callback( { "result":{ "query":":facetid:toc:\"db/journals/jaciii/jaciii13.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"218.71" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"89", "@dc":"89", "@oc":"89", "@id":"43451575", "text":":facetid:toc:db/journals/jaciii/jaciii13.bht" } }, "hits":{ "@total":"89", "@computed":"89", "@sent":"30", "@first":"0", "hit":[{ "@score":"1", "@id":"5053931", "info":{"authors":{"author":{"@pid":"a/ZaherAlAghbari","text":"Zaher Al Aghbari"}},"title":"Effective Image Mining by Representing Color Histograms as Time Series.","venue":"J. Adv. Comput. Intell. Intell. Informatics","volume":"13","number":"2","pages":"109-114","year":"2009","type":"Journal Articles","access":"open","key":"journals/jaciii/Aghbari09","doi":"10.20965/JACIII.2009.P0109","ee":"https://doi.org/10.20965/jaciii.2009.p0109","url":"https://dblp.org/rec/journals/jaciii/Aghbari09"}, "url":"URL#5053931" }, { "@score":"1", "@id":"5053932", "info":{"authors":{"author":[{"@pid":"92/6784","text":"Sachiyo Arai"},{"@pid":"54/5662","text":"Yoshihisa Ishigaki"}]},"title":"Information Theoretic Approach for Measuring Interaction in Multiagent Domain.","venue":"J. Adv. Comput. Intell. Intell. Informatics","volume":"13","number":"6","pages":"649-657","year":"2009","type":"Journal Articles","access":"open","key":"journals/jaciii/AraiI09","doi":"10.20965/JACIII.2009.P0649","ee":"https://doi.org/10.20965/jaciii.2009.p0649","url":"https://dblp.org/rec/journals/jaciii/AraiI09"}, "url":"URL#5053932" }, { "@score":"1", "@id":"5053933", "info":{"authors":{"author":[{"@pid":"21/3723","text":"Péter Baranyi"},{"@pid":"16/1986","text":"Péter Korondi"},{"@pid":"86/1385","text":"Kazuo Tanaka"}]},"title":"Parallel Distributed Compensation Based Stabilization of A 3-DOF RC Helicopter: A Tensor Product Transformation Based Approach.","venue":"J. Adv. Comput. Intell. Intell. Informatics","volume":"13","number":"1","pages":"25-34","year":"2009","type":"Journal Articles","access":"open","key":"journals/jaciii/BaranyiKT09","doi":"10.20965/JACIII.2009.P0025","ee":"https://doi.org/10.20965/jaciii.2009.p0025","url":"https://dblp.org/rec/journals/jaciii/BaranyiKT09"}, "url":"URL#5053933" }, { "@score":"1", "@id":"5053934", "info":{"authors":{"author":{"@pid":"16/1785","text":"Mokhtar Beldjehem"}},"title":"A Granular Framework for Recognition of Arabic Handwriting.","venue":"J. Adv. Comput. Intell. Intell. Informatics","volume":"13","number":"5","pages":"512-519","year":"2009","type":"Journal Articles","access":"open","key":"journals/jaciii/Beldjehem09","doi":"10.20965/JACIII.2009.P0512","ee":"https://doi.org/10.20965/jaciii.2009.p0512","url":"https://dblp.org/rec/journals/jaciii/Beldjehem09"}, "url":"URL#5053934" }, { "@score":"1", "@id":"5053935", "info":{"authors":{"author":{"@pid":"16/1785","text":"Mokhtar Beldjehem"}},"title":"A Granular Unified Min-Max Fuzzy-Neuro Framework for Learning Fuzzy Systems.","venue":"J. Adv. Comput. Intell. Intell. Informatics","volume":"13","number":"5","pages":"520-528","year":"2009","type":"Journal Articles","access":"open","key":"journals/jaciii/Beldjehem09a","doi":"10.20965/JACIII.2009.P0520","ee":"https://doi.org/10.20965/jaciii.2009.p0520","url":"https://dblp.org/rec/journals/jaciii/Beldjehem09a"}, "url":"URL#5053935" }, { "@score":"1", "@id":"5053936", "info":{"authors":{"author":[{"@pid":"26/7131","text":"Houria Boudouda"},{"@pid":"98/419","text":"Mohamed Nemissi"},{"@pid":"57/5383","text":"Hamid Seridi"},{"@pid":"a/HermanAkdag","text":"Herman Akdag"}]},"title":"Fuzzy-Possibilistic Classification: Resolution of Initialization Problem.","venue":"J. Adv. Comput. Intell. Intell. Informatics","volume":"13","number":"1","pages":"45-51","year":"2009","type":"Journal Articles","access":"open","key":"journals/jaciii/BoudoudaNSA09","doi":"10.20965/JACIII.2009.P0045","ee":"https://doi.org/10.20965/jaciii.2009.p0045","url":"https://dblp.org/rec/journals/jaciii/BoudoudaNSA09"}, "url":"URL#5053936" }, { "@score":"1", "@id":"5053937", "info":{"authors":{"author":{"@pid":"65/7595","text":"Liberato Camilleri"}},"title":"Bias of Standard Errors in Latent Class Model Applications Using Newton-Raphson and EM Algorithms.","venue":"J. Adv. Comput. Intell. Intell. Informatics","volume":"13","number":"5","pages":"537-541","year":"2009","type":"Journal Articles","access":"open","key":"journals/jaciii/Camilleri09","doi":"10.20965/JACIII.2009.P0537","ee":"https://doi.org/10.20965/jaciii.2009.p0537","url":"https://dblp.org/rec/journals/jaciii/Camilleri09"}, "url":"URL#5053937" }, { "@score":"1", "@id":"5053938", "info":{"authors":{"author":[{"@pid":"39/7132","text":"Benhui Chen"},{"@pid":"85/4419","text":"Jinglu Hu"},{"@pid":"60/6177","text":"Lihua Duan"},{"@pid":"46/7130","text":"Yinglong Gu"}]},"title":"Network Administrator Assistance System Based on Fuzzy C-means Analysis.","venue":"J. Adv. Comput. Intell. Intell. Informatics","volume":"13","number":"2","pages":"91-96","year":"2009","type":"Journal Articles","access":"open","key":"journals/jaciii/ChenHDG09","doi":"10.20965/JACIII.2009.P0091","ee":"https://doi.org/10.20965/jaciii.2009.p0091","url":"https://dblp.org/rec/journals/jaciii/ChenHDG09"}, "url":"URL#5053938" }, { "@score":"1", "@id":"5053939", "info":{"authors":{"author":[{"@pid":"93/7595","text":"Agnieszka Cichocka"},{"@pid":"98/5159","text":"Pascal Bruniaux"}]},"title":"Comparison of Traditional 2D and Virtual Patterns Design in 3D.","venue":"J. Adv. Comput. Intell. Intell. Informatics","volume":"13","number":"5","pages":"542-549","year":"2009","type":"Journal Articles","access":"open","key":"journals/jaciii/CichockaB09","doi":"10.20965/JACIII.2009.P0542","ee":"https://doi.org/10.20965/jaciii.2009.p0542","url":"https://dblp.org/rec/journals/jaciii/CichockaB09"}, "url":"URL#5053939" }, { "@score":"1", "@id":"5053940", "info":{"authors":{"author":[{"@pid":"51/5065","text":"Ádám B. Csapó"},{"@pid":"72/6240","text":"Barna Reskó"},{"@pid":"55/6632","text":"Domonkos Tikk"},{"@pid":"21/3723","text":"Péter Baranyi"}]},"title":"Object Categorization Using Biologically Inspired Nodemaps and the HITEC Categorization System.","venue":"J. Adv. Comput. Intell. Intell. Informatics","volume":"13","number":"5","pages":"573-580","year":"2009","type":"Journal Articles","access":"open","key":"journals/jaciii/CsapoRTB09","doi":"10.20965/JACIII.2009.P0573","ee":"https://doi.org/10.20965/jaciii.2009.p0573","url":"https://dblp.org/rec/journals/jaciii/CsapoRTB09"}, "url":"URL#5053940" }, { "@score":"1", "@id":"5053941", "info":{"authors":{"author":[{"@pid":"95/3703","text":"Kenji Funahashi"},{"@pid":"33/7131","text":"Daisuke Kubotani"},{"@pid":"15/6471","text":"Yuji Iwahori"},{"@pid":"21/7134","text":"Koji Tanida"}]},"title":"Virtual Scissors in a Thin Haptic and Force Feedback Environment.","venue":"J. Adv. Comput. Intell. Intell. Informatics","volume":"13","number":"3","pages":"283-288","year":"2009","type":"Journal Articles","access":"open","key":"journals/jaciii/FunahashiKIT09","doi":"10.20965/JACIII.2009.P0283","ee":"https://doi.org/10.20965/jaciii.2009.p0283","url":"https://dblp.org/rec/journals/jaciii/FunahashiKIT09"}, "url":"URL#5053941" }, { "@score":"1", "@id":"5053942", "info":{"authors":{"author":[{"@pid":"67/2147","text":"Eloy Gonzales"},{"@pid":"81/6343","text":"Karla Taboada"},{"@pid":"94/4892","text":"Shingo Mabu"},{"@pid":"11/3108","text":"Kaoru Shimada"},{"@pid":"65/4910","text":"Kotaro Hirasawa"}]},"title":"Combination of Two Evolutionary Methods for Mining Association Rules in Large and Dense Databases.","venue":"J. Adv. Comput. Intell. Intell. Informatics","volume":"13","number":"5","pages":"561-572","year":"2009","type":"Journal Articles","access":"open","key":"journals/jaciii/GonzalesTMSH09","doi":"10.20965/JACIII.2009.P0561","ee":"https://doi.org/10.20965/jaciii.2009.p0561","url":"https://dblp.org/rec/journals/jaciii/GonzalesTMSH09"}, "url":"URL#5053942" }, { "@score":"1", "@id":"5053943", "info":{"authors":{"author":[{"@pid":"93/4016","text":"Yukihiro Hamasuna"},{"@pid":"51/4628","text":"Yasunori Endo"},{"@pid":"72/418","text":"Sadaaki Miyamoto"}]},"title":"On Tolerant Fuzzy c -Means Clustering.","venue":"J. Adv. Comput. Intell. Intell. Informatics","volume":"13","number":"4","pages":"421-428","year":"2009","type":"Journal Articles","access":"open","key":"journals/jaciii/HamasunaEM09","doi":"10.20965/JACIII.2009.P0421","ee":"https://doi.org/10.20965/jaciii.2009.p0421","url":"https://dblp.org/rec/journals/jaciii/HamasunaEM09"}, "url":"URL#5053943" }, { "@score":"1", "@id":"5053944", "info":{"authors":{"author":[{"@pid":"86/7132","text":"Takahiro Haneda"},{"@pid":"05/2091","text":"Shuxue Ding"}]},"title":"Pseudo Online Independent Component Analysis for Dynamical Mixing Using Gradient Optimization.","venue":"J. Adv. Comput. Intell. Intell. Informatics","volume":"13","number":"3","pages":"275-282","year":"2009","type":"Journal Articles","access":"open","key":"journals/jaciii/HanedaD09","doi":"10.20965/JACIII.2009.P0275","ee":"https://doi.org/10.20965/jaciii.2009.p0275","url":"https://dblp.org/rec/journals/jaciii/HanedaD09"}, "url":"URL#5053944" }, { "@score":"1", "@id":"5053945", "info":{"authors":{"author":[{"@pid":"44/2724","text":"Wataru Hashimoto"},{"@pid":"61/5082","text":"Tetsuya Nakamura"},{"@pid":"72/418","text":"Sadaaki Miyamoto"}]},"title":"Comparison and Evaluation of Different Cluster Validity Measures Including Their Kernelization.","venue":"J. Adv. Comput. Intell. Intell. Informatics","volume":"13","number":"3","pages":"204-209","year":"2009","type":"Journal Articles","access":"open","key":"journals/jaciii/HashimotoNM09","doi":"10.20965/JACIII.2009.P0204","ee":"https://doi.org/10.20965/jaciii.2009.p0204","url":"https://dblp.org/rec/journals/jaciii/HashimotoNM09"}, "url":"URL#5053945" }, { "@score":"1", "@id":"5053946", "info":{"authors":{"author":[{"@pid":"70/7131","text":"Hideki Hashizumedag"},{"@pid":"29/7134","text":"Atsuko Mutohdag"},{"@pid":"31/7133","text":"Shohei Katodag"},{"@pid":"99/7134","text":"Tsutomu Kunitachiddag"},{"@pid":"75/7130","text":"Hidenori Itohdag"}]},"title":"Emergence of Cross-Generational Migration Behavior in Multiagent Simulation.","venue":"J. Adv. Comput. Intell. Intell. Informatics","volume":"13","number":"3","pages":"304-311","year":"2009","type":"Journal Articles","access":"open","key":"journals/jaciii/HashizumedagMKKI09","doi":"10.20965/JACIII.2009.P0304","ee":"https://doi.org/10.20965/jaciii.2009.p0304","url":"https://dblp.org/rec/journals/jaciii/HashizumedagMKKI09"}, "url":"URL#5053946" }, { "@score":"1", "@id":"5053947", "info":{"authors":{"author":[{"@pid":"49/3642","text":"Takashi Hasuike"},{"@pid":"41/5512","text":"Hideki Katagiri"},{"@pid":"77/624","text":"Hiroaki Ishii"}]},"title":"Multiobjective Random Fuzzy Linear Programming Problems Based on the Possibility Maximization Model.","venue":"J. Adv. Comput. Intell. Intell. Informatics","volume":"13","number":"4","pages":"373-379","year":"2009","type":"Journal Articles","access":"open","key":"journals/jaciii/HasuikeKI09","doi":"10.20965/JACIII.2009.P0373","ee":"https://doi.org/10.20965/jaciii.2009.p0373","url":"https://dblp.org/rec/journals/jaciii/HasuikeKI09"}, "url":"URL#5053947" }, { "@score":"1", "@id":"5053948", "info":{"authors":{"author":[{"@pid":"04/7596","text":"Yasuyo Hatcho"},{"@pid":"26/6348","text":"Kiyohiko Hattori"},{"@pid":"72/4302","text":"Keiki Takadama"}]},"title":"Time Horizon Generalization in Reinforcement Learning: Generalizing Multiple Q-Tables in Q-Learning Agents.","venue":"J. Adv. Comput. Intell. Intell. Informatics","volume":"13","number":"6","pages":"667-674","year":"2009","type":"Journal Articles","access":"open","key":"journals/jaciii/HatchoHT09","doi":"10.20965/JACIII.2009.P0667","ee":"https://doi.org/10.20965/jaciii.2009.p0667","url":"https://dblp.org/rec/journals/jaciii/HatchoHT09"}, "url":"URL#5053948" }, { "@score":"1", "@id":"5053949", "info":{"authors":{"author":[{"@pid":"72/7132","text":"Mitsuhiro Hayase"},{"@pid":"00/3933","text":"Susumu Shimada"}]},"title":"Posture Estimation of a Human Body from Thermal Images of 2D Appearance Models of 3D Ellipsoidal Model.","venue":"J. Adv. Comput. Intell. Intell. Informatics","volume":"13","number":"3","pages":"172-177","year":"2009","type":"Journal Articles","access":"open","key":"journals/jaciii/HayaseS09","doi":"10.20965/JACIII.2009.P0172","ee":"https://doi.org/10.20965/jaciii.2009.p0172","url":"https://dblp.org/rec/journals/jaciii/HayaseS09"}, "url":"URL#5053949" }, { "@score":"1", "@id":"5053950", "info":{"authors":{"author":[{"@pid":"94/4309","text":"Isao Hayashi"},{"@pid":"331/2767","text":"Takashi Kobayashi"},{"@pid":"73/2788","text":"Yoshinori Arai"},{"@pid":"29/3002","text":"Toshiyuki Maeda"},{"@pid":"05/4240","text":"Atsushi Inoue"}]},"title":"Optimal Location of Wireless LAN Access Points Using Fuzzy ID3.","venue":"J. Adv. Comput. Intell. Intell. Informatics","volume":"13","number":"2","pages":"128-134","year":"2009","type":"Journal Articles","access":"open","key":"journals/jaciii/HayashiKAMI09","doi":"10.20965/JACIII.2009.P0128","ee":"https://doi.org/10.20965/jaciii.2009.p0128","url":"https://dblp.org/rec/journals/jaciii/HayashiKAMI09"}, "url":"URL#5053950" }, { "@score":"1", "@id":"5053951", "info":{"authors":{"author":[{"@pid":"98/2994","text":"Seiichi Ikeda"},{"@pid":"57/6084","text":"Yoshiharu Sato"}]},"title":"Kernel Canonical Discriminant Analysis Based on Variable Selection.","venue":"J. Adv. Comput. Intell. Intell. Informatics","volume":"13","number":"4","pages":"416-420","year":"2009","type":"Journal Articles","access":"open","key":"journals/jaciii/IkedaS09","doi":"10.20965/JACIII.2009.P0416","ee":"https://doi.org/10.20965/jaciii.2009.p0416","url":"https://dblp.org/rec/journals/jaciii/IkedaS09"}, "url":"URL#5053951" }, { "@score":"1", "@id":"5053952", "info":{"authors":{"author":[{"@pid":"91/7132","text":"Takahiro Imabeppu"},{"@pid":"74/2907","text":"Shigeru Nakayama"},{"@pid":"60/890","text":"Satoshi Ono"}]},"title":"Experimental Study on Pair Swap Strategy in Quantum-Inspired Evolutionary Algorithm.","venue":"J. Adv. Comput. Intell. Intell. Informatics","volume":"13","number":"2","pages":"97-108","year":"2009","type":"Journal Articles","access":"open","key":"journals/jaciii/ImabeppuNO09","doi":"10.20965/JACIII.2009.P0097","ee":"https://doi.org/10.20965/jaciii.2009.p0097","url":"https://dblp.org/rec/journals/jaciii/ImabeppuNO09"}, "url":"URL#5053952" }, { "@score":"1", "@id":"5053953", "info":{"authors":{"author":[{"@pid":"11/7134","text":"Takeshi Inaba"},{"@pid":"30/5432","text":"Lifeng He"},{"@pid":"99/5441-1","text":"Kenji Suzuki 0001"},{"@pid":"91/3933","text":"Kazuhito Murakami"},{"@pid":"04/182","text":"Yuyan Chao"}]},"title":"A Genetic-Algorithm-Based Temporal Subtraction for Chest Radiographs.","venue":"J. Adv. Comput. Intell. Intell. Informatics","volume":"13","number":"3","pages":"289-296","year":"2009","type":"Journal Articles","access":"open","key":"journals/jaciii/InabaHSMC09","doi":"10.20965/JACIII.2009.P0289","ee":"https://doi.org/10.20965/jaciii.2009.p0289","url":"https://dblp.org/rec/journals/jaciii/InabaHSMC09"}, "url":"URL#5053953" }, { "@score":"1", "@id":"5053954", "info":{"authors":{"author":[{"@pid":"27/1754","text":"Masashi Ito"},{"@pid":"07/6599","text":"Tomohiro Ohno"},{"@pid":"44/4331","text":"Shigeki Matsubara"}]},"title":"Text-Style Conversion of Speech Transcript into Web Document for Lecture Archive.","venue":"J. Adv. Comput. Intell. Intell. Informatics","volume":"13","number":"4","pages":"499-505","year":"2009","type":"Journal Articles","access":"open","key":"journals/jaciii/ItoOM09","doi":"10.20965/JACIII.2009.P0499","ee":"https://doi.org/10.20965/jaciii.2009.p0499","url":"https://dblp.org/rec/journals/jaciii/ItoOM09"}, "url":"URL#5053954" }, { "@score":"1", "@id":"5053955", "info":{"authors":{"author":{"@pid":"15/6841","text":"Ryotaro Kamimura"}},"title":"Relative Relaxation and Weighted Information Loss to Simplify and Stabilize Feature Detection.","venue":"J. Adv. Comput. Intell. Intell. Informatics","volume":"13","number":"4","pages":"489-498","year":"2009","type":"Journal Articles","access":"open","key":"journals/jaciii/Kamimura09","doi":"10.20965/JACIII.2009.P0489","ee":"https://doi.org/10.20965/jaciii.2009.p0489","url":"https://dblp.org/rec/journals/jaciii/Kamimura09"}, "url":"URL#5053955" }, { "@score":"1", "@id":"5053956", "info":{"authors":{"author":[{"@pid":"89/1004","text":"Stephen Karungaru"},{"@pid":"35/3234","text":"Takuya Akashi"},{"@pid":"51/1137","text":"Minoru Fukumi"},{"@pid":"66/6091","text":"Norio Akamatsu"}]},"title":"Image Morphing and Warping: Application to Speech Simulation Using a Single Image.","venue":"J. Adv. Comput. Intell. Intell. Informatics","volume":"13","number":"4","pages":"441-446","year":"2009","type":"Journal Articles","access":"open","key":"journals/jaciii/KarungaruAFA09","doi":"10.20965/JACIII.2009.P0441","ee":"https://doi.org/10.20965/jaciii.2009.p0441","url":"https://dblp.org/rec/journals/jaciii/KarungaruAFA09"}, "url":"URL#5053956" }, { "@score":"1", "@id":"5053957", "info":{"authors":{"author":[{"@pid":"75/667","text":"Kosuke Kato"},{"@pid":"84/643","text":"Masatoshi Sakawa"},{"@pid":"14/6030","text":"Keiichi Ishimaru"},{"@pid":"00/1260","text":"Satoshi Ushiro"}]},"title":"Operation Planning of District Heating and Cooling Plants Considering Contract Violation Penalties.","venue":"J. Adv. Comput. Intell. Intell. Informatics","volume":"13","number":"3","pages":"185-192","year":"2009","type":"Journal Articles","access":"open","key":"journals/jaciii/KatoSIU09","doi":"10.20965/JACIII.2009.P0185","ee":"https://doi.org/10.20965/jaciii.2009.p0185","url":"https://dblp.org/rec/journals/jaciii/KatoSIU09"}, "url":"URL#5053957" }, { "@score":"1", "@id":"5053958", "info":{"authors":{"author":{"@pid":"22/4102","text":"Kazuhiko Kawamoto"}},"title":"Hierarchical Bayesian Modeling for Estimating Shared Hidden States with Application to Tracking.","venue":"J. Adv. Comput. Intell. Intell. Informatics","volume":"13","number":"2","pages":"80-85","year":"2009","type":"Journal Articles","access":"open","key":"journals/jaciii/Kawamoto09","doi":"10.20965/JACIII.2009.P0080","ee":"https://doi.org/10.20965/jaciii.2009.p0080","url":"https://dblp.org/rec/journals/jaciii/Kawamoto09"}, "url":"URL#5053958" }, { "@score":"1", "@id":"5053959", "info":{"authors":{"author":[{"@pid":"95/1827","text":"Haruki Kawanaka"},{"@pid":"44/1539","text":"Fuminori Matsubara"},{"@pid":"15/6471","text":"Yuji Iwahori"}]},"title":"Soccer Player'fs Pose Recognition by Creative Search for Generating Free Viewpoint Images.","venue":"J. Adv. Comput. Intell. Intell. Informatics","volume":"13","number":"3","pages":"193-203","year":"2009","type":"Journal Articles","access":"open","key":"journals/jaciii/KawanakaMI09","doi":"10.20965/JACIII.2009.P0193","ee":"https://doi.org/10.20965/jaciii.2009.p0193","url":"https://dblp.org/rec/journals/jaciii/KawanakaMI09"}, "url":"URL#5053959" }, { "@score":"1", "@id":"5053960", "info":{"authors":{"author":{"@pid":"12/5107","text":"Masaomi Kimura"}},"title":"The Method to Analyze Freely Described Data from Questionnaires.","venue":"J. Adv. Comput. Intell. Intell. Informatics","volume":"13","number":"3","pages":"268-274","year":"2009","type":"Journal Articles","access":"open","key":"journals/jaciii/Kimura09","doi":"10.20965/JACIII.2009.P0268","ee":"https://doi.org/10.20965/jaciii.2009.p0268","url":"https://dblp.org/rec/journals/jaciii/Kimura09"}, "url":"URL#5053960" } ] } } } )