A hybrid approach based on Hotelling statistics for automated visual inspection of display blemishes in LCD panels Fulltext Access 8 Pages 2009
Hedging risks with interruptible load programs for a load serving entity Fulltext Access 8 Pages 2009
Identity disclosure protection: A data reconstruction approach for privacy-preserving data mining Fulltext Access 8 Pages 2009
The effects of national culture values on consumer acceptance of e-commerce: Online shoppers in China Fulltext Access 8 Pages 2009
A comparative methodology for the reconstruction of digital events using windows restore points Fulltext Access 8 Pages 2009
A fuzzy modeling method via Enhanced Objective Cluster Analysis for designing TSK model Fulltext Access 8 Pages 2009
The effect of neighborhood structures on tabu search algorithm in solving course timetabling problem Fulltext Access 8 Pages 2009
Self-efficacy, overconfidence, and the negative effect on subsequent performance: A field study Fulltext Access 8 Pages 2009
A source adaptive independent component analysis algorithm through solving the estimating equation Fulltext Access 8 Pages 2009
A modified particle swarm optimization for production planningproblems in the TFT Array process Fulltext Access 8 Pages 2009
Using the artificial neural network model for modeling the performance of the counter flow vortex tube Fulltext Access 8 Pages 2009
Gene expression programming based due date assignment in a simulated job shop Fulltext Access 8 Pages 2009
An adaptive genetic-based signature learning system for intrusion detection Fulltext Access 8 Pages 2009
Design and development of agent-based procurement system to enhance business intelligence Fulltext Access 8 Pages 2009
A non-linearly virtual sample generation technique using group discovery and parametric equations of hypersphere Fulltext Access 8 Pages 2009
Expert system based adaptive dynamic matrix control for ball mill grinding circuit Fulltext Access 8 Pages 2009
Analyzing digital divide within and between member and candidate countries o f European Union Fulltext Access 8 Pages 2009
Design and development challenges for an E2E DRM content business integration platform Fulltext Access 8 Pages 2009
Communication strategies to overcome functional and psychological resistance to Internet banking Fulltext Access 8 Pages 2009
Public sector readiness for digital preservation in New Zealand: The rate of adoption of an innovation in records management practices Fulltext Access 8 Pages 2009
Improving digital skills for the use of online public information and services Fulltext Access 8 Pages 2009
Governance in the digital age: A research and action framework for an uncertain future Fulltext Access 8 Pages 2009
When the bureaucrat promises to safeguard your online privacy: Dissecting the contents of privacy statements on Dutch municipal websites Fulltext Access 8 Pages 2009
Aggregating broadband demand: Surveying the benefits and challenges for public libraries Fulltext Access 8 Pages 2009
The adoption of centralized customer service systems: A survey of local governments Fulltext Access 8 Pages 2009
In pursuit of the effective neighborhood information system: User-friendliness and training Fulltext Access 8 Pages 2009
Why do people use information kiosks? A validation of the Unified Theory of Acceptance and Use of Technology Fulltext Access 8 Pages 2009
New robust and efficient ant colony algorithms: Using new interpretation of local updating process Fulltext Access 8 Pages 2009
The acceptance and diffusion of the innovative smart phone use: A case study of a delivery service company in logistics Fulltext Access 8 Pages 2009
Improving retention strategies for IT professionals working in the public sector Fulltext Access 8 Pages 2009
Situation-based shifts in consumer web site benefit importance: The joint role of cognition and affect Fulltext Access 8 Pages 2009
Which reduces IT turnover intention the most: Workplace characteristics or job characteristics? Fulltext Access 8 Pages 2009
A meta-analytic assessment of the DeLone and McLean IS success model: An examination of IS success at the individual level Fulltext Access 8 Pages 2009
Institutional pressures and mindful IT management: The case of a container terminal in China Fulltext Access 8 Pages 2009
The impact of information and communication technology (ICT), education and regulation on economic freedom in Islamic Middle Eastern countries Fulltext Access 8 Pages 2009
A fuzzy GARCH model applied to stock market scenario using a genetic algorithm Fulltext Access 8 Pages 2009
An adjustable personalization of search and delivery of learning objects to learners Fulltext Access 8 Pages 2009
Supplier selection: A hybrid model using DEA, decision tree and neural network Fulltext Access 8 Pages 2009
Automatic detection of electroencephalographic changes using adaptive neuro-fuzzy inference system employing Lyapunov exponents Fulltext Access 8 Pages 2009
A social network approach to resolving group-level conflict in context-aware services Fulltext Access 8 Pages 2009
Recommender system for software project planning one application of revised CBR algorithm Fulltext Access 8 Pages 2009
Supplier selection in a fuzzy group setting: A method using grey related analysis and Dempster–Shafer theory Fulltext Access 8 Pages 2009
Rough set theory with discriminant analysis in analyzing electricity loads Fulltext Access 8 Pages 2009
Intelligent system for identification and replacement of faulty sensor measurements in Thermal Power Plants (IPPAMAS: Part 1) Fulltext Access 8 Pages 2009
Adaptive CMAC neural control of chaotic systems with a PI-type learning algorithm Fulltext Access 8 Pages 2009
Using fuzzy TOPSIS method for evaluating the competitive advantages of shopping websites Fulltext Access 8 Pages 2009
An intelligent strategy for checking the annual inspection status of motorcycles based on license plate recognition Fulltext Access 8 Pages 2009
Designing a fuzzy system for controlling the armament fire in dynamic siege Fulltext Access 8 Pages 2009
Minimizing a nonlinear function under a fuzzy max-t-norm relational equation constraint Fulltext Access 8 Pages 2009
A blind watermarking method using maximum wavelet coefficient quantization Fulltext Access 8 Pages 2009
Individual and group behavior-based customer profile model for personalized product recommendation Fulltext Access 8 Pages 2009
Inducing a marketing strategy for a new pet insurance company using decision trees Fulltext Access 8 Pages 2009
Evaluating classification performances of single-layer perceptron with a Choquet fuzzy integral-based neuron Fulltext Access 8 Pages 2009
A hybrid TSK-FR model to study short-term variations of the electricity demand versus the temperature changes Fulltext Access 8 Pages 2009
A study of academic performance of business school graduates using neural network and statistical techniques Fulltext Access 8 Pages 2009
Data description and noise filtering based detection with its application and performance comparison Fulltext Access 8 Pages 2009
An integrative model with subject weight based on neural network learning for bankruptcy prediction Fulltext Access 8 Pages 2009
Support for seamless data exchanges between web services through information mapping analysis using kernel methods Fulltext Access 8 Pages 2009
Automated defect inspection of light-emitting diode chips using neural network and statistical approaches Fulltext Access 8 Pages 2009
A new method to forecast of Escherichia coli promoter gene sequences: Integrating feature selection and Fuzzy-AIRS classifier system Fulltext Access 8 Pages 2009
A study of fault diagnosis in a scooter using adaptive order tracking technique and neural network Fulltext Access 8 Pages 2009
Speaker identification based on the frame linear predictive coding spectrum technique Fulltext Access 8 Pages 2009
Simulation of sequential data: An enhanced reinforcement learning approach Fulltext Access 8 Pages 2009
Recognition of multi-interval rules in dataset with continuous-valued attributes Fulltext Access 8 Pages 2009
Fuzzy reasoning used to detect apneic events in the sleep apnea-hypopnea syndrome Fulltext Access 8 Pages 2009
Symbolic hierarchical analysis in currency markets: An application to contagion in currency crises * Fulltext Access 8 Pages 2009
Applying the analytic network process to disclose knowledge assets value creation dynamics Fulltext Access 8 Pages 2009
Driver drowsiness detection with eyelid related parameters by Support Vector Machine Fulltext Access 8 Pages 2009
Zero anaphora resolution by case-based reasoning and pattern conceptualization Fulltext Access 8 Pages 2009
Improving forecasts of GARCH family models with the artificial neural networks: An application to the daily returns in Istanbul Stock Exchange Fulltext Access 8 Pages 2009
Investigation of pollution flashover on high voltage insulators using artificial neural network Fulltext Access 8 Pages 2009
Group multi-attribute decision model to partner selection in the formation of virtual enterprise under incomplete information Fulltext Access 8 Pages 2009