![](https://dblp.uni-trier.de/img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 20 matches
- 2018
- Ahmed Fouad Ali
, Mohamed A. Tawhid:
Hybrid bat algorithm and direct search methods for solving minimax problems. Int. J. Hybrid Intell. Syst. 14(4): 209-223 (2018) - Isaac de L. Oliveira Filho, Anne M. P. Canuto, Benjamín R. C. Bedregal
, Francisco Dantas:
Increasing data accuracy in biometric authentication systems: An exploratory study using papilio algorithm on fuzzy schemes. Int. J. Hybrid Intell. Syst. 14(4): 239-253 (2018) - Sepideh Khajeh Haghverdi, Hedieh Sajedi, Sahamedin Bahrami Nasab:
Detecting Nash equilibria of strategic games by Vortex Search algorithm. Int. J. Hybrid Intell. Syst. 14(4): 225-232 (2018) - Youssef Harmouch, Rachid El Kouch:
Statistical properties for sequence produced by pseudorandom number generator used in well-known stream cipher. Int. J. Hybrid Intell. Syst. 14(4): 255-269 (2018) - Latifa Oulladji, Kamel Feraoun, Mohamed Batouche, Ajith Abraham:
Arabic text detection using ensemble machine learning. Int. J. Hybrid Intell. Syst. 14(4): 233-238 (2018) - 2017
- Ehsan Aghaei, Gürsel Serpen:
Ensemble classifier for misuse detection using N-gram feature vectors through operating system call traces. Int. J. Hybrid Intell. Syst. 14(3): 141-154 (2017) - Imran Ali, Millie Pant, U. S. Rana:
Relative performance assessment of academic departments of higher educational institute using DEA with sensitivity analysis. Int. J. Hybrid Intell. Syst. 14(3): 181-191 (2017) - Chitresh Banerjee, Arpita Banerjee, S. K. Sharma:
Estimating influence of threat using Misuse Case Oriented Quality Requirements (MCOQR) metrics: Security requirements engineering perspective. Int. J. Hybrid Intell. Syst. 14(1-2): 1-11 (2017) - Sourav Banerjee, Akash Chowdhury, Swastik Mukherjee, Utpal Biswas:
An approach towards development of an intelligent cloudlet scheduling mechanism for Cloud QoS improvement. Int. J. Hybrid Intell. Syst. 14(1-2): 21-30 (2017) - Lídio Mauro Lima de Campos:
Optimization strategy of neural networks based on rational agents. Int. J. Hybrid Intell. Syst. 14(3): 99-112 (2017) - Hafiz Muhammad Faisal, Munir Ahmad, Sohail Asghar, Atta Rahman:
Intelligent quranic story builder. Int. J. Hybrid Intell. Syst. 14(1-2): 41-48 (2017) - Preeti Gupta, Tarun Kumar Sharma, Deepti Mehrotra:
Implementation of Genetic Algorithm for developing knowledge centric environment in higher education. Int. J. Hybrid Intell. Syst. 14(1-2): 13-19 (2017) - Heba F. Eid, Ajith Abraham:
Plant species identification using leaf biometrics and swarm optimization: A hybrid PSO, GWO, SVM model. Int. J. Hybrid Intell. Syst. 14(3): 155-165 (2017) - Isibor Kennedy Ihianle
, Usman Naeem, Syed Islam, Abdel-Rahman H. Tawil:
Recognising activities of daily living from patterns of object use. Int. J. Hybrid Intell. Syst. 14(3): 193-208 (2017) - Akshi Kumar, Shivali Goel:
A survey of evolution of image captioning techniques. Int. J. Hybrid Intell. Syst. 14(3): 123-139 (2017) - Akshi Kumar, Divya Gupta:
Paradigm shift from conventional software quality models to web based quality models. Int. J. Hybrid Intell. Syst. 14(3): 167-179 (2017) - Lopa Mandal, Samar Bhattacharya, Pramatha Nath Basu:
An approach to incorporate teachers' individual teaching and evaluation strategies and experience in tutoring model of an Intelligent Tutoring System. Int. J. Hybrid Intell. Syst. 14(3): 113-121 (2017) - Kingsley Okoye
, Usman Naeem, Syed Islam:
Semantic fuzzy mining: Enhancement of process models and event logs analysis from syntactic to conceptual level. Int. J. Hybrid Intell. Syst. 14(1-2): 67-98 (2017) - Dilip Kumar Pratihar, Bitan Pratihar
:
A review on applications of soft computing in design and development of intelligent autonomous robots. Int. J. Hybrid Intell. Syst. 14(1-2): 49-65 (2017) - Vibhav Prakash Singh, Rajeev Srivastava:
Content-based mammogram retrieval using wavelet based complete-LBP and K-means clustering for the diagnosis of breast cancer. Int. J. Hybrid Intell. Syst. 14(1-2): 31-39 (2017)
loading more results
failed to load more results, please try again later
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2025-02-11 10:51 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint