nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Advancing an evaluation model: how do family SMEs select innovation scheme in lean management?
|
Jing, Shuwei |
|
|
28 |
5 |
p. 4125-4149 |
artikel |
2 |
A feedback analyzer system for interval valued responses on cloud services
|
Trueman, Tina Esther |
|
|
28 |
5 |
p. 4457-4469 |
artikel |
3 |
Alleviating repetitive tokens in non-autoregressive machine translation with unlikelihood training
|
Wang, Shuheng |
|
|
28 |
5 |
p. 4681-4688 |
artikel |
4 |
A modified hybrid particle swarm optimization based on comprehensive learning and dynamic multi-swarm strategy
|
Wang, Rui |
|
|
28 |
5 |
p. 3879-3903 |
artikel |
5 |
Analyzing threat flow over network using ensemble-based dense network model
|
Harita, U. |
|
|
28 |
5 |
p. 4171-4184 |
artikel |
6 |
An efficacious neural network and DNA cryptography-based algorithm for preventing black hole attacks in MANET
|
Chakravorty, Rahul |
|
|
28 |
5 |
p. 4667-4679 |
artikel |
7 |
An efficient group synchronization of chaos-tuned neural networks for exchange of common secret key
|
Sarkar, Arindam |
|
|
28 |
5 |
p. 4413-4433 |
artikel |
8 |
An EOQ model with fractional order rate of change of inventory level and time-varying holding cost
|
Pakhira, Rituparna |
|
|
28 |
5 |
p. 3859-3877 |
artikel |
9 |
A network intrusion detection framework on sparse deep denoising auto-encoder for dimensionality reduction
|
Manjunatha, B. A. |
|
|
28 |
5 |
p. 4503-4517 |
artikel |
10 |
An image encryption algorithm based on circular rotation and generalized Feistel structure
|
Wang, Yafei |
|
|
28 |
5 |
p. 4335-4358 |
artikel |
11 |
An incremental approach for calculating dominance-based rough set dependency
|
Ullah, Rana Muhammad Kaleem |
|
|
28 |
5 |
p. 3757-3781 |
artikel |
12 |
A non-linear generalization of optimization problems subjected to continuous max-t-norm fuzzy relational inequalities
|
Ghodousian, Amin |
|
|
28 |
5 |
p. 4025-4036 |
artikel |
13 |
An optimized radial basis function neural network with modulation-window activation function
|
Lin, Haijun |
|
|
28 |
5 |
p. 4631-4648 |
artikel |
14 |
A novel human-inspirited collectivism teaching–learning-based optimization algorithm with multi-mode group-individual cooperation strategies
|
Chen, Zhixiang |
|
|
28 |
5 |
p. 4051-4105 |
artikel |
15 |
Approximation properties of a certain modification of Durrmeyer operators
|
Gairola, Asha Ram |
|
|
28 |
5 |
p. 3793-3811 |
artikel |
16 |
A pyramid transformer with cross-shaped windows for low-light image enhancement
|
Li, Canlin |
|
|
28 |
5 |
p. 4399-4411 |
artikel |
17 |
Classification of yoga, meditation, combined yoga–meditation EEG signals using L-SVM, KNN, and MLP classifiers
|
Rajalakshmi, A. |
|
|
28 |
5 |
p. 4607-4619 |
artikel |
18 |
Class imbalance data handling with optimal deep learning-based intrusion detection in IoT environment
|
Srinivasan, Manohar |
|
|
28 |
5 |
p. 4519-4529 |
artikel |
19 |
Designing robust capability-based distributed machine layouts with random machine availability and fuzzy demand/process flow information
|
Subulan, Kemal |
|
|
28 |
5 |
p. 4359-4397 |
artikel |
20 |
Design of a novel panoptic segmentation using multi-scale pooling model for tooth segmentation
|
Nagaraju, Pulipati |
|
|
28 |
5 |
p. 4185-4196 |
artikel |
21 |
Diverse government subsidy modes in a supply chain considering different innovation dimensions
|
Zheng, Jichuan |
|
|
28 |
5 |
p. 3973-3986 |
artikel |
22 |
Does fuzzification of pairwise comparisons in analytic hierarchy process add any value?
|
Ahmed, Faran |
|
|
28 |
5 |
p. 4267-4284 |
artikel |
23 |
Energy-delay aware request scheduling in hybrid Cloud and Fog computing using improved multi-objective CS algorithm
|
BahraniPour, Fatemeh |
|
|
28 |
5 |
p. 4037-4050 |
artikel |
24 |
Enhancing the Whale Optimisation Algorithm with sub-population and hybrid techniques for single- and multi-objective optimisation
|
Cai, Zheng |
|
|
28 |
5 |
p. 3941-3971 |
artikel |
25 |
Establishing a soil carbon flux monitoring system based on support vector machine and XGBoost
|
Ding, Hanwei |
|
|
28 |
5 |
p. 4551-4574 |
artikel |
26 |
Evolutionary algorithm with a regression model for multiobjective minimization of systemic risk in financial systems
|
Michalak, Krzysztof |
|
|
28 |
5 |
p. 3921-3939 |
artikel |
27 |
Generalized Hukuhara Hadamard derivative of interval-valued functions and its applications to interval optimization
|
Chauhan, Ram Surat |
|
|
28 |
5 |
p. 4107-4123 |
artikel |
28 |
Generation of ideal chaotic sequences by reducing the dynamical degradation of digital chaotic maps
|
Zhang, Shijie |
|
|
28 |
5 |
p. 4471-4487 |
artikel |
29 |
Identification of feedback nonlinear systems with time delay based on chaotic decreasing weight sparrow search algorithm
|
Li, Junhong |
|
|
28 |
5 |
p. 4009-4024 |
artikel |
30 |
IHBO_CA: an improved honey-badger optimization-based communication approach for energy-efficient deployment of secure flying ad-hoc network (FANET)
|
Namdev, Mayank |
|
|
28 |
5 |
p. 4151-4170 |
artikel |
31 |
Inference for multicomponent stress–strength reliability based on unit generalized Rayleigh distribution
|
Jha, Mayank Kumar |
|
|
28 |
5 |
p. 3823-3846 |
artikel |
32 |
IoT and cloud-based COVID-19 risk of infection prediction using hesitant intuitionistic fuzzy set
|
Tyagi, Nitin Kumar |
|
|
28 |
5 |
p. 3743-3755 |
artikel |
33 |
Lebesgue decomposition type theorems for weakly null-additive functions on D-posets
|
Khare, Mona |
|
|
28 |
5 |
p. 3813-3821 |
artikel |
34 |
Lifetime maximization of wireless sensor networks while ensuring intruder detection
|
Çorapsız, Muhammed Fatih |
|
|
28 |
5 |
p. 4197-4215 |
artikel |
35 |
Method for automatic detection of movement-related EEG pattern time boundaries
|
Shcherban, I. V. |
|
|
28 |
5 |
p. 4489-4501 |
artikel |
36 |
Modelling an efficient hybridized approach for facial emotion recognition using unconstraint videos and deep learning approaches
|
Bhushanam, P. Naga |
|
|
28 |
5 |
p. 4593-4606 |
artikel |
37 |
Motorcyclist helmet detection in single images: a dual-detection framework with multi-head self-attention
|
Li, Chun-Hong |
|
|
28 |
5 |
p. 4321-4333 |
artikel |
38 |
Multiple attribute decision making technique using single-valued neutrosophic trigonometric Dombi aggregation operators
|
Zhang, Ruoyu |
|
|
28 |
5 |
p. 4217-4234 |
artikel |
39 |
Optimal conventional and nonconventional machining processes via particle swarm optimization and flower pollination algorithm
|
Mellal, Mohamed Arezki |
|
|
28 |
5 |
p. 3847-3858 |
artikel |
40 |
Optimized simulated annealing for efficient generation of highly nonlinear S-boxes
|
Kuznetsov, Alexandr |
|
|
28 |
5 |
p. 3905-3920 |
artikel |
41 |
Pain detection through facial expressions in children with autism using deep learning
|
Sandeep, P. V. K. |
|
|
28 |
5 |
p. 4621-4630 |
artikel |
42 |
Predictive and simultaneous weighting of criteria and alternatives (PSWCA) in multi-criteria decision making based on past data
|
Pazhouhandeh, Arash |
|
|
28 |
5 |
p. 4299-4319 |
artikel |
43 |
Seasonal prediction of solar irradiance with modified fuzzy Q-learning
|
Shikhola, Tushar |
|
|
28 |
5 |
p. 4435-4455 |
artikel |
44 |
Segmentation and detection of skin cancer using fuzzy cognitive map and deep Seg Net
|
Kumar, K. Anup |
|
|
28 |
5 |
p. 4575-4592 |
artikel |
45 |
Some properties of generalized comaximal graph of commutative ring
|
Biswas, B. |
|
|
28 |
5 |
p. 3783-3791 |
artikel |
46 |
Stochastic operating room scheduling: a new model for solving problem and an approach for determining the factors that affect operation time variations
|
Gür, Şeyda |
|
|
28 |
5 |
p. 3987-4007 |
artikel |
47 |
The probabilistic hesitant fuzzy TOPSIS method based on the regret theory and its application in investment strategy
|
Song, Chenyang |
|
|
28 |
5 |
p. 4285-4298 |
artikel |
48 |
Towards an open university based on machine learning for the teaching service support system using backpropagation neural networks
|
Wang, Jianjun |
|
|
28 |
5 |
p. 4531-4549 |
artikel |
49 |
Understanding evolving user choices: a neural network analysis of TAXI and ride-hailing services in Barcelona
|
Guillén-Pujadas, Miguel |
|
|
28 |
5 |
p. 4649-4665 |
artikel |
50 |
Varied offspring memetic algorithm with three parents for a realistic synchronized goods delivery and service problem
|
Maji, Somnath |
|
|
28 |
5 |
p. 4235-4265 |
artikel |