Skip to main content

previous disabled Page of 580
and
  1. No Access

    Article

    Vector-based uncertain ordered density weighted averaging: a family of incentive-oriented aggregation operators

    Incentive is a common phenomenon in the process of decision management. It is important and necessary to integrate incentive requirement into the decision-making process. To this problem, the paper proposed a ...

    Weiwei Li, **tao Yi, Lingyu Li, Jun Liu in Soft Computing (2024)

  2. No Access

    Article

    Addressing the traveling salesperson problem with frequency fitness assignment and hybrid algorithms

    The traveling salesperson problem (TSP) is one of the most iconic hard optimization tasks. With frequency fitness assignment (FFA), a new approach to optimization has recently been proposed: instead of directi...

    Tianyu Liang, Zhize Wu, Jörg Lässig, Daan van den Berg, Sarah L. Thomson in Soft Computing (2024)

  3. No Access

    Article

    An enhanced teaching–learning-based optimization for the flexible job shop scheduling problem considering worker behaviours

    In actual workshop scheduling, processing time is influenced by worker behaviours, such as learning, forgetting, fatigue and recovery. However, in the traditional workshop scheduling considering workers, these...

    Zongyan Cai, Mengke Sun, Tianyu Yan, Haonan Zhang, ** Tian in Soft Computing (2024)

  4. No Access

    Article

    Fuzzy nominal sets

    In this paper, we use two approaches to define the concept of fuzzy nominal sets: classic and universal algebraic. We see that the fuzzy nominal sets obtained using the universal algebraic approach (so-called ...

    N. S. Razmara, M. Haddadi, Kh. Keshvardoost in Soft Computing (2024)

  5. No Access

    Article

    A multiobjective multiperiod portfolio selection approach with different investor attitudes under an uncertain environment

    Though there are several studies on uncertain single-period portfolio selection, the uncertain multiperiod portfolio selection literature is still in an exploration phase. Besides, the effects and influences o...

    Sanjay Yadav, Pankaj Gupta, Mukesh Kumar Mehlawat, Arun Kumar in Soft Computing (2024)

  6. No Access

    Article

    A revolutionary RPL-based IoT routing protocol for monitoring building structural health in smart city domain utilizing equilibrium optimizer algorithm

    The Internet of Things (IoT) has been the subject of recent studies and is expected to be extremely important to the future growth of the Internet. The essential component of the IoT is the low-power and lossy...

    Khalid A. Darabkh, Hebah H. AlAdwan, Muna Al-Akhras, Fahed Jubair in Soft Computing (2024)

  7. No Access

    Article

    A generalization of \(k\times j\) -rough Heyting algebras

    A \(k\times j\) k × j ...

    Gustavo Pelaitay, Nohelia Paloma Ramos in Soft Computing (2024)

  8. No Access

    Article

    An artificial bee colony algorithm for the minimum edge-dilation K-center problem

    This paper studies the minimum edge-dilation K-center (MEDKC) problem for edge-weighted, undirected and connected graphs. This problem which is $$\mat...

    Manisha Israni, Shyam Sundar in Soft Computing (2024)

  9. No Access

    Article

    Optimal analysis and design of large-scale problems using a Modified Adolescent Identity Search Algorithm

    This research uses a new method called the Modified Adolescent Identity Search Algorithm (MAISA) to solve optimization problems. The identity of a teenager is a different combination of thoughts, beliefs, and ...

    Ali Asghar Dehghani, Saleh Hamzehei-Javaran, Saeed Shojaee in Soft Computing (2024)

  10. No Access

    Article

    New characterizations of partial orders induced by a class of non-divisible t-norms

    In this article, we deal with the algebraic structures of the partial orders induced by non-divisible t-norms. We first give a condition for the partial orders induced by non-divisible t-norms being a meet sem...

    Zhi-qiang Liu, Xue-** Wang in Soft Computing (2024)

  11. Article

    Open Access

    Design of Human–Computer Interaction Gesture Recognition System Based on a Flexible Biosensor

    The continuous development of high-speed Internet technology has made the application of robots increasingly widespread. Current robots and human–computer interaction systems mostly use rigid materials, such a...

    Qianhui Chen in International Journal of Computational Intelligence Systems (2024)

  12. Article

    Open Access

    Strong s-box construction approach based on Josephus problem

    There are two basic requirements for symmetric encryption algorithms. The first of these is diffusion. The second and most important is confusion. In these algorithms, this requirement is usually met by s-box ...

    Fırat Artuğer in Soft Computing (2024)

  13. Article

    Open Access

    On join-complete implication algebras

    In this paper, first, we consider an algebra that has a binary operation and a join of arbitrary nonempty subset. A lattice implication algebra is a lattice with a binary operation, which has a join and a meet...

    Yong Ho Yon, Şule Ayar Özbal in Soft Computing (2024)

  14. No Access

    Article

    Generating fuzzy sets using rearranged nested family and the mathematical formula in decomposition theorem

    The purpose of this paper is to propose a mechanical procedure to generate fuzzy data from the observed real number data. The observed data may be imprecise owing to some unexpected situation. In this case, th...

    Hsien-Chung Wu in Soft Computing (2024)

  15. Article

    Open Access

    Bipolar Neutrosophic Dombi-Based Heronian Mean Operators and Their Application in Multi-criteria Decision-Making Problems

    Dombi operations based on the Dombi t-norm (TN) and t-conorm (TCN) have the advantage in terms of operational parameter flexibility in dealing with varying degrees of uncertainty and aggregation requirements. ...

    Siti Nurhidayah Yaacob, Hazwani Hashim in International Journal of Computational Int… (2024)

  16. No Access

    Article

    A greedy post-processing strategy for multi-objective performance optimization of general single-server finite queueing networks

    Several real-life problems are comprised of finite single-server acyclic queueing networks. The performance optimization of these queueing networks has been the subject of several studies. The present study ex...

    Anderson R. Duarte, Frederico R. B. Cruz, Gabriel L. Souza in Soft Computing (2024)

  17. Article

    Open Access

    Predicting the potential toxicity of the metal oxide nanoparticles using machine learning algorithms

    Over the years, machine learning (ML) algorithms have proven their ability to make reliable predictions of the toxicity of metal oxide nanoparticles. This paper proposed a predictive ML model of the potential ...

    Gehad Ismail Sayed, Heba Alshater, Aboul Ella Hassanien in Soft Computing (2024)

  18. No Access

    Article

    Intrusion detection system and fuzzy ant colony optimization based secured routing in wireless sensor networks

    Recent advances in wireless sensor networks (WSNs) have brought the sensor based monitoring developments to the surface in many applications. In such a scenario, the security of communication is a major challe...

    Shalini Subramani, M. Selvi in Soft Computing (2024)

  19. Article

    Open Access

    SSO-CCNN: A Correlation-Based Optimized Deep CNN for Brain Tumor Classification Using Sampled PGGAN

    Recently, new advancements in technologies have promoted the classification of brain tumors at the early stages to reduce mortality and disease severity. Hence, there is a need for an automatic classification ...

    Saswati Sahoo, Sushruta Mishra in International Journal of Computational Int… (2024)

  20. No Access

    Article

    Multi-objective meta-heuristics to optimize end-of-life laptop remanufacturing decisions under quality grading of returned parts

    Research on multi-objective discrete optimization of Waste Electrical and Electronic Equipment (WEEE) remanufacturing remains under-studied in the literature. Remanufacturing laptops to extend their useful lif...

    Gurunathan Anandh, Shanmugam PrasannaVenkatesan, Uday Venkatadri in Soft Computing (2024)

previous disabled Page of 580