Search
Search Results
-
Vector-based uncertain ordered density weighted averaging: a family of incentive-oriented aggregation operators
Incentive is a common phenomenon in the process of decision management. It is important and necessary to integrate incentive requirement into the...
-
Optimal analysis and design of large-scale problems using a Modified Adolescent Identity Search Algorithm
This research uses a new method called the Modified Adolescent Identity Search Algorithm (MAISA) to solve optimization problems. The identity of a...
-
A multiobjective multiperiod portfolio selection approach with different investor attitudes under an uncertain environment
Though there are several studies on uncertain single-period portfolio selection, the uncertain multiperiod portfolio selection literature is still in...
-
A revolutionary RPL-based IoT routing protocol for monitoring building structural health in smart city domain utilizing equilibrium optimizer algorithm
The Internet of Things (IoT) has been the subject of recent studies and is expected to be extremely important to the future growth of the Internet....
-
New quantum color image watermarking technique (NQCIWT)
The crazy, unconscious use of the Internet, and the increase in cybercrime and hacking, which resulted in the loss of a large number of sensitive...
-
Addressing the traveling salesperson problem with frequency fitness assignment and hybrid algorithms
The traveling salesperson problem (TSP) is one of the most iconic hard optimization tasks. With frequency fitness assignment (FFA), a new approach to...
-
An enhanced teaching–learning-based optimization for the flexible job shop scheduling problem considering worker behaviours
In actual workshop scheduling, processing time is influenced by worker behaviours, such as learning, forgetting, fatigue and recovery. However, in...
-
Industrial product surface defect detection via the fast denoising diffusion implicit model
In the age of intelligent manufacturing, surface defect detection plays a pivotal role in the automated quality control of industrial products,...
-
On Stage-Wise Backpropagation for Improving Cheng’s Method for Fully Connected Cascade Networks
In this journal, Cheng has proposed a backpropagation ( BP ) procedure called BPFCC for deep fully connected cascaded ( FCC ) neural network learning in...
-
Automated abnormalities detection in mammography using deep learning
Breast cancer is the second most prevalent cause of cancer death and the most common malignancy among women, posing a life-threatening risk....
-
-
Fuzzy nominal sets
In this paper, we use two approaches to define the concept of fuzzy nominal sets: classic and universal algebraic. We see that the fuzzy nominal sets...
-
An artificial bee colony algorithm for the minimum edge-dilation K-center problem
This paper studies the minimum edge-dilation K -center (MEDKC) problem for edge-weighted, undirected and connected graphs. This problem which is
... -
Some New Concepts of Interval-Valued Picture Fuzzy Graphs and Their Application Toward the Selection Criteria
Interval-valued picture fuzzy sets (IVPFSs) being the most advanced form of fuzzy sets (FSs) has more capacity to analyze the network state more...
-
-
A Multi-strategy Improved Grasshopper Optimization Algorithm for Solving Global Optimization and Engineering Problems
This paper presents a multi-strategy improved grasshopper optimization algorithm (MSIGOA), which aims to address the shortcomings of the grasshopper...
-
Prototype as query for few shot semantic segmentation
Few-shot Semantic Segmentation (FSS) was proposed to segment unseen classes in a query image, referring to only a few annotated examples named...
-
Strong s-box construction approach based on Josephus problem
There are two basic requirements for symmetric encryption algorithms. The first of these is diffusion. The second and most important is confusion. In...
-
Assessment of loss of life caused by dam failure based on fuzzy theory and hybrid random forest model
Dam failure may lead to significant casualties among downstream residents. Therefore, it is crucial to study a reliable method to quantitatively...
-
Intrusion detection system and fuzzy ant colony optimization based secured routing in wireless sensor networks
Recent advances in wireless sensor networks (WSNs) have brought the sensor based monitoring developments to the surface in many applications. In such...