no |
title |
author |
magazine |
year |
volume |
issue |
page(s) |
type |
1 |
Compiling network traffic into rules using soft computing methods for the detection of flooding attacks
|
Noh, Sanguk |
|
2008 |
8 |
3 |
p. 1200-1210 11 p. |
article |
2 |
Dynamic data mining technique for rules extraction in a process of battery charging
|
Aliev, R.A. |
|
2008 |
8 |
3 |
p. 1252-1258 7 p. |
article |
3 |
Editorial Board
|
|
|
2008 |
8 |
3 |
p. CO2- 1 p. |
article |
4 |
Fuzzy cognitive map architectures for medical decision support systems
|
Stylios, Chrysostomos D. |
|
2008 |
8 |
3 |
p. 1243-1251 9 p. |
article |
5 |
Fuzzy functions with LSE
|
Türkşen, I. Burhan |
|
2008 |
8 |
3 |
p. 1178-1188 11 p. |
article |
6 |
Fuzzy regression model of R&D project evaluation
|
Imoto, Shinji |
|
2008 |
8 |
3 |
p. 1266-1273 8 p. |
article |
7 |
MCLP-based methods for improving “Bad” catching rate in credit cardholder behavior analysis
|
Li, Aihua |
|
2008 |
8 |
3 |
p. 1259-1265 7 p. |
article |
8 |
Morphic computing
|
Resconi, Germano |
|
2008 |
8 |
3 |
p. 1164-1177 14 p. |
article |
9 |
[No title]
|
Nikravesh, Masoud |
|
2008 |
8 |
3 |
p. 1161-1163 3 p. |
article |
10 |
On the absence of strict boundaries—Vagueness, haziness, and fuzziness in philosophy, science, and medicine
|
Seising, Rudolf |
|
2008 |
8 |
3 |
p. 1232-1242 11 p. |
article |
11 |
Perception-based approach to time series data mining
|
Batyrshin, I.Z. |
|
2008 |
8 |
3 |
p. 1211-1221 11 p. |
article |
12 |
Soft computing methods to predict gene regulatory networks: An integrative approach on time-series gene expression data
|
Chan, Zeke S.H. |
|
2008 |
8 |
3 |
p. 1189-1199 11 p. |
article |
13 |
Systematic design of a stable type-2 fuzzy logic controller
|
Castillo, Oscar |
|
2008 |
8 |
3 |
p. 1274-1279 6 p. |
article |
14 |
Type-2 fuzzy logic-based classifier fusion for support vector machines
|
Chen, Xiujuan |
|
2008 |
8 |
3 |
p. 1222-1231 10 p. |
article |