callback( { "result":{ "query":":facetid:toc:\"db/journals/informaticaLT/informaticaLT30.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"190.60" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"39", "@dc":"39", "@oc":"39", "@id":"43461512", "text":":facetid:toc:db/journals/informaticaLT/informaticaLT30.bht" } }, "hits":{ "@total":"39", "@computed":"39", "@sent":"39", "@first":"0", "hit":[{ "@score":"1", "@id":"2019692", "info":{"authors":{"author":[{"@pid":"20/8875","text":"Reza Abazari"},{"@pid":"51/1146","text":"Mehrdad Lakestani"}]},"title":"Non-Subsampled Shearlet Transform and Log-Transform Methods for Despeckling of Medical Ultrasound Images.","venue":"Informatica","volume":"30","number":"1","pages":"1-19","year":"2019","type":"Journal Articles","access":"closed","key":"journals/informaticaLT/AbazariL19","ee":"https://content.iospress.com/articles/informatica/inf1210","url":"https://dblp.org/rec/journals/informaticaLT/AbazariL19"}, "url":"URL#2019692" }, { "@score":"1", "@id":"2019693", "info":{"authors":{"author":[{"@pid":"177/6531","text":"Pranab Biswas"},{"@pid":"03/614","text":"Surapati Pramanik"},{"@pid":"00/3411","text":"Bibhas Chandra Giri"}]},"title":"NH-MADM Strategy in Neutrosophic Hesitant Fuzzy Set Environment Based on Extended GRA.","venue":"Informatica","volume":"30","number":"2","pages":"213-242","year":"2019","type":"Journal Articles","access":"closed","key":"journals/informaticaLT/BiswasPG19","ee":"https://content.iospress.com/articles/informatica/inf1218","url":"https://dblp.org/rec/journals/informaticaLT/BiswasPG19"}, "url":"URL#2019693" }, { "@score":"1", "@id":"2019694", "info":{"authors":{"author":[{"@pid":"152/8544","text":"Katy Castillo-Rosado"},{"@pid":"19/4179","text":"José Hernández Palancar"}]},"title":"Latent Fingerprint Matching Using Distinctive Ridge Points.","venue":"Informatica","volume":"30","number":"3","pages":"431-454","year":"2019","type":"Journal Articles","access":"closed","key":"journals/informaticaLT/Castillo-Rosado19","ee":"https://content.iospress.com/articles/informatica/inf1228","url":"https://dblp.org/rec/journals/informaticaLT/Castillo-Rosado19"}, "url":"URL#2019694" }, { "@score":"1", "@id":"2019695", "info":{"authors":{"author":[{"@pid":"159/2604","text":"Jani Dugonik"},{"@pid":"64/1477","text":"Borko Boskovic"},{"@pid":"99/4750","text":"Janez Brest"},{"@pid":"96/6620","text":"Mirjam Sepesy Maucec"}]},"title":"Improving Statistical Machine Translation Quality Using Differential Evolution.","venue":"Informatica","volume":"30","number":"4","pages":"629-645","year":"2019","type":"Journal Articles","access":"closed","key":"journals/informaticaLT/DugonikBBM19","ee":"https://content.iospress.com/articles/informatica/inf1236","url":"https://dblp.org/rec/journals/informaticaLT/DugonikBBM19"}, "url":"URL#2019695" }, { "@score":"1", "@id":"2019696", "info":{"authors":{"author":[{"@pid":"353/0915","text":"Ali Mazraeh Farahani"},{"@pid":"255/9185","text":"Hadis Mohseni"}]},"title":"Multi-Pose Face Recognition Using Pairwise Supervised Dictionary Learning.","venue":"Informatica","volume":"30","number":"4","pages":"647-670","year":"2019","type":"Journal Articles","access":"closed","key":"journals/informaticaLT/FarahaniM19","ee":"https://content.iospress.com/articles/informatica/inf1229","url":"https://dblp.org/rec/journals/informaticaLT/FarahaniM19"}, "url":"URL#2019696" }, { "@score":"1", "@id":"2019697", "info":{"authors":{"author":[{"@pid":"242/1712","text":"Elvis Ferrera-Cedeño"},{"@pid":"90/11205","text":"Niusvel Acosta-Mendoza"},{"@pid":"88/1811","text":"Andrés Gago Alonso"},{"@pid":"84/3109","text":"Edel B. García Reyes"}]},"title":"Detecting Free Standing Conversational Group in Video Using Fuzzy Relations.","venue":"Informatica","volume":"30","number":"1","pages":"21-32","year":"2019","type":"Journal Articles","access":"closed","key":"journals/informaticaLT/Ferrera-CedenoA19","ee":"https://content.iospress.com/articles/informatica/inf1197","url":"https://dblp.org/rec/journals/informaticaLT/Ferrera-CedenoA19"}, "url":"URL#2019697" }, { "@score":"1", "@id":"2019698", "info":{"authors":{"author":[{"@pid":"234/9579","text":"Francisco José Orts Gómez"},{"@pid":"81/8378","text":"Gloria Ortega López"},{"@pid":"52/11503","text":"Ernestas Filatovas"},{"@pid":"66/1433","text":"Olga Kurasova"},{"@pid":"09/2896","text":"Gracia Ester Martín Garzón"}]},"title":"Hyperspectral Image Classification Using Isomap with SMACOF.","venue":"Informatica","volume":"30","number":"2","pages":"349-365","year":"2019","type":"Journal Articles","access":"closed","key":"journals/informaticaLT/GomezLFKG19","ee":"https://content.iospress.com/articles/informatica/inf1220","url":"https://dblp.org/rec/journals/informaticaLT/GomezLFKG19"}, "url":"URL#2019698" }, { "@score":"1", "@id":"2019699", "info":{"authors":{"author":[{"@pid":"13/5261","text":"Saulius Gudas"},{"@pid":"151/6856","text":"Jurij Tekutov"},{"@pid":"25/250","text":"Rimantas Butleris"},{"@pid":"151/6895","text":"Vitalijus Denisovas"}]},"title":"Modelling Subject Domain Causality for Learning Content Renewal.","venue":"Informatica","volume":"30","number":"3","pages":"455-480","year":"2019","type":"Journal Articles","access":"closed","key":"journals/informaticaLT/GudasTBD19","ee":"https://content.iospress.com/articles/informatica/inf1235","url":"https://dblp.org/rec/journals/informaticaLT/GudasTBD19"}, "url":"URL#2019699" }, { "@score":"1", "@id":"2019700", "info":{"authors":{"author":[{"@pid":"232/9412","text":"Fatma Kutlu Gündogdu"},{"@pid":"16/3933","text":"Cengiz Kahraman"}]},"title":"Extension of WASPAS with Spherical Fuzzy Sets.","venue":"Informatica","volume":"30","number":"2","pages":"269-292","year":"2019","type":"Journal Articles","access":"closed","key":"journals/informaticaLT/GundogduK19","ee":"https://content.iospress.com/articles/informatica/inf1223","url":"https://dblp.org/rec/journals/informaticaLT/GundogduK19"}, "url":"URL#2019700" }, { "@score":"1", "@id":"2019701", "info":{"authors":{"author":[{"@pid":"157/1319","text":"Pengfei Hao"},{"@pid":"52/6124","text":"Chunlong Yao"},{"@pid":"59/8190","text":"Qingbin Meng"},{"@pid":"190/9471","text":"Xiaoqiang Yu"},{"@pid":"25/3528","text":"Xu Li"}]},"title":"A Heading Maintaining Oriented Compression Algorithm for GPS Trajectory Data.","venue":"Informatica","volume":"30","number":"1","pages":"33-52","year":"2019","type":"Journal Articles","access":"closed","key":"journals/informaticaLT/HaoYMYL19","ee":"https://content.iospress.com/articles/informatica/inf1209","url":"https://dblp.org/rec/journals/informaticaLT/HaoYMYL19"}, "url":"URL#2019701" }, { "@score":"1", "@id":"2019702", "info":{"authors":{"author":[{"@pid":"150/4924","text":"Esteban Jove"},{"@pid":"145/6761","text":"José Luís Casteleiro-Roca"},{"@pid":"124/3893","text":"Héctor Quintián"},{"@pid":"88/2550","text":"Juan Albino Méndez Pérez"},{"@pid":"53/2977","text":"José Luís Calvo-Rolle"}]},"title":"Virtual Sensor for Fault Detection, Isolation and Data Recovery for Bicomponent Mixing Machine Monitoring.","venue":"Informatica","volume":"30","number":"4","pages":"671-687","year":"2019","type":"Journal Articles","access":"closed","key":"journals/informaticaLT/JoveCQPC19","ee":"https://content.iospress.com/articles/informatica/inf1241","url":"https://dblp.org/rec/journals/informaticaLT/JoveCQPC19"}, "url":"URL#2019702" }, { "@score":"1", "@id":"2019703", "info":{"authors":{"author":[{"@pid":"206/9875","text":"Rahma Kalboussi"},{"@pid":"144/6468","text":"Mehrez Abdellaoui"},{"@pid":"88/7380","text":"Ali Douik"}]},"title":"Video Saliency Detection Using Motion Distinctiveness and Uniform Contrast Measure.","venue":"Informatica","volume":"30","number":"1","pages":"53-72","year":"2019","type":"Journal Articles","access":"closed","key":"journals/informaticaLT/KalboussiAD19","ee":"https://content.iospress.com/articles/informatica/inf1212","url":"https://dblp.org/rec/journals/informaticaLT/KalboussiAD19"}, "url":"URL#2019703" }, { "@score":"1", "@id":"2019704", "info":{"authors":{"author":[{"@pid":"213/5981","text":"Ali Karasan"},{"@pid":"10/3054","text":"Edmundas Kazimieras Zavadskas"},{"@pid":"16/3933","text":"Cengiz Kahraman"},{"@pid":"170/8067","text":"Mehdi Keshavarz Ghorabaee"}]},"title":"Residential Construction Site Selection Through Interval-Valued Hesitant Fuzzy CODAS Method.","venue":"Informatica","volume":"30","number":"4","pages":"689-710","year":"2019","type":"Journal Articles","access":"closed","key":"journals/informaticaLT/KarasanZKG19","ee":"https://content.iospress.com/articles/informatica/inf1232","url":"https://dblp.org/rec/journals/informaticaLT/KarasanZKG19"}, "url":"URL#2019704" }, { "@score":"1", "@id":"2019705", "info":{"authors":{"author":{"@pid":"25/5523","text":"Jonas Koko"}},"title":"Efficient MATLAB Codes for the 2D/3D Stokes Equation with the Mini-Element.","venue":"Informatica","volume":"30","number":"2","pages":"243-268","year":"2019","type":"Journal Articles","access":"closed","key":"journals/informaticaLT/Koko19","ee":"https://content.iospress.com/articles/informatica/inf1211","url":"https://dblp.org/rec/journals/informaticaLT/Koko19"}, "url":"URL#2019705" }, { "@score":"1", "@id":"2019706", "info":{"authors":{"author":[{"@pid":"256/7986","text":"Kun-Young Lee"},{"@pid":"256/8012","text":"Ji-Soo Lim"},{"@pid":"92/2078","text":"Sung-Seok Ko"}]},"title":"Endosymbiotic Evolutionary Algorithm for an Integrated Model of the Vehicle Routing and Truck Scheduling Problem with a Cross-Docking System.","venue":"Informatica","volume":"30","number":"3","pages":"481-502","year":"2019","type":"Journal Articles","access":"closed","key":"journals/informaticaLT/LeeLK19","ee":"https://content.iospress.com/articles/informatica/inf1225","url":"https://dblp.org/rec/journals/informaticaLT/LeeLK19"}, "url":"URL#2019706" }, { "@score":"1", "@id":"2019707", "info":{"authors":{"author":[{"@pid":"91/5865","text":"Peide Liu"},{"@pid":"144/4404","text":"Qaisar Khan"},{"@pid":"22/9200-2","text":"Tahir Mahmood 0002"}]},"title":"Application of Interval Neutrosophic Power Hamy Mean Operators in MAGDM.","venue":"Informatica","volume":"30","number":"2","pages":"293-325","year":"2019","type":"Journal Articles","access":"closed","key":"journals/informaticaLT/LiuKM19","ee":"https://content.iospress.com/articles/informatica/inf1217","url":"https://dblp.org/rec/journals/informaticaLT/LiuKM19"}, "url":"URL#2019707" }, { "@score":"1", "@id":"2019708", "info":{"authors":{"author":[{"@pid":"192/5568","text":"Ali Mahmoodirad"},{"@pid":"192/5588","text":"Ahmad Heydari"},{"@pid":"20/10509","text":"Sadegh Niroomand"}]},"title":"An Effective Hybrid Fuzzy Programming Approach for an Entropy-Based Multi-Objective Assembly Line Balancing Problem.","venue":"Informatica","volume":"30","number":"3","pages":"503-528","year":"2019","type":"Journal Articles","access":"closed","key":"journals/informaticaLT/MahmoodiradHN19","ee":"https://content.iospress.com/articles/informatica/inf1219","url":"https://dblp.org/rec/journals/informaticaLT/MahmoodiradHN19"}, "url":"URL#2019708" }, { "@score":"1", "@id":"2019709", "info":{"authors":{"author":[{"@pid":"46/8911","text":"Algirdas Maknickas"},{"@pid":"122/2757","text":"Nijole Maknickiene"}]},"title":"Support System for Trading in Exchange Market by Distributional Forecasting Model.","venue":"Informatica","volume":"30","number":"1","pages":"73-90","year":"2019","type":"Journal Articles","access":"closed","key":"journals/informaticaLT/MaknickasM19","ee":"https://content.iospress.com/articles/informatica/inf1201","url":"https://dblp.org/rec/journals/informaticaLT/MaknickasM19"}, "url":"URL#2019709" }, { "@score":"1", "@id":"2019710", "info":{"authors":{"author":[{"@pid":"128/0196","text":"Qian Mei"},{"@pid":"00/4709","text":"Yanan Zhao"},{"@pid":"41/1980","text":"Hu Xiong"}]},"title":"A New Provably Secure Certificateless Signature with Revocation in the Standard Model.","venue":"Informatica","volume":"30","number":"4","pages":"711-728","year":"2019","type":"Journal Articles","access":"closed","key":"journals/informaticaLT/MeiZX19","ee":"https://content.iospress.com/articles/informatica/inf1227","url":"https://dblp.org/rec/journals/informaticaLT/MeiZX19"}, "url":"URL#2019710" }, { "@score":"1", "@id":"2019711", "info":{"authors":{"author":[{"@pid":"186/4479","text":"Jonas Muleravicius"},{"@pid":"186/4476","text":"Inga Timofejeva"},{"@pid":"150/1783","text":"Aleksejus Mihalkovich"},{"@pid":"79/3682","text":"Eligijus Sakalauskas"}]},"title":"Security, Trustworthiness and Effectivity Analysis of an Offline E-Cash System with Observers.","venue":"Informatica","volume":"30","number":"2","pages":"327-348","year":"2019","type":"Journal Articles","access":"closed","key":"journals/informaticaLT/MuleraviciusTMS19","ee":"https://content.iospress.com/articles/informatica/inf1221","url":"https://dblp.org/rec/journals/informaticaLT/MuleraviciusTMS19"}, "url":"URL#2019711" }, { "@score":"1", "@id":"2019712", "info":{"authors":{"author":{"@pid":"256/8063","text":"Saulius Norvidas"}},"title":"A Note on Reconstruction of Bandlimited Signals of Several Variables Sampled at Nyquist Rate.","venue":"Informatica","volume":"30","number":"3","pages":"529-551","year":"2019","type":"Journal Articles","access":"closed","key":"journals/informaticaLT/Norvidas19","ee":"https://content.iospress.com/articles/informatica/inf1234","url":"https://dblp.org/rec/journals/informaticaLT/Norvidas19"}, "url":"URL#2019712" }, { "@score":"1", "@id":"2019713", "info":{"authors":{"author":[{"@pid":"77/8648","text":"Remigijus Paulavicius"},{"@pid":"256/7901","text":"Saulius Grigaitis"},{"@pid":"139/7690","text":"Aleksandr Igumenov"},{"@pid":"52/11503","text":"Ernestas Filatovas"}]},"title":"A Decade of Blockchain: Review of the Current Status, Challenges, and Future Directions.","venue":"Informatica","volume":"30","number":"4","pages":"729-748","year":"2019","type":"Journal Articles","access":"closed","key":"journals/informaticaLT/PaulaviciusGIF19","ee":"https://content.iospress.com/articles/informatica/inf1245","url":"https://dblp.org/rec/journals/informaticaLT/PaulaviciusGIF19"}, "url":"URL#2019713" }, { "@score":"1", "@id":"2019714", "info":{"authors":{"author":[{"@pid":"29/4137","text":"Zoran Peric"},{"@pid":"73/8705","text":"Dragan B. Denic"},{"@pid":"59/10229","text":"Vladimir Despotovic"}]},"title":"Novel Two-Bit Adaptive Delta Modulation Algorithms.","venue":"Informatica","volume":"30","number":"1","pages":"117-134","year":"2019","type":"Journal Articles","access":"closed","key":"journals/informaticaLT/PericDD19","ee":"https://content.iospress.com/articles/informatica/inf1206","url":"https://dblp.org/rec/journals/informaticaLT/PericDD19"}, "url":"URL#2019714" }, { "@score":"1", "@id":"2019715", "info":{"authors":{"author":[{"@pid":"56/6083","text":"Darius Plikynas"},{"@pid":"28/6338","text":"Leonidas Sakalauskas"},{"@pid":"69/6132","text":"Aistis Raudys"}]},"title":"Conceptual Modelling of Brain State Dynamics as Free Energy and Entropy-Based Processes.","venue":"Informatica","volume":"30","number":"4","pages":"749-780","year":"2019","type":"Journal Articles","access":"closed","key":"journals/informaticaLT/PlikynasSR19","ee":"https://content.iospress.com/articles/informatica/inf1239","url":"https://dblp.org/rec/journals/informaticaLT/PlikynasSR19"}, "url":"URL#2019715" }, { "@score":"1", "@id":"2019716", "info":{"authors":{"author":[{"@pid":"242/1794","text":"Natalija Pozniak"},{"@pid":"28/6338","text":"Leonidas Sakalauskas"},{"@pid":"242/1153","text":"Laura Saltyte"}]},"title":"Kriging Model with Fractional Euclidean Distance Matrices.","venue":"Informatica","volume":"30","number":"2","pages":"367-390","year":"2019","type":"Journal Articles","access":"closed","key":"journals/informaticaLT/PozniakSS19","ee":"https://content.iospress.com/articles/informatica/inf1222","url":"https://dblp.org/rec/journals/informaticaLT/PozniakSS19"}, "url":"URL#2019716" }, { "@score":"1", "@id":"2019717", "info":{"authors":{"author":[{"@pid":"54/4572","text":"Marijus Radavicius"},{"@pid":"256/7912","text":"Tomas Rekasius"},{"@pid":"256/8033","text":"Jurgita Zidanaviciute"}]},"title":"Local Symmetry of Non-Coding Genetic Sequences.","venue":"Informatica","volume":"30","number":"3","pages":"553-571","year":"2019","type":"Journal Articles","access":"closed","key":"journals/informaticaLT/RadaviciusRZ19","ee":"https://content.iospress.com/articles/informatica/inf1231","url":"https://dblp.org/rec/journals/informaticaLT/RadaviciusRZ19"}, "url":"URL#2019717" }, { "@score":"1", "@id":"2019718", "info":{"authors":{"author":[{"@pid":"31/1347","text":"Gailius Raskinis"},{"@pid":"183/3160","text":"Gintare Paskauskaite"},{"@pid":"41/3561","text":"Ausra Saudargiene"},{"@pid":"55/11089","text":"Asta Kazlauskiene"},{"@pid":"35/37","text":"Airenas Vaiciunas"}]},"title":"Comparison of Phonemic and Graphemic Word to Sub-Word Unit Mappings for Lithuanian Phone-Level Speech Transcription.","venue":"Informatica","volume":"30","number":"3","pages":"573-593","year":"2019","type":"Journal Articles","access":"closed","key":"journals/informaticaLT/RaskinisPSKV19","ee":"https://content.iospress.com/articles/informatica/inf1233","url":"https://dblp.org/rec/journals/informaticaLT/RaskinisPSKV19"}, "url":"URL#2019718" }, { "@score":"1", "@id":"2019719", "info":{"authors":{"author":[{"@pid":"74/1968","text":"M. Carmen Ruiz"},{"@pid":"98/4537","text":"Hermenegilda Macià"},{"@pid":"171/1196","text":"Javier L. Calleja"}]},"title":"New Proposals to Improve a MAC Layer Protocol in Wireless Sensor Networks.","venue":"Informatica","volume":"30","number":"1","pages":"91-116","year":"2019","type":"Journal Articles","access":"closed","key":"journals/informaticaLT/RuizMC19","ee":"https://content.iospress.com/articles/informatica/inf1207","url":"https://dblp.org/rec/journals/informaticaLT/RuizMC19"}, "url":"URL#2019719" }, { "@score":"1", "@id":"2019720", "info":{"authors":{"author":[{"@pid":"175/8536","text":"Tapan Senapati"},{"@pid":"y/RonaldRYager","text":"Ronald R. Yager"}]},"title":"Some New Operations Over Fermatean Fuzzy Numbers and Application of Fermatean Fuzzy WPM in Multiple Criteria Decision Making.","venue":"Informatica","volume":"30","number":"2","pages":"391-412","year":"2019","type":"Journal Articles","access":"closed","key":"journals/informaticaLT/SenapatiY19","ee":"https://content.iospress.com/articles/informatica/inf1216","url":"https://dblp.org/rec/journals/informaticaLT/SenapatiY19"}, "url":"URL#2019720" }, { "@score":"1", "@id":"2019721", "info":{"authors":{"author":[{"@pid":"34/11276","text":"Dragisa Stanujkic"},{"@pid":"179/2005","text":"Darjan Karabasevic"},{"@pid":"10/3054","text":"Edmundas Kazimieras Zavadskas"},{"@pid":"23/684","text":"Florentin Smarandache"},{"@pid":"47/4537","text":"Willem Karel M. Brauers"}]},"title":"A Bipolar Fuzzy Extension of the MULTIMOORA Method.","venue":"Informatica","volume":"30","number":"1","pages":"135-152","year":"2019","type":"Journal Articles","access":"closed","key":"journals/informaticaLT/StanujkicKZSB19","ee":"https://content.iospress.com/articles/informatica/inf1215","url":"https://dblp.org/rec/journals/informaticaLT/StanujkicKZSB19"}, "url":"URL#2019721" }, { "@score":"1", "@id":"2019722", "info":{"authors":{"author":[{"@pid":"214/1685","text":"Xiyue Tang"},{"@pid":"54/4528-1","text":"Guiwu Wei 0001"},{"@pid":"46/5223-5","text":"Hui Gao 0005"}]},"title":"Models for Multiple Attribute Decision Making with Interval-Valued Pythagorean Fuzzy Muirhead Mean Operators and Their Application to Green Suppliers Selection.","venue":"Informatica","volume":"30","number":"1","pages":"153-186","year":"2019","type":"Journal Articles","access":"closed","key":"journals/informaticaLT/TangWG19","ee":"https://content.iospress.com/articles/informatica/inf1208","url":"https://dblp.org/rec/journals/informaticaLT/TangWG19"}, "url":"URL#2019722" }, { "@score":"1", "@id":"2019723", "info":{"authors":{"author":[{"@pid":"23/1812","text":"Xiaoli Tian"},{"@pid":"12/1328","text":"Zeshui Xu"},{"@pid":"56/6538","text":"Jing Gu"}]},"title":"An Extended TODIM Based on Cumulative Prospect Theory and Its Application in Venture Capital.","venue":"Informatica","volume":"30","number":"2","pages":"413-429","year":"2019","type":"Journal Articles","access":"closed","key":"journals/informaticaLT/TianXG19","ee":"https://content.iospress.com/articles/informatica/inf1214","url":"https://dblp.org/rec/journals/informaticaLT/TianXG19"}, "url":"URL#2019723" }, { "@score":"1", "@id":"2019724", "info":{"authors":{"author":[{"@pid":"87/1521","text":"Yuh-Min Tseng"},{"@pid":"40/11139","text":"Tung-Tso Tsai"},{"@pid":"75/5666","text":"Jui-Di Wu"},{"@pid":"152/4398","text":"Sen-Shan Huang"}]},"title":"Efficient Certificate-Based Signature with Short Key and Signature Sizes from Lattices.","venue":"Informatica","volume":"30","number":"3","pages":"595-612","year":"2019","type":"Journal Articles","access":"closed","key":"journals/informaticaLT/TsengTWH19","ee":"https://content.iospress.com/articles/informatica/inf1226","url":"https://dblp.org/rec/journals/informaticaLT/TsengTWH19"}, "url":"URL#2019724" }, { "@score":"1", "@id":"2019725", "info":{"authors":{"author":[{"@pid":"08/1335","text":"Zenonas Turskis"},{"@pid":"138/4499","text":"Nikolaj Goranin"},{"@pid":"235/7392","text":"Assel Nurusheva"},{"@pid":"197/0254","text":"Seilkhan Boranbayev"}]},"title":"Information Security Risk Assessment in Critical Infrastructure: A Hybrid MCDM Approach.","venue":"Informatica","volume":"30","number":"1","pages":"187-211","year":"2019","type":"Journal Articles","access":"closed","key":"journals/informaticaLT/TurskisGNB19","ee":"https://content.iospress.com/articles/informatica/inf1213","url":"https://dblp.org/rec/journals/informaticaLT/TurskisGNB19"}, "url":"URL#2019725" }, { "@score":"1", "@id":"2019726", "info":{"authors":{"author":[{"@pid":"81/9270","text":"Sasa Vlahinic"},{"@pid":"203/0998","text":"Luka Batistic"},{"@pid":"165/6677","text":"Guruprasad Madhale Jadav"},{"@pid":"69/6609","text":"Miroslav Vrankic"}]},"title":"Brain Computer Interface Based Communicator for Persons in Locked-in State.","venue":"Informatica","volume":"30","number":"4","pages":"781-798","year":"2019","type":"Journal Articles","access":"closed","key":"journals/informaticaLT/VlahinicBJV19","ee":"https://content.iospress.com/articles/informatica/inf1243","url":"https://dblp.org/rec/journals/informaticaLT/VlahinicBJV19"}, "url":"URL#2019726" }, { "@score":"1", "@id":"2019727", "info":{"authors":{"author":[{"@pid":"37/1304","text":"Ping Wang"},{"@pid":"29/5259-14","text":"Jie Wang 0014"},{"@pid":"54/4528-1","text":"Guiwu Wei 0001"},{"@pid":"212/6856","text":"Cun Wei"},{"@pid":"80/2983","text":"Yu Wei"}]},"title":"The Multi-Attributive Border Approximation Area Comparison (MABAC) for Multiple Attribute Group Decision Making Under 2-Tuple Linguistic Neutrosophic Environment.","venue":"Informatica","volume":"30","number":"4","pages":"799-818","year":"2019","type":"Journal Articles","access":"closed","key":"journals/informaticaLT/WangWWWW19","ee":"https://content.iospress.com/articles/informatica/inf1230","url":"https://dblp.org/rec/journals/informaticaLT/WangWWWW19"}, "url":"URL#2019727" }, { "@score":"1", "@id":"2019728", "info":{"title":"Referees of INFORMATICA Volume 30.","venue":"Informatica","volume":"30","number":"4","pages":"833","year":"2019","type":"Journal Articles","access":"closed","key":"journals/informaticaLT/X19","ee":"https://content.iospress.com/articles/informatica/inf30re","url":"https://dblp.org/rec/journals/informaticaLT/X19"}, "url":"URL#2019728" }, { "@score":"1", "@id":"2019729", "info":{"authors":{"author":[{"@pid":"152/0686","text":"Kaile Zhou"},{"@pid":"44/2639","text":"Shanlin Yang"}]},"title":"Fuzzifier Selection in Fuzzy C-Means from Cluster Size Distribution Perspective.","venue":"Informatica","volume":"30","number":"3","pages":"613-628","year":"2019","type":"Journal Articles","access":"closed","key":"journals/informaticaLT/ZhouY19","ee":"https://content.iospress.com/articles/informatica/inf1224","url":"https://dblp.org/rec/journals/informaticaLT/ZhouY19"}, "url":"URL#2019729" }, { "@score":"1", "@id":"2019730", "info":{"authors":{"author":[{"@pid":"256/7942","text":"Miodrag M. Zizovic"},{"@pid":"256/8059","text":"Miloljub Albijanic"},{"@pid":"256/8118","text":"Verka Jovanovic"},{"@pid":"116/5215","text":"Malisa R. Zizovic"}]},"title":"A New Method of Multi-Criteria Analysis for Evaluation and Decision Making by Dominant Criterion.","venue":"Informatica","volume":"30","number":"4","pages":"819-832","year":"2019","type":"Journal Articles","access":"closed","key":"journals/informaticaLT/ZizovicAJZ19","ee":"https://content.iospress.com/articles/informatica/inf1242","url":"https://dblp.org/rec/journals/informaticaLT/ZizovicAJZ19"}, "url":"URL#2019730" } ] } } } )