


default search action
Computational Intelligence, Volume 35
Volume 35, Number 1, February 2019
- A new unsupervised feature selection algorithm using similarity-based feature clustering. 1

- Xiaoyan Zhu, Yu Wang

, Yingbin Li, Yonghui Tan, Guangtao Wang, Qinbao Song:
A new unsupervised feature selection algorithm using similarity-based feature clustering. 2-22 - Sattar Seifollahi

, Adil M. Bagirov, Ehsan Zare Borzeshi, Massimo Piccardi
:
A simulated annealing-based maximum-margin clustering algorithm. 23-41 - Rosa Aghdam

, Vahid Rezaei Tabar
, Hamid Pezeshk:
Some node ordering methods for the K2 algorithm. 42-58 - Kulandairaj Martin Sagayam

, D. Jude Hemanth
:
A probabilistic model for state sequence analysis in hidden Markov model for hand gesture recognition. 59-81 - Parinaz Sobhani

, Diana Inkpen, Xiaodan Zhu:
Exploring deep neural networks for multitarget stance detection. 82-97 - Amarjeet Prajapati

, Jitender Kumar Chhabra
:
MaDHS: Many-objective discrete harmony search to improve existing package design. 98-123 - Túlio L. Baségio

, Rafael H. Bordini
:
Allocating structured tasks in heterogeneous agent teams. 124-155 - Amer Abu Zaher

, Regina Berretta
, Nasimul Noman, Pablo Moscato:
An adaptive memetic algorithm for feature selection using proximity graphs. 156-183 - Hieu Pham

, Sigurdur Ólafsson:
Bagged ensembles with tunable parameters. 184-203 - Haitao Cheng

, Li Yan, Zongmin Ma
, Slobodan Ribaric:
Fuzzy spatio-temporal ontologies and formal construction based on fuzzy Petri nets. 204-239
Volume 35, Number 2, May 2019
- Christopher J. Matheus

, Aidan Boran, Dominic Carr, Rem W. Collier
, Barnard Kroon, Olga Murdoch, David Lillis
, Michael J. O'Grady
, Gregory M. P. O'Hare
:
Semantic network management for next-generation networks. 285-309 - Hui Zheng

, Jing He
, Yanchun Zhang, Guangyan Huang, Zhenjiang Zhang, Qing Liu:
A general model for fuzzy decision tree and fuzzy random forest. 310-335 - Lei Liu, Rares Vernica, Tamir Hassan

, Niranjan Damera Venkata:
Using text mining for personalization and recommendation for an enriched hybrid learning experience. 336-370
- Diwakar Tripathi

, Damodar Reddy Edla
, Ramalingaswamy Cheruku
, Venkatanareshbabu Kuppili
:
A novel hybrid credit scoring model based on ensemble feature selection and multilayer ensemble classification. 371-394 - Lukás Chrpa

, Mauro Vallati
, Thomas Leo McCluskey:
Inner entanglements: Narrowing the search in classical planning by problem reformulation. 395-429 - Rahul Kala

:
On sampling inside obstacles for boosted sampling of narrow corridors. 430-447 - Ana Fernández Vilas

, Rebeca P. Díaz Redondo
, Mohamed Ben Khalifa:
Analysis of crowds' movement using Twitter. 448-472
Volume 35, Number 3, August 2019
Editorials
- Shaoning Pang

, Xuyun Zhang
, Kazushi Ikeda, Deepak Puthal, Jianxin Li
, Abdolhossein Sarrafzadeh:
Editorial. 474-475
- Xiaolong Xu

, Shucun Fu, Yuan Yuan, Yun Luo, Lianyong Qi
, Wenmin Lin, Wanchun Dou:
Multiobjective computation offloading for workflow management in cloudlet-based mobile cloud using NSGA-II. 476-495 - Wenjing Gao

, Yonghua Zhu, Wenjun Zhang, Ke Zhang, Honghao Gao:
A hierarchical recurrent approach to predict scene graphs from a visual-attention-oriented perspective. 496-516 - Min Li, Shaohua Wan

, Zhongmin Deng, Yajun Wang:
Fabric defect detection based on saliency histogram features. 517-534 - Yirui Wu

, Lianglei Wei, Yucong Duan:
Deep spatiotemporal LSTM network with temporal pattern feature for 3D human action recognition. 535-554 - Meng Liu

, Yun Luo, Priyadarsi Nanda, Shui Yu
, Jianbing Zhang:
Efficient solution to the millionaires' problem based on asymmetric commutative encryption scheme. 555-576 - Shunmei Meng, Qianmu Li, Taoran Wu, Weijia Huang, Jing Zhang, Weimin Li:

A fault-tolerant dynamic scheduling method on hierarchical mobile edge cloud computing. 599-609 - Yuan Zhang, Jin Zhang

, Shan Ju, Lu Qiu
:
Identifying biomarker candidates of influenza infection based on scalable time-course big data of gene expression. 610-624 - Katsuya Ogura

, Yuma Yamada, Shugo Kajita, Hirozumi Yamaguchi
, Teruo Higashino, Mineo Takai:
Ground object recognition and segmentation from aerial image-based 3D point cloud. 625-642 - Zhihua Zhang

, Yuta Takahashi, Manato Fujimoto
, Yutaka Arakawa
, Keiichi Yasumoto
:
Investigating effects of interactive signage-based stimulation for promoting behavior change. 643-668
Volume 35, Number 4, November 2019
- Juan Isidro González Hidalgo

, Bruno Iran Ferreira Maciel
, Roberto S. M. Barros
:
Experimenting with prequential variations for data stream learning evaluation. 670-692 - Hina Tufail, Kashif Zafar

, Abdul Rauf Baig:
Relational database security using digital watermarking and evolutionary techniques. 693-716 - Raghav Prasad Parouha

:
Nonconvex/nonsmooth economic load dispatch using modified time-varying particle swarm optimization. 717-744 - Isabel Cenamor, Mauro Vallati

, Lukás Chrpa
:
On the predictability of domain-independent temporal planners. 745-773 - Muhammad Ibrahim

:
Reducing correlation of random forest-based learning-to-rank algorithms using subsample size. 774-798 - Anu Thomas

, S. Sangeetha
:
An innovative hybrid approach for extracting named entities from unstructured text data. 799-826 - Orlando Muñoz Texzocotetla

, René MacKinney-Romero:
An evolutionary-based approach for dealing with numerical and categorical attributes in ILP. 827-857 - Marco Ponza

, Paolo Ferragina
, Francesco Piccinno:
Swat: A system for detecting salient Wikipedia entities in texts. 858-890 - Vangjel Kazllarof, Stamatis Karlos

, Sotiris Kotsiantis:
Active learning Rotation Forest for multiclass classification. 891-918 - Wisam Elmasry

, Akhan Akbulut, Abdul Halim Zaim
:
Empirical study on multiclass classification-based network intrusion detection. 919-954 - Richard Burns

, Sandra Carberry, Stephanie Elzer Schwartz:
An automated approach for the recognition of intended messages in grouped bar charts. 955-1002 - P. Lingden, Abeer Alsadoon

, P. W. C. Prasad
, Omar Hisham Alsadoon
, Rasha Subhi Ali
, Vinh Tran Quoc Nguyen
:
A novel modified undersampling (MUS) technique for software defect prediction. 1003-1020 - Tian Erlin, Abdol Ghaffar Ebadi

, Dinesh Mavaluru
, Mohammed Alshehri
, Ahmed Abo-Bakr Mohamed
, Behnam Sobhani
:
Parameter derivation of a proton exchange membrane fuel cell based on coevolutionary ribonucleic acid genetic algorithm. 1021-1041 - Muthusami R

, Bharathi A:
Stance detection and mobile app recommendation discourse on tweets. 1042-1059 - Davide Bacciu

, Maurizio Di Rocco, Mauro Dragone
, Claudio Gallicchio
, Alessio Micheli
, Alessandro Saffiotti
:
An ambient intelligence approach for learning in smart robotic environments. 1060-1087 - Aqsa Saeed Qureshi, Asifullah Khan

:
Adaptive transfer learning in deep neural networks: Wind power prediction using knowledge transfer from region to region and between different task domains. 1088-1112 - Tong Wu

, Xinwang Liu
, Jindong Qin:
An interval type-2 fuzzy trust evaluation model in social commerce. 1113-1131

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














