nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Addition-meet fuzzy relational inequality systems, product-join relational inequality systems and their generalizations
|
Turunen, Esko |
|
|
29 |
2 |
p. 509-520 |
artikel |
2 |
A distance based similarity measure on trapezoidal intuitionistic fuzzy numbers and its applications
|
Dhanasekaran, P. |
|
|
29 |
2 |
p. 1107-1119 |
artikel |
3 |
A fault-tolerant scheduling strategy through proactive and clustering techniques for scientific workflows in cloud computing
|
Farhood, Suha Mubdir |
|
|
29 |
2 |
p. 755-781 |
artikel |
4 |
A Fuzzy-Bayesian belief network approach to compute efficiency as a metric for IoT systems
|
Pandey, Rishabh Deo |
|
|
29 |
2 |
p. 933-944 |
artikel |
5 |
A GA-FGM-RTA combined model for predicting seawall settlement in under insufficient data volume
|
Qin, Peng |
|
|
29 |
2 |
p. 1133-1146 |
artikel |
6 |
A genetic-based approach for vehicle routing problem with fuzzy alpha-cut constraints
|
Kang, He-Yau |
|
|
29 |
2 |
p. 1169-1189 |
artikel |
7 |
A new mathematical optimization-based method for the m-invariance problem
|
Tobar Nicolau, Adrián |
|
|
29 |
2 |
p. 861-873 |
artikel |
8 |
A novel approach of multi-channel attention mechanism for long-sequential multivariate time-series prediction problem
|
Vo, Tham |
|
|
29 |
2 |
p. 629-644 |
artikel |
9 |
A novel cluster based reliable security enhancement in FANET directed by game theory
|
Gupta, Shikha |
|
|
29 |
2 |
p. 1091-1106 |
artikel |
10 |
A semantic approach for cultural heritage ontology matching and integration based on textual and multimedia information
|
Rinaldi, Antonio Maria |
|
|
29 |
2 |
p. 1019-1034 |
artikel |
11 |
A surrogate archive assisted multi-objective evolutionary algorithm under limited computational budget
|
Wang, Le |
|
|
29 |
2 |
p. 723-753 |
artikel |
12 |
Bidirectional online sequence extreme learning machine and switching strategy for soft-sensor model of SMB chromatography separation process
|
Sun, Yong-Cheng |
|
|
29 |
2 |
p. 485-507 |
artikel |
13 |
Boosting cervical cancer detection with a multi-stage architecture and complementary information fusion
|
Sahoo, Pranab |
|
|
29 |
2 |
p. 1191-1206 |
artikel |
14 |
Channel pruning method driven by similarity of feature extraction capability
|
Sun, Chuanmeng |
|
|
29 |
2 |
p. 1207-1226 |
artikel |
15 |
Convergence Analysis of a Picard–CR Iteration Process for Nonexpansive Mappings
|
Nawaz, Bashir |
|
|
29 |
2 |
p. 435-455 |
artikel |
16 |
Dynamical behavior and chaos control of the conflicting information propagation on a homogeneous network system
|
Jain, Ankur |
|
|
29 |
2 |
p. 457-469 |
artikel |
17 |
Enhancing demand forecasting through combination of anomaly detection and continuous improvement
|
Jahani, Meysam |
|
|
29 |
2 |
p. 1243-1258 |
artikel |
18 |
Enhancing teaching learning based optimization algorithm through group discussion strategy for CEC 2017 benchmark problems
|
Sagheer, Muhammad |
|
|
29 |
2 |
p. 895-932 |
artikel |
19 |
Enhancing the combined compromise solution method for group decision-making under intuitionistic fuzziness: an application to blended English teaching quality evaluation in vocational colleges
|
Xie, Bin |
|
|
29 |
2 |
p. 1005-1017 |
artikel |
20 |
Enhancing voltage stability and load shedding optimization through a fusion of gravitational search algorithm and particle swarm optimization with deep learning
|
Ahmadipour, Masoud |
|
|
29 |
2 |
p. 701-721 |
artikel |
21 |
Fast resistivity imaging of transient electromagnetic using an extreme learning machine
|
Li, Ruiyou |
|
|
29 |
2 |
p. 1121-1131 |
artikel |
22 |
Federated learning for Healthcare 5.0: a comprehensive survey, taxonomy, challenges, and solutions
|
Amin, Muhammad Sadiq |
|
|
29 |
2 |
p. 673-700 |
artikel |
23 |
Free-text keystroke authentication using transformers: a comparative study of architectures and loss functions
|
Momeni, Saleh |
|
|
29 |
2 |
p. 1259-1272 |
artikel |
24 |
Global vision, local focus: the semantic enhancement transformer network for crowd counting
|
Wang, Mingtao |
|
|
29 |
2 |
p. 1035-1052 |
artikel |
25 |
Improved snake optimizer based on forced switching mechanism and variable spiral search for practical applications problems
|
Wang, Yanfeng |
|
|
29 |
2 |
p. 803-838 |
artikel |
26 |
Inverse fuzzy graph colouring and its application
|
Purakkal, Kadeeja Mole Koyalinte |
|
|
29 |
2 |
p. 945-956 |
artikel |
27 |
Knowledge-based optimization in epidemics prevention
|
Michalak, Krzysztof |
|
|
29 |
2 |
p. 875-893 |
artikel |
28 |
Mechanical properties estimation of multi-layer friction stir plug welded aluminium plates using time-series neural network models
|
Qazani, Mohammad Reza Chalak |
|
|
29 |
2 |
p. 1147-1168 |
artikel |
29 |
Modeling of the blockchain-empowered cloud 4D printing services collaboration digital twin platform oriented on supply–demand
|
Liu, Jiajia |
|
|
29 |
2 |
p. 977-1004 |
artikel |
30 |
Multiscale risk spillover analysis of China’s stock market industry: evidence supported by a novel hybrid model based on signal decomposition technology
|
Linjie, Zhan |
|
|
29 |
2 |
p. 559-577 |
artikel |
31 |
Nonlinear complex dynamic system identification based on a novel recurrent neural network
|
Saini, Kartik |
|
|
29 |
2 |
p. 957-976 |
artikel |
32 |
Nonlinear convergence factor-based manta ray foraging optimization algorithm for combined economic emission dispatch problem
|
Zhang, Xing-Yue |
|
|
29 |
2 |
p. 1053-1089 |
artikel |
33 |
On hierarchical clustering-based identification of PWA model with model structure selection and application to automotive actuators for HiL simulation
|
Ren, Zhenxing |
|
|
29 |
2 |
p. 543-558 |
artikel |
34 |
On the maximization of the likelihood for the generalized gamma distribution: the modified maximum likelihood approach
|
Arslan, Talha |
|
|
29 |
2 |
p. 579-591 |
artikel |
35 |
Period regulated particle swarm optimization algorithm
|
Liu, Zhilong |
|
|
29 |
2 |
p. 839-860 |
artikel |
36 |
Ring structure of rough sets
|
Kumar, Arun |
|
|
29 |
2 |
p. 471-483 |
artikel |
37 |
Robust security risk estimation for android apps using nearest neighbor approach and hamming distance
|
Deypir, Mahmood |
|
|
29 |
2 |
p. 593-611 |
artikel |
38 |
Solving trajectory tracking of robot manipulators via PID control with neural network compensation
|
Moran-Armenta, Marco |
|
|
29 |
2 |
p. 1227-1241 |
artikel |
39 |
Spark workflow task scheduling with deadline and privacy constraints in hybrid cloud networks
|
Rajput, Kamran Yaseen |
|
|
29 |
2 |
p. 783-801 |
artikel |
40 |
STA-CN-BiGRU: a spatial-temporal attention based ChebNet and BiGRU model for traffic flow prediction
|
Huifang, Feng |
|
|
29 |
2 |
p. 663-672 |
artikel |
41 |
Trustworthy deep learning for encrypted traffic classification
|
Li, Zheng |
|
|
29 |
2 |
p. 645-662 |
artikel |
42 |
Unification of methods for new types of fuzzy sets: general approximation spaces with relational morphisms
|
Močkoř, Jiří |
|
|
29 |
2 |
p. 521-542 |
artikel |
43 |
Using covering approaches to study concept lattices
|
Liu, Guilong |
|
|
29 |
2 |
p. 425-434 |
artikel |
44 |
Zoom method for association rules in multi-granularity formal context
|
Niu, Lihui |
|
|
29 |
2 |
p. 613-627 |
artikel |