4519 | -- | 4540 | Xiaohong Zhang 0001, Mei Wang, Nan Sheng. Q-residuated lattices and lattice pseudoeffect algebras |
4541 | -- | 4552 | Hongxing Liu. On topology of maximal ideals of EBL-algebras |
4553 | -- | 4573 | Aliya Fahmi, Zahida Maqbool, Fazli Amin, Muhammad Aslam 0003. Web applications for multiuser interaction based on power Heronian aggregation operators |
4575 | -- | 4585 | Aziz Ullah Awan, Samia Riaz, Maryam Ashfaq, Kashif Ali Abro. A scientific report of singular kernel on the rate-type fluid subject to the mixed convection flow |
4587 | -- | 4605 | d. S. Oliveira, J. Vanterler da C. Sousa, Gastão S. F. Frederico. Pseudo-fractional operators of variable order and applications |
4607 | -- | 4612 | Xiaoyou Chen, Shuli Zhao, Kaiquan Shi. Matrix reasoning and intelligent acquisition-application of unknown information |
4613 | -- | 4627 | Hai-Le Bui, Minh Nam Pham, Thai-Tat-Hoan Nguyen. Swing-up control of an inverted pendulum cart system using the approach of Hedge-algebras theory |
4629 | -- | 4639 | Faruk Karaaslan, Naim Çagman. Parameter trees based on soft set theory and their similarity measures |
4641 | -- | 4652 | Madad Khan, Muhammad Zeeshan, Sohail Iqbal. Neutrosophic variational inequalities with applications in decision-making |
4653 | -- | 4671 | Mamata Sahu, Anjana Gupta. Two different approaches for consistency of intuitionistic multiplicative preference relation using directed graph |
4673 | -- | 4683 | Abazar Keikha. Generalized hesitant fuzzy numbers and their application in solving MADM problems based on TOPSIS method |
4685 | -- | 4700 | Mostafa K. El-Bably, Mohammad El-Sayed. Three methods to generalize Pawlak approximations via simply open concepts with economic applications |
4701 | -- | 4711 | Fatima Zahra Benabdallah, Ahmed Drissi El Maliani, Dounia Lotfi, Rachid Jennane, Mohammed El Hassouni. An autism spectrum disorder adaptive identification based on the Elimination of brain connections: a proof of long-range underconnectivity |
4713 | -- | 4726 | Ruchika Malhotra, Shweta Meena. Defect prediction model using transfer learning |
4727 | -- | 4739 | Chen-Yi Lin, Kuan-Cheng Jian. A real-time algorithm for weight training detection and correction |
4741 | -- | 4753 | Jie Hao, William Zhu 0001. Layered feature representation for differentiable architecture search |
4755 | -- | 4770 | Qingbo Hao, Ke Zhu, Chundong Wang 0002, Peng Wang, Xiuliang Mo, Zhen Liu. CFDIL: a context-aware feature deep interaction learning for app recommendation |
4771 | -- | 4795 | Amanpreet Kaur, Munish Kumar, Manish Kumar Jindal. Cattle identification with muzzle pattern using computer vision technology: a critical review and prospective |
4797 | -- | 4817 | Hector Carreon-Ortiz, Fevrier Valdez. A new mycorrhized tree optimization nature-inspired algorithm |
4819 | -- | 4830 | Mehmet Alegoz, Haluk Yapicioglu. Integrating supplier selection, lot sizing and facility location decisions under a TBL approach: a case study |
4831 | -- | 4862 | Ahmad Abbasi, Behnam Firouzi, Polat Sendur, Gyan Ranjan, Rajiv Tiwari. Identification of unbalance characteristics of rotating machinery using a novel optimization-based methodology |
4863 | -- | 4881 | Shubham Mahajan, Laith Abualigah, Amit Kant Pandit, Maryam Altalhi. Hybrid Aquila optimizer with arithmetic optimization algorithm for global optimization tasks |
4883 | -- | 4893 | Ankan Bhaumik, Sankar Kumar Roy. Evaluations for medical diagnoses phenomena through 2˟ 2 linguistic neutrosophic environment-based game situation |
4895 | -- | 4904 | Qingjie Wang. Feeder segment switch-based relay protection for a multilayer differential defense-oriented distribution network |
4905 | -- | 4913 | P. Tamil Selvi, T. Santhi Sri, M. Nagabhushana Rao, B. S. S. V. Ramesh Babu, K. Venkateswara Rao, Abhiram Srikanth. Toward efficient security-based authentication for the internet of drones in defense wireless communication |
4915 | -- | 4928 | P. Kamakshi, Y. Bhavani, A. Bhaskar, B. Kiran Kumar, T. Mahesh Kumar. Verification and modeling of IoT time automata for gateway security system |
4929 | -- | 4937 | Kusum Yadav, Jalawi Sulaiman Alshudukhi, Gaurav Dhiman, Wattana Viriyasitavat. iTSA: an improved Tunicate Swarm Algorithm for defensive resource assignment problem |
4939 | -- | 4948 | N. Muruganandam, V. Venkatraman, R. Venkatesan 0002. Multivariate weighted isotonic regressive modest adaptive boosting-based resource-aware routing in WSN |
4949 | -- | 4960 | J. Reegan Jebadass, P. Balasubramaniam 0001. Low contrast enhancement technique for color images using interval-valued intuitionistic fuzzy sets with contrast limited adaptive histogram equalization |
4961 | -- | 4977 | Mortaza Aliasghary, Reza Mohammadikia. A novel single-input interval type-2 fractional-order fuzzy controller for systems with parameter uncertainty |