nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A Bayesian Optimization-based Evolutionary Algorithm for Flexible Job Shop Scheduling
|
Sun, Lu |
|
2015 |
61 |
C |
p. 521-526 6 p. |
artikel |
2 |
A Branch-and-Price Algorithm to Solve a Quay Crane Scheduling Problem
|
Kenan, Nabil |
|
2015 |
61 |
C |
p. 527-532 6 p. |
artikel |
3 |
A Co-cooperative Evolutionary Algorithm for Flexible Scheduling Problem under Uncertainty
|
Wang, Yan |
|
2015 |
61 |
C |
p. 515-520 6 p. |
artikel |
4 |
A Computerized Tomographic Data Analysis System to Evaluate the Dental Implant Surface Roughness
|
Moussa, Rania M. |
|
2015 |
61 |
C |
p. 472-477 6 p. |
artikel |
5 |
Adaptation of Spike-Timing-Dependent Plasticity to Unsupervised Learning for Polychronous Wavefront Computing
|
Highland, Fred |
|
2015 |
61 |
C |
p. 314-321 8 p. |
artikel |
6 |
Adapting NSGA-II for Hierarchical Sensor Networks in the IoT
|
Rodriguez, Angela |
|
2015 |
61 |
C |
p. 355-360 6 p. |
artikel |
7 |
Adaptive Filtering Using Complex Data and Quaternions
|
Ogunfunmi, Tokunbo |
|
2015 |
61 |
C |
p. 334-340 7 p. |
artikel |
8 |
A Framework for Implementing Systems Engineering Leading Indicators for Technical Reviews and Audits
|
Orlowski, Chris |
|
2015 |
61 |
C |
p. 293-300 8 p. |
artikel |
9 |
A Model for Assessing UAV System Architectures
|
Renault, Andrew |
|
2015 |
61 |
C |
p. 160-167 8 p. |
artikel |
10 |
An Agent Based Approach for Simulating DEMO Enterprise Models
|
Seck, Mamadou |
|
2015 |
61 |
C |
p. 246-253 8 p. |
artikel |
11 |
Analyzing Responses from Likert Surveys and Risk-adjusted Ranking: A Data Analytics Perspective
|
Gosavi, Abhijit |
|
2015 |
61 |
C |
p. 24-31 8 p. |
artikel |
12 |
Analyzing Stakeholders Using Fuzzy Cognitive Mapping
|
Hester, Patrick |
|
2015 |
61 |
C |
p. 92-97 6 p. |
artikel |
13 |
Analyzing the Integration of Cognitive Radio and Cloud Computing for Secure Networking
|
Rizvi, Syed |
|
2015 |
61 |
C |
p. 206-212 7 p. |
artikel |
14 |
An Improved Continuous-Action Extended Classifier Systems for Function Approximation
|
Saremi, Omid |
|
2015 |
61 |
C |
p. 361-366 6 p. |
artikel |
15 |
An Improved eXtended Classifier System for the Real-time-input Real-time-output (XCSRR) Stability Control of a Biped Robot
|
Sabzehzar, A. |
|
2015 |
61 |
C |
p. 492-499 8 p. |
artikel |
16 |
An Information-centric Approach to Engineering and Manufacturing Cyber Physical Systems in the Defense Industry
|
Ball, George L. |
|
2015 |
61 |
C |
p. 128-132 5 p. |
artikel |
17 |
An Interactive Algorithm to Construct an Appropriate Nonlinear Membership Function Using Information Theory and Statistical Method
|
Hasuike, Takashi |
|
2015 |
61 |
C |
p. 32-37 6 p. |
artikel |
18 |
A Normalization Process to Standardize Handwriting Data Collected from Multiple Resources for Recognition
|
Wang, Wen-Li |
|
2015 |
61 |
C |
p. 402-409 8 p. |
artikel |
19 |
A Novel Theoretical Framework Formulated for Information Discovery from Number System and Collatz Conjecture Data
|
Idowu, Michael A. |
|
2015 |
61 |
C |
p. 105-111 7 p. |
artikel |
20 |
Application of Object Detection and Tracking Techniques for Unmanned Aerial Vehicles
|
Kamate, Shreyamsh |
|
2015 |
61 |
C |
p. 436-441 6 p. |
artikel |
21 |
Application of System Design for Operational Effectiveness for Architectural Modeling of the SoS Relationship between Primary and Enabling Systems
|
Gaska, Marilyn T. |
|
2015 |
61 |
C |
p. 240-245 6 p. |
artikel |
22 |
Application of Value Focused Thinking and Fuzzy Systems to Assess System Architecture
|
Lesinski, Gene |
|
2015 |
61 |
C |
p. 168-175 8 p. |
artikel |
23 |
A Pragmatic Method for Assessing Systems Architectures During the Architecture Generation Process with a Focus on Repurposing Business Software to Systems Engineering
|
Buller, Kyle |
|
2015 |
61 |
C |
p. 153-159 7 p. |
artikel |
24 |
A Signal Processing Approach for Cyber Data Classification with Deep Neural Networks
|
Cox, Jonathan A. |
|
2015 |
61 |
C |
p. 349-354 6 p. |
artikel |
25 |
A Simulation-based Approach to Risk Assessment and Mitigation in Supply Chain Networks
|
Seck, Mamadou |
|
2015 |
61 |
C |
p. 98-104 7 p. |
artikel |
26 |
A Smart Adaptable Architecture Based on Contexts for Cyber Physical Systems
|
Rago, Francesco |
|
2015 |
61 |
C |
p. 301-306 6 p. |
artikel |
27 |
Assessment of Selected Methods for Estimating Chemical Transport Parameters from Computed Tomographic Imaging
|
Anderson, S.H. |
|
2015 |
61 |
C |
p. 460-465 6 p. |
artikel |
28 |
A Systemic Approach to Re-inforce Development and Operations Functions in Delivering an Organizational Program
|
Hussaini, Syed W. |
|
2015 |
61 |
C |
p. 261-266 6 p. |
artikel |
29 |
Author Index
|
|
|
2015 |
61 |
C |
p. 539-541 3 p. |
artikel |
30 |
μAutonomy: Intelligent Command of Movable Objects
|
Saadou-Yaye, Abdoulaye |
|
2015 |
61 |
C |
p. 500-506 7 p. |
artikel |
31 |
Autoregressive Hidden Markov Model and the Speech Signal
|
Bryan, Jacob D. |
|
2015 |
61 |
C |
p. 328-333 6 p. |
artikel |
32 |
A Wavelet Packet and Mel-Frequency Cepstral Coefficients-Based Feature Extraction Method for Speaker Identification
|
Turner, Claude |
|
2015 |
61 |
C |
p. 416-421 6 p. |
artikel |
33 |
Biometric Knowledge Extraction for Multi-factor Authentication and Key Exchange
|
Griffin, Phillip H. |
|
2015 |
61 |
C |
p. 66-71 6 p. |
artikel |
34 |
Cloud-based Ground System for Telemetry Processing
|
Mirchandani, Chandru |
|
2015 |
61 |
C |
p. 183-190 8 p. |
artikel |
35 |
Cloud Services Architectures
|
Toy, Mehmet |
|
2015 |
61 |
C |
p. 213-220 8 p. |
artikel |
36 |
Clustering Quality Improvement of k-means Using a Hybrid Evolutionary Model
|
Karimov, Jeyhun |
|
2015 |
61 |
C |
p. 38-45 8 p. |
artikel |
37 |
Computer-assisted System to Generate a New Intelligent Rotary Dental Files IRDF Models
|
Nassef, Tamer M. |
|
2015 |
61 |
C |
p. 442-447 6 p. |
artikel |
38 |
Cyber Security Challenges within the Connected Home Ecosystem Futures
|
Arabo, Abdullahi |
|
2015 |
61 |
C |
p. 227-232 6 p. |
artikel |
39 |
Czech Insolvency Proceedings Data: Social Network Analysis
|
Mrázová, Iveta |
|
2015 |
61 |
C |
p. 52-59 8 p. |
artikel |
40 |
Determination of Rule Patterns in Complex Event Processing Using Machine Learning Techniques
|
Mehdiyev, Nijat |
|
2015 |
61 |
C |
p. 395-401 7 p. |
artikel |
41 |
Diagnosing Tropical Cyclone Rapid Intensification Using Kernel Methods and Reanalysis Datasets
|
Mercer, Andrew |
|
2015 |
61 |
C |
p. 422-427 6 p. |
artikel |
42 |
Dynamics of the Schelling Social Segregation Model in Networks
|
Cortez, Vasco |
|
2015 |
61 |
C |
p. 60-65 6 p. |
artikel |
43 |
Elastic Scaling of Cloud Application Performance Based on Western Electric Rules by Injection of Aspect-oriented Code
|
Benz, Konstantin |
|
2015 |
61 |
C |
p. 198-205 8 p. |
artikel |
44 |
Engineering Cyber Physical Systems: Machine Learning, Data Analytics and Smart Systems Architecting Preface
|
Dagli, Cihan H. |
|
2015 |
61 |
C |
p. 8-9 2 p. |
artikel |
45 |
Evaluation of the DoDAF Meta-model's Support of Systems Engineering
|
Giachetti, Ronald E. |
|
2015 |
61 |
C |
p. 254-260 7 p. |
artikel |
46 |
Extracting Meaningful Entities from Human-generated Tactical Reports
|
Guo, Jinhong K. |
|
2015 |
61 |
C |
p. 72-79 8 p. |
artikel |
47 |
Fuzzy Inference Algorithm based on Quantitative Association Rules
|
Wang, Ling |
|
2015 |
61 |
C |
p. 388-394 7 p. |
artikel |
48 |
Gender Effects in Surface Electromyographic Activity of the Biceps Brachii Muscle During Prolonged Isometric Contraction
|
Ahamed, Nizam Uddin |
|
2015 |
61 |
C |
p. 448-453 6 p. |
artikel |
49 |
How System Errors Affect Aircrew Resource Management (CRM)
|
Adkins, Justin Y. |
|
2015 |
61 |
C |
p. 281-286 6 p. |
artikel |
50 |
Inside Title Page
|
Dagli, Cihan H. |
|
2015 |
61 |
C |
p. 1- 1 p. |
artikel |
51 |
Instantaneous Modelling and Reverse Engineering of Data-Consistent Prime Models in Seconds!
|
Idowu, Michael A. |
|
2015 |
61 |
C |
p. 373-380 8 p. |
artikel |
52 |
Mitigating Counterfeit Part Intrusions with Enterprise Simulation
|
Bodner, Douglas A. |
|
2015 |
61 |
C |
p. 233-239 7 p. |
artikel |
53 |
Modeling of a Neuro Fuzzy System to Develop an Efficient Method to Get a Specific Color Paint from the Color Model Cyan, Magenta and Yellow (CMY) under Terms of Open Source
|
Pulla, Victor |
|
2015 |
61 |
C |
p. 486-491 6 p. |
artikel |
54 |
Multidimensional Joint Scale and Cluster Analysis
|
Sato-Ilic, Mika |
|
2015 |
61 |
C |
p. 11-17 7 p. |
artikel |
55 |
Neural Network-Based Drug Abuse Treatment Optimization
|
Cohen, Jeff |
|
2015 |
61 |
C |
p. 454-459 6 p. |
artikel |
56 |
Noise Canceling in Volatility Forecasting Using an Adaptive Neural Network Filter
|
Monfared, Soheil Almasi |
|
2015 |
61 |
C |
p. 80-84 5 p. |
artikel |
57 |
Optimizing MACD Parameters via Genetic Algorithms for Soybean Futures
|
Wiles, Phoebe S. |
|
2015 |
61 |
C |
p. 85-91 7 p. |
artikel |
58 |
Part I Data Science and Analytics
|
|
|
2015 |
61 |
C |
p. 10- 1 p. |
artikel |
59 |
Part II Cyber Physical Systems
|
|
|
2015 |
61 |
C |
p. 112- 1 p. |
artikel |
60 |
Part III Machine Learning and Adaptive Systems
|
|
|
2015 |
61 |
C |
p. 313- 1 p. |
artikel |
61 |
Predicting with Confidence: Extensions to the GRNN Oracle Enabling Quantification of Confidence in Predictions
|
Land, Walker H. |
|
2015 |
61 |
C |
p. 381-387 7 p. |
artikel |
62 |
Real-time Complex Event Processing and Analytics for Smart Grid
|
Liu, Guangyi |
|
2015 |
61 |
C |
p. 113-119 7 p. |
artikel |
63 |
Real-Time Optimal Scheduling of a Group of Elevators in a Multi-Story Robotic Fully-Automated Parking Structure
|
Debnath, Jayanta K. |
|
2015 |
61 |
C |
p. 507-514 8 p. |
artikel |
64 |
Scheduling Blocking Flow Shops Using Meta-RaPS
|
Sadaqa, Mohammad |
|
2015 |
61 |
C |
p. 533-538 6 p. |
artikel |
65 |
Selecting Attributes, Rules, and Membership Functions for Fuzzy SoS Architecture Evaluation
|
Pape, Louis |
|
2015 |
61 |
C |
p. 176-182 7 p. |
artikel |
66 |
Semi-supervised Clustering for Sparsely Sampled Longitudinal Data
|
Takagishi, Mariko |
|
2015 |
61 |
C |
p. 18-23 6 p. |
artikel |
67 |
Simulation Tool for Asynchronous Cortical Streams (STACS): Interfacing with Spiking Neural Networks
|
Wang, Felix |
|
2015 |
61 |
C |
p. 322-327 6 p. |
artikel |
68 |
Smart Waste Collection System Based on Location Intelligence
|
Gutierrez, Jose M. |
|
2015 |
61 |
C |
p. 120-127 8 p. |
artikel |
69 |
Student Yield Maximization Using Genetic Algorithm on a Predictive Enrollment Neural Network Model
|
Sarafraz, Z. |
|
2015 |
61 |
C |
p. 341-348 8 p. |
artikel |
70 |
Subject Index
|
|
|
2015 |
61 |
C |
p. 542-547 6 p. |
artikel |
71 |
Synthetic Rating on Talent Evaluation-Similarity of Subsets
|
Tang, Shijun |
|
2015 |
61 |
C |
p. 367-372 6 p. |
artikel |
72 |
Table of Contents
|
|
|
2015 |
61 |
C |
p. 2-7 6 p. |
artikel |
73 |
The Optimisation of Bayesian Classifier in Predictive Spatial Modelling for Secondary Mineral Deposits
|
Ibrahim, Adamu M |
|
2015 |
61 |
C |
p. 478-485 8 p. |
artikel |
74 |
Tomography-measured Spatial Distributions of Non-Aqueous Phase Liquids in Porous Media
|
Anderson, S.H. |
|
2015 |
61 |
C |
p. 466-471 6 p. |
artikel |
75 |
Towards an Adaptive Model for Collaborative Simulation: From System Design to Lessons Learned. A Use Case from Aircraft Industry
|
Castro, Laura Roa |
|
2015 |
61 |
C |
p. 267-273 7 p. |
artikel |
76 |
Towards Modelling Data Infrastructures in the Asset Management Domain
|
Brous, Paul |
|
2015 |
61 |
C |
p. 274-280 7 p. |
artikel |
77 |
Transformation based Score Fusion Algorithm for Multi-modal Biometric User Authentication through Ensemble Classification
|
Assaad, Firas S. |
|
2015 |
61 |
C |
p. 410-415 6 p. |
artikel |
78 |
Understanding Space Launch Vehicle Complexity: A Case Study in Combustion Instabilities
|
Freeman, Ronald H. |
|
2015 |
61 |
C |
p. 307-312 6 p. |
artikel |
79 |
Uniqueness and Causes of the California Drought
|
Richman, Michael B. |
|
2015 |
61 |
C |
p. 428-435 8 p. |
artikel |
80 |
Use of Bayesian Networks for Qualification Planning: A Predictive Analysis Framework for a Technically Complex Systems Engineering Problem
|
Rizzo, Davinia B. |
|
2015 |
61 |
C |
p. 133-140 8 p. |
artikel |
81 |
Using a Systemic Perspective to Support Engineering Change Management
|
Wilberg, Julian |
|
2015 |
61 |
C |
p. 287-292 6 p. |
artikel |
82 |
Using Data Mining Algorithms for Developing a Model for Intrusion Detection System (IDS)
|
Duque, Solane |
|
2015 |
61 |
C |
p. 46-51 6 p. |
artikel |
83 |
Using Discrete Event Simulation to Model Attacker Interactions with Cyber and Physical Security Systems
|
Perkins, Casey |
|
2015 |
61 |
C |
p. 221-226 6 p. |
artikel |
84 |
Using Information-theoretic Principles to Analyze and Evaluate Complex Adaptive Supply Network Architectures
|
Rodewald, Joshua |
|
2015 |
61 |
C |
p. 147-152 6 p. |
artikel |
85 |
Using Semantic Web Technologies for Integrating Domain Specific Modeling and Analytical Tools
|
Blackburn, Mark R. |
|
2015 |
61 |
C |
p. 141-146 6 p. |
artikel |
86 |
Utilizing Third Party Auditing to Manage Trust in the Cloud
|
Rizvi, Syed |
|
2015 |
61 |
C |
p. 191-197 7 p. |
artikel |