nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Addressing site selection for earthquake shelters with hesitant multiplicative linguistic preference relation
|
Wu, Hangyao |
|
|
516 |
C |
p. 370-387 |
artikel |
2 |
A deep learning approach for multi-attribute data: A study of train delay prediction in railway systems
|
Huang, Ping |
|
|
516 |
C |
p. 234-253 |
artikel |
3 |
A hybrid multi-resolution multi-objective ensemble model and its application for forecasting of daily PM2.5 concentrations
|
Liu, Hui |
|
|
516 |
C |
p. 266-292 |
artikel |
4 |
And-like-uninorm based consistency analysis and optimized fuzzy weight closed-form solution of triangular fuzzy additive preference relations
|
Wang, Zhou-Jing |
|
|
516 |
C |
p. 429-452 |
artikel |
5 |
A practical and communication-efficient deniable authentication with source-hiding and its application on Wi-Fi privacy
|
Zeng, Shengke |
|
|
516 |
C |
p. 331-345 |
artikel |
6 |
A practical solution to clone problem in anonymous information system
|
Lian, Bin |
|
|
516 |
C |
p. 158-191 |
artikel |
7 |
A unified framework of identity-based sequential aggregate signatures from 2-level HIBE schemes
|
Yao, Yanqing |
|
|
516 |
C |
p. 505-514 |
artikel |
8 |
Computation of moments for probabilistic finite-state automata
|
Sánchez, Joan Andreu |
|
|
516 |
C |
p. 388-400 |
artikel |
9 |
Conflict analysis under one-vote veto based on approximate three-way concept lattice
|
Zhi, Huilai |
|
|
516 |
C |
p. 316-330 |
artikel |
10 |
DGHNL: A new deep genetic hierarchical network of learners for prediction of credit scoring
|
Pławiak, Paweł |
|
|
516 |
C |
p. 401-418 |
artikel |
11 |
Discovering differential features: Adversarial learning for information credibility evaluation
|
Wu, Lianwei |
|
|
516 |
C |
p. 453-473 |
artikel |
12 |
Editorial Board
|
|
|
|
516 |
C |
p. ii |
artikel |
13 |
Evidence reasoning rule-based classifier with uncertainty quantification
|
Xu, Xiaobin |
|
|
516 |
C |
p. 192-204 |
artikel |
14 |
Fractional discrete Tchebyshev moments and their applications in image encryption and watermarking
|
Xiao, Bin |
|
|
516 |
C |
p. 545-559 |
artikel |
15 |
GANCCRobot: Generative adversarial nets based chinese calligraphy robot
|
Wu, Ruiqi |
|
|
516 |
C |
p. 474-490 |
artikel |
16 |
Group decision making with incomplete intuitionistic multiplicative preference relations
|
Zhang, Zhiming |
|
|
516 |
C |
p. 560-571 |
artikel |
17 |
Improving social and behavior recommendations via network embedding
|
Zhao, Weizhong |
|
|
516 |
C |
p. 125-141 |
artikel |
18 |
Joint dimensionality reduction and metric learning for image set classification
|
Yan, Wenzhu |
|
|
516 |
C |
p. 109-124 |
artikel |
19 |
Lightweight group convolutional network for single image super-resolution
|
Yang, Aiping |
|
|
516 |
C |
p. 220-233 |
artikel |
20 |
Low dimensional mid-term chaotic time series prediction by delay parameterized method
|
Guo, Xiaoxiang |
|
|
516 |
C |
p. 1-19 |
artikel |
21 |
Maximal chains on the interval [0,1] with respect to t-norm-partial orders and uninorm-partial orders
|
Duan, Qihong |
|
|
516 |
C |
p. 419-428 |
artikel |
22 |
Modeling a stochastic age-structured capital system with Poisson jumps using neural networks
|
Ren, Jie |
|
|
516 |
C |
p. 254-265 |
artikel |
23 |
Multi-view RBM with posterior consistency and domain adaptation
|
Zhang, Nan |
|
|
516 |
C |
p. 142-157 |
artikel |
24 |
No-reference quality index of depth images based on statistics of edge profiles for view synthesis
|
Li, Leida |
|
|
516 |
C |
p. 205-219 |
artikel |
25 |
On graph entropy measures based on the number of independent sets and matchings
|
Wan, Pengfei |
|
|
516 |
C |
p. 491-504 |
artikel |
26 |
On the negation of a Dempster–Shafer belief structure based on maximum uncertainty allocation
|
Deng, Xinyang |
|
|
516 |
C |
p. 346-352 |
artikel |
27 |
Pressure sensor placement in water distribution networks for leak detection using a hybrid information-entropy approach
|
Khorshidi, Mohammad Sadegh |
|
|
516 |
C |
p. 56-71 |
artikel |
28 |
Public-key authenticated encryption with keyword search revisited: Security model and constructions
|
Qin, Baodong |
|
|
516 |
C |
p. 515-528 |
artikel |
29 |
Public key encryption with equality test in the standard model
|
Lee, Hyung Tae |
|
|
516 |
C |
p. 89-108 |
artikel |
30 |
Resource and replica management strategy for optimizing financial cost and user experience in edge cloud computing system
|
Li, Chunlin |
|
|
516 |
C |
p. 33-55 |
artikel |
31 |
Restoring incomplete PUMLPRs for evaluating the management way of online public opinion
|
Xie, Wanying |
|
|
516 |
C |
p. 72-88 |
artikel |
32 |
Rules acquisition of formal decision contexts based on three-way concept lattices
|
Wei, Ling |
|
|
516 |
C |
p. 529-544 |
artikel |
33 |
Scalable disk-based topic modeling for memory limited devices
|
Kim, Byungju |
|
|
516 |
C |
p. 353-369 |
artikel |
34 |
Selective prototype-based learning on concept-drifting data streams
|
Chen, Dongzi |
|
|
516 |
C |
p. 20-32 |
artikel |
35 |
Self-labeling methods for unsupervised transfer ranking
|
Li, Pengfei |
|
|
516 |
C |
p. 293-315 |
artikel |