default search action
International Journal of Intelligent Engineering Informatics, Volume 1
Volume 1, Number 1, 2010
- Jagdev Singh, Simranpreet Singh Gill:
Modelling for tensile strength of friction welded aluminium pipes by ANFIS. 3-20 - Cinthya Solano-Aragón, Arnulfo Alanis Garza, Oscar Castillo:
A hybrid approach with fuzzy logic in a multi-agent system for controlling autonomous mobile robots in known environments. 21-37 - Shuzhong Yang, Siwei Luo:
A local quantitative measure for community detection in networks. 38-52 - Philip N. Azariadis, Vassilis C. Moulianitis, Jose Olaso Melis, Sandra Alemany, Juan Carlos González, Pamela De Jong, Paraskevas Dunias, Marc Van der Zande, Dave Brands:
An innovative virtual-engineering system for supporting integrated footwear design. 53-74 - Markos A. Petousis, Nickolas Bilalis, Nickolas S. Sapidis:
A virtual reality system for the determination of critical machining-process parameters. 75-88 - Martha Pulido, Alejandra Mancilla, Patricia Melin:
Ensemble neural networks with fuzzy logic integration for complex time series prediction. 89-103 - Wai-Ki Ching, Ho-Yin Leung, Hao Jiang, Liang Sun, Tak Kuen Siu:
A Markovian network model for default risk management. 104-124
Volume 1, Number 2, 2011
- Kasthurirangan Gopalakrishnan:
Knowledge-based evolving connectionist systems for condition evaluation of sustainable roadways: a feasibility study. 125-141 - H. P. Singh, Nagarajan Sukavanam:
Control of robot manipulators in task-space under uncertainties using neural network. 142-155 - Dong-Mei Zhu, Wai-Ki Ching:
Multivariate Markov chain models for production planning. 156-173 - Jia-Wen Gu, Wai-Ki Ching, Tak Kuen Siu:
A Markovian infectious model for dependent default risk. 174-195 - Mandana Farzaneh, Iman Raeesi Vanani, Babak Sohrabi:
An inclusive ontology based on the categories of intelligent software agents: an exploratory research. 196-212
Volume 1, Numbers 3/4, 2011
- Shaimaa Ahmed El-Said, Khalid F. A. Hussein, Mohamed M. Fouad:
Securing multi-media transmission over mobile communication channels. 213-245 - Deepak Chatrabhuj Karia, Bhaurao K. Lande, Rohin D. Daruwala:
Back propagation neural network-based energy efficient routing protocols for mobile ad-hoc networks. 246-260 - G. Preetha, B. S. Kiruthika Devi, S. Mercy Shalinie:
Combat model-based DDoS detection and defence using experimental testbed: a quantitative approach. 261-279 - M. B. Veena, M. N. Shanmukha Swamy:
Design and Analysis of NCO based OFDM model. 280-296 - G. Sundari, P. E. Sankaranarayanan:
Mobile agent approach for efficient network exploration and fault detection. 297-308 - Hassan M. Elkamchouchi, Yasmine Abouelseoud, Wafaa S. Shouaib:
A new proxy signcryption scheme using warrants. 309-327 - Jacques J. A. Fournier, Jean-Baptiste Rigaud, Sylvain Bouquet, Bruno Robisson, Assia Tria, Jean-Max Dutertre, Michel Agoyan:
Design and characterisation of an AES chip embedding countermeasures. 328-347 - Sushila Kamble, Vikas Maheshkar, Suneeta Agarwal, Vinay Kumar Srivastava:
Multiple watermarking for copyright protection using DWT and dual-tree CWT. 348-369
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.