Journal: Complex Intell. Syst.

Volume 9, Issue 3

2209 -- 2219Gang Xue, Shifeng Liu 0001, Yicao Ma. A hybrid deep learning-based fruit classification using attention model and convolution autoencoder
2221 -- 2235Hao Zhang, Yuxin Shi, Bin Qiu. Applying catastrophe progression method to evaluate the service quality of cold chain logistics
2237 -- 2248Jikai Huang, Xianliang Shi. Solving the location problem of front distribution center for omni-channel retailing
2249 -- 2256Yan Yan, Xinyue Di, Yuanyuan Zhang. Optimization-driven distribution of relief materials in emergency disasters
2257 -- 2270Yinyun Yu, CongDong Li. Evaluate the priority of product design factors in the process of complex product innovation
2271 -- 2284Hongrui Chu, Wensi Zhang, Pengfei Bai, Yahong Chen. Data-driven optimization for last-mile delivery
2285 -- 2295Li Jiang-ning, Shi Xian Liang, Huang An-qiang, He Ze-fang, Kang Yu-xuan, Li Dong. Forecasting emergency medicine reserve demand with a novel decomposition-ensemble methodology
2297 -- 2312Lijuan Huang, Guojie Xie 0001, Wende Zhao, Yan Gu, Yi Huang. Regional logistics demand forecasting: a BP neural network approach
2313 -- 2320Haiju Hu, Yonghui Wei, Yu Zhou. Product-harm crisis intelligent warning system design based on fine-grained sentiment analysis of automobile complaints
2321 -- 2332Ying Qiu, Meng Shi, Xinna Zhao, Yongping Jing. System dynamics mechanism of cross-regional collaborative dispatch of emergency supplies based on multi-agent game
2333 -- 2349Ruijian Liu, Fangcheng Tang, Yuhan Wang, Shaofang Zheng. A modified NK algorithm based on BP neural network and DEMATEL for evolution path optimization of urban innovation ecosystem
2351 -- 2359Hua He. Integration of manufacturing and pricing for downward substitution products decision-making
2361 -- 2378Jun Zhang, Linze Li, Jing Zhang, Liping Chen, Guojiao Chen. Private-label sustainable supplier selection using a fuzzy entropy-VIKOR-based approach
2379 -- 2391Huawei Duan, Yusen Ye, Zheng Lei, Mengting Wang. Express delivery logistics with high-speed railway: a perspective of payment scheme and forecast information sharing
2393 -- 2411Changsong Ma, Tiantong Yuan, Zhong Lei, Liu Wei. Production decision-making system for manufacturing enterprises constrained by carbon reduction policies
2413 -- 2428Yingzhen Cai, Lan Bai, Fan Jiang, Shi Yin. Subsidy strategy of sharing logistics platform
2429 -- 2445Jie Guo, Yanli Guo. Optimal coordination and service level of the supply chain in the sharing economy: the perspective of social responsibility
2447 -- 2458Changsuo Sun, Long Ye, Na Zhang. O2O selection mode portrait and optimization for railway service enterprises based on K-means
2459 -- 2473Qianqian Zhang 0006, Shifeng Liu 0001, Qun Tu. Knowledge organization of node enterprises' technological innovation under supply chain environment
2475 -- 2490Zhiguo Wu, Juliang Zhang 0001. A branch-and-price algorithm for two-echelon electric vehicle routing problem
2491 -- 2508Hongguang Wu, Yuelin Gao, Wanting Wang, Ziyu Zhang. A hybrid ant colony algorithm based on multiple strategies for the vehicle routing problem with time windows
2509 -- 2520Yadong Li, Xuemei Li. Quantity decisions of two-stage competitive location model based on different location modes
2521 -- 2539Qiu Heting, Shuihai Dou, Shang Huayan, Zhang Jun. Charging station planning based on the accumulation prospect theory and dynamic user equilibrium
2541 -- 2553Zhaohua Wang, Xuewei Li, Xin Zhu 0002, Jing Li 0084, Fan Wang, Fei Wang. Big data-driven public transportation network: a simulation approach
2555 -- 2569Fan Xiong, Dongyi Chen. CEEMDAN-IMFx-PCA-CICA: an improved single-channel blind source separation in multimedia environment for motion artifact reduction in ambulatory ECG
2571 -- 2583Ke Ma, Beibei Jiang. Voice of urban park visitors: exploring destination attributes influencing behavioural intentions through online review mining
2585 -- 2597Lu Liu 0007, Dingyu Xue, Shuo Zhang 0002. General type industrial temperature system control based on fuzzy fractional-order PID controller
2599 -- 2611Mersha Bemnet Wondimagegnehu, David N. Jansen, Hongbin Ma. Angle of attack prediction using recurrent neural networks in flight conditions with faulty sensors in the case of F-16 fighter jet
2613 -- 2627Yihua Lan, Fang Li, Zijun Li, Binglei Yue, Yin Zhang 0002. Intelligent IoT-based large-scale inverse planning system considering postmodulation factors
2629 -- 2649Bakkiam David Deebak, Fadi M. Al-Turjman. Secure-user sign-in authentication for IoT-based eHealth systems
2651 -- 2664G. Kalyani, B. Janakiramaiah 0001, Arava Karuna, L. V. Narasimha Prasad. Diabetic retinopathy detection and classification using capsule networks
2665 -- 2683Muhammad Attique Khan, Seifedine Nimer Kadry, Pritee Parwekar, Robertas Damasevicius, Asif Mehmood, Junaid Ali Khan, Syed Rameez Naqvi. Human gait analysis for osteoarthritis prediction: a framework of deep learning and kernel extreme learning machine
2685 -- 2698Manisha Jangra, Sanjeev Kumar Dhull, Krishna Kant Singh, Akansha Singh, Xiaochun Cheng. O-WCNN: an optimized integration of spatial and spectral feature map for arrhythmia classification
2699 -- 2711Yung-Yao Chen, Yu-Chen Hu, Hsiang-Yun Kao, Yu-Hsiu Lin. Security for eHealth system: data hiding in AMBTC compressed images via gradient-based coding
2713 -- 2745K. A. Saneera Hemantha Kulathilake, Nor Aniza Abdullah, Aznul Qalid Md Sabri, Khin Wee Lai. A review on Deep Learning approaches for low-dose Computed Tomography restoration
2747 -- 2758Chen Zhao 0022, Joyce H. Keyak, Jinshan Tang, Tadashi S. Kaneko, Sundeep Khosla, Shreyasee Amin, Elizabeth J. Atkinson, Lan-Juan Zhao, Michael J. Serou, Chaoyang Zhang, Hui Shen 0007, Hong-Wen Deng, Weihua Zhou. ST-V-Net: incorporating shape prior into convolutional neural networks for proximal femur segmentation
2759 -- 2772O. P. Singh, A. K. Singh. Data hiding in encryption-compression domain
2773 -- 2799Ayesha Rashid, Muhammad Shoaib Farooq 0001, Adnan Abid, Tariq Umer, Ali Kashif Bashir, Yousaf Bin Zikria. Social media intention mining for sustainable information systems: categories, taxonomy, datasets and challenges
2801 -- 2812Kun Wang, Xiaofeng Wang, Xuan Lu. POI recommendation method using LSTM-attention in LBSN considering privacy protection
2813 -- 2826Shashi Shekhar 0001, Hitendra Garg, Rohit Agrawal, Shivendra Shivani, Bhisham Sharma. Hatred and trolling detection transliteration framework using hierarchical LSTM in code-mixed social media text
2827 -- 2842Jana Papcunová, Marcel Martoncik, Denisa Fedáková, Michal Kentos, Miroslava Bozogánová, Ivan Srba, Róbert Móro, Matús Pikuliak, Marián Simko, Matús Adamkovic. Hate speech operationalization: a preliminary examination of hate speech indicators and their structure
2843 -- 2863Dilip Kumar Sharma, Sonal Garg. IFND: a benchmark dataset for fake news detection
2865 -- 2877Xue Zhai, Shanchen Pang, Min Wang 0026, Sibo Qiao, Zhihan Lv. TVS: a trusted verification scheme for office documents based on blockchain
2879 -- 2891Shankar Biradar, Sunil Saumya, Arun Chauhan 0002. Combating the infodemic: COVID-19 induced fake news recognition in social media networks
2893 -- 2914José Antonio García-Díaz, Salud María Jiménez Zafra, Miguel Ángel García Cumbreras, Rafael Valencia-García. Evaluating feature combination strategies for hate-speech detection in Spanish using linguistic features and transformers
2915 -- 2928Dilip Venkata Kumar Vengala, D. Kavitha, A. P. Siva Kumar. Three factor authentication system with modified ECC based secured data transfer: untrusted cloud environment
2929 -- 2942Li Yang, Xinxin Niu. A genre trust model for defending shilling attacks in recommender systems
2943 -- 2955M. Jalasri, L. Lakshmanan. Code-based encryption techniques with distributed cluster head and energy consumption routing protocol
2957 -- 0Abdulmajeed Alsufyani, Youseef Alotaibi, Alaa Omran Almagrabi, Saleh Ahmed Alghamdi, Nawal Alsufyani. RETRACTED ARTICLE: Optimized intelligent data management framework for a cyber-physical system for computational applications
2959 -- 2967V. Nandan, R. Gowri Shankar Rao. Low-power AES S-box design using dual-basis tower field extension method for cyber security applications
2969 -- 2980Aijun Liu, Rajendra Prasad Mahapatra, A. V. R. Mayuri. Hybrid design for sports data visualization using AI and big data analytics
2981 -- 2991Shaji K. A. Theodore, K. Rajiv Gandhi, V. Palanisamy. A novel lightweight authentication and privacy-preserving protocol for vehicular ad hoc networks
2993 -- 3010Zhichao Cheng, Xinyang Liu. Establishment of the model on the expression and guidance of contemporary college students' demands in the cyberspace environment
3011 -- 3021Sridhar Mandapati, Seifedine Kadry 0001, R. Lakshmana Kumar, Krongkarn Sutham, Orawit Thinnukool. Deep learning model construction for a semi-supervised classification with feature learning
3023 -- 3041Sidrah Abdullah, Junaid Arshad, Muhammad Mubashir Khan, Mamoun Alazab, Khaled Salah 0001. PRISED tangle: a privacy-aware framework for smart healthcare data sharing using IOTA tangle
3043 -- 3070Umer Ahmed Butt, Rashid Amin, Hamza Aldabbas, Senthilkumar Mohan, Bader Alouffi, Ali Ahmadian. Cloud-based email phishing attack using machine and deep learning algorithm
3071 -- 3083Lixin Zhou, Zhenyu Zhang, Laijun Zhao, Pingle Yang. Microblog sentiment analysis based on deep memory network with structural attention
3085 -- 3105Jinyu Zhang 0001, Yumeng Yang, Deyu Zhao, Yue Wang. A node selection algorithm with a genetic method based on PBFT in consortium blockchains
3107 -- 3114Muhammad Aslam 0002. Truncated variable algorithm using DUS-neutrosophic Weibull distribution
3115 -- 3130Sameh Abd-Elhaleem, Walaa Shoeib, Abdel Azim Sobaih. RETRACTED ARTICLE: Intelligent power management based on multi-objective cost function for plug-in biogas hybrid vehicles under uncertain driving conditions
3131 -- 3146Xiang Xu, Xianqiang Zhu, Cheng Zhu. GAN-based deep learning framework of network reconstruction
3147 -- 3159Jun Tang, Baodi Liu, Wenhui Guo, Yanjiang Wang 0001. Two-stream temporal enhanced Fisher vector encoding for skeleton-based action recognition
3161 -- 3183Sushil Kumar, Rishitosh Kumar Singh, Aryan Chaudhary. A novel non-linear neuron model based on multiplicative aggregation in quaternionic domain
3185 -- 3210Xin Dong, Zeeshan Ali, Tahir Mahmood 0002, Peide Liu. Yager aggregation operators based on complex interval-valued q-rung orthopair fuzzy information and their application in decision making
3211 -- 3228Qingqing Liu, Xianpeng Wang, Yao Wang, Xiangman Song. Evolutionary convolutional neural network for image classification based on multi-objective genetic programming with leader-follower mechanism
3229 -- 3248Herui Heng, Peiji Li, Tuxin Guan, Tianyu Yang. Scene text recognition via context modeling for low-quality image in logistics industry
3249 -- 3260Shuyang Liu, Yuanchun Li 0002. Dynamic modeling and infinite-dimensional observer-based control for manipulation of flexible beam by a multi-link robot
3261 -- 3276Junwen Zhang, Xiaolong Zhang, Ziqi Zhu, Chunhua Deng. Efficient combination graph model based on conditional random field for online multi-object tracking
3277 -- 3300Chonghuan Xu, Xinyao Mei, Dongsheng Liu, Kaidi Zhao, Austin Shijun Ding. An efficient privacy-preserving point-of-interest recommendation model based on local differential privacy
3301 -- 3312Qian Xiao, Zongmin Li, Xiangdong Wang, Yujie Liu, Yachuan Li, Chaozhi Yang, Feimo Li. Policy decision of curling in real competition scenes
3313 -- 3331Liang Fan, Handing Wang. Surrogate-assisted evolutionary neural architecture search with network embedding
3333 -- 3354Iman Mohamad Sharaf. The differential measure for Pythagorean fuzzy multiple criteria group decision-making
3355 -- 3366Xia Xue, Xia Sun, Hongyu Wang, Hao Zhang, Jun Feng. Neural network fusion with fine-grained adaptation learning for turnover prediction
3367 -- 3384Qingqing Liu, Xianpeng Wang 0002, Xiangman Song. Two-stage hybrid algorithm for recognition of industrial slab numbers with data quality improvement
3385 -- 3398Jun-Xian Chen, Yue-jiao Gong, Wei-neng Chen, Xiaolin Xiao. Adaptive encoding-based evolutionary approach for Chinese document clustering
3399 -- 3408Shimin Xiong, Bin Li 0004, Shiao Zhu. DCGNN: a single-stage 3D object detection network based on density clustering and graph neural network
3409 -- 3428Cheng Zhang, Jin Wang 0015, Ting Yan, Xiaohui Lu, Guodong Lu, Xiaolin Tang, Bincheng Huang. An instance-based deep transfer learning method for quality identification of Longjing tea from multiple geographical origins
3429 -- 3468Xuesong Wu 0002, Ye Du 0001, Tao Fan 0001, Junyan Guo, Jie Ren, Runfang Wu, Tianshuai Zheng. Threat analysis for space information network based on network security attributes: a review
3469 -- 0Man-Chung Yuen, Sin Chun Ng, Man-Fai Leung, Hangjun Che. Correction to: A metaheuristic-based framework for index tracking with practical constraints
3471 -- 0R. Udendhran, M. Balamurugan. Retraction Note: Towards secure deep learning architecture for smart farming-based applications