Distance measure of uncertain sets and its applications (Englisch)
- Neue Suche nach: Wang, Xiao
- Neue Suche nach: Ning, Yufu
- Neue Suche nach: Wang, Xiao
- Neue Suche nach: Ning, Yufu
In:
Journal of Intelligent & Fuzzy Systems
;
34
, 3
;
1933-1945
;
2018
- Aufsatz (Zeitschrift) / Elektronische Ressource
-
Titel:Distance measure of uncertain sets and its applications
-
Weitere Titelangaben:Distance measure of uncertain sets and its applications
-
Beteiligte:Wang, Xiao ( Autor:in ) / Ning, Yufu ( Autor:in )
-
Erschienen in:Journal of Intelligent & Fuzzy Systems ; 34, 3 ; 1933-1945
-
Verlag:
- Neue Suche nach: IOS Press
-
Erscheinungsort:Amsterdam, The Netherlands
-
Erscheinungsdatum:22.03.2018
-
Format / Umfang:13 pages
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz (Zeitschrift)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis – Band 34, Ausgabe 3
Zeige alle Jahrgänge und Ausgaben
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1237
-
Soft computing and intelligent systems: Techniques and applicationsThampi, Sabu M. / El-Alfy, El-Sayed M. / Mitra, Sushmita / Trajkovic, Ljiljana et al. | 2018
- 1243
-
A novel intrusion detection system for wireless mesh network with hybrid feature selection technique based on GA and MIVijayanand, R. / Devaraj, D. / Kannapiran, B. et al. | 2018
- 1251
-
Data confidentiality and integrity preserving outsourcing algorithm for matrix chain multiplication over malicious cloud serverKumar, Malay / Vardhan, Manu et al. | 2018
- 1265
-
Evaluating deep learning approaches to characterize and classify the DGAs at scaleVinayakumar, R. / Soman, K.P. / Poornachandran, Prabaharan / Sachin Kumar, S. et al. | 2018
- 1277
-
Detecting Android malware using Long Short-term Memory (LSTM)Vinayakumar, R. / Soman, K.P. / Poornachandran, Prabaharan / Sachin Kumar, S. et al. | 2018
- 1289
-
Data driven intrusion detection system for software defined networking enabled industrial internet of thingsMadhawa, Surendar / Balakrishnan, P. / Arumugam, Umamakeswari et al. | 2018
- 1301
-
Smart grid security assessment using intelligent technique based on novel chaotic performance indexNangrani, S.P. / Bhat, S.S. et al. | 2018
- 1311
-
An optimized and secure BUTE – binding update using twofold encryption for next generation IP mobilityMathi, Senthilkumar / Srilakshmy et al. | 2018
- 1323
-
Cryptanalysis of an image encryption algorithm based on PWLCM and inertial delayed neural networkAhmad, Musheer / Alam, Mohammad Zaiyan / Ansari, Subia / Lambić, Dragan / AlSharari, Hamed D. et al. | 2018
- 1333
-
Evaluating deep learning approaches to characterize and classify malicious URL’sVinayakumar, R. / Soman, K.P. / Poornachandran, Prabaharan et al. | 2018
- 1345
-
An efficient approach for secure information retrieval on cloudHanda, Rohit / Rama Krishna, C. / Aggarwal, Naveen et al. | 2018
- 1355
-
Detecting malicious domain names using deep learning approaches at scaleVinayakumar, R. / Soman, K.P. / Poornachandran, Prabaharan et al. | 2018
- 1369
-
Intrusion detection taxonomy and data preprocessing mechanismsAl-Utaibi, Khaled A. / El-Alfy, El-Sayed M. et al. | 2018
- 1385
-
Multi-scenario dataset for speaker recognitionSrivastava, Smriti / Gopal / Bhardwaj, Saurabh et al. | 2018
- 1393
-
On-chip face recognition system design with memristive Hierarchical Temporal MemoryIbrayev, Timur / Myrzakhan, Ulan / Krestinskaya, Olga / Irmanova, Aidana / James, Alex Pappachen et al. | 2018
- 1403
-
An efficient biometric based remote user authentication scheme for secure internet of things environmentRoy, Sandip / Chatterjee, Santanu / Mahapatra, Gautam et al. | 2018
- 1411
-
Hybrid feature descriptors to detect face spoof attacksMohanraj, V. / Sibi Chakkaravarthy, S. / Gogul, I. / Sathiesh Kumar, V. / Kumar, Ranajit / Vaidehi, V. et al. | 2018
- 1421
-
Identification of tongue print images for forensic science and biometric authenticationSivakumar, Trivandrum T. / Nair, Shali S. / Zacharias, Geevar C. / Nair, Madhu S. / Joseph, Anna P. et al. | 2018
- 1427
-
Deep learning based spell checker for Malayalam languageSooraj, S. / Manjusha, K. / Anand Kumar, M. / Soman, K.P. et al. | 2018
- 1435
-
Co-occurrence based word representation for extracting named entities in Tamil tweetsRemmiya Devi, G. / Anand Kumar, M. / Soman, K.P. et al. | 2018
- 1443
-
Ant colony inspired method for reducing load imbalance in multiprocessor systemsAhmed, Khalifa / El-Alfy, El-Sayed M. / Awad, Wasan S. et al. | 2018
- 1453
-
An author-specific-model-based authorship analysis using psycholinguistic aspects and style word patternsAthira, U. / Thampi, Sabu M. et al. | 2018
- 1467
-
Robust self-tuning fractional order PID controller dedicated to non-linear dynamic systemMohan, Vijay / Chhabra, Himanshu / Rani, Asha / Singh, Vijander et al. | 2018
- 1479
-
Lyapunov fuzzy Markov game controller for two link robotic manipulatorKumar, Abhishek / Sharma, Rajneesh / Varshney, Pragya et al. | 2018
- 1491
-
Chaos driven instability control using interval type-2 fuzzy logic controller for better performanceNangrani, S.P. / Singh, Arvind R. / Chandan, Ajaysingh et al. | 2018
- 1503
-
Scalable online product recommendation engine based on implicit feature extraction domainGupta, Shalini / Dixit, Veer Sain et al. | 2018
- 1511
-
Community based Hashtag Recommender System (CHRS) for twitterSharma, Chhavi / Bedi, Punam et al. | 2018
- 1521
-
Parallel proactive cross domain context aware recommender systemRicha / Bedi, Punam et al. | 2018
- 1535
-
A study on fuzzy soft cardinality in lattice ordered fuzzy soft group and its application in decision making problemsVimala, J. / Reeta, J. Arockia / Ilamathi, V.S. Anusuya et al. | 2018
- 1543
-
Hybrid credit scoring model using neighborhood rough set and multi-layer ensemble classificationTripathi, Diwakar / Edla, Damodar Reddy / Cheruku, Ramalingaswamy et al. | 2018
- 1551
-
Attention based English to Punjabi neural machine translationSingh, Shivkaran / Anand Kumar, M. / Soman, K.P. et al. | 2018
- 1561
-
Energy efficient workflow scheduling with virtual machine consolidation for green cloud computingMohanapriya, N. / Kousalya, G. / Balakrishnan, P. / Pethuru Raj, C. et al. | 2018
- 1573
-
Owl search algorithm: A novel nature-inspired heuristic paradigm for global optimizationJain, Mohit / Maurya, Shubham / Rani, Asha / Singh, Vijander et al. | 2018
- 1583
-
Neighbour teaching learning based optimization for global optimization problemsShukla, Alok Kumar / Singh, Pradeep / Vardhan, Manu et al. | 2018
- 1595
-
An optimal cloud-based e-healthcare system using k-centroid MVS clustering schemeSreedhar, K.C. / Suresh Kumar, N. et al. | 2018
- 1609
-
A multimodal adaptive approach on soft set based diagnostic risk prediction systemMathew, Terry Jacob / Sherly, Elizabeth / Alcantud, José Carlos R. et al. | 2018
- 1619
-
Semi supervised approach towards subspace clusteringHarikumar, Sandhya / Akhil, A.S. et al. | 2018
- 1631
-
Conceptual alignment deep neural networksDai, Yinglong / Wang, Guojun / Li, Kuan-Ching et al. | 2018
- 1643
-
ex-FTCD: A novel mapreduce model for distributed multi source shortest path problemGayathri, R.G. / Nair, Jyothisha J. et al. | 2018
- 1653
-
Memristive system design for variable pixel G-neighbor denoising filterAliakhmet, Kamilla / Sadykova, Diana / Mathew, Joshin / James, Alex Pappachen et al. | 2018
- 1669
-
Classification of EEG signals for epileptic seizures using Levenberg-Marquardt algorithm based Multilayer Perceptron Neural NetworkNarang, Ankit / Batra, Bhumika / Ahuja, Arpit / Yadav, Jyoti / Pachauri, Nikhil et al. | 2018
- 1679
-
Image forgery detection using region – based Rotation invariant Co-occurrences among adjacent LBPsIsaac, Meera Mary / Wilscy, M. et al. | 2018
- 1691
-
Neural network based robust image watermarking technique in LWT domainIslam, Mohiul / Roy, Amarjit / Laskar, Rabul Hussain et al. | 2018
- 1701
-
Enhancement of white Gaussian noise affected speech using VMD-ℓ1 trend filter methodGanga Gowri, B. / Soman, K.P. et al. | 2018
- 1713
-
Eye gaze– based optic disc detection systemKulkarni, Nilima / Amudha, J. et al. | 2018
- 1723
-
Influence of orbital perturbations due to non-spherical Earth shape on the Landsat multispectral imaging platform1Shanmugha Sundaram, G.A. / Reshma, R. et al. | 2018
- 1731
-
A modelling framework for automotive software design and optimal test path generationKaur, Parampreet / Sobti, Rajeev et al. | 2018
- 1743
-
A fuzzy inference system to recommend skills for source code review using eye movement dataChandrika, K.R. / Amudha, J. et al. | 2018
- 1755
-
Prediction of change prone classes using evolution-based and object-oriented metricsMalhotra, Ruchika / Khanna, Megha et al. | 2018
- 1769
-
Convergence algorithms of fuzzy tensorsChen, Ling / Lu, Linzhang et al. | 2018
- 1777
-
Multi-ary α-ordered linear minimal resolution method in lattice-valued logic system1Hairui, Jia / Yi, Liu / Yang, Xu et al. | 2018
- 1791
-
Unmanned Aerial Vehicle Terrain Following/Terrain Avoidance/Threat Avoidance trajectory planning using fuzzy logicBagherian, Mehri et al. | 2018
- 1801
-
A new version of distance and similarity measures for hesitant fuzzy linguistic term sets and its applicationTao, Zhifu / Han, Bing / Chen, Huayou / Zhu, Jiaming et al. | 2018
- 1813
-
Elliott wave theory and the Fibonacci sequence-gray model and their application in Chinese stock marketDuan, Huiming / Xiao, Xinping / Yang, Jinwei / Zeng, Bo et al. | 2018
- 1827
-
Shapley interval-valued dual hesitant fuzzy Choquet integral aggregation operators in multiple attribute decision makingQu, Guohua / Zhou, Haisheng / Qu, Weihua / Li, Chunhua et al. | 2017
- 1847
-
On numerical solution of general fuzzy type-1 and type-2 arbitrary order dynamical systemsBandyopadhyay, Abhirup / Kar, Samarjit et al. | 2018
- 1863
-
A study on bipolar fuzzy planar graph and its application in image shrinkingPramanik, Tarasankar / Pal, Madhumangal / Mondal, Sukumar / Samanta, Sovan et al. | 2018
- 1875
-
A novel edge detection algorithm based on a hierarchical graph-partition approachGuada, Carely / Zarrazola, Edwin / Yáñez, Javier / Rodríguez, J. Tinguaro / Gómez, Daniel / Montero, Javier et al. | 2018
- 1893
-
An effective dimensionality reduction method for text classification based on TFP-treeLiu, Lu et al. | 2018
- 1907
-
An overview of topological hypergroupoidsAl Tahan, Madeline / Hošková-Mayerová, Šarka / Davvaz, Bijan et al. | 2018
- 1917
-
Decision-theoretic rough set approaches to multi-covering approximation spaces based on fuzzy probability measureLiu, Caihui / Pedrycz, Witold / Jiang, Feng / Wang, Meizhi et al. | 2018
- 1933
-
Distance measure of uncertain sets and its applicationsWang, Xiao / Ning, Yufu et al. | 2018
- 1947
-
Genus value of m-polar fuzzy graphsMandal, Sonia / Sahoo, Sankar / Ghorai, Ganesh / Pal, Madhumangal et al. | 2018
- 1959
-
A consensus approach to multi-granular linguistic MCGDM with hesitant fuzzy linguistic information by using projectionZhang, Xue-yang / Wang, Jian-qiang / Hu, Jun-hua et al. | 2018
- 1975
-
A topological view on L-fuzzy soft sets: Connectedness degreeÇetkin, Vildan / Aygün, Halis et al. | 2018
- 1985
-
Effective vehicle logo recognition in real-world application using mapreduce based convolutional neural networks with a pre-training strategyLi, Binquan / Hu, Xiaohui et al. | 2018
- 1995
-
Robust linear programming with IT2 rough coefficientsWang, Li / Jin, Lei et al. | 2018
- 2003
-
Supply chain coordination with controllable lead time under imperfect production processUdayakumar, R. / Geetha, K.V. et al. | 2018
- 2021
-
On sequential entropy of fuzzy systemsZhao, Yun / Cheng, Wen-Chiao / Ho, Chih-Chang et al. | 2018
- 2031
-
Cardinality inverse soft matrix theory and its applications in multicriteria group decision makingKamacı, Hüseyin / Saltık, Kader / Fulya Akız, Hürmet / Osman Atagün, Akın et al. | 2018
- 2051
-
Three-way decisions model based on rough fuzzy setZhai, Junhai / Zhang, Sufang et al. | 2018