default search action
International Journal of Reasoning-based Intelligent Systems, Volume 10
Volume 10, Number 1, 2018
- Jinxing Niu, Hengcan Li:
An effective foggy image acquisition algorithm in multimedia big data era. 4-10 - Jie Li:
An effective system layout planning method for railway logistics centre in the background of big data. 11-19 - Kaiyan Han, Wang Qin:
The development and popularisation of network platform of college sports venues in intelligent manufacturing. 20-25 - Kun Liu:
Bi-level optimisation model for greener transportation with intelligent transport system. 26-31 - Wei Song, Shiwei Zhang, Lizhen Liu, Hanshi Wang:
Personalised ranking online reviews based on user individual preferences. 32-42 - Xiaokan Wang, Hairong Dong, Xiuming Yao, Xubin Sun:
Fuzzy self-learning control of glass tempering and annealing temperature based on the optimised genetic big data analysis algorithm. 43-50 - Ye-gang Chen, Jun Luo, Xiao-rong Diao, Xingyan Yao:
A medical big data analysis algorithm based on access control system. 51-58 - Lionel J. Khalil, Marie G. Khair:
Social network analysis: friendship inferred by chosen courses, commuting time and student performance at university. 59-67 - Xia Wendong, Yuanfeng Liu, Deli Chen:
Design of public bicycle scheduling model based on data mining algorithm. 68-76
Volume 10, Number 2, 2018
- Youwei Shao:
Clustering algorithm for wireless sensor network to improve the efficiency of acnode. 77-82 - Tao Duan, Ang Wang:
Fuzzy neural network learning based on hierarchical agglomerative T-S fuzzy inference. 83-89 - Zou Yu, Qin Zhong Ping:
Key data for cloud computing based on ensemble clustering approximate analysis. 90-95 - Chunzhou Niu, Yukai Zhu:
Design of unsupervised facial expression animation based on geometric grid measurement. 96-101 - Shanhui Sun, Hong Li, Zhuangzhuang Li, Bingqiu Zhang:
Factor analysis model of the result of hospitalised patients with neurosis. 102-108 - Cai Liang:
Multi-criteria decision making method based on analytic hierarchy process with intuitionistic fuzzy preference information. 109-116 - XuGuang Zhu, Yuzhi Shen:
MapReduce optimisation information query method for file management system. 117-121 - Long Zhuo-Qun:
Dynamic path planning of mobile robot based on ant colony algorithm. 122-127 - Gong Xun, Lin Suxia:
Construction of evaluation system of sports talent training scheme based on data mining. 128-133 - Haiyan Wang:
Design of college students' physique monitoring and service platform based on computer and network. 134-138 - Cai Liang:
Decision making model of energy consumption based on multi uncertain factors. 139-143 - Tang JunYong, Chen Xiang:
WSNs heterogeneous cluster routing based on distributed fuzzy logic inference. 144-148 - Xin Xiong, Li Kefeng:
Facial feature extraction based on principal component analysis and class independent kernel sparse representation. 149-154 - Hanane Bais, Mustapha Machkour, Lahcen Koutti:
An Arabic natural language interface for querying relational databases based on natural language processing and graph theory methods. 155-165
Volume 10, Numbers 3/4, 2018
- S. Murugesh, A. Jaya:
Exploiting ontology to map requirements derived from informal descriptions. 169-173 - S. Jayachitra, G. Baskar, T. Feridinand:
Application of mutation inspired constrained factor PSO considering voltage stability and losses by locating and rating TCSC during N-1 contingency. 174-182 - Gokulnath Chandra Babu, Shantharajah S. Periyasamy:
Survey on data analytics techniques in healthcare using IOT platform. 183-196 - Ramya Govindaraj, Anand Mahendran:
Octagonal picture languages. 197-203 - Nithya Sampath, Chinnappan Jayakumar:
FlowForensic: flow rule enforcement for control plane attacks in software defined networking. 204-211 - Priya Govindaraj, Jaisankar Natarajan:
Trusted computing in social cloud. 212-218 - B. Karthikeyan, R. Kumar, Inabathini Srinivasa Rao:
Energy efficient data compression and aggregation technique for wireless sensor networks [TELOSB MOTES]. 219-223 - K. P. Rama Prabha, N. Jeyanthi:
An intelligent neuro-genetic framework for effective intrusion detection. 224-232 - S. Meenatchi, Sevugan Prabu:
Cluster-based EA-PATM protocol for energy consumption in hierarchical WSNs. 233-241 - S. K. Lakshmanaprabu, U. Sabura Banu:
Real time implementation of multivariable centralised FOPID controller for TITO process. 242-251 - Nanda Gopal Reddy, Roheet Bhatnagar:
A novel feature extraction approach for tumour detection and classification of data based on hybrid SP classifier. 252-257 - P. Kumaresan, Prabukumar Manoharan:
Design and implementation of energy efficient reconfigurable networks (WORN-DEAR) for BAN in IOT environment (BIOT). 258-268 - Yokesh Babu Sundaresan, M. A. Saleem Durai:
A high performance cognitive framework (SIVA - self intelligent versatile and adaptive) for heterogenous architecture in IOT environment. 269-278 - R. Jayanthi, John Singh K:
Encrypted image-based data hiding technique using elliptic curve ElGamal cryptography. 279-285 - M. Mahaboob Basha, K. Venkata Ramanaiah, P. Ramana Reddy:
Design of CMOS full subtractor using 10T for object detection application. 286-295 - Pandharinath Appasaheb Ghonge, Kushal R. Tuckley:
An efficient raindrop parameter estimation using image processing. 296-306 - GeethaRamani R., P. Revathy, Lakshmi Balasubramanian:
Grouping of users based on user navigation behaviour using supervised association rule tree mining. 307-315 - K. Vijayakumar, Arun Chokkalingam:
Integrated cloud-based risk assessment model for continuous integration. 316-321 - G. Arul Dalton, G. Prabhakar Reddy, K. Sai Prasad:
Fuzzy logics associated with neural networks in intelligent control for better world. 322-327 - J. Chenni Kumaran, M. Aramudhan:
A survey on resource allocation strategies in cloud. 328-336 - Johnson Shiny Duela, P. Uma Maheswari:
Mitigation of DDoS threat to service attainability in cloud premises. 337-346
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.