Home
Research Trends
Scientific Articles
Journals
Scientific Journals
Open Access Journals
Journals Search
Contact
Sign Up
Login
Language
English
German
ICTACT Journal on Soft Computing
Title
Publication Date
Language
Citations
CROSSOVER OPERATORS IN GENETIC ALGORITHMS: A REVIEW
2015/10/01
90
"APPLICATION OF BIG DATA IN EDUCATION DATA MINING AND LEARNING ANALYTICS – A LITERATURE REVIEW "
2015/07/01
61
SUPERVISED MACHINE LEARNING APPROACHES: A SURVEY
2015/04/01
29
GAIN RATIO BASED FEATURE SELECTION METHOD FOR PRIVACY PRESERVATION
2011/04/01
28
DIAGNOSIS OF DIABETIC RETINOPATHY USING MACHINE LEARNING TECHNIQUES
2013/07/01
24
REVIEW OF HEART DISEASE PREDICTION SYSTEM USING DATA MINING AND HYBRID INTELLIGENT TECHNIQUES
2013/07/01
17
REPTREE CLASSIFIER FOR IDENTIFYING LINK SPAM IN WEB SEARCH ENGINES
2013/01/01
17
IDENTIFICATION OF ERYTHEMATO-SQUAMOUS SKIN DISEASES USING EXTREME LEARNING MACHINE AND ARTIFICIAL NEURAL NETWORK
2013/10/01
16
PERFORMANCE COMPARISON FOR INTRUSION DETECTION SYSTEM USING NEURAL NETWORK WITH KDD DATASET
2014/04/01
13
REVIEW OF PARALLEL GENETIC ALGORITHM BASED ON COMPUTING PARADIGM AND DIVERSITY IN SEARCH SPACE
2013/07/01
11
A BAT ALGORITHM FOR REALISTIC HYBRID FLOWSHOP SCHEDULING PROBLEMS TO MINIMIZE MAKESPAN AND MEAN FLOW TIME
2012/10/01
10
SURVEY ON CRIME ANALYSIS AND PREDICTION USING DATA MINING TECHNIQUES
2017/04/01
8
INDIA’S ELECTRICITY DEMAND FORECAST USING REGRESSION ANALYSIS AND ARTIFICIAL NEURAL NETWORKS BASED ON PRINCIPAL COMPONENTS
2012/07/01
8
WORD SENSE DISAMBIGUATION METHOD USING SEMANTIC SIMILARITY MEASURES AND OWA OPERATOR
2015/01/01
8
IRIS RECOGNITION BASED ON KERNELS OF SUPPORT VECTOR MACHINE
2015/01/01
8
OPINION MINING AND SENTIMENT CLASSIFICATION: A SURVEY
2012/10/01
7
INTRUSION DETECTION USING ARTIFICIAL NEURAL NETWORK WITH REDUCED INPUT FEATURES
2010/07/01
6
PREDICTIVE ANALYSIS OF CUSTOMER CHURN IN TELECOM INDUSTRY USING SUPERVISED LEARNING
2020/01/01
5
MBA-LF: A NEW DATA CLUSTERING METHOD USING MODIFIED BAT ALGORITHM AND LEVY FLIGHT
2015/10/01
5
A STUDY ON BIOMETRIC TEMPLATE SECURITY
2010/07/01
5
A SURVEY ON UBIQUITOUS COMPUTING
2016/01/01
5
SENSITIVITY-BASED LINEAR LEARNING METHOD AND EXTREME LEARNING MACHINES COMPARED FOR SOFTWARE MAINTAINABILITY PREDICTION OF OBJECT-ORIENTED SOFTWARE SYSTEMS
2013/04/01
5
BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES
2012/07/01
5
PREDICTION OF INDIA’S ELECTRICITY DEMAND USING ANFIS
2015/04/01
5
RANDOM FOREST BASED MISFIRE DETECTION USING KONONENKO DISCRETISER
2012/01/01
4
A SOLUTION TO THE DOUBLE DUMMY CONTRACT BRIDGE PROBLEM INFLUENCED BY SUPERVISED LEARNING MODULE ADAPTED BY ARTIFICIAL NEURAL NETWORK
2014/10/01
4
BIG DATA VISUALISATION IN IMMERSIVE VIRTUAL REALITY ENVIRONMENTS: EMBODIED PHENOMENOLOGICAL PERSPECTIVES TO INTERACTION
2015/07/01
4
HYBRIDIZATION OF MODIFIED ANT COLONY OPTIMIZATION AND INTELLIGENT WATER DROPS ALGORITHM FOR JOB SCHEDULING IN COMPUTATIONAL GRID
2013/10/01
4
AN APPROACH FOR REVIEWING AND RANKING THE CUSTOMERS’ REVIEWS THROUGH QUALITY OF REVIEW (QoR)
2017/01/01
4
EMOTION AND SARCASM IDENTIFICATION OF POSTS FROM FACEBOOK DATA USING A HYBRID APPROACH
2017/01/01
4
«
‹ Pervious
Next ›
»