Pub Date : 2015-11-27DOI: 10.1007/978-3-319-11017-2_15
N. Rokbani, A. Casals, A. Alimi
{"title":"IK-FA, a New Heuristic Inverse Kinematics Solver Using Firefly Algorithm","authors":"N. Rokbani, A. Casals, A. Alimi","doi":"10.1007/978-3-319-11017-2_15","DOIUrl":"https://doi.org/10.1007/978-3-319-11017-2_15","url":null,"abstract":"","PeriodicalId":358937,"journal":{"name":"Computational Intelligence Applications in Modeling and Control","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122694133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-01-09DOI: 10.1007/978-3-319-11017-2
A. Azar, S. Vaidyanathan
{"title":"Computational Intelligence Applications in Modeling and Control","authors":"A. Azar, S. Vaidyanathan","doi":"10.1007/978-3-319-11017-2","DOIUrl":"https://doi.org/10.1007/978-3-319-11017-2","url":null,"abstract":"","PeriodicalId":358937,"journal":{"name":"Computational Intelligence Applications in Modeling and Control","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131214665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-3-319-11017-2_13
Amira Aloui, Amel Grissa-Touzi
{"title":"A New Approach for Flexible Queries Using Fuzzy Ontologies","authors":"Amira Aloui, Amel Grissa-Touzi","doi":"10.1007/978-3-319-11017-2_13","DOIUrl":"https://doi.org/10.1007/978-3-319-11017-2_13","url":null,"abstract":"","PeriodicalId":358937,"journal":{"name":"Computational Intelligence Applications in Modeling and Control","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130019655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-3-319-11017-2_10
K. Lamamra, K. Belarbi, S. Boukhtini
{"title":"Box and Jenkins Nonlinear System Modelling Using RBF Neural Networks Designed by NSGAII","authors":"K. Lamamra, K. Belarbi, S. Boukhtini","doi":"10.1007/978-3-319-11017-2_10","DOIUrl":"https://doi.org/10.1007/978-3-319-11017-2_10","url":null,"abstract":"","PeriodicalId":358937,"journal":{"name":"Computational Intelligence Applications in Modeling and Control","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121397726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-3-319-11017-2_12
M. Hessine, H. Jouini, S. Chebbi
{"title":"Neural Network Approach to Fault Location for High Speed Protective Relaying of Transmission Lines","authors":"M. Hessine, H. Jouini, S. Chebbi","doi":"10.1007/978-3-319-11017-2_12","DOIUrl":"https://doi.org/10.1007/978-3-319-11017-2_12","url":null,"abstract":"","PeriodicalId":358937,"journal":{"name":"Computational Intelligence Applications in Modeling and Control","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130798328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-3-319-11017-2_4
Philip Achimugu, A. Selamat
{"title":"A Hybridized Approach for Prioritizing Software Requirements Based on K-Means and Evolutionary Algorithms","authors":"Philip Achimugu, A. Selamat","doi":"10.1007/978-3-319-11017-2_4","DOIUrl":"https://doi.org/10.1007/978-3-319-11017-2_4","url":null,"abstract":"","PeriodicalId":358937,"journal":{"name":"Computational Intelligence Applications in Modeling and Control","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123713759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-3-319-11017-2_1
Renu Vashist, Ashutosh Vashishtha
{"title":"An Investigation into Accuracy of CAMEL Model of Banking Supervision Using Rough Sets","authors":"Renu Vashist, Ashutosh Vashishtha","doi":"10.1007/978-3-319-11017-2_1","DOIUrl":"https://doi.org/10.1007/978-3-319-11017-2_1","url":null,"abstract":"","PeriodicalId":358937,"journal":{"name":"Computational Intelligence Applications in Modeling and Control","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129435948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-3-319-11017-2_11
Iis Afrianty, D. Nasien, M. A. Kadir, H. Haron
{"title":"Back-Propagation Neural Network for Gender Determination in Forensic Anthropology","authors":"Iis Afrianty, D. Nasien, M. A. Kadir, H. Haron","doi":"10.1007/978-3-319-11017-2_11","DOIUrl":"https://doi.org/10.1007/978-3-319-11017-2_11","url":null,"abstract":"","PeriodicalId":358937,"journal":{"name":"Computational Intelligence Applications in Modeling and Control","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126428239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-3-319-11017-2_14
F. Hamdaoui, A. Sakly, A. Mtibaa
{"title":"An Efficient Multi Level Thresholding Method for Image Segmentation Based on the Hybridization of Modified PSO and Otsu's Method","authors":"F. Hamdaoui, A. Sakly, A. Mtibaa","doi":"10.1007/978-3-319-11017-2_14","DOIUrl":"https://doi.org/10.1007/978-3-319-11017-2_14","url":null,"abstract":"","PeriodicalId":358937,"journal":{"name":"Computational Intelligence Applications in Modeling and Control","volume":"21 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133003500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-3-319-11017-2_7
Santosh Kumar, Deepanwita Datta, S. Singh
{"title":"Black Hole Algorithm and Its Applications","authors":"Santosh Kumar, Deepanwita Datta, S. Singh","doi":"10.1007/978-3-319-11017-2_7","DOIUrl":"https://doi.org/10.1007/978-3-319-11017-2_7","url":null,"abstract":"","PeriodicalId":358937,"journal":{"name":"Computational Intelligence Applications in Modeling and Control","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117096178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}