Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             51 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A blind and robust color images watermarking method based on block transform and secured by modified 3-dimensional Hénon map Yousefi Valandar, Milad

24 2 p. 771-794
artikel
2 A core firework updating information guided dynamic fireworks algorithm for global optimization Zhao, Haitong

24 2 p. 1185-1211
artikel
3 A data-driven risk measurement model of software developer turnover Ma, Zifei

24 2 p. 825-842
artikel
4 A genetic algorithm with local search for solving single-source single-sink nonlinear non-convex minimum cost flow problems Ghasemishabankareh, Behrooz

24 2 p. 1153-1169
artikel
5 A high accurate vehicle speed estimation method Lu, Shengnan

24 2 p. 1283-1291
artikel
6 Algebraic semantics of the →,□\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\left\{ \rightarrow ,\square \right\} $$\end{document}-fragment of Propositional Lax Logic Celani, Sergio A.

24 2 p. 813-823
artikel
7 ALO-optimized artificial neural network-controlled dynamic voltage restorer for compensation of voltage issues in distribution system Ansal, V.

24 2 p. 1171-1184
artikel
8 An efficient and robust grey wolf optimizer algorithm for large-scale numerical optimization Long, Wen

24 2 p. 997-1026
artikel
9 A new cipher system using semi-natural composition in Indian raga Pranav, Prashant

24 2 p. 1529-1537
artikel
10 An intelligent credit card fraud detection approach based on semantic fusion of two classifiers Darwish, Saad M.

24 2 p. 1243-1253
artikel
11 A note on the algebraicity of L-fuzzy subalgebras in universal algebra Foka, S. V. Tchoffo

24 2 p. 895-899
artikel
12 A novel extension to VIKOR method under intuitionistic fuzzy context for solving personnel selection problem Krishankumar, R.

24 2 p. 1063-1081
artikel
13 A novel meta-heuristic optimization method based on golden ratio in nature Nematollahi, Amin Foroughi

24 2 p. 1117-1151
artikel
14 A page replacement algorithm based on a fuzzy approach to improve cache memory performance Akbari Bengar, Davood

24 2 p. 955-963
artikel
15 Application of a new accelerated algorithm to regression problems Dixit, Avinash

24 2 p. 1539-1552
artikel
16 A variable-level automated defect identification model based on machine learning Zhang, Yuwei

24 2 p. 1045-1061
artikel
17 Choquet integrals of weighted generalized and group generalized intuitionistic fuzzy soft sets Li, Sheng

24 2 p. 745-760
artikel
18 Cost optimization of rectangular RC footing using GA and UPSO Chaudhuri, Payel

24 2 p. 709-721
artikel
19 Deep learning for effective Android malware detection using API call graph embeddings Pektaş, Abdurrahman

24 2 p. 1027-1043
artikel
20 Ensemble classification from deep predictions with test data augmentation Calvo-Zaragoza, Jorge

24 2 p. 1423-1433
artikel
21 EPL models with fuzzy imperfect production system including carbon emission: a fuzzy differential equation approach De, Manoranjan

24 2 p. 1293-1313
artikel
22 Equilibrium strategy for human resource management with limited effort: in-house versus outsourcing Xu, Man

24 2 p. 1399-1422
artikel
23 Filters and ideals in the generalization of pseudo-BL algebras Chen, Wenjuan

24 2 p. 795-812
artikel
24 Generalized form solutions of cooperative game with fuzzy coalition structure Yu, Xiaohui

24 2 p. 861-877
artikel
25 Hierarchical granular hotspots detection Di Martino, Ferdinando

24 2 p. 1357-1376
artikel
26 Improved grey wolf optimization based on the two-stage search of hybrid CMA-ES Zhao, Yun-tao

24 2 p. 1097-1115
artikel
27 Improving the one-position inheritance artificial bee colony algorithm using heuristic search mechanisms Ning, Jiaxu

24 2 p. 1271-1281
artikel
28 KNN search-based trajectory cloaking against the Cell-ID tracking in cellular network Cui, Yuanbo

24 2 p. 965-980
artikel
29 learning with policy prediction in continuous state-action multi-agent decision processes Ghorbani, Farzaneh

24 2 p. 901-918
artikel
30 Left residuated lattices induced by lattices with a unary operation Chajda, Ivan

24 2 p. 723-729
artikel
31 Linguistic summarization of fuzzy social and economic networks: an application on the international trade network Genç, Serkan

24 2 p. 1511-1527
artikel
32 Modeling reverse thinking for machine learning Li, Huihui

24 2 p. 1483-1496
artikel
33 Monte Carlo method for the real and complex fuzzy system of linear algebraic equations Fathi-Vajargah, Behrouz

24 2 p. 1255-1270
artikel
34 Multi-objective redundancy hardening with optimal task mapping for independent tasks on multi-cores Yuan, Bo

24 2 p. 981-995
artikel
35 Multi-person and multi-criteria decision making with the induced probabilistic ordered weighted average distance Casanovas, Montserrat

24 2 p. 1435-1446
artikel
36 Neural collision avoidance system for biomimetic autonomous underwater vehicle Praczyk, Tomasz

24 2 p. 1315-1333
artikel
37 Neural network algorithm based on Legendre improved extreme learning machine for solving elliptic partial differential equations Yang, Yunlei

24 2 p. 1083-1096
artikel
38 Novel model to integrate word embeddings and syntactic trees for automatic caption generation from images Zhang, Hongbin

24 2 p. 1377-1397
artikel
39 On shadowed hypergraphs William-West, Tamunokuro Opubo

24 2 p. 1213-1224
artikel
40 On the initial value problem for fuzzy differential equations of non-integer order α∈(1,2)\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\alpha \in (1,2)$$\end{document} Hoa, Ngo Van

24 2 p. 935-954
artikel
41 Performance comparison using firefly and PSO algorithms on congestion management of deregulated power market involving renewable energy sources Farzana, D. Fathema

24 2 p. 1473-1482
artikel
42 RETRACTED ARTICLE: Performance comparison using firefly and PSO algorithms on congestion management of deregulated power market involving renewable energy sources Farzana, D. Fathema

24 2 p. 1473-1482
artikel
43 Robust convex clustering Quan, Zhenzhen

24 2 p. 731-744
artikel
44 Role of honesty and confined interpersonal influence in modelling predilections Khalid, Asma

24 2 p. 1497-1509
artikel
45 Scheduling parallel machine problem under general effects of deterioration and learning with past-sequence-dependent setup time: heuristic and meta-heuristic approaches Salehi Mir, Mir Saber

24 2 p. 1335-1355
artikel
46 Set operations of fuzzy sets using gradual elements Wu, Hsien-Chung

24 2 p. 879-893
artikel
47 Solving fuzzy regression equation and its approximation for random fuzzy variable and their application Wang, Tengfi

24 2 p. 919-933
artikel
48 Spectral resolutions and observables in n-perfect MV-algebras Dvurečenskij, Anatolij

24 2 p. 843-860
artikel
49 Structural representation-based off-line Tamil handwritten character recognition Raj, M. Antony Robert

24 2 p. 1447-1472
artikel
50 Survey on soft computing Liang, Yun

24 2 p. 761-770
artikel
51 SVM Hyper-parameters optimization using quantized multi-PSO in dynamic environment Kalita, Dhruba Jyoti

24 2 p. 1225-1241
artikel
                             51 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland