- Editorial
Preface to the Special Issue on “Fuzzy Natural Logic in IFSA-EUSFLAT 2021”
- Vilém Novák and
- Antonín Dvořák
In [...]
2022 November-2 - 229 articles
In [...]
In this article, we examine the existence of Hilfer fractional
The unsaturated flow problem is of important applied background and its mixed finite element (MFE) method can be used to simultaneously calculate both water content and flux in soil, which is the most ideal calculation method. Nonetheless, it include...
Severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2) is a new virus which infects the respiratory system and causes the coronavirus disease 2019 (COVID-19). The coinfection between malaria and COVID-19 has been registered in many countries. T...
Even sustainable organizations have received overwhelming attention, but there is a lack of studies to explore the key success factors for sustainable traditional manufacturing based on expert opinions. The purpose of this study was to explore the ke...
Specializing Directed Acyclic Graph Federated Learning (SDAGFL) is a new federated learning framework with the advantages of decentralization, personalization, resisting a single point of failure, and poisoning attack. Instead of training a single gl...
In this paper, a gait classification method based on the deep belief network (DBN) optimized by the sparrow search algorithm (SSA) is proposed. The multiple features obtained based on surface electromyography (sEMG) are fused. These functions are use...
Focusing on the actuator fault of the quadrotor unmanned aerial vehicle (QUAV), an active fault-tolerant control scheme based on fixed-time linear active disturbance rejection control is proposed. Firstly, in order to simplify the complex dynamic mod...
Fixed-point results on covariant maps and contravariant maps in a
This article is mainly concerned with the fixed-time and predefined-time synchronization problem for a type of complex-valued BAM neural networks with stochastic perturbations and impulse effect. First, some previous fixed-time stability results on n...
Shewhart charts are the most commonly utilised control charts for process monitoring in industries with the assumption that the underlying distribution of the quality characteristic is normal. However, this assumption may not always hold true in prac...
As a kind of effective tool in solving complex optimization problems, intelligent optimization algorithms are paid more attention to their advantages of being easy to implement and their wide applicability. This paper proposes an enhanced northern go...
Relation extraction aims to predict the relation triple between the tail entity and head entity in a given text. A large body of works adopt meta-learning to address the few-shot issue faced by relation extraction, where each relation category only c...
(1) Background: This paper is devoted to the study of a class of semilinear initial boundary value problems of parabolic type. (2) Methods: We make use of fractional powers of analytic semigroups and the interpolation theory of compact linear operato...
Studies have reported several cases with respiratory viruses coinfection in hospitalized patients. Influenza A virus (IAV) mimics the Severe Acute Respiratory Syndrome Coronavirus 2 (SARS-CoV-2) with respect to seasonal occurrence, transmission route...
The randomized coordinate descent (RCD) method is a simple but powerful approach to solving inconsistent linear systems. In order to accelerate this approach, the Nesterov accelerated randomized coordinate descent method (NARCD) is proposed. The rand...
Irregularity indices are graph-theoretic parameters designed to quantify the irregularity in a graph. In this paper, we study the practical applicability of irregularity indices in QSPR modeling of the physicochemical and quantum-theoretic properties...
Seventeen sustainable development goals were formulated to create a harmonious world order for the benefit of different nations and peoples. At the same time, economic practice provides a lot of examples of conflicts of an economic nature between ind...
The aim of this paper is to approximate the fixed points of generalized
In this research article, a simple four-dimensional (4D) chaotic dynamic system with uncomplicated structure and only one nonlinear term is introduced. The features of the proposed design have been conducted with some standard nonlinear dynamic analy...
In this paper, we propose an unsupervised anomaly detection method based on the Autoencoder with Long Short-Term Memory (LSTM-Autoencoder) network and Generative Adversarial Network (GAN) to detect anomalies in industrial control system (ICS) using c...
In this paper, a relaxed variable metric primal-dual fixed-point algorithm is proposed for solving the convex optimization problem involving the sum of two convex functions where one is differentiable with the Lipschitz continuous gradient while the...
Through this article, we will discuss a new extension of the incomplete Wright hypergeometric matrix function by using the extended incomplete Pochhammer matrix symbol. First, we give a generalization of the extended incomplete Wright hypergeometric...
In this paper, we prove that for a set of ten univariate stochastic orders including the usual order, a univariate stochastic order preserves either both, one or none of additivity and multiplication properties over the vector space of real-valued ra...
In this paper, a new kind of mathematical modeling is studied by providing a five-compartmental system of differential equations with respect to new hybrid generalized fractal-fractional derivatives. For the first time, we design a model of giving up...
Bitcoin is yet to be assumed as a worthy cryptocurrency and rewarding asset in the global market. As polynomial-based neural networks (PBNNs) are very robust and more accurate in modeling stock price prediction, their advantage in Bitcoin pricing nee...
The game of pursuit and evasion, when played on graphs, is often referred to as the game of cops and robbers. This classical version of the game has been completely solved by Nowakowski and Winkler, who gave the exact class of graphs for which the pu...
With the aim of improving security in cities and reducing the number of crimes, this research proposes an algorithm that combines artificial intelligence (AI) and machine learning (ML) techniques to generate police patrol routes. Real data on crimes...
The random dumping of garbage in rivers has led to the continuous deterioration of water quality and affected people’s living environment. The accuracy of detection of garbage floating in rivers is greatly affected by factors such as floating s...
The novel concept of focality is introduced for Borel probability measures on compact Hausdorff topological spaces. We characterize focal Borel probability measures as those Borel probability measures that are strictly positive on every nonempty open...
The latest achievements in the field of reinforcement learning have encouraged the development of vision-based learning methods that compete with human-provided results obtained on various games and training environments. Convolutional neural network...
Reporting the empirical results of swarm and evolutionary computation algorithms is a challenging task with many possible difficulties. These difficulties stem from the stochastic nature of such algorithms, as well as their inability to guarantee an...
The effect of the COVID-19 pandemic on crude oil prices just faded; at this moment, the Russia–Ukraine war brought a new crisis. In this paper, a new application is developed that predicts the change in crude oil prices by incorporating these t...
In this paper, the Heisenberg doubles and Long dimodules of a BiHom-Hopf algebra are introduced. Then, we discussed the relation between BiHom-Hopf equation and BiHom-pentagon equation, and we obtain the solutions of BiHom-Hopf equation from Heisenbe...
This paper deals with new methods capable of solving the optimization problem concerning the allocation of DNA samples in plates in order to carry out the DNA sequencing with the Sanger technique. These methods make it possible to work with independe...
Artificial intelligence (AI) and cognitive computing (CC) are different, which is why each technology has its advantages and disadvantages, depending on the task/operation that a business wants to optimize. Nowadays, it is easy to confuse both by sim...
Due to the shortcomings of the standard bat algorithm (BA) for multi-parameter optimization, an improved bat algorithm is proposed. The benchmark function test shows that the proposed algorithm has better realization of high-dimensional function opti...
This article presents the results of the implementation of a forecasting model, to predict the relief materials needed for assisting in decisions prior to natural disasters, thus filling a gap in the exploration of Generalized Linear Mixed Models (GL...
In this study, we look at the wavelet basis for the nonparametric estimation of density and regression functions for continuous functional stationary processes in Hilbert space. The mean integrated squared error for a small subset is established. We...
In this paper, we prove the Hyers–Ulam stability and generalized Hyers–Ulam stability of
Previous studies have shown that bus drivers are a major contributing factor to bus accidents. The aim of this study is to explore the factors that contribute to the presence of accident propensity among bus drivers, as well as the relative importanc...
Comparative results of calculation and measurement of the frequency responses of the surface acoustic waves filter on a piezoelectric substrate of 64°YX-cut lithium niobate and delay line on a piezoelectric substrate of 128°YX-cut lithium nio...
Surface defect inspection is a key technique in industrial product assessments. Compared with other visual applications, industrial defect inspection suffers from a small sample problem and a lack of labeled data. Therefore, conventional deep-learnin...
The sand cat swarm optimization algorithm (SCSO) is a recently proposed metaheuristic optimization algorithm. It stimulates the hunting behavior of the sand cat, which attacks or searches for prey according to the sound frequency; each sand cat aims...
On the basis of network analysis, and within the context of modeling imprecision or vague information with fuzzy sets, we propose an innovative way to analyze, aggregate and apply this uncertain knowledge into community detection of real-life problem...
We consider the Sturm–Liouville equation on a finite interval with a real-valued integrable potential and propose a method for solving the following general inverse problem. We recover the potential from a given set of the output boundary value...
Bluetooth low energy (LE) devices have been widely used in the Internet of Things (IoT) and wireless personal area networks (WPAN). However, attackers may compromise user privacy by tracking the addresses of the LE device. The resolvable private addr...
Image translation is a classic problem of image processing and computer vision for transforming an image from one domain to another by learning the mapping between an input image and an output image. A novel Multi-scale Residual Generative Adversaria...
Recurrent neural network (RNN) models continue the theory of the autoregression integrated moving average (ARIMA) model class. In this paper, we consider the architecture of the RNN with embedded memory—«Process of Nonlinear Autoregressiv...
During the height of the COVID-19 epidemic, production lagged and enterprises could not deliver goods on time, which will bring considerable risks to the supply chain system. Modeling risk diffusion in supply chain networks is important for predictio...
of 5