


default search action
Computational Intelligence, Volume 36
Volume 36, Number 1, February 2020
- Pandian Vasant, Gerhard-Wilhelm Weber

, Igor S. Litvinchev:
Editorial. 2-3
- Alireza Goli

, Hasan Khademi Zare
, Reza Tavakkoli-Moghaddam
, Ahmad Sadegheih:
Multiobjective fuzzy mathematical model for a financially constrained closed-loop supply chain with labor employment. 4-34 - Kwon-Hee Lee

, Gyung-Il Jeong
, Seong-Hyeong Lee
:
An approximate optimization strategy using refined hybrid metamodel. 35-54 - Xiangyu Zeng, Stephen Berti

:
New optimization method based on energy management in microgrids based on energy storage systems and combined heat and power. 55-79 - Erfan Babaee Tirkolaee

, Shaghayegh Hadian, Gerhard-Wilhelm Weber
, Iraj Mahdavi:
A robust green traffic-based routing problem for perishable products distribution. 80-101 - Alok Kumar Shukla

:
Identification of cancerous gene groups from microarray data by employing adaptive genetic and support vector machine technique. 102-131 - Wonsiri Punurai

, Md Samdani Azad
, Nantiwat Pholdee
, Sujin Bureerat
, Chana Sinsabvarodom
:
A novel hybridized metaheuristic technique in enhancing the diagnosis of cross-sectional dent damaged offshore platform members. 132-150 - Liuwei Huo, Dingde Jiang

, Zhihan Lv
, Surjit Singh
:
An intelligent optimization-based traffic information acquirement approach to software-defined networking. 151-171 - Akash Tayal, Utku Kose

, Arun Solanki, Anand Nayyar
, Jose Antonio Marmolejo Saucedo
:
Efficiency analysis for stochastic dynamic facility layout problem using meta-heuristic, data envelopment analysis and machine learning. 172-202 - Mario Andrés Paredes-Valverde, Giner Alor-Hernández

, Jorge Luis García-Alcaraz
, María del Pilar Salas-Zárate, Luis Omar Colombo-Mendoza, José Luis Sánchez-Cervantes
:
IntelliHome: An internet of things-based system for electrical energy saving in smart home environment. 203-224 - Mahdi Mir, Mohammad Dayyani, Tole Sutikno

, Morteza Mohammadi Zanjireh
, Navid Razmjooy
:
Employing a Gaussian Particle Swarm Optimization method for tuning Multi Input Multi Output-fuzzy system as an integrated controller of a micro-grid with stability analysis. 225-258 - Shu Gong, Wei Gao

, Francis Abza
:
Brain tumor diagnosis based on artificial neural network and a chaos whale optimization algorithm. 259-275 - Milad Hematian

, Mir Mehdi Seyyed Esfahani, Iraj Mahdavi, Nezam Mahdavi-Amiri
, Javad Rezaeian:
A multiobjective integrated multiproject scheduling and multiskilled workforce assignment model considering learning effect under uncertainty. 276-296 - Süreyya Özögür-Akyüz

, Buse Çisil Otar, Pinar Karadayi Atas:
Ensemble cluster pruning via convex-concave programming. 297-319 - Nibedan Panda

, Santosh Kumar Majhi
:
Improved spotted hyena optimizer with space transformational search for training pi-sigma higher order neural network. 320-350 - Anan Banharnsakun

:
Artificial bee colony algorithm for content-based image retrieval. 351-367
Volume 36, Number 2, May 2020
- Julio Mendoza, Hélio Pedrini:

Detection and classification of lung nodules in chest X-ray images using deep convolutional neural networks. 370-401 - Venkatanareshbabu Kuppili, Diwakar Tripathi

, Damodar Reddy Edla
:
Credit score classification using spiking extreme learning machine. 402-426 - El-Sayed A. El-Dahshan

, Mahmoud M. Bassiouni
:
Intelligent methodologies for cardiac sound signals analysis and characterization in cepstrum and time-scale domains. 427-458 - Nuha Zamzami

, Rua Alsuroji, Oboh Eromonsele, Nizar Bouguila:
Proportional data modeling via selection and estimation of a finite mixture of scaled Dirichlet distributions. 459-485 - Fanghong Jian

, Jimmy Xiangji Huang
, Jiashu Zhao, Zhiwei Ying, Yuqi Wang:
A topic-based term frequency normalization framework to enhance probabilistic information retrieval. 486-521 - Ronan Assumpção Silva

, Alceu de Souza Britto Jr., Fabrício Enembreck
, Robert Sabourin, Luiz Eduardo Soares de Oliveira:
CSBF: A static ensemble fusion method based on the centrality score of complex networks. 522-556 - Anguraj S

, Shantharajah S. P, Jeba Emilyn J
:
A steganographic method based on optimized audio embedding technique for secure data communication in the internet of things. 557-573 - Sergio Peignier

, Christophe Rigotti, Guillaume Beslon
:
Evolutionary subspace clustering using variable genome length. 574-612 - Prasenjit Dutta, Mrinmoy Majumder

, Subhash Chandra Panja:
Optimization of material removal rate in wire EDM by polynomial neural network models. 613-636 - Shubham Dodia

, Damodar Reddy Edla
, Annushree Bablani
, Ramalingaswamy Cheruku
:
Lie detection using extreme learning machine: A concealed information test based on short-time Fourier transform and binary bat optimization using a novel fitness function. 637-658 - Ali Abbaszadeh Sori

, Ali Ebrahimnejad
, Homayun Motameni:
Elite artificial bees' colony algorithm to solve robot's fuzzy constrained routing problem. 659-681 - M. Saravanan

, P. Ganeshkumar:
Routing using reinforcement learning in vehicular ad hoc networks. 682-697 - Fanchao Kong

, Quanxin Zhu:
Antiperiodic dynamical behaviors of discontinuous neutral-type Cohen-Grossberg neural networks with mixed time delays. 698-719 - Lukas Esterle

, Peter R. Lewis:
Distributed autonomy and trade-offs in online multiobject k-coverage. 720-742 - Diego Fernandes de Araújo

, Carlos Eduardo Santos Pires
, Dimas Cassimiro do Nascimento
:
Leveraging active learning to reduce human effort in the generation of ground-truth for entity resolution. 743-772 - G. Sumathi

, Akilandeswari Jeyapal
:
Improved fuzzy weighted-iterative association rule based ontology postprocessing in data mining for query recommendation applications. 773-782 - Arash Chaghari

, Mohammad-Reza Feizi-Derakhshi
, Mohammad Ali Balafar
:
The combination of term relations analysis and weighted frequent itemset model for multidocument summarization. 783-812 - Maria Antony Sahaya Sheela

, Rajendran Prabakaran
:
Improvement of battery lifetime in software-defined network using particle swarm optimization based cluster-head gateway switch routing protocol with fuzzy rules. 813-823 - Bagher Zarei

, Mohammad Reza Meybodi
:
Detecting community structure in complex networks using genetic algorithm based on object migrating automata. 824-860 - Mahesh G. Huddar

, Sanjeev S. Sannakki
, Vijay S. Rajpurohit
:
Multi-level feature optimization and multimodal contextual fusion for sentiment analysis and emotion classification. 861-881
Volume 36, Number 3, August 2020
- Romit S. Beed

, Arindam Roy, Sunita Sarkar
, Durba Bhattacharya
:
A hybrid multi-objective tour route optimization algorithm based on particle swarm optimization and artificial bee colony optimization. 884-909 - Nelly Elsayed

, Anthony S. Maida, Magdy A. Bayoumi:
Reduced-gate convolutional long short-term memory using predictive coding for spatiotemporal prediction. 910-939 - T. Rajesh Kumar

, G. R. Suresh
, S. Kanaga Subaraja, C. Karthikeyan:
Taylor-AMS features and deep convolutional neural network for converting nonaudible murmur to normal speech. 940-963 - Shiju George

, Ajit Kumar Santra:
An improved long short-term memory networks with Takagi-Sugeno fuzzy for traffic speed prediction considering abnormal traffic situation. 964-993 - Ramesh Kumaravelu

, Rajakumar Sadaiyandi, Anandamurugan Selvaraj, Jeeva Selvaraj
, Gayathiri Karthick
:
Computationally efficient and secure anonymous authentication scheme for IoT-based mobile pay-TV systems. 994-1009 - Charanjeet Singh

, Anuj Sharma:
Modified online Newton step based on elementwise multiplication. 1010-1025 - Florentina Hristea, Mihaela Colhon

:
The long road from performing word sense disambiguation to successfully using it in information retrieval: An overview of the unsupervised approach. 1026-1062 - P. Kirubanantham

, G. Vijayakumar
:
Novel recommendation system based on long-term composition for adaptive web services. 1063-1077 - Shilaja Chandrasekaran

:
Multiobjective optimal power flow using interior search algorithm: A case study on a real-time electrical network. 1078-1096 - N. Saranya

, V. Manikandan:
On viability of detecting malwares online using ensemble classification method with performance metrics. 1097-1112 - Emilio Sansano-Sansano

, Raúl Montoliu, Óscar Belmonte Fernández
:
A study of deep neural networks for human activity recognition. 1113-1139 - Shahram Golzari

, Mojtaba Shabani Haji, Abdullah Khalili
:
Selecting effective features on prediction of delay in servicing ships arriving to ports using a combination of Clonal Selection and Grey Wolf Optimization algorithms - Case study: Shahid Rajaee port in Bandar Abbas. 1140-1160 - Ashish Kumar

, Mayank Saini, Aditi Sharan:
Aspect category detection using statistical and semantic association. 1161-1182 - Sze-Teng Liong, Yen-Chang Huang, Shu-Meng Lic, Zhongkai Huang, Jingyang Ma, Yee Siang Gan

:
Automatic traditional Chinese painting classification: A benchmarking analysis. 1183-1199 - Anitha Shanmugam

, Jayanthi Paramasivam:
A two-level authentication scheme for clone node detection in smart cities using Internet of things. 1200-1220 - Sivasankari Narasimhan

, Muthukumar Arunachalam
:
Bio-PUF-MAC authenticated encryption for iris biometrics. 1221-1241 - A Aalan Babu

, V. Mary Anita Rajam:
Water-body segmentation from satellite images using Kapur's entropy-based thresholding method. 1242-1260 - G. Premalatha

, Premanand Venkatesh Chandramani:
Improved gait recognition through gait energy image partitioning. 1261-1274 - K. Dhanasekaran

, P. Anandan, N. Kumaratharan:
A robust image steganography using teaching learning based optimization based edge detection model for smart cities. 1275-1289 - Merlin Linda George

, Themozhi Govindarajan, Angamuthu Rajasekaran Kavitha, Sudheer Reddy Bandi
:
A robust similarity based deep siamese convolutional neural network for gait recognition across views. 1290-1319 - Ornurai Sangsawang

, Sunarin Chanta
:
Capacitated single-allocation hub location model for a flood relief distribution network. 1320-1347 - Shuai Chen, Ling Huang, Zhiwen Lei, Shen Wang:

Research on personalized recommendation hybrid algorithm for interactive experience equipment. 1348-1373 - Santoshinee Mohapatra

, Pabitra Mohan Khilar:
Fault diagnosis in wireless sensor network using negative selection algorithm and support vector machine. 1374-1393 - Selmo Eduardo Rodrigues Junior

, Ginalber Luiz de Oliveira Serra:
Intelligent forecasting of time series based on evolving distributed Neuro-Fuzzy network. 1394-1413 - Sultan Ahmed, Malek Mouhoub

:
Conditional Preference Networks with User's Genuine Decisions. 1414-1442
Volume 36, Number 4, November 2020
- Usha Moorthy

, Usha Devi Gandhi
:
Usha Moorthy, Usha Devi Gandhi: Forest optimization algorithm-based feature selection using classifier ensemble. 1445-1462 - Jing Lu

, Shihong Wu, Zhiyu Xiang, Hanlei Cheng
:
Intelligent document-filling system on mobile devices by document classification and electronization. 1463-1479 - B. Durgalakshmi

, V. Vijayakumar:
Feature selection and classification using support vector machine and decision tree. 1480-1492 - M. Manoj Kumar, A. Alli Rani

, V. Sundaravazhuthi:
A computational algorithm based on biogeography-based optimization method for computing power system security constrains with multi FACTS devices. 1493-1511 - V. Sundaravazhuthi, A. Alli Rani

, M. Manoj Kumar:
A computing method-based rearrangement of network protocols to improvise quality factors of FACTS devices and sensors using Newton-Raphson technique. 1512-1526 - Sathish Kumar Mani, Iyapparaja Meenakshisundaram

:
Improving quality-of-service in fog computing through efficient resource allocation. 1527-1547 - Mohan Annamalai

, Kalaichelvan Gurumurthy:
Neural network prediction of bioleaching of metals from waste computer printed circuit boards using Levenberg-Marquardt algorithm. 1548-1568 - Anandamurugan Selvaraj, Jeeva Selvaraj

, Sivabalakrishnan Maruthaiappan, Gokulnath Chandra Babu
, Priyan Malarvizhi Kumar
:
L1 norm based pedestrian detection using video analytics technique. 1569-1579 - Azath Mubarakali

, Karthik Srinivasan
, Reham Mukhalid, Subash C. B. Jaganathan, Ninoslav Marina
:
Security challenges in internet of things: Distributed denial of service attack detection using support vector machine-based expert systems. 1580-1592 - Xiaobo Peng

, Yanfen Chang:
Energy-efficient routing technique for reliable data transmission under the background of big data for disaster region. 1593-1608 - Yongyi Li

, Zhongqiang Yang, Kaixu Han:
Research on the clustering algorithm of ocean big data based on self-organizing neural network. 1609-1620 - Jianli Cao

, Zhikui Chen, Yuxin Wang, He Guo:
Parallel genetic algorithm for N-Queens problem based on message passing interface-compute unified device architecture. 1621-1637 - Xin Sun

, Xiaomin Ji:
Integrated kitchen design and optimization based on the improved particle swarm intelligent algorithm. 1638-1649 - Yang Song

, Yunzhan Gong:
Web service composition on IoT reliability test based on cross entropy. 1650-1662 - He Yongqiang

:
Study on the algorithm for smart community sensor network routing with adaptive optimization via cluster head election. 1663-1671 - Abdulrahman Saad Alqahtani

:
Lossless data transmission for Internet of things application over wireless multimedia sensor networks using enhanced and optimal path scheduling approach to maximizing the quality of service. 1672-1685 - Ling Sun, Xu Xu, Yanbin Yang

, Wei Liu, Jiahao Jin:
Knowledge mapping of supply chain risk research based on CiteSpace. 1686-1703 - Dong Guo

, Chuantao Wang
:
Sequence recommendation based on deep learning. 1704-1722 - B. Ponmudi

, G. Balasubramanian:
A computational method based on Gustafson-Kessel fuzzy clustering for a novel islanding detection for grid connected devices and sensors. 1723-1736 - Jing Li, Hai Tao

, Liu Shuhong
, Sinan Q. Salih, Jasni Mohamad Zain
, Liu Yankun
, Vivekananda G. N.
, M. Thanjaivadel:
Internet of things assisted condition-based support for smart manufacturing industry using learning technique. 1737-1754 - (Withdrawn) Traffic wave model based on vehicle-infrastructure cooperative and vehicle communication data. 1755-1772

- Lihua Zhang

, Jingjing Li, Fangzhou Hu, Yang Huang, Jiayi Bai:
Smart grid data access control scheme based on blockchain. 1773-1784

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














