148235", "info":{"authors":{"author":[{"@pid":"348/1760","text":"Hayette Dendani"},{"@pid":"67/9796","text":"Ahmad Taher Azar"},{"@pid":"154/2259","text":"Amar Omeiri"},{"@pid":"333/4124","text":"Mohamed Adjabi"},{"@pid":"152/9609","text":"Sihem Ghoudelbourk"},{"@pid":"164/2751","text":"Djalel Dib"},{"@pid":"18/11042","text":"Nadjette Dendani"}]},"title":"Shunt active power filter with a three-phase neutral-point-clamped inverter for power quality improvement based on fractional order proportional integral control.","venue":"Int. J. Adv. Intell. Paradigms","volume":"25","number":"1/2","pages":"141-162","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijaip/DendaniAOAGDD23","doi":"10.1504/IJAIP.2018.10038185","ee":"https://doi.org/10.1504/IJAIP.2018.10038185","url":"https://dblp.org/rec/journals/ijaip/DendaniAOAGDD23"}, "url":"URL#148235" }, { "@score":"1", "@id":"148236", "info":{"authors":{"author":[{"@pid":"24/7703-2","text":"Arindam Dey 0002"},{"@pid":"36/11230","text":"Anita Pal"}]},"title":"Types of uncertain nodes in a fuzzy graph.","venue":"Int. J. Adv. Intell. Paradigms","volume":"24","number":"3/4","pages":"332-340","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijaip/DeyP23","doi":"10.1504/IJAIP.2023.10054359","ee":"https://doi.org/10.1504/IJAIP.2023.10054359","url":"https://dblp.org/rec/journals/ijaip/DeyP23"}, "url":"URL#148236" }, { "@score":"1", "@id":"148237", "info":{"authors":{"author":[{"@pid":"226/9201","text":"Chandrasekaran Ranichandra Dharmaraj"},{"@pid":"92/3463","text":"B. K. Tripathy 0001"}]},"title":"Optimisation of SPARQL queries over the RDF data in the cloud environment.","venue":"Int. J. Adv. Intell. Paradigms","volume":"24","number":"3/4","pages":"428-441","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijaip/DharmarajT23","doi":"10.1504/IJAIP.2023.10054363","ee":"https://doi.org/10.1504/IJAIP.2023.10054363","url":"https://dblp.org/rec/journals/ijaip/DharmarajT23"}, "url":"URL#148237" }, { "@score":"1", "@id":"148238", "info":{"authors":{"author":[{"@pid":"202/6437","text":"S. Dinakaran"},{"@pid":"175/0649","text":"P. Ranjit Jeba Thangaiah"}]},"title":"Effective hybrid feature subset selection for multilevel datasets using decision tree classifiers.","venue":"Int. J. Adv. Intell. Paradigms","volume":"24","number":"1/2","pages":"206-228","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijaip/DinakaranT23","doi":"10.1504/IJAIP.2023.10052959","ee":"https://doi.org/10.1504/IJAIP.2023.10052959","url":"https://dblp.org/rec/journals/ijaip/DinakaranT23"}, "url":"URL#148238" }, { "@score":"1", "@id":"148239", "info":{"authors":{"author":[{"@pid":"312/8510","text":"R. Durga"},{"@pid":"343/5009","text":"Periyasamy Sudhakar"}]},"title":"Implementing RSA algorithm for network security using dual prime secure protocol in crypt analysis.","venue":"Int. J. Adv. Intell. Paradigms","volume":"24","number":"3/4","pages":"355-368","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijaip/DurgaS23","doi":"10.1504/IJAIP.2018.10020057","ee":"https://doi.org/10.1504/IJAIP.2018.10020057","url":"https://dblp.org/rec/journals/ijaip/DurgaS23"}, "url":"URL#148239" }, { "@score":"1", "@id":"148240", "info":{"authors":{"author":[{"@pid":"04/9653","text":"Mohammed A. El-Shorbagy"},{"@pid":"h/AboulEllaHassanien","text":"Aboul Ella Hassanien"},{"@pid":"67/9796","text":"Ahmad Taher Azar"}]},"title":"Circular local search for unconstrained optimisation problems.","venue":"Int. J. Adv. Intell. Paradigms","volume":"25","number":"1/2","pages":"200-218","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijaip/ElShorbagyHA23","doi":"10.1504/IJAIP.2018.10038186","ee":"https://doi.org/10.1504/IJAIP.2018.10038186","url":"https://dblp.org/rec/journals/ijaip/ElShorbagyHA23"}, "url":"URL#148240" }, { "@score":"1", "@id":"148241", "info":{"authors":{"author":{"@pid":"244/3160","text":"Khaled M. Fouad"}},"title":"A hybrid approach of missing data imputation for upper gastrointestinal diagnosis.","venue":"Int. J. Adv. Intell. Paradigms","volume":"24","number":"3/4","pages":"255-294","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijaip/Fouad23","doi":"10.1504/IJAIP.2023.10054358","ee":"https://doi.org/10.1504/IJAIP.2023.10054358","url":"https://dblp.org/rec/journals/ijaip/Fouad23"}, "url":"URL#148241" }, { "@score":"1", "@id":"148242", "info":{"authors":{"author":[{"@pid":"188/1336","text":"H. Abdul Gaffar"},{"@pid":"212/4770","text":"Parimala Venkata Krishna"}]},"title":"Cooperative retransmission-based MAC method for underwater sensor networks.","venue":"Int. J. Adv. Intell. Paradigms","volume":"26","number":"3/4","pages":"323-335","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijaip/GaffarK23","doi":"10.1504/IJAIP.2023.135855","ee":"https://doi.org/10.1504/IJAIP.2023.135855","url":"https://dblp.org/rec/journals/ijaip/GaffarK23"}, "url":"URL#148242" }, { "@score":"1", "@id":"148243", "info":{"authors":{"author":[{"@pid":"183/5969","text":"Ganesh Ghorai"},{"@pid":"193/8597","text":"Sankar Sahoo"},{"@pid":"44/1276","text":"Madhumangal Pal"}]},"title":"Certain graph parameters in bipolar fuzzy environment.","venue":"Int. J. Adv. Intell. Paradigms","volume":"25","number":"3/4","pages":"234-247","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijaip/GhoraiSP23","doi":"10.1504/IJAIP.2023.132370","ee":"https://doi.org/10.1504/IJAIP.2023.132370","url":"https://dblp.org/rec/journals/ijaip/GhoraiSP23"}, "url":"URL#148243" }, { "@score":"1", "@id":"148244", "info":{"authors":{"author":[{"@pid":"365/1999","text":"R. Giridhararajan"},{"@pid":"198/4011","text":"Shriram K. Vasudevan"},{"@pid":"250/3111","text":"Ikram Shah"},{"@pid":"73/1600","text":"S. Karthikeyan"},{"@pid":"198/3979","text":"S. N. Abhishek"}]},"title":"A system to prevent toiletry (lavatory)-based diseases such as norovirus, staphylococcus, escherichia and streptococcus through IoT and embedded systems.","venue":"Int. J. Adv. Intell. Paradigms","volume":"26","number":"2","pages":"158-170","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijaip/GiridhararajanVSKA23","doi":"10.1504/IJAIP.2023.135027","ee":"https://doi.org/10.1504/IJAIP.2023.135027","url":"https://dblp.org/rec/journals/ijaip/GiridhararajanVSKA23"}, "url":"URL#148244" }, { "@score":"1", "@id":"148245", "info":{"authors":{"author":[{"@pid":"286/7253","text":"Veerapu Goutham"},{"@pid":"96/7494","text":"V. P. Harigovindan"}]},"title":"Energy efficient hybrid ARQ scheme for cooperative communication in underwater acoustic sensor networks.","venue":"Int. J. Adv. Intell. Paradigms","volume":"26","number":"3/4","pages":"211-230","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijaip/GouthamH23","doi":"10.1504/IJAIP.2023.135860","ee":"https://doi.org/10.1504/IJAIP.2023.135860","url":"https://dblp.org/rec/journals/ijaip/GouthamH23"}, "url":"URL#148245" }, { "@score":"1", "@id":"148246", "info":{"authors":{"author":[{"@pid":"67/2583","text":"Amit Gupta"},{"@pid":"98/8773","text":"Bipin Kumar Tripathi"},{"@pid":"88/3620","text":"Vivek Srivastava"}]},"title":"Exploring real domain problems on the second generation neural network.","venue":"Int. J. Adv. Intell. Paradigms","volume":"26","number":"2","pages":"143-157","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijaip/GuptaTS23","doi":"10.1504/IJAIP.2023.135028","ee":"https://doi.org/10.1504/IJAIP.2023.135028","url":"https://dblp.org/rec/journals/ijaip/GuptaTS23"}, "url":"URL#148246" }, { "@score":"1", "@id":"148247", "info":{"authors":{"author":[{"@pid":"177/3798","text":"R. Jahir Hussain"},{"@pid":"311/5616","text":"S. Satham Hussain"},{"@pid":"193/8597","text":"Sankar Sahoo"},{"@pid":"44/1276","text":"Madhumangal Pal"}]},"title":"Domination number of complete restrained fuzzy graphs.","venue":"Int. J. Adv. Intell. Paradigms","volume":"24","number":"1/2","pages":"38-48","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijaip/HussainHSP23","doi":"10.1504/IJAIP.2023.10052951","ee":"https://doi.org/10.1504/IJAIP.2023.10052951","url":"https://dblp.org/rec/journals/ijaip/HussainHSP23"}, "url":"URL#148247" }, { "@score":"1", "@id":"148248", "info":{"authors":{"author":[{"@pid":"177/3798","text":"R. Jahir Hussain"},{"@pid":"311/5616","text":"S. Satham Hussain"},{"@pid":"193/8597","text":"Sankar Sahoo"},{"@pid":"44/1276","text":"Madhumangal Pal"}]},"title":"Domination in hesitancy fuzzy graphs.","venue":"Int. J. Adv. Intell. Paradigms","volume":"25","number":"1/2","pages":"11-23","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijaip/HussainHSP23a","doi":"10.1504/IJAIP.2023.10055849","ee":"https://doi.org/10.1504/IJAIP.2023.10055849","url":"https://dblp.org/rec/journals/ijaip/HussainHSP23a"}, "url":"URL#148248" }, { "@score":"1", "@id":"148249", "info":{"authors":{"author":[{"@pid":"283/6562","text":"K. Immanuvel Arokia James"},{"@pid":"21/7412","text":"R. Prabakaran"},{"@pid":"237/8033","text":"R. Kanimozhi"}]},"title":"A review on various energy sources and harvesting techniques in WSN.","venue":"Int. J. Adv. Intell. Paradigms","volume":"26","number":"2","pages":"171-196","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijaip/JamesPK23","doi":"10.1504/IJAIP.2023.135029","ee":"https://doi.org/10.1504/IJAIP.2023.135029","url":"https://dblp.org/rec/journals/ijaip/JamesPK23"}, "url":"URL#148249" }, { "@score":"1", "@id":"148250", "info":{"authors":{"author":[{"@pid":"243/3720","text":"Aditya Jayasimha"},{"@pid":"305/2121","text":"Rahul Mudambi"},{"@pid":"129/1260","text":"S. Sowmya Kamath"}]},"title":"Nature-inspired query optimisation models for medical information retrieval with relevance feedback.","venue":"Int. J. Adv. Intell. Paradigms","volume":"26","number":"1","pages":"43-59","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijaip/JayasimhaMK23","doi":"10.1504/IJAIP.2023.133255","ee":"https://doi.org/10.1504/IJAIP.2023.133255","url":"https://dblp.org/rec/journals/ijaip/JayasimhaMK23"}, "url":"URL#148250" }, { "@score":"1", "@id":"148251", "info":{"authors":{"author":[{"@pid":"181/0352","text":"U. Kanimozhi"},{"@pid":"47/949","text":"D. Manjula"}]},"title":"A kernel-based SVM for semantic relations extraction from biomedical literature.","venue":"Int. J. Adv. Intell. Paradigms","volume":"24","number":"3/4","pages":"341-354","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijaip/KanimozhiM23","doi":"10.1504/IJAIP.2023.10054360","ee":"https://doi.org/10.1504/IJAIP.2023.10054360","url":"https://dblp.org/rec/journals/ijaip/KanimozhiM23"}, "url":"URL#148251" }, { "@score":"1", "@id":"148252", "info":{"authors":{"author":[{"@pid":"343/4756","text":"Gursleen Kaur"},{"@pid":"142/1548","text":"Mala Kalra"}]},"title":"Cost effective hybrid genetic algorithm for scheduling scientific workflows in cloud under deadline constraint.","venue":"Int. J. Adv. Intell. Paradigms","volume":"24","number":"3/4","pages":"380-402","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijaip/KaurK23","doi":"10.1504/IJAIP.2018.10023063","ee":"https://doi.org/10.1504/IJAIP.2018.10023063","url":"https://dblp.org/rec/journals/ijaip/KaurK23"}, "url":"URL#148252" }, { "@score":"1", "@id":"148253", "info":{"authors":{"author":[{"@pid":"343/5966","text":"R. G. Kavitha"},{"@pid":"82/11294","text":"N. Jayalakshmi"}]},"title":"The report of questionnaire survey on privacy in social networking websites.","venue":"Int. J. Adv. Intell. Paradigms","volume":"24","number":"3/4","pages":"456-470","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijaip/KavithaJ23","doi":"10.1504/IJAIP.2023.10054364","ee":"https://doi.org/10.1504/IJAIP.2023.10054364","url":"https://dblp.org/rec/journals/ijaip/KavithaJ23"}, "url":"URL#148253" }, { "@score":"1", "@id":"148254", "info":{"authors":{"author":[{"@pid":"338/5095","text":"S. Vishwa Kiran"},{"@pid":"39/3768","text":"S. Raghuram"},{"@pid":"143/7462","text":"J. Thriveni"},{"@pid":"77/84","text":"K. R. Venugopal 0001"}]},"title":"Reduction of jitter in 3D video by transmitting over multiple network paths.","venue":"Int. J. Adv. Intell. Paradigms","volume":"24","number":"1/2","pages":"110-125","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijaip/KiranRTV23","doi":"10.1504/IJAIP.2023.10052955","ee":"https://doi.org/10.1504/IJAIP.2023.10052955","url":"https://dblp.org/rec/journals/ijaip/KiranRTV23"}, "url":"URL#148254" }, { "@score":"1", "@id":"148255", "info":{"authors":{"author":[{"@pid":"338/4167","text":"S. Kokila"},{"@pid":"52/2284","text":"G. Sivaradje"}]},"title":"Dynamic service oriented resource allocation system for interworking broadband networks.","venue":"Int. J. Adv. Intell. Paradigms","volume":"24","number":"1/2","pages":"70-91","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijaip/KokilaS23","doi":"10.1504/IJAIP.2023.10052953","ee":"https://doi.org/10.1504/IJAIP.2023.10052953","url":"https://dblp.org/rec/journals/ijaip/KokilaS23"}, "url":"URL#148255" }, { "@score":"1", "@id":"148256", "info":{"authors":{"author":[{"@pid":"258/4513","text":"K. Krishnakumari"},{"@pid":"89/9605","text":"E. Sivasankar"}]},"title":"Aspect-based summarisation in the big data environment.","venue":"Int. J. Adv. Intell. Paradigms","volume":"25","number":"1/2","pages":"68-83","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijaip/KrishnakumariS23","doi":"10.1504/IJAIP.2018.10023308","ee":"https://doi.org/10.1504/IJAIP.2018.10023308","url":"https://dblp.org/rec/journals/ijaip/KrishnakumariS23"}, "url":"URL#148256" }, { "@score":"1", "@id":"148257", "info":{"authors":{"author":[{"@pid":"257/0256","text":"Subbiahpillai Neelakantapillai Kumar"},{"@pid":"210/6780","text":"A. Lenin Fred"},{"@pid":"258/1070","text":"H. Ajay Kumar"},{"@pid":"228/8772","text":"P. Sebastin Varghese"}]},"title":"Nonlinear tensor diffusion filter for the denoising of CT/MR images.","venue":"Int. J. Adv. Intell. Paradigms","volume":"24","number":"1/2","pages":"156-172","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijaip/KumarFKV23","doi":"10.1504/IJAIP.2023.10051019","ee":"https://doi.org/10.1504/IJAIP.2023.10051019","url":"https://dblp.org/rec/journals/ijaip/KumarFKV23"}, "url":"URL#148257" }, { "@score":"1", "@id":"148258", "info":{"authors":{"author":[{"@pid":"264/4413","text":"P. S. Jagadeesh Kumar"},{"@pid":"348/1711","text":"Tracy Lin Huan"}]},"title":"Adapted bucolic and farming region pattern classification using artificial neural networks for remote sensing images.","venue":"Int. J. Adv. Intell. Paradigms","volume":"25","number":"1/2","pages":"163-184","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijaip/KumarH23","doi":"10.1504/IJAIP.2023.10055854","ee":"https://doi.org/10.1504/IJAIP.2023.10055854","url":"https://dblp.org/rec/journals/ijaip/KumarH23"}, "url":"URL#148258" }, { "@score":"1", "@id":"148259", "info":{"authors":{"author":[{"@pid":"350/3451","text":"G. Senthil Kumar"},{"@pid":"11/8014","text":"C. Lakshmi"}]},"title":"QOE-based recommender system in the applications of e-learning resources.","venue":"Int. J. Adv. Intell. Paradigms","volume":"25","number":"3/4","pages":"398-409","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijaip/KumarL23","doi":"10.1504/IJAIP.2023.132381","ee":"https://doi.org/10.1504/IJAIP.2023.132381","url":"https://dblp.org/rec/journals/ijaip/KumarL23"}, "url":"URL#148259" }, { "@score":"1", "@id":"148260", "info":{"authors":{"author":[{"@pid":"205/1748","text":"P. K. Kishore Kumar"},{"@pid":"35/8661","text":"S. Lavanya"},{"@pid":"252/1348","text":"Ali Asghar Talebi"},{"@pid":"140/7654","text":"Hossein Rashmanlou"}]},"title":"New concepts of product vague graphs with applications.","venue":"Int. J. Adv. Intell. Paradigms","volume":"26","number":"2","pages":"105-123","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijaip/KumarLTR23","doi":"10.1504/IJAIP.2023.135025","ee":"https://doi.org/10.1504/IJAIP.2023.135025","url":"https://dblp.org/rec/journals/ijaip/KumarLTR23"}, "url":"URL#148260" }, { "@score":"1", "@id":"148261", "info":{"authors":{"author":[{"@pid":"205/1748","text":"P. K. Kishore Kumar"},{"@pid":"140/7654","text":"Hossein Rashmanlou"},{"@pid":"348/2171","text":"Siamak Firouzian"},{"@pid":"210/6763","text":"Mostafa Nouri Jouybari"}]},"title":"Some applications of vague sets.","venue":"Int. J. Adv. Intell. Paradigms","volume":"25","number":"1/2","pages":"1-10","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijaip/KumarRFJ23","doi":"10.1504/IJAIP.2023.10055848","ee":"https://doi.org/10.1504/IJAIP.2023.10055848","url":"https://dblp.org/rec/journals/ijaip/KumarRFJ23"}, "url":"URL#148261" }, { "@score":"1", "@id":"148262", "info":{"authors":{"author":[{"@pid":"46/2681","text":"Sushil Kumar"},{"@pid":"98/8773","text":"Bipin Kumar Tripathi"}]},"title":"On the learning machine in quaternionic domain and its application.","venue":"Int. J. Adv. Intell. Paradigms","volume":"25","number":"1/2","pages":"107-128","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijaip/KumarT23","doi":"10.1504/IJAIP.2018.10013702","ee":"https://doi.org/10.1504/IJAIP.2018.10013702","url":"https://dblp.org/rec/journals/ijaip/KumarT23"}, "url":"URL#148262" }, { "@score":"1", "@id":"148263", "info":{"authors":{"author":[{"@pid":"24/2900","text":"Yogesh Kumar"},{"@pid":"139/4666","text":"Shashi Kant Verma"},{"@pid":"11/2278","text":"Sandeep Sharma"}]},"title":"Facial expression recognition of multiple stylised characters using deep convolutional neural network.","venue":"Int. J. Adv. Intell. Paradigms","volume":"26","number":"3/4","pages":"362-391","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijaip/KumarVS23","doi":"10.1504/IJAIP.2023.135856","ee":"https://doi.org/10.1504/IJAIP.2023.135856","url":"https://dblp.org/rec/journals/ijaip/KumarVS23"}, "url":"URL#148263" }, { "@score":"1", "@id":"148264", "info":{"authors":{"author":[{"@pid":"343/4996","text":"Anusha M. Meti"},{"@pid":"243/9994","text":"Mallikarjun M. Kodabagi"}]},"title":"Optimal web page classification technique using artificial neural network.","venue":"Int. J. Adv. Intell. Paradigms","volume":"24","number":"3/4","pages":"471-491","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijaip/MetiK23","doi":"10.1504/IJAIP.2023.10054365","ee":"https://doi.org/10.1504/IJAIP.2023.10054365","url":"https://dblp.org/rec/journals/ijaip/MetiK23"}, "url":"URL#148264" }, { "@score":"1", "@id":"148265", "info":{"authors":{"author":[{"@pid":"244/0899","text":"Vivekananda G. N."},{"@pid":"96/10964","text":"P. Chenna Reddy"}]},"title":"Efficient video transmission technique using clustering and optimisation algorithms in MANETs.","venue":"Int. J. Adv. Intell. Paradigms","volume":"25","number":"3/4","pages":"248-263","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijaip/NR23","doi":"10.1504/IJAIP.2023.132371","ee":"https://doi.org/10.1504/IJAIP.2023.132371","url":"https://dblp.org/rec/journals/ijaip/NR23"}, "url":"URL#148265" }, { "@score":"1", "@id":"148266", "info":{"authors":{"author":[{"@pid":"223/9457","text":"Narayan Nahak"},{"@pid":"223/9365","text":"Ranjan Kumar Mallick"}]},"title":"Damping of oscillations in multi machine power system by PSO-GWO optimised dual UPFC-based controller.","venue":"Int. J. Adv. Intell. Paradigms","volume":"26","number":"3/4","pages":"304-322","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijaip/NahakM23","doi":"10.1504/IJAIP.2023.135858","ee":"https://doi.org/10.1504/IJAIP.2023.135858","url":"https://dblp.org/rec/journals/ijaip/NahakM23"}, "url":"URL#148266" }, { "@score":"1", "@id":"148267", "info":{"authors":{"author":[{"@pid":"322/3351","text":"M. S. Narassima"},{"@pid":"198/4011","text":"Shriram K. Vasudevan"}]},"title":"A novel statistical approach to an event management - a study and analysis of a Techfest with suggestions for improvements.","venue":"Int. J. Adv. Intell. Paradigms","volume":"24","number":"1/2","pages":"49-69","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijaip/NarassimaV23","doi":"10.1504/IJAIP.2023.10052952","ee":"https://doi.org/10.1504/IJAIP.2023.10052952","url":"https://dblp.org/rec/journals/ijaip/NarassimaV23"}, "url":"URL#148267" }, { "@score":"1", "@id":"148268", "info":{"authors":{"author":[{"@pid":"348/2125","text":"V. Lakshman Narayana"},{"@pid":"203/0513","text":"C. R. Bharathi"}]},"title":"Efficient route discovery method in MANETs and packet loss reduction mechanisms.","venue":"Int. J. Adv. Intell. Paradigms","volume":"25","number":"1/2","pages":"129-140","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijaip/NarayanaB23","doi":"10.1504/IJAIP.2023.10055853","ee":"https://doi.org/10.1504/IJAIP.2023.10055853","url":"https://dblp.org/rec/journals/ijaip/NarayanaB23"}, "url":"URL#148268" }, { "@score":"1", "@id":"148269", "info":{"authors":{"author":[{"@pid":"271/2278","text":"Monalisa Panda"},{"@pid":"01/4699","text":"Satchidananda Dehuri"},{"@pid":"63/8774","text":"Alok Kumar Jagadev"}]},"title":"Multi-objective artificial bee colony algorithm in redundancy allocation problem.","venue":"Int. J. Adv. Intell. Paradigms","volume":"25","number":"1/2","pages":"24-50","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijaip/PandaDJ23","doi":"10.1504/IJAIP.2023.10055850","ee":"https://doi.org/10.1504/IJAIP.2023.10055850","url":"https://dblp.org/rec/journals/ijaip/PandaDJ23"}, "url":"URL#148269" }, { "@score":"1", "@id":"148270", "info":{"authors":{"author":[{"@pid":"46/578","text":"Ashish Pandey"},{"@pid":"18/6368","text":"Shashank Shekhar"},{"@pid":"28/568-2","text":"Arnab Nandi 0002"},{"@pid":"14/11440","text":"Banani Basu"}]},"title":"On lifetime enhancement of wireless sensor network using particle swarm optimisation.","venue":"Int. J. Adv. Intell. Paradigms","volume":"25","number":"1/2","pages":"51-67","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijaip/PandeySNB23","doi":"10.1504/IJAIP.2023.10055852","ee":"https://doi.org/10.1504/IJAIP.2023.10055852","url":"https://dblp.org/rec/journals/ijaip/PandeySNB23"}, "url":"URL#148270" }, { "@score":"1", "@id":"148271", "info":{"authors":{"author":[{"@pid":"135/7773","text":"S. Pavithra"},{"@pid":"261/6719","text":"P. M. Anu"}]},"title":"An efficient data aggregation with optimal recharging in wireless rechargeable sensor networks.","venue":"Int. J. Adv. Intell. Paradigms","volume":"26","number":"1","pages":"96-104","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijaip/PavithraA23","doi":"10.1504/IJAIP.2023.133259","ee":"https://doi.org/10.1504/IJAIP.2023.133259","url":"https://dblp.org/rec/journals/ijaip/PavithraA23"}, "url":"URL#148271" }, { "@score":"1", "@id":"148272", "info":{"authors":{"author":[{"@pid":"319/4150","text":"E. Poornima"},{"@pid":"330/5871","text":"N. Kasiviswanath"},{"@pid":"341/2825","text":"C. Shoba Bindu"}]},"title":"ADaaS: a secure attribute-based group signature-based agri-cloud framework.","venue":"Int. J. Adv. Intell. Paradigms","volume":"25","number":"3/4","pages":"264-279","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijaip/PoornimaKB23","doi":"10.1504/IJAIP.2023.132380","ee":"https://doi.org/10.1504/IJAIP.2023.132380","url":"https://dblp.org/rec/journals/ijaip/PoornimaKB23"}, "url":"URL#148272" }, { "@score":"1", "@id":"148273", "info":{"authors":{"author":[{"@pid":"227/4043","text":"M. Priya"},{"@pid":"08/9047-2","text":"R. Kalpana 0002"}]},"title":"Genetic algorithm-based rule generation for approximate keyword search.","venue":"Int. J. Adv. Intell. Paradigms","volume":"25","number":"3/4","pages":"374-381","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijaip/PriyaK23","doi":"10.1504/IJAIP.2023.132375","ee":"https://doi.org/10.1504/IJAIP.2023.132375","url":"https://dblp.org/rec/journals/ijaip/PriyaK23"}, "url":"URL#148273" }, { "@score":"1", "@id":"148274", "info":{"authors":{"author":[{"@pid":"03/7687","text":"P. Raja"},{"@pid":"40/11140","text":"T. Deepa"},{"@pid":"152/7206","text":"V. Bharathi"}]},"title":"Prediction-based spatial correlation clustering algorithm for efficient data reduction in wireless sensor network.","venue":"Int. J. Adv. Intell. Paradigms","volume":"26","number":"3/4","pages":"245-257","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijaip/RajaDB23","doi":"10.1504/IJAIP.2023.135862","ee":"https://doi.org/10.1504/IJAIP.2023.135862","url":"https://dblp.org/rec/journals/ijaip/RajaDB23"}, "url":"URL#148274" }, { "@score":"1", "@id":"148275", "info":{"authors":{"author":[{"@pid":"368/7019","text":"Pushpi Rani"},{"@pid":"368/7319","text":"Dilip K. Shaw"},{"@pid":"153/2095","text":"Jayakrushna Sahoo"}]},"title":"A node combination approach with fuzziness in shortest path problem.","venue":"Int. J. Adv. Intell. Paradigms","volume":"26","number":"3/4","pages":"336-348","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijaip/RaniSS23","doi":"10.1504/IJAIP.2023.135854","ee":"https://doi.org/10.1504/IJAIP.2023.135854","url":"https://dblp.org/rec/journals/ijaip/RaniSS23"}, "url":"URL#148275" }, { "@score":"1", "@id":"148276", "info":{"authors":{"author":[{"@pid":"236/1834","text":"Garladinne Ravikanth"},{"@pid":"96/7800","text":"K. V. N. Sunitha"},{"@pid":"72/5927","text":"B. Eswara Reddy"}]},"title":"Multi-resolution image fusion with regularisation framework using enhanced Gabor preceding method.","venue":"Int. J. Adv. Intell. Paradigms","volume":"25","number":"3/4","pages":"297-311","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijaip/RavikanthSR23","doi":"10.1504/IJAIP.2023.132374","ee":"https://doi.org/10.1504/IJAIP.2023.132374","url":"https://dblp.org/rec/journals/ijaip/RavikanthSR23"}, "url":"URL#148276" }, { "@score":"1", "@id":"148277", "info":{"authors":{"author":[{"@pid":"313/9175","text":"Mojgan Rayenizadeh"},{"@pid":"78/8460","text":"Marjan Kuchaki Rafsanjani"}]},"title":"Node replication attacks in mobile wireless sensor networks.","venue":"Int. J. Adv. Intell. Paradigms","volume":"26","number":"3/4","pages":"349-361","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijaip/RayenizadehR23","doi":"10.1504/IJAIP.2023.135857","ee":"https://doi.org/10.1504/IJAIP.2023.135857","url":"https://dblp.org/rec/journals/ijaip/RayenizadehR23"}, "url":"URL#148277" }, { "@score":"1", "@id":"148278", "info":{"authors":{"author":[{"@pid":"332/7329","text":"H. Rekha"},{"@pid":"06/8575","text":"P. Samundiswary"}]},"title":"Image denoising using fast non-local means filter and multi-thresholding with harmony search algorithm for WSN.","venue":"Int. J. Adv. Intell. Paradigms","volume":"24","number":"1/2","pages":"92-109","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijaip/RekhaS23","doi":"10.1504/IJAIP.2023.10052954","ee":"https://doi.org/10.1504/IJAIP.2023.10052954","url":"https://dblp.org/rec/journals/ijaip/RekhaS23"}, "url":"URL#148278" }, { "@score":"1", "@id":"148279", "info":{"authors":{"author":[{"@pid":"150/0558","text":"Jayakumar Sadhasivam"},{"@pid":"293/8609","text":"Ramesh Babu Kalivaradhan"}]},"title":"A hybrid approach for deep belief networks and whale optimisation algorithm to perform sentiment analysis for MOOC courses.","venue":"Int. J. Adv. Intell. Paradigms","volume":"25","number":"3/4","pages":"280-296","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijaip/SadhasivamK23","doi":"10.1504/IJAIP.2023.132372","ee":"https://doi.org/10.1504/IJAIP.2023.132372","url":"https://dblp.org/rec/journals/ijaip/SadhasivamK23"}, "url":"URL#148279" }, { "@score":"1", "@id":"148280", "info":{"authors":{"author":[{"@pid":"270/3493","text":"Mridu Sahu"},{"@pid":"365/2490","text":"Saumya Vishwal"},{"@pid":"365/2448","text":"S. Usha Srivalli"},{"@pid":"270/3059","text":"Sneha Shukla"},{"@pid":"195/7549","text":"Sanjivani Shantaiya"}]},"title":"Feature extraction and analysis of overt and covert EEG signals with speller devices.","venue":"Int. J. Adv. Intell. Paradigms","volume":"26","number":"2","pages":"124-142","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijaip/SahuVSSS23","doi":"10.1504/IJAIP.2023.135026","ee":"https://doi.org/10.1504/IJAIP.2023.135026","url":"https://dblp.org/rec/journals/ijaip/SahuVSSS23"}, "url":"URL#148280" }, { "@score":"1", "@id":"148281", "info":{"authors":{"author":[{"@pid":"338/4153","text":"S. Sahunthala"},{"@pid":"338/3907","text":"A. Udhaya Kumar"},{"@pid":"121/3459","text":"Latha Parthiban"}]},"title":"Redundancy recognition in heavy weight structure with different parameters.","venue":"Int. J. Adv. Intell. Paradigms","volume":"24","number":"1/2","pages":"145-155","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijaip/SahunthalaKP23","doi":"10.1504/IJAIP.2021.10034220","ee":"https://doi.org/10.1504/IJAIP.2021.10034220","url":"https://dblp.org/rec/journals/ijaip/SahunthalaKP23"}, "url":"URL#148281" }, { "@score":"1", "@id":"148282", "info":{"authors":{"author":[{"@pid":"281/2658","text":"Tulasi Krishna Sajja"},{"@pid":"60/11532","text":"Hemantha Kumar Kalluri"}]},"title":"Face recognition using local binary pattern and Gabor-Kernel Fisher analysis.","venue":"Int. J. Adv. Intell. Paradigms","volume":"26","number":"1","pages":"28-42","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijaip/SajjaK23","doi":"10.1504/IJAIP.2023.133254","ee":"https://doi.org/10.1504/IJAIP.2023.133254","url":"https://dblp.org/rec/journals/ijaip/SajjaK23"}, "url":"URL#148282" }, { "@score":"1", "@id":"148283", "info":{"authors":{"author":[{"@pid":"78/5502","text":"Pijush Samui"},{"@pid":"343/5219","text":"Aditi Palsapure"},{"@pid":"121/2429","text":"Sanjiban Sekhar Roy"}]},"title":"Reliability analysis of shallow foundation based on settlement criteria.","venue":"Int. J. Adv. Intell. Paradigms","volume":"24","number":"3/4","pages":"369-379","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijaip/SamuiPR23","doi":"10.1504/IJAIP.2023.10054361","ee":"https://doi.org/10.1504/IJAIP.2023.10054361","url":"https://dblp.org/rec/journals/ijaip/SamuiPR23"}, "url":"URL#148283" }, { "@score":"1", "@id":"148284", "info":{"authors":{"author":[{"@pid":"233/8678","text":"Darothi Sarkar"},{"@pid":"79/7731","text":"Nitin Rakesh"},{"@pid":"15/5702","text":"Krishn Kumar Mishra"},{"@pid":"353/0764","text":"Anupama Mehra"}]},"title":"Density-aware replica server placement for utilisation enhancement.","venue":"Int. J. Adv. Intell. Paradigms","volume":"25","number":"3/4","pages":"219-233","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijaip/SarkarRMM23","doi":"10.1504/IJAIP.2023.132382","ee":"https://doi.org/10.1504/IJAIP.2023.132382","url":"https://dblp.org/rec/journals/ijaip/SarkarRMM23"}, "url":"URL#148284" }, { "@score":"1", "@id":"148285", "info":{"authors":{"author":[{"@pid":"250/3111","text":"Ikram Shah"},{"@pid":"250/2976","text":"Sriharsha Patallapalli"},{"@pid":"198/4011","text":"Shriram K. Vasudevan"}]},"title":"Smart and efficient IoT-based quality tracking system for perishables - pertaining to Indian conditions.","venue":"Int. J. Adv. Intell. Paradigms","volume":"26","number":"3/4","pages":"290-303","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijaip/ShahPV23","doi":"10.1504/IJAIP.2023.135853","ee":"https://doi.org/10.1504/IJAIP.2023.135853","url":"https://dblp.org/rec/journals/ijaip/ShahPV23"}, "url":"URL#148285" }, { "@score":"1", "@id":"148286", "info":{"authors":{"author":[{"@pid":"368/7264","text":"A. H. Shanthakumara"},{"@pid":"59/3555","text":"N. R. Sunitha"}]},"title":"A novel framework for insurable archival services: a protocol to create secured marketplace for archival services using cloud.","venue":"Int. J. Adv. Intell. Paradigms","volume":"26","number":"3/4","pages":"267-289","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijaip/ShanthakumaraS23","doi":"10.1504/IJAIP.2023.135863","ee":"https://doi.org/10.1504/IJAIP.2023.135863","url":"https://dblp.org/rec/journals/ijaip/ShanthakumaraS23"}, "url":"URL#148286" }, { "@score":"1", "@id":"148287", "info":{"authors":{"author":[{"@pid":"231/1593","text":"Kanta Prasad Sharma"},{"@pid":"205/5647","text":"Ramesh Chandra Poonia"},{"@pid":"231/1605","text":"Surendra Sunda"}]},"title":"A novel map matching algorithm for real-time location using low frequency floating trajectory data.","venue":"Int. J. Adv. Intell. Paradigms","volume":"24","number":"3/4","pages":"442-455","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijaip/SharmaPS23","doi":"10.1504/IJAIP.2018.10017590","ee":"https://doi.org/10.1504/IJAIP.2018.10017590","url":"https://dblp.org/rec/journals/ijaip/SharmaPS23"}, "url":"URL#148287" }, { "@score":"1", "@id":"148288", "info":{"authors":{"author":[{"@pid":"69/4385","text":"Ashutosh Sharma"},{"@pid":"231/0873","text":"Lokesh Tharani"}]},"title":"A novel ant colony optimisation approach for fretting out wormhole attack in mobile ad hoc networks.","venue":"Int. J. Adv. Intell. Paradigms","volume":"25","number":"3/4","pages":"324-340","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijaip/SharmaT23","doi":"10.1504/IJAIP.2023.132378","ee":"https://doi.org/10.1504/IJAIP.2023.132378","url":"https://dblp.org/rec/journals/ijaip/SharmaT23"}, "url":"URL#148288" }, { "@score":"1", "@id":"148289", "info":{"authors":{"author":[{"@pid":"62/5331","text":"Makram Soui"},{"@pid":"137/6840","text":"Soumaya Moussa"},{"@pid":"55/5915","text":"Christophe Kolski"},{"@pid":"28/6183","text":"Mourad Abed"}]},"title":"Evaluation method based on a tracing mechanism for adaptive user interfaces: application in intelligent transport systems.","venue":"Int. J. Adv. Intell. Paradigms","volume":"24","number":"3/4","pages":"295-331","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijaip/SouiMKA23","doi":"10.1504/IJAIP.2018.10019161","ee":"https://doi.org/10.1504/IJAIP.2018.10019161","url":"https://dblp.org/rec/journals/ijaip/SouiMKA23"}, "url":"URL#148289" }, { "@score":"1", "@id":"148290", "info":{"authors":{"author":[{"@pid":"338/3875","text":"Lingam Srikanth"},{"@pid":"338/3437","text":"Mathi Senthilkumar"}]},"title":"Investigation of binding update schemes in next generation internet protocol mobility.","venue":"Int. J. Adv. Intell. Paradigms","volume":"24","number":"1/2","pages":"190-205","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijaip/SrikanthS23","doi":"10.1504/IJAIP.2023.10052957","ee":"https://doi.org/10.1504/IJAIP.2023.10052957","url":"https://dblp.org/rec/journals/ijaip/SrikanthS23"}, "url":"URL#148290" }, { "@score":"1", "@id":"148291", "info":{"authors":{"author":[{"@pid":"353/7968","text":"P. Srivani"},{"@pid":"141/0875","text":"C. R. Yamuna Devi"},{"@pid":"125/3380","text":"S. H. Manjula"},{"@pid":"77/84","text":"K. R. Venugopal 0001"}]},"title":"Monitoring of environmental parameters using internet of things and analysis of correlation between the parameters in a DWC hydroponic technique.","venue":"Int. J. Adv. Intell. Paradigms","volume":"26","number":"1","pages":"60-72","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijaip/SrivaniDMV23","doi":"10.1504/IJAIP.2023.133256","ee":"https://doi.org/10.1504/IJAIP.2023.133256","url":"https://dblp.org/rec/journals/ijaip/SrivaniDMV23"}, "url":"URL#148291" }, { "@score":"1", "@id":"148292", "info":{"authors":{"author":[{"@pid":"368/7345","text":"Sivakannan Subramani"},{"@pid":"246/6505","text":"G. Keerthana"},{"@pid":"66/8634","text":"K. Gayathri"},{"@pid":"368/6919","text":"Jaishree Sundar"}]},"title":"Medical image watermarking technique using IWT-BSVD.","venue":"Int. J. Adv. Intell. Paradigms","volume":"26","number":"3/4","pages":"258-266","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijaip/SubramaniKGS23","doi":"10.1504/IJAIP.2023.135859","ee":"https://doi.org/10.1504/IJAIP.2023.135859","url":"https://dblp.org/rec/journals/ijaip/SubramaniKGS23"}, "url":"URL#148292" }, { "@score":"1", "@id":"148293", "info":{"authors":{"author":[{"@pid":"252/1348","text":"Ali Asghar Talebi"},{"@pid":"338/4350","text":"Samaneh Omidbakhsh Amiri"}]},"title":"Cayley bipolar fuzzy graphs associated with bipolar fuzzy groups.","venue":"Int. J. Adv. Intell. Paradigms","volume":"24","number":"1/2","pages":"1-11","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijaip/TalebiA23","doi":"10.1504/IJAIP.2023.10052949","ee":"https://doi.org/10.1504/IJAIP.2023.10052949","url":"https://dblp.org/rec/journals/ijaip/TalebiA23"}, "url":"URL#148293" }, { "@score":"1", "@id":"148294", "info":{"authors":{"author":[{"@pid":"357/7493","text":"Yegnanarayanan Venkataraman"},{"@pid":"308/7179","text":"Y. Gayathri Narayana"},{"@pid":"357/7510","text":"Veena Narayana"}]},"title":"On primes, semiprimes and their applications.","venue":"Int. J. Adv. Intell. Paradigms","volume":"26","number":"1","pages":"73-95","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijaip/VenkataramanNN23","doi":"10.1504/IJAIP.2023.133257","ee":"https://doi.org/10.1504/IJAIP.2023.133257","url":"https://dblp.org/rec/journals/ijaip/VenkataramanNN23"}, "url":"URL#148294" }, { "@score":"1", "@id":"148295", "info":{"authors":{"author":[{"@pid":"293/5512","text":"Akhilesh Verma"},{"@pid":"142/1388","text":"Vijay Kumar Gupta"},{"@pid":"139/7845","text":"Savita Goel"}]},"title":"Transient liveness factor an attempt towards identification of innate fingerprint under varying spoof sample.","venue":"Int. J. Adv. Intell. Paradigms","volume":"26","number":"1","pages":"14-27","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijaip/VermaGG23","doi":"10.1504/IJAIP.2023.133253","ee":"https://doi.org/10.1504/IJAIP.2023.133253","url":"https://dblp.org/rec/journals/ijaip/VermaGG23"}, "url":"URL#148295" }, { "@score":"1", "@id":"148296", "info":{"authors":{"author":[{"@pid":"21/11234","text":"Monika Verma"},{"@pid":"13/7861","text":"Vandana Dixit Kaushik"},{"@pid":"86/7630","text":"Vinay K. Pathak"}]},"title":"Categorisation of random images into fog and blur based on the statistical analysis.","venue":"Int. J. Adv. Intell. Paradigms","volume":"25","number":"1/2","pages":"84-106","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijaip/VermaKP23","doi":"10.1504/IJAIP.2023.10055851","ee":"https://doi.org/10.1504/IJAIP.2023.10055851","url":"https://dblp.org/rec/journals/ijaip/VermaKP23"}, "url":"URL#148296" }, { "@score":"1", "@id":"148297", "info":{"authors":{"author":[{"@pid":"232/6937","text":"Devi Vijayan"},{"@pid":"212/9929","text":"R. Lavanya"}]},"title":"Hybrid local descriptor for improved detection of masses in mammographic CAD systems.","venue":"Int. J. Adv. Intell. Paradigms","volume":"25","number":"1/2","pages":"185-199","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijaip/VijayanL23","doi":"10.1504/IJAIP.2020.10052472","ee":"https://doi.org/10.1504/IJAIP.2020.10052472","url":"https://dblp.org/rec/journals/ijaip/VijayanL23"}, "url":"URL#148297" }, { "@score":"1", "@id":"148298", "info":{"authors":{"author":[{"@pid":"251/3514","text":"Abid Hussain Wani"},{"@pid":"63/5710","text":"Rana Hashmy"}]},"title":"A supervised multinomial classification framework for emotion recognition in textual social data.","venue":"Int. J. Adv. Intell. Paradigms","volume":"24","number":"1/2","pages":"173-189","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijaip/WaniH23","doi":"10.1504/IJAIP.2018.10027081","ee":"https://doi.org/10.1504/IJAIP.2018.10027081","url":"https://dblp.org/rec/journals/ijaip/WaniH23"}, "url":"URL#148298" }, { "@score":"1", "@id":"148299", "info":{"authors":{"author":[{"@pid":"204/7972","text":"Abdullah Waqas"},{"@pid":"25/9995","text":"Hasan Mahmood"}]},"title":"Connectivity analysis of multihop wireless networks using route distribution model.","venue":"Int. J. Adv. Intell. Paradigms","volume":"24","number":"3/4","pages":"403-427","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijaip/WaqasM23","doi":"10.1504/IJAIP.2023.10054362","ee":"https://doi.org/10.1504/IJAIP.2023.10054362","url":"https://dblp.org/rec/journals/ijaip/WaqasM23"}, "url":"URL#148299" }, { "@score":"1", "@id":"148300", "info":{"authors":{"author":[{"@pid":"338/4454","text":"Ariel Zambrano"},{"@pid":"05/8170","text":"Daniela López De Luise"}]},"title":"Impact of multimedia in learning profiles.","venue":"Int. J. Adv. Intell. Paradigms","volume":"24","number":"1/2","pages":"12-37","year":"2023","type":"Journal Articles","access":"closed","key":"journals/ijaip/ZambranoL23","doi":"10.1504/IJAIP.2023.10052950","ee":"https://doi.org/10.1504/IJAIP.2023.10052950","url":"https://dblp.org/rec/journals/ijaip/ZambranoL23"}, "url":"URL#148300" }, { "@score":"1", "@id":"638918", "info":{"authors":{"author":[{"@pid":"152/3730","text":"Jyoti Agarwal"},{"@pid":"82/9100","text":"Sanjay Kumar Dubey"},{"@pid":"43/8473","text":"Rajdev Tiwari"}]},"title":"Usability estimation of component-based software system using adaptive neuro fuzzy approach.","venue":"Int. J. Adv. Intell. Paradigms","volume":"22","number":"1/2","pages":"99-113","year":"2022","type":"Journal Articles","access":"closed","key":"journals/ijaip/AgarwalDT22","doi":"10.1504/IJAIP.2022.123018","ee":"https://doi.org/10.1504/IJAIP.2022.123018","url":"https://dblp.org/rec/journals/ijaip/AgarwalDT22"}, "url":"URL#638918" }, { "@score":"1", "@id":"638919", "info":{"authors":{"author":[{"@pid":"191/4108","text":"Hifzan Ahmad"},{"@pid":"223/9231","text":"Narendra Kohli"}]},"title":"Bi-directional sensor placement for K-coverage solution.","venue":"Int. J. Adv. Intell. Paradigms","volume":"23","number":"1/2","pages":"186-202","year":"2022","type":"Journal Articles","access":"closed","key":"journals/ijaip/AhmadK22","doi":"10.1504/IJAIP.2019.10031795","ee":"https://doi.org/10.1504/IJAIP.2019.10031795","url":"https://dblp.org/rec/journals/ijaip/AhmadK22"}, "url":"URL#638919" }, { "@score":"1", "@id":"638920", "info":{"authors":{"author":[{"@pid":"231/3026","text":"Irphan Ali"},{"@pid":"93/4897","text":"Divakar Yadav"},{"@pid":"83/8318","text":"Ashok Kumar Sharma"}]},"title":"Question answering system for semantic web: a review.","venue":"Int. J. Adv. Intell. Paradigms","volume":"22","number":"1/2","pages":"114-147","year":"2022","type":"Journal Articles","access":"closed","key":"journals/ijaip/AliYS22","doi":"10.1504/IJAIP.2022.123019","ee":"https://doi.org/10.1504/IJAIP.2022.123019","url":"https://dblp.org/rec/journals/ijaip/AliYS22"}, "url":"URL#638920" }, { "@score":"1", "@id":"638921", "info":{"authors":{"author":[{"@pid":"39/4354","text":"Mohammad A. Alsmirat"},{"@pid":"326/4443","text":"Khaled Alawneh"},{"@pid":"10/7992","text":"Mahmoud Al-Ayyoub"},{"@pid":"297/6489","text":"Mays Alshaikhli"}]},"title":"Building a simulated educational environment for the diagnosis of lumbar disk herniation using axial view MRI scans.","venue":"Int. J. Adv. Intell. Paradigms","volume":"22","number":"3/4","pages":"295-317","year":"2022","type":"Journal Articles","access":"closed","key":"journals/ijaip/AlsmiratAAA22","doi":"10.1504/IJAIP.2022.124315","ee":"https://doi.org/10.1504/IJAIP.2022.124315","url":"https://dblp.org/rec/journals/ijaip/AlsmiratAAA22"}, "url":"URL#638921" }, { "@score":"1", "@id":"638922", "info":{"authors":{"author":[{"@pid":"302/2832","text":"G. Anuradha"},{"@pid":"260/2517","text":"Nageswara Rao Moparthi"},{"@pid":"320/2400","text":"Sridhar Namballa"}]},"title":"Predicting elections over Twitter: a campaign strategies of political parties using machine learning algorithms.","venue":"Int. J. Adv. Intell. Paradigms","volume":"21","number":"3/4","pages":"305-320","year":"2022","type":"Journal Articles","access":"closed","key":"journals/ijaip/AnuradhaMN22","doi":"10.1504/IJAIP.2022.122196","ee":"https://doi.org/10.1504/IJAIP.2022.122196","url":"https://dblp.org/rec/journals/ijaip/AnuradhaMN22"}, "url":"URL#638922" }, { "@score":"1", "@id":"638923", "info":{"authors":{"author":[{"@pid":"333/8306","text":"R. Aswini"},{"@pid":"166/5338","text":"Praveen Kumar Rajendran"},{"@pid":"333/8228","text":"A. Piosajin"}]},"title":"Implementing reverse up growth tracking approach under distributed data mining.","venue":"Int. J. Adv. Intell. Paradigms","volume":"23","number":"3/4","pages":"294-305","year":"2022","type":"Journal Articles","access":"closed","key":"journals/ijaip/AswiniRP22","doi":"10.1504/IJAIP.2018.10015437","ee":"https://doi.org/10.1504/IJAIP.2018.10015437","url":"https://dblp.org/rec/journals/ijaip/AswiniRP22"}, "url":"URL#638923" }, { "@score":"1", "@id":"638924", "info":{"authors":{"author":[{"@pid":"145/4235","text":"Mohamed Maher Ata"},{"@pid":"57/5457","text":"Mohamed El-Darieby"},{"@pid":"333/8269","text":"Mustafa Abdelnabi"},{"@pid":"13/10450","text":"Sameh A. Napoleon"}]},"title":"Proposed enhancement for vehicle tracking in traffic videos based on computer vision techniques.","venue":"Int. J. Adv. Intell. Paradigms","volume":"23","number":"3/4","pages":"262-275","year":"2022","type":"Journal Articles","access":"closed","key":"journals/ijaip/AtaEAN22","doi":"10.1504/IJAIP.2022.10051386","ee":"https://doi.org/10.1504/IJAIP.2022.10051386","url":"https://dblp.org/rec/journals/ijaip/AtaEAN22"}, "url":"URL#638924" }, { "@score":"1", "@id":"638925", "info":{"authors":{"author":[{"@pid":"145/4235","text":"Mohamed Maher Ata"},{"@pid":"57/5457","text":"Mohamed El-Darieby"},{"@pid":"151/7902","text":"Mustafa M. Abd El-nabi"},{"@pid":"13/10450","text":"Sameh A. Napoleon"}]},"title":"Using modified background subtraction for detecting vehicles in videos.","venue":"Int. J. Adv. Intell. Paradigms","volume":"22","number":"1/2","pages":"21-36","year":"2022","type":"Journal Articles","access":"closed","key":"journals/ijaip/AtaEEN22","doi":"10.1504/IJAIP.2022.123013","ee":"https://doi.org/10.1504/IJAIP.2022.123013","url":"https://dblp.org/rec/journals/ijaip/AtaEEN22"}, "url":"URL#638925" }, { "@score":"1", "@id":"638926", "info":{"authors":{"author":[{"@pid":"315/6860","text":"Ashu Bansal"},{"@pid":"39/5746","text":"Neeraj Gupta"},{"@pid":"128/5432","text":"Rakesh Garg"}]},"title":"Fuzzy multi-attribute decision-making approach for the selection of software effort estimation models.","venue":"Int. J. Adv. Intell. Paradigms","volume":"21","number":"1/2","pages":"174-188","year":"2022","type":"Journal Articles","access":"closed","key":"journals/ijaip/BansalGG22","doi":"10.1504/IJAIP.2022.121036","ee":"https://doi.org/10.1504/IJAIP.2022.121036","url":"https://dblp.org/rec/journals/ijaip/BansalGG22"}, "url":"URL#638926" }, { "@score":"1", "@id":"638927", "info":{"authors":{"author":[{"@pid":"174/5801","text":"Abhijit Bora"},{"@pid":"164/5170","text":"Subhash Medhi"},{"@pid":"91/7505","text":"Tulshi Bezboruah"}]},"title":"Reliability evaluation for deployment of multi service multi functional service oriented computing based on different techniques.","venue":"Int. J. Adv. Intell. Paradigms","volume":"22","number":"3/4","pages":"362-378","year":"2022","type":"Journal Articles","access":"closed","key":"journals/ijaip/BoraMB22","doi":"10.1504/IJAIP.2022.124319","ee":"https://doi.org/10.1504/IJAIP.2022.124319","url":"https://dblp.org/rec/journals/ijaip/BoraMB22"}, "url":"URL#638927" }, { "@score":"1", "@id":"638928", "info":{"authors":{"author":[{"@pid":"183/9648","text":"Saswati Debnath"},{"@pid":"176/3348","text":"Pinki Roy"}]},"title":"Audio-visual speech recognition based on machine learning approach.","venue":"Int. J. Adv. Intell. Paradigms","volume":"21","number":"3/4","pages":"211-224","year":"2022","type":"Journal Articles","access":"closed","key":"journals/ijaip/DebnathR22","doi":"10.1504/IJAIP.2022.122193","ee":"https://doi.org/10.1504/IJAIP.2022.122193","url":"https://dblp.org/rec/journals/ijaip/DebnathR22"}, "url":"URL#638928" }, { "@score":"1", "@id":"638929", "info":{"authors":{"author":[{"@pid":"233/2325","text":"M. Devi"},{"@pid":"320/2365","text":"K. Ameenal Bibi"},{"@pid":"140/7654","text":"Hossein Rashmanlou"},{"@pid":"250/3513","text":"Yahya Talebi"}]},"title":"New concepts in intuitionistic fuzzy labelling graphs.","venue":"Int. J. Adv. Intell. Paradigms","volume":"21","number":"3/4","pages":"267-286","year":"2022","type":"Journal Articles","access":"closed","key":"journals/ijaip/DeviBRT22","doi":"10.1504/IJAIP.2022.122195","ee":"https://doi.org/10.1504/IJAIP.2022.122195","url":"https://dblp.org/rec/journals/ijaip/DeviBRT22"}, "url":"URL#638929" }, { "@score":"1", "@id":"638930", "info":{"authors":{"author":[{"@pid":"253/9696","text":"T. Gayathri Devi"},{"@pid":"166/0530","text":"P. Neelamegam"},{"@pid":"53/4947","text":"A. Srinivasan"}]},"title":"Rice plant disease, crop stages endemic and control measures - a survey.","venue":"Int. J. Adv. Intell. Paradigms","volume":"23","number":"3/4","pages":"399-409","year":"2022","type":"Journal Articles","access":"closed","key":"journals/ijaip/DeviNS22","doi":"10.1504/IJAIP.2021.10026406","ee":"https://doi.org/10.1504/IJAIP.2021.10026406","url":"https://dblp.org/rec/journals/ijaip/DeviNS22"}, "url":"URL#638930" }, { "@score":"1", "@id":"638931", "info":{"authors":{"author":[{"@pid":"139/9212","text":"Aniruddha Dey"},{"@pid":"44/8172","text":"Shiladitya Chowdhury"},{"@pid":"44/315","text":"Jamuna Kanta Sing"}]},"title":"A new fuzzy and Gaussian distribution induced two-directional inverse FDA for feature extraction and face recognition.","venue":"Int. J. Adv. Intell. Paradigms","volume":"22","number":"1/2","pages":"148-166","year":"2022","type":"Journal Articles","access":"closed","key":"journals/ijaip/DeyCS22","doi":"10.1504/IJAIP.2022.123020","ee":"https://doi.org/10.1504/IJAIP.2022.123020","url":"https://dblp.org/rec/journals/ijaip/DeyCS22"}, "url":"URL#638931" }, { "@score":"1", "@id":"638932", "info":{"authors":{"author":[{"@pid":"24/7703-2","text":"Arindam Dey 0002"},{"@pid":"36/11230","text":"Anita Pal"}]},"title":"Types of fuzzy graph colouring and polynomial ideal theory.","venue":"Int. J. Adv. Intell. Paradigms","volume":"23","number":"1/2","pages":"146-154","year":"2022","type":"Journal Articles","access":"closed","key":"journals/ijaip/DeyP22","doi":"10.1504/IJAIP.2018.10009343","ee":"https://doi.org/10.1504/IJAIP.2018.10009343","url":"https://dblp.org/rec/journals/ijaip/DeyP22"}, "url":"URL#638932" }, { "@score":"1", "@id":"638933", "info":{"authors":{"author":[{"@pid":"269/3652","text":"Doaa L. El-Bably"},{"@pid":"244/3160","text":"Khaled M. Fouad"}]},"title":"A hybrid approach for improving data classification based on PCA and enhanced ELM.","venue":"Int. J. Adv. Intell. Paradigms","volume":"23","number":"3/4","pages":"217-247","year":"2022","type":"Journal Articles","access":"closed","key":"journals/ijaip/El-BablyF22","doi":"10.1504/IJAIP.2018.10013881","ee":"https://doi.org/10.1504/IJAIP.2018.10013881","url":"https://dblp.org/rec/journals/ijaip/El-BablyF22"}, "url":"URL#638933" }, { "@score":"1", "@id":"638934", "info":{"authors":{"author":[{"@pid":"184/7318","text":"Tarun Kumar Ghosh"},{"@pid":"85/5942","text":"Sanjoy Das"}]},"title":"Teaching learning-based optimisation for job scheduling in computational grids.","venue":"Int. J. Adv. Intell. Paradigms","volume":"21","number":"1/2","pages":"72-86","year":"2022","type":"Journal Articles","access":"closed","key":"journals/ijaip/GhoshD22","doi":"10.1504/IJAIP.2022.121030","ee":"https://doi.org/10.1504/IJAIP.2022.121030","url":"https://dblp.org/rec/journals/ijaip/GhoshD22"}, "url":"URL#638934" }, { "@score":"1", "@id":"638935", "info":{"authors":{"author":[{"@pid":"152/9609","text":"Sihem Ghoudelbourk"},{"@pid":"67/9796","text":"Ahmad Taher Azar"},{"@pid":"164/2751","text":"Djalel Dib"},{"@pid":"320/2169","text":"Abelkrim Rechach"}]},"title":"Fractional order control of switched reluctance motor.","venue":"Int. J. Adv. Intell. Paradigms","volume":"21","number":"3/4","pages":"247-266","year":"2022","type":"Journal Articles","access":"closed","key":"journals/ijaip/GhoudelbourkADR22","doi":"10.1504/IJAIP.2022.122191","ee":"https://doi.org/10.1504/IJAIP.2022.122191","url":"https://dblp.org/rec/journals/ijaip/GhoudelbourkADR22"}, "url":"URL#638935" }, { "@score":"1", "@id":"638936", "info":{"authors":{"author":[{"@pid":"58/7988","text":"J. Gitanjali"},{"@pid":"277/1160","text":"Muhammad Rukunuddin Ghalib"}]},"title":"Sequential pattern-based activity recognition model for ambient computing.","venue":"Int. J. Adv. Intell. Paradigms","volume":"21","number":"1/2","pages":"41-52","year":"2022","type":"Journal Articles","access":"closed","key":"journals/ijaip/GitanjaliG22","doi":"10.1504/IJAIP.2022.121028","ee":"https://doi.org/10.1504/IJAIP.2022.121028","url":"https://dblp.org/rec/journals/ijaip/GitanjaliG22"}, "url":"URL#638936" }, { "@score":"1", "@id":"638937", "info":{"authors":{"author":[{"@pid":"320/2449","text":"U. Harshavardhini"},{"@pid":"320/2550","text":"T. Saraswathi"},{"@pid":"320/2564","text":"J. Manju"}]},"title":"Load balancing with SIP protocol using distributed web-server system.","venue":"Int. J. Adv. Intell. Paradigms","volume":"21","number":"3/4","pages":"225-234","year":"2022","type":"Journal Articles","access":"closed","key":"journals/ijaip/HarshavardhiniS22","doi":"10.1504/IJAIP.2022.122198","ee":"https://doi.org/10.1504/IJAIP.2022.122198","url":"https://dblp.org/rec/journals/ijaip/HarshavardhiniS22"}, "url":"URL#638937" }, { "@score":"1", "@id":"638938", "info":{"authors":{"author":[{"@pid":"333/8368","text":"I. Samuel Peter James"},{"@pid":"86/6660","text":"P. Ramasubramanian"},{"@pid":"333/8502","text":"D. Magdalene Delighta Angeline"}]},"title":"Student absenteeism in engineering college using rough set and data mining approach.","venue":"Int. J. Adv. Intell. Paradigms","volume":"23","number":"3/4","pages":"423-433","year":"2022","type":"Journal Articles","access":"closed","key":"journals/ijaip/JamesRA22","doi":"10.1504/IJAIP.2021.10034139","ee":"https://doi.org/10.1504/IJAIP.2021.10034139","url":"https://dblp.org/rec/journals/ijaip/JamesRA22"}, "url":"URL#638938" }, { "@score":"1", "@id":"638939", "info":{"authors":{"author":[{"@pid":"196/7498","text":"Tamanna Jena"},{"@pid":"276/9895","text":"Jnyana Ranjan Mohanty"}]},"title":"GA-based efficient resource allocation and task scheduling in a multi-cloud environment.","venue":"Int. J. Adv. Intell. Paradigms","volume":"22","number":"1/2","pages":"54-71","year":"2022","type":"Journal Articles","access":"closed","key":"journals/ijaip/JenaM22","doi":"10.1504/IJAIP.2022.123015","ee":"https://doi.org/10.1504/IJAIP.2022.123015","url":"https://dblp.org/rec/journals/ijaip/JenaM22"}, "url":"URL#638939" }, { "@score":"1", "@id":"638940", "info":{"authors":{"author":[{"@pid":"41/7623","text":"G. Jeyakumar 0001"},{"@pid":"326/4348","text":"C. Shunmuga Velaytham"}]},"title":"Heterogeneous mixing of dynamic differential evolution variants in distributed frame work for global optimisation problems.","venue":"Int. J. Adv. Intell. Paradigms","volume":"22","number":"3/4","pages":"318-335","year":"2022","type":"Journal Articles","access":"closed","key":"journals/ijaip/JeyakumarV22","doi":"10.1504/IJAIP.2022.124316","ee":"https://doi.org/10.1504/IJAIP.2022.124316","url":"https://dblp.org/rec/journals/ijaip/JeyakumarV22"}, "url":"URL#638940" }, { "@score":"1", "@id":"638941", "info":{"authors":{"author":[{"@pid":"264/4201","text":"P. Jyotheeswari"},{"@pid":"120/9724","text":"N. Jeyanthi"}]},"title":"Secure data transmission for protecting the users' privacy in medical internet of things.","venue":"Int. J. Adv. Intell. Paradigms","volume":"23","number":"1/2","pages":"171-185","year":"2022","type":"Journal Articles","access":"closed","key":"journals/ijaip/JyotheeswariJ22","doi":"10.1504/IJAIP.2022.10048999","ee":"https://doi.org/10.1504/IJAIP.2022.10048999","url":"https://dblp.org/rec/journals/ijaip/JyotheeswariJ22"}, "url":"URL#638941" }, { "@score":"1", "@id":"638942", "info":{"authors":{"author":[{"@pid":"126/2230","text":"Harihar Kalia"},{"@pid":"01/4699","text":"Satchidananda Dehuri"},{"@pid":"86/6753","text":"Ashish Ghosh"}]},"title":"Fitness inheritance in multi-objective genetic algorithms: a case study on fuzzy classification rule mining.","venue":"Int. J. Adv. Intell. Paradigms","volume":"23","number":"1/2","pages":"89-112","year":"2022","type":"Journal Articles","access":"closed","key":"journals/ijaip/KaliaDG22","doi":"10.1504/IJAIP.2022.10050295","ee":"https://doi.org/10.1504/IJAIP.2022.10050295","url":"https://dblp.org/rec/journals/ijaip/KaliaDG22"}, "url":"URL#638942" }, { "@score":"1", "@id":"638943", "info":{"authors":{"author":[{"@pid":"253/6630","text":"S. Kalpana"},{"@pid":"62/5414","text":"S. Chandramathi"},{"@pid":"198/4011","text":"Shriram K. Vasudevan"}]},"title":"A novel three-tier model with group-based CAC for effective load balancing in heterogeneous wireless networks.","venue":"Int. J. Adv. Intell. Paradigms","volume":"23","number":"1/2","pages":"30-54","year":"2022","type":"Journal Articles","access":"closed","key":"journals/ijaip/KalpanaCV22","doi":"10.1504/IJAIP.2022.10050292","ee":"https://doi.org/10.1504/IJAIP.2022.10050292","url":"https://dblp.org/rec/journals/ijaip/KalpanaCV22"}, "url":"URL#638943" }, { "@score":"1", "@id":"638944", "info":{"authors":{"author":[{"@pid":"34/6988","text":"Harpreet Kaur"},{"@pid":"58/1076","text":"Manoj Kumar"},{"@pid":"31/6704","text":"Ajay K. Sharma"},{"@pid":"79/10240","text":"Harjit Pal Singh"}]},"title":"Design and analysis of SRRC filter in wavelet based multiuser environment of mobile WiMax.","venue":"Int. J. Adv. Intell. Paradigms","volume":"21","number":"3/4","pages":"374-390","year":"2022","type":"Journal Articles","access":"closed","key":"journals/ijaip/KaurKSS22","doi":"10.1504/IJAIP.2022.122190","ee":"https://doi.org/10.1504/IJAIP.2022.122190","url":"https://dblp.org/rec/journals/ijaip/KaurKSS22"}, "url":"URL#638944" }, { "@score":"1", "@id":"638945", "info":{"authors":{"author":[{"@pid":"193/0239","text":"Aditya Khamparia"},{"@pid":"84/7292","text":"Babita Pandey"}]},"title":"Performance index assessment of intelligent computing methods in e-learning systems.","venue":"Int. J. Adv. Intell. Paradigms","volume":"23","number":"3/4","pages":"248-261","year":"2022","type":"Journal Articles","access":"closed","key":"journals/ijaip/KhampariaP22","doi":"10.1504/IJAIP.2018.10016273","ee":"https://doi.org/10.1504/IJAIP.2018.10016273","url":"https://dblp.org/rec/journals/ijaip/KhampariaP22"}, "url":"URL#638945" }, { "@score":"1", "@id":"638946", "info":{"authors":{"author":[{"@pid":"239/6337","text":"Rijwan Khan"},{"@pid":"237/7952","text":"Mohd Amjad"}]},"title":"Applying genetic algorithm to optimise the software testing efficiency with Euclidean distance.","venue":"Int. J. Adv. Intell. Paradigms","volume":"23","number":"1/2","pages":"72-88","year":"2022","type":"Journal Articles","access":"closed","key":"journals/ijaip/KhanA22","doi":"10.1504/IJAIP.2022.10050294","ee":"https://doi.org/10.1504/IJAIP.2022.10050294","url":"https://dblp.org/rec/journals/ijaip/KhanA22"}, "url":"URL#638946" }, { "@score":"1", "@id":"638947", "info":{"authors":{"author":[{"@pid":"320/2161","text":"V. Gokula Krishnan"},{"@pid":"42/6501","text":"N. Sankar Ram"}]},"title":"A novel approach to select cluster head and optimising the data transmission in VANET.","venue":"Int. J. Adv. Intell. Paradigms","volume":"21","number":"3/4","pages":"235-246","year":"2022","type":"Journal Articles","access":"closed","key":"journals/ijaip/KrishnanR22","doi":"10.1504/IJAIP.2022.122194","ee":"https://doi.org/10.1504/IJAIP.2022.122194","url":"https://dblp.org/rec/journals/ijaip/KrishnanR22"}, "url":"URL#638947" }, { "@score":"1", "@id":"638948", "info":{"authors":{"author":[{"@pid":"329/0606","text":"N. Krishnaveni"},{"@pid":"88/4250","text":"P. Sudhakar"}]},"title":"Intricacies in image steganography and innovative directions.","venue":"Int. J. Adv. Intell. Paradigms","volume":"23","number":"1/2","pages":"55-71","year":"2022","type":"Journal Articles","access":"closed","key":"journals/ijaip/KrishnaveniS22","doi":"10.1504/IJAIP.2022.10050293","ee":"https://doi.org/10.1504/IJAIP.2022.10050293","url":"https://dblp.org/rec/journals/ijaip/KrishnaveniS22"}, "url":"URL#638948" }, { "@score":"1", "@id":"638949", "info":{"authors":{"author":[{"@pid":"310/7596","text":"Vartika Kulshrestha"},{"@pid":"119/5085","text":"Seema Verma"},{"@pid":"146/0817","text":"C. Rama Krishna"}]},"title":"Hybrid probabilistic triple encryption approach for data security in cloud computing.","venue":"Int. J. Adv. Intell. Paradigms","volume":"21","number":"1/2","pages":"158-173","year":"2022","type":"Journal Articles","access":"closed","key":"journals/ijaip/KulshresthaVK22","doi":"10.1504/IJAIP.2022.121035","ee":"https://doi.org/10.1504/IJAIP.2022.121035","url":"https://dblp.org/rec/journals/ijaip/KulshresthaVK22"}, "url":"URL#638949" }, { "@score":"1", "@id":"638950", "info":{"authors":{"author":[{"@pid":"81/4883","text":"Tarun Kumar"},{"@pid":"225/0995","text":"Gourav Khurana"}]},"title":"Copy-move image forgery detection using cuckoo search.","venue":"Int. J. Adv. Intell. Paradigms","volume":"23","number":"3/4","pages":"357-383","year":"2022","type":"Journal Articles","access":"closed","key":"journals/ijaip/KumarK22","doi":"10.1504/IJAIP.2018.10021468","ee":"https://doi.org/10.1504/IJAIP.2018.10021468","url":"https://dblp.org/rec/journals/ijaip/KumarK22"}, "url":"URL#638950" }, { "@score":"1", "@id":"638951", "info":{"authors":{"author":[{"@pid":"27/343","text":"Sanjeev Kumar"},{"@pid":"333/8238","text":"Rajesh Kumar Maurya"},{"@pid":"141/0643","text":"Sanjay Kumar Yadav"},{"@pid":"129/0866","text":"Baijnath Kaushik"}]},"title":"A comparative study and implementation of neuro-fuzzy and decision tree for malignant tumour detection system.","venue":"Int. J. Adv. Intell. Paradigms","volume":"23","number":"3/4","pages":"410-422","year":"2022","type":"Journal Articles","access":"closed","key":"journals/ijaip/KumarMYK22","doi":"10.1504/IJAIP.2019.10026262","ee":"https://doi.org/10.1504/IJAIP.2019.10026262","url":"https://dblp.org/rec/journals/ijaip/KumarMYK22"}, "url":"URL#638951" }, { "@score":"1", "@id":"638952", "info":{"authors":{"author":[{"@pid":"52/3310","text":"Nacéra Laiche"},{"@pid":"31/1474","text":"Slimane Larabi"}]},"title":"Geometric based histograms for shape representation and retrieval.","venue":"Int. J. Adv. Intell. Paradigms","volume":"21","number":"3/4","pages":"348-373","year":"2022","type":"Journal Articles","access":"closed","key":"journals/ijaip/LaicheL22","doi":"10.1504/IJAIP.2022.122189","ee":"https://doi.org/10.1504/IJAIP.2022.122189","url":"https://dblp.org/rec/journals/ijaip/LaicheL22"}, "url":"URL#638952" }, { "@score":"1", "@id":"638953", "info":{"authors":{"author":[{"@pid":"315/6819","text":"Ruchi Makani"},{"@pid":"99/8665","text":"B. V. R. Reddy"}]},"title":"Trust-based-tuning of Bayesian-watchdog intrusion detection for fast and improved detection of black hole attacks in mobile ad hoc networks.","venue":"Int. J. Adv. Intell. Paradigms","volume":"21","number":"1/2","pages":"53-71","year":"2022","type":"Journal Articles","access":"closed","key":"journals/ijaip/MakaniR22","doi":"10.1504/IJAIP.2022.121029","ee":"https://doi.org/10.1504/IJAIP.2022.121029","url":"https://dblp.org/rec/journals/ijaip/MakaniR22"}, "url":"URL#638953" }, { "@score":"1", "@id":"638954", "info":{"authors":{"author":[{"@pid":"145/9904","text":"Sadek Mansouri"},{"@pid":"60/3025","text":"Mbarek Charhad"},{"@pid":"66/6181","text":"Mounir Zrigui"}]},"title":"A new approach for automatic Arabic-text detection and localisation in video frames.","venue":"Int. J. Adv. Intell. Paradigms","volume":"22","number":"1/2","pages":"72-83","year":"2022","type":"Journal Articles","access":"closed","key":"journals/ijaip/MansouriCZ22","doi":"10.1504/IJAIP.2022.123016","ee":"https://doi.org/10.1504/IJAIP.2022.123016","url":"https://dblp.org/rec/journals/ijaip/MansouriCZ22"}, "url":"URL#638954" }, { "@score":"1", "@id":"638955", "info":{"authors":{"author":{"@pid":"251/3750","text":"Mohit Mittal"}},"title":"Analysis of energy efficiency based on shortest route discovery in wireless sensor network.","venue":"Int. J. Adv. Intell. Paradigms","volume":"23","number":"1/2","pages":"1-29","year":"2022","type":"Journal Articles","access":"closed","key":"journals/ijaip/Mittal22","doi":"10.1504/IJAIP.2022.10050291","ee":"https://doi.org/10.1504/IJAIP.2022.10050291","url":"https://dblp.org/rec/journals/ijaip/Mittal22"}, "url":"URL#638955" }, { "@score":"1", "@id":"638956", "info":{"authors":{"author":[{"@pid":"297/7508","text":"Varsha Mittal"},{"@pid":"49/10029","text":"Durgaprasad Gangodkar"},{"@pid":"142/1386","text":"Bhaskar Pant"}]},"title":"An efficient approach for storage of court judgements using graph database.","venue":"Int. J. Adv. Intell. Paradigms","volume":"22","number":"1/2","pages":"214-228","year":"2022","type":"Journal Articles","access":"closed","key":"journals/ijaip/MittalGP22","doi":"10.1504/IJAIP.2022.123024","ee":"https://doi.org/10.1504/IJAIP.2022.123024","url":"https://dblp.org/rec/journals/ijaip/MittalGP22"}, "url":"URL#638956" }, { "@score":"1", "@id":"638957", "info":{"authors":{"author":[{"@pid":"254/6868","text":"Chippada Nagamani"},{"@pid":"14/11141","text":"Suneetha Chittineni"}]},"title":"Network database security with intellectual access supervision using outlier detection techniques.","venue":"Int. J. Adv. Intell. Paradigms","volume":"22","number":"3/4","pages":"348-361","year":"2022","type":"Journal Articles","access":"closed","key":"journals/ijaip/NagamaniC22","doi":"10.1504/IJAIP.2022.124318","ee":"https://doi.org/10.1504/IJAIP.2022.124318","url":"https://dblp.org/rec/journals/ijaip/NagamaniC22"}, "url":"URL#638957" }, { "@score":"1", "@id":"638958", "info":{"authors":{"author":[{"@pid":"322/3351","text":"M. S. Narassima"},{"@pid":"78/8679","text":"S. P. Anbuudayasankar"},{"@pid":"198/4011","text":"Shriram K. Vasudevan"},{"@pid":"307/5471","text":"Thenarasu Mohanavelu"}]},"title":"Performance improvement in cardiology department of a hospital by simulation.","venue":"Int. J. Adv. Intell. Paradigms","volume":"22","number":"1/2","pages":"1-20","year":"2022","type":"Journal Articles","access":"closed","key":"journals/ijaip/NarassimaAVM22","doi":"10.1504/IJAIP.2022.123012","ee":"https://doi.org/10.1504/IJAIP.2022.123012","url":"https://dblp.org/rec/journals/ijaip/NarassimaAVM22"}, "url":"URL#638958" }, { "@score":"1", "@id":"638959", "info":{"authors":{"author":[{"@pid":"139/7937","text":"N. Neelima"},{"@pid":"333/8337","text":"A. Srikrishna"},{"@pid":"154/8807","text":"Gangadhara Rao Kancherla"},{"@pid":"333/8207","text":"M. Pompapathi"}]},"title":"Object recognition based on topology preserving skeleton features.","venue":"Int. J. Adv. Intell. Paradigms","volume":"23","number":"3/4","pages":"384-398","year":"2022","type":"Journal Articles","access":"closed","key":"journals/ijaip/NeelimaSKP22","doi":"10.1504/IJAIP.2018.10026905","ee":"https://doi.org/10.1504/IJAIP.2018.10026905","url":"https://dblp.org/rec/journals/ijaip/NeelimaSKP22"}, "url":"URL#638959" }, { "@score":"1", "@id":"638960", "info":{"authors":{"author":[{"@pid":"132/0064","text":"Raju Pal"},{"@pid":"53/10620","text":"Mukesh Saraswat"}]},"title":"Improved biogeography-based optimisation.","venue":"Int. J. Adv. Intell. Paradigms","volume":"21","number":"1/2","pages":"18-40","year":"2022","type":"Journal Articles","access":"closed","key":"journals/ijaip/PalS22","doi":"10.1504/IJAIP.2022.121027","ee":"https://doi.org/10.1504/IJAIP.2022.121027","url":"https://dblp.org/rec/journals/ijaip/PalS22"}, "url":"URL#638960" }, { "@score":"1", "@id":"638961", "info":{"authors":{"author":[{"@pid":"233/8604","text":"Trilok Nath Pandey"},{"@pid":"63/8774","text":"Alok Kumar Jagadev"},{"@pid":"01/4699","text":"Satchidananda Dehuri"},{"@pid":"88/2576","text":"Sung-Bae Cho"}]},"title":"Prediction of exchange rate using improved particle swarm optimised radial basis function networks.","venue":"Int. J. Adv. Intell. Paradigms","volume":"23","number":"3/4","pages":"332-356","year":"2022","type":"Journal Articles","access":"closed","key":"journals/ijaip/PandeyJDC22","doi":"10.1504/IJAIP.2022.10051389","ee":"https://doi.org/10.1504/IJAIP.2022.10051389","url":"https://dblp.org/rec/journals/ijaip/PandeyJDC22"}, "url":"URL#638961" }, { "@score":"1", "@id":"638962", "info":{"authors":{"author":[{"@pid":"313/4656","text":"Ghadeer Al Qahmouss"},{"@pid":"08/11109","text":"Khaled Almakadmeh"}]},"title":"Towards a standard-based model of system dependability requirements.","venue":"Int. J. Adv. Intell. Paradigms","volume":"21","number":"3/4","pages":"287-304","year":"2022","type":"Journal Articles","access":"closed","key":"journals/ijaip/QahmoussA22","doi":"10.1504/IJAIP.2022.122192","ee":"https://doi.org/10.1504/IJAIP.2022.122192","url":"https://dblp.org/rec/journals/ijaip/QahmoussA22"}, "url":"URL#638962" }, { "@score":"1", "@id":"638963", "info":{"authors":{"author":[{"@pid":"78/8460","text":"Marjan Kuchaki Rafsanjani"},{"@pid":"155/9983","text":"Hamideh Fatemidokht"}]},"title":"Efficient and secure approaches for routing in VANETs.","venue":"Int. J. Adv. Intell. Paradigms","volume":"22","number":"3/4","pages":"240-262","year":"2022","type":"Journal Articles","access":"closed","key":"journals/ijaip/RafsanjaniF22","doi":"10.1504/IJAIP.2022.124313","ee":"https://doi.org/10.1504/IJAIP.2022.124313","url":"https://dblp.org/rec/journals/ijaip/RafsanjaniF22"}, "url":"URL#638963" }, { "@score":"1", "@id":"638964", "info":{"authors":{"author":[{"@pid":"179/1145","text":"Abhishek Rajan"},{"@pid":"179/1146","text":"Tanmoy Malakar"}]},"title":"Optimum generation and VAr scheduling on a multi-objective framework using exchange market algorithm.","venue":"Int. J. Adv. Intell. Paradigms","volume":"22","number":"3/4","pages":"263-294","year":"2022","type":"Journal Articles","access":"closed","key":"journals/ijaip/RajanM22","doi":"10.1504/IJAIP.2022.124314","ee":"https://doi.org/10.1504/IJAIP.2022.124314","url":"https://dblp.org/rec/journals/ijaip/RajanM22"}, "url":"URL#638964" }, { "@score":"1", "@id":"638965", "info":{"authors":{"author":[{"@pid":"326/4641","text":"B. S. Rajeshwari"},{"@pid":"83/7480","text":"M. Dakshayini"}]},"title":"Energy efficient VM placement and task scheduling techniques to achieve green cloud environment.","venue":"Int. J. Adv. Intell. Paradigms","volume":"22","number":"3/4","pages":"416-435","year":"2022","type":"Journal Articles","access":"closed","key":"journals/ijaip/RajeshwariD22","doi":"10.1504/IJAIP.2022.124321","ee":"https://doi.org/10.1504/IJAIP.2022.124321","url":"https://dblp.org/rec/journals/ijaip/RajeshwariD22"}, "url":"URL#638965" }, { "@score":"1", "@id":"638966", "info":{"authors":{"author":[{"@pid":"195/6711","text":"Elangovan Ramanujam"},{"@pid":"85/8829-1","text":"S. Padmavathi 0001"}]},"title":"Comprehensive review on time series motif discovery using evolutionary techniques.","venue":"Int. J. Adv. Intell. Paradigms","volume":"23","number":"1/2","pages":"155-170","year":"2022","type":"Journal Articles","access":"closed","key":"journals/ijaip/RamanujamP22","doi":"10.1504/IJAIP.2022.10050297","ee":"https://doi.org/10.1504/IJAIP.2022.10050297","url":"https://dblp.org/rec/journals/ijaip/RamanujamP22"}, "url":"URL#638966" }, { "@score":"1", "@id":"638967", "info":{"authors":{"author":[{"@pid":"137/9841","text":"Rohit Rastogi"},{"@pid":"71/3117","text":"D. K. Chaturvedi"},{"@pid":"315/6628","text":"Santosh Satya"},{"@pid":"315/6579","text":"Navneet Arora"},{"@pid":"227/8812","text":"Vikash Yadav"},{"@pid":"315/6815","text":"Vishwas Yadav"},{"@pid":"185/4543","text":"Pallavi Sharma"},{"@pid":"299/2668","text":"Sumit Chauhan"}]},"title":"Statistical analysis of EMG and GSR biofeedback efficacy on different modes for chronic TTH on various indicators.","venue":"Int. J. Adv. Intell. Paradigms","volume":"21","number":"1/2","pages":"109-128","year":"2022","type":"Journal Articles","access":"closed","key":"journals/ijaip/RastogiCSAYYSC22","doi":"10.1504/IJAIP.2022.121033","ee":"https://doi.org/10.1504/IJAIP.2022.121033","url":"https://dblp.org/rec/journals/ijaip/RastogiCSAYYSC22"}, "url":"URL#638967" }, { "@score":"1", "@id":"638968", "info":{"authors":{"author":{"@pid":"329/0834","text":"Sahar Mojaver Rostami"}},"title":"Evaluation of large shareholder's monitoring or tunnelling behaviour in companies accepted in Tehran Stock Exchange.","venue":"Int. J. Adv. Intell. Paradigms","volume":"23","number":"1/2","pages":"113-128","year":"2022","type":"Journal Articles","access":"closed","key":"journals/ijaip/Rostami22","doi":"10.1504/IJAIP.2022.10050296","ee":"https://doi.org/10.1504/IJAIP.2022.10050296","url":"https://dblp.org/rec/journals/ijaip/Rostami22"}, "url":"URL#638968" }, { "@score":"1", "@id":"638969", "info":{"authors":{"author":[{"@pid":"71/3232","text":"Biswajit Sarkar"},{"@pid":"50/4513","text":"Animesh Biswas"}]},"title":"TODIM-based Pythagorean fuzzy multicriteria group decision making through similarity measure.","venue":"Int. J. Adv. Intell. Paradigms","volume":"22","number":"1/2","pages":"184-199","year":"2022","type":"Journal Articles","access":"closed","key":"journals/ijaip/SarkarB22","doi":"10.1504/IJAIP.2022.123022","ee":"https://doi.org/10.1504/IJAIP.2022.123022","url":"https://dblp.org/rec/journals/ijaip/SarkarB22"}, "url":"URL#638969" }, { "@score":"1", "@id":"638970", "info":{"authors":{"author":[{"@pid":"178/5548","text":"Kaushik Sekaran"},{"@pid":"212/4770","text":"P. Venkata Krishna 0001"}]},"title":"Content-based load balancing of tasks using task clustering for cost optimisation in cloud computing environment.","venue":"Int. J. Adv. Intell. Paradigms","volume":"21","number":"1/2","pages":"1-17","year":"2022","type":"Journal Articles","access":"closed","key":"journals/ijaip/SekaranK22","doi":"10.1504/IJAIP.2022.121026","ee":"https://doi.org/10.1504/IJAIP.2022.121026","url":"https://dblp.org/rec/journals/ijaip/SekaranK22"}, "url":"URL#638970" }, { "@score":"1", "@id":"638971", "info":{"authors":{"author":[{"@pid":"315/6839","text":"C. Selvarathi"},{"@pid":"78/5290","text":"S. Subha"},{"@pid":"233/2818","text":"G. Madasamy Raja"},{"@pid":"315/6858","text":"K. Vidhya Lakshmi"}]},"title":"A visualisation technique of extracting hidden patterns for maintaining road safety.","venue":"Int. J. Adv. Intell. Paradigms","volume":"21","number":"1/2","pages":"100-108","year":"2022","type":"Journal Articles","access":"closed","key":"journals/ijaip/SelvarathiSRL22","doi":"10.1504/IJAIP.2022.121032","ee":"https://doi.org/10.1504/IJAIP.2022.121032","url":"https://dblp.org/rec/journals/ijaip/SelvarathiSRL22"}, "url":"URL#638971" }, { "@score":"1", "@id":"638972", "info":{"authors":{"author":[{"@pid":"322/3401","text":"Nithaiyan Shanmugasundaram"},{"@pid":"322/3343","text":"S. Pradeep Kumar"},{"@pid":"283/6897","text":"E. N. Ganesh"}]},"title":"Modelling and analysis of space vector pulse width modulated inverter drives system using MatLab/Simulink.","venue":"Int. J. Adv. Intell. Paradigms","volume":"22","number":"1/2","pages":"200-213","year":"2022","type":"Journal Articles","access":"closed","key":"journals/ijaip/Shanmugasundaram22","doi":"10.1504/IJAIP.2022.123023","ee":"https://doi.org/10.1504/IJAIP.2022.123023","url":"https://dblp.org/rec/journals/ijaip/Shanmugasundaram22"}, "url":"URL#638972" }, { "@score":"1", "@id":"638973", "info":{"authors":{"author":[{"@pid":"263/1565","text":"Mekhla Sharma"},{"@pid":"90/2678","text":"Ankur Gupta"},{"@pid":"37/11477","text":"Jaiteg Singh"}]},"title":"Resource discovery in inter-cloud environment: a review.","venue":"Int. J. Adv. Intell. Paradigms","volume":"23","number":"1/2","pages":"129-145","year":"2022","type":"Journal Articles","access":"closed","key":"journals/ijaip/SharmaGS22","doi":"10.1504/IJAIP.2018.10023054","ee":"https://doi.org/10.1504/IJAIP.2018.10023054","url":"https://dblp.org/rec/journals/ijaip/SharmaGS22"}, "url":"URL#638973" }, { "@score":"1", "@id":"638974", "info":{"authors":{"author":[{"@pid":"86/11292","text":"Richa Sharma"},{"@pid":"122/2882","text":"Vasudha Vashisht"},{"@pid":"118/1189","text":"Umang Singh"}]},"title":"eeFFA/DE - a fuzzy-based clustering algorithm using hybrid technique for wireless sensor networks.","venue":"Int. J. Adv. Intell. Paradigms","volume":"21","number":"1/2","pages":"129-157","year":"2022","type":"Journal Articles","access":"closed","key":"journals/ijaip/SharmaVS22","doi":"10.1504/IJAIP.2022.121034","ee":"https://doi.org/10.1504/IJAIP.2022.121034","url":"https://dblp.org/rec/journals/ijaip/SharmaVS22"}, "url":"URL#638974" }, { "@score":"1", "@id":"638975", "info":{"authors":{"author":[{"@pid":"329/1103","text":"Dhirendra Kumar Shukla"},{"@pid":"46/10372","text":"Divya Kumar"},{"@pid":"77/4715","text":"Dharmender Singh Kushwaha"}]},"title":"An efficient tasks scheduling algorithm for batch processing heterogeneous cloud environment.","venue":"Int. J. Adv. Intell. Paradigms","volume":"23","number":"1/2","pages":"203-216","year":"2022","type":"Journal Articles","access":"closed","key":"journals/ijaip/ShuklaKK22","doi":"10.1504/IJAIP.2021.10027089","ee":"https://doi.org/10.1504/IJAIP.2021.10027089","url":"https://dblp.org/rec/journals/ijaip/ShuklaKK22"}, "url":"URL#638975" }, { "@score":"1", "@id":"638976", "info":{"authors":{"author":[{"@pid":"320/2402","text":"K. Sindhu"},{"@pid":"26/7216","text":"H. S. Guruprasad"}]},"title":"Computational offloading framework using caching and cloud service selection in mobile cloud computing.","venue":"Int. J. Adv. Intell. Paradigms","volume":"21","number":"3/4","pages":"189-210","year":"2022","type":"Journal Articles","access":"closed","key":"journals/ijaip/SindhuG22","doi":"10.1504/IJAIP.2022.122223","ee":"https://doi.org/10.1504/IJAIP.2022.122223","url":"https://dblp.org/rec/journals/ijaip/SindhuG22"}, "url":"URL#638976" }, { "@score":"1", "@id":"638977", "info":{"authors":{"author":[{"@pid":"254/4482","text":"Kranthi Kumar Singamaneni"},{"@pid":"185/7948","text":"P. Sanyasi Naidu"}]},"title":"An efficient quantum hash-based CP-ABE framework on cloud storage data.","venue":"Int. J. Adv. Intell. Paradigms","volume":"22","number":"3/4","pages":"336-347","year":"2022","type":"Journal Articles","access":"closed","key":"journals/ijaip/SingamaneniN22","doi":"10.1504/IJAIP.2022.124317","ee":"https://doi.org/10.1504/IJAIP.2022.124317","url":"https://dblp.org/rec/journals/ijaip/SingamaneniN22"}, "url":"URL#638977" }, { "@score":"1", "@id":"638978", "info":{"authors":{"author":[{"@pid":"322/3414","text":"Mansi Somani"},{"@pid":"99/10820","text":"Mamatha Balachandra"}]},"title":"Detection of phishing websites using data mining tools and techniques.","venue":"Int. J. Adv. Intell. Paradigms","volume":"22","number":"1/2","pages":"167-183","year":"2022","type":"Journal Articles","access":"closed","key":"journals/ijaip/SomaniB22","doi":"10.1504/IJAIP.2022.123021","ee":"https://doi.org/10.1504/IJAIP.2022.123021","url":"https://dblp.org/rec/journals/ijaip/SomaniB22"}, "url":"URL#638978" }, { "@score":"1", "@id":"638979", "info":{"authors":{"author":[{"@pid":"323/9594","text":"A. L. Sreenivasulu"},{"@pid":"96/10964","text":"P. Chenna Reddy"}]},"title":"An enhanced secure data aggregation routing protocol for sensor networks.","venue":"Int. J. Adv. Intell. Paradigms","volume":"23","number":"3/4","pages":"306-317","year":"2022","type":"Journal Articles","access":"closed","key":"journals/ijaip/SreenivasuluR22","doi":"10.1504/IJAIP.2022.10051387","ee":"https://doi.org/10.1504/IJAIP.2022.10051387","url":"https://dblp.org/rec/journals/ijaip/SreenivasuluR22"}, "url":"URL#638979" }, { "@score":"1", "@id":"638980", "info":{"authors":{"author":[{"@pid":"322/3309","text":"Putta Srivani"},{"@pid":"16/5384","text":"Ramachandram Sirandas"},{"@pid":"322/3392","text":"Rangu Sridevi"}]},"title":"Multi-key searchable encryption technique for index-based searching.","venue":"Int. J. Adv. Intell. Paradigms","volume":"22","number":"1/2","pages":"84-98","year":"2022","type":"Journal Articles","access":"closed","key":"journals/ijaip/SrivaniSS22","doi":"10.1504/IJAIP.2022.123017","ee":"https://doi.org/10.1504/IJAIP.2022.123017","url":"https://dblp.org/rec/journals/ijaip/SrivaniSS22"}, "url":"URL#638980" }, { "@score":"1", "@id":"638981", "info":{"authors":{"author":[{"@pid":"210/7470","text":"R. M. D. Sundaram"},{"@pid":"198/4011","text":"Shriram K. Vasudevan"}]},"title":"Marker and modified graph cut algorithm for augmented reality gaming.","venue":"Int. J. Adv. Intell. Paradigms","volume":"22","number":"1/2","pages":"37-53","year":"2022","type":"Journal Articles","access":"closed","key":"journals/ijaip/SundaramV22","doi":"10.1504/IJAIP.2022.123014","ee":"https://doi.org/10.1504/IJAIP.2022.123014","url":"https://dblp.org/rec/journals/ijaip/SundaramV22"}, "url":"URL#638981" }, { "@score":"1", "@id":"638982", "info":{"authors":{"author":{"@pid":"117/7295","text":"Surafel Luleseged Tilahun"}},"title":"Swarm intelligence for a single source product distribution.","venue":"Int. J. Adv. Intell. Paradigms","volume":"21","number":"1/2","pages":"87-99","year":"2022","type":"Journal Articles","access":"closed","key":"journals/ijaip/Tilahun22","doi":"10.1504/IJAIP.2022.121031","ee":"https://doi.org/10.1504/IJAIP.2022.121031","url":"https://dblp.org/rec/journals/ijaip/Tilahun22"}, "url":"URL#638982" }, { "@score":"1", "@id":"638983", "info":{"authors":{"author":[{"@pid":"147/4875-1","text":"Imen Trabelsi 0001"},{"@pid":"72/6246","text":"Med Salim Bouhlel"}]},"title":"Cross-corpus classification of affective speech.","venue":"Int. J. Adv. Intell. Paradigms","volume":"22","number":"3/4","pages":"229-239","year":"2022","type":"Journal Articles","access":"closed","key":"journals/ijaip/TrabelsiB22","doi":"10.1504/IJAIP.2022.124312","ee":"https://doi.org/10.1504/IJAIP.2022.124312","url":"https://dblp.org/rec/journals/ijaip/TrabelsiB22"}, "url":"URL#638983" }, { "@score":"1", "@id":"638984", "info":{"authors":{"author":[{"@pid":"229/7274","text":"Abha Trivedi"},{"@pid":"74/1897","text":"Mayank Pandey"}]},"title":"Testing and evaluation of crowd management strategies at religious gatherings in India using agent-based modelling and simulation.","venue":"Int. J. Adv. Intell. Paradigms","volume":"22","number":"3/4","pages":"379-415","year":"2022","type":"Journal Articles","access":"closed","key":"journals/ijaip/TrivediP22","doi":"10.1504/IJAIP.2022.124320","ee":"https://doi.org/10.1504/IJAIP.2022.124320","url":"https://dblp.org/rec/journals/ijaip/TrivediP22"}, "url":"URL#638984" }, { "@score":"1", "@id":"638985", "info":{"authors":{"author":{"@pid":"22/6113","text":"Jeffrey W. Tweedale"}},"title":"Using Lego EV3 to explore robotic concepts in a laboratory.","venue":"Int. J. Adv. Intell. Paradigms","volume":"21","number":"3/4","pages":"330-347","year":"2022","type":"Journal Articles","access":"closed","key":"journals/ijaip/Tweedale22","doi":"10.1504/IJAIP.2022.122188","ee":"https://doi.org/10.1504/IJAIP.2022.122188","url":"https://dblp.org/rec/journals/ijaip/Tweedale22"}, "url":"URL#638985" }, { "@score":"1", "@id":"638986", "info":{"authors":{"author":[{"@pid":"198/4011","text":"Shriram K. Vasudevan"},{"@pid":"138/1074","text":"P. L. K. Priyadarsini"},{"@pid":"210/7470","text":"R. M. D. Sundaram"}]},"title":"An efficient approach towards building CBIR-based search engine for embedded computing board.","venue":"Int. J. Adv. Intell. Paradigms","volume":"23","number":"3/4","pages":"318-331","year":"2022","type":"Journal Articles","access":"closed","key":"journals/ijaip/VasudevanPS22","doi":"10.1504/IJAIP.2022.10051388","ee":"https://doi.org/10.1504/IJAIP.2022.10051388","url":"https://dblp.org/rec/journals/ijaip/VasudevanPS22"}, "url":"URL#638986" }, { "@score":"1", "@id":"638987", "info":{"authors":{"author":[{"@pid":"17/1666","text":"S. Vijayakumar"},{"@pid":"144/0715","text":"V. Santhi"}]},"title":"Speckle noise reduction in SAR images using type-II neuro-fuzzy approach.","venue":"Int. J. Adv. Intell. Paradigms","volume":"23","number":"3/4","pages":"276-293","year":"2022","type":"Journal Articles","access":"closed","key":"journals/ijaip/VijayakumarS22","doi":"10.1504/IJAIP.2021.10036168","ee":"https://doi.org/10.1504/IJAIP.2021.10036168","url":"https://dblp.org/rec/journals/ijaip/VijayakumarS22"}, "url":"URL#638987" }, { "@score":"1", "@id":"638988", "info":{"authors":{"author":[{"@pid":"282/1850","text":"Jay Kant Pratap Singh Yadav"},{"@pid":"137/9802-1","text":"Arun Kumar Yadav 0001"},{"@pid":"93/4897","text":"Divakar Yadav"},{"@pid":"227/8812","text":"Vikash Yadav"}]},"title":"Optimisation of Hopfield networks for storage and recall: a decade review.","venue":"Int. J. Adv. Intell. Paradigms","volume":"21","number":"3/4","pages":"321-329","year":"2022","type":"Journal Articles","access":"closed","key":"journals/ijaip/YadavYYY22","doi":"10.1504/IJAIP.2022.122197","ee":"https://doi.org/10.1504/IJAIP.2022.122197","url":"https://dblp.org/rec/journals/ijaip/YadavYYY22"}, "url":"URL#638988" }, { "@score":"1", "@id":"1114579", "info":{"authors":{"author":[{"@pid":"135/8849","text":"Samir Abdelmalek"},{"@pid":"67/9796","text":"Ahmad Taher Azar"},{"@pid":"164/2751","text":"Djalel Dib"}]},"title":"Fuzzy fault-tolerant control for doubly fed induction generator in wind energy conversion system.","venue":"Int. J. Adv. Intell. Paradigms","volume":"20","number":"1/2","pages":"38-57","year":"2021","type":"Journal Articles","access":"closed","key":"journals/ijaip/AbdelmalekAD21","doi":"10.1504/IJAIP.2021.117608","ee":"https://doi.org/10.1504/IJAIP.2021.117608","url":"https://dblp.org/rec/journals/ijaip/AbdelmalekAD21"}, "url":"URL#1114579" }, { "@score":"1", "@id":"1114580", "info":{"authors":{"author":[{"@pid":"20/9131","text":"Neha Agarwal"},{"@pid":"14/9100","text":"Ajay Rana"},{"@pid":"231/8473","text":"Jai Prakash Pandey"}]},"title":"An efficient and optimised approach for secured file sharing in cloud computing.","venue":"Int. J. Adv. Intell. Paradigms","volume":"18","number":"2","pages":"232-246","year":"2021","type":"Journal Articles","access":"closed","key":"journals/ijaip/AgarwalRP21","doi":"10.1504/IJAIP.2021.112905","ee":"https://doi.org/10.1504/IJAIP.2021.112905","url":"https://dblp.org/rec/journals/ijaip/AgarwalRP21"}, "url":"URL#1114580" }, { "@score":"1", "@id":"1114581", "info":{"authors":{"author":[{"@pid":"152/3492","text":"Arun Prakash Agrawal"},{"@pid":"51/6755","text":"Arvinder Kaur"}]},"title":"Performance comparison of Bat search and Cuckoo search using software artefact infrastructure repository and regression testing.","venue":"Int. J. Adv. Intell. Paradigms","volume":"18","number":"2","pages":"99-118","year":"2021","type":"Journal Articles","access":"closed","key":"journals/ijaip/AgrawalK21","doi":"10.1504/IJAIP.2021.112899","ee":"https://doi.org/10.1504/IJAIP.2021.112899","url":"https://dblp.org/rec/journals/ijaip/AgrawalK21"}, "url":"URL#1114581" }, { "@score":"1", "@id":"1114582", "info":{"authors":{"author":{"@pid":"184/9399","text":"Bushra Alhijawi"}},"title":"Dominion algorithm - a novel metaheuristic optimisation method.","venue":"Int. J. Adv. Intell. Paradigms","volume":"20","number":"3/4","pages":"221-242","year":"2021","type":"Journal Articles","access":"closed","key":"journals/ijaip/Alhijawi21","doi":"10.1504/IJAIP.2021.119016","ee":"https://doi.org/10.1504/IJAIP.2021.119016","url":"https://dblp.org/rec/journals/ijaip/Alhijawi21"}, "url":"URL#1114582" }, { "@score":"1", "@id":"1114583", "info":{"authors":{"author":[{"@pid":"296/6055","text":"Y. Ambica"},{"@pid":"190/4025","text":"N. Subhash Chandra"}]},"title":"MRI brain segmentation using correlation based on adaptively regularised kernel-based fuzzy C-means clustering.","venue":"Int. J. Adv. Intell. Paradigms","volume":"19","number":"2","pages":"216-232","year":"2021","type":"Journal Articles","access":"closed","key":"journals/ijaip/AmbicaC21","doi":"10.1504/IJAIP.2021.115250","ee":"https://doi.org/10.1504/IJAIP.2021.115250","url":"https://dblp.org/rec/journals/ijaip/AmbicaC21"}, "url":"URL#1114583" }, { "@score":"1", "@id":"1114584", "info":{"authors":{"author":[{"@pid":"300/7427","text":"Ambika"},{"@pid":"133/8678","text":"Rajkumar L. Biradar"}]},"title":"A robust low frequency integer wavelet transform based fractal encryption algorithm for image steganography.","venue":"Int. J. Adv. Intell. Paradigms","volume":"19","number":"3/4","pages":"342-356","year":"2021","type":"Journal Articles","access":"closed","key":"journals/ijaip/AmbikaB21","doi":"10.1504/IJAIP.2021.116355","ee":"https://doi.org/10.1504/IJAIP.2021.116355","url":"https://dblp.org/rec/journals/ijaip/AmbikaB21"}, "url":"URL#1114584" }, { "@score":"1", "@id":"1114585", "info":{"authors":{"author":[{"@pid":"39/10193","text":"Anuja Arora"},{"@pid":"234/0447","text":"Raghav Pangasa"},{"@pid":"234/0467","text":"Somya Goel"},{"@pid":"214/2813","text":"Tribhuwan Kumar Tewari"}]},"title":"Audio acoustic features-based instrument recognition using classification algorithms.","venue":"Int. J. Adv. Intell. Paradigms","volume":"20","number":"1/2","pages":"190-209","year":"2021","type":"Journal Articles","access":"closed","key":"journals/ijaip/AroraPGT21","doi":"10.1504/IJAIP.2021.117615","ee":"https://doi.org/10.1504/IJAIP.2021.117615","url":"https://dblp.org/rec/journals/ijaip/AroraPGT21"}, "url":"URL#1114585" }, { "@score":"1", "@id":"1114586", "info":{"authors":{"author":[{"@pid":"300/7150","text":"N. Asha"},{"@pid":"215/0260","text":"Prasanna Mani"}]},"title":"Literature review on software testing techniques and test suite reduction frameworks/tools.","venue":"Int. J. Adv. Intell. Paradigms","volume":"19","number":"3/4","pages":"438-449","year":"2021","type":"Journal Articles","access":"closed","key":"journals/ijaip/AshaM21","doi":"10.1504/IJAIP.2021.116370","ee":"https://doi.org/10.1504/IJAIP.2021.116370","url":"https://dblp.org/rec/journals/ijaip/AshaM21"}, "url":"URL#1114586" }, { "@score":"1", "@id":"1114587", "info":{"authors":{"author":[{"@pid":"262/7545","text":"Senthil Kumar Babu"},{"@pid":"202/6113","text":"C. V. M. S. N. Pavan Kumar"}]},"title":"Non-dominated sorting particle swarm optimisation for multi-channel cooperative spectrum sensing in heterogeneous green CRNs.","venue":"Int. J. Adv. Intell. Paradigms","volume":"18","number":"1","pages":"25-45","year":"2021","type":"Journal Articles","access":"closed","key":"journals/ijaip/BabuK21","doi":"10.1504/IJAIP.2021.112020","ee":"https://doi.org/10.1504/IJAIP.2021.112020","url":"https://dblp.org/rec/journals/ijaip/BabuK21"}, "url":"URL#1114587" }, { "@score":"1", "@id":"1114588", "info":{"authors":{"author":[{"@pid":"201/8310","text":"Kolluru Suresh Babu"},{"@pid":"88/9569","text":"Srikanth Vemuru"}]},"title":"Secondary user selection for distorted cognitive radio network.","venue":"Int. J. Adv. Intell. Paradigms","volume":"19","number":"2","pages":"185-193","year":"2021","type":"Journal Articles","access":"closed","key":"journals/ijaip/BabuV21","doi":"10.1504/IJAIP.2021.115248","ee":"https://doi.org/10.1504/IJAIP.2021.115248","url":"https://dblp.org/rec/journals/ijaip/BabuV21"}, "url":"URL#1114588" }, { "@score":"1", "@id":"1114589", "info":{"authors":{"author":[{"@pid":"302/6250","text":"Sharana Basappa"},{"@pid":"302/6344","text":"P. Ravi Babu"}]},"title":"A low power architecture for 1D median filter using carry look ahead adder.","venue":"Int. J. Adv. Intell. Paradigms","volume":"20","number":"1/2","pages":"16-37","year":"2021","type":"Journal Articles","access":"closed","key":"journals/ijaip/BasappaB21","doi":"10.1504/IJAIP.2021.117612","ee":"https://doi.org/10.1504/IJAIP.2021.117612","url":"https://dblp.org/rec/journals/ijaip/BasappaB21"}, "url":"URL#1114589" }, { "@score":"1", "@id":"1114590", "info":{"authors":{"author":[{"@pid":"125/1703","text":"Ajit Kumar Behera"},{"@pid":"125/1691","text":"Ch. Sanjeev Kumar Dash"},{"@pid":"24/7644","text":"Mrutyunjaya Panda"},{"@pid":"01/4699","text":"Satchidananda Dehuri"},{"@pid":"83/954","text":"Rajib Mall"}]},"title":"A state-of-the-art neuro-swarm approach for prediction of software reliability.","venue":"Int. J. Adv. Intell. Paradigms","volume":"20","number":"3/4","pages":"296-322","year":"2021","type":"Journal Articles","access":"closed","key":"journals/ijaip/BeheraDPDM21","doi":"10.1504/IJAIP.2021.119020","ee":"https://doi.org/10.1504/IJAIP.2021.119020","url":"https://dblp.org/rec/journals/ijaip/BeheraDPDM21"}, "url":"URL#1114590" }, { "@score":"1", "@id":"1114591", "info":{"authors":{"author":[{"@pid":"132/0571","text":"Amel Bouchemha"},{"@pid":"67/9796","text":"Ahmad Taher Azar"},{"@pid":"208/9646","text":"Laatra Yousfi"},{"@pid":"296/6131","text":"Chouaib Souaidia"},{"@pid":"296/5927","text":"Djallel Dib"}]},"title":"Sensor and sensorless speed control of doubly-fed induction machine.","venue":"Int. J. Adv. Intell. Paradigms","volume":"19","number":"2","pages":"194-215","year":"2021","type":"Journal Articles","access":"closed","key":"journals/ijaip/BouchemhaAYSD21","doi":"10.1504/IJAIP.2021.115249","ee":"https://doi.org/10.1504/IJAIP.2021.115249","url":"https://dblp.org/rec/journals/ijaip/BouchemhaAYSD21"}, "url":"URL#1114591" }, { "@score":"1", "@id":"1114592", "info":{"authors":{"author":[{"@pid":"300/7594","text":"Mazlum Çelik"},{"@pid":"300/7512","text":"Ahmet Keser"},{"@pid":"300/7727","text":"Ümit Körcük Yapici"}]},"title":"The relationship between cultural diversity and cultural intelligence: a cross-cultural research.","venue":"Int. J. Adv. Intell. Paradigms","volume":"19","number":"3/4","pages":"450-469","year":"2021","type":"Journal Articles","access":"closed","key":"journals/ijaip/CelikKY21","doi":"10.1504/IJAIP.2021.116367","ee":"https://doi.org/10.1504/IJAIP.2021.116367","url":"https://dblp.org/rec/journals/ijaip/CelikKY21"}, "url":"URL#1114592" }, { "@score":"1", "@id":"1114593", "info":{"authors":{"author":[{"@pid":"199/3590","text":"Shoba Chandra"},{"@pid":"199/3685","text":"Kiran Kumari Patil"},{"@pid":"199/3600","text":"Suresha Talanki"}]},"title":"Evolutionary cross-layer interactive model for sensor communication.","venue":"Int. J. Adv. Intell. Paradigms","volume":"19","number":"3/4","pages":"328-341","year":"2021","type":"Journal Articles","access":"closed","key":"journals/ijaip/ChandraPT21","doi":"10.1504/IJAIP.2021.116356","ee":"https://doi.org/10.1504/IJAIP.2021.116356","url":"https://dblp.org/rec/journals/ijaip/ChandraPT21"}, "url":"URL#1114593" }, { "@score":"1", "@id":"1114594", "info":{"authors":{"author":[{"@pid":"223/7757","text":"Soma Chatterjee"},{"@pid":"75/3877","text":"Kamal Sarkar"}]},"title":"Machine transliteration using SVM and HMM.","venue":"Int. J. Adv. Intell. Paradigms","volume":"19","number":"1","pages":"3-27","year":"2021","type":"Journal Articles","access":"closed","key":"journals/ijaip/ChatterjeeS21","doi":"10.1504/IJAIP.2021.114584","ee":"https://doi.org/10.1504/IJAIP.2021.114584","url":"https://dblp.org/rec/journals/ijaip/ChatterjeeS21"}, "url":"URL#1114594" }, { "@score":"1", "@id":"1114595", "info":{"authors":{"author":[{"@pid":"196/2787","text":"Karri Chiranjeevi"},{"@pid":"196/2684","text":"Umaranjan Jena"},{"@pid":"84/9321","text":"M. V. Nageswara Rao"}]},"title":"Image compression based on adaptive image thresholding by maximising Shannon or fuzzy entropy using teaching learning based optimisation.","venue":"Int. J. Adv. Intell. Paradigms","volume":"18","number":"2","pages":"193-231","year":"2021","type":"Journal Articles","access":"closed","key":"journals/ijaip/ChiranjeeviJR21","doi":"10.1504/IJAIP.2021.112904","ee":"https://doi.org/10.1504/IJAIP.2021.112904","url":"https://dblp.org/rec/journals/ijaip/ChiranjeeviJR21"}, "url":"URL#1114595" }, { "@score":"1", "@id":"1114596", "info":{"authors":{"author":[{"@pid":"301/5973","text":"Soumyabrata Das"},{"@pid":"179/1146","text":"Tanmoy Malakar"}]},"title":"Optimal capacitor placement and sizing in a distribution system using a competitive swarm optimiser algorithm.","venue":"Int. J. Adv. Intell. Paradigms","volume":"20","number":"1/2","pages":"89-125","year":"2021","type":"Journal Articles","access":"closed","key":"journals/ijaip/DasM21","doi":"10.1504/IJAIP.2021.117610","ee":"https://doi.org/10.1504/IJAIP.2021.117610","url":"https://dblp.org/rec/journals/ijaip/DasM21"}, "url":"URL#1114596" }, { "@score":"1", "@id":"1114597", "info":{"authors":{"author":[{"@pid":"219/9969","text":"Deep Suman Dev"},{"@pid":"163/3070","text":"Himanshu Jaiswal"},{"@pid":"01/6741","text":"Dakshina Ranjan Kisku"}]},"title":"An efficient pattern matching approach using double measures of correlation and rank reduction.","venue":"Int. J. Adv. Intell. Paradigms","volume":"19","number":"1","pages":"42-60","year":"2021","type":"Journal Articles","access":"closed","key":"journals/ijaip/DevJK21","doi":"10.1504/IJAIP.2021.114583","ee":"https://doi.org/10.1504/IJAIP.2021.114583","url":"https://dblp.org/rec/journals/ijaip/DevJK21"}, "url":"URL#1114597" }, { "@score":"1", "@id":"1114598", "info":{"authors":{"author":[{"@pid":"206/7743","text":"Barnali Dey"},{"@pid":"18/5843","text":"Ashraf Hossain"},{"@pid":"22/44","text":"Rabindranath Bera"}]},"title":"Possible adoption of various machine learning techniques in cognitive radio - a survey.","venue":"Int. J. Adv. Intell. Paradigms","volume":"18","number":"4","pages":"439-463","year":"2021","type":"Journal Articles","access":"closed","key":"journals/ijaip/DeyHB21","doi":"10.1504/IJAIP.2021.113782","ee":"https://doi.org/10.1504/IJAIP.2021.113782","url":"https://dblp.org/rec/journals/ijaip/DeyHB21"}, "url":"URL#1114598" }, { "@score":"1", "@id":"1114599", "info":{"authors":{"author":[{"@pid":"300/7686","text":"D. Gandhimathi"},{"@pid":"237/4021","text":"A. John Sanjeev Kumar"}]},"title":"Prediction of Nth friends using spatial data mining in social networks.","venue":"Int. J. Adv. Intell. Paradigms","volume":"19","number":"3/4","pages":"410-421","year":"2021","type":"Journal Articles","access":"closed","key":"journals/ijaip/GandhimathiK21","doi":"10.1504/IJAIP.2021.116368","ee":"https://doi.org/10.1504/IJAIP.2021.116368","url":"https://dblp.org/rec/journals/ijaip/GandhimathiK21"}, "url":"URL#1114599" }, { "@score":"1", "@id":"1114600", "info":{"authors":{"author":[{"@pid":"88/9811","text":"Ranjit Ghoshal"},{"@pid":"209/1871","text":"Sayan Das"},{"@pid":"209/1709","text":"Aditya Saha"}]},"title":"A new image binarisation technique for segmentation of text from digital images.","venue":"Int. J. Adv. Intell. Paradigms","volume":"19","number":"1","pages":"84-100","year":"2021","type":"Journal Articles","access":"closed","key":"journals/ijaip/GhoshalDS21","doi":"10.1504/IJAIP.2021.114585","ee":"https://doi.org/10.1504/IJAIP.2021.114585","url":"https://dblp.org/rec/journals/ijaip/GhoshalDS21"}, "url":"URL#1114600" }, { "@score":"1", "@id":"1114601", "info":{"authors":{"author":[{"@pid":"209/2493","text":"Dhanalekshmi Gopinathan"},{"@pid":"84/7998","text":"Krishna Asawa"}]},"title":"An efficient prefix based labelling scheme for dynamic update of XML documents.","venue":"Int. J. Adv. Intell. Paradigms","volume":"18","number":"4","pages":"464-480","year":"2021","type":"Journal Articles","access":"closed","key":"journals/ijaip/GopinathanA21","doi":"10.1504/IJAIP.2021.113783","ee":"https://doi.org/10.1504/IJAIP.2021.113783","url":"https://dblp.org/rec/journals/ijaip/GopinathanA21"}, "url":"URL#1114601" }, { "@score":"1", "@id":"1114602", "info":{"authors":{"author":{"@pid":"98/194","text":"Kieran Greer"}},"title":"A brain-like cognitive process with shared methods.","venue":"Int. J. Adv. Intell. Paradigms","volume":"18","number":"4","pages":"481-501","year":"2021","type":"Journal Articles","access":"closed","key":"journals/ijaip/Greer21","doi":"10.1504/IJAIP.2021.113784","ee":"https://doi.org/10.1504/IJAIP.2021.113784","url":"https://dblp.org/rec/journals/ijaip/Greer21"}, "url":"URL#1114602" }, { "@score":"1", "@id":"1114603", "info":{"authors":{"author":[{"@pid":"67/2583","text":"Amit Gupta"},{"@pid":"227/8812","text":"Vikash Yadav"},{"@pid":"98/8773","text":"Bipin Kumar Tripathi"},{"@pid":"88/3620","text":"Vivek Srivastava"}]},"title":"Hybrid intelligence model on the second generation neural network.","venue":"Int. J. Adv. Intell. Paradigms","volume":"18","number":"3","pages":"398-416","year":"2021","type":"Journal Articles","access":"closed","key":"journals/ijaip/GuptaYTS21","doi":"10.1504/IJAIP.2021.113334","ee":"https://doi.org/10.1504/IJAIP.2021.113334","url":"https://dblp.org/rec/journals/ijaip/GuptaYTS21"}, "url":"URL#1114603" }, { "@score":"1", "@id":"1114604", "info":{"authors":{"author":[{"@pid":"98/9607","text":"Hamid Hamiche"},{"@pid":"136/2895","text":"Karim Kemih"},{"@pid":"16/8535","text":"Sid-Ali Addouche"},{"@pid":"67/9796","text":"Ahmad Taher Azar"},{"@pid":"208/9880","text":"Rafik Saddaoui"},{"@pid":"209/0132","text":"Mourad Laghrouche"}]},"title":"Hardware implementation of a new chaotic secured transmission system.","venue":"Int. J. Adv. Intell. Paradigms","volume":"20","number":"1/2","pages":"58-88","year":"2021","type":"Journal Articles","access":"closed","key":"journals/ijaip/HamicheKAASL21","doi":"10.1504/IJAIP.2021.117609","ee":"https://doi.org/10.1504/IJAIP.2021.117609","url":"https://dblp.org/rec/journals/ijaip/HamicheKAASL21"}, "url":"URL#1114604" }, { "@score":"1", "@id":"1114605", "info":{"authors":{"author":[{"@pid":"23/3578","text":"Mustafa Hammad"},{"@pid":"04/5891","text":"Maen Hammad"},{"@pid":"290/3771","text":"Batool Horani"},{"@pid":"169/3260","text":"Sari Awwad"}]},"title":"Mining historical changes to predict software evolution.","venue":"Int. J. Adv. Intell. Paradigms","volume":"18","number":"4","pages":"502-515","year":"2021","type":"Journal Articles","access":"closed","key":"journals/ijaip/HammadHHA21","doi":"10.1504/IJAIP.2021.113785","ee":"https://doi.org/10.1504/IJAIP.2021.113785","url":"https://dblp.org/rec/journals/ijaip/HammadHHA21"}, "url":"URL#1114605" }, { "@score":"1", "@id":"1114606", "info":{"authors":{"author":{"@pid":"248/7045","text":"Mousum Handique"}},"title":"Construction of complete minimal test set for single intra-level bridging and stuck-at faults in reversible circuits.","venue":"Int. J. Adv. Intell. Paradigms","volume":"18","number":"3","pages":"373-397","year":"2021","type":"Journal Articles","access":"closed","key":"journals/ijaip/Handique21","doi":"10.1504/IJAIP.2021.113333","ee":"https://doi.org/10.1504/IJAIP.2021.113333","url":"https://dblp.org/rec/journals/ijaip/Handique21"}, "url":"URL#1114606" }, { "@score":"1", "@id":"1114607", "info":{"authors":{"author":[{"@pid":"171/1301","text":"Ali Kadhum Idrees"},{"@pid":"189/7606","text":"Wathiq Laftah Al-Yaseen"}]},"title":"Distributed genetic algorithm for lifetime coverage optimisation in wireless sensor networks.","venue":"Int. J. Adv. Intell. Paradigms","volume":"18","number":"1","pages":"3-24","year":"2021","type":"Journal Articles","access":"closed","key":"journals/ijaip/IdreesA21","doi":"10.1504/IJAIP.2021.112019","ee":"https://doi.org/10.1504/IJAIP.2021.112019","url":"https://dblp.org/rec/journals/ijaip/IdreesA21"}, "url":"URL#1114607" }, { "@score":"1", "@id":"1114608", "info":{"authors":{"author":[{"@pid":"296/5798","text":"Richa Jindal"},{"@pid":"296/6253","text":"Sanjay Singla"}]},"title":"Ant colony optimisation for latent fingerprint matching.","venue":"Int. J. Adv. Intell. Paradigms","volume":"19","number":"2","pages":"161-184","year":"2021","type":"Journal Articles","access":"closed","key":"journals/ijaip/JindalS21","doi":"10.1504/IJAIP.2021.115247","ee":"https://doi.org/10.1504/IJAIP.2021.115247","url":"https://dblp.org/rec/journals/ijaip/JindalS21"}, "url":"URL#1114608" }, { "@score":"1", "@id":"1114609", "info":{"authors":{"author":[{"@pid":"207/9288","text":"Lakshmana Rao Kalabarige"},{"@pid":"209/8159","text":"Sireesha Rodda"},{"@pid":"35/666","text":"Shanti Chilukuri"}]},"title":"On the convergence and optimality of the firefly algorithm for opportunistic spectrum access.","venue":"Int. J. Adv. Intell. Paradigms","volume":"18","number":"2","pages":"119-133","year":"2021","type":"Journal Articles","access":"closed","key":"journals/ijaip/KalabarigeRC21","doi":"10.1504/IJAIP.2021.112900","ee":"https://doi.org/10.1504/IJAIP.2021.112900","url":"https://dblp.org/rec/journals/ijaip/KalabarigeRC21"}, "url":"URL#1114609" }, { "@score":"1", "@id":"1114610", "info":{"authors":{"author":[{"@pid":"238/4756","text":"R. Karthick"},{"@pid":"271/6082","text":"M. Sundar Rajan"}]},"title":"SPIDER-based out-of-order execution scheme for Ht-MPSOC.","venue":"Int. J. Adv. Intell. Paradigms","volume":"19","number":"1","pages":"28-41","year":"2021","type":"Journal Articles","access":"closed","key":"journals/ijaip/KarthickR21","doi":"10.1504/IJAIP.2021.114581","ee":"https://doi.org/10.1504/IJAIP.2021.114581","url":"https://dblp.org/rec/journals/ijaip/KarthickR21"}, "url":"URL#1114610" }, { "@score":"1", "@id":"1114611", "info":{"authors":{"author":[{"@pid":"152/4225","text":"Uzair Khan"},{"@pid":"227/8812","text":"Vikash Yadav"}]},"title":"A study based on structural needs and smart tools using IoT for developing a smart city.","venue":"Int. J. Adv. Intell. Paradigms","volume":"20","number":"1/2","pages":"210-220","year":"2021","type":"Journal Articles","access":"closed","key":"journals/ijaip/KhanY21","doi":"10.1504/IJAIP.2021.117617","ee":"https://doi.org/10.1504/IJAIP.2021.117617","url":"https://dblp.org/rec/journals/ijaip/KhanY21"}, "url":"URL#1114611" }, { "@score":"1", "@id":"1114612", "info":{"authors":{"author":[{"@pid":"149/1535","text":"B. Suresh Kumar"},{"@pid":"251/2443","text":"Deepshikha Bhargava"},{"@pid":"96/9189","text":"Arpan Kumar Kar"},{"@pid":"279/0064","text":"Chinwe Peace Igiri"}]},"title":"Rock Hyrax intelligent optimisation algorithm: an exploration for Web 3.0 domain selection.","venue":"Int. J. Adv. Intell. Paradigms","volume":"20","number":"3/4","pages":"243-263","year":"2021","type":"Journal Articles","access":"closed","key":"journals/ijaip/KumarBKI21","doi":"10.1504/IJAIP.2021.119017","ee":"https://doi.org/10.1504/IJAIP.2021.119017","url":"https://dblp.org/rec/journals/ijaip/KumarBKI21"}, "url":"URL#1114612" }, { "@score":"1", "@id":"1114613", "info":{"authors":{"author":[{"@pid":"286/1010","text":"Astitva Kumar"},{"@pid":"286/1475","text":"Mohammad Momin Rizwan"},{"@pid":"286/0822","text":"Uma Nangia"}]},"title":"Development of ANFIS-based algorithm for MPPT controller for standalone photovoltaic system.","venue":"Int. J. Adv. Intell. Paradigms","volume":"18","number":"2","pages":"247-264","year":"2021","type":"Journal Articles","access":"closed","key":"journals/ijaip/KumarRN21","doi":"10.1504/IJAIP.2021.112906","ee":"https://doi.org/10.1504/IJAIP.2021.112906","url":"https://dblp.org/rec/journals/ijaip/KumarRN21"}, "url":"URL#1114613" }, { "@score":"1", "@id":"1114614", "info":{"authors":{"author":[{"@pid":"300/7217","text":"M. S. Pradeep Kumar"},{"@pid":"300/7102","text":"Krishnappa Suresh"}]},"title":"Disabled person emotion recognition in EEG signal using deep neural network.","venue":"Int. J. Adv. Intell. Paradigms","volume":"19","number":"3/4","pages":"295-313","year":"2021","type":"Journal Articles","access":"closed","key":"journals/ijaip/KumarS21","doi":"10.1504/IJAIP.2021.116358","ee":"https://doi.org/10.1504/IJAIP.2021.116358","url":"https://dblp.org/rec/journals/ijaip/KumarS21"}, "url":"URL#1114614" }, { "@score":"1", "@id":"1114615", "info":{"authors":{"author":[{"@pid":"92/5081","text":"Rahul Kumar"},{"@pid":"78/5502","text":"Pijush Samui"},{"@pid":"52/7108","text":"Sunita Kumari"},{"@pid":"121/2429","text":"Sanjiban Sekhar Roy"}]},"title":"Determination of reliability index of cantilever retaining wall by RVM, MPMR and MARS.","venue":"Int. J. Adv. Intell. Paradigms","volume":"18","number":"3","pages":"316-336","year":"2021","type":"Journal Articles","access":"closed","key":"journals/ijaip/KumarSKR21","doi":"10.1504/IJAIP.2021.113325","ee":"https://doi.org/10.1504/IJAIP.2021.113325","url":"https://dblp.org/rec/journals/ijaip/KumarSKR21"}, "url":"URL#1114615" }, { "@score":"1", "@id":"1114616", "info":{"authors":{"author":[{"@pid":"249/8501","text":"G. Vimala Kumari"},{"@pid":"94/8282","text":"G. Sasibhushana Rao"},{"@pid":"17/7499","text":"B. Prabhakara Rao 0001"}]},"title":"Flower pollination-based K-means algorithm for medical image compression.","venue":"Int. J. Adv. Intell. Paradigms","volume":"18","number":"2","pages":"171-192","year":"2021","type":"Journal Articles","access":"closed","key":"journals/ijaip/KumariRR21","doi":"10.1504/IJAIP.2021.112903","ee":"https://doi.org/10.1504/IJAIP.2021.112903","url":"https://dblp.org/rec/journals/ijaip/KumariRR21"}, "url":"URL#1114616" }, { "@score":"1", "@id":"1114617", "info":{"authors":{"author":[{"@pid":"240/6161","text":"Suman Madan"},{"@pid":"79/8824","text":"Puneet Goswami"}]},"title":"Hybrid privacy preservation model for big data publishing on cloud.","venue":"Int. J. Adv. Intell. Paradigms","volume":"20","number":"3/4","pages":"343-355","year":"2021","type":"Journal Articles","access":"closed","key":"journals/ijaip/MadanG21","doi":"10.1504/IJAIP.2021.119022","ee":"https://doi.org/10.1504/IJAIP.2021.119022","url":"https://dblp.org/rec/journals/ijaip/MadanG21"}, "url":"URL#1114617" }, { "@score":"1", "@id":"1114618", "info":{"authors":{"author":[{"@pid":"302/6403","text":"E. Kiruba Nesa Malar"},{"@pid":"75/8423","text":"C. P. Chandran"}]},"title":"Clustering analysis on molecular docking with swarm intelligence.","venue":"Int. J. Adv. Intell. Paradigms","volume":"20","number":"1/2","pages":"138-157","year":"2021","type":"Journal Articles","access":"closed","key":"journals/ijaip/MalarC21","doi":"10.1504/IJAIP.2021.117616","ee":"https://doi.org/10.1504/IJAIP.2021.117616","url":"https://dblp.org/rec/journals/ijaip/MalarC21"}, "url":"URL#1114618" }, { "@score":"1", "@id":"1114619", "info":{"authors":{"author":[{"@pid":"290/2912","text":"Subhrapratim Nath"},{"@pid":"50/6817","text":"Subir Kumar Sarkar"}]},"title":"Metaheuristics-based routing optimisation, balanced workload distribution and security strategy in IoT environment.","venue":"Int. J. Adv. Intell. Paradigms","volume":"19","number":"1","pages":"101-117","year":"2021","type":"Journal Articles","access":"closed","key":"journals/ijaip/NathS21","doi":"10.1504/IJAIP.2021.114586","ee":"https://doi.org/10.1504/IJAIP.2021.114586","url":"https://dblp.org/rec/journals/ijaip/NathS21"}, "url":"URL#1114619" }, { "@score":"1", "@id":"1114620", "info":{"authors":{"author":[{"@pid":"209/5178","text":"Desabandhu Parasuraman"},{"@pid":"93/8037","text":"Sathiyamoorthy Elumalai"}]},"title":"Improving the accuracy of item recommendations by combining collaborative and content-based recommendations: a hybrid approach.","venue":"Int. J. Adv. Intell. Paradigms","volume":"19","number":"3/4","pages":"262-270","year":"2021","type":"Journal Articles","access":"closed","key":"journals/ijaip/ParasuramanE21","doi":"10.1504/IJAIP.2021.116361","ee":"https://doi.org/10.1504/IJAIP.2021.116361","url":"https://dblp.org/rec/journals/ijaip/ParasuramanE21"}, "url":"URL#1114620" }, { "@score":"1", "@id":"1114621", "info":{"authors":{"author":[{"@pid":"307/8822","text":"T. Vishal Patro"},{"@pid":"42/7690","text":"M. Gayathri"},{"@pid":"55/8836","text":"C. Malathy 0001"}]},"title":"Smart mirror with biometric authentication.","venue":"Int. J. Adv. Intell. Paradigms","volume":"20","number":"3/4","pages":"356-362","year":"2021","type":"Journal Articles","access":"closed","key":"journals/ijaip/PatroGM21","doi":"10.1504/IJAIP.2021.119023","ee":"https://doi.org/10.1504/IJAIP.2021.119023","url":"https://dblp.org/rec/journals/ijaip/PatroGM21"}, "url":"URL#1114621" }, { "@score":"1", "@id":"1114622", "info":{"authors":{"author":[{"@pid":"211/4322","text":"Priyadarshini Adyasha Pattanaik"},{"@pid":"126/7801","text":"Tripti Swarnkar"},{"@pid":"87/9885","text":"Debabala Swain"}]},"title":"Deep filter bridge for malaria identification and classification in microscopic blood smear images.","venue":"Int. J. Adv. Intell. Paradigms","volume":"20","number":"1/2","pages":"126-137","year":"2021","type":"Journal Articles","access":"closed","key":"journals/ijaip/PattanaikSS21","doi":"10.1504/IJAIP.2021.117611","ee":"https://doi.org/10.1504/IJAIP.2021.117611","url":"https://dblp.org/rec/journals/ijaip/PattanaikSS21"}, "url":"URL#1114622" }, { "@score":"1", "@id":"1114623", "info":{"authors":{"author":[{"@pid":"215/6502","text":"Shuvashish Paul"},{"@pid":"215/6660","text":"Ashik Mostafa Alvi"},{"@pid":"69/6511","text":"Rashedur M. Rahman"}]},"title":"An analysis of the most accident prone regions within the Dhaka Metropolitan Region using clustering.","venue":"Int. J. Adv. Intell. Paradigms","volume":"18","number":"3","pages":"294-315","year":"2021","type":"Journal Articles","access":"closed","key":"journals/ijaip/PaulAR21","doi":"10.1504/IJAIP.2021.113324","ee":"https://doi.org/10.1504/IJAIP.2021.113324","url":"https://dblp.org/rec/journals/ijaip/PaulAR21"}, "url":"URL#1114623" }, { "@score":"1", "@id":"1114624", "info":{"authors":{"author":[{"@pid":"251/8087","text":"M. D. Anto Praveena"},{"@pid":"176/3054","text":"B. Bharathi"}]},"title":"A hybrid feature selection algorithm for big data dimensionality reduction.","venue":"Int. J. Adv. Intell. Paradigms","volume":"19","number":"3/4","pages":"380-392","year":"2021","type":"Journal Articles","access":"closed","key":"journals/ijaip/PraveenaB21","doi":"10.1504/IJAIP.2021.116363","ee":"https://doi.org/10.1504/IJAIP.2021.116363","url":"https://dblp.org/rec/journals/ijaip/PraveenaB21"}, "url":"URL#1114624" }, { "@score":"1", "@id":"1114625", "info":{"authors":{"author":[{"@pid":"288/1332","text":"Hirald Dwaraka Praveena"},{"@pid":"79/10735","text":"Chennapalli Subhas"},{"@pid":"54/10736","text":"K. Rama Naidu"}]},"title":"Classification and discrimination of focal and non-focal EEG signals using hybrid features and support vector machine.","venue":"Int. J. Adv. Intell. Paradigms","volume":"18","number":"3","pages":"417-437","year":"2021","type":"Journal Articles","access":"closed","key":"journals/ijaip/PraveenaSN21","doi":"10.1504/IJAIP.2021.113335","ee":"https://doi.org/10.1504/IJAIP.2021.113335","url":"https://dblp.org/rec/journals/ijaip/PraveenaSN21"}, "url":"URL#1114625" }, { "@score":"1", "@id":"1114626", "info":{"authors":{"author":[{"@pid":"56/8802","text":"Mayur Rahul"},{"@pid":"223/9231","text":"Narendra Kohli"},{"@pid":"17/7859","text":"Rashi Agarwal"}]},"title":"Facial expression recognition using local multidirectional score pattern descriptor and modified hidden Markov model.","venue":"Int. J. Adv. Intell. Paradigms","volume":"18","number":"4","pages":"538-551","year":"2021","type":"Journal Articles","access":"closed","key":"journals/ijaip/RahulKA21","doi":"10.1504/IJAIP.2021.113787","ee":"https://doi.org/10.1504/IJAIP.2021.113787","url":"https://dblp.org/rec/journals/ijaip/RahulKA21"}, "url":"URL#1114626" }, { "@score":"1", "@id":"1114627", "info":{"authors":{"author":[{"@pid":"28/4113","text":"B. Rajendran"},{"@pid":"300/7863","text":"Saravanan Venkataraman"}]},"title":"Detection of malicious network traffic using enhanced neural network algorithm in big data.","venue":"Int. J. Adv. Intell. Paradigms","volume":"19","number":"3/4","pages":"370-379","year":"2021","type":"Journal Articles","access":"closed","key":"journals/ijaip/RajendranV21","doi":"10.1504/IJAIP.2021.116366","ee":"https://doi.org/10.1504/IJAIP.2021.116366","url":"https://dblp.org/rec/journals/ijaip/RajendranV21"}, "url":"URL#1114627" }, { "@score":"1", "@id":"1114628", "info":{"authors":{"author":[{"@pid":"190/3957","text":"Arathi G. Rajendran"},{"@pid":"41/9767","text":"Asha Vijayan"},{"@pid":"27/10863","text":"Chaitanya Medini"},{"@pid":"11/9767","text":"Bipin Nair"},{"@pid":"04/9716","text":"Shyam Diwakar"}]},"title":"Computational modelling of cerebellum granule neuron temporal responses for auditory and visual stimuli.","venue":"Int. J. Adv. Intell. Paradigms","volume":"18","number":"3","pages":"356-372","year":"2021","type":"Journal Articles","access":"closed","key":"journals/ijaip/RajendranVMND21","doi":"10.1504/IJAIP.2021.113327","ee":"https://doi.org/10.1504/IJAIP.2021.113327","url":"https://dblp.org/rec/journals/ijaip/RajendranVMND21"}, "url":"URL#1114628" }, { "@score":"1", "@id":"1114629", "info":{"authors":{"author":[{"@pid":"253/6734","text":"Sudha Rajesh"},{"@pid":"134/9288-2","text":"A. Chandrasekar 0002"}]},"title":"Evaluation of quality attributes of software design patterns using association rules.","venue":"Int. J. Adv. Intell. Paradigms","volume":"19","number":"3/4","pages":"314-327","year":"2021","type":"Journal Articles","access":"closed","key":"journals/ijaip/RajeshC21","doi":"10.1504/IJAIP.2021.116357","ee":"https://doi.org/10.1504/IJAIP.2021.116357","url":"https://dblp.org/rec/journals/ijaip/RajeshC21"}, "url":"URL#1114629" }, { "@score":"1", "@id":"1114630", "info":{"authors":{"author":[{"@pid":"290/3597","text":"D. Sharath Babu Rao"},{"@pid":"48/9551","text":"V. Sumalatha"}]},"title":"A prominent approach to design low noise amplifiers for 802.11 wireless receiver frontends.","venue":"Int. J. Adv. Intell. Paradigms","volume":"18","number":"4","pages":"516-537","year":"2021","type":"Journal Articles","access":"closed","key":"journals/ijaip/RaoS21","doi":"10.1504/IJAIP.2021.113786","ee":"https://doi.org/10.1504/IJAIP.2021.113786","url":"https://dblp.org/rec/journals/ijaip/RaoS21"}, "url":"URL#1114630" }, { "@score":"1", "@id":"1114631", "info":{"authors":{"author":[{"@pid":"121/2429","text":"Sanjiban Sekhar Roy"},{"@pid":"78/5502","text":"Pijush Samui"}]},"title":"Predicting longitudinal dispersion coefficient in natural streams using minimax probability machine regression and multivariate adaptive regression spline.","venue":"Int. J. Adv. Intell. Paradigms","volume":"19","number":"2","pages":"119-127","year":"2021","type":"Journal Articles","access":"closed","key":"journals/ijaip/RoyS21","doi":"10.1504/IJAIP.2021.115244","ee":"https://doi.org/10.1504/IJAIP.2021.115244","url":"https://dblp.org/rec/journals/ijaip/RoyS21"}, "url":"URL#1114631" }, { "@score":"1", "@id":"1114632", "info":{"authors":{"author":[{"@pid":"209/7719","text":"Sovan Saha"},{"@pid":"235/0245","text":"Abhimanyu Prasad"},{"@pid":"124/3458","text":"Piyali Chatterjee"},{"@pid":"29/4599","text":"Subhadip Basu"},{"@pid":"51/3475","text":"Mita Nasipuri"}]},"title":"Modified FPred-Apriori: improving function prediction of target proteins from essential neighbours by finding their association with relevant functional groups using Apriori algorithm.","venue":"Int. J. Adv. Intell. Paradigms","volume":"19","number":"1","pages":"61-83","year":"2021","type":"Journal Articles","access":"closed","key":"journals/ijaip/SahaPCBN21","doi":"10.1504/IJAIP.2021.114582","ee":"https://doi.org/10.1504/IJAIP.2021.114582","url":"https://dblp.org/rec/journals/ijaip/SahaPCBN21"}, "url":"URL#1114632" }, { "@score":"1", "@id":"1114633", "info":{"authors":{"author":[{"@pid":"302/5767","text":"Sohail Saif"},{"@pid":"91/6578","text":"Rajni Gupta"},{"@pid":"63/10124","text":"Suparna Biswas"}]},"title":"A complete secure cloud-based WBAN framework for health data transmission by implementing authenticity, confidentiality and integrity.","venue":"Int. J. Adv. Intell. Paradigms","volume":"20","number":"1/2","pages":"171-189","year":"2021","type":"Journal Articles","access":"closed","key":"journals/ijaip/SaifGB21","doi":"10.1504/IJAIP.2021.117614","ee":"https://doi.org/10.1504/IJAIP.2021.117614","url":"https://dblp.org/rec/journals/ijaip/SaifGB21"}, "url":"URL#1114633" }, { "@score":"1", "@id":"1114634", "info":{"authors":{"author":[{"@pid":"290/3530","text":"Sonia Saini"},{"@pid":"08/4273","text":"S. P. Singh"},{"@pid":"34/6789","text":"Ruchi Agarwal"}]},"title":"Healthcare analytics with R and MongoDB using social media.","venue":"Int. J. Adv. Intell. Paradigms","volume":"18","number":"4","pages":"552-567","year":"2021","type":"Journal Articles","access":"closed","key":"journals/ijaip/SainiSA21","doi":"10.1504/IJAIP.2021.113788","ee":"https://doi.org/10.1504/IJAIP.2021.113788","url":"https://dblp.org/rec/journals/ijaip/SainiSA21"}, "url":"URL#1114634" }, { "@score":"1", "@id":"1114635", "info":{"authors":{"author":[{"@pid":"294/0412","text":"S. Sabeetha Saraswathi"},{"@pid":"253/6699","text":"N. Malarvizhi"}]},"title":"Block level time variant dynamic encryption algorithm for improved cloud security and de-duplication using block level topical similarity.","venue":"Int. J. Adv. Intell. Paradigms","volume":"19","number":"3/4","pages":"271-283","year":"2021","type":"Journal Articles","access":"closed","key":"journals/ijaip/SaraswathiM21","doi":"10.1504/IJAIP.2021.116360","ee":"https://doi.org/10.1504/IJAIP.2021.116360","url":"https://dblp.org/rec/journals/ijaip/SaraswathiM21"}, "url":"URL#1114635" }, { "@score":"1", "@id":"1114636", "info":{"authors":{"author":[{"@pid":"300/7084","text":"R. Annamalai Saravanan"},{"@pid":"93/8147","text":"M. Rajesh Babu"}]},"title":"Information retrieval from multi-domain specific research proposal using hierarchical-based neural network clustering algorithm.","venue":"Int. J. Adv. Intell. Paradigms","volume":"19","number":"3/4","pages":"422-437","year":"2021","type":"Journal Articles","access":"closed","key":"journals/ijaip/SaravananB21","doi":"10.1504/IJAIP.2021.116369","ee":"https://doi.org/10.1504/IJAIP.2021.116369","url":"https://dblp.org/rec/journals/ijaip/SaravananB21"}, "url":"URL#1114636" }, { "@score":"1", "@id":"1114637", "info":{"authors":{"author":[{"@pid":"283/2265","text":"G. Sasikala"},{"@pid":"307/8638","text":"B. Roopesh"},{"@pid":"307/9251","text":"S. V. Charan Sai"},{"@pid":"307/8473","text":"Y. Sathish Kumar"}]},"title":"Energy saving management system in educational buildings.","venue":"Int. J. Adv. Intell. Paradigms","volume":"20","number":"3/4","pages":"363-373","year":"2021","type":"Journal Articles","access":"closed","key":"journals/ijaip/SasikalaRSK21","doi":"10.1504/IJAIP.2021.119024","ee":"https://doi.org/10.1504/IJAIP.2021.119024","url":"https://dblp.org/rec/journals/ijaip/SasikalaRSK21"}, "url":"URL#1114637" }, { "@score":"1", "@id":"1114638", "info":{"authors":{"author":[{"@pid":"203/7418","text":"S. Shaffath Hussain Shakir"},{"@pid":"172/4450-1","text":"A. Rajesh 0001"}]},"title":"Investigations on scheduling algorithms in LTE-advanced networks with carrier aggregation.","venue":"Int. J. Adv. Intell. Paradigms","volume":"18","number":"1","pages":"46-62","year":"2021","type":"Journal Articles","access":"closed","key":"journals/ijaip/ShakirR21","doi":"10.1504/IJAIP.2021.112021","ee":"https://doi.org/10.1504/IJAIP.2021.112021","url":"https://dblp.org/rec/journals/ijaip/ShakirR21"}, "url":"URL#1114638" }, { "@score":"1", "@id":"1114639", "info":{"authors":{"author":[{"@pid":"219/6019","text":"Achyut Shankar"},{"@pid":"228/4567","text":"Natarajan Jaisankar"}]},"title":"Energy efficient cluster head selection for wireless sensor network by improved firefly optimisation.","venue":"Int. J. Adv. Intell. Paradigms","volume":"19","number":"2","pages":"128-145","year":"2021","type":"Journal Articles","access":"closed","key":"journals/ijaip/ShankarJ21","doi":"10.1504/IJAIP.2021.115245","ee":"https://doi.org/10.1504/IJAIP.2021.115245","url":"https://dblp.org/rec/journals/ijaip/ShankarJ21"}, "url":"URL#1114639" }, { "@score":"1", "@id":"1114640", "info":{"authors":{"author":[{"@pid":"35/9766","text":"Upasana Sharma"},{"@pid":"08/9572","text":"Sunil Kumar Khatri"},{"@pid":"54/3051","text":"L. M. Patnaik"}]},"title":"A supervised learning approach for link prediction in complex social networks.","venue":"Int. J. Adv. Intell. Paradigms","volume":"20","number":"1/2","pages":"1-15","year":"2021","type":"Journal Articles","access":"closed","key":"journals/ijaip/SharmaKP21","doi":"10.1504/IJAIP.2021.117607","ee":"https://doi.org/10.1504/IJAIP.2021.117607","url":"https://dblp.org/rec/journals/ijaip/SharmaKP21"}, "url":"URL#1114640" }, { "@score":"1", "@id":"1114641", "info":{"authors":{"author":[{"@pid":"307/8359","text":"Parveen Kumar Sharma"},{"@pid":"204/8031","text":"Rajiv Mahajan"},{"@pid":"85/6866","text":"Surender Kumar"}]},"title":"Trust-based multi-level secure routing for authentication and authorisation in WMN.","venue":"Int. J. Adv. Intell. Paradigms","volume":"20","number":"3/4","pages":"323-342","year":"2021","type":"Journal Articles","access":"closed","key":"journals/ijaip/SharmaMK21","doi":"10.1504/IJAIP.2021.119021","ee":"https://doi.org/10.1504/IJAIP.2021.119021","url":"https://dblp.org/rec/journals/ijaip/SharmaMK21"}, "url":"URL#1114641" }, { "@score":"1", "@id":"1114642", "info":{"authors":{"author":[{"@pid":"02/99-3","text":"Ashish Sharma 0003"},{"@pid":"42/7531","text":"Anand Singh Jalal"},{"@pid":"25/2574","text":"Krishna Kant"}]},"title":"A two-step clustering method for facility location problem.","venue":"Int. J. Adv. Intell. Paradigms","volume":"18","number":"3","pages":"337-355","year":"2021","type":"Journal Articles","access":"closed","key":"journals/ijaip/SharmaSJK21","doi":"10.1504/IJAIP.2021.113326","ee":"https://doi.org/10.1504/IJAIP.2021.113326","url":"https://dblp.org/rec/journals/ijaip/SharmaSJK21"}, "url":"URL#1114642" }, { "@score":"1", "@id":"1114643", "info":{"authors":{"author":[{"@pid":"300/7245","text":"D. N. Shashidhara"},{"@pid":"125/1604","text":"D. N. Chandrappa"},{"@pid":"70/1614","text":"C. Puttamadappa"}]},"title":"Global cooperative image prefetching in mobile ad hoc networks.","venue":"Int. J. Adv. Intell. Paradigms","volume":"19","number":"3/4","pages":"357-369","year":"2021","type":"Journal Articles","access":"closed","key":"journals/ijaip/ShashidharaCP21","doi":"10.1504/IJAIP.2021.116364","ee":"https://doi.org/10.1504/IJAIP.2021.116364","url":"https://dblp.org/rec/journals/ijaip/ShashidharaCP21"}, "url":"URL#1114643" }, { "@score":"1", "@id":"1114644", "info":{"authors":{"author":[{"@pid":"296/6094","text":"Nayana P. Shetty"},{"@pid":"296/6163","text":"R. L. Chakrasali"}]},"title":"Intentional/un-intentional islanding control strategy for distributed generation system.","venue":"Int. J. Adv. Intell. Paradigms","volume":"19","number":"2","pages":"146-160","year":"2021","type":"Journal Articles","access":"closed","key":"journals/ijaip/ShettyC21","doi":"10.1504/IJAIP.2021.115246","ee":"https://doi.org/10.1504/IJAIP.2021.115246","url":"https://dblp.org/rec/journals/ijaip/ShettyC21"}, "url":"URL#1114644" }, { "@score":"1", "@id":"1114645", "info":{"authors":{"author":[{"@pid":"290/4176","text":"Avjeet Singh"},{"@pid":"18/8811","text":"Anoj Kumar"}]},"title":"Text document classification using a hybrid approach of ACOGA for feature selection.","venue":"Int. J. Adv. Intell. Paradigms","volume":"20","number":"1/2","pages":"158-170","year":"2021","type":"Journal Articles","access":"closed","key":"journals/ijaip/SinghK21","doi":"10.1504/IJAIP.2021.117613","ee":"https://doi.org/10.1504/IJAIP.2021.117613","url":"https://dblp.org/rec/journals/ijaip/SinghK21"}, "url":"URL#1114645" }, { "@score":"1", "@id":"1114646", "info":{"authors":{"author":[{"@pid":"290/4176","text":"Avjeet Singh"},{"@pid":"18/8811","text":"Anoj Kumar"}]},"title":"Applications of nature-inspired meta-heuristic algorithms: a survey.","venue":"Int. J. Adv. Intell. Paradigms","volume":"20","number":"3/4","pages":"388-417","year":"2021","type":"Journal Articles","access":"closed","key":"journals/ijaip/SinghK21a","doi":"10.1504/IJAIP.2021.119026","ee":"https://doi.org/10.1504/IJAIP.2021.119026","url":"https://dblp.org/rec/journals/ijaip/SinghK21a"}, "url":"URL#1114646" }, { "@score":"1", "@id":"1114647", "info":{"authors":{"author":[{"@pid":"121/9421","text":"Abhishek Singhal"},{"@pid":"87/6925","text":"Abhay Bansal"},{"@pid":"16/4107","text":"Avadhesh Kumar"}]},"title":"Meta-heuristic algorithm to generate optimised test cases for aspect-oriented software systems.","venue":"Int. J. Adv. Intell. Paradigms","volume":"18","number":"2","pages":"134-153","year":"2021","type":"Journal Articles","access":"closed","key":"journals/ijaip/SinghalBK21","doi":"10.1504/IJAIP.2021.112901","ee":"https://doi.org/10.1504/IJAIP.2021.112901","url":"https://dblp.org/rec/journals/ijaip/SinghalBK21"}, "url":"URL#1114647" }, { "@score":"1", "@id":"1114648", "info":{"authors":{"author":[{"@pid":"288/2672","text":"Vikas Soni"},{"@pid":"80/11293","text":"Girish Parmar"},{"@pid":"46/5331-5","text":"Mithilesh Kumar 0005"}]},"title":"A hybrid grey wolf optimisation and pattern search algorithm for automatic generation control of multi-area interconnected power systems.","venue":"Int. J. Adv. Intell. Paradigms","volume":"18","number":"3","pages":"265-293","year":"2021","type":"Journal Articles","access":"closed","key":"journals/ijaip/SoniPK21","doi":"10.1504/IJAIP.2021.113323","ee":"https://doi.org/10.1504/IJAIP.2021.113323","url":"https://dblp.org/rec/journals/ijaip/SoniPK21"}, "url":"URL#1114648" }, { "@score":"1", "@id":"1114649", "info":{"authors":{"author":[{"@pid":"307/8279","text":"K. Santhi Sri"},{"@pid":"307/9204","text":"N. Veeranjaneyulu"}]},"title":"Privacy preserving using Diffie-Hellman and an envelope protocol through key handling techniques in cloud storage.","venue":"Int. J. Adv. Intell. Paradigms","volume":"20","number":"3/4","pages":"264-276","year":"2021","type":"Journal Articles","access":"closed","key":"journals/ijaip/SriV21","doi":"10.1504/IJAIP.2021.119018","ee":"https://doi.org/10.1504/IJAIP.2021.119018","url":"https://dblp.org/rec/journals/ijaip/SriV21"}, "url":"URL#1114649" }, { "@score":"1", "@id":"1114650", "info":{"authors":{"author":[{"@pid":"295/4511","text":"Kalyanapu Srinivas"},{"@pid":"300/7207","text":"V. Janaki"}]},"title":"Symmetric key generation algorithm using image-based chaos logistic maps.","venue":"Int. J. Adv. Intell. Paradigms","volume":"19","number":"3/4","pages":"393-409","year":"2021","type":"Journal Articles","access":"closed","key":"journals/ijaip/SrinivasJ21","doi":"10.1504/IJAIP.2021.116365","ee":"https://doi.org/10.1504/IJAIP.2021.116365","url":"https://dblp.org/rec/journals/ijaip/SrinivasJ21"}, "url":"URL#1114650" }, { "@score":"1", "@id":"1114651", "info":{"authors":{"author":{"@pid":"300/7401","text":"Rama Sugavanam"}},"title":"Reformed timeslot allocation for data intensive clustered industrial wireless sensor networks using virtual grid structure with UWB.","venue":"Int. J. Adv. Intell. Paradigms","volume":"19","number":"3/4","pages":"284-294","year":"2021","type":"Journal Articles","access":"closed","key":"journals/ijaip/Sugavanam21","doi":"10.1504/IJAIP.2021.116359","ee":"https://doi.org/10.1504/IJAIP.2021.116359","url":"https://dblp.org/rec/journals/ijaip/Sugavanam21"}, "url":"URL#1114651" }, { "@score":"1", "@id":"1114652", "info":{"authors":{"author":[{"@pid":"156/9482","text":"S. Fouziya Sulthana"},{"@pid":"128/4481","text":"Rangaswamy Nakkeeran"}]},"title":"Development and analysis of downlink scheduling algorithm in LTE system with imperfect channel quality indicator.","venue":"Int. J. Adv. Intell. Paradigms","volume":"18","number":"1","pages":"79-93","year":"2021","type":"Journal Articles","access":"closed","key":"journals/ijaip/SulthanaN21","doi":"10.1504/IJAIP.2021.112023","ee":"https://doi.org/10.1504/IJAIP.2021.112023","url":"https://dblp.org/rec/journals/ijaip/SulthanaN21"}, "url":"URL#1114652" }, { "@score":"1", "@id":"1114653", "info":{"authors":{"author":[{"@pid":"307/8906","text":"Varun M. Tayur"},{"@pid":"307/8258","text":"R. Suchithra"}]},"title":"Modelling context awareness in internet of things with business process model and notation 2.0 extensions.","venue":"Int. J. Adv. Intell. Paradigms","volume":"20","number":"3/4","pages":"374-387","year":"2021","type":"Journal Articles","access":"closed","key":"journals/ijaip/TayurS21","doi":"10.1504/IJAIP.2021.119025","ee":"https://doi.org/10.1504/IJAIP.2021.119025","url":"https://dblp.org/rec/journals/ijaip/TayurS21"}, "url":"URL#1114653" }, { "@score":"1", "@id":"1114654", "info":{"authors":{"author":[{"@pid":"244/0148","text":"Ahelam Mainoddin Tikotikar"},{"@pid":"243/9994","text":"Mallikarjun M. Kodabagi"}]},"title":"Hybrid mechanism for medical data classification.","venue":"Int. J. Adv. Intell. Paradigms","volume":"19","number":"3/4","pages":"243-261","year":"2021","type":"Journal Articles","access":"closed","key":"journals/ijaip/TikotikarK21","doi":"10.1504/IJAIP.2021.116362","ee":"https://doi.org/10.1504/IJAIP.2021.116362","url":"https://dblp.org/rec/journals/ijaip/TikotikarK21"}, "url":"URL#1114654" }, { "@score":"1", "@id":"1114655", "info":{"authors":{"author":[{"@pid":"282/7896","text":"G. Vallathan"},{"@pid":"29/3293","text":"K. Jayanthi"}]},"title":"An integrated and secured medical data framework for effective tele health applications.","venue":"Int. J. Adv. Intell. Paradigms","volume":"18","number":"1","pages":"63-78","year":"2021","type":"Journal Articles","access":"closed","key":"journals/ijaip/VallathanJ21","doi":"10.1504/IJAIP.2021.112022","ee":"https://doi.org/10.1504/IJAIP.2021.112022","url":"https://dblp.org/rec/journals/ijaip/VallathanJ21"}, "url":"URL#1114655" }, { "@score":"1", "@id":"1114656", "info":{"authors":{"author":[{"@pid":"134/7749","text":"S. Arul Antran Vijay"},{"@pid":"46/7352","text":"Pugalendhi GaneshKumar"}]},"title":"Fuzzy system for classification of microarray data using a hybrid ant stem optimisation algorithm.","venue":"Int. J. Adv. Intell. Paradigms","volume":"18","number":"2","pages":"154-170","year":"2021","type":"Journal Articles","access":"closed","key":"journals/ijaip/VijayG21","doi":"10.1504/IJAIP.2021.112902","ee":"https://doi.org/10.1504/IJAIP.2021.112902","url":"https://dblp.org/rec/journals/ijaip/VijayG21"}, "url":"URL#1114656" }, { "@score":"1", "@id":"1114657", "info":{"authors":{"author":[{"@pid":"294/4163","text":"N. Vijayaraj"},{"@pid":"190/5914","text":"T. Senthil Murugan"}]},"title":"Resource allocation with effective multi-attribute combinational double auction in cloud using O-DBS.","venue":"Int. J. Adv. Intell. Paradigms","volume":"20","number":"3/4","pages":"277-295","year":"2021","type":"Journal Articles","access":"closed","key":"journals/ijaip/VijayarajM21","doi":"10.1504/IJAIP.2021.119019","ee":"https://doi.org/10.1504/IJAIP.2021.119019","url":"https://dblp.org/rec/journals/ijaip/VijayarajM21"}, "url":"URL#1114657" }, { "@score":"1", "@id":"1114658", "info":{"authors":{"author":[{"@pid":"247/3658","text":"Dinesh Kumar Yadav"},{"@pid":"296/5878","text":"Rati Shukla"},{"@pid":"227/8812","text":"Vikash Yadav"}]},"title":"An efficient collaborative recommender system for textbooks using silhouette index and K-means clustering technique.","venue":"Int. J. Adv. Intell. Paradigms","volume":"19","number":"2","pages":"233-242","year":"2021","type":"Journal Articles","access":"closed","key":"journals/ijaip/YadavSY21","doi":"10.1504/IJAIP.2021.115251","ee":"https://doi.org/10.1504/IJAIP.2021.115251","url":"https://dblp.org/rec/journals/ijaip/YadavSY21"}, "url":"URL#1114658" }, { "@score":"1", "@id":"1573890", "info":{"authors":{"author":[{"@pid":"264/3162","text":"Mohammad Reza Afrash"},{"@pid":"116/2777","text":"Mehdi Khalili"},{"@pid":"264/3243","text":"Maral Sedigh Salekde"}]},"title":"A comparison of data mining methods for diagnosis and prognosis of heart disease.","venue":"Int. J. Adv. Intell. Paradigms","volume":"16","number":"1","pages":"88-97","year":"2020","type":"Journal Articles","access":"closed","key":"journals/ijaip/AfrashKS20","doi":"10.1504/IJAIP.2020.106692","ee":"https://doi.org/10.1504/IJAIP.2020.106692","url":"https://dblp.org/rec/journals/ijaip/AfrashKS20"}, "url":"URL#1573890" }, { "@score":"1", "@id":"1573891", "info":{"authors":{"author":[{"@pid":"237/0238","text":"Abhishek Agnihotri"},{"@pid":"227/8812","text":"Vikash Yadav"},{"@pid":"13/7861","text":"Vandana Dixit Kaushik"}]},"title":"Role of data mining and machine learning techniques in medical imaging.","venue":"Int. J. Adv. Intell. Paradigms","volume":"15","number":"3","pages":"340-351","year":"2020","type":"Journal Articles","access":"closed","key":"journals/ijaip/AgnihotriYK20","doi":"10.1504/IJAIP.2020.105838","ee":"https://doi.org/10.1504/IJAIP.2020.105838","url":"https://dblp.org/rec/journals/ijaip/AgnihotriYK20"}, "url":"URL#1573891" }, { "@score":"1", "@id":"1573892", "info":{"authors":{"author":[{"@pid":"61/7233","text":"Pooja Agrawal"},{"@pid":"204/5639","text":"Teena Sharma"},{"@pid":"36/5299","text":"Nishchal K. Verma"}]},"title":"Supervised approach for object identification using speeded up robust features.","venue":"Int. J. Adv. Intell. Paradigms","volume":"15","number":"2","pages":"165-182","year":"2020","type":"Journal Articles","access":"closed","key":"journals/ijaip/AgrawalSV20","doi":"10.1504/IJAIP.2020.105142","ee":"https://doi.org/10.1504/IJAIP.2020.105142","url":"https://dblp.org/rec/journals/ijaip/AgrawalSV20"}, "url":"URL#1573892" }, { "@score":"1", "@id":"1573893", "info":{"authors":{"author":[{"@pid":"235/6424","text":"Afsaneh Akhbari"},{"@pid":"157/3793","text":"Aboozar Ghaffari"}]},"title":"The performance comparison of improved continuous mixed P-norm and other adaptive algorithms in sparse system identification.","venue":"Int. J. Adv. Intell. Paradigms","volume":"16","number":"1","pages":"65-74","year":"2020","type":"Journal Articles","access":"closed","key":"journals/ijaip/AkhbariG20","doi":"10.1504/IJAIP.2020.106690","ee":"https://doi.org/10.1504/IJAIP.2020.106690","url":"https://dblp.org/rec/journals/ijaip/AkhbariG20"}, "url":"URL#1573893" }, { "@score":"1", "@id":"1573894", "info":{"authors":{"author":[{"@pid":"56/7898","text":"Mohammed I. Al-Saleh"},{"@pid":"53/4234","text":"Yaser Jararweh"}]},"title":"Fingerprinting violating machines with in-memory protocol artefacts.","venue":"Int. J. Adv. Intell. Paradigms","volume":"15","number":"4","pages":"388-404","year":"2020","type":"Journal Articles","access":"closed","key":"journals/ijaip/Al-SalehJ20","doi":"10.1504/IJAIP.2020.106035","ee":"https://doi.org/10.1504/IJAIP.2020.106035","url":"https://dblp.org/rec/journals/ijaip/Al-SalehJ20"}, "url":"URL#1573894" }, { "@score":"1", "@id":"1573895", "info":{"authors":{"author":[{"@pid":"184/9399","text":"Bushra Alhijawi"},{"@pid":"12/686","text":"Yousef Kilani"}]},"title":"The recommender system: a survey.","venue":"Int. J. Adv. Intell. Paradigms","volume":"15","number":"3","pages":"229-251","year":"2020","type":"Journal Articles","access":"closed","key":"journals/ijaip/AlhijawiK20","doi":"10.1504/IJAIP.2020.105815","ee":"https://doi.org/10.1504/IJAIP.2020.105815","url":"https://dblp.org/rec/journals/ijaip/AlhijawiK20"}, "url":"URL#1573895" }, { "@score":"1", "@id":"1573896", "info":{"authors":{"author":[{"@pid":"184/9399","text":"Bushra Alhijawi"},{"@pid":"12/686","text":"Yousef Kilani"},{"@pid":"37/9609","text":"Ayoub Alsarhan"}]},"title":"Improving recommendation quality and performance of genetic-based recommender system.","venue":"Int. J. Adv. Intell. Paradigms","volume":"15","number":"1","pages":"77-88","year":"2020","type":"Journal Articles","access":"closed","key":"journals/ijaip/AlhijawiKA20","doi":"10.1504/IJAIP.2020.104108","ee":"https://doi.org/10.1504/IJAIP.2020.104108","url":"https://dblp.org/rec/journals/ijaip/AlhijawiKA20"}, "url":"URL#1573896" }, { "@score":"1", "@id":"1573897", "info":{"authors":{"author":[{"@pid":"264/3103","text":"Samira Alizdeh"},{"@pid":"59/9211","text":"Shahram Saeidi"}]},"title":"Fuzzy project scheduling with critical path including risk and resource constraints using linear programming.","venue":"Int. J. Adv. Intell. Paradigms","volume":"16","number":"1","pages":"4-17","year":"2020","type":"Journal Articles","access":"closed","key":"journals/ijaip/AlizdehS20","doi":"10.1504/IJAIP.2020.106687","ee":"https://doi.org/10.1504/IJAIP.2020.106687","url":"https://dblp.org/rec/journals/ijaip/AlizdehS20"}, "url":"URL#1573897" }, { "@score":"1", "@id":"1573898", "info":{"authors":{"author":{"@pid":"37/9609","text":"Ayoub Alsarhan"}},"title":"QoS-aware online mechanism for dynamic VM provisioning in cloud market using Q-learning.","venue":"Int. J. Adv. Intell. Paradigms","volume":"15","number":"3","pages":"287-299","year":"2020","type":"Journal Articles","access":"closed","key":"journals/ijaip/Alsarhan20","doi":"10.1504/IJAIP.2020.105823","ee":"https://doi.org/10.1504/IJAIP.2020.105823","url":"https://dblp.org/rec/journals/ijaip/Alsarhan20"}, "url":"URL#1573898" }, { "@score":"1", "@id":"1573899", "info":{"authors":{"author":[{"@pid":"39/4354","text":"Mohammad A. Alsmirat"},{"@pid":"264/3261","text":"Ruba A. Al-Hussien"},{"@pid":"234/3491","text":"Walaa Al-Sarayrah"},{"@pid":"53/4234","text":"Yaser Jararweh"},{"@pid":"264/3421","text":"Morad Etier"}]},"title":"Digital video forensics: a comprehensive survey.","venue":"Int. J. Adv. Intell. Paradigms","volume":"15","number":"4","pages":"437-456","year":"2020","type":"Journal Articles","access":"closed","key":"journals/ijaip/AlsmiratAAJE20","doi":"10.1504/IJAIP.2020.106040","ee":"https://doi.org/10.1504/IJAIP.2020.106040","url":"https://dblp.org/rec/journals/ijaip/AlsmiratAAJE20"}, "url":"URL#1573899" }, { "@score":"1", "@id":"1573900", "info":{"authors":{"author":[{"@pid":"74/4965","text":"Qutaibah Althebyan"},{"@pid":"53/4234","text":"Yaser Jararweh"},{"@pid":"50/7561","text":"Qussai Yaseen"},{"@pid":"176/4585","text":"Rami Mohawesh"}]},"title":"A knowledgebase insider threat mitigation model in the cloud: a proactive approach.","venue":"Int. J. Adv. Intell. Paradigms","volume":"15","number":"4","pages":"417-436","year":"2020","type":"Journal Articles","access":"closed","key":"journals/ijaip/AlthebyanJYM20","doi":"10.1504/IJAIP.2020.106039","ee":"https://doi.org/10.1504/IJAIP.2020.106039","url":"https://dblp.org/rec/journals/ijaip/AlthebyanJYM20"}, "url":"URL#1573900" }, { "@score":"1", "@id":"1573901", "info":{"authors":{"author":[{"@pid":"264/3177","text":"N. K. Anushkannan"},{"@pid":"174/5865","text":"H. Mangalam"}]},"title":"Design of an ultra-low power, low complexity and low jitter PLL with digitally controlled oscillator.","venue":"Int. J. Adv. Intell. Paradigms","volume":"15","number":"1","pages":"98-107","year":"2020","type":"Journal Articles","access":"closed","key":"journals/ijaip/AnushkannanM20","doi":"10.1504/IJAIP.2020.104110","ee":"https://doi.org/10.1504/IJAIP.2020.104110","url":"https://dblp.org/rec/journals/ijaip/AnushkannanM20"}, "url":"URL#1573901" }, { "@score":"1", "@id":"1573902", "info":{"authors":{"author":[{"@pid":"266/8242","text":"Mohammed Salman Arafath"},{"@pid":"68/5667","text":"Khaleel Ur Rahman Khan"},{"@pid":"96/7800","text":"K. V. N. Sunitha"}]},"title":"Incorporating security in opportunistic routing and traffic management in opportunistic sensor network.","venue":"Int. J. Adv. Intell. Paradigms","volume":"16","number":"3/4","pages":"265-284","year":"2020","type":"Journal Articles","access":"closed","key":"journals/ijaip/ArafathKS20","doi":"10.1504/IJAIP.2020.107526","ee":"https://doi.org/10.1504/IJAIP.2020.107526","url":"https://dblp.org/rec/journals/ijaip/ArafathKS20"}, "url":"URL#1573902" }, { "@score":"1", "@id":"1573903", "info":{"authors":{"author":[{"@pid":"233/2521","text":"Balachandran Arumugam"},{"@pid":"198/4011","text":"Shriram K. Vasudevan"},{"@pid":"08/6876","text":"P. R. Suresh"}]},"title":"A study of total technical life for an aircraft with implementation and suggestions for improvisation.","venue":"Int. J. Adv. Intell. Paradigms","volume":"17","number":"3/4","pages":"238-266","year":"2020","type":"Journal Articles","access":"closed","key":"journals/ijaip/ArumugamVS20","doi":"10.1504/IJAIP.2020.109509","ee":"https://doi.org/10.1504/IJAIP.2020.109509","url":"https://dblp.org/rec/journals/ijaip/ArumugamVS20"}, "url":"URL#1573903" }, { "@score":"1", "@id":"1573904", "info":{"authors":{"author":[{"@pid":"264/3112","text":"Wesam A. Askar"},{"@pid":"264/3086","text":"Osama Elmowafy"},{"@pid":"02/1540","text":"Anca L. Ralescu"},{"@pid":"75/2537","text":"Aliaa A. A. Youssif"},{"@pid":"164/2409","text":"Gamal A. Elnashar"}]},"title":"Occlusion detection and processing using optical flow and particle filter.","venue":"Int. J. Adv. Intell. Paradigms","volume":"15","number":"1","pages":"63-76","year":"2020","type":"Journal Articles","access":"closed","key":"journals/ijaip/AskarERYE20","doi":"10.1504/IJAIP.2020.104107","ee":"https://doi.org/10.1504/IJAIP.2020.104107","url":"https://dblp.org/rec/journals/ijaip/AskarERYE20"}, "url":"URL#1573904" }, { "@score":"1", "@id":"1573905", "info":{"authors":{"author":[{"@pid":"188/6532","text":"Omprakash Chandrakar"},{"@pid":"188/6511","text":"Jatinderkumar R. Saini"}]},"title":"Knowledge-based semantic discretisation using data mining techniques.","venue":"Int. J. Adv. Intell. Paradigms","volume":"17","number":"3/4","pages":"267-278","year":"2020","type":"Journal Articles","access":"closed","key":"journals/ijaip/ChandrakarS20","doi":"10.1504/IJAIP.2020.109510","ee":"https://doi.org/10.1504/IJAIP.2020.109510","url":"https://dblp.org/rec/journals/ijaip/ChandrakarS20"}, "url":"URL#1573905" }, { "@score":"1", "@id":"1573906", "info":{"authors":{"author":[{"@pid":"190/4276","text":"Reshu Chaudhary"},{"@pid":"13/6820","text":"Hema Banati"}]},"title":"Hybrid enhanced shuffled bat algorithm for data clustering.","venue":"Int. J. Adv. Intell. Paradigms","volume":"17","number":"3/4","pages":"323-341","year":"2020","type":"Journal Articles","access":"closed","key":"journals/ijaip/ChaudharyB20","doi":"10.1504/IJAIP.2020.109513","ee":"https://doi.org/10.1504/IJAIP.2020.109513","url":"https://dblp.org/rec/journals/ijaip/ChaudharyB20"}, "url":"URL#1573906" }, { "@score":"1", "@id":"1573907", "info":{"authors":{"author":[{"@pid":"85/7564","text":"Sook-Ling Chua"},{"@pid":"206/5519","text":"Lee Kien Foo"},{"@pid":"264/3226","text":"Saed Sa'deh Suleiman Juboor"}]},"title":"Towards real-time recognition of activities in smart homes.","venue":"Int. J. Adv. Intell. Paradigms","volume":"15","number":"2","pages":"146-164","year":"2020","type":"Journal Articles","access":"closed","key":"journals/ijaip/ChuaFJ20","doi":"10.1504/IJAIP.2020.105140","ee":"https://doi.org/10.1504/IJAIP.2020.105140","url":"https://dblp.org/rec/journals/ijaip/ChuaFJ20"}, "url":"URL#1573907" }, { "@score":"1", "@id":"1573908", "info":{"authors":{"author":[{"@pid":"264/3314","text":"Arnab Kumar Das"},{"@pid":"49/3105-5","text":"Nabanita Das 0005"}]},"title":"Enhancement of 3D-Playfair algorithm using dual key.","venue":"Int. J. Adv. Intell. Paradigms","volume":"15","number":"4","pages":"405-416","year":"2020","type":"Journal Articles","access":"closed","key":"journals/ijaip/DasD20","doi":"10.1504/IJAIP.2020.106036","ee":"https://doi.org/10.1504/IJAIP.2020.106036","url":"https://dblp.org/rec/journals/ijaip/DasD20"}, "url":"URL#1573908" }, { "@score":"1", "@id":"1573909", "info":{"authors":{"author":[{"@pid":"246/5142","text":"Shyama Debbarma"},{"@pid":"264/3378","text":"Parthatsarathi Choudhury"}]},"title":"River flow prediction with memory-based artificial neural networks: a case study of the Dholai river basin.","venue":"Int. J. Adv. Intell. Paradigms","volume":"15","number":"1","pages":"51-62","year":"2020","type":"Journal Articles","access":"closed","key":"journals/ijaip/DebbarmaC20","doi":"10.1504/IJAIP.2020.104106","ee":"https://doi.org/10.1504/IJAIP.2020.104106","url":"https://dblp.org/rec/journals/ijaip/DebbarmaC20"}, "url":"URL#1573909" }, { "@score":"1", "@id":"1573910", "info":{"authors":{"author":[{"@pid":"77/7749","text":"M. Uma Devi"},{"@pid":"203/5851","text":"G. Meera Gandhi"}]},"title":"Scalable information retrieval system in semantic web by query expansion and ontological-based LSA ranking similarity measurement.","venue":"Int. J. Adv. Intell. Paradigms","volume":"17","number":"1/2","pages":"44-66","year":"2020","type":"Journal Articles","access":"closed","key":"journals/ijaip/DeviG20","doi":"10.1504/IJAIP.2020.108759","ee":"https://doi.org/10.1504/IJAIP.2020.108759","url":"https://dblp.org/rec/journals/ijaip/DeviG20"}, "url":"URL#1573910" }, { "@score":"1", "@id":"1573911", "info":{"authors":{"author":[{"@pid":"264/3429","text":"G. Dhanalakshmi"},{"@pid":"251/8129","text":"M. Sundarambal"},{"@pid":"06/9144","text":"K. Muralidharan"}]},"title":"Diminution of power in load/store queue for CAM and SRAM-based out-of-order processors.","venue":"Int. J. Adv. Intell. Paradigms","volume":"15","number":"1","pages":"89-97","year":"2020","type":"Journal Articles","access":"closed","key":"journals/ijaip/DhanalakshmiSM20","doi":"10.1504/IJAIP.2020.104109","ee":"https://doi.org/10.1504/IJAIP.2020.104109","url":"https://dblp.org/rec/journals/ijaip/DhanalakshmiSM20"}, "url":"URL#1573911" }, { "@score":"1", "@id":"1573912", "info":{"authors":{"author":[{"@pid":"213/0167","text":"Dhanya M. Dhanalakshmy"},{"@pid":"264/3264","text":"M. S. Akhila"},{"@pid":"264/3291","text":"C. R. Vidhya"},{"@pid":"41/7623","text":"G. Jeyakumar 0001"}]},"title":"Improving the search efficiency of differential evolution algorithm by population diversity analysis and adaptation of mutation step sizes.","venue":"Int. J. Adv. Intell. Paradigms","volume":"15","number":"2","pages":"119-145","year":"2020","type":"Journal Articles","access":"closed","key":"journals/ijaip/DhanalakshmyAVJ20","doi":"10.1504/IJAIP.2020.105141","ee":"https://doi.org/10.1504/IJAIP.2020.105141","url":"https://dblp.org/rec/journals/ijaip/DhanalakshmyAVJ20"}, "url":"URL#1573912" }, { "@score":"1", "@id":"1573913", "info":{"authors":{"author":[{"@pid":"27/6119","text":"József Dombi 0001"},{"@pid":"161/2739","text":"Adrienn Dineva"}]},"title":"Adaptive Savitzky-Golay filtering and its applications.","venue":"Int. J. Adv. Intell. Paradigms","volume":"16","number":"2","pages":"145-156","year":"2020","type":"Journal Articles","access":"closed","key":"journals/ijaip/DombiD20","doi":"10.1504/IJAIP.2020.107011","ee":"https://doi.org/10.1504/IJAIP.2020.107011","url":"https://dblp.org/rec/journals/ijaip/DombiD20"}, "url":"URL#1573913" }, { "@score":"1", "@id":"1573914", "info":{"authors":{"author":[{"@pid":"272/0611","text":"Vijaya Saradhi Dommeti"},{"@pid":"272/0751","text":"Dharma Raj Cheruku"}]},"title":"Multi-layer composites shielding for electromagnetic radiation protection.","venue":"Int. J. Adv. Intell. Paradigms","volume":"17","number":"1/2","pages":"139-158","year":"2020","type":"Journal Articles","access":"closed","key":"journals/ijaip/DommetiC20","doi":"10.1504/IJAIP.2020.108772","ee":"https://doi.org/10.1504/IJAIP.2020.108772","url":"https://dblp.org/rec/journals/ijaip/DommetiC20"}, "url":"URL#1573914" }, { "@score":"1", "@id":"1573915", "info":{"authors":{"author":[{"@pid":"266/7715","text":"A. Shamila Ebenezer"},{"@pid":"50/9941","text":"Elijah Blessing Rajsingh"},{"@pid":"02/9921","text":"Baskaran Kaliaperumal"}]},"title":"Support vector machine-based proactive fault-tolerant scheduling for grid computing environment.","venue":"Int. J. Adv. Intell. Paradigms","volume":"16","number":"3/4","pages":"381-403","year":"2020","type":"Journal Articles","access":"closed","key":"journals/ijaip/EbenezerRK20","doi":"10.1504/IJAIP.2020.107539","ee":"https://doi.org/10.1504/IJAIP.2020.107539","url":"https://dblp.org/rec/journals/ijaip/EbenezerRK20"}, "url":"URL#1573915" }, { "@score":"1", "@id":"1573916", "info":{"authors":{"author":[{"@pid":"223/2461","text":"Poongothai Elango"},{"@pid":"86/10022","text":"Suruliandi Andavar"}]},"title":"Person re-identification using kNN classifier-based fusion approach.","venue":"Int. J. Adv. Intell. Paradigms","volume":"16","number":"2","pages":"113-131","year":"2020","type":"Journal Articles","access":"closed","key":"journals/ijaip/ElangoA20","doi":"10.1504/IJAIP.2020.107009","ee":"https://doi.org/10.1504/IJAIP.2020.107009","url":"https://dblp.org/rec/journals/ijaip/ElangoA20"}, "url":"URL#1573916" }, { "@score":"1", "@id":"1573917", "info":{"authors":{"author":[{"@pid":"10/4785","text":"Ali Farahani"},{"@pid":"49/1992","text":"Eslam Nazemi"}]},"title":"OMCM-CAS: organisational model and coordination mechanism for self-adaptation and self-organisation in collective adaptive systems.","venue":"Int. J. Adv. Intell. Paradigms","volume":"16","number":"1","pages":"43-64","year":"2020","type":"Journal Articles","access":"closed","key":"journals/ijaip/FarahaniN20","doi":"10.1504/IJAIP.2020.106688","ee":"https://doi.org/10.1504/IJAIP.2020.106688","url":"https://dblp.org/rec/journals/ijaip/FarahaniN20"}, "url":"URL#1573917" }, { "@score":"1", "@id":"1573918", "info":{"authors":{"author":[{"@pid":"264/3168","text":"Mahdis Fathi"},{"@pid":"250/1852","text":"Mousa Nazari"}]},"title":"Provide a new clustering scheme based on density to enhance energy efficiency in wireless sensor networks.","venue":"Int. J. Adv. Intell. Paradigms","volume":"16","number":"1","pages":"30-42","year":"2020","type":"Journal Articles","access":"closed","key":"journals/ijaip/FathiN20","doi":"10.1504/IJAIP.2020.106689","ee":"https://doi.org/10.1504/IJAIP.2020.106689","url":"https://dblp.org/rec/journals/ijaip/FathiN20"}, "url":"URL#1573918" }, { "@score":"1", "@id":"1573919", "info":{"authors":{"author":[{"@pid":"152/9609","text":"Sihem Ghoudelbourk"},{"@pid":"67/9796","text":"Ahmad Taher Azar"},{"@pid":"164/2751","text":"Djalel Dib"},{"@pid":"154/2259","text":"Amar Omeiri"}]},"title":"Selective harmonic elimination strategy in the multilevel inverters for grid connected photovoltaic system.","venue":"Int. J. Adv. Intell. Paradigms","volume":"15","number":"3","pages":"317-339","year":"2020","type":"Journal Articles","access":"closed","key":"journals/ijaip/GhoudelbourkADO20","doi":"10.1504/IJAIP.2020.105826","ee":"https://doi.org/10.1504/IJAIP.2020.105826","url":"https://dblp.org/rec/journals/ijaip/GhoudelbourkADO20"}, "url":"URL#1573919" }, { "@score":"1", "@id":"1573920", "info":{"authors":{"author":[{"@pid":"140/2269","text":"Hatim Guermah"},{"@pid":"140/2065","text":"Tarik Fissaa"},{"@pid":"199/0024","text":"Bassma Guermah"},{"@pid":"28/10222","text":"Hatim Hafiddi"},{"@pid":"98/4821","text":"Mahmoud Nassar"},{"@pid":"21/2690","text":"Abdelaziz Kriouile"}]},"title":"How can reasoning improve ontology-based context-aware system?","venue":"Int. J. Adv. Intell. Paradigms","volume":"15","number":"3","pages":"300-316","year":"2020","type":"Journal Articles","access":"closed","key":"journals/ijaip/GuermahFGHNK20","doi":"10.1504/IJAIP.2020.105824","ee":"https://doi.org/10.1504/IJAIP.2020.105824","url":"https://dblp.org/rec/journals/ijaip/GuermahFGHNK20"}, "url":"URL#1573920" }, { "@score":"1", "@id":"1573921", "info":{"authors":{"author":[{"@pid":"154/8866","text":"Shoeb Hussain"},{"@pid":"154/8554","text":"Mohammad Abid Bazaz"}]},"title":"Modified SVPWM technique for a sensorless controlled induction motor drive using neural network observer and predictive controller.","venue":"Int. J. Adv. Intell. Paradigms","volume":"16","number":"2","pages":"172-189","year":"2020","type":"Journal Articles","access":"closed","key":"journals/ijaip/HussainB20","doi":"10.1504/IJAIP.2020.107013","ee":"https://doi.org/10.1504/IJAIP.2020.107013","url":"https://dblp.org/rec/journals/ijaip/HussainB20"}, "url":"URL#1573921" }, { "@score":"1", "@id":"1573922", "info":{"authors":{"author":[{"@pid":"264/3408","text":"B. N. Jagadesh"},{"@pid":"14/2753","text":"K. Srinivasa Rao"},{"@pid":"41/8308","text":"Ch. Satyanarayana"}]},"title":"A unified approach for skin colour segmentation using generic bivariate Pearson mixture model.","venue":"Int. J. Adv. Intell. Paradigms","volume":"15","number":"1","pages":"17-31","year":"2020","type":"Journal Articles","access":"closed","key":"journals/ijaip/JagadeshRS20","doi":"10.1504/IJAIP.2020.104104","ee":"https://doi.org/10.1504/IJAIP.2020.104104","url":"https://dblp.org/rec/journals/ijaip/JagadeshRS20"}, "url":"URL#1573922" }, { "@score":"1", "@id":"1573923", "info":{"authors":{"author":[{"@pid":"181/2415","text":"Mohammad Jamshidi"},{"@pid":"264/3303","text":"Rouzbeh Farhadi"},{"@pid":"264/3371","text":"Morteza Jamshidi"},{"@pid":"183/5715","text":"Zahra Shamsi"},{"@pid":"264/3260","text":"Seyedfoadin Naseh"}]},"title":"Using a soft computing method for impedance modelling of Li-ion battery current.","venue":"Int. J. Adv. Intell. Paradigms","volume":"16","number":"1","pages":"18-29","year":"2020","type":"Journal Articles","access":"closed","key":"journals/ijaip/JamshidiFJSN20","doi":"10.1504/IJAIP.2020.106686","ee":"https://doi.org/10.1504/IJAIP.2020.106686","url":"https://dblp.org/rec/journals/ijaip/JamshidiFJSN20"}, "url":"URL#1573923" }, { "@score":"1", "@id":"1573924", "info":{"authors":{"author":[{"@pid":"137/9903","text":"Smita Jhajharia"},{"@pid":"119/5085","text":"Seema Verma"},{"@pid":"30/5688-2","text":"Rajesh Kumar 0002"}]},"title":"Nature of life and survivability of women and men with breast cancer.","venue":"Int. J. Adv. Intell. Paradigms","volume":"17","number":"1/2","pages":"127-138","year":"2020","type":"Journal Articles","access":"closed","key":"journals/ijaip/JhajhariaVK20","doi":"10.1504/IJAIP.2020.108771","ee":"https://doi.org/10.1504/IJAIP.2020.108771","url":"https://dblp.org/rec/journals/ijaip/JhajhariaVK20"}, "url":"URL#1573924" }, { "@score":"1", "@id":"1573925", "info":{"authors":{"author":{"@pid":"254/5584","text":"Lenin Kanagasabai"}},"title":"Elephant herd optimisation algorithm for solving optimal reactive power problem.","venue":"Int. J. Adv. Intell. Paradigms","volume":"17","number":"3/4","pages":"379-391","year":"2020","type":"Journal Articles","access":"closed","key":"journals/ijaip/Kanagasabai20","doi":"10.1504/IJAIP.2020.109524","ee":"https://doi.org/10.1504/IJAIP.2020.109524","url":"https://dblp.org/rec/journals/ijaip/Kanagasabai20"}, "url":"URL#1573925" }, { "@score":"1", "@id":"1573926", "info":{"authors":{"author":[{"@pid":"212/4734","text":"Dinesh Karunanidhi"},{"@pid":"328/2383","text":"Jayavel Amudhavel"},{"@pid":"198/9066","text":"Rajakumar Ramalingam"},{"@pid":"44/8038","text":"P. Dhavachelvan"},{"@pid":"36/551","text":"R. Subramanian"}]},"title":"A novel self-organisation model for improving the performance of permutation coded genetic algorithm.","venue":"Int. J. Adv. Intell. Paradigms","volume":"17","number":"3/4","pages":"299-322","year":"2020","type":"Journal Articles","access":"closed","key":"journals/ijaip/KarunanidhiARDS20","doi":"10.1504/IJAIP.2020.109512","ee":"https://doi.org/10.1504/IJAIP.2020.109512","url":"https://dblp.org/rec/journals/ijaip/KarunanidhiARDS20"}, "url":"URL#1573926" }, { "@score":"1", "@id":"1573927", "info":{"authors":{"author":[{"@pid":"142/1593","text":"Nitish Katal"},{"@pid":"164/2342","text":"Shiv Narayan"}]},"title":"Optimal design of QFT controller for pneumatic servo actuator system using multi-objective genetic algorithm.","venue":"Int. J. Adv. Intell. Paradigms","volume":"15","number":"2","pages":"183-206","year":"2020","type":"Journal Articles","access":"closed","key":"journals/ijaip/KatalN20","doi":"10.1504/IJAIP.2020.105143","ee":"https://doi.org/10.1504/IJAIP.2020.105143","url":"https://dblp.org/rec/journals/ijaip/KatalN20"}, "url":"URL#1573927" }, { "@score":"1", "@id":"1573928", "info":{"authors":{"author":[{"@pid":"264/3132","text":"Sharmila Banu Kather"},{"@pid":"92/3463","text":"B. K. Tripathy 0001"}]},"title":"Clustering mixed data using neighbourhood rough sets.","venue":"Int. J. Adv. Intell. Paradigms","volume":"15","number":"1","pages":"1-16","year":"2020","type":"Journal Articles","access":"closed","key":"journals/ijaip/KatherT20","doi":"10.1504/IJAIP.2020.104103","ee":"https://doi.org/10.1504/IJAIP.2020.104103","url":"https://dblp.org/rec/journals/ijaip/KatherT20"}, "url":"URL#1573928" }, { "@score":"1", "@id":"1573929", "info":{"authors":{"author":[{"@pid":"72/10130","text":"Manju Khari"},{"@pid":"66/831-1","text":"Prabhat Kumar 0001"},{"@pid":"206/5293","text":"Gulshan Shrivastava"}]},"title":"Test optimisation: an approach based on modified algorithm for software network.","venue":"Int. J. Adv. Intell. Paradigms","volume":"17","number":"3/4","pages":"208-237","year":"2020","type":"Journal Articles","access":"closed","key":"journals/ijaip/KhariKS20","doi":"10.1504/IJAIP.2020.109508","ee":"https://doi.org/10.1504/IJAIP.2020.109508","url":"https://dblp.org/rec/journals/ijaip/KhariKS20"}, "url":"URL#1573929" }, { "@score":"1", "@id":"1573930", "info":{"authors":{"author":[{"@pid":"264/3323","text":"Sonam Khera"},{"@pid":"264/3140","text":"Neelam Turk"},{"@pid":"37/2341","text":"Navdeep Kaur"}]},"title":"A practical approach to energy consumption in wireless sensor networks.","venue":"Int. J. Adv. Intell. Paradigms","volume":"16","number":"2","pages":"190-202","year":"2020","type":"Journal Articles","access":"closed","key":"journals/ijaip/KheraTK20","doi":"10.1504/IJAIP.2020.107016","ee":"https://doi.org/10.1504/IJAIP.2020.107016","url":"https://dblp.org/rec/journals/ijaip/KheraTK20"}, "url":"URL#1573930" }, { "@score":"1", "@id":"1573931", "info":{"authors":{"author":[{"@pid":"240/3267","text":"T. Venkata Krishnamoorthy"},{"@pid":"240/3295","text":"G. Umamaheswara Reddy"}]},"title":"Image classification using higher-order statistics-based ICA for NOAA multispectral satellite image.","venue":"Int. J. Adv. Intell. Paradigms","volume":"17","number":"1/2","pages":"178-191","year":"2020","type":"Journal Articles","access":"closed","key":"journals/ijaip/KrishnamoorthyR20","doi":"10.1504/IJAIP.2020.108765","ee":"https://doi.org/10.1504/IJAIP.2020.108765","url":"https://dblp.org/rec/journals/ijaip/KrishnamoorthyR20"}, "url":"URL#1573931" }, { "@score":"1", "@id":"1573932", "info":{"authors":{"author":[{"@pid":"66/3984-11","text":"Deepak Kumar 0011"},{"@pid":"46/2681-5","text":"Sushil Kumar 0005"},{"@pid":"125/1809","text":"Rohit Bansal"}]},"title":"Multi-objective multi-join query optimisation using modified grey wolf optimisation.","venue":"Int. J. Adv. Intell. Paradigms","volume":"17","number":"1/2","pages":"67-79","year":"2020","type":"Journal Articles","access":"closed","key":"journals/ijaip/KumarKB20","doi":"10.1504/IJAIP.2020.108760","ee":"https://doi.org/10.1504/IJAIP.2020.108760","url":"https://dblp.org/rec/journals/ijaip/KumarKB20"}, "url":"URL#1573932" }, { "@score":"1", "@id":"1573933", "info":{"authors":{"author":[{"@pid":"182/9770","text":"Ahmad M. Manasrah"},{"@pid":"264/3426","text":"Walaa Bani Domi"},{"@pid":"264/3353","text":"Nur Nadiyah Suppiah"}]},"title":"Botnet detection based on DNS traffic similarity.","venue":"Int. J. Adv. Intell. Paradigms","volume":"15","number":"4","pages":"357-387","year":"2020","type":"Journal Articles","access":"closed","key":"journals/ijaip/ManasrahDS20","doi":"10.1504/IJAIP.2020.106030","ee":"https://doi.org/10.1504/IJAIP.2020.106030","url":"https://dblp.org/rec/journals/ijaip/ManasrahDS20"}, "url":"URL#1573933" }, { "@score":"1", "@id":"1573934", "info":{"authors":{"author":[{"@pid":"121/3845","text":"Prashant Kumar Mishra"},{"@pid":"11/9715","text":"Raghuraj Singh"},{"@pid":"227/0156","text":"Vibhash Yadav"}]},"title":"Improving reliability in MAS by rule-based logic and cryptographic techniques.","venue":"Int. J. Adv. Intell. Paradigms","volume":"16","number":"3/4","pages":"285-305","year":"2020","type":"Journal Articles","access":"closed","key":"journals/ijaip/MishraSY20","doi":"10.1504/IJAIP.2020.107527","ee":"https://doi.org/10.1504/IJAIP.2020.107527","url":"https://dblp.org/rec/journals/ijaip/MishraSY20"}, "url":"URL#1573934" }, { "@score":"1", "@id":"1573935", "info":{"authors":{"author":{"@pid":"182/7102","text":"Murali Mohanan"}},"title":"Automated transformation of NL to OCL constraints via SBVR.","venue":"Int. J. Adv. Intell. Paradigms","volume":"16","number":"3/4","pages":"229-240","year":"2020","type":"Journal Articles","access":"closed","key":"journals/ijaip/Mohanan20","doi":"10.1504/IJAIP.2020.107524","ee":"https://doi.org/10.1504/IJAIP.2020.107524","url":"https://dblp.org/rec/journals/ijaip/Mohanan20"}, "url":"URL#1573935" }, { "@score":"1", "@id":"1573936", "info":{"authors":{"author":[{"@pid":"272/0854","text":"P. Mukilan"},{"@pid":"227/8632","text":"Mikias Hailu Kebede"},{"@pid":"164/9187","text":"N. M. Saravana Kumar"}]},"title":"2n factorial design of view of thermal images for detection correlation coefficient variants factors of object for environmental issues.","venue":"Int. J. Adv. Intell. Paradigms","volume":"17","number":"1/2","pages":"80-90","year":"2020","type":"Journal Articles","access":"closed","key":"journals/ijaip/MukilanKK20","doi":"10.1504/IJAIP.2020.108763","ee":"https://doi.org/10.1504/IJAIP.2020.108763","url":"https://dblp.org/rec/journals/ijaip/MukilanKK20"}, "url":"URL#1573936" }, { "@score":"1", "@id":"1573937", "info":{"authors":{"author":[{"@pid":"236/2696","text":"M. S. Narasimha Murthy"},{"@pid":"88/794","text":"V. Suma 0001"},{"@pid":"272/0847","text":"C. N. Chandrappa"},{"@pid":"272/1042","text":"M. Mepparambath Shankar"}]},"title":"Factors influencing effectiveness of testing applications in cloud using regression testing: a statistical analysis.","venue":"Int. J. Adv. Intell. Paradigms","volume":"17","number":"1/2","pages":"109-126","year":"2020","type":"Journal Articles","access":"closed","key":"journals/ijaip/MurthySCS20","doi":"10.1504/IJAIP.2020.108770","ee":"https://doi.org/10.1504/IJAIP.2020.108770","url":"https://dblp.org/rec/journals/ijaip/MurthySCS20"}, "url":"URL#1573937" }, { "@score":"1", "@id":"1573938", "info":{"authors":{"author":[{"@pid":"223/1503","text":"Neelamshobha Nirala"},{"@pid":"206/9202","text":"R. Periyasamy"},{"@pid":"182/6124","text":"Awanish Kumar"}]},"title":"Study of skin flow motion pattern using photoplethysmogram.","venue":"Int. J. Adv. Intell. Paradigms","volume":"16","number":"3/4","pages":"241-264","year":"2020","type":"Journal Articles","access":"closed","key":"journals/ijaip/NiralaPK20","doi":"10.1504/IJAIP.2020.107525","ee":"https://doi.org/10.1504/IJAIP.2020.107525","url":"https://dblp.org/rec/journals/ijaip/NiralaPK20"}, "url":"URL#1573938" }, { "@score":"1", "@id":"1573939", "info":{"authors":{"author":[{"@pid":"181/9040","text":"Adel Ouannas"},{"@pid":"67/9796","text":"Ahmad Taher Azar"},{"@pid":"204/7876","text":"Toufik Ziar"}]},"title":"Fractional inverse full state hybrid projective synchronisation.","venue":"Int. J. Adv. Intell. Paradigms","volume":"17","number":"3/4","pages":"279-298","year":"2020","type":"Journal Articles","access":"closed","key":"journals/ijaip/OuannasAZ20","doi":"10.1504/IJAIP.2020.109511","ee":"https://doi.org/10.1504/IJAIP.2020.109511","url":"https://dblp.org/rec/journals/ijaip/OuannasAZ20"}, "url":"URL#1573939" }, { "@score":"1", "@id":"1573940", "info":{"authors":{"author":[{"@pid":"228/4439","text":"R. Priyadarshini"},{"@pid":"17/1270","text":"Latha Tamilselvan"}]},"title":"Semantic linkage of source content dynamically with virtual documents using Wikipedia in Hadoop.","venue":"Int. J. Adv. Intell. Paradigms","volume":"16","number":"3/4","pages":"338-354","year":"2020","type":"Journal Articles","access":"closed","key":"journals/ijaip/PriyadarshiniT20","doi":"10.1504/IJAIP.2020.107530","ee":"https://doi.org/10.1504/IJAIP.2020.107530","url":"https://dblp.org/rec/journals/ijaip/PriyadarshiniT20"}, "url":"URL#1573940" }, { "@score":"1", "@id":"1573941", "info":{"authors":{"author":[{"@pid":"264/3152","text":"Yasser Qawasmeh"},{"@pid":"169/3260","text":"Sari Awwad"},{"@pid":"78/1666","text":"Ahmed Fawzi Otoom"},{"@pid":"12/4519","text":"Feras Hanandeh"},{"@pid":"95/9115","text":"Emad Eddien Abdallah"}]},"title":"Local patterns for offline Arabic handwritten recognition.","venue":"Int. J. Adv. Intell. Paradigms","volume":"16","number":"2","pages":"203-215","year":"2020","type":"Journal Articles","access":"closed","key":"journals/ijaip/QawasmehAOHA20","doi":"10.1504/IJAIP.2020.107017","ee":"https://doi.org/10.1504/IJAIP.2020.107017","url":"https://dblp.org/rec/journals/ijaip/QawasmehAOHA20"}, "url":"URL#1573941" }, { "@score":"1", "@id":"1573942", "info":{"authors":{"author":[{"@pid":"78/8460","text":"Marjan Kuchaki Rafsanjani"},{"@pid":"215/7346","text":"Milad Riyahi"}]},"title":"A new hybrid genetic algorithm for job shop scheduling problem.","venue":"Int. J. Adv. Intell. Paradigms","volume":"16","number":"2","pages":"157-171","year":"2020","type":"Journal Articles","access":"closed","key":"journals/ijaip/RafsanjaniR20","doi":"10.1504/IJAIP.2020.107012","ee":"https://doi.org/10.1504/IJAIP.2020.107012","url":"https://dblp.org/rec/journals/ijaip/RafsanjaniR20"}, "url":"URL#1573942" }, { "@score":"1", "@id":"1573943", "info":{"authors":{"author":[{"@pid":"266/7813","text":"T. R. Raguraman"},{"@pid":"43/10592","text":"R. Sudhakara Pandian"},{"@pid":"212/3215","text":"R. Kamalakannan"}]},"title":"Threshold algorithm for the cell formation problem.","venue":"Int. J. Adv. Intell. Paradigms","volume":"16","number":"3/4","pages":"368-380","year":"2020","type":"Journal Articles","access":"closed","key":"journals/ijaip/RaguramanPK20","doi":"10.1504/IJAIP.2020.107538","ee":"https://doi.org/10.1504/IJAIP.2020.107538","url":"https://dblp.org/rec/journals/ijaip/RaguramanPK20"}, "url":"URL#1573943" }, { "@score":"1", "@id":"1573944", "info":{"authors":{"author":[{"@pid":"56/8802","text":"Mayur Rahul"},{"@pid":"223/9231","text":"Narendra Kohli"},{"@pid":"17/7859","text":"Rashi Agarwal"}]},"title":"Facial expression recognition using local binary pattern and modified hidden Markov model.","venue":"Int. J. Adv. Intell. Paradigms","volume":"17","number":"3/4","pages":"367-378","year":"2020","type":"Journal Articles","access":"closed","key":"journals/ijaip/RahulKA20","doi":"10.1504/IJAIP.2020.109523","ee":"https://doi.org/10.1504/IJAIP.2020.109523","url":"https://dblp.org/rec/journals/ijaip/RahulKA20"}, "url":"URL#1573944" }, { "@score":"1", "@id":"1573945", "info":{"authors":{"author":[{"@pid":"38/6988","text":"S. Ravikumar"},{"@pid":"137/1617","text":"H. Vennila"},{"@pid":"266/8339","text":"B. Ajai"}]},"title":"THD minimisation using genetic algorithm on the nine-level multilevel inverters.","venue":"Int. J. Adv. Intell. Paradigms","volume":"16","number":"3/4","pages":"306-323","year":"2020","type":"Journal Articles","access":"closed","key":"journals/ijaip/RavikumarVA20","doi":"10.1504/IJAIP.2020.107528","ee":"https://doi.org/10.1504/IJAIP.2020.107528","url":"https://dblp.org/rec/journals/ijaip/RavikumarVA20"}, "url":"URL#1573945" }, { "@score":"1", "@id":"1573946", "info":{"authors":{"author":[{"@pid":"132/9684","text":"Zaher Salah"},{"@pid":"154/1830","text":"Abdel-Rahman Al-Ghuwairi"},{"@pid":"204/0677","text":"Ahmad A. Al-Oqaily"},{"@pid":"204/0769","text":"Aladdin Hussein Baarah"},{"@pid":"37/9609","text":"Ayoub Alsarhan"}]},"title":"A comparative investigation of approaches for web search results clustering.","venue":"Int. J. Adv. Intell. Paradigms","volume":"17","number":"3/4","pages":"342-366","year":"2020","type":"Journal Articles","access":"closed","key":"journals/ijaip/SalahAABA20","doi":"10.1504/IJAIP.2020.109516","ee":"https://doi.org/10.1504/IJAIP.2020.109516","url":"https://dblp.org/rec/journals/ijaip/SalahAABA20"}, "url":"URL#1573946" }, { "@score":"1", "@id":"1573947", "info":{"authors":{"author":[{"@pid":"168/3194","text":"M. Umme Salma"},{"@pid":"119/4927","text":"Doreswamy"}]},"title":"Hybrid BATGSA: a metaheuristic model for classification of breast cancer data.","venue":"Int. J. Adv. Intell. Paradigms","volume":"15","number":"2","pages":"207-227","year":"2020","type":"Journal Articles","access":"closed","key":"journals/ijaip/SalmaD20","doi":"10.1504/IJAIP.2020.105144","ee":"https://doi.org/10.1504/IJAIP.2020.105144","url":"https://dblp.org/rec/journals/ijaip/SalmaD20"}, "url":"URL#1573947" }, { "@score":"1", "@id":"1573948", "info":{"authors":{"author":[{"@pid":"264/3448","text":"Raheleh Samadi"},{"@pid":"55/6792","text":"Mohammad Nassiri"},{"@pid":"86/5979","text":"Muharram Mansoorizadeh"}]},"title":"Energy-aware traffic engineering in IP networks using non-dominated sorting genetic II algorithm.","venue":"Int. J. Adv. Intell. Paradigms","volume":"16","number":"1","pages":"75-87","year":"2020","type":"Journal Articles","access":"closed","key":"journals/ijaip/SamadiNM20","doi":"10.1504/IJAIP.2020.106691","ee":"https://doi.org/10.1504/IJAIP.2020.106691","url":"https://dblp.org/rec/journals/ijaip/SamadiNM20"}, "url":"URL#1573948" }, { "@score":"1", "@id":"1573949", "info":{"authors":{"author":[{"@pid":"154/2345","text":"J. Sangeetha"},{"@pid":"195/0004","text":"R. Brindha"},{"@pid":"65/7297","text":"S. Jothilakshmi 0001"}]},"title":"Speech-based automatic personality trait prediction analysis.","venue":"Int. J. Adv. Intell. Paradigms","volume":"17","number":"1/2","pages":"91-108","year":"2020","type":"Journal Articles","access":"closed","key":"journals/ijaip/SangeethaBJ20","doi":"10.1504/IJAIP.2020.108766","ee":"https://doi.org/10.1504/IJAIP.2020.108766","url":"https://dblp.org/rec/journals/ijaip/SangeethaBJ20"}, "url":"URL#1573949" }, { "@score":"1", "@id":"1573950", "info":{"authors":{"author":[{"@pid":"24/8667","text":"M. Senthilkumar"},{"@pid":"264/3157","text":"P. Ilango"}]},"title":"Energy aware task scheduling using hybrid firefly - GA in big data.","venue":"Int. J. Adv. Intell. Paradigms","volume":"16","number":"2","pages":"99-112","year":"2020","type":"Journal Articles","access":"closed","key":"journals/ijaip/SenthilkumarI20","doi":"10.1504/IJAIP.2020.107008","ee":"https://doi.org/10.1504/IJAIP.2020.107008","url":"https://dblp.org/rec/journals/ijaip/SenthilkumarI20"}, "url":"URL#1573950" }, { "@score":"1", "@id":"1573951", "info":{"authors":{"author":[{"@pid":"217/9837","text":"Aviral Sharma"},{"@pid":"67/7464","text":"Vishal Bhatnagar"},{"@pid":"87/6925","text":"Abhay Bansal"}]},"title":"Technical analysis-based fuzzy support system for stock market trading.","venue":"Int. J. Adv. Intell. Paradigms","volume":"17","number":"3/4","pages":"193-207","year":"2020","type":"Journal Articles","access":"closed","key":"journals/ijaip/SharmaBB20","doi":"10.1504/IJAIP.2020.109507","ee":"https://doi.org/10.1504/IJAIP.2020.109507","url":"https://dblp.org/rec/journals/ijaip/SharmaBB20"}, "url":"URL#1573951" }, { "@score":"1", "@id":"1573952", "info":{"authors":{"author":[{"@pid":"81/164","text":"V. P. Singh"},{"@pid":"272/0886","text":"J. K. Bokam"},{"@pid":"08/4273","text":"S. P. Singh"}]},"title":"Best-case, worst-case and mean integral-square-errors for reduction of continuous interval systems.","venue":"Int. J. Adv. Intell. Paradigms","volume":"17","number":"1/2","pages":"17-28","year":"2020","type":"Journal Articles","access":"closed","key":"journals/ijaip/SinghBS20","doi":"10.1504/IJAIP.2020.108757","ee":"https://doi.org/10.1504/IJAIP.2020.108757","url":"https://dblp.org/rec/journals/ijaip/SinghBS20"}, "url":"URL#1573952" }, { "@score":"1", "@id":"1573953", "info":{"authors":{"author":[{"@pid":"78/566","text":"M. S. Sinith"},{"@pid":"17/3022","text":"K. V. V. Murthy"},{"@pid":"38/227","text":"Shikha Tripathi"}]},"title":"Raga recognition through tonic identification using flute acoustics.","venue":"Int. J. Adv. Intell. Paradigms","volume":"15","number":"3","pages":"273-286","year":"2020","type":"Journal Articles","access":"closed","key":"journals/ijaip/SinithMT20","doi":"10.1504/IJAIP.2020.105821","ee":"https://doi.org/10.1504/IJAIP.2020.105821","url":"https://dblp.org/rec/journals/ijaip/SinithMT20"}, "url":"URL#1573953" }, { "@score":"1", "@id":"1573954", "info":{"authors":{"author":[{"@pid":"62/5331","text":"Makram Soui"},{"@pid":"28/6183","text":"Mourad Abed"},{"@pid":"128/2554","text":"Adnane Ghannem"},{"@pid":"264/3233","text":"Daouas Karim"}]},"title":"Adaptive tutoring system based on fuzzy logic.","venue":"Int. J. Adv. Intell. Paradigms","volume":"16","number":"2","pages":"132-144","year":"2020","type":"Journal Articles","access":"closed","key":"journals/ijaip/SouiAGK20","doi":"10.1504/IJAIP.2020.107010","ee":"https://doi.org/10.1504/IJAIP.2020.107010","url":"https://dblp.org/rec/journals/ijaip/SouiAGK20"}, "url":"URL#1573954" }, { "@score":"1", "@id":"1573955", "info":{"authors":{"author":[{"@pid":"241/3624","text":"E. Suganya"},{"@pid":"266/7947","text":"N. Aravindhraj"},{"@pid":"266/8337","text":"S. Sountharrajan"},{"@pid":"12/1889","text":"G. Sathish Kumar"},{"@pid":"256/0497","text":"C. Rajan"}]},"title":"Automatic classification for preventing duplication of online multimedia data in secure cloud infrastructure.","venue":"Int. J. Adv. Intell. Paradigms","volume":"16","number":"3/4","pages":"404-413","year":"2020","type":"Journal Articles","access":"closed","key":"journals/ijaip/SuganyaASKR20","doi":"10.1504/IJAIP.2020.107542","ee":"https://doi.org/10.1504/IJAIP.2020.107542","url":"https://dblp.org/rec/journals/ijaip/SuganyaASKR20"}, "url":"URL#1573955" }, { "@score":"1", "@id":"1573956", "info":{"authors":{"author":[{"@pid":"247/9259","text":"Remani T"},{"@pid":"247/9437","text":"E. A. Jasmin"},{"@pid":"137/2957","text":"T. P. Imthias Ahamed"}]},"title":"Residential load scheduling considering maximum demand using binary particle swarm optimisation.","venue":"Int. J. Adv. Intell. Paradigms","volume":"17","number":"1/2","pages":"29-43","year":"2020","type":"Journal Articles","access":"closed","key":"journals/ijaip/TJA20","doi":"10.1504/IJAIP.2020.108758","ee":"https://doi.org/10.1504/IJAIP.2020.108758","url":"https://dblp.org/rec/journals/ijaip/TJA20"}, "url":"URL#1573956" }, { "@score":"1", "@id":"1573957", "info":{"authors":{"author":[{"@pid":"266/7327","text":"Vuyyuru Tejaswi"},{"@pid":"250/6332","text":"Aravindhan Surendar"},{"@pid":"250/6155","text":"N. Srikanta"}]},"title":"Simulink implementation of RLS algorithm for resilient artefacts removal in ECG signal.","venue":"Int. J. Adv. Intell. Paradigms","volume":"16","number":"3/4","pages":"324-337","year":"2020","type":"Journal Articles","access":"closed","key":"journals/ijaip/TejaswiSS20","doi":"10.1504/IJAIP.2020.107529","ee":"https://doi.org/10.1504/IJAIP.2020.107529","url":"https://dblp.org/rec/journals/ijaip/TejaswiSS20"}, "url":"URL#1573957" }, { "@score":"1", "@id":"1573958", "info":{"authors":{"author":[{"@pid":"272/1121","text":"S. Shanthi Therese"},{"@pid":"225/0903","text":"Chelpa Lingam"}]},"title":"Optimisation of training samples in recognition of overlapping speech and identification of speaker in a two speakers situation.","venue":"Int. J. Adv. Intell. Paradigms","volume":"17","number":"1/2","pages":"159-177","year":"2020","type":"Journal Articles","access":"closed","key":"journals/ijaip/ThereseL20","doi":"10.1504/IJAIP.2020.108773","ee":"https://doi.org/10.1504/IJAIP.2020.108773","url":"https://dblp.org/rec/journals/ijaip/ThereseL20"}, "url":"URL#1573958" }, { "@score":"1", "@id":"1573959", "info":{"authors":{"author":[{"@pid":"212/3287","text":"R. Valanarasu"},{"@pid":"212/3238","text":"A. Christy"}]},"title":"Enhancement of enterprise resource planning system by analysing feasibility and critical factors.","venue":"Int. J. Adv. Intell. Paradigms","volume":"17","number":"1/2","pages":"3-16","year":"2020","type":"Journal Articles","access":"closed","key":"journals/ijaip/ValanarasuC20","doi":"10.1504/IJAIP.2020.108756","ee":"https://doi.org/10.1504/IJAIP.2020.108756","url":"https://dblp.org/rec/journals/ijaip/ValanarasuC20"}, "url":"URL#1573959" }, { "@score":"1", "@id":"1573960", "info":{"authors":{"author":[{"@pid":"266/7908","text":"M. Varalatchoumy"},{"@pid":"54/9553","text":"M. Ravishankar"}]},"title":"A novel system for early detection of breast cancer using area and entropy features of malignant tumour.","venue":"Int. J. Adv. Intell. Paradigms","volume":"16","number":"3/4","pages":"355-367","year":"2020","type":"Journal Articles","access":"closed","key":"journals/ijaip/VaralatchoumyR20","doi":"10.1504/IJAIP.2020.107535","ee":"https://doi.org/10.1504/IJAIP.2020.107535","url":"https://dblp.org/rec/journals/ijaip/VaralatchoumyR20"}, "url":"URL#1573960" }, { "@score":"1", "@id":"1573961", "info":{"authors":{"author":[{"@pid":"198/4011","text":"Shriram K. Vasudevan"},{"@pid":"264/3255","text":"Karthik Venkatalachalam"},{"@pid":"264/3442","text":"S. Aakash Preethi"},{"@pid":"264/3151","text":"G. Mithula"},{"@pid":"264/3304","text":"G. Navethra"},{"@pid":"61/8405","text":"Krithika Nagarajan"}]},"title":"An interactive and innovative application for hand rehabilitation through virtual reality.","venue":"Int. J. Adv. Intell. Paradigms","volume":"15","number":"3","pages":"252-272","year":"2020","type":"Journal Articles","access":"closed","key":"journals/ijaip/VasudevanVPMNN20","doi":"10.1504/IJAIP.2020.105816","ee":"https://doi.org/10.1504/IJAIP.2020.105816","url":"https://dblp.org/rec/journals/ijaip/VasudevanVPMNN20"}, "url":"URL#1573961" }, { "@score":"1", "@id":"1573962", "info":{"authors":{"author":[{"@pid":"198/4011","text":"Shriram K. Vasudevan"},{"@pid":"210/7728","text":"Karthik Venkatachalam"},{"@pid":"264/3093","text":"Harii Shree"},{"@pid":"264/3382","text":"Rani B. Keerthana"},{"@pid":"35/11134","text":"G. Priyadarshini"}]},"title":"An intelligent and interactive AR-based location identifier for indoor navigation.","venue":"Int. J. Adv. Intell. Paradigms","volume":"15","number":"1","pages":"32-50","year":"2020","type":"Journal Articles","access":"closed","key":"journals/ijaip/VasudevanVSKP20","doi":"10.1504/IJAIP.2020.104105","ee":"https://doi.org/10.1504/IJAIP.2020.104105","url":"https://dblp.org/rec/journals/ijaip/VasudevanVSKP20"}, "url":"URL#1573962" }, { "@score":"1", "@id":"1573963", "info":{"authors":{"author":[{"@pid":"60/9036","text":"P. Vijayakumar"},{"@pid":"74/10858","text":"S. Sukumaran"}]},"title":"Effective content-based pattern predicted text mining using PSE model.","venue":"Int. J. Adv. Intell. Paradigms","volume":"15","number":"1","pages":"108-115","year":"2020","type":"Journal Articles","access":"closed","key":"journals/ijaip/VijayakumarS20","doi":"10.1504/IJAIP.2020.104111","ee":"https://doi.org/10.1504/IJAIP.2020.104111","url":"https://dblp.org/rec/journals/ijaip/VijayakumarS20"}, "url":"URL#1573963" }, { "@score":"1", "@id":"1573964", "info":{"authors":{"author":[{"@pid":"266/7907","text":"Neha Vutakuri"},{"@pid":"59/9360","text":"Amineni Uma Maheswari"}]},"title":"Breast cancer diagnosis using a Minkowski distance method based on mutual information and genetic algorithm.","venue":"Int. J. Adv. Intell. Paradigms","volume":"16","number":"3/4","pages":"414-433","year":"2020","type":"Journal Articles","access":"closed","key":"journals/ijaip/VutakuriM20","doi":"10.1504/IJAIP.2020.107537","ee":"https://doi.org/10.1504/IJAIP.2020.107537","url":"https://dblp.org/rec/journals/ijaip/VutakuriM20"}, "url":"URL#1573964" }, { "@score":"1", "@id":"1573965", "info":{"authors":{"author":[{"@pid":"227/8812","text":"Vikash Yadav"},{"@pid":"202/5466","text":"Deepak Kumar Mishra"},{"@pid":"264/3380","text":"Prathmesh Singh"},{"@pid":"264/3171","text":"Priytosh Kumar Tripathi"}]},"title":"Home automation system using Raspberry Pi Zero W.","venue":"Int. J. Adv. Intell. Paradigms","volume":"16","number":"2","pages":"216-226","year":"2020","type":"Journal Articles","access":"closed","key":"journals/ijaip/YadavMST20","doi":"10.1504/IJAIP.2020.107023","ee":"https://doi.org/10.1504/IJAIP.2020.107023","url":"https://dblp.org/rec/journals/ijaip/YadavMST20"}, "url":"URL#1573965" }, { "@score":"1", "@id":"2004709", "info":{"authors":{"author":[{"@pid":"151/6608","text":"Med Karim Abdmouleh"},{"@pid":"198/4353","text":"Hedi Amri"},{"@pid":"128/7962","text":"Ali Khalfallah"},{"@pid":"72/6246","text":"Med Salim Bouhlel"}]},"title":"An efficient crypto-compression scheme for medical images by selective encryption using DCT.","venue":"Int. J. Adv. Intell. Paradigms","volume":"13","number":"1/2","pages":"32-42","year":"2019","type":"Journal Articles","access":"closed","key":"journals/ijaip/AbdmoulehAKB19","doi":"10.1504/IJAIP.2019.099942","ee":"https://doi.org/10.1504/IJAIP.2019.099942","url":"https://dblp.org/rec/journals/ijaip/AbdmoulehAKB19"}, "url":"URL#2004709" }, { "@score":"1", "@id":"2004710", "info":{"authors":{"author":[{"@pid":"297/2131","text":"Hannah Morenike Adebanjo"},{"@pid":"67/3647","text":"Jules-Raymond Tapamo"}]},"title":"Graph embedded discriminant analysis for the extraction of features in hyperspectral images.","venue":"Int. J. Adv. Intell. Paradigms","volume":"14","number":"3/4","pages":"215-235","year":"2019","type":"Journal Articles","access":"closed","key":"journals/ijaip/AdebanjoT19","doi":"10.1504/IJAIP.2019.103410","ee":"https://doi.org/10.1504/IJAIP.2019.103410","url":"https://dblp.org/rec/journals/ijaip/AdebanjoT19"}, "url":"URL#2004710" }, { "@score":"1", "@id":"2004711", "info":{"authors":{"author":[{"@pid":"206/5570","text":"Himani Bansal"},{"@pid":"66/11293","text":"Shruti Kohli"}]},"title":"Trust evaluation of websites: a comprehensive study.","venue":"Int. J. Adv. Intell. Paradigms","volume":"13","number":"1/2","pages":"101-112","year":"2019","type":"Journal Articles","access":"closed","key":"journals/ijaip/BansalK19","doi":"10.1504/IJAIP.2019.099946","ee":"https://doi.org/10.1504/IJAIP.2019.099946","url":"https://dblp.org/rec/journals/ijaip/BansalK19"}, "url":"URL#2004711" }, { "@score":"1", "@id":"2004712", "info":{"authors":{"author":[{"@pid":"207/1271","text":"B. R. Tapas Bapu"},{"@pid":"207/0930","text":"L. C. Siddanna Gowd"}]},"title":"Malicious node detection through run time self-healing algorithm in WSN.","venue":"Int. J. Adv. Intell. Paradigms","volume":"12","number":"1/2","pages":"45-56","year":"2019","type":"Journal Articles","access":"closed","key":"journals/ijaip/BapuG19","doi":"10.1504/IJAIP.2019.096951","ee":"https://doi.org/10.1504/IJAIP.2019.096951","url":"https://dblp.org/rec/journals/ijaip/BapuG19"}, "url":"URL#2004712" }, { "@score":"1", "@id":"2004713", "info":{"authors":{"author":[{"@pid":"202/6145","text":"M. Bhagyavathi"},{"@pid":"98/7391","text":"Vankadara Saritha"}]},"title":"Energy and velocity-based multipath routing protocol for VANET.","venue":"Int. J. Adv. Intell. Paradigms","volume":"12","number":"3/4","pages":"239-253","year":"2019","type":"Journal Articles","access":"closed","key":"journals/ijaip/BhagyavathiS19","doi":"10.1504/IJAIP.2019.098562","ee":"https://doi.org/10.1504/IJAIP.2019.098562","url":"https://dblp.org/rec/journals/ijaip/BhagyavathiS19"}, "url":"URL#2004713" }, { "@score":"1", "@id":"2004714", "info":{"authors":{"author":[{"@pid":"122/2057-1","text":"Ayan Chakraborty 0001"},{"@pid":"78/2168","text":"Debdeep Banerjee"},{"@pid":"196/7634","text":"Radha Tamal Goswami"}]},"title":"Identification of human activity pattern in controlled web environment: an adaptive framework.","venue":"Int. J. Adv. Intell. Paradigms","volume":"14","number":"1/2","pages":"157-173","year":"2019","type":"Journal Articles","access":"closed","key":"journals/ijaip/ChakrabortyBG19","doi":"10.1504/IJAIP.2019.102969","ee":"https://doi.org/10.1504/IJAIP.2019.102969","url":"https://dblp.org/rec/journals/ijaip/ChakrabortyBG19"}, "url":"URL#2004714" }, { "@score":"1", "@id":"2004715", "info":{"authors":{"author":[{"@pid":"43/11258","text":"Udit Kr. Chakraborty"},{"@pid":"168/6842","text":"Debanjan Konar"},{"@pid":"65/1484","text":"Samir Roy"},{"@pid":"15/757","text":"Sankhayan Choudhury"}]},"title":"Automatic short answer grading using rough concept clusters.","venue":"Int. J. Adv. Intell. Paradigms","volume":"14","number":"3/4","pages":"260-280","year":"2019","type":"Journal Articles","access":"closed","key":"journals/ijaip/ChakrabortyKRC19","doi":"10.1504/IJAIP.2019.103413","ee":"https://doi.org/10.1504/IJAIP.2019.103413","url":"https://dblp.org/rec/journals/ijaip/ChakrabortyKRC19"}, "url":"URL#2004715" }, { "@score":"1", "@id":"2004716", "info":{"authors":{"author":{"@pid":"153/3235","text":"S. G. Charan"}},"title":"Face recognition using combined binary particle swarm optimisation and hidden layer of artificial neural network.","venue":"Int. J. Adv. Intell. Paradigms","volume":"14","number":"1/2","pages":"70-79","year":"2019","type":"Journal Articles","access":"closed","key":"journals/ijaip/Charan19","doi":"10.1504/IJAIP.2019.102964","ee":"https://doi.org/10.1504/IJAIP.2019.102964","url":"https://dblp.org/rec/journals/ijaip/Charan19"}, "url":"URL#2004716" }, { "@score":"1", "@id":"2004717", "info":{"authors":{"author":[{"@pid":"174/6049","text":"Mehdi Dadkhah"},{"@pid":"180/9482","text":"Vyacheslav V. Lyashenko"},{"@pid":"239/6331","text":"Zhanna V. Deineko"},{"@pid":"81/11074","text":"Shahaboddin Shamshirband"},{"@pid":"31/3429","text":"Mohammad Davarpanah Jazi"}]},"title":"Methodology of wavelet analysis in research of dynamics of phishing attacks.","venue":"Int. J. Adv. Intell. Paradigms","volume":"12","number":"3/4","pages":"220-238","year":"2019","type":"Journal Articles","access":"closed","key":"journals/ijaip/DadkhahLDSJ19","doi":"10.1504/IJAIP.2019.098561","ee":"https://doi.org/10.1504/IJAIP.2019.098561","url":"https://dblp.org/rec/journals/ijaip/DadkhahLDSJ19"}, "url":"URL#2004717" }, { "@score":"1", "@id":"2004718", "info":{"authors":{"author":[{"@pid":"211/0223","text":"Aziz Dahbi"},{"@pid":"89/4653","text":"Asmaa El Hannani"},{"@pid":"22/5501","text":"Abdelhak Aqqal"},{"@pid":"40/7257","text":"Abdelfatteh Haidine"}]},"title":"Power audit: an estimation model-based tool as a support for monitoring power consumption in a distributed network infrastructure.","venue":"Int. J. Adv. Intell. Paradigms","volume":"13","number":"3/4","pages":"394-419","year":"2019","type":"Journal Articles","access":"closed","key":"journals/ijaip/DahbiHAH19","doi":"10.1504/IJAIP.2019.101987","ee":"https://doi.org/10.1504/IJAIP.2019.101987","url":"https://dblp.org/rec/journals/ijaip/DahbiHAH19"}, "url":"URL#2004718" }, { "@score":"1", "@id":"2004719", "info":{"authors":{"author":[{"@pid":"205/4656","text":"Rupak Datta"},{"@pid":"14/8619","text":"Rajeeb Dey"},{"@pid":"174/7221","text":"Baby Bhattacharya"}]},"title":"Further improved stability condition for T-S fuzzy time-varying delay systems via generalised inequality.","venue":"Int. J. Adv. Intell. Paradigms","volume":"14","number":"3/4","pages":"310-327","year":"2019","type":"Journal Articles","access":"closed","key":"journals/ijaip/DattaDB19","doi":"10.1504/IJAIP.2019.103438","ee":"https://doi.org/10.1504/IJAIP.2019.103438","url":"https://dblp.org/rec/journals/ijaip/DattaDB19"}, "url":"URL#2004719" }, { "@score":"1", "@id":"2004720", "info":{"authors":{"author":[{"@pid":"24/7703-2","text":"Arindam Dey 0002"},{"@pid":"36/11230","text":"Anita Pal"}]},"title":"Computing the shortest path with words.","venue":"Int. J. Adv. Intell. Paradigms","volume":"12","number":"3/4","pages":"355-369","year":"2019","type":"Journal Articles","access":"closed","key":"journals/ijaip/DeyP19","doi":"10.1504/IJAIP.2019.098577","ee":"https://doi.org/10.1504/IJAIP.2019.098577","url":"https://dblp.org/rec/journals/ijaip/DeyP19"}, "url":"URL#2004720" }, { "@score":"1", "@id":"2004721", "info":{"authors":{"author":[{"@pid":"203/5803","text":"E. Dhiravidachelvi"},{"@pid":"09/7392","text":"V. Rajamani"},{"@pid":"160/9535","text":"C. T. Manimegalai"}]},"title":"GLCM-based detection and classification of microaneurysm in diabetic retinopathy fundus images.","venue":"Int. J. Adv. Intell. Paradigms","volume":"14","number":"1/2","pages":"55-69","year":"2019","type":"Journal Articles","access":"closed","key":"journals/ijaip/Dhiravidachelvi19","doi":"10.1504/IJAIP.2019.102963","ee":"https://doi.org/10.1504/IJAIP.2019.102963","url":"https://dblp.org/rec/journals/ijaip/Dhiravidachelvi19"}, "url":"URL#2004721" }, { "@score":"1", "@id":"2004722", "info":{"authors":{"author":[{"@pid":"243/5060","text":"Sachin Dube"},{"@pid":"142/1447","text":"Kavita Sharma 0001"}]},"title":"Hybrid approach to enhance contrast of image for forensic investigation using segmented histogram.","venue":"Int. J. Adv. Intell. Paradigms","volume":"13","number":"1/2","pages":"43-66","year":"2019","type":"Journal Articles","access":"closed","key":"journals/ijaip/DubeS19","doi":"10.1504/IJAIP.2019.099943","ee":"https://doi.org/10.1504/IJAIP.2019.099943","url":"https://dblp.org/rec/journals/ijaip/DubeS19"}, "url":"URL#2004722" }, { "@score":"1", "@id":"2004723", "info":{"authors":{"author":[{"@pid":"249/8671","text":"Hachim Fall"},{"@pid":"37/8654","text":"Ouadoudi Zytoune"},{"@pid":"249/8474","text":"Mohamed Yahyai"}]},"title":"Contribution to radio resource distribution approach in wireless cellular software defined networking.","venue":"Int. J. Adv. Intell. Paradigms","volume":"13","number":"3/4","pages":"449-461","year":"2019","type":"Journal Articles","access":"closed","key":"journals/ijaip/FallZY19","doi":"10.1504/IJAIP.2019.101991","ee":"https://doi.org/10.1504/IJAIP.2019.101991","url":"https://dblp.org/rec/journals/ijaip/FallZY19"}, "url":"URL#2004723" }, { "@score":"1", "@id":"2004724", "info":{"authors":{"author":[{"@pid":"155/4212","text":"Ekta Gandotra"},{"@pid":"92/7491","text":"Divya Bansal"},{"@pid":"70/7034","text":"Sanjeev Sofat"}]},"title":"Malware intelligence: beyond malware analysis.","venue":"Int. J. Adv. Intell. Paradigms","volume":"13","number":"1/2","pages":"80-100","year":"2019","type":"Journal Articles","access":"closed","key":"journals/ijaip/GandotraBS19","doi":"10.1504/IJAIP.2019.099945","ee":"https://doi.org/10.1504/IJAIP.2019.099945","url":"https://dblp.org/rec/journals/ijaip/GandotraBS19"}, "url":"URL#2004724" }, { "@score":"1", "@id":"2004725", "info":{"authors":{"author":[{"@pid":"98/2038","text":"Pinaki Ghosh"},{"@pid":"38/9716","text":"T. R. Mahesh 0001"}]},"title":"Untraceable privacy-preserving authentication protocol for RFID tag using salted hash algorithm.","venue":"Int. J. Adv. Intell. Paradigms","volume":"13","number":"1/2","pages":"193-209","year":"2019","type":"Journal Articles","access":"closed","key":"journals/ijaip/GhoshM19","doi":"10.1504/IJAIP.2019.099951","ee":"https://doi.org/10.1504/IJAIP.2019.099951","url":"https://dblp.org/rec/journals/ijaip/GhoshM19"}, "url":"URL#2004725" }, { "@score":"1", "@id":"2004726", "info":{"authors":{"author":[{"@pid":"209/7231","text":"Soumi Ghosh"},{"@pid":"14/9100","text":"Ajay Rana"},{"@pid":"209/8042","text":"Vineet Kansal"}]},"title":"A statistical comparison for evaluating the effectiveness of linear and nonlinear manifold detection techniques for software defect prediction.","venue":"Int. J. Adv. Intell. Paradigms","volume":"12","number":"3/4","pages":"370-391","year":"2019","type":"Journal Articles","access":"closed","key":"journals/ijaip/GhoshRK19","doi":"10.1504/IJAIP.2019.098578","ee":"https://doi.org/10.1504/IJAIP.2019.098578","url":"https://dblp.org/rec/journals/ijaip/GhoshRK19"}, "url":"URL#2004726" }, { "@score":"1", "@id":"2004727", "info":{"authors":{"author":[{"@pid":"237/0497","text":"Indresh Kumar Gupta"},{"@pid":"227/8812","text":"Vikash Yadav"},{"@pid":"46/2681","text":"Sushil Kumar"}]},"title":"Medical data clustering based on particle swarm optimisation and genetic algorithm.","venue":"Int. J. Adv. Intell. Paradigms","volume":"14","number":"3/4","pages":"345-358","year":"2019","type":"Journal Articles","access":"closed","key":"journals/ijaip/GuptaYK19","doi":"10.1504/IJAIP.2019.103451","ee":"https://doi.org/10.1504/IJAIP.2019.103451","url":"https://dblp.org/rec/journals/ijaip/GuptaYK19"}, "url":"URL#2004727" }, { "@score":"1", "@id":"2004728", "info":{"authors":{"author":[{"@pid":"153/0098","text":"Izem Hamouchene"},{"@pid":"25/1870","text":"Saliha Aouat"}]},"title":"Iris recognition system based on a new combined feature extraction method.","venue":"Int. J. Adv. Intell. Paradigms","volume":"14","number":"1/2","pages":"80-106","year":"2019","type":"Journal Articles","access":"closed","key":"journals/ijaip/HamoucheneA19","doi":"10.1504/IJAIP.2019.102965","ee":"https://doi.org/10.1504/IJAIP.2019.102965","url":"https://dblp.org/rec/journals/ijaip/HamoucheneA19"}, "url":"URL#2004728" }, { "@score":"1", "@id":"2004729", "info":{"authors":{"author":[{"@pid":"239/6217","text":"N. Haripriya"},{"@pid":"206/9421","text":"P. Kavitha"},{"@pid":"132/0569","text":"Seshadhri Srinivasan"},{"@pid":"34/1868","text":"Juri Belikov"}]},"title":"Evolutionary optimisation-based fractional order controller for web transport systems in process industries.","venue":"Int. J. Adv. Intell. Paradigms","volume":"12","number":"3/4","pages":"317-330","year":"2019","type":"Journal Articles","access":"closed","key":"journals/ijaip/HaripriyaKSB19","doi":"10.1504/IJAIP.2019.098567","ee":"https://doi.org/10.1504/IJAIP.2019.098567","url":"https://dblp.org/rec/journals/ijaip/HaripriyaKSB19"}, "url":"URL#2004729" }, { "@score":"1", "@id":"2004730", "info":{"authors":{"author":[{"@pid":"264/3350","text":"D. Helen"},{"@pid":"264/3235","text":"D. Arivazhagan"}]},"title":"A stable routing algorithm for mobile ad hoc network using fuzzy logic system.","venue":"Int. J. Adv. Intell. Paradigms","volume":"14","number":"3/4","pages":"248-259","year":"2019","type":"Journal Articles","access":"closed","key":"journals/ijaip/HelenA19","doi":"10.1504/IJAIP.2019.103412","ee":"https://doi.org/10.1504/IJAIP.2019.103412","url":"https://dblp.org/rec/journals/ijaip/HelenA19"}, "url":"URL#2004730" }, { "@score":"1", "@id":"2004731", "info":{"authors":{"author":[{"@pid":"236/2662","text":"S. Beulah Hemalatha"},{"@pid":"162/4503","text":"T. Vigneswaran"}]},"title":"Reconfigurable communication wrapper for QoS demand for network on chip.","venue":"Int. J. Adv. Intell. Paradigms","volume":"12","number":"1/2","pages":"24-32","year":"2019","type":"Journal Articles","access":"closed","key":"journals/ijaip/HemalathaV19","doi":"10.1504/IJAIP.2019.096949","ee":"https://doi.org/10.1504/IJAIP.2019.096949","url":"https://dblp.org/rec/journals/ijaip/HemalathaV19"}, "url":"URL#2004731" }, { "@score":"1", "@id":"2004732", "info":{"authors":{"author":[{"@pid":"236/2605","text":"D. Shiny Irene"},{"@pid":"236/2768","text":"T. Sethukarasi"}]},"title":"Perlustration on existing techniques and applications in cloud computing for smart buildings using IoT.","venue":"Int. J. Adv. Intell. Paradigms","volume":"12","number":"1/2","pages":"147-163","year":"2019","type":"Journal Articles","access":"closed","key":"journals/ijaip/IreneS19","doi":"10.1504/IJAIP.2019.096960","ee":"https://doi.org/10.1504/IJAIP.2019.096960","url":"https://dblp.org/rec/journals/ijaip/IreneS19"}, "url":"URL#2004732" }, { "@score":"1", "@id":"2004733", "info":{"authors":{"author":[{"@pid":"157/0723","text":"Hanen Jabnoun"},{"@pid":"129/1735","text":"Faouzi Benzarti"},{"@pid":"52/6195","text":"Frédéric Morain-Nicolier"},{"@pid":"19/4890","text":"Hamid Amiri"}]},"title":"Video-based assistive aid for blind people using object recognition in dissimilar frames.","venue":"Int. J. Adv. Intell. Paradigms","volume":"14","number":"1/2","pages":"122-139","year":"2019","type":"Journal Articles","access":"closed","key":"journals/ijaip/JabnounBMA19","doi":"10.1504/IJAIP.2019.102967","ee":"https://doi.org/10.1504/IJAIP.2019.102967","url":"https://dblp.org/rec/journals/ijaip/JabnounBMA19"}, "url":"URL#2004733" }, { "@score":"1", "@id":"2004734", "info":{"authors":{"author":[{"@pid":"215/5860","text":"Bindiya Jain"},{"@pid":"215/5867","text":"Gursewak Brar"},{"@pid":"81/6539","text":"Jyoteesh Malhotra"}]},"title":"AMST-MAC: adaptive sleeping multi-frames selective data transmission control for wireless sensor networks.","venue":"Int. J. Adv. Intell. Paradigms","volume":"12","number":"3/4","pages":"279-294","year":"2019","type":"Journal Articles","access":"closed","key":"journals/ijaip/JainBM19","doi":"10.1504/IJAIP.2019.098564","ee":"https://doi.org/10.1504/IJAIP.2019.098564","url":"https://dblp.org/rec/journals/ijaip/JainBM19"}, "url":"URL#2004734" }, { "@score":"1", "@id":"2004735", "info":{"authors":{"author":[{"@pid":"249/8645","text":"M. Jasmin"},{"@pid":"162/4503","text":"T. Vigneswaran"}]},"title":"An adaptive low power coding scheme for the NoC.","venue":"Int. J. Adv. Intell. Paradigms","volume":"13","number":"3/4","pages":"324-333","year":"2019","type":"Journal Articles","access":"closed","key":"journals/ijaip/JasminV19","doi":"10.1504/IJAIP.2019.101982","ee":"https://doi.org/10.1504/IJAIP.2019.101982","url":"https://dblp.org/rec/journals/ijaip/JasminV19"}, "url":"URL#2004735" }, { "@score":"1", "@id":"2004736", "info":{"authors":{"author":[{"@pid":"174/5879","text":"R. Jayanthi"},{"@pid":"199/7402","text":"John Singh K"}]},"title":"Image encryption techniques for data transmission in networks: a survey.","venue":"Int. J. Adv. Intell. Paradigms","volume":"12","number":"1/2","pages":"178-191","year":"2019","type":"Journal Articles","access":"closed","key":"journals/ijaip/JayanthiS19","doi":"10.1504/IJAIP.2019.096962","ee":"https://doi.org/10.1504/IJAIP.2019.096962","url":"https://dblp.org/rec/journals/ijaip/JayanthiS19"}, "url":"URL#2004736" }, { "@score":"1", "@id":"2004737", "info":{"authors":{"author":[{"@pid":"174/1551","text":"Aswinseshadri K."},{"@pid":"85/1999","text":"V. Thulasi Bai"}]},"title":"Bayesian approach for brain-computer interface using feature fusion techniques.","venue":"Int. J. Adv. Intell. Paradigms","volume":"13","number":"3/4","pages":"382-393","year":"2019","type":"Journal Articles","access":"closed","key":"journals/ijaip/KB19","doi":"10.1504/IJAIP.2019.101986","ee":"https://doi.org/10.1504/IJAIP.2019.101986","url":"https://dblp.org/rec/journals/ijaip/KB19"}, "url":"URL#2004737" }, { "@score":"1", "@id":"2004738", "info":{"authors":{"author":[{"@pid":"174/2889","text":"T. K. Kandavel"},{"@pid":"123/9663","text":"T. Ashok Kumar"},{"@pid":"174/3073","text":"D. Vijay"},{"@pid":"239/6248","text":"S. Ashwanth Samraj"}]},"title":"Application of artificial neural network on deformation and densification behaviour of sintered Fe-C steel under cold upsetting.","venue":"Int. J. Adv. Intell. Paradigms","volume":"12","number":"3/4","pages":"266-278","year":"2019","type":"Journal Articles","access":"closed","key":"journals/ijaip/KandavelKVS19","doi":"10.1504/IJAIP.2019.098576","ee":"https://doi.org/10.1504/IJAIP.2019.098576","url":"https://dblp.org/rec/journals/ijaip/KandavelKVS19"}, "url":"URL#2004738" }, { "@score":"1", "@id":"2004739", "info":{"authors":{"author":[{"@pid":"218/8079","text":"Lilia Kechiche"},{"@pid":"70/8147","text":"Lamjed Touil"},{"@pid":"55/1725","text":"Bouraoui Ouni"}]},"title":"High-level optimised systems design using hardware-software partitioning.","venue":"Int. J. Adv. Intell. Paradigms","volume":"13","number":"3/4","pages":"346-367","year":"2019","type":"Journal Articles","access":"closed","key":"journals/ijaip/KechicheTO19","doi":"10.1504/IJAIP.2019.101984","ee":"https://doi.org/10.1504/IJAIP.2019.101984","url":"https://dblp.org/rec/journals/ijaip/KechicheTO19"}, "url":"URL#2004739" }, { "@score":"1", "@id":"2004740", "info":{"authors":{"author":[{"@pid":"239/6337","text":"Rijwan Khan"},{"@pid":"237/7952","text":"Mohd Amjad"}]},"title":"Mutation-based genetic algorithm for efficiency optimisation of unit testing.","venue":"Int. J. Adv. Intell. Paradigms","volume":"12","number":"3/4","pages":"254-265","year":"2019","type":"Journal Articles","access":"closed","key":"journals/ijaip/KhanA19","doi":"10.1504/IJAIP.2019.098563","ee":"https://doi.org/10.1504/IJAIP.2019.098563","url":"https://dblp.org/rec/journals/ijaip/KhanA19"}, "url":"URL#2004740" }, { "@score":"1", "@id":"2004741", "info":{"authors":{"author":[{"@pid":"146/1015","text":"Youssef Ait Khouya"},{"@pid":"26/2413","text":"Faouzi Ghorbel"}]},"title":"Brachiopods classification based on fusion of contour and region based descriptors.","venue":"Int. J. Adv. Intell. Paradigms","volume":"14","number":"1/2","pages":"140-156","year":"2019","type":"Journal Articles","access":"closed","key":"journals/ijaip/KhouyaG19","doi":"10.1504/IJAIP.2019.102968","ee":"https://doi.org/10.1504/IJAIP.2019.102968","url":"https://dblp.org/rec/journals/ijaip/KhouyaG19"}, "url":"URL#2004741" }, { "@score":"1", "@id":"2004742", "info":{"authors":{"author":[{"@pid":"122/2149","text":"Kourosh Kiani"},{"@pid":"82/11273","text":"Arash Mousavi"},{"@pid":"81/11074","text":"Shahaboddin Shamshirband"}]},"title":"A new fractal watermarking method for images of text.","venue":"Int. J. Adv. Intell. Paradigms","volume":"12","number":"3/4","pages":"207-219","year":"2019","type":"Journal Articles","access":"closed","key":"journals/ijaip/KianiMS19","doi":"10.1504/IJAIP.2019.098560","ee":"https://doi.org/10.1504/IJAIP.2019.098560","url":"https://dblp.org/rec/journals/ijaip/KianiMS19"}, "url":"URL#2004742" }, { "@score":"1", "@id":"2004743", "info":{"authors":{"author":[{"@pid":"236/2592","text":"D. Naga Ravi Kiran"},{"@pid":"35/4706","text":"Chandrashekhar G. Dethe"}]},"title":"Fuzzy rule selection using artificial bee colony optimisation algorithm.","venue":"Int. J. Adv. Intell. Paradigms","volume":"12","number":"1/2","pages":"164-177","year":"2019","type":"Journal Articles","access":"closed","key":"journals/ijaip/KiranD19","doi":"10.1504/IJAIP.2019.096961","ee":"https://doi.org/10.1504/IJAIP.2019.096961","url":"https://dblp.org/rec/journals/ijaip/KiranD19"}, "url":"URL#2004743" }, { "@score":"1", "@id":"2004744", "info":{"authors":{"author":[{"@pid":"118/1049","text":"Deepika Kukreja"},{"@pid":"52/6933","text":"Sanjay K. Dhurandher"},{"@pid":"129/9820","text":"B. V. Ramana Reddy"}]},"title":"Securing ad hoc networks using energy efficient and distributed trust-based intrusion detection system.","venue":"Int. J. Adv. Intell. Paradigms","volume":"13","number":"3/4","pages":"430-448","year":"2019","type":"Journal Articles","access":"closed","key":"journals/ijaip/KukrejaDR19","doi":"10.1504/IJAIP.2019.101990","ee":"https://doi.org/10.1504/IJAIP.2019.101990","url":"https://dblp.org/rec/journals/ijaip/KukrejaDR19"}, "url":"URL#2004744" }, { "@score":"1", "@id":"2004745", "info":{"authors":{"author":[{"@pid":"118/1049","text":"Deepika Kukreja"},{"@pid":"99/11050","text":"Deepak Kumar Sharma"},{"@pid":"52/6933","text":"Sanjay K. Dhurandher"},{"@pid":"129/9820","text":"B. V. Ramana Reddy"}]},"title":"GASER: genetic algorithm-based secure and energy aware routing protocol for sparse mobile ad hoc networks.","venue":"Int. J. Adv. Intell. Paradigms","volume":"13","number":"1/2","pages":"230-259","year":"2019","type":"Journal Articles","access":"closed","key":"journals/ijaip/KukrejaSDR19","doi":"10.1504/IJAIP.2019.099953","ee":"https://doi.org/10.1504/IJAIP.2019.099953","url":"https://dblp.org/rec/journals/ijaip/KukrejaSDR19"}, "url":"URL#2004745" }, { "@score":"1", "@id":"2004746", "info":{"authors":{"author":[{"@pid":"214/3701","text":"Priyan Malarvizhi Kumar"},{"@pid":"214/3588","text":"Usha Devi Gandhi"}]},"title":"A survey on internet of vehicles: applications, technologies, challenges and opportunities.","venue":"Int. J. Adv. Intell. Paradigms","volume":"12","number":"1/2","pages":"98-119","year":"2019","type":"Journal Articles","access":"closed","key":"journals/ijaip/KumarG19","doi":"10.1504/IJAIP.2019.096957","ee":"https://doi.org/10.1504/IJAIP.2019.096957","url":"https://dblp.org/rec/journals/ijaip/KumarG19"}, "url":"URL#2004746" }, { "@score":"1", "@id":"2004747", "info":{"authors":{"author":[{"@pid":"121/2290-1","text":"Reddi Kiran Kumar 0001"},{"@pid":"249/8619","text":"S. V. Achuta Rao"}]},"title":"Severity of defect: an optimised prediction.","venue":"Int. J. Adv. Intell. Paradigms","volume":"13","number":"3/4","pages":"334-345","year":"2019","type":"Journal Articles","access":"closed","key":"journals/ijaip/KumarR19","doi":"10.1504/IJAIP.2019.101983","ee":"https://doi.org/10.1504/IJAIP.2019.101983","url":"https://dblp.org/rec/journals/ijaip/KumarR19"}, "url":"URL#2004747" }, { "@score":"1", "@id":"2004748", "info":{"authors":{"author":[{"@pid":"220/2208","text":"S. K. Lakshmanaprabu"},{"@pid":"93/486","text":"U. Sabura Banu"}]},"title":"Adaptive multi-loop IMC-based PID controller tuning using bat optimisation algorithm for two interacting conical tank process.","venue":"Int. J. Adv. Intell. Paradigms","volume":"13","number":"3/4","pages":"263-287","year":"2019","type":"Journal Articles","access":"closed","key":"journals/ijaip/LakshmanaprabuB19","doi":"10.1504/IJAIP.2019.101979","ee":"https://doi.org/10.1504/IJAIP.2019.101979","url":"https://dblp.org/rec/journals/ijaip/LakshmanaprabuB19"}, "url":"URL#2004748" }, { "@score":"1", "@id":"2004749", "info":{"authors":{"author":[{"@pid":"11/9700","text":"B. Madhusudhanan"},{"@pid":"89/11143","text":"S. Chitra"},{"@pid":"153/3076","text":"S. Anbuchelian"}]},"title":"Feature extraction using CMIM for sentiment analysis.","venue":"Int. J. Adv. Intell. Paradigms","volume":"13","number":"3/4","pages":"368-381","year":"2019","type":"Journal Articles","access":"closed","key":"journals/ijaip/MadhusudhananCA19","doi":"10.1504/IJAIP.2019.101985","ee":"https://doi.org/10.1504/IJAIP.2019.101985","url":"https://dblp.org/rec/journals/ijaip/MadhusudhananCA19"}, "url":"URL#2004749" }, { "@score":"1", "@id":"2004750", "info":{"authors":{"author":[{"@pid":"264/3365","text":"Jisha S. Manjaly"},{"@pid":"34/9569","text":"T. Subbulakshmi"}]},"title":"TaskTracker aware scheduler with resource availability control for Hadoop MapReduce.","venue":"Int. J. Adv. Intell. Paradigms","volume":"14","number":"3/4","pages":"359-374","year":"2019","type":"Journal Articles","access":"closed","key":"journals/ijaip/ManjalyS19","doi":"10.1504/IJAIP.2019.103452","ee":"https://doi.org/10.1504/IJAIP.2019.103452","url":"https://dblp.org/rec/journals/ijaip/ManjalyS19"}, "url":"URL#2004750" }, { "@score":"1", "@id":"2004751", "info":{"authors":{"author":[{"@pid":"218/2533","text":"Kiran Mary Matthew"},{"@pid":"218/2520","text":"Abdul Quadir Muhammed 0001"},{"@pid":"199/7401","text":"Vijayakumar Varadarajan 0001"}]},"title":"An improved key management scheme in cloud storage.","venue":"Int. J. Adv. Intell. Paradigms","volume":"14","number":"3/4","pages":"197-203","year":"2019","type":"Journal Articles","access":"closed","key":"journals/ijaip/MatthewMV19","doi":"10.1504/IJAIP.2019.103408","ee":"https://doi.org/10.1504/IJAIP.2019.103408","url":"https://dblp.org/rec/journals/ijaip/MatthewMV19"}, "url":"URL#2004751" }, { "@score":"1", "@id":"2004752", "info":{"authors":{"author":[{"@pid":"225/1777","text":"Shashi Mehrotra"},{"@pid":"66/11293","text":"Shruti Kohli"},{"@pid":"20/8186","text":"Aditi Sharan"}]},"title":"An intelligent clustering approach for improving search result of a website.","venue":"Int. J. Adv. Intell. Paradigms","volume":"12","number":"3/4","pages":"295-304","year":"2019","type":"Journal Articles","access":"closed","key":"journals/ijaip/MehrotraKS19","doi":"10.1504/IJAIP.2019.098565","ee":"https://doi.org/10.1504/IJAIP.2019.098565","url":"https://dblp.org/rec/journals/ijaip/MehrotraKS19"}, "url":"URL#2004752" }, { "@score":"1", "@id":"2004753", "info":{"authors":{"author":[{"@pid":"132/3946","text":"Bhaskar Mondal"},{"@pid":"195/0019","text":"Tarni Mandal"},{"@pid":"122/3000","text":"Tanupriya Choudhury"},{"@pid":"148/8627","text":"Danish Ali Khan"}]},"title":"Use of 'A light weight secure image encryption scheme based on chaos and DNA computing' for encrypted audio watermarking.","venue":"Int. J. Adv. Intell. Paradigms","volume":"13","number":"1/2","pages":"67-79","year":"2019","type":"Journal Articles","access":"closed","key":"journals/ijaip/MondalMCK19","doi":"10.1504/IJAIP.2019.099944","ee":"https://doi.org/10.1504/IJAIP.2019.099944","url":"https://dblp.org/rec/journals/ijaip/MondalMCK19"}, "url":"URL#2004753" }, { "@score":"1", "@id":"2004754", "info":{"authors":{"author":[{"@pid":"264/3197","text":"Rutuja Dadasaheb Mote"},{"@pid":"198/2765","text":"Ambika Vishal Pawar"}]},"title":"Privacy preservation using hybrid cloud environment and Map-Reduce for data deduplication.","venue":"Int. J. Adv. Intell. Paradigms","volume":"14","number":"3/4","pages":"281-296","year":"2019","type":"Journal Articles","access":"closed","key":"journals/ijaip/MoteP19","doi":"10.1504/IJAIP.2019.103414","ee":"https://doi.org/10.1504/IJAIP.2019.103414","url":"https://dblp.org/rec/journals/ijaip/MoteP19"}, "url":"URL#2004754" }, { "@score":"1", "@id":"2004755", "info":{"authors":{"author":[{"@pid":"236/2558","text":"R. K. Nadesh"},{"@pid":"20/1044","text":"M. Aramudhan"}]},"title":"MMSI: a multi-mode service invocation algorithm to improve the connectivity in accessing cloud services in heterogeneous mobile cloud.","venue":"Int. J. Adv. Intell. Paradigms","volume":"12","number":"1/2","pages":"33-44","year":"2019","type":"Journal Articles","access":"closed","key":"journals/ijaip/NadeshA19","doi":"10.1504/IJAIP.2019.096950","ee":"https://doi.org/10.1504/IJAIP.2019.096950","url":"https://dblp.org/rec/journals/ijaip/NadeshA19"}, "url":"URL#2004755" }, { "@score":"1", "@id":"2004756", "info":{"authors":{"author":[{"@pid":"236/2761","text":"V. Nagaraju"},{"@pid":"207/0930","text":"L. C. Siddanna Gowd"}]},"title":"Radio spectrum collision avoidness in cluster cognitive network through gazer nodes.","venue":"Int. J. Adv. Intell. Paradigms","volume":"12","number":"1/2","pages":"120-133","year":"2019","type":"Journal Articles","access":"closed","key":"journals/ijaip/NagarajuG19","doi":"10.1504/IJAIP.2019.096958","ee":"https://doi.org/10.1504/IJAIP.2019.096958","url":"https://dblp.org/rec/journals/ijaip/NagarajuG19"}, "url":"URL#2004756" }, { "@score":"1", "@id":"2004757", "info":{"authors":{"author":[{"@pid":"132/0104","text":"Rudra Pratap Ojha"},{"@pid":"206/5603","text":"Pramod Kumar Srivastava"},{"@pid":"76/3363","text":"Goutam Sanyal"}]},"title":"Security model against worms attack in wireless sensor network.","venue":"Int. J. Adv. Intell. Paradigms","volume":"13","number":"1/2","pages":"178-192","year":"2019","type":"Journal Articles","access":"closed","key":"journals/ijaip/OjhaSS19","doi":"10.1504/IJAIP.2019.099950","ee":"https://doi.org/10.1504/IJAIP.2019.099950","url":"https://dblp.org/rec/journals/ijaip/OjhaSS19"}, "url":"URL#2004757" }, { "@score":"1", "@id":"2004758", "info":{"authors":{"author":[{"@pid":"132/0104","text":"Rudra Pratap Ojha"},{"@pid":"142/1447","text":"Kavita Sharma 0001"},{"@pid":"206/5603","text":"Pramod Kumar Srivastava"},{"@pid":"76/3363","text":"Goutam Sanyal"}]},"title":"An epidemic model for security and performance of wireless sensor networks.","venue":"Int. J. Adv. Intell. Paradigms","volume":"13","number":"1/2","pages":"113-129","year":"2019","type":"Journal Articles","access":"closed","key":"journals/ijaip/OjhaSSS19","doi":"10.1504/IJAIP.2019.099947","ee":"https://doi.org/10.1504/IJAIP.2019.099947","url":"https://dblp.org/rec/journals/ijaip/OjhaSSS19"}, "url":"URL#2004758" }, { "@score":"1", "@id":"2004759", "info":{"authors":{"author":[{"@pid":"264/3088","text":"Suvarna S. Pawar"},{"@pid":"264/3342","text":"Prasanth Yalla"}]},"title":"Trust-based quality awareness using combinatorial auction web service selection in service-based systems.","venue":"Int. J. Adv. Intell. Paradigms","volume":"14","number":"3/4","pages":"297-309","year":"2019","type":"Journal Articles","access":"closed","key":"journals/ijaip/PawarY19","doi":"10.1504/IJAIP.2019.103418","ee":"https://doi.org/10.1504/IJAIP.2019.103418","url":"https://dblp.org/rec/journals/ijaip/PawarY19"}, "url":"URL#2004759" }, { "@score":"1", "@id":"2004760", "info":{"authors":{"author":[{"@pid":"213/3416","text":"K. P. Rama Prabha"},{"@pid":"120/9724","text":"N. Jeyanthi"}]},"title":"Intelligent intrusion detection techniques for secure communications in wireless networks: a survey.","venue":"Int. J. Adv. Intell. Paradigms","volume":"12","number":"1/2","pages":"134-146","year":"2019","type":"Journal Articles","access":"closed","key":"journals/ijaip/PrabhaJ19","doi":"10.1504/IJAIP.2019.096959","ee":"https://doi.org/10.1504/IJAIP.2019.096959","url":"https://dblp.org/rec/journals/ijaip/PrabhaJ19"}, "url":"URL#2004760" }, { "@score":"1", "@id":"2004761", "info":{"authors":{"author":[{"@pid":"22/8867","text":"Bhagwati Prasad"},{"@pid":"243/5056","text":"Kunti Mishra"}]},"title":"A novel encryption compression scheme using Julia sets.","venue":"Int. J. Adv. Intell. Paradigms","volume":"13","number":"1/2","pages":"8-14","year":"2019","type":"Journal Articles","access":"closed","key":"journals/ijaip/PrasadM19","doi":"10.1504/IJAIP.2019.099940","ee":"https://doi.org/10.1504/IJAIP.2019.099940","url":"https://dblp.org/rec/journals/ijaip/PrasadM19"}, "url":"URL#2004761" }, { "@score":"1", "@id":"2004762", "info":{"authors":{"author":{"@pid":"236/2622","text":"Selvaraj Priya"}},"title":"A novel approach for secured transmission of DICOM images.","venue":"Int. J. Adv. Intell. Paradigms","volume":"12","number":"1/2","pages":"68-76","year":"2019","type":"Journal Articles","access":"closed","key":"journals/ijaip/Priya19","doi":"10.1504/IJAIP.2019.096953","ee":"https://doi.org/10.1504/IJAIP.2019.096953","url":"https://dblp.org/rec/journals/ijaip/Priya19"}, "url":"URL#2004762" }, { "@score":"1", "@id":"2004763", "info":{"authors":{"author":[{"@pid":"264/3412","text":"U. Rahamathunnisa"},{"@pid":"04/5469-1","text":"R. Saravanan 0001"}]},"title":"An effective system for video transmission and error recovery mechanisms in multimedia networks.","venue":"Int. J. Adv. Intell. Paradigms","volume":"14","number":"3/4","pages":"204-214","year":"2019","type":"Journal Articles","access":"closed","key":"journals/ijaip/RahamathunnisaS19","doi":"10.1504/IJAIP.2019.103409","ee":"https://doi.org/10.1504/IJAIP.2019.103409","url":"https://dblp.org/rec/journals/ijaip/RahamathunnisaS19"}, "url":"URL#2004763" }, { "@score":"1", "@id":"2004764", "info":{"authors":{"author":[{"@pid":"194/5840","text":"Leila Rajabpour"},{"@pid":"119/0770","text":"Mokhtar Shasadeghi"},{"@pid":"194/5831","text":"Alireza Barzegar"}]},"title":"Design of robust H∞ fuzzy output feedback controller for affine nonlinear systems: fuzzy Lyapunov function approach.","venue":"Int. J. Adv. Intell. Paradigms","volume":"14","number":"3/4","pages":"328-344","year":"2019","type":"Journal Articles","access":"closed","key":"journals/ijaip/RajabpourSB19","doi":"10.1504/IJAIP.2019.103441","ee":"https://doi.org/10.1504/IJAIP.2019.103441","url":"https://dblp.org/rec/journals/ijaip/RajabpourSB19"}, "url":"URL#2004764" }, { "@score":"1", "@id":"2004765", "info":{"authors":{"author":[{"@pid":"236/2706","text":"S. Rajeshwari"},{"@pid":"147/9083","text":"Chandrasekar Arumugam"}]},"title":"Real time MAF-based multi level access restriction approach for collaborative environment using ontology.","venue":"Int. J. Adv. Intell. Paradigms","volume":"12","number":"1/2","pages":"14-23","year":"2019","type":"Journal Articles","access":"closed","key":"journals/ijaip/RajeshwariC19","doi":"10.1504/IJAIP.2019.096947","ee":"https://doi.org/10.1504/IJAIP.2019.096947","url":"https://dblp.org/rec/journals/ijaip/RajeshwariC19"}, "url":"URL#2004765" }, { "@score":"1", "@id":"2004766", "info":{"authors":{"author":[{"@pid":"66/3340","text":"K. Ramkumar"},{"@pid":"236/2538","text":"G. Gunasekaran"}]},"title":"Preserving security using crisscross AES and FCFS scheduling in cloud computing.","venue":"Int. J. Adv. Intell. Paradigms","volume":"12","number":"1/2","pages":"77-85","year":"2019","type":"Journal Articles","access":"closed","key":"journals/ijaip/RamkumarG19","doi":"10.1504/IJAIP.2019.096955","ee":"https://doi.org/10.1504/IJAIP.2019.096955","url":"https://dblp.org/rec/journals/ijaip/RamkumarG19"}, "url":"URL#2004766" }, { "@score":"1", "@id":"2004767", "info":{"authors":{"author":[{"@pid":"249/8729","text":"M. V. Ramana Rao"},{"@pid":"21/2102","text":"T. Adilakshmi"}]},"title":"Swarm dynamics for enhanced energy aware clustering.","venue":"Int. J. Adv. Intell. Paradigms","volume":"13","number":"3/4","pages":"288-303","year":"2019","type":"Journal Articles","access":"closed","key":"journals/ijaip/RaoA19","doi":"10.1504/IJAIP.2019.101980","ee":"https://doi.org/10.1504/IJAIP.2019.101980","url":"https://dblp.org/rec/journals/ijaip/RaoA19"}, "url":"URL#2004767" }, { "@score":"1", "@id":"2004768", "info":{"authors":{"author":[{"@pid":"167/0138","text":"Tushar Ratanpara"},{"@pid":"169/7938","text":"Narendra M. Patel"}]},"title":"Protagonist and deuteragonist-based video indexing and retrieval system for movie and video song sequences.","venue":"Int. J. Adv. Intell. Paradigms","volume":"14","number":"3/4","pages":"175-196","year":"2019","type":"Journal Articles","access":"closed","key":"journals/ijaip/RatanparaP19","doi":"10.1504/IJAIP.2019.103407","ee":"https://doi.org/10.1504/IJAIP.2019.103407","url":"https://dblp.org/rec/journals/ijaip/RatanparaP19"}, "url":"URL#2004768" }, { "@score":"1", "@id":"2004769", "info":{"authors":{"author":[{"@pid":"129/1504","text":"Geetanjali Rathee"},{"@pid":"46/8805","text":"Hemraj Saini"}]},"title":"Secure handoff technique with reduced authentication delay in wireless mesh network.","venue":"Int. J. Adv. Intell. Paradigms","volume":"13","number":"1/2","pages":"130-154","year":"2019","type":"Journal Articles","access":"closed","key":"journals/ijaip/RatheeS19","doi":"10.1504/IJAIP.2019.099948","ee":"https://doi.org/10.1504/IJAIP.2019.099948","url":"https://dblp.org/rec/journals/ijaip/RatheeS19"}, "url":"URL#2004769" }, { "@score":"1", "@id":"2004770", "info":{"authors":{"author":{"@pid":"236/2563","text":"J. Ravisankar"}},"title":"Binary honey bee mating partial transmit sequence to improve OFDM.","venue":"Int. J. Adv. Intell. Paradigms","volume":"12","number":"1/2","pages":"86-97","year":"2019","type":"Journal Articles","access":"closed","key":"journals/ijaip/Ravisankar19","doi":"10.1504/IJAIP.2019.096956","ee":"https://doi.org/10.1504/IJAIP.2019.096956","url":"https://dblp.org/rec/journals/ijaip/Ravisankar19"}, "url":"URL#2004770" }, { "@score":"1", "@id":"2004771", "info":{"authors":{"author":[{"@pid":"48/11167","text":"K. Srinivasa Reddy"},{"@pid":"16/5384","text":"S. Ramachandram"}]},"title":"A secure, fast insert and efficient search order preserving encryption scheme for outsourced databases.","venue":"Int. J. Adv. Intell. Paradigms","volume":"13","number":"1/2","pages":"155-177","year":"2019","type":"Journal Articles","access":"closed","key":"journals/ijaip/ReddyR19","doi":"10.1504/IJAIP.2019.099949","ee":"https://doi.org/10.1504/IJAIP.2019.099949","url":"https://dblp.org/rec/journals/ijaip/ReddyR19"}, "url":"URL#2004771" }, { "@score":"1", "@id":"2004772", "info":{"authors":{"author":[{"@pid":"72/5927","text":"B. Eswara Reddy"},{"@pid":"251/8097","text":"Ramireddy Obulakonda Reddy"},{"@pid":"251/8049","text":"E. Keshava Reddy"}]},"title":"Pattern analysis and texture classification using finite state automata scheme.","venue":"Int. J. Adv. Intell. Paradigms","volume":"14","number":"1/2","pages":"30-45","year":"2019","type":"Journal Articles","access":"closed","key":"journals/ijaip/ReddyRR19","doi":"10.1504/IJAIP.2019.102961","ee":"https://doi.org/10.1504/IJAIP.2019.102961","url":"https://dblp.org/rec/journals/ijaip/ReddyRR19"}, "url":"URL#2004772" }, { "@score":"1", "@id":"2004773", "info":{"authors":{"author":[{"@pid":"264/3348","text":"Y. Mohana Roopa"},{"@pid":"97/7688","text":"A. Rama Mohan Reddy"}]},"title":"An optimised component selection algorithm for self-adaptive software architecture using the component repository.","venue":"Int. J. Adv. Intell. Paradigms","volume":"14","number":"3/4","pages":"236-247","year":"2019","type":"Journal Articles","access":"closed","key":"journals/ijaip/RoopaR19","doi":"10.1504/IJAIP.2019.103411","ee":"https://doi.org/10.1504/IJAIP.2019.103411","url":"https://dblp.org/rec/journals/ijaip/RoopaR19"}, "url":"URL#2004773" }, { "@score":"1", "@id":"2004774", "info":{"authors":{"author":[{"@pid":"182/7176","text":"N. Sandhya"},{"@pid":"15/6820","text":"R. Krishnan"},{"@pid":"79/2689","text":"D. R. Ramesh Babu"},{"@pid":"153/3650","text":"N. Bhaskara Rao"}]},"title":"An efficient approach for handling degradation in character recognition.","venue":"Int. J. Adv. Intell. Paradigms","volume":"14","number":"1/2","pages":"14-29","year":"2019","type":"Journal Articles","access":"closed","key":"journals/ijaip/SandhyaKBR19","doi":"10.1504/IJAIP.2019.102960","ee":"https://doi.org/10.1504/IJAIP.2019.102960","url":"https://dblp.org/rec/journals/ijaip/SandhyaKBR19"}, "url":"URL#2004774" }, { "@score":"1", "@id":"2004775", "info":{"authors":{"author":[{"@pid":"64/5328","text":"Aarti Singh"},{"@pid":"04/4664","text":"Dimple Juneja"},{"@pid":"32/3531","text":"Rashmi Singh"},{"@pid":"30/2802","text":"Saurabh Mukherjee"}]},"title":"A clustered neighbourhood consensus algorithm for a generic agent interaction protocol.","venue":"Int. J. Adv. Intell. Paradigms","volume":"12","number":"3/4","pages":"305-316","year":"2019","type":"Journal Articles","access":"closed","key":"journals/ijaip/SinghJSM19","doi":"10.1504/IJAIP.2019.098566","ee":"https://doi.org/10.1504/IJAIP.2019.098566","url":"https://dblp.org/rec/journals/ijaip/SinghJSM19"}, "url":"URL#2004775" }, { "@score":"1", "@id":"2004776", "info":{"authors":{"author":[{"@pid":"116/6379","text":"Yacine Slimani"},{"@pid":"239/6252","text":"Abdelouaheb Moussaoui"},{"@pid":"l/YvesLechevallier","text":"Yves Lechevallier"},{"@pid":"116/6357","text":"Ahlem Drif"}]},"title":"Discovering communities for web usage mining systems.","venue":"Int. J. Adv. Intell. Paradigms","volume":"12","number":"3/4","pages":"331-354","year":"2019","type":"Journal Articles","access":"closed","key":"journals/ijaip/SlimaniMLD19","doi":"10.1504/IJAIP.2019.098575","ee":"https://doi.org/10.1504/IJAIP.2019.098575","url":"https://dblp.org/rec/journals/ijaip/SlimaniMLD19"}, "url":"URL#2004776" }, { "@score":"1", "@id":"2004777", "info":{"authors":{"author":[{"@pid":"165/8446","text":"P. Eben Sophia"},{"@pid":"30/8436","text":"J. Anitha 0001"}]},"title":"Enhanced method of using contourlet transform for medical image compression.","venue":"Int. J. Adv. Intell. Paradigms","volume":"14","number":"1/2","pages":"107-121","year":"2019","type":"Journal Articles","access":"closed","key":"journals/ijaip/SophiaA19","doi":"10.1504/IJAIP.2019.102966","ee":"https://doi.org/10.1504/IJAIP.2019.102966","url":"https://dblp.org/rec/journals/ijaip/SophiaA19"}, "url":"URL#2004777" }, { "@score":"1", "@id":"2004778", "info":{"authors":{"author":[{"@pid":"246/3413","text":"K. Vimal Kumar Stephen"},{"@pid":"246/3534","text":"V. Mathivanan"}]},"title":"Neural network-based virtual backbone tree construction and dynamic sink implementation to enhance the lifetime of the network and minimise the energy consumption.","venue":"Int. J. Adv. Intell. Paradigms","volume":"13","number":"3/4","pages":"304-323","year":"2019","type":"Journal Articles","access":"closed","key":"journals/ijaip/StephenM19","doi":"10.1504/IJAIP.2019.101981","ee":"https://doi.org/10.1504/IJAIP.2019.101981","url":"https://dblp.org/rec/journals/ijaip/StephenM19"}, "url":"URL#2004778" }, { "@score":"1", "@id":"2004779", "info":{"authors":{"author":[{"@pid":"21/2046","text":"R. Sudhakar 0001"},{"@pid":"03/8805","text":"V. K. Sudha"}]},"title":"Priority-based trimmed median filter for removal of high density salt and pepper noise.","venue":"Int. J. Adv. Intell. Paradigms","volume":"14","number":"1/2","pages":"3-13","year":"2019","type":"Journal Articles","access":"closed","key":"journals/ijaip/SudhakarS19","doi":"10.1504/IJAIP.2019.102959","ee":"https://doi.org/10.1504/IJAIP.2019.102959","url":"https://dblp.org/rec/journals/ijaip/SudhakarS19"}, "url":"URL#2004779" }, { "@score":"1", "@id":"2004780", "info":{"authors":{"author":[{"@pid":"180/5976","text":"P. Sudheesh"},{"@pid":"47/5769","text":"M. Jayakumar 0001"}]},"title":"Nonlinear channel tracking of a high mobility wireless communication system.","venue":"Int. J. Adv. Intell. Paradigms","volume":"13","number":"3/4","pages":"420-429","year":"2019","type":"Journal Articles","access":"closed","key":"journals/ijaip/Sudheesh019","doi":"10.1504/IJAIP.2019.101989","ee":"https://doi.org/10.1504/IJAIP.2019.101989","url":"https://dblp.org/rec/journals/ijaip/Sudheesh019"}, "url":"URL#2004780" }, { "@score":"1", "@id":"2004781", "info":{"authors":{"author":[{"@pid":"193/9628","text":"K. Joseph Abraham Sundar"},{"@pid":"44/7720","text":"V. Vaithiyanathan"}]},"title":"A novel method for super resolution image reconstruction.","venue":"Int. J. Adv. Intell. Paradigms","volume":"14","number":"1/2","pages":"46-54","year":"2019","type":"Journal Articles","access":"closed","key":"journals/ijaip/SundarV19","doi":"10.1504/IJAIP.2019.102962","ee":"https://doi.org/10.1504/IJAIP.2019.102962","url":"https://dblp.org/rec/journals/ijaip/SundarV19"}, "url":"URL#2004781" }, { "@score":"1", "@id":"2004782", "info":{"authors":{"author":[{"@pid":"236/2705","text":"S. Thaiyalnayaki"},{"@pid":"233/9749","text":"Sasikala Jayaraman"},{"@pid":"19/2699","text":"R. Ponraj"}]},"title":"Detecting near-duplicate images using segmented minhash algorithm.","venue":"Int. J. Adv. Intell. Paradigms","volume":"12","number":"1/2","pages":"192-206","year":"2019","type":"Journal Articles","access":"closed","key":"journals/ijaip/ThaiyalnayakiSP19","doi":"10.1504/IJAIP.2019.096963","ee":"https://doi.org/10.1504/IJAIP.2019.096963","url":"https://dblp.org/rec/journals/ijaip/ThaiyalnayakiSP19"}, "url":"URL#2004782" }, { "@score":"1", "@id":"2004783", "info":{"authors":{"author":[{"@pid":"119/5085","text":"Seema Verma"},{"@pid":"58/1076","text":"Manoj Kumar"}]},"title":"Comparison of different RSA variants.","venue":"Int. J. Adv. Intell. Paradigms","volume":"13","number":"1/2","pages":"210-229","year":"2019","type":"Journal Articles","access":"closed","key":"journals/ijaip/VermaK19","doi":"10.1504/IJAIP.2019.099952","ee":"https://doi.org/10.1504/IJAIP.2019.099952","url":"https://dblp.org/rec/journals/ijaip/VermaK19"}, "url":"URL#2004783" }, { "@score":"1", "@id":"2004784", "info":{"authors":{"author":[{"@pid":"21/11234","text":"Monika Verma"},{"@pid":"227/8812","text":"Vikash Yadav"},{"@pid":"13/7861","text":"Vandana Dixit Kaushik"},{"@pid":"86/7630","text":"Vinay Kumar Pathak"}]},"title":"Multiple polynomial regression for solving atmospheric scattering model.","venue":"Int. J. Adv. Intell. Paradigms","volume":"12","number":"3/4","pages":"400-410","year":"2019","type":"Journal Articles","access":"closed","key":"journals/ijaip/VermaYKP19","doi":"10.1504/IJAIP.2019.098604","ee":"https://doi.org/10.1504/IJAIP.2019.098604","url":"https://dblp.org/rec/journals/ijaip/VermaYKP19"}, "url":"URL#2004784" }, { "@score":"1", "@id":"2004785", "info":{"authors":{"author":[{"@pid":"236/2594","text":"Velayutham Vimala"},{"@pid":"16/6308","text":"K. Ramar"}]},"title":"Classification of neonatal epileptic seizures using support vector machine.","venue":"Int. J. Adv. Intell. Paradigms","volume":"12","number":"1/2","pages":"57-67","year":"2019","type":"Journal Articles","access":"closed","key":"journals/ijaip/VimalaR19","doi":"10.1504/IJAIP.2019.096952","ee":"https://doi.org/10.1504/IJAIP.2019.096952","url":"https://dblp.org/rec/journals/ijaip/VimalaR19"}, "url":"URL#2004785" }, { "@score":"1", "@id":"2004786", "info":{"authors":{"author":[{"@pid":"236/2720","text":"F. Sangeetha Francelin Vinnarasi"},{"@pid":"147/9083","text":"Chandrasekar Arumugam"}]},"title":"VANET routing protocol with traffic aware approach.","venue":"Int. J. Adv. Intell. Paradigms","volume":"12","number":"1/2","pages":"3-13","year":"2019","type":"Journal Articles","access":"closed","key":"journals/ijaip/VinnarasiC19","doi":"10.1504/IJAIP.2019.096944","ee":"https://doi.org/10.1504/IJAIP.2019.096944","url":"https://dblp.org/rec/journals/ijaip/VinnarasiC19"}, "url":"URL#2004786" }, { "@score":"1", "@id":"2004787", "info":{"authors":{"author":[{"@pid":"227/8812","text":"Vikash Yadav"},{"@pid":"13/7861","text":"Vandana Dixit Kaushik"}]},"title":"A study on automatic early detection of skin cancer.","venue":"Int. J. Adv. Intell. Paradigms","volume":"12","number":"3/4","pages":"392-399","year":"2019","type":"Journal Articles","access":"closed","key":"journals/ijaip/YadavK19","doi":"10.1504/IJAIP.2019.098592","ee":"https://doi.org/10.1504/IJAIP.2019.098592","url":"https://dblp.org/rec/journals/ijaip/YadavK19"}, "url":"URL#2004787" }, { "@score":"1", "@id":"2004788", "info":{"authors":{"author":[{"@pid":"236/2423","text":"Sumit Kumar Yadav"},{"@pid":"95/1133","text":"Devendra K. Tayal"},{"@pid":"19/11471","text":"Shiv Naresh Shivhare"}]},"title":"Perplexed Bayes classifier-based secure and intelligent approach for aspect level sentiment analysis.","venue":"Int. J. Adv. Intell. Paradigms","volume":"13","number":"1/2","pages":"15-31","year":"2019","type":"Journal Articles","access":"closed","key":"journals/ijaip/YadavTS19","doi":"10.1504/IJAIP.2019.099941","ee":"https://doi.org/10.1504/IJAIP.2019.099941","url":"https://dblp.org/rec/journals/ijaip/YadavTS19"}, "url":"URL#2004788" }, { "@score":"1", "@id":"2412292", "info":{"authors":{"author":[{"@pid":"127/7578","text":"Muhammad Afaq"},{"@pid":"53/1191","text":"Wang-Cheol Song"},{"@pid":"14/2489","text":"M. G. Kang"}]},"title":"A software defined networking-based resilient framework combined with power-efficient PS-LTE network.","venue":"Int. J. Adv. Intell. Paradigms","volume":"11","number":"1/2","pages":"45-57","year":"2018","type":"Journal Articles","access":"closed","key":"journals/ijaip/AfaqSK18","doi":"10.1504/IJAIP.2018.10006402","ee":"https://doi.org/10.1504/IJAIP.2018.10006402","url":"https://dblp.org/rec/journals/ijaip/AfaqSK18"}, "url":"URL#2412292" }, { "@score":"1", "@id":"2412293", "info":{"authors":{"author":[{"@pid":"222/8979","text":"Qusay Al-Maatouk"},{"@pid":"86/7659","text":"Mohd Shahizan Othman"}]},"title":"A framework for collaborative information management in construction industry.","venue":"Int. J. Adv. Intell. Paradigms","volume":"11","number":"1/2","pages":"33-44","year":"2018","type":"Journal Articles","access":"closed","key":"journals/ijaip/Al-MaatoukO18","doi":"10.1504/IJAIP.2018.10007841","ee":"https://doi.org/10.1504/IJAIP.2018.10007841","url":"https://dblp.org/rec/journals/ijaip/Al-MaatoukO18"}, "url":"URL#2412293" }, { "@score":"1", "@id":"2412294", "info":{"authors":{"author":[{"@pid":"188/0894","text":"Maryam el Azhari"},{"@pid":"164/9180","text":"Ahmed Toumanari"},{"@pid":"119/5227","text":"Rachid Latif"},{"@pid":"188/0904","text":"Nadya el Moussaid"}]},"title":"Round estimation period for cluster-based routing in mobile wireless sensor networks.","venue":"Int. J. Adv. Intell. Paradigms","volume":"10","number":"4","pages":"374-390","year":"2018","type":"Journal Articles","access":"closed","key":"journals/ijaip/AzhariTLM18","doi":"10.1504/IJAIP.2018.10012565","ee":"https://doi.org/10.1504/IJAIP.2018.10012565","url":"https://dblp.org/rec/journals/ijaip/AzhariTLM18"}, "url":"URL#2412294" }, { "@score":"1", "@id":"2412295", "info":{"authors":{"author":[{"@pid":"07/5653","text":"Suman Bhattacharya"},{"@pid":"213/2662","text":"Sankhayan Chowdhury"},{"@pid":"65/1484","text":"Samir Roy"}]},"title":"An effective e-learning system through learners' scaffolding.","venue":"Int. J. Adv. Intell. Paradigms","volume":"10","number":"3","pages":"290-304","year":"2018","type":"Journal Articles","access":"closed","key":"journals/ijaip/BhattacharyaCR18","doi":"10.1504/IJAIP.2018.10011382","ee":"https://doi.org/10.1504/IJAIP.2018.10011382","url":"https://dblp.org/rec/journals/ijaip/BhattacharyaCR18"}, "url":"URL#2412295" }, { "@score":"1", "@id":"2412296", "info":{"authors":{"author":[{"@pid":"327/5765","text":"Maddikera Kalyan Chakravarthi"},{"@pid":"168/7070","text":"Nithya Venkatesan"}]},"title":"Adaptive type-2 fuzzy controller for nonlinear delay dominant MIMO systems: an experimental paradigm in LabVIEW.","venue":"Int. J. Adv. Intell. Paradigms","volume":"10","number":"4","pages":"354-373","year":"2018","type":"Journal Articles","access":"closed","key":"journals/ijaip/ChakravarthiV18","doi":"10.1504/IJAIP.2018.10012564","ee":"https://doi.org/10.1504/IJAIP.2018.10012564","url":"https://dblp.org/rec/journals/ijaip/ChakravarthiV18"}, "url":"URL#2412296" }, { "@score":"1", "@id":"2412297", "info":{"authors":{"author":[{"@pid":"222/8720","text":"Weilin Chan"},{"@pid":"24/7049","text":"Mohammad Faidzul Nasrudin"},{"@pid":"55/10156","text":"Ibrahim Mohamed"}]},"title":"A study on the security impact of the web services implementation in the Malaysian government's online applications.","venue":"Int. J. Adv. Intell. Paradigms","volume":"11","number":"1/2","pages":"159-175","year":"2018","type":"Journal Articles","access":"closed","key":"journals/ijaip/ChanNM18","doi":"10.1504/IJAIP.2018.10011556","ee":"https://doi.org/10.1504/IJAIP.2018.10011556","url":"https://dblp.org/rec/journals/ijaip/ChanNM18"}, "url":"URL#2412297" }, { "@score":"1", "@id":"2412298", "info":{"authors":{"author":[{"@pid":"15/10647","text":"Hassan Chizari"},{"@pid":"01/5942","text":"Shukor Abd Razak"},{"@pid":"02/7461","text":"Mojib Majidi"},{"@pid":"11/2809","text":"Shaharuddin Salleh"}]},"title":"Computer forensic problem of sample size in file type analysis.","venue":"Int. J. Adv. Intell. Paradigms","volume":"11","number":"1/2","pages":"58-74","year":"2018","type":"Journal Articles","access":"closed","key":"journals/ijaip/ChizariRMS18","doi":"10.1504/IJAIP.2018.10013460","ee":"https://doi.org/10.1504/IJAIP.2018.10013460","url":"https://dblp.org/rec/journals/ijaip/ChizariRMS18"}, "url":"URL#2412298" }, { "@score":"1", "@id":"2412299", "info":{"authors":{"author":[{"@pid":"154/3173","text":"Swati Chowdhuri"},{"@pid":"09/7531","text":"Sheli Sinha Chaudhuri"},{"@pid":"59/5408","text":"Pranab Banerjee"},{"@pid":"117/9227","text":"Nilanjan Dey"},{"@pid":"227/8554","text":"Arun Mandal"},{"@pid":"227/8603","text":"V. Santhil"}]},"title":"Secure minimum loss route selection of MIMO-based MANET in combined (indoor, outdoor, and forest) terrain.","venue":"Int. J. Adv. Intell. Paradigms","volume":"11","number":"3/4","pages":"187-212","year":"2018","type":"Journal Articles","access":"closed","key":"journals/ijaip/ChowdhuriCBDMS18","doi":"10.1504/IJAIP.2018.10016453","ee":"https://doi.org/10.1504/IJAIP.2018.10016453","url":"https://dblp.org/rec/journals/ijaip/ChowdhuriCBDMS18"}, "url":"URL#2412299" }, { "@score":"1", "@id":"2412300", "info":{"authors":{"author":[{"@pid":"214/0310","text":"Luke Gerard Christie"},{"@pid":"214/0255","text":"Gajendra Kumar"}]},"title":"India's technological climate: a harbinger in resolving and reducing the carbon footprint.","venue":"Int. J. Adv. Intell. Paradigms","volume":"10","number":"1/2","pages":"63-73","year":"2018","type":"Journal Articles","access":"closed","key":"journals/ijaip/ChristieK18","doi":"10.1504/IJAIP.2018.10010527","ee":"https://doi.org/10.1504/IJAIP.2018.10010527","url":"https://dblp.org/rec/journals/ijaip/ChristieK18"}, "url":"URL#2412300" }, { "@score":"1", "@id":"2412301", "info":{"authors":{"author":[{"@pid":"183/5827","text":"Mounir Gabsi"},{"@pid":"206/8849","text":"Rekik Ali"},{"@pid":"87/9713","text":"Moncef Temani"}]},"title":"A simulation of model selection strategy in hierarchical system using the analytic hierarchy process.","venue":"Int. J. Adv. Intell. Paradigms","volume":"11","number":"3/4","pages":"256-271","year":"2018","type":"Journal Articles","access":"closed","key":"journals/ijaip/GabsiRT18","doi":"10.1504/IJAIP.2018.10016455","ee":"https://doi.org/10.1504/IJAIP.2018.10016455","url":"https://dblp.org/rec/journals/ijaip/GabsiRT18"}, "url":"URL#2412301" }, { "@score":"1", "@id":"2412302", "info":{"authors":{"author":[{"@pid":"124/3407","text":"M. Sakthi Ganesh"},{"@pid":"212/4770","text":"P. Venkata Krishna 0001"}]},"title":"Advance intelligence tyre monitoring system using ambient backscatter technology in VANETs.","venue":"Int. J. Adv. Intell. Paradigms","volume":"10","number":"1/2","pages":"133-145","year":"2018","type":"Journal Articles","access":"closed","key":"journals/ijaip/GaneshK18","doi":"10.1504/IJAIP.2018.10010531","ee":"https://doi.org/10.1504/IJAIP.2018.10010531","url":"https://dblp.org/rec/journals/ijaip/GaneshK18"}, "url":"URL#2412302" }, { "@score":"1", "@id":"2412303", "info":{"authors":{"author":[{"@pid":"49/11142","text":"Saptarsi Goswami"},{"@pid":"33/3570","text":"Amlan Chakrabarti"},{"@pid":"33/330","text":"Basabi Chakraborty"}]},"title":"An empirical study of feature selection for classification using genetic algorithm.","venue":"Int. J. Adv. Intell. Paradigms","volume":"10","number":"3","pages":"305-326","year":"2018","type":"Journal Articles","access":"closed","key":"journals/ijaip/GoswamiCC18","doi":"10.1504/IJAIP.2018.10011383","ee":"https://doi.org/10.1504/IJAIP.2018.10011383","url":"https://dblp.org/rec/journals/ijaip/GoswamiCC18"}, "url":"URL#2412303" }, { "@score":"1", "@id":"2412304", "info":{"authors":{"author":[{"@pid":"160/8248","text":"G. Hannah Grace"},{"@pid":"160/8379","text":"Kalyani Desikan"}]},"title":"Experimental analysis of impact of term weighting schemes on cluster quality.","venue":"Int. J. Adv. Intell. Paradigms","volume":"10","number":"1/2","pages":"178-193","year":"2018","type":"Journal Articles","access":"closed","key":"journals/ijaip/GraceD18","doi":"10.1504/IJAIP.2018.10010523","ee":"https://doi.org/10.1504/IJAIP.2018.10010523","url":"https://dblp.org/rec/journals/ijaip/GraceD18"}, "url":"URL#2412304" }, { "@score":"1", "@id":"2412305", "info":{"authors":{"author":[{"@pid":"04/1576","text":"Punit Gupta"},{"@pid":"116/2837","text":"Satya Prakash Ghrera"}]},"title":"Fault tolerant big bang-big crunch for task allocation in cloud infrastructure.","venue":"Int. J. Adv. Intell. Paradigms","volume":"10","number":"4","pages":"329-343","year":"2018","type":"Journal Articles","access":"closed","key":"journals/ijaip/GuptaG18","doi":"10.1504/IJAIP.2018.10012563","ee":"https://doi.org/10.1504/IJAIP.2018.10012563","url":"https://dblp.org/rec/journals/ijaip/GuptaG18"}, "url":"URL#2412305" }, { "@score":"1", "@id":"2412306", "info":{"authors":{"author":[{"@pid":"222/9021","text":"Nursyafikah Hamid"},{"@pid":"06/604","text":"Hishammuddin Asmuni"},{"@pid":"34/8511","text":"Rohayanti Hassan"},{"@pid":"35/2306","text":"Razib M. Othman"}]},"title":"Low-illuminated SPOT-5 image improvement for density-based vegetation identification using three-layer colour manipulation approach.","venue":"Int. J. Adv. Intell. Paradigms","volume":"11","number":"1/2","pages":"110-131","year":"2018","type":"Journal Articles","access":"closed","key":"journals/ijaip/HamidAHO18","doi":"10.1504/IJAIP.2018.10013458","ee":"https://doi.org/10.1504/IJAIP.2018.10013458","url":"https://dblp.org/rec/journals/ijaip/HamidAHO18"}, "url":"URL#2412306" }, { "@score":"1", "@id":"2412307", "info":{"authors":{"author":[{"@pid":"128/3543","text":"Saida Hammoujan"},{"@pid":"19/5353","text":"Imade Benelallam"},{"@pid":"47/4507","text":"El-Houssine Bouyakhf"}]},"title":"Dynamic vs. static agent ordering in distributed arc consistency.","venue":"Int. J. Adv. Intell. Paradigms","volume":"10","number":"3","pages":"266-289","year":"2018","type":"Journal Articles","access":"closed","key":"journals/ijaip/HammoujanBB18","doi":"10.1504/IJAIP.2018.10011381","ee":"https://doi.org/10.1504/IJAIP.2018.10011381","url":"https://dblp.org/rec/journals/ijaip/HammoujanBB18"}, "url":"URL#2412307" }, { "@score":"1", "@id":"2412308", "info":{"authors":{"author":{"@pid":"116/6721","text":"Mounir Hemam"}},"title":"An extension of the ontology web language with multi-viewpoints and probabilistic reasoning.","venue":"Int. J. Adv. Intell. Paradigms","volume":"10","number":"3","pages":"247-265","year":"2018","type":"Journal Articles","access":"closed","key":"journals/ijaip/Hemam18","doi":"10.1504/IJAIP.2018.10003857","ee":"https://doi.org/10.1504/IJAIP.2018.10003857","url":"https://dblp.org/rec/journals/ijaip/Hemam18"}, "url":"URL#2412308" }, { "@score":"1", "@id":"2412309", "info":{"authors":{"author":[{"@pid":"148/0684","text":"Sung-Sam Hong"},{"@pid":"19/1414","text":"Dong-Wook Kim"},{"@pid":"93/2492","text":"Myung-Mook Han"}]},"title":"An improved data pre-processing method for classification and insider information leakage detection.","venue":"Int. J. Adv. Intell. Paradigms","volume":"11","number":"1/2","pages":"143-158","year":"2018","type":"Journal Articles","access":"closed","key":"journals/ijaip/HongKH18","doi":"10.1504/IJAIP.2018.10013461","ee":"https://doi.org/10.1504/IJAIP.2018.10013461","url":"https://dblp.org/rec/journals/ijaip/HongKH18"}, "url":"URL#2412309" }, { "@score":"1", "@id":"2412310", "info":{"authors":{"author":[{"@pid":"245/9596","text":"Joshua Christy Jackson"},{"@pid":"199/7401","text":"V. Vijayakumar 0002"}]},"title":"A review on congestion control system using APU and D-FPAV in VANET.","venue":"Int. J. Adv. Intell. Paradigms","volume":"10","number":"4","pages":"391-400","year":"2018","type":"Journal Articles","access":"closed","key":"journals/ijaip/JacksonV18","doi":"10.1504/IJAIP.2018.10012562","ee":"https://doi.org/10.1504/IJAIP.2018.10012562","url":"https://dblp.org/rec/journals/ijaip/JacksonV18"}, "url":"URL#2412310" }, { "@score":"1", "@id":"2412311", "info":{"authors":{"author":[{"@pid":"212/4651","text":"Vimal Kumar K."},{"@pid":"93/4897","text":"Divakar Yadav"}]},"title":"Word sense-based approach for Hindi to Tamil machine translation using English as pivot language.","venue":"Int. J. Adv. Intell. Paradigms","volume":"11","number":"3/4","pages":"284-298","year":"2018","type":"Journal Articles","access":"closed","key":"journals/ijaip/KY18","doi":"10.1504/IJAIP.2018.10008778","ee":"https://doi.org/10.1504/IJAIP.2018.10008778","url":"https://dblp.org/rec/journals/ijaip/KY18"}, "url":"URL#2412311" }, { "@score":"1", "@id":"2412312", "info":{"authors":{"author":[{"@pid":"222/9090","text":"Sung-Jae Kho"},{"@pid":"56/2286","text":"Jae-Ho Lee"},{"@pid":"222/8721","text":"Uk-Jin Jang"},{"@pid":"41/2159","text":"Youn-Sik Hong"}]},"title":"A method of improving PRR for WiFi interference avoidance in ZigBee networks in indoor environments.","venue":"Int. J. Adv. Intell. Paradigms","volume":"11","number":"1/2","pages":"176-186","year":"2018","type":"Journal Articles","access":"closed","key":"journals/ijaip/KhoLJH18","doi":"10.1504/IJAIP.2018.10013462","ee":"https://doi.org/10.1504/IJAIP.2018.10013462","url":"https://dblp.org/rec/journals/ijaip/KhoLJH18"}, "url":"URL#2412312" }, { "@score":"1", "@id":"2412313", "info":{"authors":{"author":[{"@pid":"12/686","text":"Yousef Kilani"},{"@pid":"184/9399","text":"Bushra Alhijawi"},{"@pid":"37/9609","text":"Ayoub Alsarhan"}]},"title":"Using artificial intelligence techniques in collaborative filtering recommender systems: survey.","venue":"Int. J. Adv. Intell. Paradigms","volume":"11","number":"3/4","pages":"378-396","year":"2018","type":"Journal Articles","access":"closed","key":"journals/ijaip/KilaniAA18","doi":"10.1504/IJAIP.2018.10010168","ee":"https://doi.org/10.1504/IJAIP.2018.10010168","url":"https://dblp.org/rec/journals/ijaip/KilaniAA18"}, "url":"URL#2412313" }, { "@score":"1", "@id":"2412314", "info":{"authors":{"author":[{"@pid":"35/4304-3","text":"Ram Kumar 0003"},{"@pid":"161/2833","text":"Fazal A. Talukdar"},{"@pid":"117/9227","text":"Nilanjan Dey"},{"@pid":"28/2665","text":"Valentina Emilia Balas"}]},"title":"Quality factor optimisation of spiral inductor using firefly algorithm and its application in amplifier.","venue":"Int. J. Adv. Intell. Paradigms","volume":"11","number":"3/4","pages":"299-314","year":"2018","type":"Journal Articles","access":"closed","key":"journals/ijaip/KumarTDB18","doi":"10.1504/IJAIP.2018.10016456","ee":"https://doi.org/10.1504/IJAIP.2018.10016456","url":"https://dblp.org/rec/journals/ijaip/KumarTDB18"}, "url":"URL#2412314" }, { "@score":"1", "@id":"2412315", "info":{"authors":{"author":[{"@pid":"122/3016","text":"Raka Kundu"},{"@pid":"33/3570","text":"Amlan Chakrabarti"},{"@pid":"152/3784","text":"Prasanna Kumar Lenka"}]},"title":"Automated lumbar-lordosis angle computation from digital X-ray image based on unsupervised learning.","venue":"Int. J. Adv. Intell. Paradigms","volume":"11","number":"3/4","pages":"235-255","year":"2018","type":"Journal Articles","access":"closed","key":"journals/ijaip/KunduCL18","doi":"10.1504/IJAIP.2018.10011555","ee":"https://doi.org/10.1504/IJAIP.2018.10011555","url":"https://dblp.org/rec/journals/ijaip/KunduCL18"}, "url":"URL#2412315" }, { "@score":"1", "@id":"2412316", "info":{"authors":{"author":[{"@pid":"129/4029","text":"Shipra Madan"},{"@pid":"91/7800","text":"Devpriya Soni"},{"@pid":"222/8978","text":"Harvinder"}]},"title":"An integrated framework for posture recognition.","venue":"Int. J. Adv. Intell. Paradigms","volume":"11","number":"1/2","pages":"132-142","year":"2018","type":"Journal Articles","access":"closed","key":"journals/ijaip/MadanSH18","doi":"10.1504/IJAIP.2018.10013457","ee":"https://doi.org/10.1504/IJAIP.2018.10013457","url":"https://dblp.org/rec/journals/ijaip/MadanSH18"}, "url":"URL#2412316" }, { "@score":"1", "@id":"2412317", "info":{"authors":{"author":[{"@pid":"198/4495","text":"Gunasekaran Manogaran"},{"@pid":"58/548","text":"Daphne Lopez"}]},"title":"Health data analytics using scalable logistic regression with stochastic gradient descent.","venue":"Int. J. Adv. Intell. Paradigms","volume":"10","number":"1/2","pages":"118-132","year":"2018","type":"Journal Articles","access":"closed","key":"journals/ijaip/ManogaranL18","doi":"10.1504/IJAIP.2018.10010530","ee":"https://doi.org/10.1504/IJAIP.2018.10010530","url":"https://dblp.org/rec/journals/ijaip/ManogaranL18"}, "url":"URL#2412317" }, { "@score":"1", "@id":"2412318", "info":{"authors":{"author":[{"@pid":"08/10129","text":"Zulkefli Mansor"},{"@pid":"70/10128","text":"Noor Habibah Hj Arshad"},{"@pid":"78/1989","text":"Saadiah Yahya"},{"@pid":"164/0436","text":"Sukumar Letchmunan"}]},"title":"Validated agile cost management success factors in software development projects.","venue":"Int. J. Adv. Intell. Paradigms","volume":"11","number":"1/2","pages":"5-18","year":"2018","type":"Journal Articles","access":"closed","key":"journals/ijaip/MansorAYL18","doi":"10.1504/IJAIP.2018.10013459","ee":"https://doi.org/10.1504/IJAIP.2018.10013459","url":"https://dblp.org/rec/journals/ijaip/MansorAYL18"}, "url":"URL#2412318" }, { "@score":"1", "@id":"2412319", "info":{"authors":{"author":[{"@pid":"214/0135","text":"S. Meenatchi"},{"@pid":"213/9962","text":"Sevugan Prabu"}]},"title":"Investigation on different clustering techniques in wireless sensor networks.","venue":"Int. J. Adv. Intell. Paradigms","volume":"10","number":"1/2","pages":"194-207","year":"2018","type":"Journal Articles","access":"closed","key":"journals/ijaip/MeenatchiP18","doi":"10.1504/IJAIP.2018.10010534","ee":"https://doi.org/10.1504/IJAIP.2018.10010534","url":"https://dblp.org/rec/journals/ijaip/MeenatchiP18"}, "url":"URL#2412319" }, { "@score":"1", "@id":"2412320", "info":{"authors":{"author":[{"@pid":"156/7091","text":"Luzango Pangani Mfupe"},{"@pid":"35/2574","text":"Fisseha Mekuria"}]},"title":"Dynamic spectrum access for M2M-WANs: the African regulator's spectrum policy reform conundrum.","venue":"Int. J. Adv. Intell. Paradigms","volume":"11","number":"1/2","pages":"85-99","year":"2018","type":"Journal Articles","access":"closed","key":"journals/ijaip/MfupeM18","doi":"10.1504/IJAIP.2018.10013456","ee":"https://doi.org/10.1504/IJAIP.2018.10013456","url":"https://dblp.org/rec/journals/ijaip/MfupeM18"}, "url":"URL#2412320" }, { "@score":"1", "@id":"2412321", "info":{"authors":{"author":{"@pid":"222/9096","text":"Roy I. Morien"}},"title":"Pedagogical agility and agile methodologies in computer system development education.","venue":"Int. J. Adv. Intell. Paradigms","volume":"11","number":"1/2","pages":"19-32","year":"2018","type":"Journal Articles","access":"closed","key":"journals/ijaip/Morien18","doi":"10.1504/IJAIP.2018.10009419","ee":"https://doi.org/10.1504/IJAIP.2018.10009419","url":"https://dblp.org/rec/journals/ijaip/Morien18"}, "url":"URL#2412321" }, { "@score":"1", "@id":"2412322", "info":{"authors":{"author":[{"@pid":"216/3284","text":"Majid Nikougoftar Nategh"},{"@pid":"160/8362","text":"Ali Asghar Rahmani Hosseinabadi"},{"@pid":"28/2665","text":"Valentina Emilia Balas"}]},"title":"Ant_VRP: ant-colony-based meta-heuristic algorithm to solve the vehicle routing problem.","venue":"Int. J. Adv. Intell. Paradigms","volume":"11","number":"3/4","pages":"315-334","year":"2018","type":"Journal Articles","access":"closed","key":"journals/ijaip/NateghHB18","doi":"10.1504/IJAIP.2018.10016457","ee":"https://doi.org/10.1504/IJAIP.2018.10016457","url":"https://dblp.org/rec/journals/ijaip/NateghHB18"}, "url":"URL#2412322" }, { "@score":"1", "@id":"2412323", "info":{"authors":{"author":[{"@pid":"216/3284","text":"Majid Nikougoftar Nategh"},{"@pid":"160/8362","text":"Ali Asghar Rahmani Hosseinabadi"},{"@pid":"28/2665","text":"Valentina Emilia Balas"}]},"title":"University-timetabling problem and its solution using GELS algorithm: a case study.","venue":"Int. J. Adv. Intell. Paradigms","volume":"11","number":"3/4","pages":"368-377","year":"2018","type":"Journal Articles","access":"closed","key":"journals/ijaip/NateghHB18a","doi":"10.1504/IJAIP.2018.10016460","ee":"https://doi.org/10.1504/IJAIP.2018.10016460","url":"https://dblp.org/rec/journals/ijaip/NateghHB18a"}, "url":"URL#2412323" }, { "@score":"1", "@id":"2412324", "info":{"authors":{"author":[{"@pid":"169/3758","text":"Jong Ho Paik"},{"@pid":"169/3760","text":"Yejin Sohn"},{"@pid":"83/5893","text":"Minju Cho"},{"@pid":"222/8658","text":"Kyunga Yu"},{"@pid":"222/8783","text":"Sunyoung Hong"},{"@pid":"148/0057","text":"Seulki Song"}]},"title":"Media-aware scheduling method for transmitting signalling message over MPEG media transport-based broadcast.","venue":"Int. J. Adv. Intell. Paradigms","volume":"11","number":"1/2","pages":"75-84","year":"2018","type":"Journal Articles","access":"closed","key":"journals/ijaip/PaikSCYHS18","doi":"10.1504/IJAIP.2018.10013454","ee":"https://doi.org/10.1504/IJAIP.2018.10013454","url":"https://dblp.org/rec/journals/ijaip/PaikSCYHS18"}, "url":"URL#2412324" }, { "@score":"1", "@id":"2412325", "info":{"authors":{"author":[{"@pid":"50/7477","text":"Pritee Parwekar"},{"@pid":"209/8159","text":"Sireesha Rodda"}]},"title":"Prolonging the network life in wireless sensors network - using refined region of interest.","venue":"Int. J. Adv. Intell. Paradigms","volume":"10","number":"4","pages":"344-353","year":"2018","type":"Journal Articles","access":"closed","key":"journals/ijaip/ParwekarR18","doi":"10.1504/IJAIP.2018.10010633","ee":"https://doi.org/10.1504/IJAIP.2018.10010633","url":"https://dblp.org/rec/journals/ijaip/ParwekarR18"}, "url":"URL#2412325" }, { "@score":"1", "@id":"2412326", "info":{"authors":{"author":[{"@pid":"178/3076","text":"B. Prabadevi"},{"@pid":"120/9724","text":"N. Jeyanthi"}]},"title":"A framework to mitigate ARP sniffing attacks by cache poisoning.","venue":"Int. J. Adv. Intell. Paradigms","volume":"10","number":"1/2","pages":"146-159","year":"2018","type":"Journal Articles","access":"closed","key":"journals/ijaip/PrabadeviJ18","doi":"10.1504/IJAIP.2018.10010532","ee":"https://doi.org/10.1504/IJAIP.2018.10010532","url":"https://dblp.org/rec/journals/ijaip/PrabadeviJ18"}, "url":"URL#2412326" }, { "@score":"1", "@id":"2412327", "info":{"authors":{"author":[{"@pid":"210/7109","text":"T. S. PradeepKumar"},{"@pid":"212/4770","text":"P. Venkata Krishna 0001"}]},"title":"Power modelling of sensors for IoT using reinforcement learning.","venue":"Int. J. Adv. Intell. Paradigms","volume":"10","number":"1/2","pages":"3-22","year":"2018","type":"Journal Articles","access":"closed","key":"journals/ijaip/PradeepKumarK18","doi":"10.1504/IJAIP.2018.10010528","ee":"https://doi.org/10.1504/IJAIP.2018.10010528","url":"https://dblp.org/rec/journals/ijaip/PradeepKumarK18"}, "url":"URL#2412327" }, { "@score":"1", "@id":"2412328", "info":{"authors":{"author":[{"@pid":"03/7687","text":"P. Raja"},{"@pid":"227/8780","text":"Ambati Akshay"},{"@pid":"227/8836","text":"Akshay Kumar Budumuru"}]},"title":"Real time navigation of a mobile robot.","venue":"Int. J. Adv. Intell. Paradigms","volume":"11","number":"3/4","pages":"348-367","year":"2018","type":"Journal Articles","access":"closed","key":"journals/ijaip/RajaAB18","doi":"10.1504/IJAIP.2018.10016459","ee":"https://doi.org/10.1504/IJAIP.2018.10016459","url":"https://dblp.org/rec/journals/ijaip/RajaAB18"}, "url":"URL#2412328" }, { "@score":"1", "@id":"2412329", "info":{"authors":{"author":[{"@pid":"90/9032","text":"Bharat S. Rawal"},{"@pid":"67/6644","text":"Qiang Duan"},{"@pid":"173/6785","text":"Pandi Vijayakumar"}]},"title":"Dissection of the experimental outcome of split-protocol.","venue":"Int. J. Adv. Intell. Paradigms","volume":"10","number":"1/2","pages":"23-44","year":"2018","type":"Journal Articles","access":"closed","key":"journals/ijaip/RawalDV18","doi":"10.1504/IJAIP.2018.10010525","ee":"https://doi.org/10.1504/IJAIP.2018.10010525","url":"https://dblp.org/rec/journals/ijaip/RawalDV18"}, "url":"URL#2412329" }, { "@score":"1", "@id":"2412330", "info":{"authors":{"author":[{"@pid":"225/1514","text":"N. V. Rajasekhara Reddy"},{"@pid":"212/4770","text":"P. Venkata Krishna 0001"}]},"title":"Context aware power management in smart grids using load balancing approach.","venue":"Int. J. Adv. Intell. Paradigms","volume":"11","number":"3/4","pages":"335-347","year":"2018","type":"Journal Articles","access":"closed","key":"journals/ijaip/ReddyK18","doi":"10.1504/IJAIP.2018.10016458","ee":"https://doi.org/10.1504/IJAIP.2018.10016458","url":"https://dblp.org/rec/journals/ijaip/ReddyK18"}, "url":"URL#2412330" }, { "@score":"1", "@id":"2412331", "info":{"authors":{"author":[{"@pid":"43/9569","text":"M. K. Sandhya"},{"@pid":"46/2951","text":"Krishnan Murugan"},{"@pid":"90/9125","text":"P. Devaraj"}]},"title":"False data detection and dynamic selection of aggregator nodes with pair-wise key establishment in homogeneous wireless sensor networks.","venue":"Int. J. Adv. Intell. Paradigms","volume":"10","number":"1/2","pages":"83-102","year":"2018","type":"Journal Articles","access":"closed","key":"journals/ijaip/SandhyaMD18","doi":"10.1504/IJAIP.2018.10010522","ee":"https://doi.org/10.1504/IJAIP.2018.10010522","url":"https://dblp.org/rec/journals/ijaip/SandhyaMD18"}, "url":"URL#2412331" }, { "@score":"1", "@id":"2412332", "info":{"authors":{"author":[{"@pid":"42/9048","text":"Bidyut Biman Sarkar"},{"@pid":"227/8727","text":"Pulak Kundu"},{"@pid":"88/4552","text":"Nabendu Chaki"}]},"title":"Stochastic modelling and pilot data analysis towards provisioning of ambulance for handling emergency.","venue":"Int. J. Adv. Intell. Paradigms","volume":"11","number":"3/4","pages":"213-234","year":"2018","type":"Journal Articles","access":"closed","key":"journals/ijaip/SarkarKC18","doi":"10.1504/IJAIP.2018.10016454","ee":"https://doi.org/10.1504/IJAIP.2018.10016454","url":"https://dblp.org/rec/journals/ijaip/SarkarKC18"}, "url":"URL#2412332" }, { "@score":"1", "@id":"2412333", "info":{"authors":{"author":[{"@pid":"222/8930","text":"Jaejoon Seho"},{"@pid":"51/4737","text":"Junchul Chun"}]},"title":"An automatic detection of a natural marker and augmentation of 3D models in AR with sketch-based object matching.","venue":"Int. J. Adv. Intell. Paradigms","volume":"11","number":"1/2","pages":"100-109","year":"2018","type":"Journal Articles","access":"closed","key":"journals/ijaip/SehoC18","doi":"10.1504/IJAIP.2018.10013455","ee":"https://doi.org/10.1504/IJAIP.2018.10013455","url":"https://dblp.org/rec/journals/ijaip/SehoC18"}, "url":"URL#2412333" }, { "@score":"1", "@id":"2412334", "info":{"authors":{"author":[{"@pid":"206/7549","text":"Oshin Sharma"},{"@pid":"46/8805","text":"Hemraj Saini"}]},"title":"Energy efficient virtual machine consolidation for cloud data centres using analytic hierarchy process.","venue":"Int. J. Adv. Intell. Paradigms","volume":"10","number":"4","pages":"401-422","year":"2018","type":"Journal Articles","access":"closed","key":"journals/ijaip/SharmaS18","doi":"10.1504/IJAIP.2018.10012566","ee":"https://doi.org/10.1504/IJAIP.2018.10012566","url":"https://dblp.org/rec/journals/ijaip/SharmaS18"}, "url":"URL#2412334" }, { "@score":"1", "@id":"2412335", "info":{"authors":{"author":[{"@pid":"214/0233","text":"S. Shridevi"},{"@pid":"12/3467","text":"G. Raju 0001"}]},"title":"A literature survey on the performance evaluation model of semantics enabled web services.","venue":"Int. J. Adv. Intell. Paradigms","volume":"10","number":"1/2","pages":"160-177","year":"2018","type":"Journal Articles","access":"closed","key":"journals/ijaip/ShrideviR18","doi":"10.1504/IJAIP.2018.10010533","ee":"https://doi.org/10.1504/IJAIP.2018.10010533","url":"https://dblp.org/rec/journals/ijaip/ShrideviR18"}, "url":"URL#2412335" }, { "@score":"1", "@id":"2412336", "info":{"authors":{"author":[{"@pid":"64/5328","text":"Aarti Singh"},{"@pid":"69/4644","text":"Anu Sharma"}]},"title":"A clustering-based recommendation engine for restaurants.","venue":"Int. J. Adv. Intell. Paradigms","volume":"11","number":"3/4","pages":"272-283","year":"2018","type":"Journal Articles","access":"closed","key":"journals/ijaip/SinghS18","doi":"10.1504/IJAIP.2018.10009373","ee":"https://doi.org/10.1504/IJAIP.2018.10009373","url":"https://dblp.org/rec/journals/ijaip/SinghS18"}, "url":"URL#2412336" }, { "@score":"1", "@id":"2412337", "info":{"authors":{"author":[{"@pid":"120/3491","text":"V. Subramaniyaswamy 0001"},{"@pid":"162/5427","text":"Logesh Ravi"},{"@pid":"134/9217","text":"V. Indragandhi"}]},"title":"Intelligent sports commentary recommendation system for individual cricket players.","venue":"Int. J. Adv. Intell. Paradigms","volume":"10","number":"1/2","pages":"103-117","year":"2018","type":"Journal Articles","access":"closed","key":"journals/ijaip/Subramaniyaswamy18","doi":"10.1504/IJAIP.2018.10010529","ee":"https://doi.org/10.1504/IJAIP.2018.10010529","url":"https://dblp.org/rec/journals/ijaip/Subramaniyaswamy18"}, "url":"URL#2412337" }, { "@score":"1", "@id":"2412338", "info":{"authors":{"author":{"@pid":"170/3966","text":"Alagirisamy Kamatchi Subbiah Sukumaran"}},"title":"Comparing product features of motor cycles - a multi-group analysis.","venue":"Int. J. Adv. Intell. Paradigms","volume":"10","number":"3","pages":"209-222","year":"2018","type":"Journal Articles","access":"closed","key":"journals/ijaip/Sukumaran18","doi":"10.1504/IJAIP.2018.10011378","ee":"https://doi.org/10.1504/IJAIP.2018.10011378","url":"https://dblp.org/rec/journals/ijaip/Sukumaran18"}, "url":"URL#2412338" }, { "@score":"1", "@id":"2412339", "info":{"authors":{"author":[{"@pid":"119/4878","text":"Poonam Tanwar"},{"@pid":"31/2284","text":"T. V. Prasad 0001"},{"@pid":"02/8042","text":"Kamlesh Dutta"}]},"title":"Natural language processing for hybrid knowledge representation.","venue":"Int. J. Adv. Intell. Paradigms","volume":"10","number":"3","pages":"223-235","year":"2018","type":"Journal Articles","access":"closed","key":"journals/ijaip/TanwarPD18","doi":"10.1504/IJAIP.2018.10011379","ee":"https://doi.org/10.1504/IJAIP.2018.10011379","url":"https://dblp.org/rec/journals/ijaip/TanwarPD18"}, "url":"URL#2412339" }, { "@score":"1", "@id":"2412340", "info":{"authors":{"author":[{"@pid":"206/8885","text":"P. Thanapal"},{"@pid":"94/10199","text":"M. A. Saleem Durai"}]},"title":"Energy saving offloading scheme for mobile cloud computing using CloudSim.","venue":"Int. J. Adv. Intell. Paradigms","volume":"10","number":"1/2","pages":"45-62","year":"2018","type":"Journal Articles","access":"closed","key":"journals/ijaip/ThanapalD18","doi":"10.1504/IJAIP.2018.10010526","ee":"https://doi.org/10.1504/IJAIP.2018.10010526","url":"https://dblp.org/rec/journals/ijaip/ThanapalD18"}, "url":"URL#2412340" }, { "@score":"1", "@id":"2412341", "info":{"authors":{"author":[{"@pid":"198/4011","text":"Shriram K. Vasudevan"},{"@pid":"217/5489","text":"T. Naveen"},{"@pid":"217/5649","text":"K. V. Padminy"},{"@pid":"217/5500","text":"J. Shruthi Krithika"},{"@pid":"217/5522","text":"P. Geethan"}]},"title":"Marker-based augmented reality interface with gesture interaction to access remote file system.","venue":"Int. J. Adv. Intell. Paradigms","volume":"10","number":"3","pages":"236-246","year":"2018","type":"Journal Articles","access":"closed","key":"journals/ijaip/VasudevanNPKG18","doi":"10.1504/IJAIP.2018.10011380","ee":"https://doi.org/10.1504/IJAIP.2018.10011380","url":"https://dblp.org/rec/journals/ijaip/VasudevanNPKG18"}, "url":"URL#2412341" }, { "@score":"1", "@id":"2412342", "info":{"authors":{"author":[{"@pid":"60/9036-2","text":"P. Vijayakumar 0002"},{"@pid":"58/3626","text":"V. Vijayalakshmi"},{"@pid":"202/6119","text":"R. Rajashree"}]},"title":"Increased level of security using DNA steganography.","venue":"Int. J. Adv. Intell. Paradigms","volume":"10","number":"1/2","pages":"74-82","year":"2018","type":"Journal Articles","access":"closed","key":"journals/ijaip/VijayakumarVR18","doi":"10.1504/IJAIP.2018.10009322","ee":"https://doi.org/10.1504/IJAIP.2018.10009322","url":"https://dblp.org/rec/journals/ijaip/VijayakumarVR18"}, "url":"URL#2412342" }, { "@score":"1", "@id":"2412343", "info":{"authors":{"author":[{"@pid":"227/8812","text":"Vikash Yadav"},{"@pid":"13/7861","text":"Vandana Dixit Kaushik"}]},"title":"Detection of melanoma skin disease by extracting high level features for skin lesions.","venue":"Int. J. Adv. Intell. Paradigms","volume":"11","number":"3/4","pages":"397-408","year":"2018","type":"Journal Articles","access":"closed","key":"journals/ijaip/YadavK18","doi":"10.1504/IJAIP.2018.10012484","ee":"https://doi.org/10.1504/IJAIP.2018.10012484","url":"https://dblp.org/rec/journals/ijaip/YadavK18"}, "url":"URL#2412343" }, { "@score":"1", "@id":"2780729", "info":{"authors":{"author":[{"@pid":"210/3563","text":"Geraldine Bessie Amali"},{"@pid":"210/3605","text":"Siddhartha Bhuyan"},{"@pid":"210/3543","text":"Aju"}]},"title":"Design of image enhancement filters using a novel parallel particle swarm optimisation algorithm.","venue":"Int. J. Adv. Intell. Paradigms","volume":"9","number":"5/6","pages":"576-588","year":"2017","type":"Journal Articles","access":"closed","key":"journals/ijaip/AmaliBA17","doi":"10.1504/IJAIP.2017.10009230","ee":"https://doi.org/10.1504/IJAIP.2017.10009230","url":"https://dblp.org/rec/journals/ijaip/AmaliBA17"}, "url":"URL#2780729" }, { "@score":"1", "@id":"2780730", "info":{"authors":{"author":[{"@pid":"05/2523","text":"Basavaraj S. Anami"},{"@pid":"203/7753","text":"Mahantesh C. Elemmi"}]},"title":"A rule-based approach for classification of natural and man-made fabric images.","venue":"Int. J. Adv. Intell. Paradigms","volume":"9","number":"4","pages":"402-413","year":"2017","type":"Journal Articles","access":"closed","key":"journals/ijaip/AnamiE17","doi":"10.1504/IJAIP.2017.10004798","ee":"https://doi.org/10.1504/IJAIP.2017.10004798","url":"https://dblp.org/rec/journals/ijaip/AnamiE17"}, "url":"URL#2780730" }, { "@score":"1", "@id":"2780731", "info":{"authors":{"author":[{"@pid":"167/3089","text":"Balamurugan Balusamy"},{"@pid":"197/6541","text":"Kotteswari Karthikeyan"},{"@pid":"150/1679","text":"Arun Kumar Sangaiah"}]},"title":"Ant colony-based load balancing and fault recovery for cloud computing environment.","venue":"Int. J. Adv. Intell. Paradigms","volume":"9","number":"2/3","pages":"204-219","year":"2017","type":"Journal Articles","access":"closed","key":"journals/ijaip/BalusamyKS17","doi":"10.1504/IJAIP.2017.10003577","ee":"https://doi.org/10.1504/IJAIP.2017.10003577","url":"https://dblp.org/rec/journals/ijaip/BalusamyKS17"}, "url":"URL#2780731" }, { "@score":"1", "@id":"2780732", "info":{"authors":{"author":[{"@pid":"210/3588","text":"K. Arul Deepa"},{"@pid":"82/4582","text":"Deisy Chelliah"}]},"title":"Statistical pair pruning towards target class in learning-based anaphora resolution for Tamil.","venue":"Int. J. Adv. Intell. Paradigms","volume":"9","number":"5/6","pages":"437-463","year":"2017","type":"Journal Articles","access":"closed","key":"journals/ijaip/DeepaD17","doi":"10.1504/IJAIP.2017.10009222","ee":"https://doi.org/10.1504/IJAIP.2017.10009222","url":"https://dblp.org/rec/journals/ijaip/DeepaD17"}, "url":"URL#2780732" }, { "@score":"1", "@id":"2780733", "info":{"authors":{"author":[{"@pid":"210/3595","text":"Ashish Dhamanda"},{"@pid":"210/3617","text":"Arunesh Dutt Dehradun"},{"@pid":"210/3647","text":"A. K. Bhardwaj Allahabad"}]},"title":"Automatic generation control of thermal generating unit using evolutionary controller.","venue":"Int. J. Adv. Intell. Paradigms","volume":"9","number":"5/6","pages":"490-504","year":"2017","type":"Journal Articles","access":"closed","key":"journals/ijaip/DhamandaDA17","doi":"10.1504/IJAIP.2017.10009224","ee":"https://doi.org/10.1504/IJAIP.2017.10009224","url":"https://dblp.org/rec/journals/ijaip/DhamandaDA17"}, "url":"URL#2780733" }, { "@score":"1", "@id":"2780734", "info":{"authors":{"author":[{"@pid":"84/10221","text":"Adnan Firoze"},{"@pid":"69/6511","text":"Rashedur M. Rahman"}]},"title":"Critical condition classification of patients from ICCDR, B hospital surveillance data.","venue":"Int. J. Adv. Intell. Paradigms","volume":"9","number":"4","pages":"347-369","year":"2017","type":"Journal Articles","access":"closed","key":"journals/ijaip/FirozeR17","doi":"10.1504/IJAIP.2017.10004795","ee":"https://doi.org/10.1504/IJAIP.2017.10004795","url":"https://dblp.org/rec/journals/ijaip/FirozeR17"}, "url":"URL#2780734" }, { "@score":"1", "@id":"2780735", "info":{"authors":{"author":[{"@pid":"172/3724","text":"Nishu Gupta"},{"@pid":"74/7591","text":"Arun Prakash"},{"@pid":"54/163","text":"Rajeev Tripathi"}]},"title":"Mobility dependent clustering-based data transmission under variable data rate for different node densities in vehicular ad hoc network.","venue":"Int. J. Adv. Intell. Paradigms","volume":"9","number":"2/3","pages":"246-262","year":"2017","type":"Journal Articles","access":"closed","key":"journals/ijaip/GuptaPT17","doi":"10.1504/IJAIP.2017.10003580","ee":"https://doi.org/10.1504/IJAIP.2017.10003580","url":"https://dblp.org/rec/journals/ijaip/GuptaPT17"}, "url":"URL#2780735" }, { "@score":"1", "@id":"2780736", "info":{"authors":{"author":{"@pid":"12/4519","text":"Feras Ahmad Hanandeh"}},"title":"Horizontal partitioning method for test verification in parallel database systems.","venue":"Int. J. Adv. Intell. Paradigms","volume":"9","number":"1","pages":"96-106","year":"2017","type":"Journal Articles","access":"closed","key":"journals/ijaip/Hanandeh17","doi":"10.1504/IJAIP.2017.10002029","ee":"https://doi.org/10.1504/IJAIP.2017.10002029","url":"https://dblp.org/rec/journals/ijaip/Hanandeh17"}, "url":"URL#2780736" }, { "@score":"1", "@id":"2780737", "info":{"authors":{"author":[{"@pid":"162/3318","text":"Kaliannan Jagatheesan"},{"@pid":"162/3211","text":"Anand Baskaran"},{"@pid":"132/8974","text":"Sourav Samanta"},{"@pid":"117/9227","text":"Nilanjan Dey"},{"@pid":"162/9395","text":"Amira S. Ashour"},{"@pid":"28/2665","text":"Valentina Emilia Balas"}]},"title":"Particle swarm optimisation-based parameters optimisation of PID controller for load frequency control of multi-area reheat thermal power systems.","venue":"Int. J. Adv. Intell. Paradigms","volume":"9","number":"5/6","pages":"464-489","year":"2017","type":"Journal Articles","access":"closed","key":"journals/ijaip/KaliannanBSDAB17","doi":"10.1504/IJAIP.2017.10009223","ee":"https://doi.org/10.1504/IJAIP.2017.10009223","url":"https://dblp.org/rec/journals/ijaip/KaliannanBSDAB17"}, "url":"URL#2780737" }, { "@score":"1", "@id":"2780738", "info":{"authors":{"author":[{"@pid":"197/6518","text":"Varun Kohli"},{"@pid":"75/4223","text":"Rajeev Kumar"},{"@pid":"85/6266-1","text":"Dilip Kumar 0001"}]},"title":"Modified fitness-based swarm intelligence approach for routing in wireless sensor networks.","venue":"Int. J. Adv. Intell. Paradigms","volume":"9","number":"2/3","pages":"263-277","year":"2017","type":"Journal Articles","access":"closed","key":"journals/ijaip/KohliKK17","doi":"10.1504/IJAIP.2017.10003581","ee":"https://doi.org/10.1504/IJAIP.2017.10003581","url":"https://dblp.org/rec/journals/ijaip/KohliKK17"}, "url":"URL#2780738" }, { "@score":"1", "@id":"2780739", "info":{"authors":{"author":[{"@pid":"158/0953","text":"Nishikant Kumar"},{"@pid":"05/5654","text":"Soumya Banerjee"}]},"title":"Analysing the effect of multi-versioning for software updates on reliability: a utility following pheromone trail of social insects.","venue":"Int. J. Adv. Intell. Paradigms","volume":"9","number":"5/6","pages":"505-518","year":"2017","type":"Journal Articles","access":"closed","key":"journals/ijaip/KumarB17","doi":"10.1504/IJAIP.2017.10009225","ee":"https://doi.org/10.1504/IJAIP.2017.10009225","url":"https://dblp.org/rec/journals/ijaip/KumarB17"}, "url":"URL#2780739" }, { "@score":"1", "@id":"2780740", "info":{"authors":{"author":[{"@pid":"117/9889","text":"Adarsh Kumar"},{"@pid":"132/0034","text":"Krishna Gopal"},{"@pid":"75/3050","text":"Alok Aggarwal"}]},"title":"A novel lightweight key management scheme for RFID-sensor integrated hierarchical MANET based on internet of things.","venue":"Int. J. Adv. Intell. Paradigms","volume":"9","number":"2/3","pages":"220-245","year":"2017","type":"Journal Articles","access":"closed","key":"journals/ijaip/KumarGA17","doi":"10.1504/IJAIP.2017.10003578","ee":"https://doi.org/10.1504/IJAIP.2017.10003578","url":"https://dblp.org/rec/journals/ijaip/KumarGA17"}, "url":"URL#2780740" }, { "@score":"1", "@id":"2780741", "info":{"authors":{"author":[{"@pid":"80/1710","text":"D. Ashok Kumar"},{"@pid":"197/6357","text":"S. R. Venugopalan"}]},"title":"Intrusion detection by initial classification-based on protocol type.","venue":"Int. J. Adv. Intell. Paradigms","volume":"9","number":"2/3","pages":"122-138","year":"2017","type":"Journal Articles","access":"closed","key":"journals/ijaip/KumarV17","doi":"10.1504/IJAIP.2017.10003575","ee":"https://doi.org/10.1504/IJAIP.2017.10003575","url":"https://dblp.org/rec/journals/ijaip/KumarV17"}, "url":"URL#2780741" }, { "@score":"1", "@id":"2780742", "info":{"authors":{"author":[{"@pid":"01/6902","text":"Sumit Kumar"},{"@pid":"132/0062","text":"Dilip Kumar Yadav"},{"@pid":"148/8627","text":"Danish Ali Khan"}]},"title":"A novel approach to automate test data generation for data flow testing based on hybrid adaptive PSO-GA algorithm.","venue":"Int. J. Adv. Intell. Paradigms","volume":"9","number":"2/3","pages":"278-312","year":"2017","type":"Journal Articles","access":"closed","key":"journals/ijaip/KumarYK17","doi":"10.1504/IJAIP.2017.10003584","ee":"https://doi.org/10.1504/IJAIP.2017.10003584","url":"https://dblp.org/rec/journals/ijaip/KumarYK17"}, "url":"URL#2780742" }, { "@score":"1", "@id":"2780743", "info":{"authors":{"author":[{"@pid":"193/7170","text":"J. M. Lakshmi"},{"@pid":"12/3467","text":"G. Raju 0001"}]},"title":"Fuzzy V(variation)-level clustering.","venue":"Int. J. Adv. Intell. Paradigms","volume":"9","number":"1","pages":"32-57","year":"2017","type":"Journal Articles","access":"closed","key":"journals/ijaip/LakshmiR17","doi":"10.1504/IJAIP.2017.10002025","ee":"https://doi.org/10.1504/IJAIP.2017.10002025","url":"https://dblp.org/rec/journals/ijaip/LakshmiR17"}, "url":"URL#2780743" }, { "@score":"1", "@id":"2780744", "info":{"authors":{"author":[{"@pid":"05/8170","text":"Daniela López De Luise"},{"@pid":"173/2367","text":"R. Azor"}]},"title":"Sound model for dialogue profiling.","venue":"Int. J. Adv. Intell. Paradigms","volume":"9","number":"5/6","pages":"623-640","year":"2017","type":"Journal Articles","access":"closed","key":"journals/ijaip/LuiseA17","doi":"10.1504/IJAIP.2017.10009232","ee":"https://doi.org/10.1504/IJAIP.2017.10009232","url":"https://dblp.org/rec/journals/ijaip/LuiseA17"}, "url":"URL#2780744" }, { "@score":"1", "@id":"2780745", "info":{"authors":{"author":[{"@pid":"126/6831","text":"Milos Madic"},{"@pid":"126/6804","text":"Miroslav Radovanovic"},{"@pid":"95/8163","text":"Dusan Petkovic"}]},"title":"Pareto optimisation of certain quality characteristics in laser cutting by ANN-GA approach.","venue":"Int. J. Adv. Intell. Paradigms","volume":"9","number":"4","pages":"370-384","year":"2017","type":"Journal Articles","access":"closed","key":"journals/ijaip/MadicRP17","doi":"10.1504/IJAIP.2017.10004796","ee":"https://doi.org/10.1504/IJAIP.2017.10004796","url":"https://dblp.org/rec/journals/ijaip/MadicRP17"}, "url":"URL#2780745" }, { "@score":"1", "@id":"2780746", "info":{"authors":{"author":[{"@pid":"121/9716","text":"M. K. Marichelvam"},{"@pid":"197/6601","text":"A. Azhagurajan"},{"@pid":"140/8761-1","text":"M. Geetha 0001"}]},"title":"A hybrid fruit fly optimisation algorithm to solve the flow shop scheduling problems with multi-objectives.","venue":"Int. J. Adv. Intell. Paradigms","volume":"9","number":"2/3","pages":"164-185","year":"2017","type":"Journal Articles","access":"closed","key":"journals/ijaip/MarichelvamAG17","doi":"10.1504/IJAIP.2017.10003573","ee":"https://doi.org/10.1504/IJAIP.2017.10003573","url":"https://dblp.org/rec/journals/ijaip/MarichelvamAG17"}, "url":"URL#2780746" }, { "@score":"1", "@id":"2780747", "info":{"authors":{"author":[{"@pid":"147/9068","text":"Chandra Sekhar Mohanty"},{"@pid":"137/0753","text":"Partha Sarathi Khuntia"},{"@pid":"33/3784","text":"Debjani Mitra"}]},"title":"A fully tuned RACS for flight control system.","venue":"Int. J. Adv. Intell. Paradigms","volume":"9","number":"5/6","pages":"558-575","year":"2017","type":"Journal Articles","access":"closed","key":"journals/ijaip/MohantyKM17","doi":"10.1504/IJAIP.2017.10009229","ee":"https://doi.org/10.1504/IJAIP.2017.10009229","url":"https://dblp.org/rec/journals/ijaip/MohantyKM17"}, "url":"URL#2780747" }, { "@score":"1", "@id":"2780748", "info":{"authors":{"author":[{"@pid":"64/8145","text":"Rozita Jamili Oskouei"},{"@pid":"03/524","text":"Bahram Sadeghi Bigham"}]},"title":"Over-sampling via under-sampling in strongly imbalanced data.","venue":"Int. J. Adv. Intell. Paradigms","volume":"9","number":"1","pages":"58-66","year":"2017","type":"Journal Articles","access":"closed","key":"journals/ijaip/OskoueiB17","doi":"10.1504/IJAIP.2017.10002026","ee":"https://doi.org/10.1504/IJAIP.2017.10002026","url":"https://dblp.org/rec/journals/ijaip/OskoueiB17"}, "url":"URL#2780748" }, { "@score":"1", "@id":"2780749", "info":{"authors":{"author":[{"@pid":"210/3577","text":"K. V. S. N. Rama Rao"},{"@pid":"158/1997","text":"Sudheer Kumar Battula"},{"@pid":"158/2001","text":"Talluri Lakshmi Siva Rama Krishna"}]},"title":"A smart heuristic scanner for an intrusion detection system using two-stage machine learning techniques.","venue":"Int. J. Adv. Intell. Paradigms","volume":"9","number":"5/6","pages":"519-529","year":"2017","type":"Journal Articles","access":"closed","key":"journals/ijaip/RaoBK17","doi":"10.1504/IJAIP.2017.10009226","ee":"https://doi.org/10.1504/IJAIP.2017.10009226","url":"https://dblp.org/rec/journals/ijaip/RaoBK17"}, "url":"URL#2780749" }, { "@score":"1", "@id":"2780750", "info":{"authors":{"author":{"@pid":"193/7041","text":"Ciprian Sandu"}},"title":"Blood pressure regulation with RAS model and Q-learning control.","venue":"Int. J. Adv. Intell. Paradigms","volume":"9","number":"1","pages":"67-81","year":"2017","type":"Journal Articles","access":"closed","key":"journals/ijaip/Sandu17","doi":"10.1504/IJAIP.2017.10002027","ee":"https://doi.org/10.1504/IJAIP.2017.10002027","url":"https://dblp.org/rec/journals/ijaip/Sandu17"}, "url":"URL#2780750" }, { "@score":"1", "@id":"2780751", "info":{"authors":{"author":[{"@pid":"197/6575","text":"S. Sarathambekai"},{"@pid":"258/4971","text":"K. Umamaheswari"}]},"title":"Performance comparison of discrete particle swarm optimisation and shuffled frog leaping algorithm in multiprocessor task scheduling problem.","venue":"Int. J. Adv. Intell. Paradigms","volume":"9","number":"2/3","pages":"139-163","year":"2017","type":"Journal Articles","access":"closed","key":"journals/ijaip/SarathambekaiU17","doi":"10.1504/IJAIP.2017.10003574","ee":"https://doi.org/10.1504/IJAIP.2017.10003574","url":"https://dblp.org/rec/journals/ijaip/SarathambekaiU17"}, "url":"URL#2780751" }, { "@score":"1", "@id":"2780752", "info":{"authors":{"author":[{"@pid":"178/5548","text":"Kaushik Sekaran"},{"@pid":"212/4770","text":"P. Venkata Krishna 0001"}]},"title":"Cross region load balancing of tasks using region-based rerouting of loads in cloud computing environment.","venue":"Int. J. Adv. Intell. Paradigms","volume":"9","number":"5/6","pages":"589-603","year":"2017","type":"Journal Articles","access":"closed","key":"journals/ijaip/SekaranK17","doi":"10.1504/IJAIP.2017.10009231","ee":"https://doi.org/10.1504/IJAIP.2017.10009231","url":"https://dblp.org/rec/journals/ijaip/SekaranK17"}, "url":"URL#2780752" }, { "@score":"1", "@id":"2780753", "info":{"authors":{"author":[{"@pid":"203/7704","text":"M. Shabnam"},{"@pid":"203/7647","text":"S. Govindarajan"}]},"title":"Survey on the text entry methods used in touch screen mobile devices by visually challenged.","venue":"Int. J. Adv. Intell. Paradigms","volume":"9","number":"4","pages":"313-325","year":"2017","type":"Journal Articles","access":"closed","key":"journals/ijaip/ShabnamG17","doi":"10.1504/IJAIP.2017.10004084","ee":"https://doi.org/10.1504/IJAIP.2017.10004084","url":"https://dblp.org/rec/journals/ijaip/ShabnamG17"}, "url":"URL#2780753" }, { "@score":"1", "@id":"2780754", "info":{"authors":{"author":[{"@pid":"89/4552","text":"Vahid Shah-Mansouri"},{"@pid":"132/0569","text":"Seshadhri Srinivasan"}]},"title":"Retransmission scheme for intra-session linear network coding in wireless networks.","venue":"Int. J. Adv. Intell. Paradigms","volume":"9","number":"4","pages":"326-346","year":"2017","type":"Journal Articles","access":"closed","key":"journals/ijaip/Shah-MansouriS17","doi":"10.1504/IJAIP.2017.10004800","ee":"https://doi.org/10.1504/IJAIP.2017.10004800","url":"https://dblp.org/rec/journals/ijaip/Shah-MansouriS17"}, "url":"URL#2780754" }, { "@score":"1", "@id":"2780755", "info":{"authors":{"author":[{"@pid":"190/6527","text":"Syed Muhammad Usman Ali Shah"},{"@pid":"210/3561","text":"Waqas Malik"},{"@pid":"210/3655","text":"M. Adnan Ur Rehman"}]},"title":"Development of smart RFID reader for generous application.","venue":"Int. J. Adv. Intell. Paradigms","volume":"9","number":"5/6","pages":"530-540","year":"2017","type":"Journal Articles","access":"closed","key":"journals/ijaip/ShahMR17","doi":"10.1504/IJAIP.2017.10009227","ee":"https://doi.org/10.1504/IJAIP.2017.10009227","url":"https://dblp.org/rec/journals/ijaip/ShahMR17"}, "url":"URL#2780755" }, { "@score":"1", "@id":"2780756", "info":{"authors":{"author":[{"@pid":"25/9554-3","text":"Neha Sharma 0003"},{"@pid":"06/5384","text":"Hari Om"}]},"title":"Hybrid framework using data mining techniques for early detection and prevention of oral cancer.","venue":"Int. J. Adv. Intell. Paradigms","volume":"9","number":"5/6","pages":"604-622","year":"2017","type":"Journal Articles","access":"closed","key":"journals/ijaip/SharmaO17","doi":"10.1504/IJAIP.2019.10004660","ee":"https://doi.org/10.1504/IJAIP.2019.10004660","url":"https://dblp.org/rec/journals/ijaip/SharmaO17"}, "url":"URL#2780756" }, { "@score":"1", "@id":"2780757", "info":{"authors":{"author":[{"@pid":"162/4422","text":"Hajar Siar"},{"@pid":"122/2149","text":"Kourosh Kiani"},{"@pid":"69/79","text":"Anthony T. Chronopoulos"}]},"title":"A combination of game theory and genetic algorithm for load balancing in distributed computer systems.","venue":"Int. J. Adv. Intell. Paradigms","volume":"9","number":"1","pages":"82-95","year":"2017","type":"Journal Articles","access":"closed","key":"journals/ijaip/SiarKC17","doi":"10.1504/IJAIP.2017.10002028","ee":"https://doi.org/10.1504/IJAIP.2017.10002028","url":"https://dblp.org/rec/journals/ijaip/SiarKC17"}, "url":"URL#2780757" }, { "@score":"1", "@id":"2780758", "info":{"authors":{"author":[{"@pid":"197/6597","text":"Chinu Singla"},{"@pid":"44/7725","text":"Sakshi Kaushal"}]},"title":"An efficient game theoretic based computation offloading framework for network optimisation in mobile cloud IoT systems.","venue":"Int. J. Adv. Intell. Paradigms","volume":"9","number":"2/3","pages":"186-203","year":"2017","type":"Journal Articles","access":"closed","key":"journals/ijaip/SinglaK17","doi":"10.1504/IJAIP.2017.10003576","ee":"https://doi.org/10.1504/IJAIP.2017.10003576","url":"https://dblp.org/rec/journals/ijaip/SinglaK17"}, "url":"URL#2780758" }, { "@score":"1", "@id":"2780759", "info":{"authors":{"author":[{"@pid":"182/6190","text":"Venkatesh Sivanandam"},{"@pid":"161/0298","text":"Kannan Ramkumar"},{"@pid":"132/0569","text":"Seshadhri Srinivasan"},{"@pid":"182/6135","text":"Guruprasath Muralidharan"}]},"title":"Data driven models for cement grinding circuit.","venue":"Int. J. Adv. Intell. Paradigms","volume":"9","number":"4","pages":"414-435","year":"2017","type":"Journal Articles","access":"closed","key":"journals/ijaip/SivanandamRSM17","doi":"10.1504/IJAIP.2017.10004799","ee":"https://doi.org/10.1504/IJAIP.2017.10004799","url":"https://dblp.org/rec/journals/ijaip/SivanandamRSM17"}, "url":"URL#2780759" }, { "@score":"1", "@id":"2780760", "info":{"authors":{"author":[{"@pid":"195/5491","text":"Aakanksha Tewari"},{"@pid":"185/9576","text":"Brij B. Gupta"}]},"title":"A lightweight mutual authentication protocol based on elliptic curve cryptography for IoT devices.","venue":"Int. J. Adv. Intell. Paradigms","volume":"9","number":"2/3","pages":"111-121","year":"2017","type":"Journal Articles","access":"closed","key":"journals/ijaip/TewariG17","doi":"10.1504/IJAIP.2017.10003568","ee":"https://doi.org/10.1504/IJAIP.2017.10003568","url":"https://dblp.org/rec/journals/ijaip/TewariG17"}, "url":"URL#2780760" }, { "@score":"1", "@id":"2780761", "info":{"authors":{"author":{"@pid":"145/4762","text":"Violeta Tulceanu"}},"title":"Brainwave authentication using emotional patterns.","venue":"Int. J. Adv. Intell. Paradigms","volume":"9","number":"1","pages":"1-31","year":"2017","type":"Journal Articles","access":"closed","key":"journals/ijaip/Tulceanu17","doi":"10.1504/IJAIP.2017.10002023","ee":"https://doi.org/10.1504/IJAIP.2017.10002023","url":"https://dblp.org/rec/journals/ijaip/Tulceanu17"}, "url":"URL#2780761" }, { "@score":"1", "@id":"2780762", "info":{"authors":{"author":[{"@pid":"83/3792","text":"V. Yegnanarayanan"},{"@pid":"210/3594","text":"A. Renuka Lakshmi"},{"@pid":"28/2665","text":"Valentina Emilia Balas"}]},"title":"On domination and total domination number of a collaboration graph.","venue":"Int. J. Adv. Intell. Paradigms","volume":"9","number":"5/6","pages":"541-557","year":"2017","type":"Journal Articles","access":"closed","key":"journals/ijaip/YegnanarayananL17","doi":"10.1504/IJAIP.2017.10009228","ee":"https://doi.org/10.1504/IJAIP.2017.10009228","url":"https://dblp.org/rec/journals/ijaip/YegnanarayananL17"}, "url":"URL#2780762" }, { "@score":"1", "@id":"2780763", "info":{"authors":{"author":[{"@pid":"89/7221","text":"Snejana Yordanova"},{"@pid":"j/LakhmiCJain","text":"Lakhmi C. Jain"}]},"title":"Design of supervisor-based adaptive process fuzzy logic control.","venue":"Int. J. Adv. Intell. Paradigms","volume":"9","number":"4","pages":"385-401","year":"2017","type":"Journal Articles","access":"closed","key":"journals/ijaip/YordanovaJ17","doi":"10.1504/IJAIP.2017.10004797","ee":"https://doi.org/10.1504/IJAIP.2017.10004797","url":"https://dblp.org/rec/journals/ijaip/YordanovaJ17"}, "url":"URL#2780763" }, { "@score":"1", "@id":"3117161", "info":{"authors":{"author":[{"@pid":"189/7715","text":"S. Aarthishree"},{"@pid":"189/7780","text":"M. Jayashree"},{"@pid":"189/7812","text":"J. Rhinose Fathima"}]},"title":"A quick approach to detect epilepsy and seizure in brain.","venue":"Int. J. Adv. Intell. Paradigms","volume":"8","number":"4","pages":"412-424","year":"2016","type":"Journal Articles","access":"closed","key":"journals/ijaip/AarthishreeJF16","doi":"10.1504/IJAIP.2016.10000900","ee":"https://doi.org/10.1504/IJAIP.2016.10000900","url":"https://dblp.org/rec/journals/ijaip/AarthishreeJF16"}, "url":"URL#3117161" }, { "@score":"1", "@id":"3117162", "info":{"authors":{"author":[{"@pid":"170/3775","text":"Lyes Abada"},{"@pid":"25/1870","text":"Saliha Aouat"}]},"title":"Facial shape-from-shading using features detection method.","venue":"Int. J. Adv. Intell. Paradigms","volume":"8","number":"1","pages":"3-19","year":"2016","type":"Journal Articles","access":"closed","key":"journals/ijaip/AbadaA16","doi":"10.1504/IJAIP.2016.074774","ee":"https://doi.org/10.1504/IJAIP.2016.074774","url":"https://dblp.org/rec/journals/ijaip/AbadaA16"}, "url":"URL#3117162" }, { "@score":"1", "@id":"3117163", "info":{"authors":{"author":[{"@pid":"183/5661","text":"M. Anusha"},{"@pid":"72/7956","text":"J. G. R. Sathiaseelan"}]},"title":"An empirical study on multi-objective genetic algorithms using clustering techniques.","venue":"Int. J. Adv. Intell. Paradigms","volume":"8","number":"3","pages":"343-354","year":"2016","type":"Journal Articles","access":"closed","key":"journals/ijaip/AnushaS16","doi":"10.1504/IJAIP.2016.077499","ee":"https://doi.org/10.1504/IJAIP.2016.077499","url":"https://dblp.org/rec/journals/ijaip/AnushaS16"}, "url":"URL#3117163" }, { "@score":"1", "@id":"3117164", "info":{"authors":{"author":[{"@pid":"61/5499","text":"Nureize Arbaiy"},{"@pid":"11/6105","text":"Pei-Chun Lin"}]},"title":"Weighted value assessment of linear fractional programming for possibilistic multi-objective problem.","venue":"Int. J. Adv. Intell. Paradigms","volume":"8","number":"1","pages":"42-58","year":"2016","type":"Journal Articles","access":"closed","key":"journals/ijaip/ArbaiyL16","doi":"10.1504/IJAIP.2016.074777","ee":"https://doi.org/10.1504/IJAIP.2016.074777","url":"https://dblp.org/rec/journals/ijaip/ArbaiyL16"}, "url":"URL#3117164" }, { "@score":"1", "@id":"3117165", "info":{"authors":{"author":[{"@pid":"189/7735","text":"S. Panneer Arokiaraj"},{"@pid":"62/2038","text":"L. Robert"}]},"title":"RDNAS: a simple DNA sequence squeezer using enhanced run length encoding.","venue":"Int. J. Adv. Intell. Paradigms","volume":"8","number":"4","pages":"443-450","year":"2016","type":"Journal Articles","access":"closed","key":"journals/ijaip/ArokiarajR16","doi":"10.1504/IJAIP.2016.10000903","ee":"https://doi.org/10.1504/IJAIP.2016.10000903","url":"https://dblp.org/rec/journals/ijaip/ArokiarajR16"}, "url":"URL#3117165" }, { "@score":"1", "@id":"3117166", "info":{"authors":{"author":[{"@pid":"173/2408","text":"Davood Azizian"},{"@pid":"173/2395","text":"Mehdi Bigdeli"}]},"title":"Application of heuristic methods for dynamic thermal modelling of cast-resin transformer.","venue":"Int. J. Adv. Intell. Paradigms","volume":"8","number":"3","pages":"288-302","year":"2016","type":"Journal Articles","access":"closed","key":"journals/ijaip/AzizianB16","doi":"10.1504/IJAIP.2016.077496","ee":"https://doi.org/10.1504/IJAIP.2016.077496","url":"https://dblp.org/rec/journals/ijaip/AzizianB16"}, "url":"URL#3117166" }, { "@score":"1", "@id":"3117167", "info":{"authors":{"author":[{"@pid":"177/2564","text":"Ibtissam Banit'ouagua"},{"@pid":"09/6268","text":"Mounir Ait Kerroum"},{"@pid":"90/5401","text":"Ahmed Hammouch"},{"@pid":"36/2531","text":"Driss Aboutajdine"}]},"title":"Band selection by mutual information for hyper-spectral image classification.","venue":"Int. J. Adv. Intell. Paradigms","volume":"8","number":"1","pages":"98-118","year":"2016","type":"Journal Articles","access":"closed","key":"journals/ijaip/BanitouaguaKHA16","doi":"10.1504/IJAIP.2016.074791","ee":"https://doi.org/10.1504/IJAIP.2016.074791","url":"https://dblp.org/rec/journals/ijaip/BanitouaguaKHA16"}, "url":"URL#3117167" }, { "@score":"1", "@id":"3117168", "info":{"authors":{"author":[{"@pid":"178/5554","text":"Chanthini Baskaran"},{"@pid":"09/5902-2","text":"D. Manivannan 0002"}]},"title":"Secure network reconfiguration protocol using ARM7.","venue":"Int. J. Adv. Intell. Paradigms","volume":"8","number":"2","pages":"131-139","year":"2016","type":"Journal Articles","access":"closed","key":"journals/ijaip/BaskaranM16","doi":"10.1504/IJAIP.2016.075722","ee":"https://doi.org/10.1504/IJAIP.2016.075722","url":"https://dblp.org/rec/journals/ijaip/BaskaranM16"}, "url":"URL#3117168" }, { "@score":"1", "@id":"3117169", "info":{"authors":{"author":[{"@pid":"178/5571","text":"M. L. Bharathi"},{"@pid":"64/373","text":"D. Kirubakaran"}]},"title":"Solar powered closed-loop controlled fuzzy logic-based three-stage interleaved DC-DC boost converter with an inverter.","venue":"Int. J. Adv. Intell. Paradigms","volume":"8","number":"2","pages":"140-155","year":"2016","type":"Journal Articles","access":"closed","key":"journals/ijaip/BharathiK16","doi":"10.1504/IJAIP.2016.075723","ee":"https://doi.org/10.1504/IJAIP.2016.075723","url":"https://dblp.org/rec/journals/ijaip/BharathiK16"}, "url":"URL#3117169" }, { "@score":"1", "@id":"3117170", "info":{"authors":{"author":{"@pid":"153/3013","text":"S. Chakaravarthi"}},"title":"Secure model for SOAP message communication in web services.","venue":"Int. J. Adv. Intell. Paradigms","volume":"8","number":"4","pages":"437-442","year":"2016","type":"Journal Articles","access":"closed","key":"journals/ijaip/Chakaravarthi16","doi":"10.1504/IJAIP.2016.10000902","ee":"https://doi.org/10.1504/IJAIP.2016.10000902","url":"https://dblp.org/rec/journals/ijaip/Chakaravarthi16"}, "url":"URL#3117170" }, { "@score":"1", "@id":"3117171", "info":{"authors":{"author":[{"@pid":"174/6049","text":"Mehdi Dadkhah"},{"@pid":"177/2588","text":"Ashok K. Shyam"},{"@pid":"177/2554","text":"Valentina Christova-Bagdassarian"},{"@pid":"31/3429","text":"Mohammad Davarpanah Jazi"}]},"title":"Similar names in academic literature as a tools to deceive researchers.","venue":"Int. J. Adv. Intell. Paradigms","volume":"8","number":"1","pages":"119-127","year":"2016","type":"Journal Articles","access":"closed","key":"journals/ijaip/DadkhahSCJ16","doi":"10.1504/IJAIP.2016.074780","ee":"https://doi.org/10.1504/IJAIP.2016.074780","url":"https://dblp.org/rec/journals/ijaip/DadkhahSCJ16"}, "url":"URL#3117171" }, { "@score":"1", "@id":"3117172", "info":{"authors":{"author":[{"@pid":"120/0286","text":"Worrawat Engchuan"},{"@pid":"36/7231","text":"Asawin Meechai"},{"@pid":"29/1264","text":"Sissades Tongsima"},{"@pid":"91/1178","text":"Jonathan H. Chan"}]},"title":"Handling batch effects on cross-platform classification of microarray data.","venue":"Int. J. Adv. Intell. Paradigms","volume":"8","number":"1","pages":"59-76","year":"2016","type":"Journal Articles","access":"closed","key":"journals/ijaip/EngchuanMTC16","doi":"10.1504/IJAIP.2016.074775","ee":"https://doi.org/10.1504/IJAIP.2016.074775","url":"https://dblp.org/rec/journals/ijaip/EngchuanMTC16"}, "url":"URL#3117172" }, { "@score":"1", "@id":"3117173", "info":{"authors":{"author":[{"@pid":"183/5707","text":"Goldina Ghosh"},{"@pid":"05/5654-2","text":"Soumya Banerjee 0002"}]},"title":"Tracking of experts for enhancement of activities in social network: an analysis of collaborative activity on Wikipedia by applying fuzzy logic.","venue":"Int. J. Adv. Intell. Paradigms","volume":"8","number":"3","pages":"260-287","year":"2016","type":"Journal Articles","access":"closed","key":"journals/ijaip/GhoshB16","doi":"10.1504/IJAIP.2016.077495","ee":"https://doi.org/10.1504/IJAIP.2016.077495","url":"https://dblp.org/rec/journals/ijaip/GhoshB16"}, "url":"URL#3117173" }, { "@score":"1", "@id":"3117174", "info":{"authors":{"author":[{"@pid":"178/5594","text":"K. Janakiraman"},{"@pid":"178/5527","text":"T. Baghyasree"},{"@pid":"178/5561","text":"D. Parkavi"}]},"title":"Highly secure data transmission for industrial network using blowfish algorithm in embedded processors.","venue":"Int. J. Adv. Intell. Paradigms","volume":"8","number":"2","pages":"168-182","year":"2016","type":"Journal Articles","access":"closed","key":"journals/ijaip/JanakiramanBP16","doi":"10.1504/IJAIP.2016.075725","ee":"https://doi.org/10.1504/IJAIP.2016.075725","url":"https://dblp.org/rec/journals/ijaip/JanakiramanBP16"}, "url":"URL#3117174" }, { "@score":"1", "@id":"3117175", "info":{"authors":{"author":[{"@pid":"189/7707","text":"Lakshmi Kalyani"},{"@pid":"138/6774","text":"V. K. Sharma"},{"@pid":"130/5449","text":"B. K. Murthy"}]},"title":"Sentiment analysis in assessing mobile learning adoption in education sector.","venue":"Int. J. Adv. Intell. Paradigms","volume":"8","number":"4","pages":"392-399","year":"2016","type":"Journal Articles","access":"closed","key":"journals/ijaip/KalyaniSM16","doi":"10.1504/IJAIP.2016.10000898","ee":"https://doi.org/10.1504/IJAIP.2016.10000898","url":"https://dblp.org/rec/journals/ijaip/KalyaniSM16"}, "url":"URL#3117175" }, { "@score":"1", "@id":"3117176", "info":{"authors":{"author":[{"@pid":"130/0054","text":"B. Vinoth Kumar"},{"@pid":"57/9862","text":"G. R. Karpagam"}]},"title":"Knowledge-based differential evolution approach to quantisation table generation for the JPEG baseline algorithm.","venue":"Int. J. Adv. Intell. Paradigms","volume":"8","number":"1","pages":"20-41","year":"2016","type":"Journal Articles","access":"closed","key":"journals/ijaip/KumarK16","doi":"10.1504/IJAIP.2016.074776","ee":"https://doi.org/10.1504/IJAIP.2016.074776","url":"https://dblp.org/rec/journals/ijaip/KumarK16"}, "url":"URL#3117176" }, { "@score":"1", "@id":"3117177", "info":{"authors":{"author":[{"@pid":"183/5724","text":"K. Lenin"},{"@pid":"183/5899","text":"B. Ravindhranathreddy"},{"@pid":"183/5709","text":"M. Suryakalavathi"}]},"title":"Hybridisation of backtracking search optimisation algorithm with differential evolution algorithm for solving reactive power problem.","venue":"Int. J. Adv. Intell. Paradigms","volume":"8","number":"3","pages":"355-364","year":"2016","type":"Journal Articles","access":"closed","key":"journals/ijaip/LeninRS16","doi":"10.1504/IJAIP.2016.077518","ee":"https://doi.org/10.1504/IJAIP.2016.077518","url":"https://dblp.org/rec/journals/ijaip/LeninRS16"}, "url":"URL#3117177" }, { "@score":"1", "@id":"3117178", "info":{"authors":{"author":[{"@pid":"90/1440","text":"Lorenzo Magnani"},{"@pid":"168/1721","text":"Selene Arfini"},{"@pid":"56/9797","text":"Tommaso Bertolotti"}]},"title":"An argument for ignorance-based chance discovery.","venue":"Int. J. Adv. Intell. Paradigms","volume":"8","number":"3","pages":"327-342","year":"2016","type":"Journal Articles","access":"closed","key":"journals/ijaip/MagnaniAB16","doi":"10.1504/IJAIP.2016.077500","ee":"https://doi.org/10.1504/IJAIP.2016.077500","url":"https://dblp.org/rec/journals/ijaip/MagnaniAB16"}, "url":"URL#3117178" }, { "@score":"1", "@id":"3117179", "info":{"authors":{"author":[{"@pid":"138/1369","text":"M. Mathankumar"},{"@pid":"178/5525","text":"M. Preethi"},{"@pid":"178/5534","text":"R. Kala Ranjani"},{"@pid":"138/1479","text":"N. Sugandhi"}]},"title":"An integrated dynamic power safeguard system using defence surveillance robots.","venue":"Int. J. Adv. Intell. Paradigms","volume":"8","number":"2","pages":"219-228","year":"2016","type":"Journal Articles","access":"closed","key":"journals/ijaip/MathankumarPRS16","doi":"10.1504/IJAIP.2016.075729","ee":"https://doi.org/10.1504/IJAIP.2016.075729","url":"https://dblp.org/rec/journals/ijaip/MathankumarPRS16"}, "url":"URL#3117179" }, { "@score":"1", "@id":"3117180", "info":{"authors":{"author":{"@pid":"127/1480","text":"Elena Mitocariu"}},"title":"Graph representations of discourse structure.","venue":"Int. J. Adv. Intell. Paradigms","volume":"8","number":"3","pages":"243-259","year":"2016","type":"Journal Articles","access":"closed","key":"journals/ijaip/Mitocariu16","doi":"10.1504/IJAIP.2016.077490","ee":"https://doi.org/10.1504/IJAIP.2016.077490","url":"https://dblp.org/rec/journals/ijaip/Mitocariu16"}, "url":"URL#3117180" }, { "@score":"1", "@id":"3117181", "info":{"authors":{"author":[{"@pid":"178/5530","text":"Shanmugasundaram Palanimalai"},{"@pid":"158/8696","text":"Ilango Paramasivam"}]},"title":"Big data analytics bring new insights and higher business value - an experiment carried out to divulge sales forecasting solutions.","venue":"Int. J. Adv. Intell. Paradigms","volume":"8","number":"2","pages":"207-218","year":"2016","type":"Journal Articles","access":"closed","key":"journals/ijaip/PalanimalaiP16","doi":"10.1504/IJAIP.2016.075728","ee":"https://doi.org/10.1504/IJAIP.2016.075728","url":"https://dblp.org/rec/journals/ijaip/PalanimalaiP16"}, "url":"URL#3117181" }, { "@score":"1", "@id":"3117182", "info":{"authors":{"author":[{"@pid":"189/7821","text":"U. Rajkanna"},{"@pid":"09/5902-2","text":"D. Manivannan 0002"}]},"title":"Design and development of mobile relay node using LPC2148.","venue":"Int. J. Adv. Intell. Paradigms","volume":"8","number":"4","pages":"367-376","year":"2016","type":"Journal Articles","access":"closed","key":"journals/ijaip/RajkannaM16","doi":"10.1504/IJAIP.2016.10000896","ee":"https://doi.org/10.1504/IJAIP.2016.10000896","url":"https://dblp.org/rec/journals/ijaip/RajkannaM16"}, "url":"URL#3117182" }, { "@score":"1", "@id":"3117183", "info":{"authors":{"author":[{"@pid":"178/5547","text":"K. Rajkumar"},{"@pid":"39/2395","text":"P. Swaminathan"}]},"title":"Fault tolerance in distributed systems using fused data structures with the help of LT codes.","venue":"Int. J. Adv. Intell. Paradigms","volume":"8","number":"2","pages":"183-190","year":"2016","type":"Journal Articles","access":"closed","key":"journals/ijaip/RajkumarS16","doi":"10.1504/IJAIP.2016.075726","ee":"https://doi.org/10.1504/IJAIP.2016.075726","url":"https://dblp.org/rec/journals/ijaip/RajkumarS16"}, "url":"URL#3117183" }, { "@score":"1", "@id":"3117184", "info":{"authors":{"author":[{"@pid":"145/7583","text":"Subramani Ramakrishnan"},{"@pid":"189/7747","text":"V. Badrinath"},{"@pid":"189/7703","text":"S. C. Anushan Sivasundaram"}]},"title":"Tapping the human cloud for successful delivery of software projects.","venue":"Int. J. Adv. Intell. Paradigms","volume":"8","number":"4","pages":"425-436","year":"2016","type":"Journal Articles","access":"closed","key":"journals/ijaip/RamakrishnanBS16","doi":"10.1504/IJAIP.2016.10000901","ee":"https://doi.org/10.1504/IJAIP.2016.10000901","url":"https://dblp.org/rec/journals/ijaip/RamakrishnanBS16"}, "url":"URL#3117184" }, { "@score":"1", "@id":"3117185", "info":{"authors":{"author":[{"@pid":"189/7782","text":"A. Delphin Carolina Rani"},{"@pid":"21/8087","text":"B. S. E. Zoraida"}]},"title":"Multistage multiprocessor task scheduling in hybrid flow shop problems using discrete firefly algorithm.","venue":"Int. J. Adv. Intell. Paradigms","volume":"8","number":"4","pages":"377-391","year":"2016","type":"Journal Articles","access":"closed","key":"journals/ijaip/RaniZ16","doi":"10.1504/IJAIP.2016.10000897","ee":"https://doi.org/10.1504/IJAIP.2016.10000897","url":"https://dblp.org/rec/journals/ijaip/RaniZ16"}, "url":"URL#3117185" }, { "@score":"1", "@id":"3117186", "info":{"authors":{"author":[{"@pid":"206/8849","text":"Rekik Ali"},{"@pid":"183/5827","text":"Mounir Gabsi"},{"@pid":"87/9713","text":"Moncef Temani"}]},"title":"Adaptive probabilities of crossover and mutation in genetic algorithm for solving stochastic vehicle routing problem.","venue":"Int. J. Adv. Intell. Paradigms","volume":"8","number":"3","pages":"318-326","year":"2016","type":"Journal Articles","access":"closed","key":"journals/ijaip/RekikGT16","doi":"10.1504/IJAIP.2016.077498","ee":"https://doi.org/10.1504/IJAIP.2016.077498","url":"https://dblp.org/rec/journals/ijaip/RekikGT16"}, "url":"URL#3117186" }, { "@score":"1", "@id":"3117187", "info":{"authors":{"author":[{"@pid":"120/7397","text":"M. D. Samrajesh"},{"@pid":"65/3575","text":"N. P. Gopalan"},{"@pid":"79/1111-3","text":"S. Suresh 0003"}]},"title":"A scalable component model for multi-tenant SaaS application.","venue":"Int. J. Adv. Intell. Paradigms","volume":"8","number":"2","pages":"191-206","year":"2016","type":"Journal Articles","access":"closed","key":"journals/ijaip/SamrajeshGS16","doi":"10.1504/IJAIP.2016.075727","ee":"https://doi.org/10.1504/IJAIP.2016.075727","url":"https://dblp.org/rec/journals/ijaip/SamrajeshGS16"}, "url":"URL#3117187" }, { "@score":"1", "@id":"3117188", "info":{"authors":{"author":[{"@pid":"169/2825","text":"Saravanakumar Gurusamy"},{"@pid":"53/3009","text":"K. Valarmathi"},{"@pid":"26/7293","text":"M. Willjuice Iruthayarajan"},{"@pid":"132/0569","text":"Seshadhri Srinivasan"}]},"title":"Lagrangian-based state transition algorithm for tuning multivariable decentralised controller.","venue":"Int. J. Adv. Intell. Paradigms","volume":"8","number":"3","pages":"303-317","year":"2016","type":"Journal Articles","access":"closed","key":"journals/ijaip/SaravanakumarVI16","doi":"10.1504/IJAIP.2016.077497","ee":"https://doi.org/10.1504/IJAIP.2016.077497","url":"https://dblp.org/rec/journals/ijaip/SaravanakumarVI16"}, "url":"URL#3117188" }, { "@score":"1", "@id":"3117189", "info":{"authors":{"author":[{"@pid":"18/2214","text":"S. Saravanan"},{"@pid":"126/9221","text":"V. Venkatachalam"}]},"title":"Improving map reduce task scheduling and micro-partitioning mechanism for mobile cloud multimedia services.","venue":"Int. J. Adv. Intell. Paradigms","volume":"8","number":"2","pages":"156-167","year":"2016","type":"Journal Articles","access":"closed","key":"journals/ijaip/SaravananV16","doi":"10.1504/IJAIP.2016.075724","ee":"https://doi.org/10.1504/IJAIP.2016.075724","url":"https://dblp.org/rec/journals/ijaip/SaravananV16"}, "url":"URL#3117189" }, { "@score":"1", "@id":"3117190", "info":{"authors":{"author":[{"@pid":"189/7731","text":"R. Seethalakshmi"},{"@pid":"25/4228","text":"K. S. Ravichandran 0001"},{"@pid":"39/2395","text":"P. Swaminathan"},{"@pid":"189/7696","text":"A. N. Alagappan"}]},"title":"Information retrieval by mining text and image.","venue":"Int. J. Adv. Intell. Paradigms","volume":"8","number":"4","pages":"451-459","year":"2016","type":"Journal Articles","access":"closed","key":"journals/ijaip/SeethalakshmiRS16","doi":"10.1504/IJAIP.2016.10000908","ee":"https://doi.org/10.1504/IJAIP.2016.10000908","url":"https://dblp.org/rec/journals/ijaip/SeethalakshmiRS16"}, "url":"URL#3117190" }, { "@score":"1", "@id":"3117191", "info":{"authors":{"author":[{"@pid":"178/5548","text":"Kaushik Sekaran"},{"@pid":"212/4770","text":"P. Venkata Krishna 0001"}]},"title":"Big Cloud: a hybrid cloud model for secure data storage through cloud space.","venue":"Int. J. Adv. Intell. Paradigms","volume":"8","number":"2","pages":"229-241","year":"2016","type":"Journal Articles","access":"closed","key":"journals/ijaip/SekaranK16","doi":"10.1504/IJAIP.2016.075731","ee":"https://doi.org/10.1504/IJAIP.2016.075731","url":"https://dblp.org/rec/journals/ijaip/SekaranK16"}, "url":"URL#3117191" }, { "@score":"1", "@id":"3117192", "info":{"authors":{"author":[{"@pid":"68/7135","text":"Fatiha Souam"},{"@pid":"177/2536","text":"Ali Aït El Hadj"}]},"title":"Efficient similarity measure for comparing tree structures.","venue":"Int. J. Adv. Intell. Paradigms","volume":"8","number":"1","pages":"77-97","year":"2016","type":"Journal Articles","access":"closed","key":"journals/ijaip/SouamH16","doi":"10.1504/IJAIP.2016.074779","ee":"https://doi.org/10.1504/IJAIP.2016.074779","url":"https://dblp.org/rec/journals/ijaip/SouamH16"}, "url":"URL#3117192" }, { "@score":"1", "@id":"3117193", "info":{"authors":{"author":[{"@pid":"189/7798","text":"G. Suganthi"},{"@pid":"50/5974","text":"Reeba Korah"}]},"title":"Computer-aided detection and identification of mine-like objects in infrared imagery using digital image processing.","venue":"Int. J. Adv. Intell. Paradigms","volume":"8","number":"4","pages":"400-411","year":"2016","type":"Journal Articles","access":"closed","key":"journals/ijaip/SuganthiK16","doi":"10.1504/IJAIP.2016.10000899","ee":"https://doi.org/10.1504/IJAIP.2016.10000899","url":"https://dblp.org/rec/journals/ijaip/SuganthiK16"}, "url":"URL#3117193" }, { "@score":"1", "@id":"3431058", "info":{"authors":{"author":[{"@pid":"174/2840","text":"Prateek Agrawal"},{"@pid":"174/2906","text":"Vishu Madaan"},{"@pid":"21/1587-6","text":"Vikas Kumar 0006"}]},"title":"Fuzzy rule-based medical expert system to identify the disorders of eyes, ENT and liver.","venue":"Int. J. Adv. Intell. Paradigms","volume":"7","number":"3/4","pages":"352-367","year":"2015","type":"Journal Articles","access":"closed","key":"journals/ijaip/AgrawalMK15","doi":"10.1504/IJAIP.2015.073714","ee":"https://doi.org/10.1504/IJAIP.2015.073714","url":"https://dblp.org/rec/journals/ijaip/AgrawalMK15"}, "url":"URL#3431058" }, { "@score":"1", "@id":"3431059", "info":{"authors":{"author":[{"@pid":"293/5684","text":"Amsaveni Avinashiappan"},{"@pid":"26/1757","text":"P. T. Vanathi"}]},"title":"An efficient reversible data hiding approach for colour images based on Gaussian weighted prediction error expansion and genetic algorithm.","venue":"Int. J. Adv. Intell. Paradigms","volume":"7","number":"2","pages":"156-171","year":"2015","type":"Journal Articles","access":"closed","key":"journals/ijaip/AmsaveniV15","doi":"10.1504/IJAIP.2015.070769","ee":"https://doi.org/10.1504/IJAIP.2015.070769","url":"https://dblp.org/rec/journals/ijaip/AmsaveniV15"}, "url":"URL#3431059" }, { "@score":"1", "@id":"3431060", "info":{"authors":{"author":[{"@pid":"05/2523","text":"Basavaraj S. Anami"},{"@pid":"165/8455","text":"N. M. Naveen"},{"@pid":"165/8441","text":"N. G. Hanamaratti"}]},"title":"A colour features-based methodology for variety recognition from bulk paddy images.","venue":"Int. J. Adv. Intell. Paradigms","volume":"7","number":"2","pages":"187-205","year":"2015","type":"Journal Articles","access":"closed","key":"journals/ijaip/AnamiNH15","doi":"10.1504/IJAIP.2015.070776","ee":"https://doi.org/10.1504/IJAIP.2015.070776","url":"https://dblp.org/rec/journals/ijaip/AnamiNH15"}, "url":"URL#3431060" }, { "@score":"1", "@id":"3431061", "info":{"authors":{"author":[{"@pid":"146/5617","text":"A. Diana Andrushia"},{"@pid":"09/8309","text":"R. Thangarajan"}]},"title":"Visual attention-based leukocyte image segmentation using extreme learning machine.","venue":"Int. J. Adv. Intell. Paradigms","volume":"7","number":"2","pages":"172-186","year":"2015","type":"Journal Articles","access":"closed","key":"journals/ijaip/AndrushiaT15","doi":"10.1504/IJAIP.2015.070771","ee":"https://doi.org/10.1504/IJAIP.2015.070771","url":"https://dblp.org/rec/journals/ijaip/AndrushiaT15"}, "url":"URL#3431061" }, { "@score":"1", "@id":"3431062", "info":{"authors":{"author":[{"@pid":"174/2660","text":"S. Anthoniraj"},{"@pid":"87/4638","text":"S. Saraswathi"}]},"title":"Optimised resource and shared allocation using ESUAB algorithm in virtual environment.","venue":"Int. J. Adv. Intell. Paradigms","volume":"7","number":"3/4","pages":"302-312","year":"2015","type":"Journal Articles","access":"closed","key":"journals/ijaip/AnthonirajS15","doi":"10.1504/IJAIP.2015.073711","ee":"https://doi.org/10.1504/IJAIP.2015.073711","url":"https://dblp.org/rec/journals/ijaip/AnthonirajS15"}, "url":"URL#3431062" }, { "@score":"1", "@id":"3431063", "info":{"authors":{"author":[{"@pid":"174/3092","text":"V. Arun"},{"@pid":"01/7764","text":"K. L. Shunmuganathan"}]},"title":"Delivering QOS with security of encrypted tracer and checker model in MANET.","venue":"Int. J. Adv. Intell. Paradigms","volume":"7","number":"3/4","pages":"342-351","year":"2015","type":"Journal Articles","access":"closed","key":"journals/ijaip/ArunS15","doi":"10.1504/IJAIP.2015.073709","ee":"https://doi.org/10.1504/IJAIP.2015.073709","url":"https://dblp.org/rec/journals/ijaip/ArunS15"}, "url":"URL#3431063" }, { "@score":"1", "@id":"3431064", "info":{"authors":{"author":[{"@pid":"174/2689","text":"Sreeja Ashok"},{"@pid":"05/1979","text":"M. V. Judy"}]},"title":"A novel iterative partitioning approach for building prime clusters.","venue":"Int. J. Adv. Intell. Paradigms","volume":"7","number":"3/4","pages":"313-325","year":"2015","type":"Journal Articles","access":"closed","key":"journals/ijaip/AshokJ15","doi":"10.1504/IJAIP.2015.073712","ee":"https://doi.org/10.1504/IJAIP.2015.073712","url":"https://dblp.org/rec/journals/ijaip/AshokJ15"}, "url":"URL#3431064" }, { "@score":"1", "@id":"3431065", "info":{"authors":{"author":[{"@pid":"174/2716","text":"K. Chakrapani"},{"@pid":"166/0530","text":"P. Neelamegam"}]},"title":"Reconfigurable wrapper architecture for UART CORE testing using FSM approach.","venue":"Int. J. Adv. Intell. Paradigms","volume":"7","number":"3/4","pages":"326-341","year":"2015","type":"Journal Articles","access":"closed","key":"journals/ijaip/ChakrapaniN15","doi":"10.1504/IJAIP.2015.073713","ee":"https://doi.org/10.1504/IJAIP.2015.073713","url":"https://dblp.org/rec/journals/ijaip/ChakrapaniN15"}, "url":"URL#3431065" }, { "@score":"1", "@id":"3431066", "info":{"authors":{"author":[{"@pid":"174/3071","text":"Anita Christaline Johnvictor"},{"@pid":"16/7025-4","text":"R. Ramesh 0004"},{"@pid":"174/2785","text":"D. Vaishali"}]},"title":"Critical review of image steganalysis techniques.","venue":"Int. J. Adv. Intell. Paradigms","volume":"7","number":"3/4","pages":"368-381","year":"2015","type":"Journal Articles","access":"closed","key":"journals/ijaip/ChristalineRV15","doi":"10.1504/IJAIP.2015.073715","ee":"https://doi.org/10.1504/IJAIP.2015.073715","url":"https://dblp.org/rec/journals/ijaip/ChristalineRV15"}, "url":"URL#3431066" }, { "@score":"1", "@id":"3431067", "info":{"authors":{"author":[{"@pid":"174/3044","text":"R. Ezhilarasie"},{"@pid":"171/2566","text":"Umamakeswari Arumugam"},{"@pid":"174/2701","text":"T. Renugadevi"}]},"title":"Key management schemes in wireless sensor networks: a survey.","venue":"Int. J. Adv. Intell. Paradigms","volume":"7","number":"3/4","pages":"222-239","year":"2015","type":"Journal Articles","access":"closed","key":"journals/ijaip/EzhilarasieUR15","doi":"10.1504/IJAIP.2015.073699","ee":"https://doi.org/10.1504/IJAIP.2015.073699","url":"https://dblp.org/rec/journals/ijaip/EzhilarasieUR15"}, "url":"URL#3431067" }, { "@score":"1", "@id":"3431068", "info":{"authors":{"author":[{"@pid":"174/2629","text":"Booma Govindaram"},{"@pid":"171/2566","text":"A. Umamakeswari"}]},"title":"An autonomous approach for efficient landmine detection and marking using high sensitive robot.","venue":"Int. J. Adv. Intell. Paradigms","volume":"7","number":"3/4","pages":"280-291","year":"2015","type":"Journal Articles","access":"closed","key":"journals/ijaip/GovindaramU15","doi":"10.1504/IJAIP.2015.073710","ee":"https://doi.org/10.1504/IJAIP.2015.073710","url":"https://dblp.org/rec/journals/ijaip/GovindaramU15"}, "url":"URL#3431068" }, { "@score":"1", "@id":"3431069", "info":{"authors":{"author":[{"@pid":"165/8436","text":"Danial Hooshyar"},{"@pid":"161/4400","text":"Rodina Binti Ahmad"},{"@pid":"162/4430","text":"Mohd Hairul Nizam Md. Nasir"},{"@pid":"81/11074","text":"Shahaboddin Shamshirband"},{"@pid":"22/5429","text":"Shi-Jinn Horng"}]},"title":"Flowchart-based programming environments for improving comprehension and problem-solving skill of novice programmers: a survey.","venue":"Int. J. Adv. Intell. Paradigms","volume":"7","number":"1","pages":"24-56","year":"2015","type":"Journal Articles","access":"closed","key":"journals/ijaip/HooshyarANSH15","doi":"10.1504/IJAIP.2015.070343","ee":"https://doi.org/10.1504/IJAIP.2015.070343","url":"https://dblp.org/rec/journals/ijaip/HooshyarANSH15"}, "url":"URL#3431069" }, { "@score":"1", "@id":"3431070", "info":{"authors":{"author":[{"@pid":"44/9688","text":"Leena Jain"},{"@pid":"174/2840","text":"Prateek Agrawal"}]},"title":"Text independent root word identification in Hindi language using natural language processing.","venue":"Int. J. Adv. Intell. Paradigms","volume":"7","number":"3/4","pages":"240-249","year":"2015","type":"Journal Articles","access":"closed","key":"journals/ijaip/JainA15","doi":"10.1504/IJAIP.2015.073705","ee":"https://doi.org/10.1504/IJAIP.2015.073705","url":"https://dblp.org/rec/journals/ijaip/JainA15"}, "url":"URL#3431070" }, { "@score":"1", "@id":"3431071", "info":{"authors":{"author":[{"@pid":"174/2841","text":"B. Kalasagar"},{"@pid":"31/9943","text":"B. Arunachalam"},{"@pid":"83/9944","text":"Vineeth Simon Arackal"},{"@pid":"39/637","text":"B. B. Prahlada Rao"}]},"title":"Grid portal with compiler service, advanced reservation QoS and job management using mobile services.","venue":"Int. J. Adv. Intell. Paradigms","volume":"7","number":"3/4","pages":"250-263","year":"2015","type":"Journal Articles","access":"closed","key":"journals/ijaip/KalasagarAAR15","doi":"10.1504/IJAIP.2015.073706","ee":"https://doi.org/10.1504/IJAIP.2015.073706","url":"https://dblp.org/rec/journals/ijaip/KalasagarAAR15"}, "url":"URL#3431071" }, { "@score":"1", "@id":"3431072", "info":{"authors":{"author":[{"@pid":"39/10603","text":"V. Kannan"},{"@pid":"37/531","text":"S. Arunkumar"},{"@pid":"174/2991","text":"Muniyandi Venkatesan"}]},"title":"Artificial neural network-based temperature prediction in heat sinks with cross cuts fins.","venue":"Int. J. Adv. Intell. Paradigms","volume":"7","number":"3/4","pages":"292-301","year":"2015","type":"Journal Articles","access":"closed","key":"journals/ijaip/KannanAV15","doi":"10.1504/IJAIP.2015.073708","ee":"https://doi.org/10.1504/IJAIP.2015.073708","url":"https://dblp.org/rec/journals/ijaip/KannanAV15"}, "url":"URL#3431072" }, { "@score":"1", "@id":"3431073", "info":{"authors":{"author":[{"@pid":"165/8435","text":"Balasubramanian Vinoth Kumar"},{"@pid":"165/8469","text":"Manavalan Karpagam"}]},"title":"Differential evolution versus genetic algorithm in optimising the quantisation table for JPEG baseline algorithm.","venue":"Int. J. Adv. Intell. Paradigms","volume":"7","number":"2","pages":"111-135","year":"2015","type":"Journal Articles","access":"closed","key":"journals/ijaip/KumarK15","doi":"10.1504/IJAIP.2015.070766","ee":"https://doi.org/10.1504/IJAIP.2015.070766","url":"https://dblp.org/rec/journals/ijaip/KumarK15"}, "url":"URL#3431073" }, { "@score":"1", "@id":"3431074", "info":{"authors":{"author":[{"@pid":"05/8170","text":"Daniela López De Luise"},{"@pid":"135/3286","text":"Lucas Martín Rancez"},{"@pid":"135/3274","text":"Nelson Biedma"},{"@pid":"165/8445","text":"Bernardo De Elía"}]},"title":"A conscious model for autonomous robotics: statistical evaluation.","venue":"Int. J. Adv. Intell. Paradigms","volume":"7","number":"1","pages":"82-107","year":"2015","type":"Journal Articles","access":"closed","key":"journals/ijaip/LuiseRBE15","doi":"10.1504/IJAIP.2015.070331","ee":"https://doi.org/10.1504/IJAIP.2015.070331","url":"https://dblp.org/rec/journals/ijaip/LuiseRBE15"}, "url":"URL#3431074" }, { "@score":"1", "@id":"3431075", "info":{"authors":{"author":[{"@pid":"122/1611","text":"N. Rajesh"},{"@pid":"72/7804","text":"A. Arul Lawrence Selvakumar"}]},"title":"Hiding personalised anonymity of attributes using privacy preserving data mining.","venue":"Int. J. Adv. Intell. Paradigms","volume":"7","number":"3/4","pages":"394-402","year":"2015","type":"Journal Articles","access":"closed","key":"journals/ijaip/RajeshS15","doi":"10.1504/IJAIP.2015.073717","ee":"https://doi.org/10.1504/IJAIP.2015.073717","url":"https://dblp.org/rec/journals/ijaip/RajeshS15"}, "url":"URL#3431075" }, { "@score":"1", "@id":"3431076", "info":{"authors":{"author":[{"@pid":"165/8443","text":"M. S. Sangeetha"},{"@pid":"54/8329","text":"N. M. Nandhitha"}]},"title":"Impact of distance on the hotspot temperature in thermal image for condition monitoring of UPS switchbox.","venue":"Int. J. Adv. Intell. Paradigms","volume":"7","number":"1","pages":"74-81","year":"2015","type":"Journal Articles","access":"closed","key":"journals/ijaip/SangeethaN15","doi":"10.1504/IJAIP.2015.070350","ee":"https://doi.org/10.1504/IJAIP.2015.070350","url":"https://dblp.org/rec/journals/ijaip/SangeethaN15"}, "url":"URL#3431076" }, { "@score":"1", "@id":"3431077", "info":{"authors":{"author":[{"@pid":"137/0747","text":"Shahnawaz"},{"@pid":"86/1305","text":"R. B. Mishra"}]},"title":"An English to Urdu translation model based on CBR, ANN and translation rules.","venue":"Int. J. Adv. Intell. Paradigms","volume":"7","number":"1","pages":"1-23","year":"2015","type":"Journal Articles","access":"closed","key":"journals/ijaip/ShahnawazM15","doi":"10.1504/IJAIP.2015.070335","ee":"https://doi.org/10.1504/IJAIP.2015.070335","url":"https://dblp.org/rec/journals/ijaip/ShahnawazM15"}, "url":"URL#3431077" }, { "@score":"1", "@id":"3431078", "info":{"authors":{"author":[{"@pid":"198/4011","text":"Shriram K. Vasudevan"},{"@pid":"138/1074","text":"P. L. K. Priyadarsini"},{"@pid":"168/3231","text":"A. Baskar"}]},"title":"An intelligent system of content-based image retrieval for crime investigation.","venue":"Int. J. Adv. Intell. Paradigms","volume":"7","number":"3/4","pages":"264-279","year":"2015","type":"Journal Articles","access":"closed","key":"journals/ijaip/ShriramPB15","doi":"10.1504/IJAIP.2015.073707","ee":"https://doi.org/10.1504/IJAIP.2015.073707","url":"https://dblp.org/rec/journals/ijaip/ShriramPB15"}, "url":"URL#3431078" }, { "@score":"1", "@id":"3431079", "info":{"authors":{"author":[{"@pid":"165/8446","text":"P. Eben Sophia"},{"@pid":"30/8436","text":"J. Anitha 0001"}]},"title":"A systematic review on advances and perspectives of image compression in telemedicine.","venue":"Int. J. Adv. Intell. Paradigms","volume":"7","number":"2","pages":"136-155","year":"2015","type":"Journal Articles","access":"closed","key":"journals/ijaip/SophiaA15","doi":"10.1504/IJAIP.2015.070768","ee":"https://doi.org/10.1504/IJAIP.2015.070768","url":"https://dblp.org/rec/journals/ijaip/SophiaA15"}, "url":"URL#3431079" }, { "@score":"1", "@id":"3431080", "info":{"authors":{"author":[{"@pid":"158/5857","text":"P. Suja"},{"@pid":"38/227","text":"Shikha Tripathi"}]},"title":"Analysis of emotion recognition from facial expressions using spatial and transform domain methods.","venue":"Int. J. Adv. Intell. Paradigms","volume":"7","number":"1","pages":"57-73","year":"2015","type":"Journal Articles","access":"closed","key":"journals/ijaip/SujaT15","doi":"10.1504/IJAIP.2015.070349","ee":"https://doi.org/10.1504/IJAIP.2015.070349","url":"https://dblp.org/rec/journals/ijaip/SujaT15"}, "url":"URL#3431080" }, { "@score":"1", "@id":"3431081", "info":{"authors":{"author":{"@pid":"170/3966","text":"Alagirisamy Kamatchi Subbiah Sukumaran"}},"title":"Consumer-based brand equity and purchase decision of Indian gold jewellery.","venue":"Int. J. Adv. Intell. Paradigms","volume":"7","number":"3/4","pages":"382-393","year":"2015","type":"Journal Articles","access":"closed","key":"journals/ijaip/Sukumaran15","doi":"10.1504/IJAIP.2015.073716","ee":"https://doi.org/10.1504/IJAIP.2015.073716","url":"https://dblp.org/rec/journals/ijaip/Sukumaran15"}, "url":"URL#3431081" }, { "@score":"1", "@id":"3431082", "info":{"authors":{"author":[{"@pid":"174/3073","text":"D. Vijay"},{"@pid":"174/2889","text":"T. K. Kandavel"}]},"title":"Application of artificial neural network on wear properties of sinter-forged Fe-C-Mo low alloy steel.","venue":"Int. J. Adv. Intell. Paradigms","volume":"7","number":"3/4","pages":"209-221","year":"2015","type":"Journal Articles","access":"closed","key":"journals/ijaip/VijayK15","doi":"10.1504/IJAIP.2015.073698","ee":"https://doi.org/10.1504/IJAIP.2015.073698","url":"https://dblp.org/rec/journals/ijaip/VijayK15"}, "url":"URL#3431082" }, { "@score":"1", "@id":"3732882", "info":{"authors":{"author":[{"@pid":"37/9609","text":"Ayoub Alsarhan"},{"@pid":"26/8338","text":"Khalid T. Al-Sarayreh"},{"@pid":"154/1830","text":"Abdel-Rahman Al-Ghuwairi"},{"@pid":"12/686","text":"Yousef Kilani"}]},"title":"Resource trading in cloud environments for profit maximisation using an auction model.","venue":"Int. J. Adv. Intell. Paradigms","volume":"6","number":"3","pages":"176-190","year":"2014","type":"Journal Articles","access":"closed","key":"journals/ijaip/AlsarhanAAK14","doi":"10.1504/IJAIP.2014.065218","ee":"https://doi.org/10.1504/IJAIP.2014.065218","url":"https://dblp.org/rec/journals/ijaip/AlsarhanAAK14"}, "url":"URL#3732882" }, { "@score":"1", "@id":"3732883", "info":{"authors":{"author":[{"@pid":"196/6418","text":"S. Bharathi"},{"@pid":"21/2046","text":"R. Sudhakar 0001"},{"@pid":"28/2665","text":"Valentina Emilia Balas"}]},"title":"Biometric recognition using fuzzy score level fusion.","venue":"Int. J. Adv. Intell. Paradigms","volume":"6","number":"2","pages":"81-94","year":"2014","type":"Journal Articles","access":"closed","key":"journals/ijaip/BharathiSB14","doi":"10.1504/IJAIP.2014.062169","ee":"https://doi.org/10.1504/IJAIP.2014.062169","url":"https://dblp.org/rec/journals/ijaip/BharathiSB14"}, "url":"URL#3732883" }, { "@score":"1", "@id":"3732884", "info":{"authors":{"author":[{"@pid":"128/7611","text":"Saroj K. Biswas 0001"},{"@pid":"65/632","text":"Nidul Sinha"},{"@pid":"74/1071","text":"Biswajit Purkayastha"}]},"title":"A review on fundamentals of case-based reasoning and its recent application in different domains.","venue":"Int. J. Adv. Intell. Paradigms","volume":"6","number":"3","pages":"235-254","year":"2014","type":"Journal Articles","access":"closed","key":"journals/ijaip/BiswasSP14","doi":"10.1504/IJAIP.2014.065235","ee":"https://doi.org/10.1504/IJAIP.2014.065235","url":"https://dblp.org/rec/journals/ijaip/BiswasSP14"}, "url":"URL#3732884" }, { "@score":"1", "@id":"3732885", "info":{"authors":{"author":[{"@pid":"47/1424","text":"Tien Van Do 0001"},{"@pid":"143/6694","text":"Dénes Papp"},{"@pid":"18/4261","text":"Ram Chakka"},{"@pid":"35/5983","text":"János Sztrik"},{"@pid":"78/2860","text":"Jinting Wang"}]},"title":"M/M/1 retrial queue with working vacations and negative customer arrivals.","venue":"Int. J. Adv. Intell. Paradigms","volume":"6","number":"1","pages":"52-65","year":"2014","type":"Journal Articles","access":"closed","key":"journals/ijaip/DoPCSW14","doi":"10.1504/IJAIP.2014.059586","ee":"https://doi.org/10.1504/IJAIP.2014.059586","url":"https://dblp.org/rec/journals/ijaip/DoPCSW14"}, "url":"URL#3732885" }, { "@score":"1", "@id":"3732886", "info":{"authors":{"author":[{"@pid":"129/0866","text":"Baijnath Kaushik"},{"@pid":"69/1774","text":"Haider Banka"}]},"title":"Approach for improving reliability in optimal network design.","venue":"Int. J. Adv. Intell. Paradigms","volume":"6","number":"3","pages":"157-175","year":"2014","type":"Journal Articles","access":"closed","key":"journals/ijaip/KaushikB14","doi":"10.1504/IJAIP.2014.065219","ee":"https://doi.org/10.1504/IJAIP.2014.065219","url":"https://dblp.org/rec/journals/ijaip/KaushikB14"}, "url":"URL#3732886" }, { "@score":"1", "@id":"3732887", "info":{"authors":{"author":{"@pid":"52/5818","text":"Haseong Kim"}},"title":"Modelling and analysis of gene regulatory networks based on the G-network.","venue":"Int. J. Adv. Intell. Paradigms","volume":"6","number":"1","pages":"28-51","year":"2014","type":"Journal Articles","access":"closed","key":"journals/ijaip/Kim14","doi":"10.1504/IJAIP.2014.059585","ee":"https://doi.org/10.1504/IJAIP.2014.059585","url":"https://dblp.org/rec/journals/ijaip/Kim14"}, "url":"URL#3732887" }, { "@score":"1", "@id":"3732888", "info":{"authors":{"author":[{"@pid":"66/11293","text":"Shruti Kohli"},{"@pid":"65/2886-4","text":"Ankit Gupta 0004"}]},"title":"Fuzzy information retrieval in WWW: a survey.","venue":"Int. J. Adv. Intell. Paradigms","volume":"6","number":"4","pages":"272-311","year":"2014","type":"Journal Articles","access":"closed","key":"journals/ijaip/KohliG14","doi":"10.1504/IJAIP.2014.066984","ee":"https://doi.org/10.1504/IJAIP.2014.066984","url":"https://dblp.org/rec/journals/ijaip/KohliG14"}, "url":"URL#3732888" }, { "@score":"1", "@id":"3732889", "info":{"authors":{"author":[{"@pid":"51/1891","text":"Ricardo Lent"},{"@pid":"43/689","text":"Georgia Sakellari"},{"@pid":"40/2991","text":"George Loukas"}]},"title":"Strengthening the security of cognitive packet networks.","venue":"Int. J. Adv. Intell. Paradigms","volume":"6","number":"1","pages":"14-27","year":"2014","type":"Journal Articles","access":"closed","key":"journals/ijaip/LentSL14","doi":"10.1504/IJAIP.2014.059584","ee":"https://doi.org/10.1504/IJAIP.2014.059584","url":"https://dblp.org/rec/journals/ijaip/LentSL14"}, "url":"URL#3732889" }, { "@score":"1", "@id":"3732890", "info":{"authors":{"author":[{"@pid":"77/8059","text":"Kamilia Menghour"},{"@pid":"s/LabibaSouici","text":"Labiba Souici-Meslati"}]},"title":"Classical and swarm-based approaches for feature selection in spam filtering.","venue":"Int. J. Adv. Intell. Paradigms","volume":"6","number":"3","pages":"214-234","year":"2014","type":"Journal Articles","access":"closed","key":"journals/ijaip/MenghourS14","doi":"10.1504/IJAIP.2014.065225","ee":"https://doi.org/10.1504/IJAIP.2014.065225","url":"https://dblp.org/rec/journals/ijaip/MenghourS14"}, "url":"URL#3732890" }, { "@score":"1", "@id":"3732891", "info":{"authors":{"author":[{"@pid":"147/9068","text":"Chandra Sekhar Mohanty"},{"@pid":"137/0753","text":"Partha Sarathi Khuntia"},{"@pid":"33/3784","text":"Debjani Mitra"}]},"title":"A modified bacterial foraging optimised PID controller for time delay systems.","venue":"Int. J. Adv. Intell. Paradigms","volume":"6","number":"4","pages":"255-271","year":"2014","type":"Journal Articles","access":"closed","key":"journals/ijaip/MohantyKM14","doi":"10.1504/IJAIP.2014.066982","ee":"https://doi.org/10.1504/IJAIP.2014.066982","url":"https://dblp.org/rec/journals/ijaip/MohantyKM14"}, "url":"URL#3732891" }, { "@score":"1", "@id":"3732892", "info":{"authors":{"author":[{"@pid":"84/6755","text":"Loris Nanni"},{"@pid":"l/AlessandraLumini","text":"Alessandra Lumini"},{"@pid":"48/3061","text":"Sheryl Brahnam"}]},"title":"Ensemble of shape descriptors for shape retrieval and classification.","venue":"Int. J. Adv. Intell. Paradigms","volume":"6","number":"2","pages":"136-156","year":"2014","type":"Journal Articles","access":"closed","key":"journals/ijaip/NanniLB14","doi":"10.1504/IJAIP.2014.062177","ee":"https://doi.org/10.1504/IJAIP.2014.062177","url":"https://dblp.org/rec/journals/ijaip/NanniLB14"}, "url":"URL#3732892" }, { "@score":"1", "@id":"3732893", "info":{"authors":{"author":[{"@pid":"158/8802","text":"Swathi Jamjala Narayanan"},{"@pid":"b/RajenBBhatt","text":"Rajen B. Bhatt"},{"@pid":"158/8696","text":"Ilango Paramasivam"},{"@pid":"40/6692","text":"M. Khalid"},{"@pid":"92/3463","text":"B. K. Tripathy 0001"}]},"title":"Induction of fuzzy decision trees and its refinement using gradient projected-neuro-fuzzy decision tree.","venue":"Int. J. Adv. Intell. Paradigms","volume":"6","number":"4","pages":"346-369","year":"2014","type":"Journal Articles","access":"closed","key":"journals/ijaip/NarayananBPKT14","doi":"10.1504/IJAIP.2014.066983","ee":"https://doi.org/10.1504/IJAIP.2014.066983","url":"https://dblp.org/rec/journals/ijaip/NarayananBPKT14"}, "url":"URL#3732893" }, { "@score":"1", "@id":"3732894", "info":{"authors":{"author":{"@pid":"81/4373","text":"Erivelton Geraldo Nepomuceno"}},"title":"Multiobjective learning in the random neural network.","venue":"Int. J. Adv. Intell. Paradigms","volume":"6","number":"1","pages":"66-80","year":"2014","type":"Journal Articles","access":"closed","key":"journals/ijaip/Nepomuceno14","doi":"10.1504/IJAIP.2014.059588","ee":"https://doi.org/10.1504/IJAIP.2014.059588","url":"https://dblp.org/rec/journals/ijaip/Nepomuceno14"}, "url":"URL#3732894" }, { "@score":"1", "@id":"3732895", "info":{"authors":{"author":[{"@pid":"78/1666","text":"Ahmed Fawzi Otoom"},{"@pid":"95/9115","text":"Emad E. Abdallah"},{"@pid":"04/5891","text":"Maen Hammad"},{"@pid":"84/8665","text":"Mohammad Bsoul"},{"@pid":"31/2888","text":"Alaa Eddien Abdallah"}]},"title":"An intelligent system for author attribution based on a hybrid feature set.","venue":"Int. J. Adv. Intell. Paradigms","volume":"6","number":"4","pages":"328-345","year":"2014","type":"Journal Articles","access":"closed","key":"journals/ijaip/OtoomAHBA14","doi":"10.1504/IJAIP.2014.066986","ee":"https://doi.org/10.1504/IJAIP.2014.066986","url":"https://dblp.org/rec/journals/ijaip/OtoomAHBA14"}, "url":"URL#3732895" }, { "@score":"1", "@id":"3732896", "info":{"authors":{"author":[{"@pid":"146/7939","text":"Anju Pratap"},{"@pid":"146/7917","text":"C. S. Kanimozhiselvi"}]},"title":"Predictive assessment of autism using unsupervised machine learning models.","venue":"Int. J. Adv. Intell. Paradigms","volume":"6","number":"2","pages":"113-121","year":"2014","type":"Journal Articles","access":"closed","key":"journals/ijaip/PratapK14","doi":"10.1504/IJAIP.2014.062174","ee":"https://doi.org/10.1504/IJAIP.2014.062174","url":"https://dblp.org/rec/journals/ijaip/PratapK14"}, "url":"URL#3732896" }, { "@score":"1", "@id":"3732897", "info":{"authors":{"author":[{"@pid":"02/1540","text":"Anca L. Ralescu"},{"@pid":"143/6695","text":"Mengxia Wang"},{"@pid":"143/6734","text":"Shikha Chaganti"},{"@pid":"38/6008","text":"Qiang Han"}]},"title":"A dynamic P300-based BCI speller using a language model.","venue":"Int. J. Adv. Intell. Paradigms","volume":"6","number":"1","pages":"1-13","year":"2014","type":"Journal Articles","access":"closed","key":"journals/ijaip/RalescuWCH14","doi":"10.1504/IJAIP.2014.059587","ee":"https://doi.org/10.1504/IJAIP.2014.059587","url":"https://dblp.org/rec/journals/ijaip/RalescuWCH14"}, "url":"URL#3732897" }, { "@score":"1", "@id":"3732898", "info":{"authors":{"author":[{"@pid":"137/4950","text":"Rubén Octavio Vélez Salazar"},{"@pid":"154/1780","text":"José Ramón Enrique Arrazola-Ramírez"},{"@pid":"154/1917","text":"Iván Martínez Ruiz"}]},"title":"Semantics for some non-classical possibilistic logics.","venue":"Int. J. Adv. Intell. Paradigms","volume":"6","number":"3","pages":"191-213","year":"2014","type":"Journal Articles","access":"closed","key":"journals/ijaip/SalazarAR14","doi":"10.1504/IJAIP.2014.065224","ee":"https://doi.org/10.1504/IJAIP.2014.065224","url":"https://dblp.org/rec/journals/ijaip/SalazarAR14"}, "url":"URL#3732898" }, { "@score":"1", "@id":"3732899", "info":{"authors":{"author":[{"@pid":"59/7796-1","text":"S. Sangeetha 0001"},{"@pid":"54/2426","text":"Michael Arock"}]},"title":"Event extraction from corefering mentions to enrich semantic web metadata.","venue":"Int. J. Adv. Intell. Paradigms","volume":"6","number":"2","pages":"95-112","year":"2014","type":"Journal Articles","access":"closed","key":"journals/ijaip/SangeethaA14","doi":"10.1504/IJAIP.2014.062172","ee":"https://doi.org/10.1504/IJAIP.2014.062172","url":"https://dblp.org/rec/journals/ijaip/SangeethaA14"}, "url":"URL#3732899" }, { "@score":"1", "@id":"3732900", "info":{"authors":{"author":[{"@pid":"51/8061","text":"Anwar Ali Yahya"},{"@pid":"158/8686","text":"Mohammad Said El Bashir"}]},"title":"Applying machine learning to analyse teachers' instructional questions.","venue":"Int. J. Adv. Intell. Paradigms","volume":"6","number":"4","pages":"312-327","year":"2014","type":"Journal Articles","access":"closed","key":"journals/ijaip/YahyaB14","doi":"10.1504/IJAIP.2014.066985","ee":"https://doi.org/10.1504/IJAIP.2014.066985","url":"https://dblp.org/rec/journals/ijaip/YahyaB14"}, "url":"URL#3732900" }, { "@score":"1", "@id":"3732901", "info":{"authors":{"author":[{"@pid":"83/3792","text":"V. Yegnanarayanan"},{"@pid":"28/2665","text":"Valentina Emilia Balas"},{"@pid":"146/7919","text":"G. Chitra"}]},"title":"On certain graph domination numbers and applications.","venue":"Int. J. Adv. Intell. Paradigms","volume":"6","number":"2","pages":"122-135","year":"2014","type":"Journal Articles","access":"closed","key":"journals/ijaip/YegnanarayananBC14","doi":"10.1504/IJAIP.2014.062176","ee":"https://doi.org/10.1504/IJAIP.2014.062176","url":"https://dblp.org/rec/journals/ijaip/YegnanarayananBC14"}, "url":"URL#3732901" }, { "@score":"1", "@id":"4023762", "info":{"authors":{"author":[{"@pid":"135/0429","text":"S. Shuaib Ahmed"},{"@pid":"143/1879","text":"B. Purna Chandra Rao"},{"@pid":"87/8914","text":"T. Jayakumar"}]},"title":"A framework for multidimensional learning using multilabel ranking.","venue":"Int. J. Adv. Intell. Paradigms","volume":"5","number":"4","pages":"299-318","year":"2013","type":"Journal Articles","access":"closed","key":"journals/ijaip/AhmedRJ13","doi":"10.1504/IJAIP.2013.058301","ee":"https://doi.org/10.1504/IJAIP.2013.058301","url":"https://dblp.org/rec/journals/ijaip/AhmedRJ13"}, "url":"URL#4023762" }, { "@score":"1", "@id":"4023763", "info":{"authors":{"author":[{"@pid":"78/8613","text":"Danni Ai"},{"@pid":"66/9044","text":"Mohammad Khazab"},{"@pid":"22/6113","text":"Jeffrey W. Tweedale"},{"@pid":"j/LakhmiCJain","text":"Lakhmi C. Jain"},{"@pid":"55/1008-1","text":"Yen-Wei Chen 0001"}]},"title":"A multi-agent system architecture to classify colour images.","venue":"Int. J. Adv. Intell. Paradigms","volume":"5","number":"4","pages":"284-298","year":"2013","type":"Journal Articles","access":"closed","key":"journals/ijaip/AiKTJC13","doi":"10.1504/IJAIP.2013.058304","ee":"https://doi.org/10.1504/IJAIP.2013.058304","url":"https://dblp.org/rec/journals/ijaip/AiKTJC13"}, "url":"URL#4023763" }, { "@score":"1", "@id":"4023764", "info":{"authors":{"author":[{"@pid":"13/6820","text":"Hema Banati"},{"@pid":"16/1180","text":"Shikha Mehta"}]},"title":"Improved shuffled frog leaping algorithm for continuous optimisation adapted SEVO toolbox.","venue":"Int. J. Adv. Intell. Paradigms","volume":"5","number":"1/2","pages":"31-44","year":"2013","type":"Journal Articles","access":"closed","key":"journals/ijaip/BanatiM13","doi":"10.1504/IJAIP.2013.054670","ee":"https://doi.org/10.1504/IJAIP.2013.054670","url":"https://dblp.org/rec/journals/ijaip/BanatiM13"}, "url":"URL#4023764" }, { "@score":"1", "@id":"4023765", "info":{"authors":{"author":[{"@pid":"70/238","text":"Jagdish Chand Bansal"},{"@pid":"26/10537","text":"Harish Sharma"},{"@pid":"30/10620","text":"Shimpi Singh Jadon"}]},"title":"Artificial bee colony algorithm: a survey.","venue":"Int. J. Adv. Intell. Paradigms","volume":"5","number":"1/2","pages":"123-159","year":"2013","type":"Journal Articles","access":"closed","key":"journals/ijaip/BansalSJ13","doi":"10.1504/IJAIP.2013.054681","ee":"https://doi.org/10.1504/IJAIP.2013.054681","url":"https://dblp.org/rec/journals/ijaip/BansalSJ13"}, "url":"URL#4023765" }, { "@score":"1", "@id":"4023766", "info":{"authors":{"author":[{"@pid":"99/6844","text":"Subhagata Chattopadhyay"},{"@pid":"98/1000","text":"Farhad Daneshgar"}]},"title":"An awareness net collaborative model for schizophrenia management.","venue":"Int. J. Adv. Intell. Paradigms","volume":"5","number":"3","pages":"217-232","year":"2013","type":"Journal Articles","access":"closed","key":"journals/ijaip/ChattopadhyayD13","doi":"10.1504/IJAIP.2013.056429","ee":"https://doi.org/10.1504/IJAIP.2013.056429","url":"https://dblp.org/rec/journals/ijaip/ChattopadhyayD13"}, "url":"URL#4023766" }, { "@score":"1", "@id":"4023767", "info":{"authors":{"author":[{"@pid":"92/3740","text":"Akila Djebbar"},{"@pid":"67/291","text":"Hayet Farida Merouani"}]},"title":"Optimising retrieval phase in CBR through Pearl and JLO algorithms for medical diagnosis.","venue":"Int. J. Adv. Intell. Paradigms","volume":"5","number":"3","pages":"161-181","year":"2013","type":"Journal Articles","access":"closed","key":"journals/ijaip/DjebbarM13","doi":"10.1504/IJAIP.2013.056420","ee":"https://doi.org/10.1504/IJAIP.2013.056420","url":"https://dblp.org/rec/journals/ijaip/DjebbarM13"}, "url":"URL#4023767" }, { "@score":"1", "@id":"4023768", "info":{"authors":{"author":[{"@pid":"91/8945","text":"P. C. Jha 0001"},{"@pid":"118/6943","text":"Prerna Manik"},{"@pid":"37/8945","text":"Anshu Gupta"}]},"title":"Dynamic promotional allocation for multi-products in segmented market under first and repeat purchase behaviour.","venue":"Int. J. Adv. Intell. Paradigms","volume":"5","number":"1/2","pages":"83-102","year":"2013","type":"Journal Articles","access":"closed","key":"journals/ijaip/JhaMG13","doi":"10.1504/IJAIP.2013.054675","ee":"https://doi.org/10.1504/IJAIP.2013.054675","url":"https://dblp.org/rec/journals/ijaip/JhaMG13"}, "url":"URL#4023768" }, { "@score":"1", "@id":"4023769", "info":{"authors":{"author":[{"@pid":"12/686","text":"Yousef Kilani"},{"@pid":"84/8665","text":"Mohammad Bsoul"},{"@pid":"37/9609","text":"Ayoub Alsarhan"},{"@pid":"86/3010","text":"Ahmad Al-Khasawneh"}]},"title":"A survey of the satisfiability-problems solving algorithms.","venue":"Int. J. Adv. Intell. Paradigms","volume":"5","number":"3","pages":"233-256","year":"2013","type":"Journal Articles","access":"closed","key":"journals/ijaip/KilaniBAA13","doi":"10.1504/IJAIP.2013.056447","ee":"https://doi.org/10.1504/IJAIP.2013.056447","url":"https://dblp.org/rec/journals/ijaip/KilaniBAA13"}, "url":"URL#4023769" }, { "@score":"1", "@id":"4023770", "info":{"authors":{"author":[{"@pid":"35/6259","text":"Brijesh Kumar"},{"@pid":"93/742","text":"Brajesh Kumar Kaushik"},{"@pid":"118/7139","text":"Yuvraj Singh Negi"}]},"title":"Analysis of electrode thickness variation on performance parameters of polymer thin film transistors using device simulation.","venue":"Int. J. Adv. Intell. Paradigms","volume":"5","number":"1/2","pages":"3-15","year":"2013","type":"Journal Articles","access":"closed","key":"journals/ijaip/KumarKN13","doi":"10.1504/IJAIP.2013.054667","ee":"https://doi.org/10.1504/IJAIP.2013.054667","url":"https://dblp.org/rec/journals/ijaip/KumarKN13"}, "url":"URL#4023770" }, { "@score":"1", "@id":"4023771", "info":{"authors":{"author":[{"@pid":"46/3752","text":"C. Mala"},{"@pid":"118/7134","text":"A. Gokul"},{"@pid":"118/7076","text":"Anand Babu"},{"@pid":"118/6911","text":"R. Kalyanasundaram"},{"@pid":"52/9569","text":"Narendran Rajagopalan"}]},"title":"Route discovery in cellular networks using soft computing techniques.","venue":"Int. J. Adv. Intell. Paradigms","volume":"5","number":"1/2","pages":"45-58","year":"2013","type":"Journal Articles","access":"closed","key":"journals/ijaip/MalaGBKR13","doi":"10.1504/IJAIP.2013.054672","ee":"https://doi.org/10.1504/IJAIP.2013.054672","url":"https://dblp.org/rec/journals/ijaip/MalaGBKR13"}, "url":"URL#4023771" }, { "@score":"1", "@id":"4023772", "info":{"authors":{"author":{"@pid":"42/6865","text":"Ioannis K. Nikolos"}},"title":"On the use of multiple surrogates within a differential evolution procedure for high-lift airfoil design.","venue":"Int. J. Adv. Intell. Paradigms","volume":"5","number":"4","pages":"319-341","year":"2013","type":"Journal Articles","access":"closed","key":"journals/ijaip/Nikolos13","doi":"10.1504/IJAIP.2013.058302","ee":"https://doi.org/10.1504/IJAIP.2013.058302","url":"https://dblp.org/rec/journals/ijaip/Nikolos13"}, "url":"URL#4023772" }, { "@score":"1", "@id":"4023773", "info":{"authors":{"author":[{"@pid":"122/3616","text":"Prashant Singh Rana"},{"@pid":"132/6635","text":"Sandeep Kumar Jain"},{"@pid":"46/2793","text":"Mahua Bhattacharya"},{"@pid":"13/3129","text":"Anupam Shukla"}]},"title":"Structure stability analysis of Nin(n = 2 - 22) using nature inspired algorithms: a performance study.","venue":"Int. J. Adv. Intell. Paradigms","volume":"5","number":"1/2","pages":"16-30","year":"2013","type":"Journal Articles","access":"closed","key":"journals/ijaip/RanaJBS13","doi":"10.1504/IJAIP.2013.054669","ee":"https://doi.org/10.1504/IJAIP.2013.054669","url":"https://dblp.org/rec/journals/ijaip/RanaJBS13"}, "url":"URL#4023773" }, { "@score":"1", "@id":"4023774", "info":{"authors":{"author":[{"@pid":"120/7383","text":"Elkebir Sarhrouni"},{"@pid":"90/5401","text":"Ahmed Hammouch"},{"@pid":"36/2531","text":"Driss Aboutajdine"}]},"title":"Feature selection intelligent algorithm with mutual information and steepest ascent strategy.","venue":"Int. J. Adv. Intell. Paradigms","volume":"5","number":"4","pages":"257-269","year":"2013","type":"Journal Articles","access":"closed","key":"journals/ijaip/SarhrouniHA13","doi":"10.1504/IJAIP.2013.058300","ee":"https://doi.org/10.1504/IJAIP.2013.058300","url":"https://dblp.org/rec/journals/ijaip/SarhrouniHA13"}, "url":"URL#4023774" }, { "@score":"1", "@id":"4023775", "info":{"authors":{"author":[{"@pid":"137/0747","text":"Shahnawaz"},{"@pid":"86/1305","text":"R. B. Mishra"}]},"title":"Statistical machine translation system for English to Urdu.","venue":"Int. J. Adv. Intell. Paradigms","volume":"5","number":"3","pages":"182-203","year":"2013","type":"Journal Articles","access":"closed","key":"journals/ijaip/ShahnawazM13","doi":"10.1504/IJAIP.2013.056421","ee":"https://doi.org/10.1504/IJAIP.2013.056421","url":"https://dblp.org/rec/journals/ijaip/ShahnawazM13"}, "url":"URL#4023775" }, { "@score":"1", "@id":"4023776", "info":{"authors":{"author":[{"@pid":"86/11292","text":"Richa Sharma"},{"@pid":"25/4147","text":"Punam Bedi"},{"@pid":"13/6820","text":"Hema Banati"}]},"title":"Stigmergic agent-based adaptive content sequencing in an e-learning environment.","venue":"Int. J. Adv. Intell. Paradigms","volume":"5","number":"1/2","pages":"59-82","year":"2013","type":"Journal Articles","access":"closed","key":"journals/ijaip/SharmaBB13","doi":"10.1504/IJAIP.2013.054673","ee":"https://doi.org/10.1504/IJAIP.2013.054673","url":"https://dblp.org/rec/journals/ijaip/SharmaBB13"}, "url":"URL#4023776" }, { "@score":"1", "@id":"4023777", "info":{"authors":{"author":[{"@pid":"09/9987","text":"Tarun Kumar Sharma"},{"@pid":"71/2100","text":"Millie Pant"}]},"title":"Enhancing different phases of artificial bee colony for continuous global optimisation problems.","venue":"Int. J. Adv. Intell. Paradigms","volume":"5","number":"1/2","pages":"103-122","year":"2013","type":"Journal Articles","access":"closed","key":"journals/ijaip/SharmaP13","doi":"10.1504/IJAIP.2013.054674","ee":"https://doi.org/10.1504/IJAIP.2013.054674","url":"https://dblp.org/rec/journals/ijaip/SharmaP13"}, "url":"URL#4023777" }, { "@score":"1", "@id":"4023778", "info":{"authors":{"author":[{"@pid":"137/0769","text":"Srinibash Swain"},{"@pid":"137/0753","text":"Partha Sarathi Khuntia"}]},"title":"Controlling the angle of attack of an aircraft using extended SIMC and other tuning rules.","venue":"Int. J. Adv. Intell. Paradigms","volume":"5","number":"3","pages":"204-216","year":"2013","type":"Journal Articles","access":"closed","key":"journals/ijaip/SwainK13","doi":"10.1504/IJAIP.2013.056422","ee":"https://doi.org/10.1504/IJAIP.2013.056422","url":"https://dblp.org/rec/journals/ijaip/SwainK13"}, "url":"URL#4023778" }, { "@score":"1", "@id":"4023779", "info":{"authors":{"author":[{"@pid":"121/0427","text":"Teréz A. Várkonyi"},{"@pid":"62/2731","text":"József K. Tar"},{"@pid":"77/1960","text":"Imre J. Rudas"}]},"title":"Improved neural network control of inverted pendulums.","venue":"Int. J. Adv. Intell. Paradigms","volume":"5","number":"4","pages":"270-283","year":"2013","type":"Journal Articles","access":"closed","key":"journals/ijaip/VarkonyiTR13","doi":"10.1504/IJAIP.2013.058303","ee":"https://doi.org/10.1504/IJAIP.2013.058303","url":"https://dblp.org/rec/journals/ijaip/VarkonyiTR13"}, "url":"URL#4023779" }, { "@score":"1", "@id":"4303752", "info":{"authors":{"author":[{"@pid":"89/5425","text":"S. Balasundaram"},{"@pid":"03/9444","text":"Muhammad Tanveer 0001"}]},"title":"On proximal bilateral-weighted fuzzy support vector machine classifiers.","venue":"Int. J. Adv. Intell. Paradigms","volume":"4","number":"3/4","pages":"199-210","year":"2012","type":"Journal Articles","access":"closed","key":"journals/ijaip/BalasundaramT12","doi":"10.1504/IJAIP.2012.052060","ee":"https://doi.org/10.1504/IJAIP.2012.052060","url":"https://dblp.org/rec/journals/ijaip/BalasundaramT12"}, "url":"URL#4303752" }, { "@score":"1", "@id":"4303753", "info":{"authors":{"author":{"@pid":"81/8918","text":"Xuwei Chen"}},"title":"Agent-based micro-simulation of staged evacuations.","venue":"Int. J. Adv. Intell. Paradigms","volume":"4","number":"1","pages":"22-35","year":"2012","type":"Journal Articles","access":"closed","key":"journals/ijaip/Chen12","doi":"10.1504/IJAIP.2012.046964","ee":"https://doi.org/10.1504/IJAIP.2012.046964","url":"https://dblp.org/rec/journals/ijaip/Chen12"}, "url":"URL#4303753" }, { "@score":"1", "@id":"4303754", "info":{"authors":{"author":[{"@pid":"87/7530","text":"Oscar Hernán Estrada-Estrada"},{"@pid":"47/5614","text":"José R. Arrazola Ramírez"},{"@pid":"o/MauricioOsorio","text":"Mauricio Javier Osorio Galindo"}]},"title":"Possibilistic intermediate logic.","venue":"Int. J. Adv. Intell. Paradigms","volume":"4","number":"2","pages":"149-167","year":"2012","type":"Journal Articles","access":"closed","key":"journals/ijaip/Estrada-EstradaRG12","doi":"10.1504/IJAIP.2012.048143","ee":"https://doi.org/10.1504/IJAIP.2012.048143","url":"https://dblp.org/rec/journals/ijaip/Estrada-EstradaRG12"}, "url":"URL#4303754" }, { "@score":"1", "@id":"4303755", "info":{"authors":{"author":[{"@pid":"05/10089","text":"Christopher E. Gillies"},{"@pid":"82/3707","text":"Nilesh V. Patel"},{"@pid":"126/6813","text":"Jan Akervall"},{"@pid":"58/10089","text":"George D. Wilson"}]},"title":"Gene expression classification using binary rule majority voting genetic programming classifier.","venue":"Int. J. Adv. Intell. Paradigms","volume":"4","number":"3/4","pages":"241-255","year":"2012","type":"Journal Articles","access":"closed","key":"journals/ijaip/GilliesPAW12","doi":"10.1504/IJAIP.2012.052068","ee":"https://doi.org/10.1504/IJAIP.2012.052068","url":"https://dblp.org/rec/journals/ijaip/GilliesPAW12"}, "url":"URL#4303755" }, { "@score":"1", "@id":"4303756", "info":{"authors":{"author":{"@pid":"97/4059","text":"Rafael A. González"}},"title":"Architecture of a discrete-event and agent-based crisis response simulation model.","venue":"Int. J. Adv. Intell. Paradigms","volume":"4","number":"1","pages":"36-53","year":"2012","type":"Journal Articles","access":"closed","key":"journals/ijaip/Gonzalez12","doi":"10.1504/IJAIP.2012.046965","ee":"https://doi.org/10.1504/IJAIP.2012.046965","url":"https://dblp.org/rec/journals/ijaip/Gonzalez12"}, "url":"URL#4303756" }, { "@score":"1", "@id":"4303757", "info":{"authors":{"author":{"@pid":"j/SanjayJain3","text":"Sanjay Jain 0003"}},"title":"A parametric emergency response project management system.","venue":"Int. J. Adv. Intell. Paradigms","volume":"4","number":"1","pages":"54-70","year":"2012","type":"Journal Articles","access":"closed","key":"journals/ijaip/Jain12","doi":"10.1504/IJAIP.2012.046966","ee":"https://doi.org/10.1504/IJAIP.2012.046966","url":"https://dblp.org/rec/journals/ijaip/Jain12"}, "url":"URL#4303757" }, { "@score":"1", "@id":"4303758", "info":{"authors":{"author":[{"@pid":"12/686","text":"Yousef Kilani"},{"@pid":"84/8665","text":"Mohammad Bsoul"},{"@pid":"44/9058","text":"Ibrahim Obeidat"},{"@pid":"72/8325","text":"Mamoun Al Rababaa"}]},"title":"IslandSAT.","venue":"Int. J. Adv. Intell. Paradigms","volume":"4","number":"3/4","pages":"278-298","year":"2012","type":"Journal Articles","access":"closed","key":"journals/ijaip/KilaniBOA12","doi":"10.1504/IJAIP.2012.052072","ee":"https://doi.org/10.1504/IJAIP.2012.052072","url":"https://dblp.org/rec/journals/ijaip/KilaniBOA12"}, "url":"URL#4303758" }, { "@score":"1", "@id":"4303759", "info":{"authors":{"author":[{"@pid":"126/6831","text":"Milos Madic"},{"@pid":"126/6819","text":"Danijel Markovic"},{"@pid":"126/6804","text":"Miroslav Radovanovic"}]},"title":"Performance comparison of meta-heuristic algorithms for training artificial neural networks in modelling laser cutting.","venue":"Int. J. Adv. Intell. Paradigms","volume":"4","number":"3/4","pages":"299-312","year":"2012","type":"Journal Articles","access":"closed","key":"journals/ijaip/MadicMR12","doi":"10.1504/IJAIP.2012.052073","ee":"https://doi.org/10.1504/IJAIP.2012.052073","url":"https://dblp.org/rec/journals/ijaip/MadicMR12"}, "url":"URL#4303759" }, { "@score":"1", "@id":"4303760", "info":{"authors":{"author":[{"@pid":"59/9018","text":"Vimal Mishra"},{"@pid":"86/1305","text":"R. B. Mishra"}]},"title":"English to Sanskrit machine translation system: a rule-based approach.","venue":"Int. J. Adv. Intell. Paradigms","volume":"4","number":"2","pages":"168-184","year":"2012","type":"Journal Articles","access":"closed","key":"journals/ijaip/MishraM12","doi":"10.1504/IJAIP.2012.048144","ee":"https://doi.org/10.1504/IJAIP.2012.048144","url":"https://dblp.org/rec/journals/ijaip/MishraM12"}, "url":"URL#4303760" }, { "@score":"1", "@id":"4303761", "info":{"authors":{"author":[{"@pid":"06/1932","text":"V. Kris Murthy"},{"@pid":"k/EVKrishnamurthy","text":"E. V. Krishnamurthy"}]},"title":"Learning to capture the functions of genetic regulatory networks using graph motifs.","venue":"Int. J. Adv. Intell. Paradigms","volume":"4","number":"2","pages":"185-197","year":"2012","type":"Journal Articles","access":"closed","key":"journals/ijaip/MurthyK12","doi":"10.1504/IJAIP.2012.048146","ee":"https://doi.org/10.1504/IJAIP.2012.048146","url":"https://dblp.org/rec/journals/ijaip/MurthyK12"}, "url":"URL#4303761" }, { "@score":"1", "@id":"4303762", "info":{"authors":{"author":[{"@pid":"19/1046","text":"Camelia-Mihaela Pintea"},{"@pid":"120/7682","text":"Cristian Pascan"},{"@pid":"76/11077","text":"Mara Hajdu-Macelaru"}]},"title":"Comparing several heuristics for a packing problem.","venue":"Int. J. Adv. Intell. Paradigms","volume":"4","number":"3/4","pages":"268-277","year":"2012","type":"Journal Articles","access":"closed","key":"journals/ijaip/PinteaPH12","doi":"10.1504/IJAIP.2012.052071","ee":"https://doi.org/10.1504/IJAIP.2012.052071","url":"https://dblp.org/rec/journals/ijaip/PinteaPH12"}, "url":"URL#4303762" }, { "@score":"1", "@id":"4303763", "info":{"authors":{"author":[{"@pid":"65/9655","text":"S. Poomagal"},{"@pid":"36/5262","text":"T. Hamsapriya"}]},"title":"Optimised K-means for web search.","venue":"Int. J. Adv. Intell. Paradigms","volume":"4","number":"2","pages":"132-148","year":"2012","type":"Journal Articles","access":"closed","key":"journals/ijaip/PoomagalH12","doi":"10.1504/IJAIP.2012.048142","ee":"https://doi.org/10.1504/IJAIP.2012.048142","url":"https://dblp.org/rec/journals/ijaip/PoomagalH12"}, "url":"URL#4303763" }, { "@score":"1", "@id":"4303764", "info":{"authors":{"author":[{"@pid":"84/10647","text":"Petru Radu"},{"@pid":"s/KonstantinosSirlantzis","text":"Konstantinos Sirlantzis"},{"@pid":"11/2335","text":"Gareth Howells 0001"},{"@pid":"69/6114","text":"Farzin Deravi"},{"@pid":"70/5320","text":"Sanaul Hoque"}]},"title":"A review of information fusion techniques employed in iris recognition systems.","venue":"Int. J. Adv. Intell. Paradigms","volume":"4","number":"3/4","pages":"211-240","year":"2012","type":"Journal Articles","access":"closed","key":"journals/ijaip/RaduSHDH12","doi":"10.1504/IJAIP.2012.052067","ee":"https://doi.org/10.1504/IJAIP.2012.052067","url":"https://dblp.org/rec/journals/ijaip/RaduSHDH12"}, "url":"URL#4303764" }, { "@score":"1", "@id":"4303765", "info":{"authors":{"author":[{"@pid":"59/7796-1","text":"S. Sangeetha 0001"},{"@pid":"54/2426","text":"Michael Arock"}]},"title":"Recognising sentence similarity using similitude and dissimilarity features.","venue":"Int. J. Adv. Intell. Paradigms","volume":"4","number":"2","pages":"120-131","year":"2012","type":"Journal Articles","access":"closed","key":"journals/ijaip/SangeethaA12","doi":"10.1504/IJAIP.2012.048141","ee":"https://doi.org/10.1504/IJAIP.2012.048141","url":"https://dblp.org/rec/journals/ijaip/SangeethaA12"}, "url":"URL#4303765" }, { "@score":"1", "@id":"4303766", "info":{"authors":{"author":[{"@pid":"04/11439","text":"Asli Soyler"},{"@pid":"02/3382","text":"Maria T. Bull"},{"@pid":"85/5855","text":"Yanshen Zhu"},{"@pid":"25/3900","text":"Abeer Sharawi"},{"@pid":"93/11444","text":"Pamela McCauley Bush"}]},"title":"A research-based approach to simulation in disaster management.","venue":"Int. J. Adv. Intell. Paradigms","volume":"4","number":"1","pages":"2-21","year":"2012","type":"Journal Articles","access":"closed","key":"journals/ijaip/SoylerBZSB12","doi":"10.1504/IJAIP.2012.046963","ee":"https://doi.org/10.1504/IJAIP.2012.046963","url":"https://dblp.org/rec/journals/ijaip/SoylerBZSB12"}, "url":"URL#4303766" }, { "@score":"1", "@id":"4303767", "info":{"authors":{"author":[{"@pid":"03/8805","text":"V. K. Sudha"},{"@pid":"21/2046","text":"R. Sudhakar 0001"},{"@pid":"28/2665","text":"Valentina Emilia Balas"}]},"title":"Fuzzy rule-based segmentation of CT brain images of hemorrhage for compression.","venue":"Int. J. Adv. Intell. Paradigms","volume":"4","number":"3/4","pages":"256-267","year":"2012","type":"Journal Articles","access":"closed","key":"journals/ijaip/SudhaSB12","doi":"10.1504/IJAIP.2012.052069","ee":"https://doi.org/10.1504/IJAIP.2012.052069","url":"https://dblp.org/rec/journals/ijaip/SudhaSB12"}, "url":"URL#4303767" }, { "@score":"1", "@id":"4303768", "info":{"authors":{"author":[{"@pid":"11/5198","text":"Hooman Tahayori"},{"@pid":"97/1971","text":"Alireza Sadeghian"}]},"title":"Median interval approach to model words with interval type-2 fuzzy sets.","venue":"Int. J. Adv. Intell. Paradigms","volume":"4","number":"3/4","pages":"313-336","year":"2012","type":"Journal Articles","access":"closed","key":"journals/ijaip/TahayoriS12","doi":"10.1504/IJAIP.2012.052074","ee":"https://doi.org/10.1504/IJAIP.2012.052074","url":"https://dblp.org/rec/journals/ijaip/TahayoriS12"}, "url":"URL#4303768" }, { "@score":"1", "@id":"4303769", "info":{"authors":{"author":[{"@pid":"84/8882","text":"Michal Trna"},{"@pid":"124/4878","text":"Víctor Giménez-Martínez"}]},"title":"An interactive tool for the stock market research using recursive neural networks.","venue":"Int. J. Adv. Intell. Paradigms","volume":"4","number":"2","pages":"103-119","year":"2012","type":"Journal Articles","access":"closed","key":"journals/ijaip/TrnaG12","doi":"10.1504/IJAIP.2012.048140","ee":"https://doi.org/10.1504/IJAIP.2012.048140","url":"https://dblp.org/rec/journals/ijaip/TrnaG12"}, "url":"URL#4303769" }, { "@score":"1", "@id":"4303770", "info":{"authors":{"author":[{"@pid":"77/4658","text":"Brian Wolshon"},{"@pid":"96/11441","text":"Vinayak V. Dixit"}]},"title":"Traffic modelling and simulation for regional multimodal evacuation analysis.","venue":"Int. J. Adv. Intell. Paradigms","volume":"4","number":"1","pages":"71-82","year":"2012","type":"Journal Articles","access":"closed","key":"journals/ijaip/WolshonD12","doi":"10.1504/IJAIP.2012.046967","ee":"https://doi.org/10.1504/IJAIP.2012.046967","url":"https://dblp.org/rec/journals/ijaip/WolshonD12"}, "url":"URL#4303770" }, { "@score":"1", "@id":"4303771", "info":{"authors":{"author":[{"@pid":"09/3641","text":"Shengnan Wu"},{"@pid":"13/5247","text":"Larry J. Shuman"},{"@pid":"26/6346","text":"Bopaya Bidanda"},{"@pid":"27/6699","text":"Carey D. Balaban"},{"@pid":"s/KennethMSochats","text":"Kenneth M. Sochats"}]},"title":"A hybrid modelling framework to simulate disaster response decisions.","venue":"Int. J. Adv. Intell. Paradigms","volume":"4","number":"1","pages":"83-102","year":"2012","type":"Journal Articles","access":"closed","key":"journals/ijaip/WuSBBS12","doi":"10.1504/IJAIP.2012.046968","ee":"https://doi.org/10.1504/IJAIP.2012.046968","url":"https://dblp.org/rec/journals/ijaip/WuSBBS12"}, "url":"URL#4303771" }, { "@score":"1", "@id":"4565715", "info":{"authors":{"author":[{"@pid":"89/5425","text":"S. Balasundaram"},{"@pid":"88/8634","text":"Kapil"}]},"title":"Weighted fuzzy ridge regression analysis with crisp inputs and triangular fuzzy outputs.","venue":"Int. J. Adv. Intell. Paradigms","volume":"3","number":"1","pages":"67-81","year":"2011","type":"Journal Articles","access":"closed","key":"journals/ijaip/BalasundaramK11","doi":"10.1504/IJAIP.2011.038116","ee":"https://doi.org/10.1504/IJAIP.2011.038116","url":"https://dblp.org/rec/journals/ijaip/BalasundaramK11"}, "url":"URL#4565715" }, { "@score":"1", "@id":"4565716", "info":{"authors":{"author":{"@pid":"16/1785","text":"Mokhtar Beldjehem"}},"title":"A unified granular fuzzy-neuro min-max relational framework for medical diagnosis.","venue":"Int. J. Adv. Intell. Paradigms","volume":"3","number":"2","pages":"122-144","year":"2011","type":"Journal Articles","access":"closed","key":"journals/ijaip/Beldjehem11","doi":"10.1504/IJAIP.2011.039745","ee":"https://doi.org/10.1504/IJAIP.2011.039745","url":"https://dblp.org/rec/journals/ijaip/Beldjehem11"}, "url":"URL#4565716" }, { "@score":"1", "@id":"4565717", "info":{"authors":{"author":{"@pid":"16/1785","text":"Mokhtar Beldjehem"}},"title":"A unified granular hybrid soft computing framework for vision engineering.","venue":"Int. J. Adv. Intell. Paradigms","volume":"3","number":"3/4","pages":"189-202","year":"2011","type":"Journal Articles","access":"closed","key":"journals/ijaip/Beldjehem11a","doi":"10.1504/IJAIP.2011.043426","ee":"https://doi.org/10.1504/IJAIP.2011.043426","url":"https://dblp.org/rec/journals/ijaip/Beldjehem11a"}, "url":"URL#4565717" }, { "@score":"1", "@id":"4565718", "info":{"authors":{"author":[{"@pid":"92/4345","text":"George H. van Doorn"},{"@pid":"65/6468","text":"Mark A. Symmons"},{"@pid":"62/16","text":"Barry L. Richardson"}]},"title":"A precision-of-information explanation of sensory dominance.","venue":"Int. J. Adv. Intell. Paradigms","volume":"3","number":"3/4","pages":"240-256","year":"2011","type":"Journal Articles","access":"closed","key":"journals/ijaip/DoornSR11","doi":"10.1504/IJAIP.2011.043429","ee":"https://doi.org/10.1504/IJAIP.2011.043429","url":"https://dblp.org/rec/journals/ijaip/DoornSR11"}, "url":"URL#4565718" }, { "@score":"1", "@id":"4565719", "info":{"authors":{"author":{"@pid":"00/11443","text":"Sukanta Ganguly"}},"title":"CADRA: context aware data retrieval architecture.","venue":"Int. J. Adv. Intell. Paradigms","volume":"3","number":"1","pages":"82-92","year":"2011","type":"Journal Articles","access":"closed","key":"journals/ijaip/Ganguly11","doi":"10.1504/IJAIP.2011.038117","ee":"https://doi.org/10.1504/IJAIP.2011.038117","url":"https://dblp.org/rec/journals/ijaip/Ganguly11"}, "url":"URL#4565719" }, { "@score":"1", "@id":"4565720", "info":{"authors":{"author":[{"@pid":"00/7642","text":"Hara Kostakis"},{"@pid":"32/11444","text":"Odysseas Pavlatos"},{"@pid":"89/7641","text":"Leo D. Kounis"}]},"title":"A new method for activity-based modelling of customer profitability analysis in hotels.","venue":"Int. J. Adv. Intell. Paradigms","volume":"3","number":"1","pages":"1-13","year":"2011","type":"Journal Articles","access":"closed","key":"journals/ijaip/KostakisPK11","doi":"10.1504/IJAIP.2011.038113","ee":"https://doi.org/10.1504/IJAIP.2011.038113","url":"https://dblp.org/rec/journals/ijaip/KostakisPK11"}, "url":"URL#4565720" }, { "@score":"1", "@id":"4565721", "info":{"authors":{"author":[{"@pid":"20/7655","text":"Heping Liu"},{"@pid":"10/11445","text":"Soroor K. Al-Khafaji"},{"@pid":"95/6081","text":"Alice E. Smith"}]},"title":"Prediction of wireless network connectivity using a Taylor Kriging approach.","venue":"Int. J. Adv. Intell. Paradigms","volume":"3","number":"2","pages":"112-121","year":"2011","type":"Journal Articles","access":"closed","key":"journals/ijaip/LiuAS11","doi":"10.1504/IJAIP.2011.039744","ee":"https://doi.org/10.1504/IJAIP.2011.039744","url":"https://dblp.org/rec/journals/ijaip/LiuAS11"}, "url":"URL#4565721" }, { "@score":"1", "@id":"4565722", "info":{"authors":{"author":[{"@pid":"53/7738","text":"Yadira Mendoza-Alegria"},{"@pid":"45/7738","text":"Edgardo J. Roldan-Villasana"}]},"title":"Condensate system modelling in real time for a training power plant simulator.","venue":"Int. J. Adv. Intell. Paradigms","volume":"3","number":"3/4","pages":"203-222","year":"2011","type":"Journal Articles","access":"closed","key":"journals/ijaip/Mendoza-AlegriaR11","doi":"10.1504/IJAIP.2011.043427","ee":"https://doi.org/10.1504/IJAIP.2011.043427","url":"https://dblp.org/rec/journals/ijaip/Mendoza-AlegriaR11"}, "url":"URL#4565722" }, { "@score":"1", "@id":"4565723", "info":{"authors":{"author":[{"@pid":"41/9044","text":"Kiran Mishra"},{"@pid":"86/1305","text":"R. B. Mishra"}]},"title":"Characteristic factors and components of different modules in expert systems for intelligent tutoring system.","venue":"Int. J. Adv. Intell. Paradigms","volume":"3","number":"1","pages":"14-42","year":"2011","type":"Journal Articles","access":"closed","key":"journals/ijaip/MishraM11","doi":"10.1504/IJAIP.2011.038114","ee":"https://doi.org/10.1504/IJAIP.2011.038114","url":"https://dblp.org/rec/journals/ijaip/MishraM11"}, "url":"URL#4565723" }, { "@score":"1", "@id":"4565724", "info":{"authors":{"author":[{"@pid":"02/11442","text":"Djordje Nadrljanski"},{"@pid":"44/10234","text":"Mila Nadrljanski"},{"@pid":"80/11444","text":"Ivan Bozicevic"}]},"title":"Modular approach to modelling of higher education in information technology.","venue":"Int. J. Adv. Intell. Paradigms","volume":"3","number":"3/4","pages":"323-340","year":"2011","type":"Journal Articles","access":"closed","key":"journals/ijaip/NadrljanskiNB11","doi":"10.1504/IJAIP.2011.043434","ee":"https://doi.org/10.1504/IJAIP.2011.043434","url":"https://dblp.org/rec/journals/ijaip/NadrljanskiNB11"}, "url":"URL#4565724" }, { "@score":"1", "@id":"4565725", "info":{"authors":{"author":[{"@pid":"72/11445","text":"Ionut Neagu"},{"@pid":"98/5159","text":"Pascal Bruniaux"},{"@pid":"44/11439","text":"Dorin Avram"},{"@pid":"87/11439","text":"Vasile Airinei"}]},"title":"Simulation of longitudinal geometric yarn structure.","venue":"Int. J. Adv. Intell. Paradigms","volume":"3","number":"2","pages":"178-187","year":"2011","type":"Journal Articles","access":"closed","key":"journals/ijaip/NeaguBAA11","doi":"10.1504/IJAIP.2011.039748","ee":"https://doi.org/10.1504/IJAIP.2011.039748","url":"https://dblp.org/rec/journals/ijaip/NeaguBAA11"}, "url":"URL#4565725" }, { "@score":"1", "@id":"4565726", "info":{"authors":{"author":[{"@pid":"98/6620","text":"R. Ponalagusamy"},{"@pid":"07/3973","text":"S. Senthilkumar"}]},"title":"Investigation on time-multiplexing cellular neural network simulation by RKAHeM(4, 4) technique.","venue":"Int. J. Adv. Intell. Paradigms","volume":"3","number":"1","pages":"43-66","year":"2011","type":"Journal Articles","access":"closed","key":"journals/ijaip/PonalagusamyS11","doi":"10.1504/IJAIP.2011.038115","ee":"https://doi.org/10.1504/IJAIP.2011.038115","url":"https://dblp.org/rec/journals/ijaip/PonalagusamyS11"}, "url":"URL#4565726" }, { "@score":"1", "@id":"4565727", "info":{"authors":{"author":[{"@pid":"50/9701","text":"Vijay Rajaram Rathod"},{"@pid":"76/5289","text":"R. S. Anand"}]},"title":"NDE weld defect detection and feature extraction using segmentation approach.","venue":"Int. J. Adv. Intell. Paradigms","volume":"3","number":"3/4","pages":"286-304","year":"2011","type":"Journal Articles","access":"closed","key":"journals/ijaip/RathodA11","doi":"10.1504/IJAIP.2011.043432","ee":"https://doi.org/10.1504/IJAIP.2011.043432","url":"https://dblp.org/rec/journals/ijaip/RathodA11"}, "url":"URL#4565727" }, { "@score":"1", "@id":"4565728", "info":{"authors":{"author":[{"@pid":"45/7738","text":"Edgardo J. Roldan-Villasana"},{"@pid":"04/11442","text":"Ma. de Jesus Cardoso-Goroztieta"},{"@pid":"80/7738","text":"Adriana Verduzco"},{"@pid":"72/7738","text":"Jorge J. Zorrilla-Arena S"}]},"title":"Secondary steam models of a combined cycle power plant simulator.","venue":"Int. J. Adv. Intell. Paradigms","volume":"3","number":"2","pages":"145-163","year":"2011","type":"Journal Articles","access":"closed","key":"journals/ijaip/Roldan-VillasanaCVS11","doi":"10.1504/IJAIP.2011.039746","ee":"https://doi.org/10.1504/IJAIP.2011.039746","url":"https://dblp.org/rec/journals/ijaip/Roldan-VillasanaCVS11"}, "url":"URL#4565728" }, { "@score":"1", "@id":"4565729", "info":{"authors":{"author":{"@pid":"50/3012","text":"Guodong Shao"}},"title":"System testing using use cases for simulation model of an emergency room.","venue":"Int. J. Adv. Intell. Paradigms","volume":"3","number":"2","pages":"96-111","year":"2011","type":"Journal Articles","access":"closed","key":"journals/ijaip/Shao11","doi":"10.1504/IJAIP.2011.039743","ee":"https://doi.org/10.1504/IJAIP.2011.039743","url":"https://dblp.org/rec/journals/ijaip/Shao11"}, "url":"URL#4565729" }, { "@score":"1", "@id":"4565730", "info":{"authors":{"author":[{"@pid":"36/1388","text":"Ranjit Singh"},{"@pid":"59/11443","text":"Ashok Singh"},{"@pid":"95/145","text":"Chimay J. Anumba"},{"@pid":"29/7867","text":"Gurdev Singh"}]},"title":"Enhancing and measuring patient safety with an innovative web-based systems approach.","venue":"Int. J. Adv. Intell. Paradigms","volume":"3","number":"2","pages":"164-177","year":"2011","type":"Journal Articles","access":"closed","key":"journals/ijaip/SinghSAS11","doi":"10.1504/IJAIP.2011.039747","ee":"https://doi.org/10.1504/IJAIP.2011.039747","url":"https://dblp.org/rec/journals/ijaip/SinghSAS11"}, "url":"URL#4565730" }, { "@score":"1", "@id":"4565731", "info":{"authors":{"author":[{"@pid":"36/1388","text":"Ranjit Singh"},{"@pid":"59/11443","text":"Ashok Singh"},{"@pid":"46/11443","text":"Sonjoy Singh"},{"@pid":"29/7867","text":"Gurdev Singh"}]},"title":"Creating a common vision for all stakeholders to make healthcare safer with interactive visual modelling.","venue":"Int. J. Adv. Intell. Paradigms","volume":"3","number":"3/4","pages":"223-239","year":"2011","type":"Journal Articles","access":"closed","key":"journals/ijaip/SinghSSS11","doi":"10.1504/IJAIP.2011.043428","ee":"https://doi.org/10.1504/IJAIP.2011.043428","url":"https://dblp.org/rec/journals/ijaip/SinghSSS11"}, "url":"URL#4565731" }, { "@score":"1", "@id":"4565732", "info":{"authors":{"author":{"@pid":"138/0881","text":"Gábor Szücs"}},"title":"Equilibrium estimation based on unreliable information in transport networks by adaptive simulation.","venue":"Int. J. Adv. Intell. Paradigms","volume":"3","number":"3/4","pages":"273-285","year":"2011","type":"Journal Articles","access":"closed","key":"journals/ijaip/Szucs11","doi":"10.1504/IJAIP.2011.043431","ee":"https://doi.org/10.1504/IJAIP.2011.043431","url":"https://dblp.org/rec/journals/ijaip/Szucs11"}, "url":"URL#4565732" }, { "@score":"1", "@id":"4565733", "info":{"authors":{"author":{"@pid":"67/1766","text":"Sofia Visa"}},"title":"The effect of class imbalance, complexity, size, and learning distribution on classifier performance.","venue":"Int. J. Adv. Intell. Paradigms","volume":"3","number":"3/4","pages":"341-366","year":"2011","type":"Journal Articles","access":"closed","key":"journals/ijaip/Visa11","doi":"10.1504/IJAIP.2011.043435","ee":"https://doi.org/10.1504/IJAIP.2011.043435","url":"https://dblp.org/rec/journals/ijaip/Visa11"}, "url":"URL#4565733" }, { "@score":"1", "@id":"4565734", "info":{"authors":{"author":[{"@pid":"25/1965","text":"Roman V. Yampolskiy"},{"@pid":"59/2041","text":"Leon Reznik"},{"@pid":"75/11441","text":"Mike Adams"},{"@pid":"49/11443","text":"Joshua Harlow"},{"@pid":"37/2517","text":"Dima Novikov"}]},"title":"Resource awareness in computational intelligence.","venue":"Int. J. Adv. Intell. Paradigms","volume":"3","number":"3/4","pages":"305-322","year":"2011","type":"Journal Articles","access":"closed","key":"journals/ijaip/YampolskiyRAHN11","doi":"10.1504/IJAIP.2011.043433","ee":"https://doi.org/10.1504/IJAIP.2011.043433","url":"https://dblp.org/rec/journals/ijaip/YampolskiyRAHN11"}, "url":"URL#4565734" }, { "@score":"1", "@id":"4565735", "info":{"authors":{"author":[{"@pid":"89/7221","text":"Snejana Yordanova"},{"@pid":"32/11439","text":"Elena Haralanova"}]},"title":"Design and implementation of robust multivariable PI-like fuzzy logic controller for aerodynamic plant.","venue":"Int. J. Adv. Intell. Paradigms","volume":"3","number":"3/4","pages":"257-272","year":"2011","type":"Journal Articles","access":"closed","key":"journals/ijaip/YordanovaH11","doi":"10.1504/IJAIP.2011.043430","ee":"https://doi.org/10.1504/IJAIP.2011.043430","url":"https://dblp.org/rec/journals/ijaip/YordanovaH11"}, "url":"URL#4565735" }, { "@score":"1", "@id":"4814654", "info":{"authors":{"author":[{"@pid":"63/1096","text":"Akinori Abe"},{"@pid":"51/3330","text":"Norihiro Hagita"},{"@pid":"03/6717","text":"Michiko Furutani"},{"@pid":"31/1575","text":"Yoshiyuki Furutani"},{"@pid":"99/2183","text":"Rumiko Matsuoka"}]},"title":"An interface for medical diagnosis support: from the viewpoint of chance discovery.","venue":"Int. J. Adv. Intell. Paradigms","volume":"2","number":"2/3","pages":"283-302","year":"2010","type":"Journal Articles","access":"closed","key":"journals/ijaip/AbeHFFM10","doi":"10.1504/IJAIP.2010.030540","ee":"https://doi.org/10.1504/IJAIP.2010.030540","url":"https://dblp.org/rec/journals/ijaip/AbeHFFM10"}, "url":"URL#4814654" }, { "@score":"1", "@id":"4814655", "info":{"authors":{"author":[{"@pid":"14/3050","text":"Hidenao Abe"},{"@pid":"66/3259","text":"Shusaku Tsumoto"},{"@pid":"67/3667","text":"Miho Ohsaki"},{"@pid":"35/2035","text":"Takahira Yamaguchi"}]},"title":"Improving a rule evaluation support method based on objective indices.","venue":"Int. J. Adv. Intell. Paradigms","volume":"2","number":"2/3","pages":"180-197","year":"2010","type":"Journal Articles","access":"closed","key":"journals/ijaip/AbeTOY10","doi":"10.1504/IJAIP.2010.030534","ee":"https://doi.org/10.1504/IJAIP.2010.030534","url":"https://dblp.org/rec/journals/ijaip/AbeTOY10"}, "url":"URL#4814655" }, { "@score":"1", "@id":"4814656", "info":{"authors":{"author":[{"@pid":"37/1271","text":"Shigeki Amitani"},{"@pid":"69/723","text":"Ernest A. Edmonds"}]},"title":"A method for visualising possible contexts.","venue":"Int. J. Adv. Intell. Paradigms","volume":"2","number":"2/3","pages":"110-124","year":"2010","type":"Journal Articles","access":"closed","key":"journals/ijaip/AmitaniE10","doi":"10.1504/IJAIP.2010.030530","ee":"https://doi.org/10.1504/IJAIP.2010.030530","url":"https://dblp.org/rec/journals/ijaip/AmitaniE10"}, "url":"URL#4814656" }, { "@score":"1", "@id":"4814657", "info":{"authors":{"author":[{"@pid":"74/2575","text":"Eleftherios I. Amoiralis"},{"@pid":"g/PSGeorgilakis","text":"Pavlos S. Georgilakis"},{"@pid":"87/5236","text":"Marina A. Tsili"},{"@pid":"19/1306","text":"Antonios G. Kladas"}]},"title":"Ant Colony Optimisation solution to distribution transformer planning problem.","venue":"Int. J. Adv. Intell. Paradigms","volume":"2","number":"4","pages":"316-335","year":"2010","type":"Journal Articles","access":"closed","key":"journals/ijaip/AmoiralisGTK10","doi":"10.1504/IJAIP.2010.036398","ee":"https://doi.org/10.1504/IJAIP.2010.036398","url":"https://dblp.org/rec/journals/ijaip/AmoiralisGTK10"}, "url":"URL#4814657" }, { "@score":"1", "@id":"4814658", "info":{"authors":{"author":[{"@pid":"97/2878","text":"Gyoung Soon Choi"},{"@pid":"23/6858","text":"Ruediger Oehlmann"},{"@pid":"08/197","text":"David Cottington"}]},"title":"Discovering chances for cross-cultural colour design.","venue":"Int. J. Adv. Intell. Paradigms","volume":"2","number":"2/3","pages":"140-158","year":"2010","type":"Journal Articles","access":"closed","key":"journals/ijaip/ChoiOC10","doi":"10.1504/IJAIP.2010.030532","ee":"https://doi.org/10.1504/IJAIP.2010.030532","url":"https://dblp.org/rec/journals/ijaip/ChoiOC10"}, "url":"URL#4814658" }, { "@score":"1", "@id":"4814659", "info":{"authors":{"author":[{"@pid":"61/3226","text":"Mirko Ficko"},{"@pid":"74/1984","text":"Joze Balic"},{"@pid":"00/8026","text":"Miran Brezocnik"},{"@pid":"32/8026","text":"Ivo Pahole"}]},"title":"Solving of Floor Layout Problem in Flexible Manufacturing System by Genetic Algorithms.","venue":"Int. J. Adv. Intell. Paradigms","volume":"2","number":"4","pages":"354-364","year":"2010","type":"Journal Articles","access":"closed","key":"journals/ijaip/FickoBBP10","doi":"10.1504/IJAIP.2010.036400","ee":"https://doi.org/10.1504/IJAIP.2010.036400","url":"https://dblp.org/rec/journals/ijaip/FickoBBP10"}, "url":"URL#4814659" }, { "@score":"1", "@id":"4814660", "info":{"authors":{"author":[{"@pid":"47/7298","text":"Álvaro Gomes"},{"@pid":"16/1143","text":"Carlos Henggeler Antunes"},{"@pid":"63/161","text":"Antonio Gomes Martins"}]},"title":"Improving the responsiveness of NSGA-II using an adaptive mutation operator: a case study.","venue":"Int. J. Adv. Intell. Paradigms","volume":"2","number":"1","pages":"4-18","year":"2010","type":"Journal Articles","access":"closed","key":"journals/ijaip/GomesAM10","doi":"10.1504/IJAIP.2010.029437","ee":"https://doi.org/10.1504/IJAIP.2010.029437","url":"https://dblp.org/rec/journals/ijaip/GomesAM10"}, "url":"URL#4814660" }, { "@score":"1", "@id":"4814661", "info":{"authors":{"author":[{"@pid":"69/3311","text":"Takuya Goto"},{"@pid":"21/3192","text":"Tomoko Kojiri"},{"@pid":"73/6148","text":"Toyohide Watanabe"},{"@pid":"29/5953","text":"Tomoharu Iwata"},{"@pid":"19/5706","text":"Takeshi Yamada"}]},"title":"Knowledge network for English grammar learning support system.","venue":"Int. J. Adv. Intell. Paradigms","volume":"2","number":"1","pages":"64-77","year":"2010","type":"Journal Articles","access":"closed","key":"journals/ijaip/GotoKWIY10","doi":"10.1504/IJAIP.2010.029441","ee":"https://doi.org/10.1504/IJAIP.2010.029441","url":"https://dblp.org/rec/journals/ijaip/GotoKWIY10"}, "url":"URL#4814661" }, { "@score":"1", "@id":"4814662", "info":{"authors":{"author":[{"@pid":"29/6085","text":"Vasilis Grapsas"},{"@pid":"27/1185","text":"John Anagnostopoulos"},{"@pid":"14/4531","text":"Dimitris Papantonis"}]},"title":"Improved design of a centrifugal pump impeller using CFD and numerical optimisation tools.","venue":"Int. J. Adv. Intell. Paradigms","volume":"2","number":"4","pages":"336-353","year":"2010","type":"Journal Articles","access":"closed","key":"journals/ijaip/GrapsasAP10","doi":"10.1504/IJAIP.2010.036399","ee":"https://doi.org/10.1504/IJAIP.2010.036399","url":"https://dblp.org/rec/journals/ijaip/GrapsasAP10"}, "url":"URL#4814662" }, { "@score":"1", "@id":"4814663", "info":{"authors":{"author":[{"@pid":"63/3094","text":"Kenta Kouyama"},{"@pid":"65/3624","text":"Naoto Hara"},{"@pid":"63/3532","text":"Isao J. Ohsugi"},{"@pid":"71/3862","text":"Junichi Yoshino"},{"@pid":"08/2128","text":"Hiroshi Ichimura"},{"@pid":"76/4911","text":"Akiko Ono"},{"@pid":"17/3488","text":"Toshiaki Kuroiwa"},{"@pid":"58/2890","text":"Seiu Yamashita"}]},"title":"A study of knowledge database for 'Kana' strings self-study system on navigation.","venue":"Int. J. Adv. Intell. Paradigms","volume":"2","number":"1","pages":"49-63","year":"2010","type":"Journal Articles","access":"closed","key":"journals/ijaip/KouyamaHOYIOKY10","doi":"10.1504/IJAIP.2010.029440","ee":"https://doi.org/10.1504/IJAIP.2010.029440","url":"https://dblp.org/rec/journals/ijaip/KouyamaHOYIOKY10"}, "url":"URL#4814663" }, { "@score":"1", "@id":"4814664", "info":{"authors":{"author":[{"@pid":"22/2287","text":"Alexis Lazanas"},{"@pid":"15/2198","text":"Nikos I. Karacapilidis"}]},"title":"Augmenting transportation-related recommendations through data mining.","venue":"Int. J. Adv. Intell. Paradigms","volume":"2","number":"1","pages":"78-89","year":"2010","type":"Journal Articles","access":"closed","key":"journals/ijaip/LazanasK10","doi":"10.1504/IJAIP.2010.029442","ee":"https://doi.org/10.1504/IJAIP.2010.029442","url":"https://dblp.org/rec/journals/ijaip/LazanasK10"}, "url":"URL#4814664" }, { "@score":"1", "@id":"4814665", "info":{"authors":{"author":[{"@pid":"05/931","text":"Yoshiharu Maeno"},{"@pid":"24/4750","text":"Yukio Ohsawa"}]},"title":"Reflective visualisation and verbalisation of unconscious preference.","venue":"Int. J. Adv. Intell. Paradigms","volume":"2","number":"2/3","pages":"125-139","year":"2010","type":"Journal Articles","access":"closed","key":"journals/ijaip/MaenoO10","doi":"10.1504/IJAIP.2010.030531","ee":"https://doi.org/10.1504/IJAIP.2010.030531","url":"https://dblp.org/rec/journals/ijaip/MaenoO10"}, "url":"URL#4814665" }, { "@score":"1", "@id":"4814666", "info":{"authors":{"author":[{"@pid":"90/1440","text":"Lorenzo Magnani"},{"@pid":"19/1469","text":"Emanuele Bardone"}]},"title":"Chances, affordances, and cognitive niche construction: the plasticity of environmental situatedness.","venue":"Int. J. Adv. Intell. Paradigms","volume":"2","number":"2/3","pages":"235-253","year":"2010","type":"Journal Articles","access":"closed","key":"journals/ijaip/MagnaniB10","doi":"10.1504/IJAIP.2010.030537","ee":"https://doi.org/10.1504/IJAIP.2010.030537","url":"https://dblp.org/rec/journals/ijaip/MagnaniB10"}, "url":"URL#4814666" }, { "@score":"1", "@id":"4814667", "info":{"authors":{"author":[{"@pid":"35/2584","text":"Naoto Mukai"},{"@pid":"73/6148","text":"Toyohide Watanabe"}]},"title":"Route optimisation using evolutionary approaches for on-demand pickup problem.","venue":"Int. J. Adv. Intell. Paradigms","volume":"2","number":"1","pages":"19-32","year":"2010","type":"Journal Articles","access":"closed","key":"journals/ijaip/MukaiW10","doi":"10.1504/IJAIP.2010.029438","ee":"https://doi.org/10.1504/IJAIP.2010.029438","url":"https://dblp.org/rec/journals/ijaip/MukaiW10"}, "url":"URL#4814667" }, { "@score":"1", "@id":"4814668", "info":{"authors":{"author":[{"@pid":"85/1026","text":"Jun Nakamura"},{"@pid":"24/4750","text":"Yukio Ohsawa"},{"@pid":"88/11445","text":"Hiroyuki Nishio"}]},"title":"An analogy game: toward cognitive upheaval through reflection-in-action.","venue":"Int. J. Adv. Intell. Paradigms","volume":"2","number":"2/3","pages":"220-234","year":"2010","type":"Journal Articles","access":"closed","key":"journals/ijaip/NakamuraON10","doi":"10.1504/IJAIP.2010.030536","ee":"https://doi.org/10.1504/IJAIP.2010.030536","url":"https://dblp.org/rec/journals/ijaip/NakamuraON10"}, "url":"URL#4814668" }, { "@score":"1", "@id":"4814669", "info":{"authors":{"author":{"@pid":"49/4389","text":"Yumiko Nara"}},"title":"Risk experience, information, and chance discovery: focusing on earthquakes in China.","venue":"Int. J. Adv. Intell. Paradigms","volume":"2","number":"2/3","pages":"159-179","year":"2010","type":"Journal Articles","access":"closed","key":"journals/ijaip/Nara10","doi":"10.1504/IJAIP.2010.030533","ee":"https://doi.org/10.1504/IJAIP.2010.030533","url":"https://dblp.org/rec/journals/ijaip/Nara10"}, "url":"URL#4814669" }, { "@score":"1", "@id":"4814670", "info":{"authors":{"author":[{"@pid":"42/6865","text":"Ioannis K. Nikolos"},{"@pid":"91/6067","text":"Maria P. Papadopoulou"},{"@pid":"06/4323","text":"George P. Karatzas"}]},"title":"Artificial Neural Network and Differential Evolution methodologies used in single- and multi-objective formulations for the solution of subsurface water management problems.","venue":"Int. J. Adv. Intell. Paradigms","volume":"2","number":"4","pages":"365-377","year":"2010","type":"Journal Articles","access":"closed","key":"journals/ijaip/NikolosPK10","doi":"10.1504/IJAIP.2010.036401","ee":"https://doi.org/10.1504/IJAIP.2010.036401","url":"https://dblp.org/rec/journals/ijaip/NikolosPK10"}, "url":"URL#4814670" }, { "@score":"1", "@id":"4814671", "info":{"authors":{"author":{"@pid":"34/5919","text":"Vladimir V. Rybakov"}},"title":"Modelling of Chance Discovery in variations of Linear Temporal Logic implementing agents' interaction.","venue":"Int. J. Adv. Intell. Paradigms","volume":"2","number":"2/3","pages":"198-219","year":"2010","type":"Journal Articles","access":"closed","key":"journals/ijaip/Rybakov10","doi":"10.1504/IJAIP.2010.030535","ee":"https://doi.org/10.1504/IJAIP.2010.030535","url":"https://dblp.org/rec/journals/ijaip/Rybakov10"}, "url":"URL#4814671" }, { "@score":"1", "@id":"4814672", "info":{"authors":{"author":{"@pid":"82/6443","text":"Nikos Tsourveloudis"}},"title":"Evolutionary-fuzzy scheduling of WIP inventory in manufacturing systems.","venue":"Int. J. Adv. Intell. Paradigms","volume":"2","number":"4","pages":"306-315","year":"2010","type":"Journal Articles","access":"closed","key":"journals/ijaip/Tsourveloudis10","doi":"10.1504/IJAIP.2010.036397","ee":"https://doi.org/10.1504/IJAIP.2010.036397","url":"https://dblp.org/rec/journals/ijaip/Tsourveloudis10"}, "url":"URL#4814672" }, { "@score":"1", "@id":"4814673", "info":{"authors":{"author":[{"@pid":"34/5379","text":"Olga Vorobieva"},{"@pid":"50/6445-2","text":"Rainer Schmidt 0002"}]},"title":"Case-Based Reasoning to explain medical model exceptions.","venue":"Int. J. Adv. Intell. Paradigms","volume":"2","number":"2/3","pages":"271-282","year":"2010","type":"Journal Articles","access":"closed","key":"journals/ijaip/VorobievaS10","doi":"10.1504/IJAIP.2010.030539","ee":"https://doi.org/10.1504/IJAIP.2010.030539","url":"https://dblp.org/rec/journals/ijaip/VorobievaS10"}, "url":"URL#4814673" }, { "@score":"1", "@id":"4814674", "info":{"authors":{"author":[{"@pid":"20/1983","text":"Katsutoshi Yada"},{"@pid":"w/TakashiWashio","text":"Takashi Washio"},{"@pid":"28/5644","text":"Yasuharu Ukai"}]},"title":"Modelling deposit outflow in financial crises: application to branch management and customer relationship management.","venue":"Int. J. Adv. Intell. Paradigms","volume":"2","number":"2/3","pages":"254-270","year":"2010","type":"Journal Articles","access":"closed","key":"journals/ijaip/YadaWU10","doi":"10.1504/IJAIP.2010.030538","ee":"https://doi.org/10.1504/IJAIP.2010.030538","url":"https://dblp.org/rec/journals/ijaip/YadaWU10"}, "url":"URL#4814674" }, { "@score":"1", "@id":"4814675", "info":{"authors":{"author":[{"@pid":"94/1540","text":"Peter Z. Yeh"},{"@pid":"39/7739","text":"Colin A. Puri"},{"@pid":"57/3538","text":"Alex Kass"}]},"title":"A knowledge based approach for capturing rich semantic representations from text for intelligent systems.","venue":"Int. J. Adv. Intell. Paradigms","volume":"2","number":"1","pages":"33-48","year":"2010","type":"Journal Articles","access":"closed","key":"journals/ijaip/YehPK10","doi":"10.1504/IJAIP.2010.029439","ee":"https://doi.org/10.1504/IJAIP.2010.029439","url":"https://dblp.org/rec/journals/ijaip/YehPK10"}, "url":"URL#4814675" }, { "@score":"1", "@id":"4814676", "info":{"authors":{"author":[{"@pid":"32/2594","text":"Mohammed Issam Younis"},{"@pid":"44/4801","text":"Kamal Zuhairi Zamli"},{"@pid":"88/8379","text":"Mohammad F. J. Klaib"},{"@pid":"28/11444","text":"Zainal Hisham Che Soh"},{"@pid":"53/11440","text":"Syahrul Afzal Che Abdullah"},{"@pid":"84/2284","text":"Nor Ashidi Mat Isa"}]},"title":"Assessing IRPS as an efficient pairwise test data generation strategy.","venue":"Int. J. Adv. Intell. Paradigms","volume":"2","number":"1","pages":"90-104","year":"2010","type":"Journal Articles","access":"closed","key":"journals/ijaip/YounisZKSAI10","doi":"10.1504/IJAIP.2010.029443","ee":"https://doi.org/10.1504/IJAIP.2010.029443","url":"https://dblp.org/rec/journals/ijaip/YounisZKSAI10"}, "url":"URL#4814676" }, { "@score":"1", "@id":"5043404", "info":{"authors":{"author":[{"@pid":"88/2827","text":"Yan Chen"},{"@pid":"z/YanqingZhang","text":"Yan-Qing Zhang 0001"}]},"title":"A personalised query suggestion agent based on query-concept bipartite graphs and Concept Relation Trees.","venue":"Int. J. Adv. Intell. Paradigms","volume":"1","number":"4","pages":"398-417","year":"2009","type":"Journal Articles","access":"closed","key":"journals/ijaip/ChenZ09","doi":"10.1504/IJAIP.2009.026761","ee":"https://doi.org/10.1504/IJAIP.2009.026761","url":"https://dblp.org/rec/journals/ijaip/ChenZ09"}, "url":"URL#5043404" }, { "@score":"1", "@id":"5043405", "info":{"authors":{"author":[{"@pid":"05/598","text":"Elías F. Combarro"},{"@pid":"11/796","text":"José Ranilla"},{"@pid":"48/11445","text":"Manuel Roberto Berdasco"},{"@pid":"47/2989","text":"Elena Montañés"},{"@pid":"01/2014","text":"Irene Díaz"}]},"title":"Set Cover Feature Selection for Text Categorisation and spam detection.","venue":"Int. J. Adv. Intell. Paradigms","volume":"1","number":"4","pages":"444-462","year":"2009","type":"Journal Articles","access":"closed","key":"journals/ijaip/CombarroRBMD09","doi":"10.1504/IJAIP.2009.026764","ee":"https://doi.org/10.1504/IJAIP.2009.026764","url":"https://dblp.org/rec/journals/ijaip/CombarroRBMD09"}, "url":"URL#5043405" }, { "@score":"1", "@id":"5043406", "info":{"authors":{"author":{"@pid":"47/11442","text":"Penesta Dika"}},"title":"Biological motifs designed using the principles of artificial life.","venue":"Int. J. Adv. Intell. Paradigms","volume":"1","number":"3","pages":"318-331","year":"2009","type":"Journal Articles","access":"closed","key":"journals/ijaip/Dika09","doi":"10.1504/IJAIP.2009.026571","ee":"https://doi.org/10.1504/IJAIP.2009.026571","url":"https://dblp.org/rec/journals/ijaip/Dika09"}, "url":"URL#5043406" }, { "@score":"1", "@id":"5043407", "info":{"authors":{"author":[{"@pid":"27/3644","text":"Eman El-Sheikh"},{"@pid":"29/5601","text":"Jon Sticklen"}]},"title":"Reusing task-specific knowledge-based systems to generate intelligent tutoring systems.","venue":"Int. J. Adv. Intell. Paradigms","volume":"1","number":"3","pages":"251-274","year":"2009","type":"Journal Articles","access":"closed","key":"journals/ijaip/El-SheikhS09","doi":"10.1504/IJAIP.2009.026568","ee":"https://doi.org/10.1504/IJAIP.2009.026568","url":"https://dblp.org/rec/journals/ijaip/El-SheikhS09"}, "url":"URL#5043407" }, { "@score":"1", "@id":"5043408", "info":{"authors":{"author":[{"@pid":"59/5546","text":"Ángel García-Crespo"},{"@pid":"g/JuanMiguelGomez","text":"Juan Miguel Gómez-Berbís"},{"@pid":"64/2561","text":"Ricardo Colomo Palacios"},{"@pid":"89/3382","text":"Francisco García-Sánchez 0001"}]},"title":"Using Support Vector Machines for feature-oriented profile-based recommendations.","venue":"Int. J. Adv. Intell. Paradigms","volume":"1","number":"4","pages":"418-431","year":"2009","type":"Journal Articles","access":"closed","key":"journals/ijaip/Garcia-CrespoBPS09","doi":"10.1504/IJAIP.2009.026762","ee":"https://doi.org/10.1504/IJAIP.2009.026762","url":"https://dblp.org/rec/journals/ijaip/Garcia-CrespoBPS09"}, "url":"URL#5043408" }, { "@score":"1", "@id":"5043409", "info":{"authors":{"author":[{"@pid":"44/2263","text":"Takamasa Koshizen"},{"@pid":"32/1954","text":"Motohri Kon"},{"@pid":"25/11444","text":"Carson Raynolds"},{"@pid":"25/6773","text":"Kazuyuki Aihara"}]},"title":"Habituation detection with Allen-Cahn boundary generation.","venue":"Int. J. Adv. Intell. Paradigms","volume":"1","number":"4","pages":"463-487","year":"2009","type":"Journal Articles","access":"closed","key":"journals/ijaip/KoshizenKRA09","doi":"10.1504/IJAIP.2009.026765","ee":"https://doi.org/10.1504/IJAIP.2009.026765","url":"https://dblp.org/rec/journals/ijaip/KoshizenKRA09"}, "url":"URL#5043409" }, { "@score":"1", "@id":"5043410", "info":{"authors":{"author":[{"@pid":"40/1491-6","text":"Xiang Li 0006"},{"@pid":"67/3952","text":"Dan A. Ralescu"}]},"title":"Credibility measure of fuzzy sets and applications.","venue":"Int. J. Adv. Intell. Paradigms","volume":"1","number":"3","pages":"241-250","year":"2009","type":"Journal Articles","access":"closed","key":"journals/ijaip/LiR09","doi":"10.1504/IJAIP.2009.026567","ee":"https://doi.org/10.1504/IJAIP.2009.026567","url":"https://dblp.org/rec/journals/ijaip/LiR09"}, "url":"URL#5043410" }, { "@score":"1", "@id":"5043411", "info":{"authors":{"author":[{"@pid":"14/3498","text":"Miguel Lopez"},{"@pid":"44/1632","text":"Patricia Melin"},{"@pid":"05/6497","text":"Oscar Castillo 0001"}]},"title":"Comparative study of fuzzy methods for response integration in ensemble neural networks.","venue":"Int. J. Adv. Intell. Paradigms","volume":"1","number":"3","pages":"291-317","year":"2009","type":"Journal Articles","access":"closed","key":"journals/ijaip/LopezMC09","doi":"10.1504/IJAIP.2009.026570","ee":"https://doi.org/10.1504/IJAIP.2009.026570","url":"https://dblp.org/rec/journals/ijaip/LopezMC09"}, "url":"URL#5043411" }, { "@score":"1", "@id":"5043412", "info":{"authors":{"author":[{"@pid":"41/3694","text":"Deepyaman Maiti"},{"@pid":"12/1772","text":"Mithun Chakraborty"},{"@pid":"53/770","text":"Ayan Acharya"},{"@pid":"75/6387","text":"Amit Konar"}]},"title":"A partly deterministic and partly stochastic scheme for the identification of fractional-order processes.","venue":"Int. J. Adv. Intell. Paradigms","volume":"1","number":"3","pages":"332-357","year":"2009","type":"Journal Articles","access":"closed","key":"journals/ijaip/MaitiCAK09","doi":"10.1504/IJAIP.2009.026572","ee":"https://doi.org/10.1504/IJAIP.2009.026572","url":"https://dblp.org/rec/journals/ijaip/MaitiCAK09"}, "url":"URL#5043412" }, { "@score":"1", "@id":"5043413", "info":{"authors":{"author":[{"@pid":"89/4496","text":"Alfredo Milani"},{"@pid":"l/CHCLeung","text":"Clement H. C. Leung"},{"@pid":"75/5830","text":"Alice W. S. Chan"}]},"title":"Community Adaptive Search Engines.","venue":"Int. J. Adv. Intell. Paradigms","volume":"1","number":"4","pages":"432-443","year":"2009","type":"Journal Articles","access":"closed","key":"journals/ijaip/MilaniLC09","doi":"10.1504/IJAIP.2009.026763","ee":"https://doi.org/10.1504/IJAIP.2009.026763","url":"https://dblp.org/rec/journals/ijaip/MilaniLC09"}, "url":"URL#5043413" }, { "@score":"1", "@id":"5043414", "info":{"authors":{"author":{"@pid":"19/11441","text":"Felix Riesco"}},"title":"Genetic Algorithm as discrete-time filter solver.","venue":"Int. J. Adv. Intell. Paradigms","volume":"1","number":"3","pages":"275-290","year":"2009","type":"Journal Articles","access":"closed","key":"journals/ijaip/Riesco09","doi":"10.1504/IJAIP.2009.026569","ee":"https://doi.org/10.1504/IJAIP.2009.026569","url":"https://dblp.org/rec/journals/ijaip/Riesco09"}, "url":"URL#5043414" }, { "@score":"1", "@id":"5043415", "info":{"authors":{"author":[{"@pid":"36/820","text":"Roman Y. Shtykh"},{"@pid":"54/2551","text":"Qun Jin"}]},"title":"Dynamically constructing user profiles with similarity-based online incremental clustering.","venue":"Int. J. Adv. Intell. Paradigms","volume":"1","number":"4","pages":"377-397","year":"2009","type":"Journal Articles","access":"closed","key":"journals/ijaip/ShtykhJ09","doi":"10.1504/IJAIP.2009.026760","ee":"https://doi.org/10.1504/IJAIP.2009.026760","url":"https://dblp.org/rec/journals/ijaip/ShtykhJ09"}, "url":"URL#5043415" }, { "@score":"1", "@id":"5043416", "info":{"authors":{"author":[{"@pid":"50/2298","text":"Erich Christian Teppan"},{"@pid":"71/915","text":"Alexander Felfernig"}]},"title":"Impacts of decoy elements on result set evaluations in knowledge-based recommendation.","venue":"Int. J. Adv. Intell. Paradigms","volume":"1","number":"3","pages":"358-373","year":"2009","type":"Journal Articles","access":"closed","key":"journals/ijaip/TeppanF09","doi":"10.1504/IJAIP.2009.026573","ee":"https://doi.org/10.1504/IJAIP.2009.026573","url":"https://dblp.org/rec/journals/ijaip/TeppanF09"}, "url":"URL#5043416" }, { "@score":"1", "@id":"5264062", "info":{"authors":{"author":[{"@pid":"56/5514","text":"Issam Bouslimi"},{"@pid":"96/5227","text":"Chihab Hanachi"},{"@pid":"90/11439","text":"Hassan Tout"},{"@pid":"08/565","text":"Khaled Ghédira"}]},"title":"A coordination framework for Cooperative Information Gathering.","venue":"Int. J. Adv. Intell. Paradigms","volume":"1","number":"1","pages":"60-79","year":"2008","type":"Journal Articles","access":"closed","key":"journals/ijaip/BouslimiHTG08","doi":"10.1504/IJAIP.2008.020820","ee":"https://doi.org/10.1504/IJAIP.2008.020820","url":"https://dblp.org/rec/journals/ijaip/BouslimiHTG08"}, "url":"URL#5264062" }, { "@score":"1", "@id":"5264063", "info":{"authors":{"author":[{"@pid":"54/3488","text":"Wei Fan"},{"@pid":"73/6148","text":"Toyohide Watanabe"},{"@pid":"62/6701","text":"Koichi Asakura"}]},"title":"A framework for flexible clustering of multiple evolving data streams.","venue":"Int. J. Adv. Intell. Paradigms","volume":"1","number":"2","pages":"178-195","year":"2008","type":"Journal Articles","access":"closed","key":"journals/ijaip/FanWA08","doi":"10.1504/IJAIP.2008.024775","ee":"https://doi.org/10.1504/IJAIP.2008.024775","url":"https://dblp.org/rec/journals/ijaip/FanWA08"}, "url":"URL#5264063" }, { "@score":"1", "@id":"5264064", "info":{"authors":{"author":[{"@pid":"00/4883-1","text":"Jun Feng 0001"},{"@pid":"22/3203","text":"Jiamin Lu"},{"@pid":"46/6399","text":"Yuelong Zhu"},{"@pid":"73/6148","text":"Toyohide Watanabe"}]},"title":"Improved partition method for tracking moving objects in road networks.","venue":"Int. J. Adv. Intell. Paradigms","volume":"1","number":"2","pages":"139-150","year":"2008","type":"Journal Articles","access":"closed","key":"journals/ijaip/FengLZW08","doi":"10.1504/IJAIP.2008.024770","ee":"https://doi.org/10.1504/IJAIP.2008.024770","url":"https://dblp.org/rec/journals/ijaip/FengLZW08"}, "url":"URL#5264064" }, { "@score":"1", "@id":"5264065", "info":{"authors":{"author":[{"@pid":"06/6483","text":"Hisayoshi Kunimune"},{"@pid":"56/5990","text":"Kenzou Yokoyama"},{"@pid":"78/1271","text":"Takeshi Takizawa"},{"@pid":"31/7011","text":"Yasushi Fuwa"}]},"title":"Development and evaluation of a web-based asynchronous discussion system on e-learning materials.","venue":"Int. J. Adv. Intell. Paradigms","volume":"1","number":"2","pages":"163-177","year":"2008","type":"Journal Articles","access":"closed","key":"journals/ijaip/KunimuneYTF08","doi":"10.1504/IJAIP.2008.024780","ee":"https://doi.org/10.1504/IJAIP.2008.024780","url":"https://dblp.org/rec/journals/ijaip/KunimuneYTF08"}, "url":"URL#5264065" }, { "@score":"1", "@id":"5264066", "info":{"authors":{"author":[{"@pid":"47/2989","text":"Elena Montañés"},{"@pid":"89/8296","text":"Pedro Alonso 0002"},{"@pid":"05/598","text":"Elías F. Combarro"},{"@pid":"01/2014","text":"Irene Díaz"},{"@pid":"90/2975","text":"Raquel Cortina"},{"@pid":"11/796","text":"José Ranilla"}]},"title":"Using Laplace and angular measures for Feature Selection in Text Categorisation.","venue":"Int. J. Adv. Intell. Paradigms","volume":"1","number":"1","pages":"40-59","year":"2008","type":"Journal Articles","access":"closed","key":"journals/ijaip/MontanesACDCR08","doi":"10.1504/IJAIP.2008.020819","ee":"https://doi.org/10.1504/IJAIP.2008.020819","url":"https://dblp.org/rec/journals/ijaip/MontanesACDCR08"}, "url":"URL#5264066" }, { "@score":"1", "@id":"5264067", "info":{"authors":{"author":[{"@pid":"62/6903","text":"Shoichi Nakamura"},{"@pid":"72/1795","text":"Atsuo Hazeyama"},{"@pid":"21/2714","text":"Setsuo Yokoyama"},{"@pid":"23/6030","text":"Youzou Miyadera"}]},"title":"A model for navigating discussions among system design novices.","venue":"Int. J. Adv. Intell. Paradigms","volume":"1","number":"2","pages":"113-125","year":"2008","type":"Journal Articles","access":"closed","key":"journals/ijaip/NakamuraHYM08","doi":"10.1504/IJAIP.2008.024767","ee":"https://doi.org/10.1504/IJAIP.2008.024767","url":"https://dblp.org/rec/journals/ijaip/NakamuraHYM08"}, "url":"URL#5264067" }, { "@score":"1", "@id":"5264068", "info":{"authors":{"author":[{"@pid":"98/4283","text":"Kazuhisa Seta"},{"@pid":"81/784","text":"Hiroki Satake"},{"@pid":"27/4299","text":"Motohide Umano"},{"@pid":"96/251","text":"Mitsuru Ikeda"}]},"title":"Learning environment for improving Critical Thinking skills in nursing domain.","venue":"Int. J. Adv. Intell. Paradigms","volume":"1","number":"2","pages":"196-210","year":"2008","type":"Journal Articles","access":"closed","key":"journals/ijaip/SetaSUI08","doi":"10.1504/IJAIP.2008.024776","ee":"https://doi.org/10.1504/IJAIP.2008.024776","url":"https://dblp.org/rec/journals/ijaip/SetaSUI08"}, "url":"URL#5264068" }, { "@score":"1", "@id":"5264069", "info":{"authors":{"author":[{"@pid":"09/4093","text":"Masato Soga"},{"@pid":"03/6134","text":"Kohe Tokoi"},{"@pid":"31/4632","text":"Yasunori Nakanishi"}]},"title":"The planetary simulator for understanding planetary phenomena by multiple viewpoints.","venue":"Int. J. Adv. Intell. Paradigms","volume":"1","number":"2","pages":"211-223","year":"2008","type":"Journal Articles","access":"closed","key":"journals/ijaip/SogaTN08","doi":"10.1504/IJAIP.2008.024778","ee":"https://doi.org/10.1504/IJAIP.2008.024778","url":"https://dblp.org/rec/journals/ijaip/SogaTN08"}, "url":"URL#5264069" }, { "@score":"1", "@id":"5264070", "info":{"authors":{"author":[{"@pid":"71/6036","text":"Taiki Takashita"},{"@pid":"32/5235","text":"Tsuyoshi Itokawa"},{"@pid":"29/317","text":"Teruaki Kitasuka"},{"@pid":"86/3844","text":"Masayoshi Aritsugi"}]},"title":"Extracting user preference from Web browsing behaviour for spam filtering.","venue":"Int. J. Adv. Intell. Paradigms","volume":"1","number":"2","pages":"126-138","year":"2008","type":"Journal Articles","access":"closed","key":"journals/ijaip/TakashitaIKA08","doi":"10.1504/IJAIP.2008.024769","ee":"https://doi.org/10.1504/IJAIP.2008.024769","url":"https://dblp.org/rec/journals/ijaip/TakashitaIKA08"}, "url":"URL#5264070" }, { "@score":"1", "@id":"5264071", "info":{"authors":{"author":[{"@pid":"11/3964","text":"Yasuhisa Tamura"},{"@pid":"19/4791","text":"Masashi Maejima"},{"@pid":"33/787","text":"Kazuya Sumi"}]},"title":"CSCL utterance NLP analysis and inter-LMS sharing with use of Web Services.","venue":"Int. J. Adv. Intell. Paradigms","volume":"1","number":"2","pages":"224-240","year":"2008","type":"Journal Articles","access":"closed","key":"journals/ijaip/TamuraMS08","doi":"10.1504/IJAIP.2008.024779","ee":"https://doi.org/10.1504/IJAIP.2008.024779","url":"https://dblp.org/rec/journals/ijaip/TamuraMS08"}, "url":"URL#5264071" }, { "@score":"1", "@id":"5264072", "info":{"authors":{"author":[{"@pid":"10/5776","text":"Taketoshi Ushiama"},{"@pid":"73/6148","text":"Toyohide Watanabe"}]},"title":"A framework for personal content search and recommendation based on personal experiences.","venue":"Int. J. Adv. Intell. Paradigms","volume":"1","number":"2","pages":"151-162","year":"2008","type":"Journal Articles","access":"closed","key":"journals/ijaip/UshiamaW08","doi":"10.1504/IJAIP.2008.024773","ee":"https://doi.org/10.1504/IJAIP.2008.024773","url":"https://dblp.org/rec/journals/ijaip/UshiamaW08"}, "url":"URL#5264072" }, { "@score":"1", "@id":"5264073", "info":{"authors":{"author":{"@pid":"97/6671","text":"Annamária R. Várkonyi-Kóczy"}},"title":"Fuzzy logic supported sketch based image information enhancement.","venue":"Int. J. Adv. Intell. Paradigms","volume":"1","number":"1","pages":"31-39","year":"2008","type":"Journal Articles","access":"closed","key":"journals/ijaip/Varkonyi-Koczy08","doi":"10.1504/IJAIP.2008.020818","ee":"https://doi.org/10.1504/IJAIP.2008.020818","url":"https://dblp.org/rec/journals/ijaip/Varkonyi-Koczy08"}, "url":"URL#5264073" }, { "@score":"1", "@id":"5264074", "info":{"authors":{"author":[{"@pid":"67/1766","text":"Sofia Visa"},{"@pid":"02/1540","text":"Anca L. Ralescu"}]},"title":"Data-driven fuzzy sets for classification.","venue":"Int. J. Adv. Intell. Paradigms","volume":"1","number":"1","pages":"3-30","year":"2008","type":"Journal Articles","access":"closed","key":"journals/ijaip/VisaR08","doi":"10.1504/IJAIP.2008.020817","ee":"https://doi.org/10.1504/IJAIP.2008.020817","url":"https://dblp.org/rec/journals/ijaip/VisaR08"}, "url":"URL#5264074" }, { "@score":"1", "@id":"5264075", "info":{"authors":{"author":[{"@pid":"89/2707","text":"Pandu Ranga Vundavilli"},{"@pid":"38/2098","text":"Dilip Kumar Pratihar"}]},"title":"Inverse dynamics learned gait planner for a two-legged robot moving on uneven terrains using neural networks.","venue":"Int. J. Adv. Intell. Paradigms","volume":"1","number":"1","pages":"80-109","year":"2008","type":"Journal Articles","access":"closed","key":"journals/ijaip/VundavilliP08","doi":"10.1504/IJAIP.2008.020821","ee":"https://doi.org/10.1504/IJAIP.2008.020821","url":"https://dblp.org/rec/journals/ijaip/VundavilliP08"}, "url":"URL#5264075" } ] } } } )