Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             46 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 Adaptive learning rate optimization algorithms with dynamic bound based on Barzilai-Borwein method Wang, Zhi-Jun

634 C p. 42-54
artikel
2 A flexible two-stage constrained multi-objective evolutionary algorithm based on automatic regulation Zou, Juan

634 C p. 227-243
artikel
3 A hybrid level-based learning swarm algorithm with mutation operator for solving large-scale cardinality-constrained portfolio optimization problems Kaucic, Massimiliano

634 C p. 321-339
artikel
4 A novel optimization method for geological drilling vertical well Zhou, Yang

634 C p. 550-563
artikel
5 A novel spatiotemporal prediction method based on fuzzy Transform: Application to demographic balance data Cardone, Barbara

634 C p. 677-695
artikel
6 Artificial bee colony algorithm-based design of discrete-time stable unknown input estimator Satoh, Toshiyuki

634 C p. 621-649
artikel
7 A sequential deep learning algorithm for sampled mixed-integer optimisation problems Chamanbaz, Mohammadreza

634 C p. 73-84
artikel
8 Category-aware optimal transport for incomplete data classification Liu, Zhen

634 C p. 443-476
artikel
9 Co-evolutionary algorithm based on problem analysis for dynamic multiobjective optimization Li, Xiaoli

634 C p. 520-538
artikel
10 DeepAK-IoT: An effective deep learning model for cyberattack detection in IoT networks Ding, Weiping

634 C p. 157-171
artikel
11 Deep reinforce learning for joint optimization of condition-based maintenance and spare ordering Hao, Shengang

634 C p. 85-100
artikel
12 Dense lead contrast for self-supervised representation learning of multilead electrocardiograms Liu, Wenhan

634 C p. 189-205
artikel
13 Deriving priorities from the fuzzy best-worst method matrix and its applications: A perspective of incomplete reciprocal preference relation Huang, Jing

634 C p. 761-778
artikel
14 Detecting backdoor in deep neural networks via intentional adversarial perturbations Xue, Mingfu

634 C p. 564-577
artikel
15 Dynamic multicriteria group decision-making method with automatic reliability and weight calculation Du, Yuan-Wei

634 C p. 400-422
artikel
16 Dynamic multi-objective evolutionary algorithms in noisy environments Sahmoud, Shaaban

634 C p. 650-664
artikel
17 Editorial Board
634 C p. ii
artikel
18 Effective and efficient core computation in signed networks Kim, Junghoon

634 C p. 290-307
artikel
19 Ensembles of priority rules to solve one machine scheduling problem in real-time Gil-Gala, Francisco J.

634 C p. 340-358
artikel
20 Evolutionary algorithm with individual-distribution search strategy and regression-classification surrogates for expensive optimization Li, Genghui

634 C p. 423-442
artikel
21 Existence and uniqueness of non-periodic solutions to boundary value problems for discrete fractional difference equations with uncertainty Beigmohamadi, R.

634 C p. 14-26
artikel
22 Finite-time synchronization of complex networks with partial communication channels failure Li, Yuanyuan

634 C p. 539-549
artikel
23 Hierarchical graph multi-agent reinforcement learning for traffic signal control Yang, Shantian

634 C p. 55-72
artikel
24 IEA-GNN: Anchor-aware graph neural network fused with information entropy for node classification and link prediction Zhang, Peiliang

634 C p. 665-676
artikel
25 Information granules-based long-term forecasting of time series via BPNN under three-way decision framework Zhu, Chenglong

634 C p. 696-715
artikel
26 Learning latent embedding via weighted projection matrix alignment for incomplete multi-view clustering Yin, Ming

634 C p. 244-258
artikel
27 Manipulation detection of key populations under information measurement Xiao, Shuai

634 C p. 1-13
artikel
28 Membership reconstruction attack in deep neural networks Long, Yucheng

634 C p. 27-41
artikel
29 Outlier detection in social networks leveraging community structure Dey, Arnab

634 C p. 578-586
artikel
30 PKET-GCN: Prior knowledge enhanced time-varying graph convolution network for traffic flow prediction Bao, Yinxin

634 C p. 359-381
artikel
31 Prescribed-time distributed observer based practical predefined-time leader-follower output consensus of second-order multiagent system with communication noises Ni, Junkang

634 C p. 271-289
artikel
32 Progressive decoupled target-into-source multi-target domain adaptation Zhou, Jiazhong

634 C p. 140-156
artikel
33 Protocol-based zonotopic state and fault estimation for communication-constrained industrial cyber-physical systems Li, Qi

634 C p. 730-743
artikel
34 Raven solver: From perception to reasoning Wei, Qinglai

634 C p. 716-729
artikel
35 Robust multi-view non-negative matrix factorization with adaptive graph and diversity constraints Li, Chenglu

634 C p. 587-607
artikel
36 Rumor source localization in social networks based on infection potential energy Li, Weimin

634 C p. 172-188
artikel
37 Safe batch constrained deep reinforcement learning with generative adversarial network Dong, Wenbo

634 C p. 259-270
artikel
38 Self-adaptive fuzzy learning ensemble systems with dimensionality compression from data streams Gu, Xiaowei

634 C p. 382-399
artikel
39 Self-supervised vision transformer-based few-shot learning for facial expression recognition Chen, Xuanchi

634 C p. 206-226
artikel
40 Self-triggered finite-time control for discrete-time Markov jump systems Wan, Haiying

634 C p. 101-121
artikel
41 Semi-supervised attribute reduction for partially labelled multiset-valued data via a prediction label strategy Li, Zhaowen

634 C p. 477-504
artikel
42 SiamST: Siamese network with spatio-temporal awareness for object tracking Zhang, Hong

634 C p. 122-139
artikel
43 Simplification logic for the management of unknown information Pérez-Gámez, Francisco

634 C p. 505-519
artikel
44 THAT-Net: Two-layer hidden state aggregation based two-stream network for traffic accident prediction Liu, Wei

634 C p. 744-760
artikel
45 Urban regional function guided traffic flow prediction Wang, Kuo

634 C p. 308-320
artikel
46 Your lottery ticket is damaged: Towards all-alive pruning for extremely sparse networks Kim, Daejin

634 C p. 608-620
artikel
                             46 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland