All Stories

  1. PCG/PCGML evaluations: Introducing panda evaluation using the soft launch
  2. Intrusion detection system using a new fuzzy rule-based classification system based on genetic algorithm
  3. CABMD: A new clustering algorithm based on membership degree of node for mobile ad hoc networks
  4. F-Ant: an effective routing protocol for ant colony optimization based on fuzzy logic in vehicular ad hoc networks
  5. Chaotic time series prediction by artificial neural networks
  6. Hierarchical distributed management clustering protocol for wireless sensor networks
  7. Erratum to: A supplier offer modification approach based on fuzzy systems for automated negotiation in e-commerce
  8. A supplier offer modification approach based on fuzzy systems for automated negotiation in e-commerce
  9. A Fuzzy Multi-objective Linear Programming Model Based on Interval-valued Intuitionistic Fuzzy Sets for Supplier Selection
  10. Modeling and optimization of Quality of Service routing in Mobile Ad hoc Networks
  11. FBeeAdHoc: A secure routing protocol for BeeAdHoc based on fuzzy logic in MANETs
  12. On codes based on BCK-algebras
  13. A New Zone Disjoint Multi Path Routing Algorithm to Increase Fault-Tolerant in Mobile Ad Hoc Networks
  14. A New Zone Disjoint Multi Path Routing Algorithm to Increase Fault-Tolerant in Mobile Ad Hoc Networks
  15. QARIMA: A new approach to prediction in queue theory
  16. A similarity-based mechanism to control genetic algorithm and local search hybridization to solve traveling salesman problem
  17. Benchmark of Different Gradient Descents in OCR
  18. A fuzzy system approach to multilateral automated negotiation in B2C e-commerce
  19. t-CONVEX VAGUE SETS
  20. A multi-agent based model for collective purchasing in electronic commerce
  21. Using Gravitational Search Algorithm for Finding Near-optimal Base Station Location in Two-Tiered WSNs
  22. A new approach for energy and delay trade-off intra-clustering routing in WSNs
  23. An Algorithm for Cluster Maintenance Based on Membership Degree of Nodes for MANETs
  24. A new generalization of fuzzy BCK/BCI-algebras
  25. Energy Aware Clustering Algorithms for Wireless Sensor Networks
  26. Convex Vague Sets with Respect to a t-Norm
  27. Comment on the Improvement of an Efficient ID-Based RSA Mutlisignature
  28. A Study on the Stream Cipher Embedded Magic Square of Random Access Files
  29. Preface of the “First Symposium on Advances in Computer Science and Applied Mathematics (ACSAM 2011)”
  30. Intrusion Detection Techniques for Detecting Misbehaving Nodes
  31. A novel routing algorithm based-on ant colony in Mobile Ad hoc Networks
  32. A new scheme for detecting misbehaving zone manager with collaborative honesty neighbours
  33. Fuzzy n-fold ideals in BCH-algebras
  34. A Hybrid Routing Algorithm Based on Ant Colony and ZHLS Routing Protocol for MANET
  35. An Efficient Method for Detecting Misbehaving Zone Manager in MANET
  36. Determination of IDS Agent Nodes Based on Three-Tiered Key Management Framework for MANET
  37. Some Results in Bipolar-Valued Fuzzy BCK/BCI-Algebras
  38. Evaluating Intrusion Detection Systems and Comparison of Intrusion Detection Techniques in Detecting Misbehaving Nodes for MANET
  39. An Efficient Method for Identifying IDS Agent Nodes by Discovering Compromised Nodes in MANET
  40. Identifying monitoring nodes in MANET by detecting unauthorized and malicious nodes