ICTACT Journal on Soft Computing

Titel Veröffentlichungsdatum Sprache Zitate
CROSSOVER OPERATORS IN GENETIC ALGORITHMS: A REVIEW2015/10/0190
"APPLICATION OF BIG DATA IN EDUCATION DATA MINING AND LEARNING ANALYTICS – A LITERATURE REVIEW "2015/07/0161
SUPERVISED MACHINE LEARNING APPROACHES: A SURVEY2015/04/0129
GAIN RATIO BASED FEATURE SELECTION METHOD FOR PRIVACY PRESERVATION2011/04/0128
DIAGNOSIS OF DIABETIC RETINOPATHY USING MACHINE LEARNING TECHNIQUES2013/07/0124
REVIEW OF HEART DISEASE PREDICTION SYSTEM USING DATA MINING AND HYBRID INTELLIGENT TECHNIQUES2013/07/0117
REPTREE CLASSIFIER FOR IDENTIFYING LINK SPAM IN WEB SEARCH ENGINES2013/01/0117
IDENTIFICATION OF ERYTHEMATO-SQUAMOUS SKIN DISEASES USING EXTREME LEARNING MACHINE AND ARTIFICIAL NEURAL NETWORK2013/10/0116
PERFORMANCE COMPARISON FOR INTRUSION DETECTION SYSTEM USING NEURAL NETWORK WITH KDD DATASET2014/04/0113
REVIEW OF PARALLEL GENETIC ALGORITHM BASED ON COMPUTING PARADIGM AND DIVERSITY IN SEARCH SPACE2013/07/0111
A BAT ALGORITHM FOR REALISTIC HYBRID FLOWSHOP SCHEDULING PROBLEMS TO MINIMIZE MAKESPAN AND MEAN FLOW TIME2012/10/0110
SURVEY ON CRIME ANALYSIS AND PREDICTION USING DATA MINING TECHNIQUES2017/04/018
INDIA’S ELECTRICITY DEMAND FORECAST USING REGRESSION ANALYSIS AND ARTIFICIAL NEURAL NETWORKS BASED ON PRINCIPAL COMPONENTS2012/07/018
WORD SENSE DISAMBIGUATION METHOD USING SEMANTIC SIMILARITY MEASURES AND OWA OPERATOR2015/01/018
IRIS RECOGNITION BASED ON KERNELS OF SUPPORT VECTOR MACHINE2015/01/018
OPINION MINING AND SENTIMENT CLASSIFICATION: A SURVEY2012/10/017
INTRUSION DETECTION USING ARTIFICIAL NEURAL NETWORK WITH REDUCED INPUT FEATURES2010/07/016
PREDICTIVE ANALYSIS OF CUSTOMER CHURN IN TELECOM INDUSTRY USING SUPERVISED LEARNING2020/01/015
MBA-LF: A NEW DATA CLUSTERING METHOD USING MODIFIED BAT ALGORITHM AND LEVY FLIGHT2015/10/015
A STUDY ON BIOMETRIC TEMPLATE SECURITY2010/07/015
A SURVEY ON UBIQUITOUS COMPUTING2016/01/015
SENSITIVITY-BASED LINEAR LEARNING METHOD AND EXTREME LEARNING MACHINES COMPARED FOR SOFTWARE MAINTAINABILITY PREDICTION OF OBJECT-ORIENTED SOFTWARE SYSTEMS2013/04/015
BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES2012/07/015
PREDICTION OF INDIA’S ELECTRICITY DEMAND USING ANFIS2015/04/015
RANDOM FOREST BASED MISFIRE DETECTION USING KONONENKO DISCRETISER2012/01/014
A SOLUTION TO THE DOUBLE DUMMY CONTRACT BRIDGE PROBLEM INFLUENCED BY SUPERVISED LEARNING MODULE ADAPTED BY ARTIFICIAL NEURAL NETWORK2014/10/014
BIG DATA VISUALISATION IN IMMERSIVE VIRTUAL REALITY ENVIRONMENTS: EMBODIED PHENOMENOLOGICAL PERSPECTIVES TO INTERACTION2015/07/014
HYBRIDIZATION OF MODIFIED ANT COLONY OPTIMIZATION AND INTELLIGENT WATER DROPS ALGORITHM FOR JOB SCHEDULING IN COMPUTATIONAL GRID2013/10/014
AN APPROACH FOR REVIEWING AND RANKING THE CUSTOMERS’ REVIEWS THROUGH QUALITY OF REVIEW (QoR)2017/01/014
EMOTION AND SARCASM IDENTIFICATION OF POSTS FROM FACEBOOK DATA USING A HYBRID APPROACH2017/01/014