Internal direct product of integral ∨∨-distributive binary aggregation functions and the classification of all integral ∨∨-distributive binary aggregation functions of length 3 Fulltext Access 14 Pages 2015
Three-dimensional Gabor feature extraction for hyperspectral imagery classification using a memetic framework Fulltext Access 14 Pages 2015
A framework of mapping undirected to directed graphs for community detection Fulltext Access 14 Pages 2015
Automatic determination about precision parameter value based on inclusion degree with variable precision rough set model Fulltext Access 14 Pages 2015
An improved early detection method of type-2 diabetes mellitus using multiple classifier system Fulltext Access 14 Pages 2015
Lattices of fuzzy sets and bipolar fuzzy sets, and mathematical morphology Fulltext Access 14 Pages 2015
An experimental investigation on the innate relationship between quality and refactoring Fulltext Access 14 Pages 2015
A benchmarking process to assess software requirements documentation for space applications Fulltext Access 14 Pages 2015
Automatic service derivation from business process model repositories via semantic technology Fulltext Access 14 Pages 2015
Analyzing the role of cognitive and cultural biases in the internalization of information security policies: Recommendations for information security awareness programs Fulltext Access 14 Pages 2015
The professionalisation of information security: Perspectives of UK practitioners Fulltext Access 14 Pages 2015
Information security conscious care behaviour formation in organizations Fulltext Access 14 Pages 2015
Improving mobile device security with operating system-level virtualization Fulltext Access 14 Pages 2015
A multiple-scenario assessment of the effect of a continuous-care, guideline-based decision support system on clinicians' compliance to clinical guidelines Fulltext Access 15 Pages 2015
Improving the information security culture through monitoring and implementation actions illustrated through a case study Fulltext Access 15 Pages 2015
Personality, attitudes, and intentions: Predicting initial adoption of information security behavior Fulltext Access 15 Pages 2015
A cloud-based framework for Home-diagnosis service over big medical data Fulltext Access 15 Pages 2015
Classification of antecedents towards safety use of health information technology: A systematic review Fulltext Access 15 Pages 2015
Trust-based privacy-aware participant selection in social participatory sensing Fulltext Access 15 Pages 2015
Sparse-based reconstruction of missing information in remote sensing images from spectral/temporal complementary information Fulltext Access 15 Pages 2015
An automated method to register airborne and terrestrial laser scanning point clouds Fulltext Access 15 Pages 2015
Tapping into the Hexagon spy imagery database: A new automated pipeline for geomorphic change detection Fulltext Access 15 Pages 2015
Temporal expression extraction with extensive feature type selection and a posteriori label adjustment Fulltext Access 15 Pages 2015
Automated mineral identification algorithm using optical properties of crystals Fulltext Access 15 Pages 2015
An Internet periphery study: Network centrality and clustering for mobile access in Bhutan Fulltext Access 15 Pages 2015
A generic discriminative part-based model for geospatial object detection in optical remote sensing images Fulltext Access 15 Pages 2015
Using least square support vector regression with genetic algorithm to forecast beta systematic risk Fulltext Access 15 Pages 2015
Comparative analysis of architectures for monitoring cloud computing infrastructures Fulltext Access 15 Pages 2015
New chosen-ciphertext secure identity-based encryption with tight security reduction to the bilinear Diffie-Hellman problem Fulltext Access 15 Pages 2015
An ensemble of intelligent water drop algorithms and its application to optimization problems Fulltext Access 15 Pages 2015
Compressive image sensing for fast recovery from limited samples: A variation on compressive sensing Fulltext Access 15 Pages 2015
An adaptive set-point modulation technique to enhance the performance of load frequency controllers in a multi-area power system Fulltext Access 15 Pages 2015
Mobile and fixed broadband access services substitution in Japan considering new broadband features Fulltext Access 15 Pages 2015
Two-phased composite I-distance indicator approach for evaluation of countries’ information development Fulltext Access 15 Pages 2015
Universal service obligations and public payphone use: Is regulation still necessary in the era of mobile telephony? Fulltext Access 15 Pages 2015
Effect of the customer experience on satisfaction with smartphones: Assessing smart satisfaction index with partial least squares Fulltext Access 15 Pages 2015
A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks Fulltext Access 15 Pages 2015
A pruning method of refining recursive reduced least squares support vector regression Fulltext Access 15 Pages 2015
Greedy randomized adaptive search procedure with exterior path relinking for differential dispersion minimization Fulltext Access 15 Pages 2015
An Information Axiom based decision making approach under hybrid uncertain environments Fulltext Access 15 Pages 2015
A multipurpose smart activity monitoring system for personalized health services Fulltext Access 15 Pages 2015
Population based Monte Carlo tree search hyper-heuristic for combinatorial optimization problems Fulltext Access 15 Pages 2015
Consistency analysis and priority derivation of triangular fuzzy preference relations based on modal value and geometric mean Fulltext Access 15 Pages 2015
The application of social network analysis algorithms in a system supporting money laundering detection Fulltext Access 15 Pages 2015
Fuzzy linguistic approach to quality assessment model for electricity network infrastructure Fulltext Access 15 Pages 2015
A linear threshold-hurdle model for product adoption prediction incorporating social network effects Fulltext Access 15 Pages 2015
A software tool for the automatic detection and quantification of fibrotic tissues in microscopy images Fulltext Access 15 Pages 2015
Direct inverse control of cable-driven parallel system based on type-2 fuzzy systems Fulltext Access 15 Pages 2015
Hidden Markov models for cancer classification using gene expression profiles Fulltext Access 15 Pages 2015
A new fuzzy programming method to derive the priority vector from an interval reciprocal comparison matrix Fulltext Access 15 Pages 2015
A hybrid possibilistic approach for Arabic full morphological disambiguation Fulltext Access 15 Pages 2015
Mixed aleatory and epistemic uncertainty quantification using fuzzy set theory Fulltext Access 15 Pages 2015
A practical off-line taint analysis framework and its application in reverse engineering of file format Fulltext Access 15 Pages 2015
Artificial Neural Network support to monitoring of the evolutionary driven security aware scheduling in computational distributed environments Fulltext Access 15 Pages 2015
Approximate and selective reasoning on knowledge graphs: A distributional semantics approach Fulltext Access 15 Pages 2015
Variational preferences and equilibria in games under ambiguous belief correspondences Fulltext Access 15 Pages 2015
The choice of generalized Dempster–Shafer rules for aggregating belief functions Fulltext Access 15 Pages 2015
Robust classification of multivariate time series by imprecise hidden Markov models Fulltext Access 15 Pages 2015
Propagation effects of model-calculated probability values in Bayesian networks Fulltext Access 15 Pages 2015
Intrusion alert prioritisation and attack detection using post-correlation analysis Fulltext Access 15 Pages 2015
On the usefulness and ease of use of a model-driven Method Engineering approach Fulltext Access 15 Pages 2015
Technology adoption: A conjoint analysis of consumers׳ preference on future online banking services Fulltext Access 15 Pages 2015
Rough approximation of a preference relation by multi-decision dominance for a multi-agent conflict analysis problem Fulltext Access 15 Pages 2015
Dynamic-context cooperative quantum-behaved particle swarm optimization based on multilevel thresholding applied to medical image segmentation Fulltext Access 15 Pages 2015
A hybrid fuzzy time series model based on granular computing for stock price forecasting Fulltext Access 15 Pages 2015
Look, listen and find: A purely audiovisual approach to online videos geotagging Fulltext Access 15 Pages 2015
Image restoration using total variation with overlapping group sparsity Fulltext Access 15 Pages 2015
Self-generated fuzzy systems design using artificial bee colony optimization Fulltext Access 15 Pages 2015