Sciweavers

Share
IJACTAICIT
2010
122views more  IJACTAICIT 2010»
8 years 3 months ago
Classification of Multi-Class Datasets Using 2D Membership Functions in TSK Fuzzy System
Loghman Kaki, Mohammad Teshnehlab, Mahdi Aliyari S...
IJACTAICIT
2010
121views more  IJACTAICIT 2010»
8 years 3 months ago
Separation and Equalization of Cross-Coupled Signals by Adaptive Cancellation
This paper describes an adaptive noise cancellation structure suitable for the separation and equalization of signals that coupled due to the approximate placing of primary and au...
Manal Jamil Al-Kindi
IJACTAICIT
2010
151views more  IJACTAICIT 2010»
8 years 3 months ago
The Comparative Study of Software Optimal Release Time Based on Burr Distribution
It is great practical interest to decide when to stop testing a software system in development phase and transfer it to the user. This problem is called as the optimal software re...
Hee-Cheul Kim, Hyoung-Keun Park
IJACTAICIT
2010
153views more  IJACTAICIT 2010»
8 years 3 months ago
Prediction Using Recurrent Neural Network Based Fuzzy Inference system by the Modified Bees Algorithm
In this paper, a recurrent neural network based fuzzy inference system (RNFIS) for prediction is proposed. A recurrent network is embedded in the RNFIS by adding feedback connecti...
Zahra Khanmirzaei, Mohammad Teshnehlab
IJACTAICIT
2010
135views more  IJACTAICIT 2010»
8 years 3 months ago
New Clustering Protocol to Decrease Probability Failure Nodes and Increasing the Lifetime in WSNs
Clustering in wireless sensor networks is one of the crucial methods for increasing of network lifetime. There are many algorithms in for clustering. LEACH algorithm is one of the...
Davood KeyKhosravi, Ali Ghaffari, Ali Hosseinalipo...
IJACTAICIT
2010
84views more  IJACTAICIT 2010»
8 years 3 months ago
An Improved Deadlock Prevention Strategy for FMSs Using Theory of Regions
The theory of regions has been recognized as the optimal deadlock prevention policy based on the marking/transition-separation instance (MTSI) or the event-state-separation-proble...
Yi-Sheng Huang, Yen-Liang Pan
IJACTAICIT
2010
99views more  IJACTAICIT 2010»
8 years 3 months ago
Utilizing Trusted Platform Module to Mitigate Botnet Attacks
Ever since, internet banking came into existence it has been a bull's eye for the hackers. Up to date, several cases have been reported by internet banking users for missing ...
Muththolib Sidheeq, Ali Dehghantanha, Geetha Kanan...
books