Abstract is missing.
- Extracting Association Rules from a Retail Database: Two Case StudiesR. S. João, Maria do Carmo Nicoletti, A. M. Monteiro, M. X. Ribeiro. 1-11 [doi]
- KNN++: An Enhanced K-Nearest Neighbor Approach for Classifying Data with Heterogeneous ViewsYing Xie. 13-23 [doi]
- Quantum Cryptography Trends: A Milestone in Information SecurityW. Noor-ul-Ain, M. Atta-ur-Rahman, Muhammad Nadeem, Abdul Ghafoor Abbasi. 25-39 [doi]
- Multi-zone Building Control System for Energy and Comfort ManagementEe-May Kan, Kan Siew Leong, Ngee Hoo Ling, Yvonne Soh, Matthew Lai. 41-51 [doi]
- ABC+ES: Combining Artificial Bee Colony Algorithm and Evolution Strategies on Engineering Design Problems and Benchmark FunctionsMarco Antônio Florenzano Mollinetti, Daniel Leal Souza, Rodrigo Lisboa Pereira, Edson Koiti Kudo Yasojima, Otávio Noura Teixeira. 53-66 [doi]
- System Essence of Intelligence and Multi-agent Existential MappingsZalimkhan Nagoev, Olga Nagoeva, Dana Tokmakova. 67-76 [doi]
- A Type-2 Fuzzy Concepts Lexicalized Representation by Perceptual Reasoning and Linguistic Weighted Average: A Comparative StudySahar Cherif, Nesrine Baklouti, Adel M. Alimi, Václav Snásel. 77-86 [doi]
- A New Ant Supervised-PSO Variant Applied to Traveling Salesman ProblemSonia Kefi, Nizar Rokbani, Pavel Krömer, Adel M. Alimi. 87-101 [doi]
- TETS: A Genetic-Based Scheduler in Cloud Computing to Decrease Energy and MakespanMohammad Shojafar, Maryam Kardgar, Ali Asghar Rahmani Hosseinabadi, Shahab Shamshirband, Ajith Abraham. 103-115 [doi]
- A Serious Game to Make People Aware of Behavioral Symptoms in Tourette SyndromeTeresa Padilla, Alberto Ochoa, Lourdes Margain. 117-125 [doi]
- Bimodality Streams Integration for Audio-Visual Speech Recognition SystemsNoraini Seman, Rosniza Roslan, Nursuriati Jamil, Norizah Ardi. 127-139 [doi]
- Similarity-Based Trust Management System: Data Validation SchemeHind Obaid Al Falasi, Nader Mohamed, Hesham El-Syed. 141-153 [doi]
- Reverse Engineering of Time-Delayed Gene Regulatory Network Using Restricted Gene Expression ProgrammingBin Yang, Wei Zhang, Xiaofei Yan, Caixia Liu. 155-165 [doi]
- New Rules to Enhance the Performances of Histogram Projection for Segmenting Small-Sized Arabic WordsMarwa Amara, Kamel Zidi, Khaled Ghédira, Salah Zidi. 167-176 [doi]
- Analyzing Genetic Algorithm with Game Theory and Adjusted Crossover Approach on Engineering ProblemsEdson Koiti Kudo Yasojima, Roberto Célio Limão de Oliveira, Otávio Noura Teixeira, Rodrigo Lisboa Pereira, Marco A. F. Mollinetti. 177-188 [doi]
- An Intelligent System for Road Moving Object DetectionMejdi Ben Dkhil, Ali Wali, Adel M. Alimi. 189-198 [doi]
- Towards Improvement of Multinomial Classification Accuracy of Neuro-Fuzzy for Digital Forensics ApplicationsAndrii Shalaginov, Katrin Franke. 199-210 [doi]
- Multi-agent Architecture for Visual Intelligent Remote Healthcare Monitoring SystemAfef Ben Jemmaa, Hela Ltifi, Mounir Ben Ayed. 211-221 [doi]
- Knowledge Visualization Model for Intelligent Dynamic Decision-MakingJihed Elouni, Hela Ltifi, Mounir Ben Ayed. 223-235 [doi]
- Experimental Analysis of a Hybrid Reservoir Computing TechniqueSebastián Basterrech, Gerardo Rubino, Václav Snásel. 237-247 [doi]
- Face Recognition Using HMM-LBPMejda Chihaoui, Wajdi Bellil, Akram Elkefi, Chokri Ben Amar. 249-258 [doi]
- A Novel Security Architecture Based on Multi-level Rule Expression LanguageSamih Souissi, Layth Sliman, Benoit Charroux. 259-269 [doi]
- On Analysis and Visualization of Twitter DataFathelalem Ali, Yasuki Shima. 271-280 [doi]
- Heuristic and Exact Approach for the Close Enough Ridematching ProblemAllan F. Balardino, André G. dos Santos. 281-293 [doi]
- Study on Inverse Dynamics of Full-Body Powered Pseudo-Anthropomorphic Exoskeleton Using Neural NetworksAbhishek Arijit, Dilip Kumar Pratihar, Rathindranath Maiti. 295-305 [doi]
- Comparison Between SAT-Based and CSP-Based Approaches to Resolve Pattern Mining ProblemsAkram Rajeb, Abdelmajid Ben Hamadou, Zied Loukil. 307-314 [doi]