default search action
Journal of Intelligent and Fuzzy Systems, Volume 34
Volume 34, Number 1, 2018
- Amir Abbas Shojaie, Hossein Raoofpanah:
Solving a two-objective green transportation problem by using meta-heuristic methods under uncertain fuzzy approach. 1-10 - Shao-Jun Yang, Fu-Gui Shi:
M-fuzzifying independence spaces. 11-21 - Ali Darvish Falehi:
MOPSO based TCSC-ANFIS-POD technique: Design, simultaneous scheme, power system oscillations suppression. 23-34 - Shuli Liu:
A sample survey based method on transforming linguistic terms into fuzzy sets and the application in MADM problems. 35-45 - Xiao Zhao, Xuhui Xia, Guodong Yu:
Buyback contract of reverse supply chains with different risk attitudes under fuzzy demands. 47-56 - Faruk Karaaslan, Bijan Davvaz:
Properties of single-valued neutrosophic graphs. 57-79 - Hadi Farahani:
Meta-type fuzzy computations and fuzzy complexity. 81-92 - Buwen Cao, Shuguang Deng, Jiawei Luo, Pingjian Ding, Shulin Wang:
Identification of overlapping protein complexes by fuzzy K-medoids clustering algorithm in yeast protein-protein interaction networks. 93-103 - Wenbin Cao, Xisheng Jia, Yu Liu, Qiwei Hu:
Selective maintenance optimization for fuzzy multi-state systems. 105-121 - Azadeh Zahedi Khameneh, Adem Kiliçman, Abdul Razak Salleh:
Application of a preference relationship in decision-making based on intuitionistic fuzzy soft sets. 123-139 - Haiqing Zhang, Tao Wang, Daiwei Li, Abdelaziz Bouras, Xi Xiong, Shaojie Qiao:
Maximal fuzzy supplement frequent pattern mining based on advanced pattern-aware dynamic search strategy and an effective FSFP-array technique. 141-152 - Li Chen, Shuisheng Zhou, Zhuan Zhang:
SVRG for a non-convex problem using graduated optimization algorithm. 153-165 - Zhanpeng Yang, Wenjuan Ren:
Existence and stability results for quaternion fuzzy fractional differential equations in the sense of Hilfer. 167-175 - Zhang-peng Tian, Jian-qiang Wang, Hong-yu Zhang:
Hybrid single-valued neutrosophic MCGDM with QFD for market segment evaluation and selection. 177-187 - Rong Cheng, Weimin Ma, Hua Ke:
How does store-brand introduction affect a supply chain with uncertain information? 189-201 - Gabriel Antonio Fanelli de Souza, Rodrigo Bispo dos Santos, Paloma Maria Silva Rocha Rizol, Duarte Lopes de Oliveira, Lester de Abreu Faria:
A novel fully-programmable analog fuzzifier architecture for interval type-2 fuzzy controllers using current steering mirrors. 203-212 - Minxia Luo, Ruirui Zhao:
Fuzzy reasoning algorithms based on similarity. 213-219 - Fan-Hong Chen, Chong Shen, Fu-Gui Shi:
A new approach to the fuzzification of arity, JHC and CUP of L-convexities. 221-231 - Hoang Viet Long, Hoang Thi Phuong Thao:
Hyers-Ulam stability for nonlocal fractional partial integro-differential equation with uncertainty. 233-244 - Guohua Qu, Weihua Qu, Chunhua Li:
Some new interval-valued dual hesitant fuzzy Choquet integral aggregation operators and their applications. 245-266 - Muhammad Sajjad Ali Khan, Saleem Abdullah, Muhammad Yousaf Ali, Iqtadar Hussain, Muhammad Farooq:
Extension of TOPSIS method base on Choquet integral under interval-valued Pythagorean fuzzy environment. 267-282 - Abbas Ali, Muhammad Irfan Ali, Noor Rehman:
A more efficient conflict analysis based on soft preference relation. 283-293 - Sankar Sahoo, Madhumangal Pal:
Certain types of edge irregular intuitionistic fuzzy graphs. 295-305 - Vytautas Petrauskas, Raimundas Jasinevicius, Egidijus Kazanavicius, Zygimantas Meskauskas:
CWW elements to enrich SWOT analysis. 307-320 - Rui Fan, Lixin Wei, Xin Li, Ziyu Hu:
A novel multi-objective PSO algorithm based on completion-checking. 321-333 - Naiqi Liu, Yanju Chen, Yankui Liu:
Optimizing portfolio selection problems under credibilistic CVaR criterion. 335-347 - Chengdong Li, Zixiang Ding, Dianwei Qian, Yisheng Lv:
Data-driven design of the extended fuzzy neural network having linguistic outputs. 349-360 - Nabanita Konwar, Pradip Debnath:
Some new contractive conditions and related fixed point theorems in intuitionistic fuzzy n-Banach spaces. 361-372 - Maciej Luczak:
Combining raw and normalized data in multivariate time series classification with dynamic time warping. 373-380 - Jian-qiang Wang, Xu Zhang, Hong-yu Zhang:
Hotel recommendation approach based on the online consumer reviews using interval neutrosophic linguistic numbers. 381-394 - Yanbing Gong, Shuxin Yang, Hailiang Ma, Min Ge:
Fuzzy regression model based on geometric coordinate points distance and application to performance evaluation. 395-404 - Abhirup Bandyopadhyay, Samarjit Kar:
On type-2 fuzzy partial differential equations and its applications. 405-422 - Jianhua Dai, Yuejun Yan, Zhaowen Li, Beishui Liao:
Dominance-based fuzzy rough set approach for incomplete interval-valued data. 423-436 - Liang-Hsuan Chen, Chia-Jung Chang:
Approaches to select suitable subset of explanatory variables for establishing fuzzy regression models. 437-457 - Xiao-Li Meng, Fu-Gui Shi, Jen-Chih Yao:
An inequality approach for evaluating decision making units with a fuzzy output. 459-465 - Supak Phiangsungnoen, Phatiphat Thounthong, Poom Kumam:
Fixed point results in fuzzy metric spaces via α and βκ-admissible mappings with application to integral types. 467-475 - Yan Wang, Gregory Zacharewicz, Mamadou Kaba Traoré, David Chen:
An integrative approach to simulation model discovery: Combining system theory, process mining and fuzzy logic. 477-490 - Naresh Kumar, Shobha Antwal, S. C. Jain:
Differential Evolution based bucket indexed data deduplication for big data storage. 491-505 - Xiaosheng Wang, Dan Chen, Hamed Ahmadzade, Rong Gao:
Some limit theorems on uncertain random sequences. 507-515 - A. M. Abd El-Latief:
Generalized soft rough sets and generated soft ideal rough topological spaces. 517-524 - Jianhua Jiang, Xing Tao, Keqin Li:
DFC: Density Fragment Clustering without Peaks. 525-536 - Zia Bashir, Tabasam Rashid, Sohail Zafar:
Maximization based topologies and their relation with Γ-convergence of intuitionistic fuzzy sets. 537-545 - Musavarah Sarwar, Muhammad Akram:
Bipolar fuzzy circuits with applications. 547-558 - Xiaohong Zhang, Choonkil Park, Supeng Wu:
Soft set theoretical approach to pseudo-BCI algebras. 559-568 - Ashraf Al-Quran, Nasruddin Hassan:
The complex neutrosophic soft expert set and its application in decision making. 569-582 - Shuai Lin, Yanhui Wang, Limin Jia, Hengrun Zhang, Yang Li:
Intuitionistic Mechanism for weak components identification method of complex electromechanical system. 583-598 - Gao-Feng Yu, Deng-Feng Li, Jin-Ming Qiu, Xiao-Xue Zheng:
Some operators of intuitionistic uncertain 2-tuple linguistic variables and application to multi-attribute group decision making with heterogeneous relationship among attributes. 599-611 - Yi Shi, Fu-Gui Shi:
Characterizations of L-topologies. 613-623 - Jinshan Ma:
Generalised grey target decision method for mixed attributes with index weights containing uncertain numbers. 625-632 - Lu-Lu Shi, Hai-Long Yang:
Object granular reduction of fuzzy formal contexts. 633-644 - Xueling Ma, Jianming Zhan:
Applications of rough soft sets to BL-algebras and corresponding decision making methods. 645-658 - K. A. Vidhya, T. V. Geetha:
Entity resolution framework using rough set blocking for heterogeneous web of data. 659-675 - Sankar Prasad Mondal:
Interval valued intuitionistic fuzzy number and its application in differential equation. 677-687 - Ilhan Aydin, Mehmet Karaköse, Ebru Karakose, Erhan Akin:
A new fault diagnosis approach for induction motor using negative selection algorithm and its real-time implementation on FPGA. 689-701 - Reza Ameri, M. Asghari-Larimi, Narjes Firouzkouhi:
Fuzzy geometric spaces associated to fuzzy hypersemigroups. 703-709 - Guo-fang Wang, Zhou Fang, Ping Li:
Shaping in reinforcement learning by knowledge transferred from human-demonstrations of a simple similar task. 711-720 - Fengfei Fan, Shan Gai:
Non-subsampled contourlet domain image de-noising employing joint statistical model. 721-731 - Qingfeng Song, Kai Shi, Sheng Lin, Guangping Xu, Oliver Yang, Jinsong Wang:
Optimal decision for a fuzzy supply chain with shrinkage under VaR criterion. 733-744 - Ghaus ur Rahman, Qamar Din, Faiz Faizullah, Faiz Muhammad Khan:
Qualitative behavior of a second-order fuzzy difference equation. 745-753
Volume 34, Number 2, 2018
- Mahalingam Sundhararajan, Xiao-Zhi Gao, Hamed Vahdat-Nejad:
Artificial intelligent techniques and its applications. 755-760
- Bi Ya:
AWNG-BP prediction technique study based on nonlinear combination - A case study of prediction of food supply chain in rural areas of Hubei Province, China. 761-770 - Yong Li:
The management model of construction plane layout based on Pareto ant colony genetic algorithm. 771-786 - Zhen Shi, Zhiqiang Yang, Kaiying He:
Azimuth information processing optimization method for a magnetically suspended gyroscope. 787-796 - Qizi Huangpeng, Wenwei Huang, Hanyi Shi:
Automated paper impurities evaluation using feature representations based on ADMM sparse codes. 797-805 - Zhifang Zhou, Yanfei Cai, Yixuan Xiao, Xiaohong Chen, Huixiang Zeng:
The optimization of reverse logistics cost based on value flow analysis - a case study on automobile recycling company in China. 807-818 - Jiang Zheng:
Analysis of collaborative design and construction collaborative mechanism of cloud bim platform construction project based on green computing technology. 819-829 - Shengrong Lu, Yao Liu:
Evaluation system for the sustainable development of urban transportation and ecological environment based on SVM. 831-838 - Honglin Wang, JunShen, Xinlei Wang:
Modeling and simulation of the optimal sink moving path based on mixed integer linear programming. 839-848 - Zhiyong Li, Hongdong Zhao, Ruili Zeng:
Identification of fuel supply fault in diesel engine based on cylinder head orthogonal vibration signal. 849-859 - Jingjie Yu, Min Hu, Peng Wang:
Evaluation and reliability analysis of network security risk factors based on D-S evidence theory. 861-869 - Bi-Rong Ding, Xin-Huai Qu, Yuan-Long Chen:
Application and research of mechanical design optimization based on genetic algorithm kinematics simulation technology. 871-878 - Jianpo Liu, Xiaobing Yuan, Hanwang Qian, Yongbo Cheng, Falin Liu:
Research on video transmission Ad Hoc network routing technology oriented multimedia applications. 879-886 - Zhifeng Sun, Xingxu Wu, Honglue Qu:
Research on optimized excavation approach applied in long-span underground cavern. 887-892 - Cao Da-Wei, Liu Chao, Wang Shun, Wang Xun-Ling, Wu Wen-fang:
Research and application of multimedia digital platform in the teaching of college physical education course. 893-901 - Yang Li:
Research on TDOA location error elimination of hazardous chemicals storage based on improved wavelet. 903-911 - Yushu Chen, Zhihui Wu:
Study on structure optimization design of modified wood furniture tenon structure based on the finite element analysis of ANSYS. 913-922 - Zhe Ji, Wei-Hsin Huang, Xincheng Zhang:
Design and implementation of a game interface interaction on smartphone. 923-931 - Liu Yi, Song Tian, Lejian Liao:
Construction of C-ON/OFF network traffic model based on time series. 933-943 - Wei Yu, Yong Xu:
Research on the application of HTML5 in the development of mobile internet. 945-954 - Jianren Shang, Yunnan Tian, Yi Liu, Runlong Liu:
Production scheduling optimization method based on hybrid particle swarm optimization algorithm. 955-964 - Zhaoqi Ji, Hong Tian, Zhongnian Yang, Tao Liu, Samila Bandara:
Mechanism of water inrush from coal seam floor based on coupling mechanism of seepage and stress. 965-974 - Dunnan Liu, Xian Zhang, Chuncheng Gao, Mo Yang, Qi Li, Mu Li:
Cost management system of electric power engineering project based on project management theory. 975-984 - Ming-Sheng Liu, Zongfeng Zou:
The application of block chain technology in spot exchange. 985-993 - Youcong Chao, Shijun Guo, Xiaoqun Liu:
Research on the influence of financial capital operation of non-financial listed companies on profitability. 995-1002 - Wen Jinglong, Bin Zheng:
Target method approaching green computing for active vibration control in the strapdown inertial navigation system. 1003-1012 - Yi-Gang Jia, Huan Li, Guang-Yu Wu, Zhi-Jun Yuan, Qing Zhang:
Spatial nonlinear simulation analysis of progressive collapse resistance of R.C. frame structure under different seismic precautionary. 1013-1024 - Siyu Cai, Xiaohui Lei, Xianyong Meng, Ji Yi:
Ecological flow analysis method based on the comprehensive variation diagnosis of Gini coefficient. 1025-1031 - Chuanhui Ma, Yongping Ruan, Kai Zheng:
Product market competition, asset strategy and enterprise operating liabilities. 1033-1043 - Lin Shao-Jiang, Chen Jia-Ying, Liao Zhi-Xue:
A EMD-BP integrated model to forecast tourist number and applied to Jiuzhaigou. 1045-1052 - Zhi An, Liangrong Song:
Research on the role of AHP- entropy method in the identification and evaluation of China tariff source risk. 1053-1060 - Zhigang Zhang, Songfeng Lu, Xin Zhou:
Can adiabatic algorithms with extra items always be efficient in quantum computation? 1061-1070 - Qiang Xu, Yue Zhao, Tao Hou, Jianxin Wang, Xin Zhao, Jiegang Liu, Dan Wang:
The evolution of folds-thrust wedges: Mathematical simulation based on finite difference method. 1071-1081 - Xuan Zhao, Shu Wang, Man Yu, Qiang Yu, Chenyu Zhou:
The position of speed bump in front of truck scale based on vehicle vibration performance. 1083-1095 - Yi Yin, Dan Feng, Yue Li, Shuifang Yin, Zhan Shi:
Text prediction method based on multi-label attributes and improved maximum entropy model. 1097-1109 - Hejun Zhu, Liehuang Zhu, Meng Shen, Salabat Khan:
Online and automatic identification and mining of encryption network behavior in big data environment. 1111-1119 - Xintao Xia, Yunfei Li, Shujing Dong, Wenhuan Zhu, Tianju Chen:
Based on ANSYS crown tapered rolling bearings dynamics simulation analysis. 1121-1131 - Ma Kang, Xu Yan, Li Weibin:
Dynamic response analysis of steel frame with a sudden removal first floor column. 1133-1140 - Jin Xingbo, Wang Ju, Dali Wang, Chunsheng Fang:
The research on meta-job scheduling heuristics in heterogeneous environments. 1141-1151 - Guolu Ma, Lixian Liu, Guiyang Yang, Chen Wang, Bin Zhao:
Measuring film thickness with Dual-laser imaging method. 1153-1159 - Jing Huang, Ying Xu, Xiaoyan Peng, Lin Hu, Jikuang Yang:
Development of a human head and neck muscle activation control model based on BPNN. 1161-1167 - Li Yajie, Chang Qicheng:
Complex data study on mechanical fault diagnosing. 1169-1176 - Youdong Li, Xinpeng Xie, Quansheng Liu:
Study on longitudinal emission reduction investment of supply chain and government's subsidy policy. 1177-1186 - Dong Runrun, William C. Richards:
Network evolution simulation of cooperation relationship in two phase project of zhengzhou airport based on BIM. 1187-1192 - Muling Tian, Muqin Tian, Jieming Yang, Julie Li:
Optimization of RBFneural network used in state recognition of coal flotation. 1193-1204 - Xin Feng, Zhanfang Chen, Zhuang Liu:
A new range-free algorithm based on hop correction of RSSI. 1205-1212 - Li Jun, Lu Wei, Wang Yuncheng, Yonglei Zhang:
Improved design and performance analysis of counterflow thrust vectoring technology under high subsonic. 1213-1223 - Linna Li, Dongwang Zhong, Xuerong Mao:
Research on dynamic response of explosion containment vessels. 1225-1234
Volume 34, Number 3, 2018
- Special Section: Soft Computing and Intelligent Systems: Techniques and Applications. 1235
- Sabu M. Thampi, El-Sayed M. El-Alfy, Sushmita Mitra, Ljiljana Trajkovic:
Soft computing and intelligent systems: Techniques and applications. 1237-1241 - R. Vijayanand, D. Devaraj, Kannapiran Balasubramanian:
A novel intrusion detection system for wireless mesh network with hybrid feature selection technique based on GA and MI. 1243-1250 - Malay Kumar, Manu Vardhan:
Data confidentiality and integrity preserving outsourcing algorithm for matrix chain multiplication over malicious cloud server. 1251-1263 - R. Vinayakumar, K. P. Soman, Prabaharan Poornachandran, S. Sachin Kumar:
Evaluating deep learning approaches to characterize and classify the DGAs at scale. 1265-1276 - R. Vinayakumar, K. P. Soman, Prabaharan Poornachandran, S. Sachin Kumar:
Detecting Android malware using Long Short-term Memory (LSTM). 1277-1288 - Surendar Madhawa, P. Balakrishnan, Umamakeswari Arumugam:
Data driven intrusion detection system for software defined networking enabled industrial internet of things. 1289-1300 - S. P. Nangrani, S. S. Bhat:
Smart grid security assessment using intelligent technique based on novel chaotic performance index. 1301-1310 - Senthilkumar Mathi, Srilakshmy:
An optimized and secure BUTE - binding update using twofold encryption for next generation IP mobility. 1311-1322 - Musheer Ahmad, Mohammad Zaiyan Alam, Subia Ansari, Dragan Lambic, Hamed D. Al-Sharari:
Cryptanalysis of an image encryption algorithm based on PWLCM and inertial delayed neural network. 1323-1332 - R. Vinayakumar, K. P. Soman, Prabaharan Poornachandran:
Evaluating deep learning approaches to characterize and classify malicious URL's. 1333-1343