nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
An autism spectrum disorder adaptive identification based on the Elimination of brain connections: a proof of long-range underconnectivity
|
Benabdallah, Fatima Zahra |
|
|
26 |
10 |
p. 4701-4711 |
artikel |
2 |
A new mycorrhized tree optimization nature-inspired algorithm
|
Carreon-Ortiz, Hector |
|
|
26 |
10 |
p. 4797-4817 |
artikel |
3 |
A novel single-input interval type-2 fractional-order fuzzy controller for systems with parameter uncertainty
|
Aliasghary, Mortaza |
|
|
26 |
10 |
p. 4961-4977 |
artikel |
4 |
A real-time algorithm for weight training detection and correction
|
Lin, Chen-Yi |
|
|
26 |
10 |
p. 4727-4739 |
artikel |
5 |
A scientific report of singular kernel on the rate-type fluid subject to the mixed convection flow
|
Awan, Aziz Ullah |
|
|
26 |
10 |
p. 4575-4585 |
artikel |
6 |
Cattle identification with muzzle pattern using computer vision technology: a critical review and prospective
|
Kaur, Amanpreet |
|
|
26 |
10 |
p. 4771-4795 |
artikel |
7 |
CFDIL: a context-aware feature deep interaction learning for app recommendation
|
Hao, Qingbo |
|
|
26 |
10 |
p. 4755-4770 |
artikel |
8 |
Defect prediction model using transfer learning
|
Malhotra, Ruchika |
|
|
26 |
10 |
p. 4713-4726 |
artikel |
9 |
Evaluations for medical diagnoses phenomena through 2×2 linguistic neutrosophic environment-based game situation
|
Bhaumik, Ankan |
|
|
26 |
10 |
p. 4883-4893 |
artikel |
10 |
Generalized hesitant fuzzy numbers and their application in solving MADM problems based on TOPSIS method
|
Keikha, Abazar |
|
|
26 |
10 |
p. 4673-4683 |
artikel |
11 |
Hybrid Aquila optimizer with arithmetic optimization algorithm for global optimization tasks
|
Mahajan, Shubham |
|
|
26 |
10 |
p. 4863-4881 |
artikel |
12 |
Identification of unbalance characteristics of rotating machinery using a novel optimization-based methodology
|
Abbasi, Ahmad |
|
|
26 |
10 |
p. 4831-4862 |
artikel |
13 |
Integrating supplier selection, lot sizing and facility location decisions under a TBL approach: a case study
|
Alegoz, Mehmet |
|
|
26 |
10 |
p. 4819-4830 |
artikel |
14 |
Layered feature representation for differentiable architecture search
|
Hao, Jie |
|
|
26 |
10 |
p. 4741-4753 |
artikel |
15 |
Low contrast enhancement technique for color images using interval-valued intuitionistic fuzzy sets with contrast limited adaptive histogram equalization
|
Jebadass, J. Reegan |
|
|
26 |
10 |
p. 4949-4960 |
artikel |
16 |
Matrix reasoning and intelligent acquisition-application of unknown information
|
Chen, Xiaoyou |
|
|
26 |
10 |
p. 4607-4612 |
artikel |
17 |
Neutrosophic variational inequalities with applications in decision-making
|
Khan, Madad |
|
|
26 |
10 |
p. 4641-4652 |
artikel |
18 |
On topology of maximal ideals of EBL-algebras
|
Liu, Hongxing |
|
|
26 |
10 |
p. 4541-4552 |
artikel |
19 |
Parameter trees based on soft set theory and their similarity measures
|
Karaaslan, Faruk |
|
|
26 |
10 |
p. 4629-4639 |
artikel |
20 |
Pseudo-fractional operators of variable order and applications
|
Oliveira, D. S. |
|
|
26 |
10 |
p. 4587-4605 |
artikel |
21 |
Q-residuated lattices and lattice pseudoeffect algebras
|
Zhang, Xiaohong |
|
|
26 |
10 |
p. 4519-4540 |
artikel |
22 |
RETRACTED ARTICLE: Feeder segment switch-based relay protection for a multilayer differential defense-oriented distribution network
|
Wang, Qingjie |
|
|
26 |
10 |
p. 4895-4904 |
artikel |
23 |
RETRACTED ARTICLE: iTSA: an improved Tunicate Swarm Algorithm for defensive resource assignment problem
|
Yadav, Kusum |
|
|
26 |
10 |
p. 4929-4937 |
artikel |
24 |
RETRACTED ARTICLE: Multivariate weighted isotonic regressive modest adaptive boosting-based resource-aware routing in WSN
|
Muruganandam, N. |
|
|
26 |
10 |
p. 4939-4948 |
artikel |
25 |
RETRACTED ARTICLE: Toward efficient security-based authentication for the internet of drones in defense wireless communication
|
Selvi, P. Tamil |
|
|
26 |
10 |
p. 4905-4913 |
artikel |
26 |
RETRACTED ARTICLE: Verification and modeling of IoT time automata for gateway security system
|
Kamakshi, P. |
|
|
26 |
10 |
p. 4915-4928 |
artikel |
27 |
Swing-up control of an inverted pendulum cart system using the approach of Hedge-algebras theory
|
Bui, Hai-Le |
|
|
26 |
10 |
p. 4613-4627 |
artikel |
28 |
Three methods to generalize Pawlak approximations via simply open concepts with economic applications
|
El-Bably, Mostafa K. |
|
|
26 |
10 |
p. 4685-4700 |
artikel |
29 |
Two different approaches for consistency of intuitionistic multiplicative preference relation using directed graph
|
Sahu, Mamata |
|
|
26 |
10 |
p. 4653-4671 |
artikel |
30 |
Web applications for multiuser interaction based on power Heronian aggregation operators
|
Fahmi, Aliya |
|
|
26 |
10 |
p. 4553-4573 |
artikel |