nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A cluster UAV inspired honeycomb defense system to confront military IoT: a dynamic game approach
|
Meng, Yufeng |
|
|
27 |
2 |
p. 1033-1043 |
artikel |
2 |
A Hidden Markov Model-based fuzzy modeling of multivariate time series
|
Li, Jinbo |
|
|
27 |
2 |
p. 837-854 |
artikel |
3 |
A hybrid multi-step storm surge forecasting model using multiple feature selection, deep learning neural network and transfer learning
|
Wang, Tiantian |
|
|
27 |
2 |
p. 935-952 |
artikel |
4 |
A new hyperchaotic system with Hopf bifurcation and its boundedness: infinite coexisting hidden and self-excited attractor
|
Ayub, Javeria |
|
|
27 |
2 |
p. 887-901 |
artikel |
5 |
A note on negation of a probability distribution
|
Kaur, Manpreet |
|
|
27 |
2 |
p. 667-676 |
artikel |
6 |
A novel analytical approach to micro-polar nanofluid thermal analysis in the presence of thermophoresis, Brownian motion and Hall currents
|
Jalili, Payam |
|
|
27 |
2 |
p. 677-689 |
artikel |
7 |
A novel evaluation model based on connection cloud model and game theory under multiple uncertainties
|
Wang, Yan |
|
|
27 |
2 |
p. 645-656 |
artikel |
8 |
Blind color image watermarking incorporating a residual network for watermark denoising and super-resolution reconstruction
|
Hu, Hwai-Tsu |
|
|
27 |
2 |
p. 917-934 |
artikel |
9 |
Defect of Archimedes optimization algorithm and its verification
|
Ding, Guiyan |
|
|
27 |
2 |
p. 701-722 |
artikel |
10 |
Detecting vulnerability in source code using CNN and LSTM network
|
Guo, Junjun |
|
|
27 |
2 |
p. 1131-1141 |
artikel |
11 |
DockerWatch: a two-phase hybrid detection of malware using various static features in container cloud
|
Wang, Yulong |
|
|
27 |
2 |
p. 1015-1031 |
artikel |
12 |
Energy optimization in smart urban buildings using bio-inspired ant colony optimization
|
Khan, Fakhri Alam |
|
|
27 |
2 |
p. 973-989 |
artikel |
13 |
Exploring invariance of concept stability for attribute reduction in three-way concept lattice
|
Hao, Fei |
|
|
27 |
2 |
p. 723-735 |
artikel |
14 |
Generalization of LM-filters: sum, subspace, product, quotient and stratification
|
Jose, Merin |
|
|
27 |
2 |
p. 809-819 |
artikel |
15 |
Generalized fractional-order hybrid of block-pulse functions and Bernoulli polynomials approach for solving fractional delay differential equations
|
Postavaru, Octavian |
|
|
27 |
2 |
p. 737-749 |
artikel |
16 |
H-DAC: discriminative associative classification in data streams
|
Seyfi, Majid |
|
|
27 |
2 |
p. 953-971 |
artikel |
17 |
Knowledge reasoning of transmission line component detection using CRITIC and TOPSIS approaches
|
Yu, Hai |
|
|
27 |
2 |
p. 991-1004 |
artikel |
18 |
New extensions of fuzzy sets with applications to rough topology and medical diagnosis
|
Ibrahim, Hariwan Z. |
|
|
27 |
2 |
p. 821-835 |
artikel |
19 |
On the genus of reduced cozero-divisor graph of commutative rings
|
Jesili, E. |
|
|
27 |
2 |
p. 657-666 |
artikel |
20 |
Power Muirhead mean operators of interval-valued intuitionistic fuzzy values in the framework of Dempster–Shafer theory for multiple criteria decision-making
|
Zhong, Yanru |
|
|
27 |
2 |
p. 763-782 |
artikel |
21 |
Prime L-ideal spaces in hoop algebras
|
Bakhshi, Mahmood |
|
|
27 |
2 |
p. 629-644 |
artikel |
22 |
Quotient structure on EQ-algebras by some types of pseudo valuations
|
Paad, Akbar |
|
|
27 |
2 |
p. 751-762 |
artikel |
23 |
Reliability estimation in multicomponent stress–strength model for generalized inverted exponential distribution
|
Jia, Junmei |
|
|
27 |
2 |
p. 903-916 |
artikel |
24 |
RETRACTED ARTICLE: Analytic hierarchy process-based automatic feature weight assignment method for content-based satellite image retrieval system
|
Rout, Narendra Kumar |
|
|
27 |
2 |
p. 1105-1115 |
artikel |
25 |
RETRACTED ARTICLE: A threshold-based energy efficient military surveillance system using heterogeneous wireless sensor networks
|
Singh, Samayveer |
|
|
27 |
2 |
p. 1163-1176 |
artikel |
26 |
RETRACTED ARTICLE: Construction of listed company management defense indicators based on big data and embedded network technology of the internet of things
|
Peng, Yuxiang |
|
|
27 |
2 |
p. 1201 |
artikel |
27 |
RETRACTED ARTICLE: Creating a ubiquitous learning environment using IoT in transportation
|
Jiang, He |
|
|
27 |
2 |
p. 1213 |
artikel |
28 |
RETRACTED ARTICLE: Deep clustering based on embedded auto-encoder
|
Huang, Xuan |
|
|
27 |
2 |
p. 1075-1090 |
artikel |
29 |
RETRACTED ARTICLE: Fault location measurement of sensor nodes based on fuzzy control algorithm
|
Yu, Nuo |
|
|
27 |
2 |
p. 1189-1199 |
artikel |
30 |
RETRACTED ARTICLE: Fusion algorithm of UAV infrared image and visible image registration
|
Shi, Yonghua |
|
|
27 |
2 |
p. 1061-1073 |
artikel |
31 |
RETRACTED ARTICLE: Hybrid Speech Steganography System using SS-RDWT with IPDP-MLE approach
|
Rao, R. Chinna |
|
|
27 |
2 |
p. 1117-1129 |
artikel |
32 |
RETRACTED ARTICLE: Internet of vehicles and autonomous systems with AI for medical things
|
Ghazal, Taher M. |
|
|
27 |
2 |
p. 1211 |
artikel |
33 |
RETRACTED ARTICLE: Military object detection in defense using multi-level capsule networks
|
Janakiramaiah, B. |
|
|
27 |
2 |
p. 1045-1059 |
artikel |
34 |
RETRACTED ARTICLE: Minimal key set of binary key-derivation tree in cloud storage
|
Ren, Zhengwei |
|
|
27 |
2 |
p. 1177-1188 |
artikel |
35 |
RETRACTED ARTICLE: Predicting safety hazards and safety behavior of underground coal mines
|
Di, Hongxi |
|
|
27 |
2 |
p. 1207 |
artikel |
36 |
RETRACTED ARTICLE: Research on planning and design of settlement from cities to rural areas based on big data technology
|
Tu, Sunan |
|
|
27 |
2 |
p. 1203 |
artikel |
37 |
RETRACTED ARTICLE: Road vehicle recognition algorithm in safety assistant driving based on artificial intelligence
|
Chen, Liang |
|
|
27 |
2 |
p. 1153-1162 |
artikel |
38 |
RETRACTED ARTICLE: Security management in smart home environment
|
Gladence, L. Mary |
|
|
27 |
2 |
p. 1209 |
artikel |
39 |
RETRACTED ARTICLE: Simulation research on the deformation safety monitoring and evaluation algorithm of coastal soft foundation pit based on big data
|
Huang, Zhenghong |
|
|
27 |
2 |
p. 1205 |
artikel |
40 |
RETRACTED ARTICLE: Three-dimensional face reconstruction of static images and computer standardization issues
|
Zhao, Hongjun |
|
|
27 |
2 |
p. 1143-1152 |
artikel |
41 |
Retraction Note: Big healthcare data for Trivial client having Novel Smart Attire (NSA)
|
Vasuki, N. |
|
|
27 |
2 |
p. 1219 |
artikel |
42 |
Retraction Note: Complex image recognition algorithm based on immune random forest model
|
Zhang, Xiaoyu |
|
|
27 |
2 |
p. 1215 |
artikel |
43 |
Retraction Note: Load prediction using (DoG–ALMS) for resource allocation based on IFP soft computing approach in cloud computing
|
Reshmi, R. |
|
|
27 |
2 |
p. 1221 |
artikel |
44 |
Retraction Note: Sentiment classification using harmony random forest and harmony gradient boosting machine
|
Sridharan, K. |
|
|
27 |
2 |
p. 1217 |
artikel |
45 |
RS-TNet: point cloud transformer with relation-shape awareness for fine-grained 3D visual processing
|
Wang, Xu |
|
|
27 |
2 |
p. 1005-1013 |
artikel |
46 |
Soft equivalent sets
|
Elsayed, S. M. |
|
|
27 |
2 |
p. 691-699 |
artikel |
47 |
Solutions of matrix games involving linguistic interval-valued intuitionistic fuzzy sets
|
Naqvi, Deeba R. |
|
|
27 |
2 |
p. 783-808 |
artikel |
48 |
Three-way preconcept and two forms of approximation operators
|
Mao, Hua |
|
|
27 |
2 |
p. 855-865 |
artikel |
49 |
Two-factor identity authentication scheme based on blockchain and fuzzy extractor
|
Bao, Di |
|
|
27 |
2 |
p. 1091-1103 |
artikel |
50 |
Vaguely quantified fuzzy dominance rough set and its incremental maintenance approximation approaches
|
Yang, Lei |
|
|
27 |
2 |
p. 867-886 |
artikel |