Abstract is missing.
- Decision making mechanisms in the brainEdmund T. Rolls. 1 [doi]
- Overcoming the fear of semanticsVictor Raskin. 2 [doi]
- From information revolution to intelligence revolution: Big data science vs. intelligence scienceYingxu Wang. 3-5 [doi]
- Polyscale analysis and fractional operators for cognitive systemsWitold Kinsner. 6-7 [doi]
- Big data and societal challengesDilip Patel. 8 [doi]
- Towards a differential diagnostic of PTSD using cognitive computing methodsNewton Howard, Louis Jehel, Romain Arnal. 9-20 [doi]
- Towards a theory of fuzzy probability for cognitive computingYingxu Wang. 21-29 [doi]
- An evaluation of integer- and fractional-order controllers for small satellitesMohamed Temam Nasri, Witold Kinsner. 30-38 [doi]
- Towards a formal theory of social roles in cognitive computing and cognitive informaticsJulia M. Taylor, Victor Raskin. 38-43 [doi]
- Non-Kolmogorov probability and its use for constructing a model of human perception processYoshiharu Tanaka, Masanori Ohya, Andrei Khrennikov, Masanari Asano. 44-47 [doi]
- Position update mechanisms for enhanced particle swarm classificationNabila Nouaouria, Mounir Boukadoum, Robert Proulx. 48-52 [doi]
- Functional networks of anatomic brain regionsBurak Velioglu, Emre Aksan, Itir Onal, Orhan Firat, Mete Ozay, Fatos T. Yarman-Vural. 53-60 [doi]
- Cognitive identification of systems using nonlinear dynamicsXiaoxiang Liu, Tarikul Sabbir, Henry Leung. 61-66 [doi]
- Cognitive reasoning and inferences through psychologically based personalised modelling of emotions using associative classifiersAladdin Ayesh, Miguel Arevalillo-Herráez, Francesc J. Ferri. 67-72 [doi]
- A bio-inspired architecture of the vestibular system for body balance of a humanoid robotOry Medina, Sergio Vargas, Gustavo Torres. 73-79 [doi]
- Rank level fusion of multimodal cancelable biometricsPadma Polash Paul, Marina L. Gavrilova. 80-87 [doi]
- On efficien quantum algorithm using classical amplificatio processSatoshi Iriyama, Masanori Ohya. 88-93 [doi]
- A cognitive approach for texture analysis using neighbors-based binary patternsIzem Hamouchene, Saliha Aouat. 94-99 [doi]
- A chaotic measure for cognitive machine classification of distributed denial of service attacksMuhammad Salman Khan, Ken Ferens, Witold Kinsner. 100-108 [doi]
- Analyzing medical contexts in ubiquitous computing home environments with denotational mathematicsJohn C. Sarivougioukas, Aristides Th. Vagelatos. 109-116 [doi]
- Modeling self-efficacy using the computational-Unified Learning Model (C-ULM): Implications for computational psychology and cognitive computingDuane F. Shell, Leen-Kiat Soh, Vlad Chiriacescu. 117-125 [doi]
- Learning algorithm and neurocomputing architecture for NDS NeuronsMario Antoine Aoun, Mounir Boukadoum. 126-132 [doi]
- Learning through explaining observed inconsistenciesDu Zhang. 133-139 [doi]
- Using storytelling methods to improve emotion, motivation and attitude of students writing scientific papers and thesesMarcus Birkenkrahe. 140-145 [doi]
- Design of a Human Interaction Proof (HIP) using human cognition in contextual natural conversationMir Tafseer Nayeem, Md. Mamunur Rashid Akand, Nazmus Sakib, Md. Wasi Ul Kabir. 146-154 [doi]
- Pattern recognition in mental processes: Determining vestiges of the subconscious through ultrametric component analysisFionn Murtagh. 155-161 [doi]
- The grounding of computational psychoanalysis: A comparative history of culture overview of Matte Blanco bilogicGiuseppe Iurato. 162-171 [doi]
- Body boundary changes in person-centred psychotherapyLaura A. Cariola. 172-181 [doi]
- The Operationalization of the unconscious from Matte Blanco's bi-logic to computationMarco Tonti. 182-189 [doi]
- Formal approaches in the age of mirror neurons: Hints from computational psychoanalysisRosapia Lauro Grotto. 190-196 [doi]
- Cognitive correlates of overt and covert attention in visual searchUlrich Engelke, Andreas Dünser, Anthony Zeater. 197-202 [doi]
- A fuzzy structure similarity algorithm for attributed generalized treesMahsa Kiani, Virendrakumar C. Bhavsar, Harold Boley. 203-210 [doi]
- α-cut-based backward fuzzy interpolationShangzhu Jin, Ren Diao, Qiang Shen. 211-218 [doi]
- A rough-fuzzy perception-based computing for a vision-based wall-following robotTong Duan, Witold Kinsner. 219-229 [doi]
- An application of an agent space connecting real space and digital spaceKenji Sugawara, Yuki Kaeri, Yusuke Manabe, Claude Moulin, Jean-Paul A. Barthès. 230-235 [doi]
- Expansion and evaluation of EAS to provision multimedia communications services in heterogeneous environmentsAkiko Takahashi, Makoto Oide, Mitsuru Abe, Tetsuo Kinoshita. 236-241 [doi]
- Design and production of an electronic musical score system to reduce the load of page turning for wind orchestraIijima Yasue, Susumu Konno, Fujii Yositomo. 242-246 [doi]
- Conversational labeling method for sensor nodes in a daily living environmentHideki Hara, Kenji Sugawara. 247-250 [doi]
- A flexible selection of Internet connections based on network expert knowledgeJin Ito, Asato Edo, Satoru Izumi, Toru Abe, Takuo Suganuma. 251-257 [doi]
- Extracting tendency and stability from time series and random forest for classifying a car driver's cognitive loadYutaka Yoshida, Hayato Ohwada, Fumio Mizoguchi. 258-265 [doi]
- A new approach to detecting distracted car drivers using eye-movement dataFumio Mizoguchi, Hiroyuki Nishiyama, Hirotoshi Iwasaki. 266-272 [doi]
- SS3: A design of the cognitive process model for a car driver considering quantitatively expressed distractionTaku Harada, Akira Yoshizawa, Kazuaki Mori, Hirotoshi Iwasaki. 273-280 [doi]
- Effects of nonvisual secondary tasks on driver's gazing behavior for pedestriansAkira Yoshizawa, Hirotoshi Iwasaki. 281-288 [doi]
- A cognitive perspective for information processing in bandwidth-limited wireless communicationsXiaoming Tao, Linhao Dong, Shaoyang Li, Yang Li, Ning Ge, Jianhua Lu. 289-295 [doi]
- Reducing problem space using Bayesian classification on semantic logs for enhanced application monitoring and managementM. Omair Shafiq, Reda Alhajj, Jon G. Rokne. 296-304 [doi]
- The dynamics model of public opinion diffusion in online social networkZuqin Chen, Jike Ge. 305-310 [doi]
- Distributed image file system based on human cognitionXing Wu, Haitao Lv, Shaojian Zhuo, Fangyi Chen, Xiangfeng Luo. 311-316 [doi]
- An overview of extracting static properties of vehicles from the surveillance videoJie Li, Zheng Xu, Yayun Jiang, Rui Zhang. 317-322 [doi]
- Semantic annotation of traffic video resourcesZheng Xu, Fenglin Zhi, Chen Liang, Mei Lin, Xiangfeng Luo. 323-328 [doi]
- Your privacy information are leaking when you surfing on the social networks: A survey of the degree of online self-disclosure (DOSD)Jike Ge, Jun Peng, Zuqin Chen. 329-336 [doi]
- A cognitive architecture for virtual entities with attentional modulation of pain perceptionCynthia Avila-Contreras, Daniel Madrigal, Félix Ramos, Gustavo Torres. 337-342 [doi]
- A chaos-based block cipher with Feistel structureJun Peng, Liang Lei, Qi Han, Rong Jia. 343-348 [doi]
- HCN production process hybrid intelligence based on artificial neural networks and genetic algorithmJun Yi, Rui Zhang, Di Huang, Taifu Li, Jun Peng, Yingying Su. 349-354 [doi]
- Formal verification for embedded software with cognitive environment modellingQingdi Meng, Lianyi Zhang, GuiMing Luo. 355-360 [doi]
- Modeling two effects of superlative expressions in eWOM messages on consumer evaluative inferencesKazunori Fujimoto. 361-369 [doi]
- A new biological visual cognitive behavioural modeling for video energy computingZuojin Li, Liukui Chen, Zhiyong Ren, Sreenivas Sremath Tirumala. 370-372 [doi]
- Optimized symbolic model checking for component-based systemsLianyi Zhang, Qingdi Meng, GuiMing Luo. 373-378 [doi]
- Image retrieval based on 4096-tree and Memetic AlgorithmLiang Lei, Jun Peng, Bo Yang 0012. 379-385 [doi]
- A kind of topology control algorithm aimed at extending the life cycle of the WSNXiang Yi, Wu Ying, Peng Jun. 386-391 [doi]
- Enhanced Particle Swarm Optimization algorithm with resuse guided retrieval capabilitiesNabila Nouaouria, Mounir Boukadoum, Robert Proulx. 392-399 [doi]
- Category evaluation method for business intelligence using a hierarchical Bayes modelNatsuki Sano, Katsutoshi Yada, Tomomichi Suzuki. 400-407 [doi]
- Incremental rule induction based on updates of statistical indicesShusaku Tsumoto, Shoji Hirano. 408-415 [doi]
- Formal analysis of cross-validation for rule induction using probabilistic indicesShusaku Tsumoto, Shoji Hirano. 416-423 [doi]
- RBAC role-permission assignment with conflicting constraints based on the E-CARGO modelWei Zhang, Jingxin Zhu, Dongning Liu, Shaohua Teng, Haibin Zhu. 424-430 [doi]
- Prediction of magnetic remanence of NdFeB magnets by using novel machine learning intelligence approach - Support vector regressionWenDe Cheng. 431-435 [doi]
- Research on forecasting method of natural gas demand based on GM (1, 1) model and Markov chainXi Wan, Qinqin Zhang, Guoqing Dai. 436-441 [doi]
- Research on screening model of large high-tech enterprises product innovation ideaYan Xu, Xi Wan. 442-448 [doi]
- Evaluating the probabilistic side of proactive computing using cognitive modelling methodology and the statistical inference of user's cognitive statesDenis Shirnin, Denis Zampuniéris. 449-454 [doi]
- Study of variable spray control system based on machine visionRui Zhang, Le-peng Song. 455-458 [doi]
- Towards a social interaction-based cognition model: An analysis of Spatial Data InfrastructureLuis Reynoso, Eduardo Grosclaude, Laura Sánchez, Mabel Álvarez. 459-467 [doi]
- Photoelectricity property of micro device based on carbon nanotubesYing Wu, Junjie Bai, Shaochun Huang, Xiaoyun Zhang, Yi Xiang. 468-471 [doi]
- The application of distributed and cooperation computing in logistics transportationGuibin Huang, Shaohua Teng. 472-476 [doi]
- Research on multi-parameter meter for axis parts based on parallel lightChuande Zhou, Li Lai, Zhiyu Huang. 477-481 [doi]
- AIR-space: Cognitive cooperation space for active information resources based network management systemKazuto Sasai, Hideyuki Takahashi, Gen Kitagata, Tetsuo Kinoshita. 482-489 [doi]
- An experiment on Japanese-Uighur statistical machine translation with increased corpusNimaiti Maimitili, Izumi Yamamoto. 490-495 [doi]
- Proposal of voice control-based interactive design method of agent systemTakahiro Uchiya, Daisuke Yamamoto, Ryota Nishimura, Ichi Takumi, Tetsuo Kinoshita. 496-500 [doi]
- Proposal of Snapshot Management Mechanism for DASH agent frameworkYuuki Kishigami, Takahiro Uchiya, Ichi Takumi, Tetsuo Kinoshita. 501-505 [doi]
- Lag synchronization of two different delay chaotic systemMing-ying You, Qi Han, Jun Peng. 506-509 [doi]
- The overview of big data storage and managementJie Li, Zheng Xu, Yayun Jiang, Rui Zhang. 510-513 [doi]
- Penetration signal adaptive cognitive filtering model based on wavelet analysisHaifeng Zhao, Yan Guo, Ya Zhang, Shizhong Li. 514-519 [doi]
- A software frame of elevator signal amplifier network with self-diagnosisGuorong Chen, Ju-li Deng, Jianxiong Yi. 520-525 [doi]
- A pattern recognition for group abnormal behaviors based on Markov Random Fields energyZuojin Li, Liukui Chen, Zhiyong Ren, Sreenivas Sremath Tirumala. 526-528 [doi]
- Symmetry in sequent calculus and Matte Blanco's bi-logicGiulia Battilotti. 529-534 [doi]
- Chinese text sentiment analysis based on fuzzy semantic modelShaojian Zhuo, Xing Wu, Xiangfeng Luo. 535-540 [doi]
- The effects of menu design on users' emotions, search performance and mouse behaviourYee Mei Lim, Aladdin Ayesh, Martin Stacey. 541-549 [doi]