


default search action
International Journal of Advanced Intelligence Paradigms, Volume 8
Volume 8, Number 1, 2016
- Lyes Abada

, Saliha Aouat
:
Facial shape-from-shading using features detection method. 3-19 - B. Vinoth Kumar, G. R. Karpagam:

Knowledge-based differential evolution approach to quantisation table generation for the JPEG baseline algorithm. 20-41 - Nureize Arbaiy

, Pei-Chun Lin
:
Weighted value assessment of linear fractional programming for possibilistic multi-objective problem. 42-58 - Worrawat Engchuan

, Asawin Meechai, Sissades Tongsima
, Jonathan H. Chan:
Handling batch effects on cross-platform classification of microarray data. 59-76 - Fatiha Souam, Ali Aït El Hadj:

Efficient similarity measure for comparing tree structures. 77-97 - Ibtissam Banit'ouagua, Mounir Ait Kerroum

, Ahmed Hammouch, Driss Aboutajdine:
Band selection by mutual information for hyper-spectral image classification. 98-118 - Mehdi Dadkhah

, Ashok K. Shyam, Valentina Christova-Bagdassarian
, Mohammad Davarpanah Jazi:
Similar names in academic literature as a tools to deceive researchers. 119-127
Volume 8, Number 2, 2016
- Chanthini Baskaran, D. Manivannan:

Secure network reconfiguration protocol using ARM7. 131-139 - M. L. Bharathi

, D. Kirubakaran
:
Solar powered closed-loop controlled fuzzy logic-based three-stage interleaved DC-DC boost converter with an inverter. 140-155 - S. Saravanan, V. Venkatachalam

:
Improving map reduce task scheduling and micro-partitioning mechanism for mobile cloud multimedia services. 156-167 - K. Janakiraman, T. Baghyasree, D. Parkavi:

Highly secure data transmission for industrial network using blowfish algorithm in embedded processors. 168-182 - K. Rajkumar, P. Swaminathan:

Fault tolerance in distributed systems using fused data structures with the help of LT codes. 183-190 - M. D. Samrajesh, N. P. Gopalan

, S. Suresh
:
A scalable component model for multi-tenant SaaS application. 191-206 - Shanmugasundaram Palanimalai, Ilango Paramasivam

:
Big data analytics bring new insights and higher business value - an experiment carried out to divulge sales forecasting solutions. 207-218 - M. Mathankumar, M. Preethi, R. Kala Ranjani, N. Sugandhi:

An integrated dynamic power safeguard system using defence surveillance robots. 219-228 - Kaushik Sekaran

, P. Venkata Krishna
:
Big Cloud: a hybrid cloud model for secure data storage through cloud space. 229-241
Volume 8, Number 3, 2016
- Elena Mitocariu:

Graph representations of discourse structure. 243-259 - Goldina Ghosh, Soumya Banerjee:

Tracking of experts for enhancement of activities in social network: an analysis of collaborative activity on Wikipedia by applying fuzzy logic. 260-287 - Davood Azizian, Mehdi Bigdeli

:
Application of heuristic methods for dynamic thermal modelling of cast-resin transformer. 288-302 - Saravanakumar Gurusamy

, K. Valarmathi
, M. Willjuice Iruthayarajan, Seshadhri Srinivasan
:
Lagrangian-based state transition algorithm for tuning multivariable decentralised controller. 303-317 - Rekik Ali

, Mounir Gabsi, Moncef Temani:
Adaptive probabilities of crossover and mutation in genetic algorithm for solving stochastic vehicle routing problem. 318-326 - Lorenzo Magnani, Selene Arfini

, Tommaso Bertolotti
:
An argument for ignorance-based chance discovery. 327-342 - M. Anusha, J. G. R. Sathiaseelan:

An empirical study on multi-objective genetic algorithms using clustering techniques. 343-354 - K. Lenin, B. Ravindhranathreddy, M. Suryakalavathi

:
Hybridisation of backtracking search optimisation algorithm with differential evolution algorithm for solving reactive power problem. 355-364
Volume 8, Number 4, 2016
- U. Rajkanna, D. Manivannan:

Design and development of mobile relay node using LPC2148. 367-376 - A. Delphin Carolina Rani, B. S. E. Zoraida

:
Multistage multiprocessor task scheduling in hybrid flow shop problems using discrete firefly algorithm. 377-391 - Lakshmi Kalyani, V. K. Sharma, B. K. Murthy:

Sentiment analysis in assessing mobile learning adoption in education sector. 392-399 - G. Suganthi, Reeba Korah:

Computer-aided detection and identification of mine-like objects in infrared imagery using digital image processing. 400-411 - S. Aarthishree, M. Jayashree, J. Rhinose Fathima:

A quick approach to detect epilepsy and seizure in brain. 412-424 - Subramani Ramakrishnan, V. Badrinath, S. C. Anushan Sivasundaram:

Tapping the human cloud for successful delivery of software projects. 425-436 - S. Chakaravarthi:

Secure model for SOAP message communication in web services. 437-442 - S. Panneer Arokiaraj, L. Robert:

RDNAS: a simple DNA sequence squeezer using enhanced run length encoding. 443-450 - R. Seethalakshmi, K. S. Ravichandran, P. Swaminathan, A. N. Alagappan:

Information retrieval by mining text and image. 451-459

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














