425 | -- | 434 | Guilong Liu, Xiuwei Gao. Using covering approaches to study concept lattices |
435 | -- | 455 | Bashir Nawaz, Kifayat Ullah, Krzysztof Gdawiec. Convergence Analysis of a Picard-CR Iteration Process for Nonexpansive Mappings |
457 | -- | 469 | Ankur Jain, Joydip Dhar, Vijay K. Gupta. Dynamical behavior and chaos control of the conflicting information propagation on a homogeneous network system |
471 | -- | 483 | Arun Kumar 0005, Bisham Dewan. Ring structure of rough sets |
485 | -- | 507 | Yong-Cheng Sun, Jie-Sheng Wang, Cheng Xing, Yi-Peng Shang-Guan, Xiao-Tian Wang, Song-Bo Zhang. Bidirectional online sequence extreme learning machine and switching strategy for soft-sensor model of SMB chromatography separation process |
509 | -- | 520 | Esko Turunen. Addition-meet fuzzy relational inequality systems, product-join relational inequality systems and their generalizations |
521 | -- | 542 | Jirí Mockor. Unification of methods for new types of fuzzy sets: general approximation spaces with relational morphisms |
543 | -- | 558 | Zhenxing Ren. On hierarchical clustering-based identification of PWA model with model structure selection and application to automotive actuators for HiL simulation |
559 | -- | 577 | Linjie Zhan, Zhenpeng Tang. Multiscale risk spillover analysis of China's stock market industry: evidence supported by a novel hybrid model based on signal decomposition technology |
579 | -- | 591 | Talha Arslan, Sükrü Acitas, Birdal Senoglu. On the maximization of the likelihood for the generalized gamma distribution: the modified maximum likelihood approach |
593 | -- | 611 | Mahmood Deypir, Toktam Zoughi. Robust security risk estimation for android apps using nearest neighbor approach and hamming distance |
613 | -- | 627 | Lihui Niu, Jusheng Mi, Yuzhang Bai, Zhongling Li, Meizheng Li. Zoom method for association rules in multi-granularity formal context |
629 | -- | 644 | Tham-Vo, Linh Nguyen Thi My. A novel approach of multi-channel attention mechanism for long-sequential multivariate time-series prediction problem |
645 | -- | 662 | Zheng Li, Yanbei Liu, Changqing Zhang, Wanjin Shan, Haifeng Zhang, Xiaoming Zhu. Trustworthy deep learning for encrypted traffic classification |
663 | -- | 672 | Huifang Feng, Rui Yang. STA-CN-BiGRU: a spatial-temporal attention based ChebNet and BiGRU model for traffic flow prediction |
673 | -- | 700 | Muhammad Sadiq Amin, Shabir Ahmad, Woong-Kee Loh. Federated learning for Healthcare 5.0: a comprehensive survey, taxonomy, challenges, and solutions |
701 | -- | 721 | Masoud Ahmadipour, Zaipatimah Ali, Hussein Mohammed Ridha. Enhancing voltage stability and load shedding optimization through a fusion of gravitational search algorithm and particle swarm optimization with deep learning |
723 | -- | 753 | Le Wang, Qinqin Fan, Xuefeng Yan. A surrogate archive assisted multi-objective evolutionary algorithm under limited computational budget |
755 | -- | 781 | Suha Mubdir Farhood, Reihaneh Khorsand, Nashwan Jasim Hussein, Mohammadreza Ramezanpour. A fault-tolerant scheduling strategy through proactive and clustering techniques for scientific workflows in cloud computing |
783 | -- | 801 | Kamran Yaseen Rajput, Xiaoping Li 0001, Abdullah Lakhan. Spark workflow task scheduling with deadline and privacy constraints in hybrid cloud networks |
803 | -- | 838 | Yanfeng Wang 0002, Bingqing Xin, ZiCheng Wang, Junwei Sun. Improved snake optimizer based on forced switching mechanism and variable spiral search for practical applications problems |
839 | -- | 860 | Zhilong Liu, Huhai Jiang. Period regulated particle swarm optimization algorithm |
861 | -- | 873 | Adrián Tobar Nicolau, Jordi Castro 0001, Claudio Gentile. A new mathematical optimization-based method for the m-invariance problem |
875 | -- | 893 | Krzysztof Michalak. Knowledge-based optimization in epidemics prevention |
895 | -- | 932 | Muhammad Sagheer, Muhammad Asif Jan, Zahir Shah, Wali Khan Mashwani, Rashida Adeeb Khanum, Meshal Shutaywi. Enhancing teaching learning based optimization algorithm through group discussion strategy for CEC 2017 benchmark problems |
933 | -- | 944 | Rishabh Deo Pandey, Itu Snigdh. A Fuzzy-Bayesian belief network approach to compute efficiency as a metric for IoT systems |
945 | -- | 956 | Kadeeja Mole Koyalinte Purakkal, Kalathodi Sameena. Inverse fuzzy graph colouring and its application |
957 | -- | 976 | Kartik Saini, Narendra Kumar, Bharat Bhushan, Rajesh Kumar 0010. Nonlinear complex dynamic system identification based on a novel recurrent neural network |
977 | -- | 1004 | Jiajia Liu, Edi Syams Zainudin, Azizan Bin As'arry, Mohd Idris Shah Bin Ismai, Chenglei Zhang. Modeling of the blockchain-empowered cloud 4D printing services collaboration digital twin platform oriented on supply-demand |
1005 | -- | 1017 | Bin Xie, Hongmiao Yuan. Enhancing the combined compromise solution method for group decision-making under intuitionistic fuzziness: an application to blended English teaching quality evaluation in vocational colleges |
1019 | -- | 1034 | Antonio Maria Rinaldi, Cristiano Russo, Cristian Tommasino. A semantic approach for cultural heritage ontology matching and integration based on textual and multimedia information |
1035 | -- | 1052 | Mingtao Wang, Xin Zhou, Yuanyuan Chen. Global vision, local focus: the semantic enhancement transformer network for crowd counting |
1053 | -- | 1089 | Xing-Yue Zhang, Jie-Sheng Wang, Jun-Hua Zhu, Yin-Yin Bao, Yue Zheng, Wen-Kuo Hao. Nonlinear convergence factor-based manta ray foraging optimization algorithm for combined economic emission dispatch problem |
1091 | -- | 1106 | Shikha Gupta, Neetu Sharma. A novel cluster based reliable security enhancement in FANET directed by game theory |
1107 | -- | 1119 | P. Dhanasekaran, S. Kalidasan. A distance based similarity measure on trapezoidal intuitionistic fuzzy numbers and its applications |
1121 | -- | 1131 | Ruiyou Li, Yong Zhang, Guang Li, Ruiheng Li, Jia Hu, Min Li. Fast resistivity imaging of transient electromagnetic using an extreme learning machine |
1133 | -- | 1146 | Peng Qin, Chunmei Cheng, Huaizhi Su. A GA-FGM-RTA combined model for predicting seawall settlement in under insufficient data volume |
1147 | -- | 1168 | Mohammad Reza Chalak Qazani, Moosa Sajed, Siamak Pedrammehr, Seyed Mohammad Hossein Seyedkashi. Mechanical properties estimation of multi-layer friction stir plug welded aluminium plates using time-series neural network models |
1169 | -- | 1189 | He-Yau Kang, Amy H. I. Lee. A genetic-based approach for vehicle routing problem with fuzzy alpha-cut constraints |
1191 | -- | 1206 | Pranab Sahoo, Sriparna Saha 0001, Saksham Kumar Sharma, Samrat Mondal. Boosting cervical cancer detection with a multi-stage architecture and complementary information fusion |
1207 | -- | 1226 | Chuanmeng Sun, Jiaxin Chen, Yong Li, Yu Wang, Tiehua Ma. Channel pruning method driven by similarity of feature extraction capability |
1227 | -- | 1241 | Marco Moran-Armenta, Carlos Aguilar-Avelar, Isaac Gandarilla, Marlen Meza-Sánchez, Javier Moreno-Valenzuela. Solving trajectory tracking of robot manipulators via PID control with neural network compensation |
1243 | -- | 1258 | Meysam Jahani, Zahra Zojaji, Fatemeh Raji. Enhancing demand forecasting through combination of anomaly detection and continuous improvement |
1259 | -- | 1272 | Saleh Momeni, Bagher BabaAli. Free-text keystroke authentication using transformers: a comparative study of architectures and loss functions |