• Evolutionary pressures in emerging societies of secondary users in cognitive radio networks

  • A cellular model of swarm intelligence in bees and robots

  • Hyperdimensional Computing for Noninvasive Brain–Computer Interfaces: Blind and One-Shot Classification of EEG Error-Related Potentials

  • Fuzzy Logic Training for Predicting Age of Rats

  • Efficient Feature Vector Clustering for Automatic Speech Recognition Systems

  • Affinity Based Search Amount Control in Decomposition Based Evolutionary Multi-Objective Optimization

  • Polynomial Mean-Centric Crossover for Directed Mating in Evolutionary Constrained Multi-Objective Continuous Optimization

  • On Arithmetic Functions in Actin Filament Networks

  • Quantitative Assessment of Ambiguities in Plasmodium Propagation in Terms of Complex Networks and Rough Sets

  • Talmudic Foundations of Mathematics

  • Automatic role-oriented assignment of channels in the ad hoc network of hierarchically organized agents

  • Anticipating Diabetic Kidney Disease Through Measurements of Albumin in Diabetes Patients

  • Bio-inspired Active Attack for Identification of Networked Control Systems

  • Epidemic Information Dissemination in Mobile Molecular Communication Networks for Target Detection Applications

  • Relating Feed-Forward Loop Crosstalk to Robust Information Transport Across Transcriptional Networks

  • A Framework of Nanomechanical Communication Systems Based on State Transitions

  • Impacts of Erasure Coding on Robustness against Molecular Packet Losses in Aqueous, Collisional Environments

  • Robotic oligarchy: How a few members can control their whole society by doing almost nothing

  • Performance Optimization of Self-organizing Bioparticles for Multi-target Detection and Gravitation Problems

  • Simulating Self-replicating Patterns of DNA Tiles

  • A Survey of Location Aware Ant Colony Optimization Routing Protocols in MANETs

  • Model abstractions of Device-Delay for Interactive Cyber-Physical Systems under Uncertainty

  • This Malware Looks Familiar: Laymen Identify Malware Run-time Similarity with Chernoff faces and Stick Figures

  • A vertical channel model of molecular communication and its test-bed

  • On The Energy Efficiency of Adaptive WBAN Systems for mHealth Services