


default search action
CI 2005: Calgary, Alberta, Canada
- M. H. Hamza:

IASTED International Conference on Computational Intelligence, Calgary, Alberta, Canada, July 4-6, 2005. IASTED/ACTA Press 2005, ISBN 0-88986-481-0
Fuzzy Systems
- Ming-Shing Hsieh, Din-Chang Tseng:

Multiresolution Image Watermarking using Fuzzy Inference Filter. Computational Intelligence 2005: 1-5 - Wen-Jer Chang, Wei Chang:

Fuzzy Control of Continuous Time-Delay Affine T-S Fuzzy Systems with Robust Constraints. Computational Intelligence 2005: 6-11 - James F. Smith III:

Fuzzy Logic Planning and Control for Cooperative Autonomous Teams of Robots. Computational Intelligence 2005: 12-18 - France Cheong, Richard Lai:

Tuning Fuzzy Logic Controllers using Control Tables. Computational Intelligence 2005: 19-24 - Sheng-Tun Li, Yi-Chung Cheng:

A Deterministic Forecasting Model for Fuzzy Time Series. Computational Intelligence 2005: 25-30 - Syed Atif Mehdi, Abdul Rauf Baig:

Automatic Generation and Optimization of Fuzzy Rules. Computational Intelligence 2005: 31-35 - Bozena Malysiak, Dariusz Mrozek, Stanislaw Kozielski:

Processing Fuzzy SQL Queries with Flat, Context-Dependent and Multidimensional Membership Functions. Computational Intelligence 2005: 36-41 - Robert J. Sárfi, Ashu M. G. Solo:

Integration of Numerical Methods in a Hybrid Fuzzy Knowledge-based System for Multiobjective Optimization of Power Distribution System Operations. Computational Intelligence 2005: 42-49
Neural Networks I
- Jessica Marie Crane, Ming Zhang:

Data Simulation using SINCHONN Model. Computational Intelligence 2005: 50-55 - Ming Zhang:

A Data Simulation System using Sinx/x and SINX Polynomial Higher Order Neural Networks. Computational Intelligence 2005: 56-61 - Bruce J. Vanstone, Gavin R. Finnie, Clarence N. W. Tan:

Evaluating the Application of Neural Networks and Fundamental Analysis in the Australian Stockmarket. Computational Intelligence 2005: 62-63 - G. T. Raju, Suresh Khandige:

ART Neural Network based Clustering Agent for User Access Patterns. Computational Intelligence 2005: 68-72 - Marlon R. de Gouvêa, Eduardo S. Figueiredo, Benjamin Rodrigues de Menezes, Lane Maria Rabelo Baccarini, A. V. Pires, Walmir M. Caminhas:

A New Neurofuzzy Controller Applied to Vector Control of Induction Motors. Computational Intelligence 2005: 73-78 - Thomas E. Portegys:

An Application of Context-Learning in a Goal-Seeking Neural Network. Computational Intelligence 2005: 79-84
Clustering Algorithms, Identification, and Data Mining
- Louis Massey:

Evaluating and Comparing Text Clustering Results. Computational Intelligence 2005: 85-90 - Tsunenori Ishioka:

An Expansion of X-Means for Automatically Determining the Optimal Number of Clusters a^EUR" Progressive Iterations of K-Means and Merging of the Clusters. Computational Intelligence 2005: 91-96 - Oscar L. Chacón, Nancy R. Padilla, Ernesto Vázquez:

Support Vector Classification through a Clustering Process. Computational Intelligence 2005: 97-103 - Lili He, Hongtao Bai, Chengquan Hu, Hu Shi, Fei Song:

ICHAMELEON: An Incremental CHAMELEON Algorithm. Computational Intelligence 2005: 104-107 - Naushad UzZaman, Mumit Khan:

A Double Metaphone Encoding for Approximate Name Searching and Matching in Bangla. Computational Intelligence 2005: 108-113 - Wei Zhang, Fu-Chun Sun:

An Improved FCM Algorithm based on Search Space Smoothing. Computational Intelligence 2005: 114-118 - Mansoor Karimifar, Kaveh E. Afshari:

Online Performance Control of Spark Ignition Engines. Computational Intelligence 2005: 119-123 - Ricardo Timarán Pereira, Marta Millán:

EquipAsso: An Algorithm based on New Relational Algebraic Operators for Association Rules Discovery. Computational Intelligence 2005: 124-128 - Robert A. Ellen, Duncan A. Campbell:

A Framework for Executing Computational Intelligence over Distributed Embedded Nodes. Computational Intelligence 2005: 129-134
Multi-Agent Systems
- Kenneth A. Hawick, Heath A. James, C. J. Scogings:

Manual and Semi-Automated Classification in a Microscopic Artificial Life Model. Computational Intelligence 2005: 135-140 - Holger Kasinger, Bernhard Bauer:

Towards a Model-Driven Software Engineering Methodology for Organic Computing Systems. Computational Intelligence 2005: 141-146 - Roberto A. Flores, Robert C. Kremer:

Commitment-based Conversation Protocols. Computational Intelligence 2005: 147-152 - Mike Emery, John T. Paxton, Rick Donovan:

Application and Testing of a Cougaar Agent-based Architecture. Computational Intelligence 2005: 153-157 - Jason Heard, Robert C. Kremer:

Practical Issues in Detecting Broken Social Commitments. Computational Intelligence 2005: 158-163 - Altion Simo, Koji Kitamura, Yoshifumi Nishida:

Behavior based Children Accidents' Simulation and Visualization: Planning the Emergent Situations. Computational Intelligence 2005: 164-169 - Toshihiro Matsui, Hiroshi Matsuo:

Applying Distributed Constraint Optimization Method to Dynamic Problem. Computational Intelligence 2005: 170-175 - Nora Houari, Behrouz Homayoun Far:

DIBRA: A New Methodology to Autonomous and Interactive Software Agents Development. Computational Intelligence 2005: 176-181 - Yunfei Li:

The Implementation of Remote Diagnosis in STR22FTM based on Mobile Agent. Computational Intelligence 2005: 182-186
Neural Networks II
- Daniel Fitzgerald, Rodney Walker, Duncan A. Campbell:

A Computationally Intelligent Framework for UAV Forced Landings. Computational Intelligence 2005: 187-192 - Yen-Ping Chen, Jeen-Shing Wang:

An Automated Hammerstein Recurrent Neural Network for Dynamic Applications. Computational Intelligence 2005: 193-198 - Penchen Chou, AnTzer Dzen, SongChin Hsieh:

Neural Assisted PID Controllers Design for Control Systems. Computational Intelligence 2005: 199-204 - Chih-Chou Chiu, Chih-Yi Liaw, Chung-Min Wu:

Applying Hierarchical Bayesian Neural Network Approach in Failure Time Prediction. Computational Intelligence 2005: 205-208 - Sven E. Anderson:

Learning Precise Spike Times in a Two-Variable Spiking Neural Model. Computational Intelligence 2005: 209-213 - Praveen Koduru, William H. Hsu, Sanjoy Das, Stephen M. Welch, Judith L. Roe:

Dynamic System Prediction using Temporal Artificial Neural Networks and Multi-Objective Genetic Algorithms. Computational Intelligence 2005: 214-219 - Tarik A. Rashid, M. Tahar Kechadi:

Neural Network Effective Approach for Energy Load Forecasting. Computational Intelligence 2005: 220-225
Learning Algorithms
- Masayuki Kobayashi, Yasuo Konishi, Sadao Fujita, Hiroyuki Ishigaki:

Position Control of Ultrasonic Motor using Support Vector Regression. Computational Intelligence 2005: 226-231 - Guang-Bin Huang, Nan-Ying Liang, Hai-Jun Rong, Paramasivan Saratchandran, Narasimhan Sundararajan:

On-Line Sequential Extreme Learning Machine. Computational Intelligence 2005: 232-237 - I. D. Ashdown, Richard J. Mitchell:

Dynamic Automata for Mobile Robot Learning. Computational Intelligence 2005: 238-243 - Mohammad A. Al-Akhras:

Reinforcement Learning Approach of a Multi-Model Controller. Computational Intelligence 2005: 244-249 - Nicola Ancona, Annarita D'Addabbo, Sabino Liuni, Graziano Pesole, Rosalia Maglietta:

SVM and RLS Models for Cancer Classification. Computational Intelligence 2005: 250-255 - Ning Xiong, Peter Funk:

A Novel Framework for Similarity Modeling in Case based Reasoning. Computational Intelligence 2005: 256-261 - Farhang Sahba, Hamid R. Tizhoosh, Magdy M. A. Salama:

Using Reinforcement Learning for Filter Fusion in Image Enhancement. Computational Intelligence 2005: 262-266
Intelligent Systems and Security I
- James F. Peters, Christopher J. Henry, Sheela Ramanna:

Reinforcement Learning with Pattern-based Rewards. Computational Intelligence 2005: 267-272 - Kouji Kozaki, Yoshinobu Kitamura, Riichiro Mizoguchi:

Developing Ontology-based Applications using Hozo. Computational Intelligence 2005: 273-277 - R. Mahesh K. Sinha:

Interpreting Unknown Words in Machine Translation from Hindi to English. Computational Intelligence 2005: 278-282 - Jeong-Yon Shim:

Automatic Filtering System for Analyzing Customer's Tastes. Computational Intelligence 2005: 283-287 - Huey-Ming Lee, Shih-Feng Liao, Shu-Yen Lee:

A Gene-based Early Warning Model in Home Network Control. Computational Intelligence 2005: 288-291 - Ariuna Damba, Shigeyoshi Watanabe:

Policy Control in Multiagent System. Computational Intelligence 2005: 292-297
Genetic Algorithms and Swarm Particle Optimization I
- Carlo Bruni, Claudia Ferrone, Matteo Lucchetti:

A Population Set-based Global Optimization Procedure Characterized by a Births Control Strategy. Computational Intelligence 2005: 298-303 - James F. Smith III:

Reverse Engineering through Genetic Program based Data Mining. Computational Intelligence 2005: 304-309 - Chen-Chien James Hsu, Shih-Chi Chang, Hsin-Yen Kuo:

Discrete Modeling of Uncertain Continuous Systems having an Interval Structure using Genetic Algorithms. Computational Intelligence 2005: 310-315 - Jeffrey K. Elser, John T. Paxton:

A Search Engine That Learns. Computational Intelligence 2005: 316-320 - Abdul W. Abid, Farooq Azam, Sarfraz Khan:

Genetic Algorithms based Design of a Radar Tracker for Stressful Environments. Computational Intelligence 2005: 321-326 - Grzegorz Drzadzewski, Mark Wineberg:

A Comparison between Dynamic Weighted Aggregation and NSGA-II for Multi-Objective Evolutionary Algorithms. Computational Intelligence 2005: 327-331
Intelligent Systems and Security II
- Zili Hu, Bill Cupp, Connie Lightfoot:

Innovative Thinking: Programming - A Job for Nonprogrammers? Computational Intelligence 2005: 333-336 - Doaa Nabil, Abeer El-Korany, Ahmed Sharaf Eldin Ahmed:

Quality Measuring Model for KADS-based Expert Systems. Computational Intelligence 2005: 337-341 - Wilson Wong, Halizah Basiron, Shahrin Sahib, Ong-Sing Goh:

Intelligent Responses Through Network-based Answer Discovery with Advanced Reasoning. Computational Intelligence 2005: 342-347 - Jian Leng, DongQin Xie, Kibaya Erisania:

Efforts Towards PKI Interoperability: A Case of Bridge CA Construction in China. Computational Intelligence 2005: 348-353 - Francisco Hernández Quiroz, Raymundo Morado:

Some Assumptions about Problem Solving Method in Turing's Model of Intelligence. Computational Intelligence 2005: 354-358 - Sattar J. Aboud, Mohammad Ahmed Al-Fayoumi:

Two Efficient RSA Digital Multisignature and Blind Multisignature Schemes. Computational Intelligence 2005: 359-362
Genetic Algorithms and Swarm Particle Optimization II
- Sheng-Chai Chi:

An Evolutionary Approach for Cellular Manufacturing System Design. Computational Intelligence 2005: 363-368 - Sixto E. García, Maarouf Saad, Ouassima Akhri:

Detecting Convergence in Genetic Algorithms with Decreasing Mutation Policies. Computational Intelligence 2005: 369-374 - Damian Mongru, Christian W. Dawson:

An Empirical Study of Schemata and the I2GA. Computational Intelligence 2005: 375-380 - J. Neal Richter, John T. Paxton:

Adaptive Evolutionary Algorithms on Unitation, Royal Road and Longpath Functions. Computational Intelligence 2005: 381-386 - Li Lin, Longbing Cao, Chengqi Zhang:

Genetic Algorithms for Robust Optimization in Financial Applications. Computational Intelligence 2005: 387-391 - Schalk Kok, Daniel N. Wilke, Albert A. Groenwold:

Recent Developments of the Particle Swarm Optimization Algorithm. Computational Intelligence 2005: 392-397
Pattern Recognition and Computer Vision
- Jeffrey C. Bailey, Ming Zhang:

Three-Threshold Hysteresis Method for Human Shoulder Detection in Complex Images. Computational Intelligence 2005: 398-403 - Jinzhao Wu, Wenyin Zhang, Zhenbing Zeng:

Automatic Generation of Mathematical Expressions of Printed Chinese Characters. Computational Intelligence 2005: 404-408 - F. H. Alhadi, W. Fakhr, Ahmed Farag Seddik:

Hidden Markov Models for Face Recognition. Computational Intelligence 2005: 409-413 - Zbigniew Les, Magdalena Les:

SUS: Interpretation of the Mathematical Objects. Computational Intelligence 2005: 414-419 - Mikko T. Syrjäsuo, Eric F. Donovan:

Using Relevance Feedback in Retrieving Auroral Images. Computational Intelligence 2005: 420-425 - Oscar Ibáñez-Orozco, Suemi Rodríguez-Romo:

Digital Reaction Diffusion Systems in an Excitable Medum for Fingerprint Enhancement. Computational Intelligence 2005: 426-431 - Sharmin Nilufar, Liang Chen, A. R. Shoyeb Ahmed Siddique:

Efficient Image Retrieval System based on Differential Latent Semantic Index. Computational Intelligence 2005: 432-437 - Brian R. Williams, Ming Zhang:

Multiple Dimension Chrominance Model for Background Subtraction. Computational Intelligence 2005: 438-443 - Taira Nakajima:

Memory-based State Prediction in Statistical Visual Object Tracking. Computational Intelligence 2005: 444-449 - Yu-lung Lo, Chun-yu Chen:

Parallel Non-Trivial Repeating Pattern Discovering for Music Data. Computational Intelligence 2005: 450-455 - Nicos G. Pavlidis, Dimitris K. Tasoulis, Michael N. Vrahatis:

Time Series Forecasting Methodology for Multiple-Step-Ahead Prediction. Computational Intelligence 2005: 456-461

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














