no |
title |
author |
magazine |
year |
volume |
issue |
page(s) |
type |
1 |
A bibliometric analysis of text mining in medical research
|
Hao, Tianyong |
|
2018 |
22 |
23 |
p. 7875-7892 |
article |
2 |
A class of belief structures based on possibility measures
|
Yager, Ronald R. |
|
2018 |
22 |
23 |
p. 7909-7917 |
article |
3 |
A comparative performance analysis of evolutionary algorithms on $${\varvec{k}}$$k-median and facility location problems
|
Peng, Xue |
|
2018 |
22 |
23 |
p. 7787-7796 |
article |
4 |
Adaptive parameter control of search group algorithm using fuzzy logic applied to networked control systems
|
Noorbin, Seyedeh Fa’ezeh Hosseini |
|
2017 |
22 |
23 |
p. 7939-7960 |
article |
5 |
Advances in applying soft computing techniques for big data and cloud computing
|
Gupta, B. B. |
|
2018 |
22 |
23 |
p. 7679-7683 |
article |
6 |
A generic optimization method of multivariate systems on graphic processing units
|
Liao, Guohong |
|
2018 |
22 |
23 |
p. 7857-7864 |
article |
7 |
A hybrid symbiotic organisms search and simulated annealing technique applied to efficient design of PID controller for automatic voltage regulator
|
Çelik, Emre |
|
2018 |
22 |
23 |
p. 8011-8024 |
article |
8 |
An efficient and secure searchable public key encryption scheme with privacy protection for cloud storage
|
Wu, Libing |
|
2018 |
22 |
23 |
p. 7685-7696 |
article |
9 |
A new container scheduling algorithm based on multi-objective optimization
|
Liu, Bo |
|
2018 |
22 |
23 |
p. 7741-7752 |
article |
10 |
A self-feedback strategy differential evolution with fitness landscape analysis
|
Huang, Ying |
|
2018 |
22 |
23 |
p. 7773-7785 |
article |
11 |
A virtual cluster embedding approach by coordinating virtual network and software-defined network
|
Tan, Yusong |
|
2018 |
22 |
23 |
p. 7797-7810 |
article |
12 |
Checking virtual machine kernel control-flow integrity using a page-level dynamic tracing approach
|
Zhan, Dongyang |
|
2017 |
22 |
23 |
p. 7977-7987 |
article |
13 |
Ciphertext retrieval via attribute-based FHE in cloud computing
|
Ding, Yong |
|
2018 |
22 |
23 |
p. 7753-7761 |
article |
14 |
Concurrent workflow budget- and deadline-constrained scheduling in heterogeneous distributed environments
|
Zhou, Naqin |
|
2018 |
22 |
23 |
p. 7705-7718 |
article |
15 |
Cooperation of improved HK networks based on prisoner dilemma game
|
Deng, Yunsheng |
|
2018 |
22 |
23 |
p. 7893-7899 |
article |
16 |
Dimension reduction in radio maps based on the supervised kernel principal component analysis
|
Jia, Bing |
|
2018 |
22 |
23 |
p. 7697-7703 |
article |
17 |
Efficient and secure big data storage system with leakage resilience in cloud computing
|
Zhang, Yinghui |
|
2018 |
22 |
23 |
p. 7763-7772 |
article |
18 |
Efficient subtree-based encryption for fuzzy-entity data sharing
|
Liu, Weiran |
|
2017 |
22 |
23 |
p. 7961-7976 |
article |
19 |
Enhancing differential evolution with interactive information
|
Zheng, Li Ming |
|
2017 |
22 |
23 |
p. 7919-7938 |
article |
20 |
External archive matching strategy for MOEA/D
|
Wang, Feng |
|
2018 |
22 |
23 |
p. 7833-7846 |
article |
21 |
Face pose estimation based on kernelized maximum separability
|
Liu, Xiao-Zhang |
|
2018 |
22 |
23 |
p. 7825-7831 |
article |
22 |
Incentive-driven attacker for corrupting two-party protocols
|
Wang, Yilei |
|
2018 |
22 |
23 |
p. 7733-7740 |
article |
23 |
Innovative Savonius rotors evolved by genetic algorithm based on 2D-DCT encoding
|
Zhou, Qianwei |
|
2018 |
22 |
23 |
p. 8001-8010 |
article |
24 |
Online handwritten signature verification using feature weighting algorithm relief
|
Yang, Li |
|
2018 |
22 |
23 |
p. 7811-7823 |
article |
25 |
P-closure ideals in BCI-algebras
|
Moussaei, Hosain |
|
2018 |
22 |
23 |
p. 7901-7908 |
article |
26 |
Research on QoS service composition based on coevolutionary genetic algorithm
|
Li, Yuanzhang |
|
2018 |
22 |
23 |
p. 7865-7874 |
article |
27 |
SSAM: toward Supervised Sentiment and Aspect Modeling on different levels of labeling
|
Zahedi, Esmaeil |
|
2017 |
22 |
23 |
p. 7989-8000 |
article |
28 |
Toward biology-inspired solutions for routing problems of wireless sensor networks with mobile sink
|
Jiang, Nan |
|
2018 |
22 |
23 |
p. 7847-7855 |
article |
29 |
Verifiable privacy-preserving single-layer perceptron training scheme in cloud computing
|
Zhang, Xiaoyu |
|
2018 |
22 |
23 |
p. 7719-7732 |
article |