Author(s): Hiram Ponce, Miguel González-Mendoza, Ma. Lourdes Martínez-Villaseñor
Pages: 555-556
2) Bagging-TPMiner: a classifier ensemble for masquerader detection based on typical objects
Author(s): Miguel Angel Medina-Pérez, Raúl Monroy, J. Benito Camiña & Milton García-Borroto
Pages: 557-569
3) ANFIS and MPC controllers for a reconfigurable lower limb exoskeleton
Author(s): Carlos A. Rodriguez, Pedro Ponce, Arturo Molina
Pages: 571-584
4) Cross-domain deception detection using support vector networks
Author(s): Ángel Hernández-Castañeda, Hiram Calvo, Alexander Gelbukh & Jorge J. García Flores
Pages: 585-595
5) Closed determination of the number of neurons in the hidden layer of a multi-layered perceptron network
Author(s): Angel Kuri-Morales
Pages: 597-609
6) Segmentation of carbon nanotube images through an artificial neural network
Author(s): María Celeste Ramírez
Pages: 611-625
7) Application of the distributed document representation in the authorship attribution task for small corpora
Author(s): Juan-Pablo Posadas-Durán, Helena Gómez-Adorno, Grigori Sidorov, Ildar Batyrshin, David Pinto & Liliana Chanona-Hernández
Pages: 627-639
8) A 3-SPS-1S parallel robot-based laser sensing for applications in precision agriculture
Author(s): Ricardo Zavala-Yoe, Ricardo A. Ramírez-Mendoza, Silverio García-Lara
Pages: 641-650
9) A methodology based on Deep Learning for advert value calculation in CPM, CPC and CPA networks
Author(s): Luis Miralles-Pechuán, Dafne Rosso, Fernando Jiménez, Jose M. García
Pages: 651-665
10) Interval type-2 fuzzy logic for dynamic parameter adaptation in the bat algorithm
Author(s): Jonathan Perez, Fevrier Valdez, Oscar Castillo, Patricia Melin, Claudia Gonzalez & Gabriela Martinez
Pages: 667-685
11) A new class of BL-algebras
Author(s): Somayeh Motamed, Lida Torkzadeh
Pages: 687-698
12) Third-order reciprocally convex approach to stability of fuzzy cellular neural networks under impulsive perturbations
Author(s): Cheng-De Zheng, Yongjin Xian, Zhanshan Wang
Pages: 699-720
13) An experimental analysis of a new two-stage crossover operator for multiobjective optimization
Author(s): K. Liagkouras, K. Metaxiotis
Pages: 721-751
14) An intelligent character recognition method to filter spam images on cloud
Author(s): Jun Chen, Hong Zhao, Jufeng Yang, Jian Zhang, Tao Li, Kai Wang
Pages: 753-763
15) Social media as sensor in real world: movement trajectory detection with microblog
Author(s): Xueqin Sui, Zhumin Chen, Lei Guo, Kai Wu, Jun Ma, Guanghui Wang
Pages: 765-779
16) A multiagent evolutionary algorithm with direct and indirect combined representation for constraint satisfaction problems
Author(s): Xingxing Hao, Jing Liu
Pages: 781-793
17) Distributed steganalysis of compressed speech
Author(s): Hui Tian, Yanpeng Wu, Yiqiao Cai, Yongfeng Huang, Jin Liu, Tian Wang, Yonghong Chen & Jing Lu
Pages: 795-804
18) A two-agent single-machine scheduling problem to minimize the total cost with release dates
Author(s): Du-Juan Wang, Yunqiang Yin, Wen-Hsiang Wu, Wen-Hung Wu, Chin-Chia Wu & Peng-Hsiang Hsu
Pages: 805-816
19) Single-valued neutrosophic similarity measures based on cotangent function and their application in the fault diagnosis of steam turbine
Author(s): Jun Ye
Pages: 817-825
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.