


default search action
Journal of Experimental and Theoretical Artificial Intelligence, Volume 29
Volume 29, Number 1, 2017
- Hikmet Esen

, Mehmet Esen
, Onur Ozsolak:
Modelling and experimental performance analysis of solar-assisted ground source heat pump system. 1-17 - Farzaneh Zarei, Ali Basirat

, Heshaam Faili, M. Mirain:
A bootstrapping method for development of Treebank. 19-42 - Julio B. Clempner:

Classical workflow nets and workflow nets with reset arcs: using Lyapunov stability for soundness verification. 43-57 - Sumit Verma, Subhodip Saha

, V. Mukherjee
:
A novel symbiotic organisms search algorithm for congestion management in deregulated environment. 59-79 - Junwei Zeng, Yongsheng Qian

, Min Wang, Yongzhong Yang:
On supervised graph Laplacian embedding CA model & kernel construction and its application. 81-89 - Konstantinos Liagkouras

, Kostas S. Metaxiotis:
Enhancing the performance of MOEAs: an experimental presentation of a new fitness guided mutation operator. 91-131 - S. Kamalesh

, P. Ganesh Kumar:
Data aggregation in wireless sensor network using SVM-based failure detection and loss recovery. 133-147 - M. Arfan Jaffar:

A dynamic fuzzy genetic algorithm for natural image segmentation using adaptive mean shift. 149-156 - Shahram Jamali, Mohammad Sadeq Garshasbi

:
Fault localization algorithm in computer networks by employing a genetic algorithm. 157-174 - Avinash Kumar Singh

, Gora Chand Nandi:
Visual perception-based criminal identification: a query-based approach. 175-196 - Sumit Verma, Subhodip Saha, V. Mukherjee

:
A novel symbiotic organisms search algorithm for congestion management in deregulated environment. 197-218 - Jeffrey A. Barrett:

Truth and probability in evolutionary games. 219-225
Volume 29, Number 2, 2017
- Wei Wang, Hongwei Wang, Yuan Song:

Ranking product aspects through sentiment analysis of online reviews. 227-246 - Vesna Marinkovic

:
ArgoTriCS - automated triangle construction solver. 247-271 - Sajad Tabatabaei:

A probabilistic neural network based approach for predicting the output power of wind turbines. 273-285 - Kevin Warwick

, Huma Shah:
Taking the fifth amendment in Turing's imitation game. 287-297 - Yudong Zhang

, Jianfei Yang, Shuihua Wang
, Zhengchao Dong, Preetha Phillips:
Pathological brain detection in MRI scanning via Hu moment invariants and machine learning. 299-312 - Ferdian Adi Pratama, Fulvio Mastrogiovanni

, Soon-Geul Lee
, Nak Young Chong
:
Long-term knowledge acquisition using contextual information in a memory-inspired robot architecture. 313-334 - Naresh Kumar Yadav

, Mukesh Kumar, S. K. Gupta
:
Group search optimiser-based optimal bidding strategies with no Karush-Kuhn-Tucker optimality conditions. 335-348 - Maojing Niu, Liang Wu, Junwei Zeng:

Locality preserving hashing for fast image search: theory and applications. 349-359 - Matteo Colombo:

Why build a virtual brain? Large-scale neural simulations as jump start for cognitive computing. 361-370 - David Weinbaum, Viktoras Veitas:

Open ended intelligence: the individuation of intelligent agents. 371-396 - Anthony Michael Barrett, Seth D. Baum:

A model of pathways to artificial superintelligence catastrophe for risk and decision analysis. 397-414 - Seyyed Hossein Seyyedi, Behrouz Minaei-Bidgoli

:
Using learning automata to determine proper subset size in high-dimensional spaces. 415-432 - Antonio Lieto

, Daniele Paolo Radicioni
, Valentina Rho:
Dual PECCS: a cognitive system for conceptual representation and categorization. 433-452
Volume 29, Number 3, 2017
- Hajer Ben-Romdhane

, Saoussen Krichen
, Enrique Alba:
A bi-population based scheme for an explicit exploration/exploitation trade-off in dynamic environments. 453-479 - R. Sridhar

, S. Jeevananthan, Subhransu Sekhar Dash
, Pradeep Vishnuram
:
A new maximum power tracking in PV system during partially shaded conditions based on shuffled frog leap algorithm. 481-493 - Yusuf Sönmez

, Hamdi Tolga Kahraman
, M. Kenan Dösoglu, Ugur Güvenc
, Serhat Duman
:
Symbiotic organisms search algorithm for dynamic economic dispatch with valve-point effects. 495-515 - Anifowose Fatai

, Amar Khoukhi, Abdulazeez Abdulraheem
:
Investigating the effect of training-testing data stratification on the performance of soft computing techniques: an experimental study. 517-535 - Hossein Shirgahi, Mehran Mohsenzadeh

, Hamid Haj Seyyed Javadi
:
Trust estimation of the semantic web using semantic web clustering. 537-556 - Kheireddine Abainia, Siham Ouamour

, Halim Sayoud
:
A novel robust Arabic light stemmer. 557-573 - Shahram Jamali, Sepideh Malektaji, Morteza Analoui

:
An imperialist competitive algorithm for virtual machine placement in cloud computing. 575-596 - Eden Shalom Erez, Inon Zuckerman

, Dror Hermel:
Automatic negotiation: playing the domain instead of the opponent. 597-616 - A. Punitha, J. Martin Leo Manickam:

Privacy preservation and authentication on secure geographical routing in VANET. 617-628 - Lei Liu, Yang Yang, Guangli Li

, Qi Wang, Shuai Lü
:
Redundancy checking algorithms based on parallel novel extension rule. 629-647 - Zhen Ma, De-gan Zhang, Jie Chen, Yuexian Hou:

Shadow detection of moving objects based on multisource information in Internet of things. 649-661 - K. Selva Bhuvaneswari, P. Geetha:

Segmentation and classification of brain images using firefly and hybrid kernel-based support vector machine. 663-678
Volume 29, Number 4, 2017
- Stellan Ohlsson, Robert H. Sloan, György Turán, Aaron Urasky:

Measuring an artificial intelligence system's performance on a Verbal IQ test for young children. 679-693 - David F. Barrero

, María D. R.-Moreno
, David Camacho
:
Improving experimental methods on success rates in evolutionary computation. 695-716 - Seyed Amir Mansouri

, Mohammad Sadegh Javadi
:
A robust optimisation framework in composite generation and transmission expansion planning considering inherent uncertainties. 717-730 - Jun Ye:

Projection and bidirectional projection measures of single-valued neutrosophic sets and their decision-making method for mechanical design schemes. 731-740 - Sengül Dogan

:
A reversible data hiding scheme based on graph neighbourhood degree. 741-753 - Saejoon Kim, Jun Heo:

Time series regression-based pairs trading in the Korean equities market. 755-768 - Ridvan Sahin, Peide Liu:

Possibility-induced simplified neutrosophic aggregation operators and their application to multi-criteria group decision-making. 769-785 - Saeed Kamarian

, Mahmoud Shakeri, Mohammad Hosein Yas:
Thermal buckling optimisation of composite plates using firefly algorithm. 787-794 - Aiping Zhang:

Pseudo almost periodic solutions for neutral type SICNNs with D operator. 795-807 - Guiping Wang, Ren Li:

DSolving: a novel and efficient intelligent algorithm for large-scale sliding puzzles. 809-822 - Ali Sadollah

, Neha Yadav, Kaizhou Gao
, Rong Su
:
Metaheuristic optimisation methods for approximate solving of singular boundary value problems. 823-842 - Marta Vallejo

, David W. Corne, Patrícia A. Vargas
:
Online/offline evolutionary algorithms for dynamic urban green space allocation problems. 843-867 - Ahmad Mozaffari, Mahdi Emami, Nasser L. Azad, Alireza Fathi

:
Comparisons of several variants of continuous quantum-inspired evolutionary algorithms. 869-909
Volume 29, Number 5, 2017
- Shu-Hsien Liao

, Yin-Ju Chen:
A rough set-based association rule approach implemented on a brand trust evaluation model. 911-927 - Darko Brodic

, Alessia Amelio
, Zoran Milivojevic:
An approach to the language discrimination in different scripts using adjacent local binary pattern. 929-947 - Hedieh Sajedi

:
Image steganalysis using Artificial Bee Colony algorithm. 949-966 - Kyaw Kyaw Htike:

Efficient determination of the number of weak learners in AdaBoost. 967-982 - Juan Zou, Jinhua Zheng, Ruimin Shen, Cheng Deng:

A novel metric based on changes in pareto domination ratio for objective reduction of many-objective optimization problems. 983-994 - Kianoosh Rahmani, Farzaneh Kavousi-Fard, Alireza Abbasi:

Consideration effect of wind farms on the network reconfiguration in the distribution systems in an uncertain environment. 995-1009 - J. Dheeba

, Thirasamma Jaya, N. Albert Singh:
Breast cancer risk assessment and diagnosis model using fuzzy support vector machine based expert system. 1011-1021 - Fang Zhou, Qiang Qu, Hannu Toivonen

:
Summarisation of weighted networks. 1023-1052 - Piotr Giza

:
Automated discovery systems and the inductivist controversy. 1053-1069 - Ammar Jalalimanesh

, Hamidreza Shahabi Haghighi
, Abbas Ahmadi
, Hossein Hejazian, Madjid Soltani:
Multi-objective optimization of radiotherapy: distributed Q-learning and agent-based simulation. 1071-1086 - Maciej Musial

:
Designing (artificial) people to serve - the other side of the coin. 1087-1097 - R. Venkata Rao, Dhiraj P. Rai:

Optimisation of welding processes using quasi-oppositional-based Jaya algorithm. 1099-1117 - Jeffrey A. Barrett, Calvin T. Cochran, Simon M. Huttegger, Naoki Fujiwara:

Hybrid learning in signalling games. 1119-1127
Volume 29, Number 6, 2017
- Satyendra Singh Chouhan

, Rajdeep Niyogi:
DiMPP: a complete distributed algorithm for multi-agent path planning. 1129-1148 - Mostafa Ghobaei-Arani

, Mahboubeh Shamsi, Ali Asghar Rahmanian:
An efficient approach for improving virtual machine placement in cloud computing environment. 1149-1171 - Peide Liu, Xiyun Qin:

Maclaurin symmetric mean operators of linguistic intuitionistic fuzzy numbers and their application to multiple-attribute decision-making. 1173-1202 - Yuliana Martínez, Enrique Naredo

, Leonardo Trujillo
, Pierrick Legrand, Uriel López:
A comparison of fitness-case sampling methods for genetic programming. 1203-1224 - Jerry Chun-Wei Lin

, Tzung-Pei Hong
, Philippe Fournier-Viger
, Qiankun Liu, Jia-Wei Wong, Justin Zhan:
Efficient hiding of confidential high-utility itemsets with minimal side effects. 1225-1245 - Francisco Lara-Dammer, Douglas Hofstadter, Robert L. Goldstone:

A computer model of context-dependent perception in a very simple world. 1247-1282 - Paramita Guha, Taru Bhatnagar, Ishan Pal, Uma Kamboj

, Sunita Mishra:
Prediction of properties of wheat dough using intelligent deep belief networks. 1283-1296 - Iyad Abu Doush

, Mohammed I. Al-Saleh
:
Can genetic algorithms help virus writers reshape their creations and avoid detection? 1297-1310 - Faizan Ahmad

, Yiqiang Chen
, Lisha Hu, Shuangquan Wang, Jindong Wang
, Zhenyu Chen
, Xinlong Jiang, Jianfei Shen:
BrainStorm: a psychosocial game suite design for non-invasive cross-generational cognitive capabilities data collection. 1311-1323 - Yasser F. Hassan

:
Rough set classification based on quantum logic. 1325-1336 - David J. Jilk, Seth J. Herd, Stephen J. Read, Randall C. O'Reilly:

Anthropomorphic reasoning about neuromorphic AGI safety. 1337-1351

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














