


Остановите войну!
for scientists:


default search action
Soft Computing, Volume 24
Volume 24, Number 1, January 2020
- Oscar Castillo
, Dipak Kumar Jana
:
Special issue on "Extensions to type-1 fuzzy logic: theory, algorithms and applications". 1-2 - Amita Jain
, Basanti Pal Nandi, Charu Gupta
, Devendra Kumar Tayal:
Senti-NSetPSO: large-sized document-level sentiment analysis using Neutrosophic Set and particle swarm optimization. 3-15 - Gerardo M. Méndez, Pascual Noradino Montes Dorantes
, Maria Aracelia Alcorta-Garcia:
Dynamic adaptation of the PID's gains via Interval type-1 non-singleton type-2 fuzzy logic systems whose parameters are adapted using the backpropagation learning algorithm. 17-40 - Anupam Mukherjee
, Kunal Roy, Dipak K. Jana
, Sheikh A. Hossain:
Qualitative model optimization of almond (Terminalia catappa) oil using soxhlet extraction in type-2 fuzzy environment. 41-51 - Fatih Kutlu, Özkan Atan, Onur Silahtar:
Intuitionistic fuzzy adaptive sliding mode control of nonlinear systems. 53-64 - Deepshikha Sarma, Amrit Das, Uttam Kumar Bera
:
An optimal redistribution plan considering aftermath disruption in disaster management. 65-82 - Emanuel Ontiveros-Robles
, Patricia Melin
:
Toward a development of general type-2 fuzzy classifiers applied in diagnosis problems through embedded type-1 fuzzy classifiers. 83-99 - Shweta Sankhwar
, Deepak Gupta
, K. C. Ramya
, S. Sheeba Rani, K. Shankar
, S. K. Lakshmanaprabu
:
Improved grey wolf optimization-based feature subset selection with fuzzy neural classifier for financial crisis prediction. 101-110 - Ahmed M. Anter
, Deepak Gupta
, Oscar Castillo
:
A novel parameter estimation in dynamic model via fuzzy swarm intelligence and chaos theory for faults in wastewater treatment plant. 111-129 - Avijit De
, Pradip Kundu
, Sujit Das
, Samarjit Kar:
A ranking method based on interval type-2 fuzzy sets for multiple attribute group decision making. 131-154 - Arindam Garai
, Tapan Kumar Roy
:
Multi-objective optimization of cost-effective and customer-centric closed-loop supply chain management model in T-environment. 155-178 - Fevrier Valdez
, Cinthia Peraza:
Dynamic parameter adaptation in the harmony search algorithm for the optimization of interval type-2 fuzzy logic controllers. 179-192 - Patricia Ochoa
, Oscar Castillo
, José Soria:
Optimization of fuzzy controller design using a Differential Evolution algorithm with dynamic parameter adaptation based on Type-1 and Interval Type-2 fuzzy systems. 193-214 - Fevrier Valdez:
A review of optimization swarm intelligence-inspired algorithms with type-2 fuzzy logic parameter adaptation. 215-226 - Aldo V. Figallo, Claudia M. Gomes
:
Monadic Boolean algebras with an automorphism and their relation to ${\mathbf{Df}}_{\mathbf{2}}$-algebras. 227-236 - Thangaraj Asir
, K. Mano
:
Classification of non-local rings with genus two zero-divisor graphs. 237-245 - Saeed Rasouli
, Michiro Kondo:
n-Normal residuated lattices. 247-258 - Paolo Aglianò
:
A short note on divisible residuated semilattices. 259-266 - Yuefen Chen
, Yuanguo Zhu:
Indefinite LQ optimal control for discrete-time uncertain systems. 267-279 - Lunzhi Deng
:
Anonymous certificateless multi-receiver encryption scheme for smart community management systems. 281-292 - Mohammad Asgaripour, Ali Mohades
:
A space-time trade-off for computing the visibility polygon in the multi-pass model. 293-299 - Maryam Shams Solary
:
Computational properties of pentadiagonal and anti-pentadiagonal block band matrices with perturbed corners. 301-309 - Mohsen Arefi
:
Quantile fuzzy regression based on fuzzy outputs and fuzzy parameters. 311-320 - Degang Chen, Lianjie Dong
, Ju-Sheng Mi:
Incremental mechanism of attribute reduction based on discernible relations for dynamically increasing attribute. 321-332 - Xiangyuan Gu, Jichang Guo, Huiwen Wei, Yanhong He:
Spatial-domain steganalytic feature selection based on three-way interaction information and KS test. 333-340 - Edgar O. Reséndiz-Flores, Jesús Alejandro Navarro Acosta, Agustín Hernández-Martínez:
Optimal feature selection in industrial foam injection processes using hybrid binary Particle Swarm Optimization and Gravitational Search Algorithm in the Mahalanobis-Taguchi System. 341-349 - Seyedmohsen Hosseini, Sifat Kalam, Kash Barker
, Jose Emmanuel Ramirez-Marquez:
Scheduling multi-component maintenance with a greedy heuristic local search algorithm. 351-366 - Sefa Anil Sezer
:
Logarithmic means of sequences of fuzzy numbers and a Tauberian theorem. 367-374 - Chunxiao Zhang, Qiang Li
, Yankuan Liu:
Optimal replacement policy with minimal repair and preventive maintenance of an aircraft structure subjected to corrosion. 375-384 - M. A. Elsafty, A. M. Alkhathami:
A topological method for reduction in digital information uncertainty. 385-396 - Yu-Jie Wang
:
Utilization of trapezoidal intuitionistic fuzzy numbers and extended fuzzy preference relation for multi-criteria group decision-making based on individual differentiation of decision-makers. 397-407 - Khalid M. Hosny
, Asmaa M. Khalid, Ehab R. Mohamed:
Efficient compression of volumetric medical images using Legendre moments and differential evolution. 409-427 - Chuan Yue:
An intuitionistic fuzzy projection-based approach and application to software quality evaluation. 429-443 - Qingtang Su
, Xiaofeng Zhang, Gang Wang:
An improved watermarking algorithm for color image using Schur decomposition. 445-460 - Zeqiang Zhang
, Lili Mao, Chao Guan, Lixia Zhu, Yi Wang:
An improved scatter search algorithm for the corridor allocation problem considering corridor width. 461-481 - Nguyen Dinh Phu, Nguyen Nhut Hung:
Some solving methods for a fuzzy multi-point boundary value problem. 483-499 - Hamed Ahmadzade
, Rong Gao, Habib Naderi, Mehran Farahikia:
Partial divergence measure of uncertain random variables and its application. 501-512 - R. Srinivasan, Vidyottama Jain, Selvamuthu Dharmaraja
:
Perception based performance analysis of higher education institutions: a soft computing approach. 513-521 - Xingxing He, Yingfang Li, Keyun Qin, Dan Meng:
Distance measures on intuitionistic fuzzy sets based on intuitionistic fuzzy dissimilarity functions. 523-541 - Vishal Kumar Arora
, Vishal Sharma, Monika Sachdeva
:
A multiple pheromone ant colony optimization scheme for energy-efficient wireless sensor networks. 543-553 - Samaher Al-Janabi
, Ayad F. Alkaim
:
A nifty collaborative analysis to predicting a novel tool (DRFLLS) for missing values estimation. 555-569 - Amit Kumar Ball
, Raju Das, Shibendu Shekhar Roy
, Dakshina Ranjan Kisku
, Naresh Chandra Murmu:
Modeling of EHD inkjet printing performance using soft computing-based approaches. 571-589 - Ronald Hochreiter
, Christoph Waldhauser:
Zombie politics: evolutionary algorithms to counteract the spread of negative opinions. 591-601 - Abhirup Bandyopadhyay, Amit Kumar Dhar, Sankar Basu
:
Graph coloring: a novel heuristic based on trailing path - properties, perspective and applications in structured networks. 603-625 - C. K. Sarumathiy
, K. Geetha, C. Rajan:
Improvement in Hadoop performance using integrated feature extraction and machine learning algorithms. 627-636 - M. Karpagam
, K. Geetha, C. Rajan:
A modified shuffled frog leaping algorithm for scientific workflow scheduling using clustering techniques. 637-646 - Mehmet Alper Sofuoglu
:
Fuzzy applications of Best-Worst method in manufacturing environment. 647-659 - Samaher Al-Janabi
, Mustafa Mohammad, Ali Al-Sultan
:
A new method for prediction of air pollution based on intelligent computation. 661-680 - Rasim M. Alguliyev
, Ramiz M. Aliguliyev
, Farhad Yusifov
:
Modified fuzzy TOPSIS + TFNs ranking model for candidate selection using the qualifying criteria. 681-695 - Shafagat Mahmudova
:
Application of the TOPSİS method to improve software efficiency and to optimize its management. 697-708
Volume 24, Number 2, January 2020
- Payel Chaudhuri, Damodar Maity:
Cost optimization of rectangular RC footing using GA and UPSO. 709-721 - Ivan Chajda, Helmut Länger:
Left residuated lattices induced by lattices with a unary operation. 723-729 - Zhenzhen Quan, Songcan Chen
:
Robust convex clustering. 731-744 - Sheng Li, Xiaoqi Peng, Yu-xiao Li:
Choquet integrals of weighted generalized and group generalized intuitionistic fuzzy soft sets. 745-760 - Yun Liang
, Tian-ping He:
Survey on soft computing. 761-770 - Milad Yousefi Valandar
, Milad Jafari Barani, Peyman Ayubi
:
A blind and robust color images watermarking method based on block transform and secured by modified 3-dimensional Hénon map. 771-794 - Wenjuan Chen
, Hongkai Wang:
Filters and ideals in the generalization of pseudo-BL algebras. 795-812 - Sergio A. Celani
, Daniela Montangie:
Algebraic semantics of the $\left\{ \rightarrow , \square \right\} $-fragment of Propositional Lax Logic. 813-823 - Zifei Ma, Ruiyin Li
, Tong Li, Rui Zhu
, Rong Jiang, Juan Yang, Mingjing Tang, Ming Zheng:
A data-driven risk measurement model of software developer turnover. 825-842 - Anatolij Dvurecenskij, Dominik Lachman:
Spectral resolutions and observables in n-perfect MV-algebras. 843-860 - Xiaohui Yu
, Zhiping Du, Qiang Zhang, Zhengxing Zou
, Zhen Zhou, Jinhui Pang:
Generalized form solutions of cooperative game with fuzzy coalition structure. 861-877 - Hsien-Chung Wu:
Set operations of fuzzy sets using gradual elements. 879-893 - S. V. Tchoffo Foka, Marcel Tonga:
A note on the algebraicity of L-fuzzy subalgebras in universal algebra. 895-899 - Farzaneh Ghorbani, Mohsen Afsharchi, Vali Derhami:
learning with policy prediction in continuous state-action multi-agent decision processes. 901-918 - Tengfi Wang, Peng Shi, Guixiang Wang
:
Solving fuzzy regression equation and its approximation for random fuzzy variable and their application. 919-933 - Ngo Van Hoa:
On the initial value problem for fuzzy differential equations of non-integer order $\alpha \in (1, 2)$. 935-954 - Davood Akbari Bengar
, Ali Ebrahimnejad
, Homayun Motameni, Mehdi Golsorkhtabaramiri:
A page replacement algorithm based on a fuzzy approach to improve cache memory performance. 955-963 - Yuanbo Cui, Fei Gao, Hua Zhang
, Wenmin Li, Zhengping Jin:
KNN search-based trajectory cloaking against the Cell-ID tracking in cellular network. 965-980 - Bo Yuan
, Bin Li, Huanhuan Chen, Zhigang Zeng, Xin Yao:
Multi-objective redundancy hardening with optimal task mapping for independent tasks on multi-cores. 981-995 - Wen Long, Shaohong Cai
, Jianjun Jiao, Mingzhu Tang:
An efficient and robust grey wolf optimizer algorithm for large-scale numerical optimization. 997-1026 - Abdurrahman Pektas, Tankut Acarman:
Deep learning for effective Android malware detection using API call graph embeddings. 1027-1043 - Yuwei Zhang
, Ying Xing, Yunzhan Gong, Dahai Jin, Honghui Li, Feng Liu:
A variable-level automated defect identification model based on machine learning. 1045-1061 - Raghunathan Krishankumar
, Premaladha Jayaraman, K. S. Ravichandran
, K. R. Sekar, Manikandan Ramachandran
, X. Z. Gao:
A novel extension to VIKOR method under intuitionistic fuzzy context for solving personnel selection problem. 1063-1081 - Yunlei Yang, Muzhou Hou
, Hongli Sun, Tianle Zhang
, Futian Weng, Jianshu Luo:
Neural network algorithm based on Legendre improved extreme learning machine for solving elliptic partial differential equations. 1083-1096 - Yuntao Zhao, Weigang Li, Ao Liu:
Improved grey wolf optimization based on the two-stage search of hybrid CMA-ES. 1097-1115 - Amin Foroughi Nematollahi, Abolfazl Rahiminejad, Behrooz Vahidi
:
A novel meta-heuristic optimization method based on golden ratio in nature. 1117-1151 - Behrooz Ghasemishabankareh, Melih Ozlen
, Xiaodong Li
, Kalyanmoy Deb:
A genetic algorithm with local search for solving single-source single-sink nonlinear non-convex minimum cost flow problems. 1153-1169 - Valappil Ansal:
ALO-optimized artificial neural network-controlled dynamic voltage restorer for compensation of voltage issues in distribution system. 1171-1184 - Haitong Zhao, Changsheng Zhang, Jiaxu Ning:
A core firework updating information guided dynamic fireworks algorithm for global optimization. 1185-1211 - Tamunokuro Opubo William-West:
On shadowed hypergraphs. 1213-1224 - Dhruba Jyoti Kalita, Shailendra Singh:
SVM Hyper-parameters optimization using quantized multi-PSO in dynamic environment. 1225-1241 - Saad M. Darwish
:
An intelligent credit card fraud detection approach based on semantic fusion of two classifiers. 1243-1253 - Behrouz Fathi-Vajargah, Zeinab Hassanzadeh:
Monte Carlo method for the real and complex fuzzy system of linear algebraic equations. 1255-1270 - Jiaxu Ning, Changsheng Zhang, Bin Zhang, Peng Wang:
Improving the one-position inheritance artificial bee colony algorithm using heuristic search mechanisms. 1271-1281 - Sheng-Nan Lu
, Yuping Wang, Huansheng Song:
A high accurate vehicle speed estimation method. 1283-1291 - Manoranjan De, Barun Das, Manoranjan Maiti:
EPL models with fuzzy imperfect production system including carbon emission: a fuzzy differential equation approach. 1293-1313 - Tomasz Praczyk
:
Neural collision avoidance system for biomimetic autonomous underwater vehicle. 1315-1333 - Mir Saber Salehi Mir, Javad Rezaeian, Hossein Mohamadian:
Scheduling parallel machine problem under general effects of deterioration and learning with past-sequence-dependent setup time: heuristic and meta-heuristic approaches. 1335-1355 - Ferdinando Di Martino
, Witold Pedrycz, Salvatore Sessa:
Hierarchical granular hotspots detection. 1357-1376 - Hongbin Zhang
, Diedie Qiu, Renzhong Wu, Donghong Ji, Guangli Li, Zhenyu Niu, Tao Li:
Novel model to integrate word embeddings and syntactic trees for automatic caption generation from images. 1377-1397 - Man Xu, Wansheng Tang
, Ruiqing Zhao:
Equilibrium strategy for human resource management with limited effort: in-house versus outsourcing. 1399-1422 - Jorge Calvo-Zaragoza
, Juan Ramón Rico-Juan
, Antonio Javier Gallego
:
Ensemble classification from deep predictions with test data augmentation. 1423-1433 - Montserrat Casanovas, Agustín Torres-Martínez
, José M. Merigó
:
Multi-person and multi-criteria decision making with the induced probabilistic ordered weighted average distance. 1435-1446 - M. Antony Robert Raj, S. Abirami:
Structural representation-based off-line Tamil handwritten character recognition. 1447-1472 - D. Fathema Farzana
, K. Mahadevan:
Performance comparison using firefly and PSO algorithms on congestion management of deregulated power market involving renewable energy sources. 1473-1482 - Huihui Li
, Guihua Wen:
Modeling reverse thinking for machine learning. 1483-1496 - Asma Khalid, Ismat Beg
:
Role of honesty and confined interpersonal influence in modelling predilections. 1497-1509 - Serkan Genç, Diyar Akay
, Fatih Emre Boran
, Ronald R. Yager:
Linguistic summarization of fuzzy social and economic networks: an application on the international trade network. 1511-1527 - Avinash Dixit, Daya Ram Sahu
, Amit Kumar Singh
, Tanmoy Som
:
Application of a new accelerated algorithm to regression problems. 1539-1552
Volume 24, Number 3, February 2020
- Stephen Hart, Anna Lisa Ferrara, Federica Paci
:
Fuzzy-based approach to assess and prioritize privacy risks. 1553-1563 - Ahmed M. Anter
, Mumtaz Ali
:
Feature selection strategy based on hybrid crow search optimization algorithm integrated with chaos theory and fuzzy c-means algorithm for medical diagnosis problems. 1565-1584 - Muhammad Shakeel, Muhammad Shahzad, Saleem Abdullah:
Pythagorean uncertain linguistic hesitant fuzzy weighted averaging operator and its application in financial group decision making. 1585-1597 - Rakesh Kumar Sanodiya, Sriparna Saha, Jimson Mathew:
Semi-supervised orthogonal discriminant analysis with relative distance : integration with a MOO approach. 1599-1618 - Ashish Kumar Bhandari
, Shubham Maurya
:
Cuckoo search algorithm-based brightness preserving histogram scheme for low-contrast image enhancement. 1619-1645 - Kifayat Ullah
, Harish Garg
, Tahir Mahmood
, Naeem Jan
, Zeeshan Ali:
Correlation coefficients for T-spherical fuzzy sets and their applications in clustering and multi-attribute decision making. 1647-1659 - Xinning Li, Xiaoxiao Zhao
, Derun Chu, Zhiping Zhou:
An autoencoder-based spectral clustering algorithm. 1661-1671 - Gülçin Canbulut
, Hülya Torun
:
Analysis of fuzzy supply chain performance based on different buyback contract configurations. 1673-1682 - K. Suresh, R. Dillibabu:
A novel fuzzy mechanism for risk assessment in software projects. 1683-1705 - Bo Xu
, Hongfei Lin, Yuan Lin, Yizhou Guan:
Integrating social annotations into topic models for personalized document retrieval. 1707-1716 - Hesam Fallah Ghavidel:
A modeling error-based adaptive fuzzy observer approach with input saturation analysis for robust control of affine and non-affine systems. 1717-1735 - Prateek Gupta
, Ajay K. Sharma:
Clustering-based heterogeneous optimized-HEED protocols for WSNs. 1737-1761 - Yuxian Zhang, Mohammed Gendeel, Hui-Deng Peng, Xiao-Yi Qian, Hongqing Xu:
Supervised Kohonen network with heterogeneous value difference metric for both numeric and categorical inputs. 1763-1774 - José Ignacio Peláez, Eustaquio A. Martinez, Luis G. Vargas:
Products and services valuation through unsolicited information from social media. 1775-1788 - Jay F. K. Au Yeung, Zi-Kai Wei, Kit Yan Chan
, Henry Y. K. Lau, Ka-Fai Cedric Yiu:
Jump detection in financial time series using machine learning algorithms. 1789-1801 - Weiwei Wang, Ping Chen:
Valuation of stock loan under uncertain stock model with floating interest rate. 1803-1814 - Muhammad Arif, Guojun Wang
:
Fast curvelet transform through genetic algorithm for multimodal medical image fusion. 1815-1836