Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Volume 46, Issue 22024
Publisher:
  • IOS Press
  • Van Diemenstraat 94 1013 CN Amsterdam
  • Netherlands
ISSN:1064-1246
Reflects downloads up to 15 Jan 2025Bibliometrics
research-article
Fair and stable matching decision-making with multiple hesitant fuzzy elements

The two-sided matching (TSM) decision-making is an interdisciplinary research field encompassing management science, behavioral science, and computer science, which are widely applied in various industries and everyday life, generating significant ...

research-article
An improved clustering method using particle swarm optimization algorithm and mitochondrial fusion model (PSO-MFM)

Computational models are foundational concepts in computer science; many of these models such as P systems are based on natural biological processes. P systems represent a wide framework for a variety of concepts of data mining, as models of data ...

research-article
A total distance ranking approach to fuzzy AHP-based MCDM method for selecting sustainable manufacturing facility location

Selecting a sustainable facility location is a crucial strategy for manufacturing companies to achieve long-term success in today’s competitive environment. Various quantitative and qualitative criteria with different importance in a multiple level ...

research-article
Research on social ecological evaluation of the spatial form of old urban blocks based on dual probabilistic linguistic term sets

Under the rapid process of urbanization, many early renovated urban villages have also encountered many problems. Due to the rapid development of urban construction and the continuous changes in spatial functions, early renovated urban villages have ...

research-article
Using path coloring of graphs for communication in social networks

An L (p1, p2, p3,  … , pm)- labeling of a graph G, has the vertices of G assigned with non-negative integers, such that the vertices at distance j should have at least pj as their label difference. If m = 3 and p1 = 3, p2 = 2, p3 = 1, it is called an L (...

research-article
Pythagorean fuzzy Aczel Alsina Hamy mean aggregation operators and its applications to multi-attribute decision-making process

Multiple-attribute group decision-making (MAGDM) technique is often used to make decisions when several optimal options are under consideration. It can be difficult to select a reasonable optimal option for the decision maker under consideration of ...

research-article
An integrated framework for spherical fuzzy MAGDM and applications to english blended teaching quality evaluation

In the information age, teachers are no longer the only source of information for students, and the problems of the traditional lecture mode are becoming more and more obvious. Especially in the process of teaching English in colleges and universities, ...

research-article
Smart intrusion detection system with balanced data in IoMT infra

The IoMT (Internet of Medical Things) has allowed for uninterrupted, critical patient observation, improved diagnosis precision, and efficient therapy. However, despite the usefulness of such medical things (devices), they also raise a lot of ...

research-article
The reptile optimized deep learning model for land cover classification of the uppal earth region in telangana state using satellite image fusion

This study addresses challenges in land use and cover identification using remote sensing (RS) imagery, focusing on the Uppal region. By leveraging deep learning models, particularly an optimized ResNext-50 architecture, we aim to enhance efficiency and ...

research-article
T2FM: A novel hashtable based type-2 fuzzy frequent itemsets mining

Association rule mining (ARM) is an important research issue in the field of data mining that aims to find relations among different items in binary databases. The conventional ARM algorithms consider the frequency of the items in binary databases, which ...

research-article
An automatic anomaly application detection system in mobile devices using FL-HTR-DBN and SKLD-SED K means algorithms

The proliferation of mobile technology has given rise to a multitude of applications, among them those designed with malicious intent, aimed at compromising the integrity of mobile devices (MDs). To combat this issue, this study introduces an innovative ...

research-article
A novel approach for multi-objective linear programming model under spherical fuzzy environment and its application

Every decision-making process particularly those involving real-life issues is disproportionately plagued by uncertainty. It is also unavoidable and obvious. Since its conception are several ways for representing uncertainty have been proposed by ...

research-article
Advanced deep learning approach for enhancing crop disease detection in agriculture using hyperspectral imaging

Crop diseases pose significant challenges to global food security and agricultural sustainability. Timely and accurate disease detection is crucial for effective disease management and minimizing crop losses. In recent years, hyperspectral imaging has ...

research-article
Statistical limit superior and Statistical limit inferior in non-Archimedean L -fuzzy normed spaces

The purpose of this article is to study the notion of statistical limit superior(SLS) and statistical limit inferior(SLI) in non-Archimedean(NA) L -fuzzy normed spaces( L -FNS). The concept of SLS and SLI is examined and extended to SLS and SLI in NA L -FNS. ...

research-article
DLAN: Modeling user long- and short-term preferences based on double-layer attention network for next point-of-interest recommendation

The next Point-of-Interest (POI) recommendation, in recent years, has attracted an extensive amount of attention from the academic community. RNN-based methods cannot establish effective long-term dependencies among the input sequences when capturing the ...

research-article
Constraint-based high utility mobile trajectory pattern mining for security systems

In security system, high utility pattern mining of a large number of users mobile trajectories is helpful to analyze user behavior patterns, and enhance the internal prevention of the security system.Currently, the frequent pattern mining for mobile ...

research-article
A novel uncertain information modeling method based on cosine similarity and cross entropy under spherical uncertain linguistic fuzzy set

Multi-attribute group decision-making (MAGDM) is one of the research hotspots in human cognitive and decision-making theory. However, there are still challenges to the existing MAGDM methods in modeling uncertain linguistics of decision-makers’ (DMs’) ...

research-article
A novel outlier calendrical heterogeneity reconstruction deep learning model for electricity demand forecasting

The development of an accurate electricity demand forecasting model is of paramount importance for promoting global energy efficiency and sustainability. Nonetheless, the presence of outliers and inappropriate model training can result in suboptimal ...

research-article
Deep learning aided prostate cancer detection for early diagnosis & treatment using MR with TRUS images

Although difficult, robust and reliable synchronization of multimodal medical pictures has several practical uses. For instance, in MR-TRUS fusing guided prostate treatments, picture registration between the two modalities is essential. However, due to ...

research-article
Hybrid intelligent technique for intrusion detection in cyber physical systems with improved feature set

Machine learning techniques commonly used for intrusion detection systems (IDSs face challenges due to inappropriate features and class imbalance. A novel IDS comprises four stages: Pre-processing, Feature Extraction, Feature Selection, and Detection. ...

research-article
Hybrid machine learning approach for trust evaluation to secure MANET from routing attacks

A new era in communication has been ushered in by MANET networks, in which users (nodes) interact with one another through a self-configuring network of handheld devices linked by wireless links. Nodes are capable of participating and enthusiastic about ...

research-article
RVAIC: Refined visual attention for improved image captioning

Visual attention has emerged as a prominent approach for improving the effectiveness of image captioning, as it enables the decoder network to focus selectively on the most salient regions in the image content, thereby facilitating the generation of ...

research-article
Deep attention transformer nets for accurate analysis of oil spilled images to minimize pollution in the marine environment

Oil spills in maritime areas pose a serious environmental risk, wreaking havoc on marine ecosystems, coastal habitats, and local residents. An accurate and timely evaluation of oil spill occurrences and extent is critical for effective pollution control ...

research-article
Advancing disease identification in fava bean crops: A novel deep learning solution integrating YOLO-NAS for precise rust

 A significant concern is the economic impact of agricultural diseases on the world’s crop production. The disease significantly reduces agricultural production across the world. Loss of nutrients caused by parasite infection of leaves, pods, and roots–...

research-article
Research on load balance control of power systems based on distributed energy storage technology

We provide a strategy for minimizing losses and redistributing loads in distribution systems while emergency repairs are being made. The proposed approach takes advantage of the preexisting, network-accessible, and Power Companies’ Adoption of ...

research-article
Design of English viewing, listening, and speaking mobile teaching software based on an interactive digital media algorithm

China has now embraced the information era, which has had a significant impact on everyday life, employment, and educational practices. Information technology has also had a significant impact on the growth of the education sector, resulting in a fast-...

research-article
Climate change water management planning based on hydrological models

The current conventional water resources management planning method realizes the optimal allocation of water resources by constructing a function aiming at economic benefits; it causes poor model planning repercussions as a result of the disregard of ...

research-article
Analysis of informationization teaching algorithms based on the internet of things

This study intends to solve the problems brought on by regional differences in the distribution of educational resources, inadequate growth of schools, and various levels of informationization in university education. Because of the complicated ...

research-article
Analysis of factors influencing Chinese vocabulary learning level based on big data technology

In recent years, significant progress has been made in the study of Chinese vocabulary acquisition, and the research content and scope have gradually expanded. Chinese vocabulary is the foundation for understanding and using language, and any language ...

research-article
A comprehensive automatic labeling and repair strategy for cracks and peeling conditions of literary murals in ancient buildings

To protect the historical and cultural heritage, the application of self-organizing mapping networks and genetic algorithms in the restoration of ancient architectural murals is studied. The results show that the average repair time for different types ...

Comments