Journal of Experimental and Theoretical Artificial Intelligence, Volume 30 (original) (raw)



default search action
- combined dblp search
- author search
- venue search
- publication search
Authors:
- no matches

Venues:
- no matches

Publications:
- no matches



SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Volume 30, Number 1, 2018
Original Article

Chris Drummond:
Reproducible research: a minority opinion. 1-11

Ron Sun:
Why is a computational framework for motivational and metacognitive control needed? 13-37

Changqing Gong, Shou-Fei Han
, Xi-Guang Li, Liang Zhao
, Xiao-Jing Liu:
A new dandelion algorithm and optimization for extreme learning machine. 39-52

David Chalupa:
On transitions in the behaviour of tabu search algorithm TabuCol for graph colouring. 53-69

Saejoon Kim:
Volatility forecasting for low-volatility portfolio selection in the US and the Korean equity markets. 71-88

Aiping Zhang:
Pseudo almost periodic solutions for CNNs with oscillating leakage coefficients and complex deviating arguments. 89-100

Yahiaoui Chahrazed, Jean-Louis Lanet, Mohamed Mezghiche, Karim Tamine:
Machine learning techniques to predict sensitive patterns to fault attack in the Java Card application. 101-127

Jinjin Chi, Jihong Ouyang, Ximing Li, Changchun Li:
Empirical study on variational inference methods for topic models. 129-142

Damien Pellier
, Humbert Fiorino:
PDDL4J: a planning domain description library for java. 143-176

Gonzalo Génova
, Ignacio Quintanilla Navarro:
Are human beings humean robots? 177-186
Volume 30, Number 2, 2018
Articles

Shervin Malmasi, Marcos Zampieri:
Challenges in discriminating profanity from hate speech. 187-202

M. M. Sebatubun, C. Haryawan, B. Windarta:
Classification of ground glass opacity lesion characteristic based on texture feature using lung CT image. 203-215

Saisai Yao, Zhenxue Chen, Yunyi Jia, Chengyun Liu:
Cascade heterogeneous face sketch-photo synthesis via dual-scale Markov Network. 217-233

Khalid Mohammad Jaber, Osama Moh'd Alia
, Mohammed Mahmod Shuaib
:
P-HS-SFM: a parallel harmony search algorithm for the reproduction of experimental data in the continuous microscopic crowd dynamic models. 235-255

Inon Zuckerman
, Kan-Leung Cheng, Dana S. Nau:
Modeling agent's preferences by its designer's social value orientation. 257-277

Ridvan Sahin
, Hong-yu Zhang:
Induced simplified neutrosophic correlated aggregation operators for multi-criteria group decision-making. 279-292

Gehad Ismail Sayed
, Ashraf Darwish
, Aboul Ella Hassanien
:
A new chaotic multi-verse optimization algorithm for solving engineering optimization problems. 293-317

Songlin Xiao:
Almost periodic cellular neural networks with neutral-type proportional delays. 319-330

Tarek Richard Besold
, Sara L. Uckelman
:
Normative and descriptive rationality: from nature to artifice and back. 331-344
Note

Chiranjib Sur
, Anupam Shukla:
Discrete bacteria foraging optimization algorithm for graph based problems - a transition from continuous to discrete. 345-365
Volume 30, Number 3, 2018
Pattern Analysis and Artificial Intelligence
Editorials

Chawki Djeddi
, Imran Siddiqi:
Editorial. 367
Original Articles

Imene Ferdi, Abdesslem Layeb
:
A GRASP algorithm based new heuristic for the capacitated location routing problem. 369-387

Fethi Demim, Abdelkrim Nemra
, Kahina Louadj, Mustapha Hamerlain, Abdelouahab Bazoula:
An adaptive SVSF-SLAM algorithm to improve the success and solving the UGVs cooperation problem. 389-414
Original Article
Original Articles
Volume 30, Number 4, 2018
Special issue of the 23rd RCRA International workshop on "Experimental evaluation of algorithms for solving problems with combinatorial explosion"
Preface

Stefano Bistarelli
, Andrea Formisano, Marco Maratea:
23rd RCRA International workshop on "Experimental evaluation of algorithms for solving problems with combinatorial explosion". 479-480
Original Articles
Volume 30, Number 5, 2018
Articles
Original Article
Volume 30, Number 6, 2018
Articles

Ruixia Yan, Zhong Wu, Qiuying Han:
A short note on rough set over dual-universes. 725-731

Chiranjib Sur
:
Ensemble one-vs-all learning technique with emphatic & rehearsal training for phishing email classification using psychology. 733-762

Harish Garg
:
Generalised Pythagorean fuzzy geometric interactive aggregation operators using Einstein operations and their application to decision making. 763-794
Original Article

Saeed Farzi, Sahar Kianian:
A novel clustering algorithm for attributed graphs based on K-medoid algorithm. 795-809
Articles

Fang Su, Jingyan Wang:
Domain transfer convolutional attribute embedding. 811-829
Original Article

Lukás Chrpa, Mauro Vallati
, Thomas Leo McCluskey
:
Outer entanglements: a general heuristic technique for improving the efficiency of planning algorithms. 831-856

Anwar Ali Yahya
:
Centroid particle swarm optimisation for high-dimensional data classification. 857-886

R. Ganeshan
, S. Paul Rodrigues:
I-AHSDT: intrusion detection using adaptive dynamic directive operative fractional lion clustering and hyperbolic secant-based decision tree classifier. 887-910

G. Wiselin Jiji:
Identifying stage of Alzheimer disease using multiclass particle swarm optimisation technique. 911-925

Zahra Aliniya, Mohammadreza Keyvanpour
:
Solving constrained optimisation problems using the improved imperialist competitive algorithm and Deb's technique. 927-951

Niyati Baliyan
, Sandeep Kumar
:
SWAQ: a Semantic Web Application Quality Evaluation Framework. 953-972

Parnian Afshar, Abbas Ahmadi
, Azadeh Mohebi, M. H. Fazel Zarandi:
A hierarchical stochastic modelling approach for reconstructing lung tumour geometry from 2D CT images. 973-992

Changjin Xu, Lilin Chen:
Effect of leakage delay on the almost periodic solutions of fuzzy cellular neural networks. 993-1011

Kamel Boudjit, Cherif Larbes
, Naeem Ramzan
:
ANN design and implementation for real-time object tracking using quadrotor AR.Drone 2.0. 1013-1035

Matej Sprogar:
A ladder to human-comparable intelligence: an empirical metric. 1037-1050

Shubham Gupta
, Kusum Deep
:
Cauchy Grey Wolf Optimiser for continuous optimisation problems. 1051-1075
Corrigendum

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
load links from unpaywall.org
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
load content from archive.org
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
load data from openalex.org
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
dblp was originally created in 1993 at:
since 2018, dblp has been operated and maintained by:







