Using covering approaches to study concept lattices Guilong LiuXiuwei Gao Foundation, algebraic, and analytical methods in soft computing 07 February 2025 Pages: 425 - 434
Convergence Analysis of a Picard–CR Iteration Process for Nonexpansive Mappings Bashir NawazKifayat UllahKrzysztof Gdawiec Foundation, algebraic, and analytical methods in soft computing 08 February 2025 Pages: 435 - 455
Dynamical behavior and chaos control of the conflicting information propagation on a homogeneous network system Ankur JainJoydip DharVijay K. Gupta Foundation, algebraic, and analytical methods in soft computing 07 February 2025 Pages: 457 - 469
Ring structure of rough sets Arun KumarBisham Dewan Foundation, algebraic, and analytical methods in soft computing 07 February 2025 Pages: 471 - 483
Bidirectional online sequence extreme learning machine and switching strategy for soft-sensor model of SMB chromatography separation process Yong-Cheng SunJie-Sheng WangSong-Bo Zhang Foundation, algebraic, and analytical methods in soft computing 07 February 2025 Pages: 485 - 507
Addition-meet fuzzy relational inequality systems, product-join relational inequality systems and their generalizations Esko Turunen Fuzzy systems and their mathematics Open access 07 February 2025 Pages: 509 - 520
Unification of methods for new types of fuzzy sets: general approximation spaces with relational morphisms Jiří Močkoř Fuzzy systems and their mathematics Open access 08 February 2025 Pages: 521 - 542
On hierarchical clustering-based identification of PWA model with model structure selection and application to automotive actuators for HiL simulation Zhenxing Ren Mathematical methods in data science 08 February 2025 Pages: 543 - 558
Multiscale risk spillover analysis of China’s stock market industry: evidence supported by a novel hybrid model based on signal decomposition technology Zhan LinjieTang Zhenpeng Mathematical methods in data science 10 February 2025 Pages: 559 - 577
On the maximization of the likelihood for the generalized gamma distribution: the modified maximum likelihood approach Talha ArslanSukru AcitasBirdal Senoglu Mathematical methods in data science Open access 08 February 2025 Pages: 579 - 591
Robust security risk estimation for android apps using nearest neighbor approach and hamming distance Mahmood DeypirToktam Zoughi Mathematical methods in data science 10 February 2025 Pages: 593 - 611
Zoom method for association rules in multi-granularity formal context Lihui NiuJusheng MiMeizheng Li Mathematical methods in data science 08 February 2025 Pages: 613 - 627
A novel approach of multi-channel attention mechanism for long-sequential multivariate time-series prediction problem Tham VoLinh Nguyen Thi My Data analytics and machine learning 10 February 2025 Pages: 629 - 644
Trustworthy deep learning for encrypted traffic classification Zheng LiYanbei LiuXiaoming Zhu Data analytics and machine learning 10 February 2025 Pages: 645 - 662
STA-CN-BiGRU: a spatial-temporal attention based ChebNet and BiGRU model for traffic flow prediction Feng HuifangYang Rui Data analytics and machine learning 08 February 2025 Pages: 663 - 672
Federated learning for Healthcare 5.0: a comprehensive survey, taxonomy, challenges, and solutions Muhammad Sadiq AminShabir AhmadWoong-Kee Loh Data analytics and machine learning 10 February 2025 Pages: 673 - 700
Enhancing voltage stability and load shedding optimization through a fusion of gravitational search algorithm and particle swarm optimization with deep learning Masoud AhmadipourZaipatimah AliHussein Mohammed Ridha Optimization 10 February 2025 Pages: 701 - 721
A surrogate archive assisted multi-objective evolutionary algorithm under limited computational budget Le WangQinqin FanXuefeng Yan Optimization 08 February 2025 Pages: 723 - 753
A fault-tolerant scheduling strategy through proactive and clustering techniques for scientific workflows in cloud computing Suha Mubdir FarhoodReihaneh KhorsandMohammadreza Ramezanpour Optimization 10 February 2025 Pages: 755 - 781
Spark workflow task scheduling with deadline and privacy constraints in hybrid cloud networks Kamran Yaseen RajputLi XiaopingAbdullah Lakhan Optimization 10 February 2025 Pages: 783 - 801
Improved snake optimizer based on forced switching mechanism and variable spiral search for practical applications problems Yanfeng WangBingqing XinJunwei Sun Optimization 07 February 2025 Pages: 803 - 838
Period regulated particle swarm optimization algorithm Zhilong LiuHuhai Jiang Optimization 07 February 2025 Pages: 839 - 860
A new mathematical optimization-based method for the m-invariance problem Adrián Tobar NicolauJordi CastroClaudio Gentile Optimization Open access 08 February 2025 Pages: 861 - 873
Knowledge-based optimization in epidemics prevention Krzysztof Michalak Optimization 08 February 2025 Pages: 875 - 893
Enhancing teaching learning based optimization algorithm through group discussion strategy for CEC 2017 benchmark problems Muhammad SagheerMuhammad Asif JanMeshal Shutaywi Optimization 08 February 2025 Pages: 895 - 932
A Fuzzy-Bayesian belief network approach to compute efficiency as a metric for IoT systems Rishabh Deo PandeyItu Snigdh Application of soft computing 10 February 2025 Pages: 933 - 944
Inverse fuzzy graph colouring and its application Kadeeja Mole Koyalinte PurakkalSameena Kalathodi Application of soft computing 08 February 2025 Pages: 945 - 956
Nonlinear complex dynamic system identification based on a novel recurrent neural network Kartik SainiNarendra KumarRajesh Kumar Application of soft computing 07 February 2025 Pages: 957 - 976
Modeling of the blockchain-empowered cloud 4D printing services collaboration digital twin platform oriented on supply–demand Jiajia LiuEdi Syams ZainudinChenglei Zhang Application of soft computing 10 February 2025 Pages: 977 - 1004
Enhancing the combined compromise solution method for group decision-making under intuitionistic fuzziness: an application to blended English teaching quality evaluation in vocational colleges Bin XieHongmiao Yuan Application of soft computing 10 February 2025 Pages: 1005 - 1017
A semantic approach for cultural heritage ontology matching and integration based on textual and multimedia information Antonio Maria RinaldiCristiano RussoCristian Tommasino Application of soft computing 07 February 2025 Pages: 1019 - 1034
Global vision, local focus: the semantic enhancement transformer network for crowd counting Mingtao WangXin ZhouYuanyuan Chen Application of soft computing 07 February 2025 Pages: 1035 - 1052
Nonlinear convergence factor-based manta ray foraging optimization algorithm for combined economic emission dispatch problem Xing-Yue ZhangJie-Sheng WangWen-Kuo Hao Application of soft computing 08 February 2025 Pages: 1053 - 1089
A novel cluster based reliable security enhancement in FANET directed by game theory Shikha GuptaNeetu Sharma Application of soft computing 07 February 2025 Pages: 1091 - 1106
A distance based similarity measure on trapezoidal intuitionistic fuzzy numbers and its applications P. DhanasekaranS. Kalidasan Application of soft computing 08 February 2025 Pages: 1107 - 1119
Fast resistivity imaging of transient electromagnetic using an extreme learning machine Ruiyou LiYong ZhangMin Li Application of soft computing 08 February 2025 Pages: 1121 - 1131
A GA-FGM-RTA combined model for predicting seawall settlement in under insufficient data volume Peng QinChunmei ChengHuaizhi Su Application of soft computing 08 February 2025 Pages: 1133 - 1146
Mechanical properties estimation of multi-layer friction stir plug welded aluminium plates using time-series neural network models Mohammad Reza Chalak QazaniMoosa SajedSeyed Mohammad Hossein Seyedkashi Application of soft computing 10 February 2025 Pages: 1147 - 1168
A genetic-based approach for vehicle routing problem with fuzzy alpha-cut constraints He-Yau KangAmy H. I. Lee Application of soft computing 08 February 2025 Pages: 1169 - 1189
Boosting cervical cancer detection with a multi-stage architecture and complementary information fusion Pranab SahooSriparna SahaSamrat Mondal Neural Networks 08 February 2025 Pages: 1191 - 1206
Channel pruning method driven by similarity of feature extraction capability Chuanmeng SunJiaxin ChenTiehua Ma Neural Networks 08 February 2025 Pages: 1207 - 1226
Solving trajectory tracking of robot manipulators via PID control with neural network compensation Marco Moran-ArmentaCarlos Aguilar-AvelarJavier Moreno-Valenzuela Neural Networks 08 February 2025 Pages: 1227 - 1241
Enhancing demand forecasting through combination of anomaly detection and continuous improvement Meysam JahaniZahra ZojajiFatemeh Raji Neural Networks and Intelligent Systems 08 February 2025 Pages: 1243 - 1258
Free-text keystroke authentication using transformers: a comparative study of architectures and loss functions Saleh MomeniBagher BabaAli Neural Networks and Intelligent Systems 08 February 2025 Pages: 1259 - 1272