Pages | Title and author(s) |
76-83 | A fuzzy-rough case-based learning approach for intelligent die designChi Zhou, Feng Ruan, QingXiang Xia, ZhenYuan Huang DOI: 10.1504/IJCAT.2009.026584 |
84-96 | Integrated evaluator extracted from infringement lawsuits using extension neural network accommodated to patent assessmentYi-Hsuan Lai, Hui-Chung Che DOI: 10.1504/IJCAT.2009.026585 |
97-103 | Improved genetic algorithm for optimal design of fuzzy classifierP. Ganesh Kumar, D. Devaraj DOI: 10.1504/IJCAT.2009.026586 |
104-112 | A condition-based maintenance policy for intelligent monitored systemWenzhu Liao, Ershun Pan, Lifeng Xi DOI: 10.1504/IJCAT.2009.026587 |
113-121 | Digital watermarking for relational databases using traceability parameterBurepalli V.S. Rao, Munaga V.N.K. Prasad DOI: 10.1504/IJCAT.2009.026588 |
122-127 | A virtual layout system integrated with polar coordinates-based genetic algorithmYa-Bo Luo DOI: 10.1504/IJCAT.2009.026589 |
128-138 | Analysing the behavioural intention of using telehomecare from a management viewpoint – an application of artificial neural networkJui-Chen Huang DOI: 10.1504/IJCAT.2009.026590 |
139-149 | A technique for retrospective computer validation of drug manufacturing softwareMasakazu Takahashi DOI: 10.1504/IJCAT.2009.026591 |
150-164 | Feature string-based intelligent information retrieval from Tamil document imagesS. Abirami, D. Manjula DOI: 10.1504/IJCAT.2009.026592 |
165-173 | Ontology-based relevance analysis for automatic reference trackingMahalakshmi G. Suryanarayanan, Sendhilkumar Selvaraju, Alagu Irulappan, Preethan Mirinda, Gnanasekaran DOI: 10.1504/IJCAT.2009.026593 |
174-182 | Exploring optimised route selection strategy in tree- and mesh-based multicast routing in MANETsE. Baburaj, V. Vasudevan DOI: 10.1504/IJCAT.2009.026594 |
183-193 | Comparative analysis of regression and machine learning methods for predicting fault proneness modelsYogesh Singh, Arvinder Kaur, Ruchika Malhotra DOI: 10.1504/IJCAT.2009.026595 |
194-203 | A novel framework for optimised privacy preserving data mining using the innovative desultory techniqueJ. Indumathi, G.V. Uma DOI: 10.1504/IJCAT.2009.026596 |
204-209 | Analysis of the effect of Headline News in financial market through text categorisationSatoru Takahashi, Hiroshi Takahashi, Kazuhiko Tsuda DOI: 10.1504/IJCAT.2009.026597 |
210-218 | The discovery of history using inverse simulationSetsuya Kurahashi DOI: 10.1504/IJCAT.2009.026598 |
219-233 | Architecture for effective personalised web searchS. Sendhilkumar, T.V. Geetha DOI: 10.1504/IJCAT.2009.026599 |
234-240 | A method to retrieve telops based on the distance of character image features between queries and telopsMasami Shishibori, Nobuki Nishikawa, Kenji Kita DOI: 10.1504/IJCAT.2009.026600 |
241-261 | A unified approach for determining the underlying causes of non-stationary disturbancesPraveen Pankajakshan DOI: 10.1504/IJCAT.2009.026601 |
262-270 | A method to implement effective My-page service system using three-dimensional vectorsMasayuki Kessoku, Kazuhiko Tsuda, El-Sayed Atlam, Kazuhiro Morita, Masao Fuketa, Jun-ichi Aoe DOI: 10.1504/IJCAT.2009.026602 |
271-280 | Ontology-based query processing for understanding intentions of indirect speech acts in natural-language question answeringHideki Mima, Susumu Ota, Koji Nagatsuna DOI: 10.1504/IJCAT.2009.026603 |
281-295 | An automatic extraction method of word tendency judgement for specific subjectsKazuhiro Morita, El-Sayed Atlam, Masao Fuketa, Yuya Iwabu, Jun-ichi Aoe DOI: 10.1504/IJCAT.2009.026604 |
296-306 | Relevant estimation among fields using field association wordsAkihiro Tanaka, El-Sayed Atlam, Kazukiro Morita, Yohei Tsukuda, Masao Fuketa, Jun-ichi Aoe DOI: 10.1504/IJCAT.2009.026605 |
307-314 | An efficient search method of e-government information using knowledge of search historyKeiichiro Mitani, Masakazu Takahashi, Kazuhiko Tsuda DOI: 10.1504/IJCAT.2009.026606 |