


default search action
Soft Computing, Volume 26
Volume 26, Number 1, January 2022
- Thomas A. Runkler
:
PIU: risk-sensitive decision making using Pareto optimization of interval utilities induced by fuzzy preference relations. 1-11 - Xiaoli Jiang
, Li Yang, Siqi Liu, Mingyue Liu:
Consensus control protocol for stochastic multiagents with predictors. 13-24 - Zia Bashir
, Mobashir Iqbal:
The unbounded fuzzy norm convergence in fuzzy Banach lattices. 25-31 - Haiyan Shi
, Chun Wei, Zhiqiang Zhang
, Baoliang Liu
, Yanqing Wen:
Reliability analysis of dependent competitive failure model with uncertain parameters. 33-43 - Talat Körpinar, Yasin Ünlütürk:
A new version of bienergies and biangles for curves framed by extended darboux frame. 45-54 - Mohsen Rezvani
, Mojtaba Rezvani:
Truss decomposition using triangle graphs. 55-68 - Zhigang Lu
, Shengjing Qi, Jiangfeng Zhang, Yao Cai, Xiaoqiang Guo, Shifan Luo:
An improved multi-objective bacterial colony chemotaxis algorithm based on Pareto dominance. 69-87 - Ivan Chajda, Helmut Länger
:
Sheffer operation in relational systems. 89-97 - Khatereh Ghasemi, Javad Jamalzadeh
:
Hypernormed entropy on topological hypernormed hypergroups. 99-104 - Qingzhao Kong, Weihua Xu
, Dongxiao Zhang
:
A comparative study of different granular structures induced from the information systems. 105-122 - A. S. Joseph Charles
, P. Kalavathi:
A reliable link quality-based RPL routing for Internet of Things. 123-135 - Rashid Mehmood, Muhammad Hisyam Lee
, Muhammad Rizwan Iqbal, Sajdah Hassan:
New robust location control charts for unknown process distribution with practical significance. 137-153 - Fatma Salama
:
Computing total edge irregularity strength for heptagonal snake graph and related graphs. 155-164 - Thieu N. Vo, Mohsen Razzaghi
, Phan Thanh Toan:
Fractional-order generalized Taylor wavelet method for systems of nonlinear fractional differential equations with application to human respiratory syncytial virus infection. 165-173 - K. J. Prasanna Venkatesan, S. Shanmughavel:
Attack detection and securer data transmission in cognitive radio networks using BMHHO-ENN and SHA2-RSA. 175-187 - Xixi Yao, Fengqian Ding, Luo Chao:
Time series prediction based on high-order intuitionistic fuzzy cognitive maps with variational mode decomposition. 189-201 - Shokoofeh Ghorbani
:
Tense operators on frameable equality algebras. 203-213 - Mohammed Atef
, Ahmed Mostafa Khalil, Sheng-Gang Li, Abdelfatah Azzam, Heng Liu
, Abd El Fattah El Atik
:
Comparison of twelve types of rough approximations based on j-neighborhood space and j-adhesion neighborhood space. 215-236 - Siqi Wang, Guiwu Wei
, Jianping Lu, Jiang Wu, Cun Wei, Xudong Chen:
GRP and CRITIC method for probabilistic uncertain linguistic MAGDM and its application to site selection of hospital constructions. 237-251 - Abdullah Yildizbasi
, Yagmur Arioz:
Green supplier selection in new era for sustainability: A novel method for integrating big data analytics and a hybrid fuzzy multi-criteria decision making. 253-270 - Narmada Ranarahu, J. K. Dash:
Computation of multi-objective two-stage fuzzy probabilistic programming problem. 271-282 - Hsien-Chung Wu:
Inner product of fuzzy vectors. 283-307 - Zia Bashir
, Abdul Wahab, Tabasam Rashid
:
Three-way decision with conflict analysis approach in the framework of fuzzy set theory. 309-326 - Ali Ebrahimnejad
, Madjid Tavana
, Vincent Charles
:
Analytics under uncertainty: a novel method for solving linear programming problems with trapezoidal fuzzy variables. 327-347 - Karthik Chinnasamy
, Gnaneswaran Nagamani
, Ramasamy Subramaniyam, Dafik
:
Robust stabilization of T-S fuzzy systems via improved integral inequality. 349-360 - Wei Zhan
, Chenfan Sun, Maocai Wang, Jinhui She, Yangyang Zhang, Zhiliang Zhang
, Yong Sun:
An improved Yolov5 real-time detection method for small objects captured by UAV. 361-373 - Navid Feroze
, Muhammad Aslam:
Bayesian analysis of left-censored data using Weibull mixture model. 375-394 - Nazmiye Eligüzel
, Cihan Çetinkaya
, Türkay Dereli
:
Application of named entity recognition on tweets during earthquake disaster: a deep learning-based approach. 395-421 - Rajendra Kumar Roul
:
Impact of multilayer ELM feature mapping technique on supervised and semi-supervised learning algorithms. 423-437 - M. Boudaghi, Farnaz Mahan
, Ayaz Isazadeh:
Using BTA Algorithm for finding Nash equilibrium problem aiming the extraction of rules in rule learning. 439-462 - Sudeshna Devnath
, Pravash Kumar Giri, Seema Sarkar Mondal, Manoranjan Maiti:
Correction to: Multi-item two-stage fixed-charge 4DTP with hybrid random type-2 fuzzy variable. 463
Volume 26, Number 2, January 2022
- Morteza Kimiaei
, Arnold Neumaier:
A new limited memory method for unconstrained nonlinear least squares. 465-490 - Gejza Jenca
:
Orthomodular posets are algebras over bounded posets with involution. 491-498 - Muhammad Irfan Ali
, Mostafa K. El-Bably
, El-Sayed A. Abo-Tabl
:
Topological approach to generalized soft rough sets via near concepts. 499-509 - Xiaohui Li, Lili Zhou
, Fei Tan:
An image encryption scheme based on finite-time cluster synchronization of two-layer complex dynamic networks. 511-525 - Harshita Tiwari, Rekha Srivastava:
On coreflective hulls in Str-Q-TOP. 527-534 - S. V. Tchoffo Foka
, Marcel Tonga:
Rings and residuated lattices whose fuzzy ideals form a Boolean algebra. 535-539 - A. A. Bahredar
, Nader Kouhestani, H. Passandideh:
The fundamental group of soft topological spaces. 541-552 - Ahmad Deeb
, Rafik Belarbi
:
Reducing rational polynomial: a proposition of a strategy to deal with floating point numbers using singular value decomposition. 553-573 - Kezban Albayrak:
A hybrid fuzzy decision making approach for sitting a solid waste energy production plant. 575-587 - Ritu Raj, B. M. Mohan, Dong-Eun Lee, Jung-Min Yang
:
Derivation and structural analysis of a three-input interval type-2 TS fuzzy PID controller. 589-603 - Rasha M. Abo-Bakr, N. A. Mohamed, S. A. Mohamed:
Meta-heuristic algorithms for solving nonlinear differential equations based on multivariate Bernstein polynomials. 605-619 - (Withdrawn) Cognitive linear discriminant regression computing technique for HTTP video services in SDN networks. 621-633
- Yin Zhuang, Zhen Liu, Tingting Liu, Chih-Chieh Hung
, Yan-Jie Chai:
Implicit sentiment analysis based on multi-feature neural network model. 635-644 - (Withdrawn) India perspective: CNN-LSTM hybrid deep learning model-based COVID-19 prediction and current status of medical resource availability. 645-664
- Cristian Cuerda, Alejandro Zornoza
, José A. Gallud
, Ricardo Tesoriero, Dulce Romero-Ayuso
:
Deep learning assisted cognitive diagnosis for the D-Riska application. 665-676 - Tham Vo
:
An integrated fuzzy neural network with topic-aware auto-encoding for sentiment analysis. 677-693 - Anqin Zhang
, Qizheng Liu, Ting Zhang
:
Spatial-temporal attention fusion for traffic speed prediction. 695-707 - Muhammed Emre Keskin
, Chefi Triki
:
On the periodic hierarchical Chinese postman problem. 709-724 - Qiang Long
, Guoquan Li, Lin Jiang:
A novel solver for multi-objective optimization: dynamic non-dominated sorting genetic algorithm (DNSGA). 725-747 - Giovanni Capobianco, Ciriaco D'Ambrosio
, Luigi Pavone, Andrea Raiconi
, Gaetano Vitale
, Fabio Sebastiano:
A hybrid metaheuristic for the Knapsack Problem with Forfeits. 749-762 - Binghai Zhou
, Wenfei Zha, Lyujiangnan Ye, Zhaoxu He:
A dynamic material handling scheduling method based on elite opposition learning self-adaptive differential evolution-based extreme learning machine (EOADE-ELM) and knowledge base (KB) for line-integrated supermarkets. 763-785 - Li Yan, Zheng Pei:
A novel linguistic decision-making method based on the voting model for large-scale linguistic decision making. 787-806 - Mohammad Kazemi
, Ahmad Sadegheih, Mohammad Mahdi Lotfi, Mohammad Ali Vahdat-Zad:
Developing a bi-objective schedule for an online cellular manufacturing system in an MTO environment. 807-828 - Lilong Zhu
, Bingjie Lu:
Product quality control strategy of dual distribution channel structure in three-echelon supply chain. 829-840 - Jiawen Song
, Meihua Xiao, Tong Zhang, Haoyang Zhou:
Proving authentication property of PUF-based mutual authentication protocol based on logic of events. 841-852 - Shunxiang Zhang
, Hanqing Xu, Guangli Zhu, Xiang Chen, Kuan-Ching Li
:
A data processing method based on sequence labeling and syntactic analysis for extracting new sentiment words from product reviews. 853-866 - Jorge Morales, Wen Yu
, Luciano Telesca:
Bayesian inference for data-driven training with application to seismic parameter prediction. 867-876 - Santosh Kumar Yadav
, Kamlesh Tiwari, Hari Mohan Pandey
, Ali Akbar Shaikh:
Skeleton-based human activity recognition using ConvLSTM and guided feature learning. 877-890 - Soulib Ghosh, Khalid Hassan Sheikh, Hussain Ali Khan, Ankur Manna, Showmik Bhowmik
, Ram Sarkar
:
Application of texture-based features for text non-text classification in printed document images with novel feature selection algorithm. 891-909 - Sarita Gajbhiye Meshram
, Chandrashekhar Meshram, Fateme Akhoni Pourhosseini, Mohd Abul Hasan
, Saiful Islam
:
A Multi-Layer Perceptron (MLP)-Fire Fly Algorithm (FFA)-based model for sediment prediction. 911-920
Volume 26, Number 3, February 2022
- Mijanur Rahaman Seikh
, Shibaji Dutta
:
Solution of matrix games with payoffs of single-valued trapezoidal neutrosophic numbers. 921-936 - Jin Liu, Yifei Hao
:
Crank-Nicolson method for solving uncertain heat equation. 937-945 - V. Juliet Rani, K. K. Thanammal:
STFTSM: noise reduction using soft threshold-based fuzzy trimmed switch median filter. 947-960 - Hong Su
, Bing Guo, Jun Yu Lu, Xinhua Suo:
Cross-chain exchange by transaction dependence with conditional transaction method. 961-976 - Faryal Nosheen, Usman Qamar
, Muhammad Summair Raza:
Redefining preliminaries of dominance-based rough set approach. 977-1002 - Yogesh Kumar
, Surbhi Gupta, Williamjeet Singh:
A novel deep transfer learning models for recognition of birds sounds in different environment. 1003-1023 - Yuncai Yu, Xinsheng Liu
, Yu Zhang, Zhifu Jia:
On the complete convergence for uncertain random variables. 1025-1031 - Syed Zaheer Abbas
, Muhammad Waqas
, Adel Thaljaoui
, M. Zubair, Anis Riahi, Y. M. Chu, Waqar Azeem Khan:
Modeling and analysis of unsteady second-grade nanofluid flow subject to mixed convection and thermal radiation. 1033-1042 - Mei Lu
, Li Zhang
, Fanzhang Li:
Adaptively local consistent concept factorization for multi-view clustering. 1043-1055 - R. Murugan
, Parthapratim Roy:
MicroNet: microaneurysm detection in retinal fundus images using convolutional neural network. 1057-1066 - Shaoxia Zhang
, Deyu Li, Yanhui Zhai:
Incremental method of generating decision implication canonical basis. 1067-1083 - Xiao Long Xin:
Pseudo-EQ-algebras. 1085-1099 - Kavitha Koppula
, Babushri Srinivas Kedukodi
, Syam Prasad Kuncham:
Generalization and ranking of fuzzy numbers by relative preference relation. 1101-1122 - Ali Mohammad Alqudah
, Amin Alqudah
:
Deep learning for single-lead ECG beat arrhythmia-type detection using novel iris spectrogram representation. 1123-1139 - Jie Liu
:
Importance-SMOTE: a synthetic minority oversampling method for noisy imbalanced data. 1141-1163 - Samet Memis
, Serdar Enginoglu
, Ugur Erkan
:
A classification method in machine learning based on soft decision-making via fuzzy parameterized fuzzy soft matrices. 1165-1180 - Hiroshi Ohno:
Training data augmentation using generative models with statistical guarantees for materials informatics. 1181-1196 - Anupama Kaushik, Prabhjot Kaur
, Nisha Choudhary, Priyanka:
Stacking regularization in analogy-based software effort estimation. 1197-1216 - Yang Ma, Yan Li, Xingxing Liang, Guangquan Cheng, Yanghe Feng, Zhong Liu:
Graph autoencoder for directed weighted network. 1217-1230 - Nidhi Goel
, Samarjeet Kaur
, Deepak Gunjan, S. J. Mahapatra:
Dilated CNN for abnormality detection in wireless capsule endoscopy images. 1231-1247 - Xuanhui Yan
, Lifei Chen
, Gongde Guo:
Kernel-based data transformation model for nonlinear classification of symbolic data. 1249-1259 - Tanmoy Banerjee, Amiya Biswas
, Ali Akbar Shaikh
, Asoke Kumar Bhunia
:
An application of extended NSGA-II in interval valued multi-objective scheduling problem of crews. 1261-1278 - Iraj Naruei
, Farshid Keynia
, Amir Sabbagh Molahosseini:
Hunter-prey optimization: algorithm and applications. 1279-1314 - Soheila Ghambari
, Hojjat Rakhshani, Julien Lepagnot, Laetitia Jourdan
, Lhassane Idoumghar:
Unbalanced budget distribution for automatic algorithm configuration. 1315-1330 - Behnam Mohammad Hasani Zade, Najme Mansouri:
PPO: a new nature-inspired metaheuristic algorithm based on predation for optimization. 1331-1402 - Amr G. Mansour, Mohamed S. Eid
, Emad E. Elbeltagi:
Construction facilities location selection for urban linear infrastructure maintenance projects using uniform cost search method. 1403-1415 - Mahmoud Behzadianfar, Alireza Eydi, Mahmoud Shahrokhi:
A sustainable closed loop supply chain design problem in intuitionistic fuzzy environment for dairy products. 1417-1435 - N. Sivarami Reddy
, D. V. Ramamurthy, M. Padma Lalitha
, K. Prahlada Rao:
Minimizing the total completion time on a multi-machine FMS using flower pollination algorithm. 1437-1458 - Mehdi Zangeneh
, Ebrahim Aghajari
, Mehdi Forouzanfar
:
Design and implementation of an intelligent multi-input multi-output Sugeno fuzzy logic controller for managing energy resources in a hybrid renewable energy power system based on Arduino boards. 1459-1473 - Saeed Nezamivand Chegini
, Pouriya Amini, Bahman Ahmadi
, Ahmad Bagheri
, Illia Amirmostofian
:
Intelligent bearing fault diagnosis using swarm decomposition method and new hybrid particle swarm optimization algorithm. 1475-1497 - (Withdrawn) A user preference tree based personalized route recommendation system for constraint tourism and travel. 1499
Volume 26, Number 4, February 2022
- Xiu-Long Yi
, Rong Hua
, You Fu, Dulei Zheng, Zhi-Yu Wang:
RNIC-A retrospect network for image captioning. 1501-1507 - Shailendra Singh
, S. P. Tiwari:
On unification of categories of fuzzy automata as Qua category. 1509-1529 - Rajab Ali Borzooei
, R. Almallah:
Inverse fuzzy multigraphs and planarity with application in decision-making. 1531-1539 - Hozan K. Hamarashid, Soran A. M. Saeed, Tarik A. Rashid
:
A comprehensive review and evaluation on text predictive and entertainment systems. 1541-1562 - Lenin Kanagasabai
:
Opposition-based chaotic Henry's law-soluble gas, hybridization of chelonioidea with anthoathecata and vaporization of liquid optimization algorithms for power loss diminution. 1563-1585 - Bijon Biswas, Sukhendu Kar
, Malay K. Sen:
Subgraph of generalized co-maximal graph of commutative rings. 1587-1596 - Nepoleon Keisham, Arambam Neelima
:
Efficient content-based image retrieval using deep search and rescue algorithm. 1597-1616 - (Withdrawn) Distance education tool selection using novel spherical fuzzy AHP EDAS. 1617-1635
- Muhammad Qiyas
, Saleem Abdullah, Ronnason Chinram
, Muneeza:
A novel approach on decision support system based on triangular linguistic cubic fuzzy Dombi aggregation operators. 1637-1669 - Selami Bayeg
, Raziye Mert, Ömer Akin, Tahir Khaniyev:
On a type-2 fuzzy approach to solution of second-order initial value problem. 1671-1683 - Jie Liu
, Huaiqin Wu:
Global fixed-time synchronization for coupled time-varying delayed neural networks with multi-weights and uncertain couplings via periodically semi-intermittent adaptive control. 1685-1702 - Zhe Liu
, Ying Yang:
Swaption pricing problem in uncertain financial market. 1703-1710 - Gangqiang Zhang, Yan Song, Shimin Liao, Liangdong Qu, Zhaowen Li:
Uncertainty measurement for a three heterogeneous information system and its application in feature selection. 1711-1725 - Cheng-Hsing Yang, Chi-Yao Weng
, Jian-Yu Chen:
High-fidelity reversible data hiding in encrypted image based on difference-preserving encryption. 1727-1742 - Redouan Lahmyed
, Mohamed El Ansari
, Zakaria Kerkaou:
Automatic road sign detection and recognition based on neural network. 1743-1764 - Yanru Wang, Shifei Ding, Lijuan Wang, Shuying Du:
A manifold p-spectral clustering with sparrow search algorithm. 1765-1777 - Gianni D'Angelo, Francesco Palmieri, Antonio Robustelli
:
Artificial neural networks for resources optimization in energetic environment. 1779-1792 - Yekini Shehu
, Qiao-Li Dong, Ziyue Hu, Jen-Chih Yao:
Relaxed inertial fixed point method for infinite family of averaged quasi-nonexpansive mapping with applications to sparse signal recovery. 1793-1809 - Salam Salameh Shreem
, Hamza Turabieh
, Sana Al Azwari
, Faiz Baothman:
Enhanced binary genetic algorithm as a feature selection to predict student performance. 1811-1823 - Sina Nayeri, Reza Tavakkoli-Moghaddam
, Zeinab Sazvar, Jafar Heydari:
A heuristic-based simulated annealing algorithm for the scheduling of relief teams in natural disasters. 1825-1843 - Murat Erhan Çimen
, Yaprak Yalçin:
A novel hybrid firefly-whale optimization algorithm and its application to optimization of MPC parameters. 1845-1872 - Lenin Kanagasabai
:
Belleville Washer Search and enhanced Papilionoidea Optimization Algorithms for real power loss reduction. 1873-1887 - Giovanni Iacca
, Vinícius Veloso de Melo
:
Cluster-centroid-based mutation strategies for Differential Evolution. 1889-1921 - Libao Deng
, Chunlei Li
, Haili Sun, Liyan Qiao, Xiaodong Miao
:
Dual mutations collaboration mechanism with elites guiding and inferiors eliminating techniques for differential evolution. 1923-1940 - Sepideh Mohammadi, Behrooz Alizadeh
, Fahimeh Baroughi, Esmaeil Afrashteh
:
A modified directional bat algorithm for extensive inverse p-facility maxian location problems on networks. 1941-1959 - Sepideh Azadbakhsh, Ali Ghodratnama
, Reza Tavakkoli-Moghaddam:
Solving a new bi-objective multi-echelon supply chain problem with a Jackson open-network issue under uncertainty. 1961-2007 - Nguyen Xuan Thao
, Shuo-Yan Chou:
Novel similarity measures, entropy of intuitionistic fuzzy sets and their application in software quality evaluation. 2009-2020 - Alptekin Ulutas
, Ayse Topal:
A new hybrid model based on rough step-wise weight assessment ratio analysis for third-party logistics selection. 2021-2032