Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             96 results found
no title author magazine year volume issue page(s) type
1 A comparative study of machine translation for multilingual sentence-level sentiment analysis Araújo, Matheus

512 C p. 1078-1102
article
2 A convolutional neural-based learning classifier system for detecting database intrusion via insider attack Bu, Seok-Jun

512 C p. 123-136
article
3 Adaptive decentralized output feedback PI tracking control design for uncertain interconnected nonlinear systems with input quantization Sun, Haibin

512 C p. 186-206
article
4 A fully scalable big data framework for Botnet detection based on network traffic analysis Mousavi, S.H.

512 C p. 629-640
article
5 A general fragments allocation method for join query in distributed database Gao, Jintao

512 C p. 1249-1263
article
6 A heterogeneous QUALIFLEX method with criteria interaction for multi-criteria group decision making Liang, Yingying

512 C p. 1481-1502
article
7 A hybrid convolution network for serial number recognition on banknotes Wang, Feng

512 C p. 952-963
article
8 A local search algorithm with reinforcement learning based repair procedure for minimum weight independent dominating set Wang, Yiyuan

512 C p. 533-548
article
9 An adaptive hybrid evolutionary immune multi-objective algorithm based on uniform distribution selection Qiao, Junfei

512 C p. 446-470
article
10 An adaptive Lagrangian relaxation-based algorithm for a coordinated water supply and wastewater collection network design problem Fathollahi-Fard, Amir Mohammad

512 C p. 1335-1359
article
11 Analyzing center/surround retinex Lisani, Jose-Luis

512 C p. 741-759
article
12 An efficient discrete PSO coupled with a fast local search heuristic for the DNA fragment assembly problem Ben Ali, Abdelkamel

512 C p. 880-908
article
13 An ensemble method for inverse reinforcement learning Lin, Jin-Ling

512 C p. 518-532
article
14 A new algorithm for positive influence maximization in signed networks Ju, Weijia

512 C p. 1571-1591
article
15 A non-revisiting genetic algorithm based on a novel binary space partition tree Su, Yansen

512 C p. 661-674
article
16 A novel approach for learning label correlation with application to feature selection of multi-label data Che, Xiaoya

512 C p. 795-812
article
17 A novel forecasting model for the long-term fluctuation of time series based on polar fuzzy information granules Luo, Chao

512 C p. 760-779
article
18 Applying social network analysis to genetic algorithm in optimizing project risk response decisions Wang, Lei

512 C p. 1024-1042
article
19 A probabilistic view on semilinear copulas Sloot, Henrik

512 C p. 258-276
article
20 A projection-based regret theory method for multi-attribute decision making under interval type-2 fuzzy sets environment Wang, Huidong

512 C p. 108-122
article
21 A recursive algorithm to increase the speed of regression-based binary recommendation systems Khadem, Mahla Mohammadzadeh

512 C p. 1324-1334
article
22 A refined Hölder’s inequality for Choquet expectation by Cauchy-Schwarz’s inequality Agahi, Hamzeh

512 C p. 929-934
article
23 A scheduling scheme in the cloud computing environment using deep Q-learning Tong, Zhao

512 C p. 1170-1191
article
24 A time-varying mirrored S-shaped transfer function for binary particle swarm optimization Beheshti, Zahra

512 C p. 1503-1542
article
25 A tree-based neural network model for biomedical event trigger detection Fei, Hao

512 C p. 175-185
article
26 Auto-weighted multi-view co-clustering with bipartite graphs Huang, Shudong

512 C p. 18-30
article
27 A vague multidimensional dependency structure: Conditional versus Unconditional fuzzy copula models Romagnoli, Silvia

512 C p. 1202-1213
article
28 Calculus for linearly correlated fuzzy function using Fréchet derivative and Riemann integral Santo Pedro, Francielle

512 C p. 219-237
article
29 CCFR2: A more efficient cooperative co-evolutionary framework for large-scale global optimization Yang, Ming

512 C p. 64-79
article
30 Clicking position and user posting behavior in online review systems: A data-driven agent-based modeling approach Jiang, Guoyin

512 C p. 161-174
article
31 Conditional Wasserstein generative adversarial network-gradient penalty-based approach to alleviating imbalanced data classification Zheng, Ming

512 C p. 1009-1023
article
32 Consensus of multi-agent systems with finite-time and fixed-time observation Yu, Zhiyong

512 C p. 909-928
article
33 Constrained Relational Topic Models Terragni, Silvia

512 C p. 581-594
article
34 Corrigendum to “Recurrent neural network-based semantic variational autoencoder for Sequence-to-sequence learning” [Information Sciences 490 (2019) 59-73] Jang, Myeongjun

512 C p. 277
article
35 Designing privacy-aware internet of things applications Perera, Charith

512 C p. 238-257
article
36 Determining the most representative image on a Web page Vyas, Krishna

512 C p. 1234-1248
article
37 2D Hybrid chaos map for image security transform based on framelet and cellular automata Khedmati, Y.

512 C p. 855-879
article
38 Editorial Board
512 C p. ii
article
39 Efficient and accurate 3D modeling based on a novel local feature descriptor Zhao, Bao

512 C p. 295-314
article
40 Efficient digital signatures from RSA without random oracles Seo, Jae Hong

512 C p. 471-480
article
41 Efficient distance join query processing in distributed spatial data management systems García-García, Francisco

512 C p. 985-1008
article
42 Enhanced digital chaotic maps based on bit reversal with applications in random bit generators Alawida, Moatsum

512 C p. 1155-1169
article
43 Event-based fault-tolerant control for networked control systems applied to aircraft engine system Li, Tao

512 C p. 1063-1077
article
44 Extended decision field theory with social-learning for long-term decision-making processes in social networks Lee, Seunghan

512 C p. 1293-1307
article
45 Fabric defect inspection based on lattice segmentation and template statistics Jia, Liang

512 C p. 964-984
article
46 Face hallucination via multiple feature learning with hierarchical structure Liu, Licheng

512 C p. 416-430
article
47 Finite-time containment control for nonlinear multi-agent systems with external disturbances Lü, Hui

512 C p. 338-351
article
48 GraPASA: Parametric graph embedding via siamese architecture Chen, Yujun

512 C p. 1442-1457
article
49 H ∞ bumpless transfer reliable control of Markovian switching LPV systems subject to actuator failures Yang, Dong

512 C p. 431-445
article
50 How to securely outsource the extended euclidean algorithm for large-scale polynomials over finite fields Zhou, Qiang

512 C p. 641-660
article
51 Identification of influencers in complex networks by local information dimensionality Wen, Tao

512 C p. 549-562
article
52 Improving network embedding with partially available vertex and edge content Lan, Lin

512 C p. 935-951
article
53 Incentive mechanism for the listing item task in crowdsourcing Wang, Shaofei

512 C p. 80-95
article
54 Incremental route inference from low-sampling GPS data: An opportunistic approach to online map matching Luo, Linbo

512 C p. 1407-1423
article
55 Inference attacks on genomic privacy with an improved HMM and an RCNN model for unrelated individuals Ding, Hongfa

512 C p. 207-218
article
56 Interpretable multiclass classification by MDL-based rule lists Proença, Hugo M.

512 C p. 1372-1393
article
57 Intrusion-resilient public cloud auditing scheme with authenticator update Xu, Yan

512 C p. 616-628
article
58 Kernel density estimation based sampling for imbalanced class distribution Kamalov, Firuz

512 C p. 1192-1201
article
59 Learning heterogeneous traffic patterns for travel time prediction of bus journeys He, Peilan

512 C p. 1394-1406
article
60 Learning imbalanced datasets based on SMOTE and Gaussian distribution Pan, Tingting

512 C p. 1214-1233
article
61 LSC: Online auto-update smart contracts for fortifying blockchain-based log systems Shao, Wei

512 C p. 506-517
article
62 Making use of observable parameters in evolutionary dynamic optimization Zhu, Tao

512 C p. 708-725
article
63 Minimizing rumor influence in multiplex online social networks based on human individual and social behaviors Hosni, Adil Imad Eddine

512 C p. 1458-1480
article
64 Movement patterns of a particle swarm in high dimensional spaces Oldewage, Elre T.

512 C p. 1043-1062
article
65 MP3 steganalysis based on joint point-wise and block-wise correlations Wang, Yuntao

512 C p. 1118-1133
article
66 Multiattribute group decision making based on intuitionistic fuzzy partitioned Maclaurin symmetric mean operators Liu, Peide

512 C p. 830-854
article
67 Multifactorial optimization via explicit multipopulation evolutionary framework Li, Genghui

512 C p. 1555-1570
article
68 Note on entropies of hesitant fuzzy linguistic term sets and their applications Wei, Cuiping

512 C p. 352-368
article
69 Novel equal division values based on players’ excess vectors and their applications to logistics enterprise coalitions Liu, Jia-Cai

512 C p. 1543-1554
article
70 Nullnorms on bounded lattices derived from t-norms and t-conorms Çaylı, Gül Deniz

512 C p. 1134-1154
article
71 Objective reduction for visualising many-objective solution sets Zhen, Liangli

512 C p. 278-294
article
72 On efficiently diversified top-k geo-social keyword query processing in road networks Zhao, Jingwen

512 C p. 813-829
article
73 On the f-divergence for discrete non-additive measures Torra, Vicenç

512 C p. 50-63
article
74 Optimal performance of LTI systems over power constrained erasure channels Jiang, Xiao-Wei

512 C p. 327-337
article
75 PAC: A novel self-adaptive neuro-fuzzy controller for micro aerial vehicles Ferdaus, Md Meftahul

512 C p. 481-505
article
76 Pareto optimal strategy for linear stochastic systems with H ∞ constraint in finite horizon Jiang, Xiushan

512 C p. 1103-1117
article
77 Parsimonious generalization of fuzzy thematic sets in taxonomies applied to the analysis of tendencies of research in data science Frolov, Dmitry

512 C p. 595-615
article
78 Personalized image quality assessment with Social-Sensed aesthetic preference Cui, Chaoran

512 C p. 780-794
article
79 Predicting the active period of popularity evolution: A case study on Twitter hashtags Huang, Jianyi

512 C p. 315-326
article
80 Rapid compressed sensing reconstruction: A semi-tensor product approach Wang, Jinming

512 C p. 693-707
article
81 Recommendation system exploiting aspect-based opinion mining with deep learning method Da'u, Aminu

512 C p. 1279-1292
article
82 Resilient and secure remote monitoring for a class of cyber-physical systems against attacks Ge, Xiaohua

512 C p. 1592-1605
article
83 Robust event-triggered reliable control for T-S fuzzy uncertain systems via weighted based inequality Nagamani, G.

512 C p. 31-49
article
84 Robust face hallucination via locality-constrained multiscale coding Li, Na

512 C p. 369-380
article
85 Robust reversible data hiding scheme based on two-layer embedding strategy Kumar, Rajeev

512 C p. 96-107
article
86 Robust visual tracking based on variational auto-encoding Markov chain Monte Carlo Kwon, Junseok

512 C p. 1308-1323
article
87 Single image super resolution using dictionary learning and sparse coding with multi-scale and multi-directional Gabor feature representation Ayas, Selen

512 C p. 1264-1278
article
88 Smoothed self-organizing map for robust clustering D’Urso, Pierpaolo

512 C p. 381-401
article
89 Sparse unmixing of hyperspectral data with bandwise model Li, Chang

512 C p. 1424-1441
article
90 Sparsity in function and derivative approximation via the empirical feature space Soman, Sumit

512 C p. 402-415
article
91 Spectral based hypothesis testing for community detection in complex networks Dong, Zhishan

512 C p. 1360-1371
article
92 Structured subspace embedding on attributed networks Yu, Zhongjing

512 C p. 726-740
article
93 Tensor-based mathematical framework and new centralities for temporal multilayer networks Wang, Dingjie

512 C p. 563-580
article
94 Toward optimal participant decisions with voting-based incentive model for crowd sensing Jiang, Nan

512 C p. 1-17
article
95 Two-pass hashing feature representation and searching method for copy-move forgery detection Zhong, Jun-Liu

512 C p. 675-692
article
96 Vector partitioning quantization utilizing K-means clustering for physical layer secret key generation Han, Qingqing

512 C p. 137-160
article
                             96 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands