Search

Showing total 227 results
227 results

Search Results

1. A New Type of Single Valued Neutrosophic Covering Rough Set Model

2. Research on Path Planning Algorithm for Crowd Evacuation

3. Research on WebShell Detection Method Based on Regularized Neighborhood Component Analysis (RNCA)

4. Neuromodulated Dopamine Plastic Networks for Heterogeneous Transfer Learning with Hebbian Principle

5. Canonical Correlations and Nonlinear Dependencies

6. Symmetric and Asymmetric Data in Solution Models

7. Generalized Fuzzy Soft Power Bonferroni Mean Operators and Their Application in Decision Making

8. A New Representation of Semiopenness of L-fuzzy Sets in RL-fuzzy Bitopological Spaces

9. A Novel Approach to Oil Layer Recognition Model Using Whale Optimization Algorithm and Semi-Supervised SVM

10. Security and Privacy in Cloud-Based E-Health System

11. New Applications of the Fractional Integral on Analytic Functions

12. Differential Subordination and Superordination Results Using Fractional Integral of Confluent Hypergeometric Function

13. Applications of Inequalities in the Complex Plane Associated with Confluent Hypergeometric Function

14. Secure w-Domination in Graphs

15. The Fourth Axiom of Similarity Measures

16. Symmetric Identities for Carlitz’s Type Higher-Order (p,q)-Genocchi Polynomials

17. Symmetric Fuzzy Stochastic Differential Equations with Generalized Global Lipschitz Condition

18. Oscillatory Behavior of Fourth-Order Differential Equations with Neutral Delay

19. Multidimensional Interpolation Decoupling Strategy for CD Basis Weight of Papermaking Process

20. A New Stability Theory for Grünwald–Letnikov Inverse Model Control in the Multivariable LTI Fractional-Order Framework

21. Hankel Determinants for Univalent Functions Related to the Exponential Function

22. A Closed-Form Expression of the Instantaneous Rotational Lurch Index to Evaluate Its Numerical Approximation

23. Around the Model of Infection Disease: The Cauchy Matrix and Its Properties

24. On a SIR Model in a Patchy Environment Under Constant and Feedback Decentralized Controls with Asymmetric Parameterizations

25. A Novel Approach to Multi-Attribute Group Decision-Making based on Interval-Valued Intuitionistic Fuzzy Power Muirhead Mean

26. Normalized Weighted Bonferroni Harmonic Mean-Based Intuitionistic Fuzzy Operators and Their Application to the Sustainable Selection of Search and Rescue Robots

27. Intra Prediction of Depth Picture with Plane Modeling

28. Cyclicity in EL–Hypergroups

29. Q-Filters of Quantum B-Algebras and Basic Implication Algebras

30. New Operations of Totally Dependent-Neutrosophic Sets and Totally Dependent-Neutrosophic Soft Sets

31. Valuation Fuzzy Soft Sets: A Flexible Fuzzy Soft Set Based Decision Making Procedure for the Valuation of Assets

32. Sandor Type Fuzzy Inequality Based on the (s,m)-Convex Function in the Second Sense

33. Symplectic-Structure-Preserving Uncertain Differential Equations

34. The Scalar Mean Chance and Expected Value of Regular Bifuzzy Variables

35. Some Operators on Quantum B-Algebras

36. MRDA-MGFSNet: Network Based on a Multi-Rate Dilated Attention Mechanism and Multi-Granularity Feature Sharer for Image-Based Butterflies Fine-Grained Classification

37. Research on Collaborative Order Decision-Making Method for Symmetric Participants in Complex Shipbuilding Projects

38. A Kinematical Analysis of the Flap and Wing Mechanism of a Light Sport Aircraft Using Topological Models

39. The Rheological Analytical Solution and Parameter Inversion of Soft Soil Foundation

40. Connectivity of Semiring Valued Graphs

41. Multiple Attribute Decision Making Based on Linguistic Generalized Weighted Heronian Mean

42. IoT Botnet Detection Using Salp Swarm and Ant Lion Hybrid Optimization Model

43. The Phase Transition Analysis for the Random Regular Exact 2-(d, k)-SAT Problem

44. Three-Way Multi-Attribute Decision Making Based on Outranking Relations under Intuitionistic Fuzzy Environments

45. Building a Fuzzy Classifier Based on Whale Optimization Algorithm to Detect Network Intrusions

46. New Secure and Practical E-Mail Protocol with Perfect Forward Secrecy

47. Effect of the Location of Fault Fracture Zones on the Stability of Symmetrical Submarine Tunnels

48. Android Malware Detection Using TCN with Bytecode Image

49. Flattening Layer Pruning in Convolutional Neural Networks

50. A Secure Three-Factor Anonymous User Authentication Scheme for Internet of Things Environments