


default search action
Soft Computing, Volume 29
Volume 29, Number 1, January 2025
- D. Venkata Subramanian, J. Chandra, V. Ashok Immanuel
, V. Rohini:
KMSBOT: enhancing educational institutions with an AI-powered semantic search engine and graph database. 1-15 - Truong Vinh An, Ngo Van Hoa, Nguyen Trang Thao:
Stabilization of impulsive fuzzy dynamic systems involving Caputo short-memory fractional derivative. 17-36 - Chengbiao Tong, Nariman Sepehri
:
Application of SaRT-SVM algorithm for leakage pattern recognition of hydraulic check valve. 37-51 - Minxiu Yan, Shuyan Li:
Construction of a novel five-dimensional Hamiltonian conservative hyperchaotic system and its application in image encryption. 53-67 - Mahsa Motameni, Farshid Mehrdoust
, Ali Reza Najafi:
European option pricing under a generalized fractional Brownian motion Heston exponential Hull-White model with transaction costs by the Deep Galerkin Method. 69-88 - Rasool Esmaeilyfard
, Zohre Shoaei, Reza Javidan:
A lightweight and efficient model for botnet detection in IoT using stacked ensemble learning. 89-101 - M. Sadra, Mehdi Zaferanieh
, J. Yazdimoghaddam:
Leader-follower green traffic assignment problem with online supervised machine learning solution approach. 103-116 - Mei Yang, Fanjie Fu, Du Ni, Zhi Xiao
:
Enhancing Stock Prediction ability through News Perspective and Deep Learning with attention mechanisms. 117-126 - Wenliang Zhou, Mehdi Oldache
, Guangming Xu:
Cooperative enhancement method of train operation planning featuring express and local modes for urban rail transit lines. 127-155 - Sushmita Sharma, Apu Kumar Saha
, Sanjoy Chakraborty, Suman Deb, Saroj Kumar Sahoo:
Quadratic and Lagrange interpolation-based butterfly optimization algorithm for numerical optimization and engineering design problem. 157-194 - Jun Liu, Yongjian Yang
, Wencan Li, Hua Jiang, Tianwen Guo, Feng Yang:
Benders decomposition for the multi-agent location and scheduling problem on unrelated parallel machines. 195-212 - Sayed Abolghasem Soleimani Bafghi, Hasan Hosseini Nasab, Mohammad Bagher Fakhrzad, Roya Soltani, Alireza Yarahmadi Bafghi:
A multi-objective Fuzzy Robust Optimization model for open-pit mine planning under uncertainty. 213-235 - Minoo Kamrantabar, Saeed Yaghoubi
, Atieh Fander:
A game theoretic approach for pricing of red blood cells under supply and demand uncertainty and government role. 237-260 - Jihe Xiao
, Yuhong Sheng:
The location problem of emergency materials in uncertain environment. 261-273 - Mohammad Reza Ranjbar Divkoti, Mostafa Nouri Baygi:
RCS: a fast path planning algorithm for unmanned aerial vehicles. 275-298 - Kuo-Pao Tsai
, Feng-Chao Yang
, Chin-Lung Lu, Chia-Li Lin
:
Exploring the selected strategies and multiple selected paths for digital music subscription services using the DSA-NRM approach consideration of various stakeholders. 299-320 - Amin Khodaei
, Behzad Mozaffari Tazehkand
, Hadi Sharifi:
A genomic signal processing approach for identification and classification of coronavirus sequences. 321-338 - Shaghayegh Nobakht, Ali-Akbar Ahmadi
:
Secure signal and image transmissions using chaotic synchronization scheme under cyber-attack in the communication channel. 339-353 - Umair Ayub
, Bushra Almas:
ASAQ - Ant-Miner: optimized rule-based classifier. 355-364 - Wei Yao, Chang-Jie Zhou:
Representations of binary relations and object reduction of attribute-oriented concept lattices. 365-373 - Loreta Saunoriene, Jinde Cao, Mantas Landauskas, Minvydas Ragulskis
:
Short-term time series prediction based on evolutionary interpolation of Chebyshev polynomials with internal smoothing. 375-389 - Hany Alashwal
, Nishi Palakkal Kochunni, Kadhim Hayawi
:
Application of machine learning and deep learning techniques on reverse vaccinology - a systematic literature review. 391-403 - Adeel Cheema, M. Asif Naeem
:
CoverGAN: cover photo generation from text story using layout guided GAN. 405-423
Volume 29, Number 2, January 2025
- Guilong Liu
, Xiuwei Gao:
Using covering approaches to study concept lattices. 425-434 - Bashir Nawaz, Kifayat Ullah, Krzysztof Gdawiec
:
Convergence Analysis of a Picard-CR Iteration Process for Nonexpansive Mappings. 435-455 - Ankur Jain
, Joydip Dhar, Vijay K. Gupta:
Dynamical behavior and chaos control of the conflicting information propagation on a homogeneous network system. 457-469 - Arun Kumar
, Bisham Dewan:
Ring structure of rough sets. 471-483 - Yong-Cheng Sun, Jie-Sheng Wang
, Cheng Xing, Yi-Peng Shang-Guan, Xiao-Tian Wang, Song-Bo Zhang:
Bidirectional online sequence extreme learning machine and switching strategy for soft-sensor model of SMB chromatography separation process. 485-507 - Esko Turunen
:
Addition-meet fuzzy relational inequality systems, product-join relational inequality systems and their generalizations. 509-520 - Jirí Mockor:
Unification of methods for new types of fuzzy sets: general approximation spaces with relational morphisms. 521-542 - Zhenxing Ren:
On hierarchical clustering-based identification of PWA model with model structure selection and application to automotive actuators for HiL simulation. 543-558 - Linjie Zhan, Zhenpeng Tang:
Multiscale risk spillover analysis of China's stock market industry: evidence supported by a novel hybrid model based on signal decomposition technology. 559-577 - Talha Arslan
, Sükrü Acitas, Birdal Senoglu:
On the maximization of the likelihood for the generalized gamma distribution: the modified maximum likelihood approach. 579-591 - Mahmood Deypir
, Toktam Zoughi
:
Robust security risk estimation for android apps using nearest neighbor approach and hamming distance. 593-611 - Lihui Niu, Jusheng Mi
, Yuzhang Bai, Zhongling Li, Meizheng Li:
Zoom method for association rules in multi-granularity formal context. 613-627 - Tham Vo, Linh Nguyen Thi My:
A novel approach of multi-channel attention mechanism for long-sequential multivariate time-series prediction problem. 629-644 - Zheng Li, Yanbei Liu, Changqing Zhang, Wanjin Shan, Haifeng Zhang, Xiaoming Zhu:
Trustworthy deep learning for encrypted traffic classification. 645-662 - Huifang Feng
, Rui Yang:
STA-CN-BiGRU: a spatial-temporal attention based ChebNet and BiGRU model for traffic flow prediction. 663-672 - Muhammad Sadiq Amin, Shabir Ahmad, Woong-Kee Loh
:
Federated learning for Healthcare 5.0: a comprehensive survey, taxonomy, challenges, and solutions. 673-700 - Masoud Ahmadipour
, Zaipatimah Ali, Hussein Mohammed Ridha:
Enhancing voltage stability and load shedding optimization through a fusion of gravitational search algorithm and particle swarm optimization with deep learning. 701-721 - Le Wang, Qinqin Fan, Xuefeng Yan
:
A surrogate archive assisted multi-objective evolutionary algorithm under limited computational budget. 723-753 - Suha Mubdir Farhood, Reihaneh Khorsand, Nashwan Jasim Hussein, Mohammadreza Ramezanpour:
A fault-tolerant scheduling strategy through proactive and clustering techniques for scientific workflows in cloud computing. 755-781 - Kamran Yaseen Rajput
, Xiaoping Li, Abdullah Lakhan
:
Spark workflow task scheduling with deadline and privacy constraints in hybrid cloud networks. 783-801 - Yanfeng Wang, Bingqing Xin, Zicheng Wang, Junwei Sun
:
Improved snake optimizer based on forced switching mechanism and variable spiral search for practical applications problems. 803-838 - Zhilong Liu
, Huhai Jiang
:
Period regulated particle swarm optimization algorithm. 839-860 - Adrián Tobar Nicolau
, Jordi Castro
, Claudio Gentile
:
A new mathematical optimization-based method for the m-invariance problem. 861-873 - Krzysztof Michalak
:
Knowledge-based optimization in epidemics prevention. 875-893 - Muhammad Sagheer, Muhammad Asif Jan, Zahir Shah
, Wali Khan Mashwani, Rashida Adeeb Khanum, Meshal Shutaywi:
Enhancing teaching learning based optimization algorithm through group discussion strategy for CEC 2017 benchmark problems. 895-932 - Rishabh Deo Pandey, Itu Snigdh
:
A Fuzzy-Bayesian belief network approach to compute efficiency as a metric for IoT systems. 933-944 - Kadeeja Mole Koyalinte Purakkal, Kalathodi Sameena:
Inverse fuzzy graph colouring and its application. 945-956 - Kartik Saini
, Narendra Kumar, Bharat Bhushan, Rajesh Kumar
:
Nonlinear complex dynamic system identification based on a novel recurrent neural network. 957-976 - Jiajia Liu, Edi Syams Zainudin, Azizan Bin As'arry, Mohd Idris Shah Bin Ismai, Chenglei Zhang
:
Modeling of the blockchain-empowered cloud 4D printing services collaboration digital twin platform oriented on supply-demand. 977-1004 - Bin Xie, Hongmiao Yuan:
Enhancing the combined compromise solution method for group decision-making under intuitionistic fuzziness: an application to blended English teaching quality evaluation in vocational colleges. 1005-1017 - Antonio Maria Rinaldi, Cristiano Russo, Cristian Tommasino:
A semantic approach for cultural heritage ontology matching and integration based on textual and multimedia information. 1019-1034 - Mingtao Wang
, Xin Zhou, Yuanyuan Chen
:
Global vision, local focus: the semantic enhancement transformer network for crowd counting. 1035-1052 - Xing-Yue Zhang, Jie-Sheng Wang
, Jun-Hua Zhu, Yin-Yin Bao, Yue Zheng, Wen-Kuo Hao:
Nonlinear convergence factor-based manta ray foraging optimization algorithm for combined economic emission dispatch problem. 1053-1089 - Shikha Gupta, Neetu Sharma:
A novel cluster based reliable security enhancement in FANET directed by game theory. 1091-1106 - P. Dhanasekaran
, S. Kalidasan:
A distance based similarity measure on trapezoidal intuitionistic fuzzy numbers and its applications. 1107-1119 - Ruiyou Li
, Yong Zhang, Guang Li, Ruiheng Li, Jia Hu, Min Li:
Fast resistivity imaging of transient electromagnetic using an extreme learning machine. 1121-1131 - Peng Qin
, Chunmei Cheng, Huaizhi Su:
A GA-FGM-RTA combined model for predicting seawall settlement in under insufficient data volume. 1133-1146 - Mohammad Reza Chalak Qazani
, Moosa Sajed, Siamak Pedrammehr, Seyed Mohammad Hossein Seyedkashi:
Mechanical properties estimation of multi-layer friction stir plug welded aluminium plates using time-series neural network models. 1147-1168 - He-Yau Kang
, Amy H. I. Lee
:
A genetic-based approach for vehicle routing problem with fuzzy alpha-cut constraints. 1169-1189 - Pranab Sahoo
, Sriparna Saha, Saksham Kumar Sharma, Samrat Mondal:
Boosting cervical cancer detection with a multi-stage architecture and complementary information fusion. 1191-1206 - Chuanmeng Sun
, Jiaxin Chen, Yong Li, Yu Wang, Tiehua Ma:
Channel pruning method driven by similarity of feature extraction capability. 1207-1226 - Marco Moran-Armenta, Carlos Aguilar-Avelar
, Isaac Gandarilla
, Marlen Meza-Sánchez
, Javier Moreno-Valenzuela
:
Solving trajectory tracking of robot manipulators via PID control with neural network compensation. 1227-1241 - Meysam Jahani, Zahra Zojaji
, Fatemeh Raji:
Enhancing demand forecasting through combination of anomaly detection and continuous improvement. 1243-1258 - Saleh Momeni, Bagher BabaAli:
Free-text keystroke authentication using transformers: a comparative study of architectures and loss functions. 1259-1272
Volume 29, Number 3, February 2025
- Minxia Luo
, Jianlei Gao, Wenling Li:
Some new construction methods of similarity measure on picture fuzzy sets. 1273-1287 - Yi-Xuan Li, Jie-Sheng Wang
, Si-Wen Zhang, Shi-Hui Zhang, Xin-Yi Guan, Xin-Ru Ma:
Arithmetic optimization algorithm with cosine transform-based two-dimensional composite chaotic mapping. 1289-1329 - Uranus Kazemi, Seyfollah Soleimani:
A new approach data processing: density-based spatial clustering of applications with noise (DBSCAN) clustering using game-theory. 1331-1346 - Wadhah Al-Sadi, Zhouchao Wei, Irene M. Moroz, Omar Abu Arqub, Tariq Q. S. Abdullah
:
Predictor-corrector approach for the numerical solution of fuzzy fractional differential equations and linear multiterm fuzzy fractional equations. 1347-1368 - Boao Kong, Huiwen Wang, Shan Lu
:
Variable selection of multiple types of data: a PLS approach. 1369-1387 - Eda Gizem Koçyigit
:
Using past sample means in exponential ratio and regression type estimators under a simple random sampling. 1389-1406 - Martina Luzzi, Francesca Guerriero, Marco Maratea, Gianluigi Greco, Marco Garofalo:
Chatgpt and operations research: evaluation on the shortest path problem. 1407-1418 - Yanming Liu, Jinglei Liu
:
Leveraging variant of CAE with sparse convolutional embedding and two-stage application-driven data augmentation for image clustering. 1419-1435 - Mohammad Saidi, Mohammad Gheibi, Adel Ghazikhani
, Aynaz Lotfata, Benyamin Chahkandi, Sajad Familsamavati, Kourosh Behzadian
:
Efficient COVID-19 detection using data mining algorithms: a comparison of basic and hybrid approaches. 1437-1451 - Zhixiang Chen, Wenya Shi, Jiuzhen Liang
, Hao Liu:
Low-rank decomposition optimization and its application in fabric defects. 1453-1472 - R. Anusha, R. Saravanan:
Revolutionizing signature scheme: the enhanced Edward Elgamal extreme performance accumulate signature approach for IoT and blockchain applications. 1473-1496 - Zhen-Wen Cheng, Xiu-Bo Chen, Gang Xu, Yan Chang, Li-Hua Miao, Yi-Xian Yang, Ya-Lan Wang:
A secure quantum homomorphic encryption ciphertext retrieval scheme. 1497-1509 - Minakshi Punam Mandal, Claudia Archetti:
Decomposition matheuristics for last mile delivery using public transportation systems. 1511-1539 - Sumangala Bhavikatti
, Satish S. Bhairannawar
:
Efficient reconfigurable architecture to extract image features for face recognition using local binary pattern. 1541-1552 - Vittorio Latorre
:
A hybrid genetic search based approach for the generalized vehicle routing problem. 1553-1566 - Farzaneh Rajaee Abyaneh, Nasrollah Moghadam Charkari, Mehdy Roayaei:
A community-based simulated annealing approach with a new structure-based neighborhood search to identify influential nodes in social networks. 1567-1585 - Heng Xia, Jian Tang, Wen Yu:
Using deep forest regression and multi-layer state transition algorithm to soft measuring modeling with small sample data. 1587-1603 - Lorenzo Porcelli
, Massimo Ficco
, Gianni D'Angelo
, Francesco Palmieri
:
Context-aware coverage path planning for a swarm of UAVs using mobile ground stations for battery-swapping. 1605-1625 - Abhishek Chauhan, Sumati Mahajan:
On goal programming approach for interval-valued intuitionistic fuzzy multi-objective transportation problems with an application to tourism industry. 1627-1657 - Murugan Esakkimuthu, Sivaprakash Gunniya Rameshbabu:
Paw decompositions of diamond and some edge cycle graphs. 1659-1665 - Ebrahim Sahafizadeh
, Saeed Talatian Azad
:
A micro-level approach for modeling rumor propagation in online social networks. 1667-1675 - Ahmadi Hasan, Ahmad Kamal
, Pawan Kumar:
k-InfNode: ranking top-k influential nodes in complex networks with random walk. 1677-1690 - Erdal Bayram
, Melisa Dervisoglu:
Lacunary statistical soft convergence in soft topology. 1691-1701 - Jie Xiao, Yu Zhang:
Enhanced TOPSIS-CoCoSo framework for multi-attribute decision-making with triangular fuzzy neutrosophic sets: "effect evaluation of intelligent technology empowering physical education teaching" case. 1703-1717 - Sumita Gupta, Sapna Gambhir, Mohit Gambhir, Rana Majumdar
, Avinash K. Shrivastava
, Hoang Pham:
A deep learning approach to analyse stress by using voice and body posture. 1719-1745 - Na Lu, Zhongliang Li, Dong Liu, Chaofan Cao, Shuangyun Jiang, Xudong Chen, Peng Wang:
A feature extraction method for rotating machinery fault diagnosis based on a multiscale entropy fusion strategy and GA-RL-LDA model. 1747-1765 - Mohammad Prawesh Alam, Arshad Khan:
An efficient collocation algorithm for third order non-linear Emden-Fowler equation. 1767-1788 - HongGuang Zhang
, Shengwen Ma, Xiang Li, MingCan You, YuXuan Tao:
Forest fire rescue framework to jointly optimize firefighting force configuration and facility layout: a case study of digital-twin simulation optimization. 1789-1810 - Maryam Vatanara, Masoud Rabbani
, Jafar Heydari:
A game-theoretic exploration with surplus profit-sharing in a three-channel supply chain, featuring e-commerce dynamics. 1811-1827 - Avinash Trivedi, S. Sangeetha:
Enhancing neural network predictions with finetuned numeric embeddings for stock trend forecasting. 1829-1844 - Hossam Magdy Balaha
, Asmaa El-Sayed Hassan, Rawan Ayman Ahmed, Magdy Hassan Balaha:
Comprehensive multimodal approach for Parkinson's disease classification using artificial intelligence: insights and model explainability. 1845-1877 - Sheikh Burhan Ul Haque
, Aasim Zafar, Sheikh Riyaz Ul Haq, Sheikh Moeen Ul Haque, Mohassin Ahmad
, Khushnaseeb Roshan:
Threats to medical diagnosis systems: analyzing targeted adversarial attacks in deep learning-based COVID-19 diagnosis. 1879-1896 - Yaoyao Yan, Fang'ai Liu, Kenan Liu, Weizhi Xu, Xuqiang Zhuang:
Label-specific multi-label text classification based on dynamic graph convolutional networks. 1897-1909 - Mohamed Hosny
, Fahmy S. Abdelhaleem, Ahmed M. Elshenhab, Amir Ibrahim:
Prediction of discharge coefficient of submerged gates using a stacking ensemble model. 1911-1929 - Yee-Ming Ooi, Che-Cheng Chang
:
Improving recurrent deterministic policy gradient strategy in autonomous driving. 1931-1946
Volume 29, Number 4, February 2025
- Fujun Ji
, Jidong Jin:
A map-reduce algorithm to find strongly connected components of directed graphs. 1947-1966 - Debojyoti Sarkar, Anupam Biswas:
Complex preference analysis: a score-based evaluation strategy for ranking and comparison of the evolutionary algorithms. 1967-1980 - Majid Abdolrazzagh-Nezhad
, Mahdi Kherad
:
Weighted rank aggregation based on ranker accuracies for feature selection. 1981-2001 - Te Li, Liqiong Chen, Huaiying Sun, Mengxia Hou, Yunjie Lei, Kaiwen Zhi:
Exploring diversity and time-aware recommendations: an LSTM-DNN model with novel bidirectional dynamic time warping algorithm. 2003-2013 - M. Indrasena Reddy, A. P. Siva Kumar, K. Subba Reddy:
Cyber-attack detection based on a deep chaotic invasive weed kernel optimized machine learning classifier in cloud computing. 2015-2030 - You-Jin Park
, Chung-Kang Ma:
A novel instance density-based hybrid resampling for imbalanced classification problems. 2031-2045 - Fatemeh Nikkhoo, Ali Husseinzadeh Kashan
, Ehsan Nikbakhsh, Bakhtiar Ostadi:
A bi-objective multi-warehouse multi-period order picking system under uncertainty: a benders decomposition approach. 2047-2074 - Yaping Xiao, Linfeng Niu, Qiqi Li:
A two-population artificial tree algorithm based on adaptive updating strategy for dominant populations. 2075-2106 - Qihuan Wu, Xiaoming You, Sheng Liu:
Multi-ant colony algorithm based on the Stackelberg game and incremental learning. 2107-2128 - Alessia Ciacco
, Francesca Guerriero, Giusy Macrina:
Review of quantum algorithms for medicine, finance and logistics. 2129-2170 - M. Chitra Devi, T. Dhiliphan Rajkumar:
A novel attention based deep learning model for software defect prediction with bidirectional word embedding system. 2171-2188 - Abdelhakim Baouya
, Brahim Hamid
, Levent Gürgen, Saddek Bensalem
:
Modeling and analysis of data corruption attacks and energy consumption effects on edge servers using concurrent stochastic games. 2189-2214 - Feng Yang, Yuefang Wu, Yi Li:
Enhanced TODIM-TOPSIS framework for design quality evaluation for college smart sports venues under hesitant fuzzy sets. 2215-2227 - Hamid El Bourakkadi
, Abdelhakim Chemlal, Hassan Tabti, Mourad Kattass, Abdellatif Jarjar, Abdelhamid Benazzi:
New Vigenere method with pseudo-random affine functions for color image encryption. 2229-2245 - Anvita Nandan, Itu Snigdh:
Adopting fuzzy multi-criteria decision-making ranking approach ensuring connected topology in industrial wireless sensor networks. 2247-2261 - Amit Kumar Trivedi, Tripti Mahajan, Tanmay Maheshwari, Rajesh Mehta
, Shailendra Tiwari:
Leveraging feature fusion ensemble of VGG16 and ResNet-50 for automated potato leaf abnormality detection in precision agriculture. 2263-2277 - Chun-Tao Chang, Mei-Chuan Cheng
, Liang-Yuh Ouyang:
Deteriorating inventory model with advance-cash-credit payment schemes and partial backlogging. 2279-2295 - Peng Su
, Keyong Zhang, Honghua Shi:
Reliability analysis of discrete-time multi-state star configuration power grid systems with performance sharing. 2297-2310 - Duc-Hung Pham, Tuan-Tu Huynh, Chih-Min Lin
, Van-Nam Giap, Van-Phong Vu:
Secure transmission of medical image using a wavelet interval type-2 TSK fuzzy brain-imitated neural network. 2311-2329 - Yanxia Shi, Yanrong Liu, Yaru Liu:
Enhanced single shot detector for small object detection in drone-capture scenarios. 2331-2341 - Mohamed Hosny
, Mohamed A. Naeem, Minwei Zhu, Wenpeng Gao, Ahmed M. Elshenhab, Yili Fu:
A deep learning-based model for automated STN localization using local field potentials in Parkinson's disease. 2343-2362 - Xinjie Deng
, Michael Shi, Burhan Khan, Yit Hong Choo, Fazal Ghaffar, Chee Peng Lim:
A lightweight CNN model for UAV-based image classification. 2363-2378 - Shunxiang Zhang, Zichen Ma, Hanchen Li, Yunduo Liu, Lei Chen, Kuan-Ching Li:
Gender opposition recognition method fusing emojis and multi-features in Chinese speech. 2379-2390 - (Withdrawn) RETRACTED ARTICLE: Near-infrared and visible light face recognition: a comprehensive survey. 2391
- Retraction Note: Classification of noiseless corneal image using capsule networks. 2393
- Retraction Note: Enhancing performance of cell formation problem using hybrid efficient swarm optimization. 2395
- Retraction Note: IADF security: insider attack detection using fuzzy logic in wireless multimedia sensor networks. 2397
Volume 29, Number 5, March 2025
- Leelavathi Arepalli, K. Venkata Rao, Madhavi Dabbiru:
Channel boosted convolutional neural network with segnet based segmentation for an automatic prediction of thyroid cancer. 2399-2415 - Natalie Ferraz Silva Bravo, André Ferreira Martins, Thales Brito de Souza Fonseca Rodrigues, Marcelo Machado, Heder Soares Bernardino, Alex Borges Vieira, Helio José Corrêa Barbosa, Jairo Francisco de Souza:
Improving learning material repositories using student profiles. 2417-2431 - P. Geetha, Satyasai Jagannath Nanda, Rajendra Prasad Yadav:
Multi-objective DOA estimation in automotive radar using a Sailfish optimizer with Latin hypercube sampling. 2433-2461 - P. Geetha, Satyasai Jagannath Nanda, Rajendra Prasad Yadav:
Correction to: Multi-objective DOA estimation in automotive radar using a Sailfish optimizer with Latin hypercube sampling. 2463 - Samayveer Singh, Aridaman Singh Nandan, Geeta Sikka, Aruna Malik, Pradeep Kumar Singh:
Genetic algorithm based data controlling method using IoT enabled WSNs. 2465-2482 - Ladislav Zjavka:
Photovoltaic power one-day and multistep-hourly AI predictions using node-by-node evolved binomial tree structures to form L-transformed PDE modules. 2483-2495 - Jinaga Tulasiram, Balaji Banothu, S. Nickolas:
Monkeypox data enhancement and diagnosis using improved DCGAN. 2497-2513 - Jun Wang, Dongxu Luo, Weiru Chen, Funan Peng, Zhiwu Li:
Correction to: Deployment method of wireless sensor networks based on MaOEA/P-GM algorithm. 2515

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.