Sunday, February 4, 2018

Soft Computing, Volume 22, Issue 3, February 2018

1. A quantum-inspired version of the nearest mean classifier
Author(s): Giuseppe Sergioli, Enrica Santucci, Luca Didaci, Jarosław A. Miszczak
Pages: 691-705

2. Fuzzy encryption in cloud computation: efficient verifiable outsourced attribute-based encryption
Author(s): Jing Li, Xiong Li, Licheng Wang, Debiao He, Haseeb Ahmad, Xinxin Niu
Pages: 707-714

3. Human Strategy (HS) Optimization Algorithm
Author(s): M. A. Soltani-Sarvestani, Zohreh Azimifar, Ali Hamzeh
Pages: 715-735

4. Off-policy temporal difference learning with distribution adaptation in fast mixing chains
Author(s): Arash Givchi, Maziar Palhang
Pages: 737-750

5. Deontic STIT logic, from logical paradox to security policy
Author(s): Lirong Qiu, Xin Sun
Pages: 751-757

6. Optimizing force closure grasps on 3D objects using a modified genetic algorithm
Author(s): V. Rakesh, Utkarsh Sharma, S. Murugan, S. Venugopal, T. Asokan
Pages: 759-772

7. Numerical investigation for handling fractional-order Rabinovich–Fabrikant model using the multistep approach
Author(s): Khaled Moaddy, Asad Freihat, Mohammed Al-Smadi, Eman Abuteen
Pages: 773-782

8. CS-PSO: chaotic particle swarm optimization algorithm for solving combinatorial optimization problems
Author(s): Xiaolong Xu, Hanzhong Rong, Marcello Trovati, Mark Liptrott, Nik Bessis
Pages: 783-795

9. Multiple attribute decision-making method based on 2-dimension uncertain linguistic density generalized hybrid weighted averaging operator
Author(s): Peide Liu, Fei Teng
Pages: 797-810

10. Feature selection for high-dimensional classification using a competitive swarm optimizer
Author(s): Shenkai Gu, Ran Cheng, Yaochu Jin
Pages: 811-822

11. Combining a continuous location model and Heuristic techniques to determine oilfield warehouse locations under future oil well location uncertainty
Author(s): Haixiang Guo, Wenwen Pan, Xiao Liu, Yijing Li, Bo Zeng
Pages: 823-837

12. Kripke semantics for fuzzy logics
Author(s): Parvin Safari, Saeed Salehi
Pages: 839-844

13. Heuristic routing algorithm toward scalable distributed generalized assignment problem
Author(s): Yang Xu, Xiaofeng Wang, Tingting Sun
Pages: 845-859

14. Self-adaptive kernel K-means algorithm based on the shuffled frog leaping algorithm
Author(s): Shuyan Fan, Shifei Ding, Yu Xue
Pages: 861-872

15. A neural network-based approach for steady-state modelling and simulation of continuous balling process
Author(s): Mohammad Nadeem, Haider Banka, R. Venugopal
Pages: 873-887

16. Edge-enhanced bi-dimensional empirical mode decomposition-based emotion recognition using fusion of feature set
Author(s): Arghya Bhattacharya, Dwaipayan Choudhury, Debangshu Dey
Pages: 889-903

17. A new portfolio selection model with interval-typed random variables and the empirical analysis
Author(s): Chunquan Li, Jianhua Jin
Pages: 905-920

18. Continuous fitness landscape analysis using a chaos-based random walk algorithm
Author(s): Nanda Dulal Jana, Jaya Sil, Swagatam Das
Pages: 921-948

19. A new approach to optimize a hub covering location problem with a queue estimation component using genetic programming
Author(s): Hamid Hasanzadeh, Mahdi Bashiri, Amirhossein Amiri
Pages: 949-961

20. A model for providing emotion awareness and feedback using fuzzy logic in online learning
Author(s): Marta Arguedas, Fatos Xhafa, Luis Casillas, Thanasis Daradoumis
Pages: 963-977

21. Adaptive neural model optimized by modified differential evolution for identifying 5-DOF robot manipulator dynamic system
Author(s): Nguyen Ngoc Son, Ho Pham Huy Anh, Truong Dinh Chau
Pages: 979-988

22. Picture 2-tuple linguistic aggregation operators in multiple attribute decision making
Author(s): Guiwu Wei, Fuad E. Alsaadi, Tasawar Hayat, Ahmed Alsaedi
Pages: 989-1002

23. Uncertain weighted dominating set: a prototype application on natural disaster relief management
Author(s): Mehdi Djahangiri, Alireza Ghaffari-Hadigheh
Pages: 1003-1012

24. A secure transaction of cloud data using conditional source trust attributes encryption mechanism
Author(s): Thomas Brindha, Ramaswamy Swarnammal Shaji
Pages: 1013-1022

25. Session-aware music recommendation via a generative model approach
Author(s): Zhao-quan Cai, Hui Hu
Pages: 1023-1031

1 comment:

  1. Soft computing is based on some biological induced methods such as genetics, development, ant ehavior, the warm of particles, the human nervous system, etc.


Note: Only a member of this blog may post a comment.