Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             19 results found
no title author magazine year volume issue page(s) type
1 A hybrid model based on rough sets theory and genetic algorithms for stock price forecasting Cheng, Ching-Hsue
2010
180 9 p. 1610-1629
20 p.
article
2 A model of computation and representation in the brain Albus, James S.
2010
180 9 p. 1519-1554
36 p.
article
3 A modified gradient-based neuro-fuzzy learning algorithm and its convergence Wu, Wei
2010
180 9 p. 1630-1642
13 p.
article
4 An improved approach to steganalysis of JPEG images Liu, Qingzhong
2010
180 9 p. 1643-1655
13 p.
article
5 Application of fuzzy calculations for improving portfolio matrices Ghazinoory, S.
2010
180 9 p. 1582-1590
9 p.
article
6 Blackwell’s Theorem for T-related fuzzy variables Hong, Dug Hun
2010
180 9 p. 1769-1777
9 p.
article
7 Compression-unimpaired batch-image encryption combining vector quantization and index compression Chen, Tzung-Her
2010
180 9 p. 1690-1701
12 p.
article
8 Cross-fuzzy entropy: A new method to test pattern synchrony of bivariate time series Xie, Hong-Bo
2010
180 9 p. 1715-1724
10 p.
article
9 Direct adaptive fuzzy backstepping robust control for single input and single output uncertain nonlinear systems using small-gain approach Tong, Shaocheng
2010
180 9 p. 1738-1758
21 p.
article
10 Distance formula and shortest paths for the ( n , k ) -star graphs Cheng, Eddie
2010
180 9 p. 1671-1680
10 p.
article
11 Distributed routing in wireless sensor networks using energy welfare metric Ok, Changsoo
2010
180 9 p. 1656-1670
15 p.
article
12 Ensemble strategies with adaptive evolutionary programming Mallipeddi, R.
2010
180 9 p. 1571-1581
11 p.
article
13 Evaluating customer aid functions of online stores with agent-based models of customer behavior and evolution strategy Ahn, Hyung Jun
2010
180 9 p. 1555-1570
16 p.
article
14 Generalized lower and upper approximations in a ring Yamak, S.
2010
180 9 p. 1759-1768
10 p.
article
15 Hidden attribute-based signatures without anonymity revocation Li, Jin
2010
180 9 p. 1681-1689
9 p.
article
16 Inside Front Cover - Editorial Board 2010
180 9 p. IFC-
1 p.
article
17 Linear programming method for multiattribute group decision making using IF sets Li, Deng-Feng
2010
180 9 p. 1591-1609
19 p.
article
18 Robust passivity and passification of stochastic fuzzy time-delay systems Liang, Jinling
2010
180 9 p. 1725-1737
13 p.
article
19 Simple password-based three-party authenticated key exchange without server public keys Lee, Tian-Fu
2010
180 9 p. 1702-1714
13 p.
article
                             19 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands