You are viewing a javascript disabled version of the site. Please enable Javascript for this site to function properly.
Go to headerGo to navigationGo to searchGo to contentsGo to footer
In content section. Select this link to jump to navigation

Author Index Volume 31 (2016)

The issue number is given in front of the pagination

Abbas, H., M. Yasin, F. Ahmed, A. Sajid, F.A. Khan, R.A.R. Ashfaq and N. Al Hasan Haldar, Forensic artifacts modeling for social media client applications to enhance investigatory learning mechanisms (5) 2645–2658

Abd El-latif, A.M., Soft supra strongly generalized closed sets (3) 1311–1317

Abdullah, S., see Qayyum, A. (3) 1585–1596

Abed, I.E., see Selvachandran, G. (1) 55–68

Aboutorabi, S., see Yousefian, R. (1) 137–149

Afzal, M.T., see Imran, M. (2) 837–847

Agarwal, R.K., see Wang, G. (1) 391–403

Aggarwal, S. and U. Sharma, Implementing deviation degree of two closed intervals to decode fully fuzzy multiobjective linear programming problem (1) 443–455

Agnihotri, S.P. and L.M. Waghmare, Optimal tuning of PID controller with time delay system using CS and SRMR technique (3) 1287–1297

Ahlatcioglu, M., I. Albayrak, H.G. Kocken and B.A. Ozkok, A mixed integer programming approach to a square fully fuzzy linear equation (3) 2009–2015

Ahlatcioglu, M., see Ozkok, B.A. (1) 623–632

Ahmad, I., see Karaaslan, F. (1) 651–662

Ahmed, E., see Al-Garadi, M.A. (5) 2721–2735

Ahmed, F., see Abbas, H. (5) 2645–2658

Ahmed, M.A., see Ali, J. (3) 2027–2033

Ahmed, S.H., see Yang, J. (5) 2473–2481

Ahmed, S.H., see Zhou, J. (5) 2463–2471

Ahn, J., see Choi, H. (6) 3197–3202

Aiping, J., see Yue, L. (2) 825–836

Akande, K.O., see Owolabi, T.O. (1) 519–527

Akbaş, S. and T.E. Dalkiliç, Evaluation of trapezoidal fuzzy numbers on AHP based solution of multi-objective programming problems (3) 1869–1879

Akram, M., see Shahzadi, S. (3) 1881–1895

Al Hasan Haldar, N., see Abbas, H. (5) 2645–2658

Albayrak, I., see Ahlatcioglu, M. (3) 2009–2015

Albayrak, I., see Ozkok, B.A. (1) 623–632

Al-Garadi, M.A., K.D. Varathan, S.D. Ravana, E. Ahmed and V. Chang, Identifying the influential spreaders in multilayer interactions of online social networks (5) 2721–2735

Ali, J., M.A. Ahmed and H.A. Nafadi, Common fixed points for hybrid pairs of maps in modified intuitionistic fuzzy metric spaces (3) 2027–2033

Altinok, H. and D. Yagdiran, Lacunary statistical convergence of order β in difference sequences of fuzzy numbers (1) 227–235

Altunkaynak, A. and H.G. Elmazoghi, Neuro-fuzzy models for prediction of breach formation time of embankment dams (3) 1929–1940

Appadoo, S.S., see Gupta, G. (1) 213–215

Arun, N.K. and B.M. Mohan, Modeling, stability analysis and computational aspects of nonlinear fuzzy PID controllers (3) 1807–1818

Asghar, S., see Usman, M. (3) 1759–1768

Ashfaq, R.A.R., see Abbas, H. (5) 2645–2658

Aslam, M., see Qayyum, A. (3) 1585–1596

Aurora, A., see Guan, S. (4) 2213–2220

Bahrami, V., M. Mansouri and M. Teshnehlab, Designing robust model reference hybrid fuzzy controller based on LYAPUNOV for a class of nonlinear systems (3) 1545–1564

Bai, K., M. Luo, T. Li, J. Wu, L. Yang, M. Liu and G. Jiang, Active vibration adaptive fuzzy backstepping control of a 7-DOF dual-arm of humanoid robot with input saturation (6) 2949–2957

Bai, S.-Z., see Wu, X.-Y. (1) 333–344

Bai, Y., see Yang, L. (5) 2713–2720

Bao, J., J. Zhang, F. Li, C. Liu and S. Shi, Social benefits of the mine occupational health and safety management systems of mines in China and Sweden based on a fuzzy analytic hierarchy process: A comparative study (6) 3113–3120

Baowen, L., see Chuantao, W. (4) 2203–2212

Basligil, H., see Ozdemir, Y. (1) 589–600

Bastos-Filho, C.J.A., see de Oliveira, L.F.F. (3) 1513–1520

Basu, K., see Mandal, K. (3) 1721–1730

Baykasoğlu, A. and Z.D.U. Durmuşoğlu, A multi-agent based approach to modeling and solving dynamic generalized travelling salesman problem (1) 77–90

Bedregal, B., see Silva Farias, A.D. (3) 1795–1806

Beg, I., see De, S.K. (1) 469–477

Behzadi, S.S., see Vahdani, B. (3) 1521–1534

Bhardwaj, A.K., Y. Gajpal and M. Singh, Fuzzy reliability analysis of integrated network traffic visualization system (3) 1941–1953

Bie, R., see Mehmood, R. (5) 2619–2628

Bo, L., X. Luo and H. Wang, Adaptive weighted guided image filtering for image denoising based on artificial swarm optimization (4) 2137–2146

Bo, W., see Hong-Li, Z. (3) 1745–1757

Borzooei, R.A. and S.S. Goraghani, Free MV-Modules (1) 151–161

Borzooei, R.A., H. Rashmanlou, S. Samanta and M. Pal, New concepts of vague competition graphs (1) 69–75

Brown, M., see Li, W. (5) 2583–2595

Çağman, N., see Touqeer, M. (3) 2051–2058

Cai, K., An intelligent NIR camera calibration method for optical surgical navigation system (4) 2091–2100

Cai, K., see Huang, H. (4) 2119–2127

Cai, K., see Yue, H. (4) 2129–2135

Cai, L., W. Cai, C. Zhu, S. Chen and Z. Mengting, An optimal penalty in an environmental pollution game with the suspension of production (4) 2321–2333

Cai, W., see Cai, L. (4) 2321–2333

Cai, W., see Xiong, Z. (4) 2421–2429

Cao, B., see Luo, J. (2) 967–978

Cao, B., Y. Kang, S. Lin, X. Luo, S. Xu and Z. Lv, Style-sensitive 3D model retrieval through sketch-based queries (5) 2637–2644

Cao, B., Y. Kang, S. Lin, X. Luo, S. Xu, Z. Lv and Y. Xue, A novel 3D model retrieval system based on three-view sketches (5) 2675–2683

Cao, J., see Tian, W. (5) 2525–2531

Cao, N., see Wang, Z. (6) 3067–3074

Cao, S., Y. Wang and J. Li, Approximation of fuzzy neural networks based on Choquet integral (2) 691–698

Cao, S., Y. Wang and J. Li, Regularity of fuzzy measures on complete and separable metric spaces (2) 707–716

Cao, Y., see Fan, J. (4) 2195–2202

Careglio, C., see Pacini, E. (3) 1731–1743

Carter, C., see Melthis, J. (5) 2685–2696

Chai, R., see Gong, Z. (3) 1621–1633

Chakraverty, S., see Nayak, S. (1) 555–563

Chan, G.-Y., F.-F. Chua and C.-S. Lee, Intrusion detection and prevention of web service attacks for software as a service: Fuzzy association rules vs fuzzy associative patterns (2) 749–764

Chang, E.-C., Adaptive neuro-fuzzy nonsingular terminal attractor and its application in high-performance AC power conditioners (6) 3007–3012

Chang, V., see Al-Garadi, M.A. (5) 2721–2735

Chen, A., see Zhang, Y. (3) 1609–1620

Chen, G., see Jiang, D. (5) 2483–2495

Chen, H., see Yue, H. (4) 2129–2135

Chen, H., see Zhang, F. (6) 2985–2997

Chen, J., Y. Gao, C. Su, P. Li, D. Fu and Y. Leng, Group intelligence-based decision making and its applications to traditional chinese medical dysphagia rehabilitation treatment (6) 3181–3195

Chen, K., see Li, X. (6) 3083–3093

Chen, K.-J., Y. Chen, Y. Li and J. Han, A supervised link prediction method for dynamic networks (1) 291–299

Chen, M., see Wang, Z. (6) 3067–3074

Chen, N., see Shi, B. (6) 3095–3102

Chen, S. and B. Huang, Inferring popular locations in urban for professional education (5) 2565–2572

Chen, S. see Cai, L. (4) 2321–2333

Chen, S., B. Li, B. Li and J. Dong, Improving the dendritic lattice neural network by utilizing a fuzzy inclusion measure (6) 2821–2827

Chen, W., see Wang, F. (5) 2573–2581

Chen, X., L.-s. Xu and M. Xu, Adaptive control system for grouting pressure stability based on fuzzy algorithm (4) 2231–2239

Chen, Y., see Chen, K.-J. (1) 291–299

Chen, Y., see Huang, Z. (3) 1469–1480

Chen, Y., see Li, C. (2) 1145–1152

Chen, Y., see Liu, S., (3) 1365–1375

Chen, Y., see Tao, Y. (6) 2975–2983

Chen, Y., see Yang, L. (6) 3131–3142

Chen, Y.-W., see Wang, T. (2) 903–913

Chen, Z., see Zhang, Z. (6) 3103–3111

Cheng, A., see Xie, Y. (5) 2737–2743

Cheng, C.-H. and J.-H. Yang, A novel rainfall forecast model based on the integrated non-linear attribute selection method and support vector regression (2) 915–925

Cheng, H., Modeling and querying fuzzy spatiotemporal objects (6) 2851–2858

Cheng, L., see Tian, W. (5) 2525–2531

Cheng, S., see Saleh, A. (5) 2511–2523

Chengyi, W., see Xiaoling, D. (4) 2313–2320

Chi, H., see Gou, J. (6) 2839–2850

Chiu, C.-S., see Lian, K.-Y. (3) 1499–1511

Choi, H., K. Han, K. Choi and J. Ahn, A fuzzy medical diagnosis based on quantiles of diagnostic measures (6) 3197–3202

Choi, K., see Choi, H. (6) 3197–3202

Chu, J., X. Liu and Y. Wang, Social network analysis based approach to group decision making problem with fuzzy preference relations (3) 1271–1285

Chu, X., see Li, C. (2) 1145–1152

Chua, F.-F., see Chan, G.-Y. (2) 749–764

Chuantao, W., C. Xiaofei and L. Baowen, Fuzzy comprehensive evaluation based on multi-attribute group decision making for business intelligence system (4) 2203–2212

Chunling, Z., see Xiaoshen, L. (2) 727–736

Cosker, D., see Li, W. (5) 2583–2595

Cui, C., H. Jia, L. Huang and X. Zhang, Fuzzy multivariate NARX model for passenger entrance flow prediction in the Shanghai subway system (6) 3047–3054

Dai, J., G. Zheng, Q. Hu, M. Liu and H. Su, Decision-theoretic rough set approach for fuzzy decisions based on fuzzy probability measure and decision making (3) 1341–1353

Dai, L. and J. Li, Study on the quality of private university education based on analytic hierarchy process and fuzzy comprehensive evaluation method (4) 2241–2247

Dai, L., see Gong, Y. (3) 1921–1927

Dai, L., see Gong, Y. (6) 2927–2933

Dai, Q., see Wei, M. (6) 3039–3046

Dalkiliç, T.E., see Akbaş, S. (3) 1869–1879

Dang, S., see Jiang, D. (5) 2483–2495

Daraby, B., Z. Solimani and A. Rahimi, A note on fuzzy Hilbert spaces (1) 313–319

Das, B., see De, M. (3) 1481–1497

Davvaz, B., see Farshi, M. (1) 379–390

Dawood, H., see Mehmood, R. (5) 2619–2628

de Araújo Lopes, L.R., see Silva Farias, A.D. (3) 1795–1806

de Lima, F.B., see de Oliveira, L.F.F. (3) 1513–1520

de Oliveira, L.F.F., F.B. de Lima, S.C. Oliveira and C.J.A. Bastos-Filho, A fuzzy-swarm based approach for the coordination of unmanned aerial vehicles (3) 1513–1520

De, M., B. Das and M. Maiti, An EPL model with reliability-dependent randomly imperfect production system over different uncertain finite time horizons (3) 1481–1497

De, S.K. and I. Beg, Triangular dense fuzzy sets and new defuzzification methods (1) 469–477

Dehnavi, S.D., see Ghaedi, A. (3) 1329–1340

Demiriz, A. and B. Ekizoğlu, Fuzzy rule-based analysis of spatio-temporal ATM usage data for fraud detection and prevention (2) 805–813

Deng, X., Y. Pan, H. Shen and J. Gui, Credit distribution for influence maximization in online social networks with node features (2) 979–990

Deng, Z. and J. Zhou, P3DP: privacy preserving provable data possession with multi-copy and data dynamics in a cloud storage (2) 1065–1078

Dessouky, M.I., see El-Fouly, F.H. (1) 99–113

Dimitrijević, D., -D. Obradović, N. Nedić and I. Luković, Automatic idiopathic scoliosis screening using low-cost commodity sensors (4) 2073–2082

Ding, L., see Jianjun, W. (4) 2341–2347

Djukić, M. and A. Tepavčević, Poset valued intuitionistic fuzzy sets (1) 547–553

Do, M.T., see Wang, H. (2) 885–902

Dong, H., see Wang, X. (6) 3013–3019

Dong, H., see Wei, L. (4) 2375–2382

Dong, J., see Chen, S. (6) 2821–2827

Dong, L., see Hong-Li, Z. (3) 1745–1757

Dong, R., see Qiu, D. (1) 45–54

Dong, Y., see Xian, S (3) 1189–1197.

Dou, Y., see Lv, Q. (2) 1017–1028

Du, B., see Wu, J.-Z. (3) 1447–1457

Du, F., see Li, T. (6) 2759–2765

Du, L. and J. Gao, Models for real estate investment decision-making with hesitant fuzzy information (3) 1779–1785

Du, Y., see Shao, W. (4) 2159–2165

Durmuşoğlu, Z.D.U., see Baykasoğlu, A. (1) 77–90

Ekizoğlu, B., see Demiriz, A. (2) 805–813

Ekker, K., Emergency management training: Handling rich qualitative and quantitative data (2) 939–948

El-Fouly, F.H., R.A. Ramadan, M.I. Mahmoud and M.I. Dessouky, Resource aware and reliable data reporting algorithm for object tracking in WSNs (1) 99–113

Elmazoghi, H.G., see Altunkaynak, A. (3) 1929–1940

El-Saady, K., A non-commutative approach to uniform structures (1) 217–225

Er-Pin, Z., see Hong-Li, Z. (3) 1745–1757

Eslami, E., see Maroof, F.G. (3) 1263–1270

Eslami, E., see Najafi, A. (1) 357–366

Falehi, A.D., N. Piran and M. Pourgholi, HFAGC based on MOPSO technique: Optimal design, comparison, verification (3) 1199–1209

Fan, D., see Yang, J. (5) 2473–2481

Fan, J., L. Zhou, Y. Cao and Z. Gu, Health evaluation of a regional logistics industrial ecosystem in China based on fuzzy matter-element analysis method (4) 2195–2202

Fan, Z., see Gou, J. (6) 2839–2850

Fang, R., M. Wu and S. Jiang, On-line status assessment of wind turbines based on improved fuzzy comprehensive evaluation method (6) 2813–2819

Farahani, H., H.M. Nehi and M. Paripour, Solving fuzzy complex system of linear equations using eigenvalue method (3) 1689–1699

Farshi, M. and B. Davvaz, Multiplicative F(m,n)-Hyperrings (1) 379–390

Fei, J., see Hou, S. (3) 1859–1868

Fei, X., K. Li and W. Yang, A fast parallel cryptography algorithm based on AES-NI (2) 1099–1107

Feng, G., see Li, J.-q. (5) 2697–2706

Feng, H., see Jin, J. (4) 2167–2175

Feng, J., see Wei, C. (2) 765–774

Feng, Z., see Li, G. (4) 2249–2256

Fotoohabadi, H., see Ghaedi, A. (3) 1329–1340

Fu, D., see Chen, J. (6) 3181–3195

Fu, X.-h., see Li, J.-q. (5) 2697–2706

Fu, Y., see Xin, X. (3) 1299–1309

Gajpal, Y., see Bhardwaj, A.K. (3) 1941–1953

Gao, J., see Du, L. (3) 1779–1785

Gao, J., see Tao, Y. (6) 2975–2983

Gao, R. and Y. Sheng, Law of large numbers for uncertain random variables with different chance distributions (3) 1227–1234

Gao, W., L. Zhu and K. Wang, Ranking based ontology scheming using eigenpair computation (4) 2411–2419

Gao, X.-Y., B. Pang and X.-F. Yang, Extensional L-fuzzy Q-convergence structures (3) 1701–1708

Gao, Y., see Chen, J. (6) 3181–3195

Gao, Z., J. Wang, H. Hu and Y. Sun, Control mode switching strategy for ACC based on intuitionistic fuzzy set multi-attribute decision making method (6) 2967–2974

Garg, H., A novel accuracy function under interval-valued Pythagorean fuzzy environment for solving multicriteria decision making problem (1) 529–540

Garino, C.G., see Pacini, E. (3) 1731–1743

Gavrilov, A., see Sun, S. (6) 2757–2758

Ge, X., see Jiang, D. (5) 2497–2509

Georges, H.M., see Xiang, Z. (2) 815–823

Ghaedi, A., S.D. Dehnavi and H. Fotoohabadi, Probabilistic scheduling of smart electric grids considering plug-in hybrid electric vehicles (3) 1329–1340

Ghareeb, A. and F.-G. Shi, SP-compactness and SP-connectedness degree in L-fuzzy pretopological spaces (3) 1435–1445

Ghorai, G. and M. Pal, Faces and dual of m-polar fuzzy planar graphs (3) 2043–2049

Gnana King, G.R. and J.H. Jensha Haennah, Hybrid compression scheme using precoding block and fast stationary wavelet transformation (1) 415–421

Gong, Y., L. Dai and N. Hu, An extended minimax absolute and relative disparity approach to obtain the OWA operator weights (3) 1921–1927

Gong, Y., S. Yang and L. Dai, The NOWA weighted sampling type-reduction method for interval type-2 fuzzy sets and its application (6) 2927–2933

Gong, Z. and R. Chai, Covering multigranulation trapezoidal fuzzy decision-theoretic rough fuzzy set models and applications (3) 1621–1633

Goraghani, S.S., see Borzooei, R.A. (1) 151–161

Gou, J., Z. Fan, C. Wang, W. Luo and H. Chi, An improved Wang-Mendel method based on the FSFDP clustering algorithm and sample correlation (6) 2839–2850

Gu, B., see Li, M. (4) 2101–2108

Gu, L., see Jin, J. (4) 2167–2175

Gu, Z., see Fan, J. (4) 2195–2202

Guan, F., D. Xie and Q. Zhang, A matching value for cooperative games (1) 201–212

Guan, H., S. Guan and A. Zhao, Intuitionistic fuzzy linguistic soft sets and their application in multi-attribute decision-making (6) 2869–2879

Guan, H., see Wu, X. (6) 2859–2868

Guan, H., see Zhao, A. (6) 2795–2806

Guan, H.-L., An evolution model for regional collaborative innovation under the perspective of complex network (3) 1319–1328

Guan, S., J. Yun, Q. Zhang and A. Aurora, Intelligent transportation system contributions to the operating efficiency of Urban traffic (4) 2213–2220

Guan, S., see Guan, H. (6) 2869–2879

Guan, S., see Zhao, A. (6) 2795–2806

Guan, T., see Lin, H. (2) 699–706

Gui, J., see Deng, X. (2) 979–990

Guo, H., H. Liu, C. Wu, W. Zhi, Y. Xiao and W. She, Logistic discrimination based on G-mean and F-measure for imbalanced problem (3) 1155–1166

Guo, K., see Song, S. (6) 2941–2948

Guo, P., see Lin, H. (2) 699–706

Guo, X., see Liu, S., (3) 1365–1375

Guo, Y., see Zhang, Y. (6) 2807–2812

Gupta, G., A. Kumar and S.S. Appadoo, A note on “Ranking generalized exponential trapezoidal fuzzy numbers based on variance” (1) 213–215

Hadi-Vencheh, A., see Taassori, M. (1) 27–43

Hafezalkotob, A. and A. Hafezalkotob, Fuzzy entropy-weighted MULTIMOORA method for materials selection (3) 1211–1226

Hafezalkotob, A., see Hafezalkotob, A. (3) 1211–1226

Hamidi, M. and A.B. Saeid, Relations and homomorphisms of fuzzy hyper BE–subalgebras (3) 1565–1578

Han, B., see Lin, H. (2) 717–725

Han, F., see Zhang, S. (4) 2147–2157

Han, H. and Q. Li, On Δ-fuzzy rough sets: Representation, special cases and induced topology (3) 1397–1406

Han, J., see Chen, K.-J. (1) 291–299

Han, K., see Choi, H. (6) 3197–3202

Han, X., see Wang, T. (2) 903–913

Han, Y., see Jiang, D. (5) 2497–2509

Hanneghan, M., see Melthis, J. (5) 2685–2696

Hao, X., M. Niu, Y. Wang and Z. Wang, Constructing conjunctive left (right) semi-uninorms and implications satisfying the neutrality principle (3) 1819–1929

Haotian, W., see Ke, W. (4) 2291–2298

Hattori, T., see Wang, T. (2) 903–913

He, P., see Wang, H. (2) 885–902

He, P., see Xin, X. (3) 1299–1309

He, S., see Xiong, Z. (3) 1769–1778

He, Y., see Xie, Y. (5) 2737–2743

Hevin Rajesh, D. and B. Paramasivan, Cluster based secure authentication technique using ant colony optimization in wireless sensor networks (1) 423–432

Hijazi, I., see Saleh, A. (5) 2511–2523

Hong, C.U., see Yang, G. (6) 3171–3179

Hong, Y., see Yue, Q. (6) 2903–2910

Hong-Li, Z., Z. Yu-Yi, L. Shu-Lin, L. Dong, W. Bo, S. Kun-Ju and Z. Er-Pin, A Mass Optimizing Group Identification Classification Algorithm (MOGICA) used for intelligent fault diagnosis (3) 1745–1757

Hou, S. and J. Fei, T-S fuzzy model based adaptive fuzzy current tracking control of three-phase active power filter (3) 1859–1868

Hu, B.Q., see Xiao, Y.C. (3) 1385–1395

Hu, H., see Gao, Z. (6) 2967–2974

Hu, L., J. Yang and J. Huang, The real-time shortest path algorithm with a consideration of traffic-light (4) 2403–2410

Hu, N., see Gong, Y. (3) 1921–1927

Hu, Q., see Dai, J. (3) 1341–1353

Hu, Y., see Zhang, Z. (6) 3103–3111

Hua, X. and X. Xin, Rough soft lattices and generalized fuzzy soft lattices (1) 479–485

Huang, B., see Chen, S. (5) 2565–2572

Huang, B., see Zhang, P. (4) 2281–2290

Huang, H., and K. Cai, A method of fuzzy multiple attribute decision making based on the error-eliminating theory (4) 2119–2127

Huang, H., see Li, L. (3) 1355–1363

Huang, J., see Hu, L. (4) 2403–2410

Huang, L., B. Zhang, X. Yuan, C. Zhang and A. Ma, A novel Bi-Ant colony optimization algorithm for solving multi-objective service selection problem (2) 873–884

Huang, L., see Cui, C. (6) 3047–3054

Huang, P., see Kang, Z.L. (4) 2083–2089

Huang, P., see Xu, L.J. (4) 2109–2117

Huang, S., see Hui, Z.-W. (4) 2349–2361

Huang, T., see Zheng, Z. (5) 2611–2618

Huang, W., see Song, Y. (3) 1653–1668

Huang, Z. and Y. Chen, An improving SRL model with word sense information using an improved synergetic neural network model (3) 1469–1480

Hui, Z.-W., S. Huang and M.-Y. Ji, A runtime-testing method for integer overflow detection based on metamorphic relations (4) 2349–2361

Huiyun, W., and W. Yuping, A clustering with slope algorithm based on item similarity (4) 2177–2185

Hung, J.-C., Fuzzy support vector regression model for forecasting stock market volatility (3) 1987–2000

Hussain, S., see Jamwal, P.K. (3) 1897–1908

Imran, M., M.T. Afzal and M.A. Qadir, Malware classification using dynamic features and Hidden Markov Model (2) 837–847

Ionita, S., see Sun, S. (6) 2757–2758

Ishizaki, Y., see Wang, T. (2) 903–913

Jabari, M., see Khorramnia, R. (1) 173–183

Jahromi, M.K., see Khorramnia, R. (1) 173–183

Jain, A. and K.R. Pardasani, Fuzzy soft set model for mining amino acid associations in peptide sequences of Mycobacterium tuberculosis complex (MTBC) (1) 259–273

Jamwal, P.K. and S. Hussain, Design optimization of a cable actuated parallel ankle rehabilitation robot: A fuzzy based multi-objective evolutionary approach (3) 1897–1908

Jana, C., T. Senapati and M. Pal, (ɛ,ɛ ∨q)-intuitionistic fuzzy BCI-subalgebras of a BCI-algebra (1) 613–621

Jemaï, K., Intelligent integration strategies of wind farms in a super grid (1) 275–290

Jensha Haennah, J.H., see Gnana King, G.R. (1) 415–421

Jerome, S.A., see Shanthi, S.A. (1) 237–247

Ji, F., F. Wu, B. Wang and T. Zhang, Research on the innovation ability evaluation of traditional enterprise’s business model for internet transition with hesitant fuzzy information (1) 91–97

Ji, L., see Wang, X. (6) 3155–3162

Ji, M.-Y., see Hui, Z.-W. (4) 2349–2361

Jia, H., see Cui, C. (6) 3047–3054

Jiang, B., C. Yang, L. Wang and R. Li, Mining multiplex power-law distributions and retweeting patterns on twitter (2) 1009–1016

Jiang, D., J. Liu, Z. Lv, S. Dang, G. Chen and L. Shi, A robust energy-efficient routing algorithm to cloud computing networks for learning (5) 2483–2495

Jiang, D., see Wei, S. (1) 601–611

Jiang, D., Y. Han, Z. Lv, L. Miao, T. Zhu and X. Ge, Dynamic access approach to multiple channels in pervasive wireless multimedia communications for technology enhanced learning (5) 2497–2509

Jiang, G., see Bai, K. (6) 2949–2957

Jiang, S. and L. Wang, A clustering-based feature selection via feature separability (2) 927–937

Jiang, S., see Fang, R. (6) 2813–2819

Jiang, W., see Zheng, W. (2) 957–965

Jiang, Z., Evaluation of emergency risk management capability based on hesitant fuzzy Einstein operator (4) 2307–2311

Jianguo, Z., see Yue, L. (2) 825–836

Jianjun, W., L. Li and L. Ding, Application of SVR with backtracking search algorithm for long-term load forecasting (4) 2341–2347

Jiao, L., see Mehmood, R. (5) 2619–2628

Jiazhou, Z., see Yue, L. (2) 825–836

Jin, H., Y. Li, B. Xing and L. Wang, A geometric image segmentation method based on a bi-convex, fuzzy, variational principle with teaching-learning optimization (6) 3075–3081

Jin, J., H. Feng and L. Gu, Design and implementation of an intelligent exam management system based on B/S structure for Hebei University (4) 2167–2175

Jin, J., see Wu, J.-Z. (3) 1447–1457

Jin, Q. and L. Li, One-axiom characterizations on lattice-valued closure (interior) operators (3) 1679–1688

Jing, M., see Tong, Z. (2) 1053–1063

Jinlong, L., see Ke, W. (4) 2291–2298

Jun, Y.B. and S.Z. Song, Starshaped (ɛ, ɛ∨q)-fuzzy sets (3) 1257–1262

Junjun, G., see Yue, L. (2) 825–836

Kadji, A. and M. Tonga, Some new axiomatic extensions of residuated logics (1) 1–12

Kalra, N. and A. Kumar, Fuzzy state grammar and fuzzy deep pushdown automaton (1) 249–258

Kang, Y., see Cao, B. (5) 2637–2644

Kang, Y., see Cao, B. (5) 2675–2683

Kang, Z.L., L.J. Xu, Y. Li and P. Huang, Development of intelligent soilless culture device (4) 2083–2089

Kang, Z.L., see Xu, L.J. (4) 2109–2117

Karaaslan, F. and S. Karataş, OR and AND-products of ifp-intuitionistic fuzzy soft sets and their applications in decision making (3) 1427–1434

Karaaslan, F., I. Ahmad and A. Ullah, Bipolar soft groups (1) 651–662

Karataş, S., see Karaaslan, F. (3) 1427–1434

Kaur, J.J. and A. Kumar, Mehar and Keerat method for solving system of fuzzy complex linear equations (3) 1955–1965

Ke, W., Z. Wen, W. Haotian, W. Yajun and L. Jinlong, Study of impact of metro station side-crossing on adjecent existing underground structure (4) 2291–2298

Khan, F.A., see Abbas, H. (5) 2645–2658

Khan, M.S.L., H. Li and S. Réhman, Telepresence Mechatronic Robot (TEBoT): Towards the design and control of socially interactive bio-inspired system (5) 2597–2610

Khooban, M.H., see Nayeripour, M. (1) 321–331

Khooban, M.H., see Rafiei, M. (1) 301–313

Khorramnia, R., M.K. Jahromi, S. Salari, M. Nafar and M. Jabari, An intelligent framework to solve the non-convex economic dispatch problem with practical limitations (1) 173–183

Kim, G.W., see Yang, G. (6) 3171–3179

Kim, K., see Yang, G. (6) 3171–3179

Kim, Y.C., Categories of fuzzy preorders, approximation operators and Alexandrov topologies (3) 1787–1793

Kocken, H.G., see Ahlatcioglu, M. (3) 2009–2015

Kocken, H.G., see Ozkok, B.A. (1) 623–632

Kong, H., see Wang, H. (2) 885–902

Kouhanjani, M.J., see Mehrtash, M. (1) 367–378

Kumar, A., see Gupta, G. (1) 213–215

Kumar, A., see Kalra, N. (1) 249–258

Kumar, A., see Kaur, J.J. (3) 1955–1965

Kumar, C.R., K.R. Sudha and D.V. Pushpalatha, Design of Prisoner’s dilemma based fuzzy logic computed torque controller with Lyapunov synthesis linguistic model for PUMA-560 robot manipulator (1) 345–355

Kumar, P.R., K. Santhakumar and S. Palani, An intelligent approach for optimizing Energy consumption and Schedule length of Embedded multiprocessors (1) 579–587

Kun-Ju, S., see Hong-Li, Z. (3) 1745–1757

Kwon, T.-K., see Yang, G. (6) 3171–3179

Lai, L.-B., see Yang, J. (1) 115–125

Le, M., see Shen, D. (5) 2745–2755

Lee, C.-S., see Chan, G.-Y. (2) 749–764

Lee, G., see Lin, H.-C. (4) 2363–2373

Lee, H., see Yang, G. (6) 3171–3179

Lei, L., see Song, Y. (3) 1653–1668

Lei, M., S. Li and Q. Tan, Intermittent demand forecasting with fuzzy markov chain and multi aggregation prediction algorithm (6) 2911–2918

Leng, Y., see Chen, J. (6) 3181–3195

Li, B., see Chen, S. (6) 2821–2827

Li, B., see Chen, S. (6) 2821–2827

Li, B., see Zhang, W. (6) 3163–3170

Li, C., see Qian, D. (6) 3021–3028

Li, C., see Yuan, J. (3) 1909–1919

Li, C., X. Chu, Y. Chen and L. Xing, A knowledge-based technique for initializing a genetic algorithm (2) 1145–1152

Li, D., see Zhang, C. (6) 2829–2837

Li, D.-F., see Yang, J. (1) 115–125

Li, F., see Bao, J. (6) 3113–3120

Li, F., see Wang, H. (6) 3121–3130

Li, G., Q. Zhang, Z. Feng and W. Wang, A disaster recovery solution based on heterogeneous storage (4) 2249–2256

Li, G., see Wu, J.-Z. (3) 1447–1457

Li, H., Detecting fuzzy network communities based on semi-supervised label propagation (6) 2887–2893

Li, H., see Khan, M.S.L., (5) 2597–2610

Li, H., see Qiu, D. (3) 1235–1244

Li, J. and S.F. Yuan, Domain quality-driven logistics web service optimal composition based on culture artificial bee colony algorithm (4) 2383–2391

Li, J., see Cao, S. (2) 691–698

Li, J., see Cao, S. (2) 707–716

Li, J., see Dai, L. (4) 2241–2247

Li, J.-q., S.-p. Zhang, L. Yang, X.-h. Fu, Z. Ming and G. Feng, Accurate RFID localization algorithm with particle swarm optimization based on reference tags (5) 2697–2706

Li, K., see Fei, X. (2) 1099–1107

Li, K., see Xiao, G. (2) 1109–1120

Li, K., see Xiao, Z. (2) 689

Li, K., see Yu, S. (2) 795–803

Li, K., see Yu, S. (2) 795–803

Li, K., see Zheng, W. (2) 957–965

Li, K., see Zheng, W. (2) 957–965

Li, L., H. Huang, B. Qian, J. Lian and Y. Zhou, Vehicle detection method based on mean shift clustering (3) 1355–1363

Li, L., R. Wang and X. Li, Double fuzzy C-means model and its application in the technology innovation of China (6) 2895–2901

Li, L., see Jianjun, W. (4) 2341–2347

Li, L., see Jin, Q. (3) 1679–1688

Li, L., see Li, Q. (2) 775–786

Li, L.-h., Z.-m. Lun, J. Lian, L.-s. Yuan, Y.-f. Zhou and X.-y. Ma, Study on detection of preceding vehicles based on convolution neural network (3) 1459–1467

Li, M., H. Ma and B. Gu, Improved teaching–learning-based optimization algorithm with group learning (4) 2101–2108

Li, P., see Chen, J. (6) 3181–3195

Li, Q., see Han, H. (3) 1397–1406

Li, Q., see Rao, Y. (5) 2533–2542

Li, Q., Y. Ren, L. Li and W. Liu, From low-level geometric features to high-level semantics: An axiomatic fuzzy set clustering approach (2) 775–786

Li, R., see Jiang, B. (2) 1009–1016

Li, S., see Lei, M. (6) 2911–2918

Li, S.-L., see Wang, L. (3) 1407–1418

Li, T., see Bai, K. (6) 2949–2957

Li, T., Y. Zhang and F. Du, International portfolio selection model with exchange rate risk (6) 2759–2765

Li, W., D. Cosker and M. Brown, Drift robust non-rigid optical flow enhancement for long sequences (5) 2583–2595

Li, W., see Ren, G. (5) 2659–2674

Li, W., see Yin, M. (2) 737–747

Li, W., see Yuan, J. (3) 1909–1919

Li, W., see Zhan, Y. (2) 1029–1039

Li, X., K. Chen, J. Ruan and C. Shi, A fuzzy TOPSIS for assessing higher vocational education development levels in uncertainty environments (6) 3083–3093

Li, X., see Li, L. (6) 2895–2901

Li, X., see Liu, T. (3) 1535–1544

Li, X., see Saleh, A. (5) 2511–2523

Li, X., see Wang, F. (5) 2573–2581

Li, X., see Zhang, F. (6) 2985–2997

Li, X., X. Wang and J. Wang, A kind of Lagrange dynamic simplified modeling method for multi-DOF robot (4) 2393–2401

Li, X., Y. Song and W. Quan, Evaluating evidence reliability based on intuitionistic fuzzy MCDM model (3) 1167–1182

Li, Y., see Chen, K.-J. (1) 291–299

Li, Y., see Jin, H. (6) 3075–3081

Li, Y., see Kang, Z.L. (4) 2083–2089

Li, Y., see Shanmuganathan, S. (2) 859–872

Li, Y., see Song, S. (6) 2941–2948

Li, Y., see Wei, M. (6) 3029–3037

Li, Z., see Wang, H. (6) 3121–3130

Li, Z.-M., see Zhao, Y.-D. (3) 1977–1985

Lian, J., see Li, L. (3) 1355–1363

Lian, J., see Li, L.-h. (3) 1459–1467

Lian, K.-Y., C.-H. Liu and C.-S. Chiu, Simplified robust fuzzy output regulator design for discrete-time nonlinear systems (3) 1499–1511

Liang, X.-N., see Lv, Z.-Y. (2) 787–794

Liang, X.-Z., see Lv, Z.-Y. (2) 787–794

Liao, G., see Tang, X. (2) 1079–1088

Lin, D., see Luo, J. (2) 967–978

Lin, F., see Yang, L. (5) 2707–2712

Lin, H., Q. Wang, B. Liu, B. Han and X. Lu, Hybrid multi-granulation rough sets of variable precision based on tolerance (2) 717–725

Lin, H., Q. Wang, P. Guo, T. Guan and L. Xu, Multi-users S-rough sets model based on three-way decisions (2) 699–706

Lin, H., see Yue, H. (4) 2129–2135

Lin, H.-C., and G. Lee, Speedily, efficient and adaptive streaming algorithms for real-time detection of flooding attacks (4) 2363–2373

Lin, S., see Cao, B. (5) 2637–2644

Lin, S., see Cao, B. (5) 2675–2683

Lin, S., see Yang, L. (5) 2713–2720

Lino, A., Á. Rocha and A. Sizo, Virtual teaching and learning environments: Automatic evaluation with symbolic regression (4) 2061–2072

Li-Ran, S., see Pan-Pan, N. (5) 2553–2564

Liu, B., see Lin, H. (2) 717–725

Liu, C., J. Luo and Y. Song, Correlative pattern based data aggregation mechanism for WSN (2) 991–999

Liu, C., see Bao, J. (6) 3113–3120

Liu, C., see Wang, H. (6) 3121–3130

Liu, C.-H., see Lian, K.-Y. (3) 1499–1511

Liu, F., see Pang, H. (6) 2999–3006

Liu, F., see Sun, S. (6) 2757–2758

Liu, H., see Guo, H. (3) 1155–1166

Liu, H., see Tao, Y. (6) 2975–2983

Liu, J. and X.X. Zhang, Modeling fuzzy relational database in HBase (3) 1845–1857

Liu, J., see Jiang, D. (5) 2483–2495

Liu, L., see Wang, H. (2) 885–902

Liu, M., see Bai, K. (6) 2949–2957

Liu, M., see Dai, J. (3) 1341–1353

Liu, M., see Wang, H. (6) 3121–3130

Liu, Q. see Lu, W. (5) 2629–2636

Liu, Q., F. Yang, Y. Pu, M. Zhang and G. Pan, Segmentation of farmland obstacle images based on intuitionistic fuzzy divergence (1) 163–172

Liu, S., Y. Chen, L. Xing and X. Guo, Time-dependent autonomous task planning of agile imaging satellites (3) 1365–1375

Liu, T., C. Wang and X. Li

Liu, W., see Li, Q. (2) 775–786

Liu, W., see Yan, C. (6) 2789–2794

Liu, W., see Yang, L. (6) 3131–3142

Liu, X., see Chu, J. (3) 1271–1285

Liu, X., see Pang, H. (6) 2999–3006

Liu, X., see Rao, Y. (5) 2533–2542

Liu, X., see Wang, N. (2) 1121–1131

Lixin, Z., see Xiaoling, D. (4) 2313–2320

Lu, C., see Qiu, D. (1) 45–54

Lu, M., see Wang, F. (5) 2573–2581

Lu, S. and X. Wang, Modeling the fuzzy cold storage problem and its solution by a discrete firefly algorithm (4) 2431–2440

Lu, S., see Shao, W. (4) 2159–2165

Lu, W., J. Qi, Q. Liu, Z. Zhou and J. Yang, Depth estimation for image dehazing of surveillance on education (5) 2629–2636

Lu, X., see Lin, H. (2) 717–725

Luan, T., see Xia, G. (6) 3055–3066

Luković, I., see Dimitrijević, D. (4) 2073–2082

Lun, Z.-m., see Li, L.-h. (3) 1459–1467

Luo, H. see Xu, L.J. (4) 2109–2117

Luo, J., D. Lin and B. Cao, A cell-core-attachment approach for identifying protein complexes in yeast protein-protein interaction network (2) 967–978

Luo, J., see Liu, C. (2) 991–999

Luo, M., see Bai, K. (6) 2949–2957

Luo, N., see Xiong, Z. (4) 2421–2429

Luo, S., see Zhang, X. (6) 2767–2777

Luo, W., see Gou, J. (6) 2839–2850

Luo, X., see Bo, L. (4) 2137–2146

Luo, X., see Cao, B. (5) 2637–2644

Luo, X., see Cao, B. (5) 2675–2683

Luo, Y.-P., see Xiao, M.-M. (4) 2271–2279

Lv, H., see Yang, J. (5) 2473–2481

Lv, H., see Zhou, J. (5) 2463–2471

Lv, Q., X. Niu, Y. Dou, J. Xu and F. Xia, Leveraging local receptive fields based random weights networks for hyperspectral image classification (2) 1017–1028

Lv, Z., see Cao, B. (5) 2637–2644

Lv, Z., see Cao, B. (5) 2675–2683

Lv, Z., see Jiang, D. (5) 2483–2495

Lv, Z., see Jiang, D. (5) 2497–2509

Lv, Z., Special issue on multimedia in technology enhanced learning (5) 2441–2448

Lv, Z.-Y., L.-W. Zheng, X.-N. Liang and X.-Z. Liang, A fuzzy multiple attribute decision making method based on possibility degree (2) 787–794

Ma, A., see Huang, L. (2) 873–884

Ma, C., see Zhang, Z. (6) 3103–3111

Ma, H., see Li, M. (4) 2101–2108

Ma, T., see Song, Z. (3) 1709–1719

Ma, X.-y., see Li, L.-h. (3) 1459–1467

Mahboubi-Moghaddam, E., see Nayeripour, M. (1) 321–331

Mahmoud, M.I., see El-Fouly, F.H. (1) 99–113

Maiti, M., see De, M. (3) 1481–1497

Maji, P.K., see Selvachandran, G. (1) 55–68

Malinowski, M.T., Fuzzy stochastic differential equations of decreasing fuzziness: Non-Lipschitz coefficients (1) 13–25

Man, Z., see Wang, H. (2) 885–902

Mandal, K. and K. Basu, Improved similarity measure in neutrosophic environment and its application in finding minimum spanning tree (3) 1721–1730

Mansouri, M., see Bahrami, V. (3) 1545–1564

Mao, Z., see Wang, M. (6) 2959–2965

Maroof, F.G., A.B. Saeid and E. Eslami, On co-annihilators in residuated lattices (3) 1263–1270

Mateos, C., see Pacini, E. (3) 1731–1743

Mehmood, A., see Yang, J. (5) 2473–2481

Mehmood, A., see Zhou, J. (5) 2463–2471

Mehmood, R., R. Bie, L. Jiao, H. Dawood and Y. Sun, Adaptive cutoff distance: Clustering by fast search and find of density peaks (5) 2619–2628

Mehrtash, M., M.J. Kouhanjani and M. Mohammadi, A new nonparametric density estimation for probabilistic security-constrained economic dispatch (1) 367–378

Melthis, J., S. Tang, P. Yang, M. Hanneghan and C. Carter, Topologies for combining the internet of things and serious games (5) 2685–2696

Mengting, Z. see Cai, L. (4) 2321–2333

Mi, A. and H. Sima, Classifier selection method based on clustering and weighted mean (4) 2335–2340

Miao, L., see Jiang, D. (5) 2497–2509

Ming, Z., see Li, J.-q. (5) 2697–2706

Mingzuo, J., see Xiaoshen, L. (2) 727–736

Mirasso, A., see Pacini, E. (3) 1731–1743

Miyamoto, M., see Wang, T. (2) 903–913

Model for evaluating the management performance of the sport grounds with interval-valued intuitionistic uncertain linguistic information (3) 1535–1544

Mohammadi, M., see Mehrtash, M. (1) 367–378

Mohan, B.M., see Arun, N.K. (3) 1807–1818

Mokhtari, H., Manufacturing operations outsourcing through an artificial team process algorithm (1) 487–501

Mosayebian, M.E., S. Soleymani, B. Mozafari and H.A. Shayanfar, Optimal operational management of a micro-grid, including high penetration level of renewable energy resources (1) 565–577

Mousavi, S.M., see Vahdani, B. (3) 1521–1534

Mozafari, B., see Mosayebian, M.E. (1) 565–577

Mu, C., see Qiu, D. (1) 45–54

Mu, Y., see Zhang, C. (6) 2829–2837

Nafadi, H.A., see Ali, J. (3) 2027–2033

Nafar, M., see Khorramnia, R. (1) 173–183

Naichao, C., see Xiaoling, D. (4) 2313–2320

Najafi, A., A.B. Saeid and E. Eslami, Commutators in BCI-algebras (1) 357–366

Nath, M. and S. Roy, Some new classes of ideal convergent difference multiple sequences of fuzzy real numbers (3) 1579–1584

Nayak, S. and S. Chakraverty, Numerical solution of fuzzy stochastic differential equation (1) 555–563

Nayeripour, M., E. Mahboubi-Moghaddam and M.H. Khooban, Multi-periods distribution feeder reconfiguration at the presence of distributed generation through economic assessment using a new modified PSO algorithm (1) 321–331

Nedić, N., see Dimitrijević, D. (4) 2073–2082

Nehi, H.M., see Farahani, H. (3) 1689–1699

Niknam, T., see Rafiei, M. (1) 301–313

Nirmala, S., see Sridevi, S. (1) 433–441

Niroomand, S., see Taassori, M. (1) 27–43

Niu, D., see Song, Z. (3) 1709–1719

Niu, M., see Hao, X. (3) 1819–1929

Niu, X., see Lv, Q. (2) 1017–1028

O’Neill, E., see Ren, G. (5) 2659–2674

Obradović, -D., see Dimitrijević, D. (4) 2073–2082

Olatunji, S.O., see Owolabi, T.O. (1) 519–527

Oliveira, S.C., see de Oliveira, L.F.F. (3) 1513–1520

Oussalah, M., see Xiao, J. (5) 2449–2462

Ouyang, A., X. Peng, Q. Wang, Y. Wang and T.K. Truong, A parallel improved IWO algorithm on GPU for solving large scale global optimization problems (2) 1041–1051

Owolabi, T.O., K.O. Akande and S.O. Olatunji, Computational intelligence method of estimating solid-liquid interfacial energy of materials at their melting temperatures (1) 519–527

Ozdemir, Y. and H. Basligil, Aircraft selection using fuzzy ANP and the generalized choquet integral method: The Turkish airlines case (1) 589–600

Ozkok, B.A., I. Albayrak, H.G. Kocken and M. Ahlatcioglu, An approach for finding fuzzy optimal and approximate fuzzy optimal solution of fully fuzzy linear programming problems with mixed constraints (1) 623–632

Ozkok, B.A., see Ahlatcioglu, M. (3) 2009–2015

Pacini, E., C. Mateos, C.G. Garino, C. Careglio and A. Mirasso, A bio-inspired scheduler for minimizing makespan and flowtime of computational mechanics applications on federated clouds (3) 1731–1743

Pal, M., see Borzooei, R.A. (1) 69–75

Pal, M., see Ghorai, G. (3) 2043–2049

Pal, M., see Jana, C. (1) 613–621

Palani, S., see Kumar, P.R. (1) 579–587

Pan, G., see Liu, Q. (1) 163–172

Pan, H., see Zhan, Y. (2) 1029–1039

Pan, Y., see Deng, X. (2) 979–990

Pang, B., see Gao, X.-Y. (3) 1701–1708

Pang, H., F. Liu and X. Liu, Enhanced variable-universe fuzzy control for vehicle semi-active suspension systems (6) 2999–3006

Pang, Y., see Yang, W. (6) 2779–2788

Pan-Pan, N., W. Xiang-Yang, Y. Qing-Bo and S. Li-Ran, A new robust color image watermarking method for multimedia technology enhanced learning protection (5) 2553–2564

Paramasivan, B., see Hevin Rajesh, D. (1) 423–432

Pardasani, K.R., see Jain, A. (1) 259–273

Paripour, M., see Farahani, H. (3) 1689–1699

Park, M.-K., Traffic regulation algorithm for metro lines with time interval deviations (2) 1001–1008

Peijian, L., see Xiaoling, D. (4) 2313–2320

Peng, K.-X., see Wang, L. (3) 1407–1418

Peng, L. and X. Qi, A hierarchical model to learn object proposals and its applications (5) 2543–2551

Peng, X., see Ouyang, A. (2) 1041–1051

Peng, Y., see Yue, Q. (6) 2903–2910

Pham, T.D., Quantifying visual perception of texture with fuzzy metric entropy (2) 1089–1097

Phong, P.H., see Son, L.H. (3) 1597–1608

Piran, N., see Falehi, A.D. (3) 1199–1209

Pourgholi, M., see Falehi, A.D. (3) 1199–1209

Pu, Y., see Liu, Q. (1) 163–172

Pushpalatha, D.V., see Kumar, C.R. (1) 345–355

Qadir, M.A., see Imran, M. (2) 837–847

Qayyum, A., S. Abdullah and M. Aslam, Cubic soft expert sets and their application in decision making (3) 1585–1596

Qi, J., see Lu, W. (5) 2629–2636

Qi, X., see Peng, L. (5) 2543–2551

Qi, X., see Zhang, Y. (3) 1609–1620

Qian, B., see Li, L. (3) 1355–1363

Qian, D. and C. Li, Formation control for uncertain multiple robots by adaptive integral sliding mode (6) 3021–3028

Qian, J., see Ren, P. (4) 2257–2269

Qian, W., see Yin, M. (2) 737–747

Qin, Y., see Yu, S. (2) 795–803

Qing-Bo, Y., see Pan-Pan, N. (5) 2553–2564

Qiu, D. and H. Li, Fuzzy optimizations of convex fuzzy mappings in the quotient space of fuzzy numbers (3) 1235–1244

Qiu, D., R. Dong, C. Lu and C. Mu, On the stability of solutions of fuzzy differential equations in the quotient space of fuzzy numbers (1) 45–54

Qiu, J., see Song, Z. (3) 1709–1719

Qu, G., H. Zhang, W. Qu and Z. Zhang, Induced generalized dual hesitant fuzzy Shapley hybrid operators and their application in multi-attributes decision making (1) 633–650

Qu, J., see Song, S. (6) 2941–2948

Qu, W., see Qu, G. (1) 633–650

Qu, X.-b., see Sun, F. (3) 1245–1256

Quan, C., see Ren, F. (1) 127–136

Quan, W., see Li, X. (3) 1167–1182

Quan, W., see Song, Y. (3) 1653–1668

Rafe, V., see Yousefian, R. (1) 137–149

Rafi, A., see Saleh, A. (5) 2511–2523

Rafiei, M., T. Niknam and M.H. Khooban, A novel intelligent strategy for probabilistic electricity price forecasting: Wavelet neural network based modified dolphin optimization algorithm (1) 301–313

Rahimi, A., see Daraby, B. (1) 313–319

Ramadan, R.A., see El-Fouly, F.H. (1) 99–113

Rankin, W.B., see Shen, D. (5) 2745–2755

Rao, Y., H. Xie, X. Liu, Q. Li, F.L. Wang and T.-L. Wong, User authority ranking models for community question answering1 (5) 2533–2542

Rashmanlou, H., see Borzooei, R.A. (1) 69–75

Ravana, S.D., see Al-Garadi, M.A. (5) 2721–2735

Réhman, S., see Khan, M.S.L., (5) 2597–2610

Ren, F., Y. Wang and C. Quan, A novel factored POMDP model for affective dialogue management (1) 127–136

Ren, G., W. Li and E. O’Neill, Towards the design of effective freehand gestural interaction for interactive TV (5) 2659–2674

Ren, P. and J. Qian, Energy-aware and load-balancing cluster routing protocol for wireless sensor networks in long-narrow region (4) 2257–2269

Ren, Y., see Li, Q. (2) 775–786

Ren, Z., see Wei, C. (2) 765–774

Rocha, Á., Applications of intelligent & fuzzy theory in engineering technologies and applied science (4) 2059–

Rocha, Á., see Lino, A. (4) 2061–2072

Rodríguez, R.M., see Wei, C. (1) 673–685

Roy, S., see Nath, M. (3) 1579–1584

Ruan, J., see Li, X. (6) 3083–3093

Saeid, A.B., see Hamidi, M. (3) 1565–1578

Saeid, A.B., see Maroof, F.G. (3) 1263–1270

Saeid, A.B., see Najafi, A. (1) 357–366

Sajid, A., see Abbas, H. (5) 2645–2658

Salari, S., see Khorramnia, R. (1) 173–183

Saleh, A., A. Rafi, P. Woods, X. Li, I. Hijazi and S. Cheng, Evaluation of three-dimensional computer visual materials to support user’s participation in architectural design process (5) 2511–2523

Salleh, A.R., see Selvachandran, G. (1) 55–68

Samanta, S., see Borzooei, R.A. (1) 69–75

Santhakumar, K., see Kumar, P.R. (1) 579–587

Santiago, R.H.N., see Silva Farias, A.D. (3) 1795–1806

Selvachandran, G., P.K. Maji, I.E. Abed and A.R. Salleh, Complex vague soft sets and its distance measures (1) 55–68

Senapati, T., see Jana, C. (1) 613–621

Shahriari, M.R., see Vahdani, B. (3) 1521–1534

Shahzadi, S. and M. Akram, Edge regular intuitionistic fuzzy soft graphs (3) 1881–1895

Shanmuganathan, S. and Y. Li, An AI based approach to multiple census data analysis for feature selection (2) 859–872

Shanthi, S.A., C.H. Sulochana and S.A. Jerome, Image denoising using bilateral filter in subsampled pyramid and nonsubsampled directional filter bank domain (1) 237–247

Shao, W., Y. Du and S. Lu, Performance evaluation of port supply chain based on fuzzy-matter-element analysis (4) 2159–2165

Sharma, U., see Aggarwal, S. (1) 443–455

Shayanfar, H.A., see Mosayebian, M.E. (1) 565–577

She, W., see Guo, H. (3) 1155–1166

Shen, D., W.B. Rankin and M. Le, Self-education of agents in the Multi-Airport Logistics System: A multiple cases study (5) 2745–2755

Shen, H., see Deng, X. (2) 979–990

Shen, J., see Wang, P. (4) 2221–2230

Sheng, Y., see Gao, R. (3) 1227–1234

Shi, B., N. Chen and J. Wang, A credit rating model of microfinance based on fuzzy cluster analysis and fuzzy pattern recognition: Empirical evidence from Chinese 2,157 small private businesses (6) 3095–3102

Shi, C., see Li, X. (6) 3083–3093

Shi, F.-G., see Ghareeb, A. (3) 1435–1445

Shi, J., see Yang, W. (6) 2779–2788

Shi, L., see Jiang, D. (5) 2483–2495

Shi, P., see Wang, G. (1) 391–403

Shi, S., see Bao, J. (6) 3113–3120

Shi, Y., see Wang, G. (1) 391–403

Shu-Lin, L., see Hong-Li, Z. (3) 1745–1757

Silva Farias, A.D., L.R. de Araújo Lopes, B. Bedregal and R.H.N. Santiago, Closure properties for fuzzy recursively enumerable languages and fuzzy recursive languages (3) 1795–1806

Sima, H., see Mi, A. (4) 2335–2340

Singh, M., see Bhardwaj, A.K. (3) 1941–1953

Sizo, A., see Lino, A. (4) 2061–2072

Soleymani, S., see Mosayebian, M.E. (1) 565–577

Solimani, Z., see Daraby, B. (1) 313–319

Son, L.H. and P.H. Phong, On the performance evaluation of intuitionistic vector similarity measures for medical diagnosis (3) 1597–1608

Song, H., see Yang, J. (5) 2473–2481

Song, H., see Zhou, J. (5) 2463–2471

Song, S., J. Qu, Y. Li, W. Zhou and K. Guo, Fuzzy control method for a steering system consisting of a four-wheel individual steering and four-wheel individual drive electric chassis (6) 2941–2948

Song, S.Z., see Jun, Y.B. (3) 1257–1262

Song, Y., see Li, X. (3) 1167–1182

Song, Y., see Liu, C. (2) 991–999

Song, Y., X. Wang, L. Lei, W. Quan and W. Huang, An evidential view of similarity measure for Atanassov’s intuitionistic fuzzy sets (3) 1653–1668

Song, Z., D. Niu, J. Qiu, X. Xiao and T. Ma, Improved short-term load forecasting based on EEMD, Guassian disturbance firefly algorithm and support vector machine (3) 1709–1719

Soon, P.L., see Zhang, H. (4) 2299–2306

Sridevi, S. and S. Nirmala, Fuzzy inference rule based image despeckling using adaptive maximum likelihood estimation (1) 433–441

Su, C., see Chen, J. (6) 3181–3195

Su, H., see Dai, J. (3) 1341–1353

Sudha, K.R., see Kumar, C.R. (1) 345–355

Sulochana, C.H., see Shanthi, S.A. (1) 237–247

Sumathi, M., see Veeramani, C. (3) 1831–1843

Sun, B., see Yuan, J. (3) 1909–1919

Sun, F., X.-p. Wang and X.-b. Qu, Cliques and clique covers in fuzzy graphs (3) 1245–1256

Sun, G. and W.-L. Xia, Evaluation method for innovation capability and efficiency of high technology enterprises with interval-valued intuitionistic fuzzy information (3) 1419–1425

Sun, G. and W.-L. Xia, Research on the enterprise management innovation ability assessment under low carbon economy circumstances with hesitant fuzzy uncertain linguistic information (3) 1645–1651

Sun, H., see Wang, L. (3) 1407–1418

Sun, H., see Yan, C. (6) 2789–2794

Sun, L., see Wang, J. (4) 2187–2193

Sun, L., see Wang, M. (6) 2959–2965

Sun, M., see Xia, G. (6) 3055–3066

Sun, S., S. Ionita, E. Volná, A. Gavrilov and F. Liu, Some highlights on fuzzy systems and data mining (6) 2757–2758

Sun, S., see Zheng, Z. (5) 2611–2618

Sun, X., see Wang, X. (6) 3013–3019

Sun, X., see Zhang, Y. (6) 2807–2812

Sun, Y., see Gao, Z. (6) 2967–2974

Sun, Y., see Mehmood, R. (5) 2619–2628

Taassori, M., S. Niroomand, S. Uysal, A. Hadi-Vencheh and B. Vizvári, Fuzzy-based mapping algorithms to design networks-on-chip (1) 27–43

Tan, Q., see Lei, M. (6) 2911–2918

Tang, S., see Melthis, J. (5) 2685–2696

Tang, X., see Wei, C. (2) 765–774

Tang, X., X. Yang, G. Liao and X. Zhu, A shared cache-aware Task scheduling strategy for multi-core systems (2) 1079–1088

Tao, Y., G. Xie, Y. Chen, H. Xiong, H. Liu, J. Zheng and J. Gao, A PID and fuzzy logic based method for Quadrotor aircraft control motion (6) 2975–2983

Tepavčević, A., see Djukić, M. (1) 547–553

Teshnehlab, M., see Bahrami, V. (3) 1545–1564

Tian, W., J. Wang, L. Wang, L. Cheng and J. Cao, Study on algorithm and application to radical input method and standardization of Nvshu (5) 2525–2531

Tong, Z. and M. Jing, Bandwidth-aware multi round task scheduling algorithm for cloud computing (2) 1053–1063

Tong, Z., see Yu, S. (2) 795–803

Tonga,M.,see Kadji, A. (1) 1–12

Touqeer, M. and N. Çağman, Fuzzy hyper h-ideals of hyper BCK-algebras (3) 2051–2058

Truong, T.K., see Ouyang, A. (2) 1041–1051

Tu, W., see Wang, H. (6) 3203–3210

Ullah, A., see Karaaslan, F. (1) 651–662

Usman, M., M. Usman and S. Asghar, A fuzzy-based methodology for accurate classification and prediction in large datasets (3) 1759–1768

Usman, M., see Usman, M. (3) 1759–1768

Uysal, S., see Taassori, M. (1) 27–43

Vahdani, B., S.S. Behzadi, S.M. Mousavi and M.R. Shahriari, A dynamic virtual air hub location problem with balancing requirements via robust optimization: Mathematical modeling and solution methods (3) 1521–1534

Varathan, K.D., see Al-Garadi, M.A. (5) 2721–2735

Veeramani, C. and M. Sumathi, A new method for solving fuzzy linear fractional programming problems (3) 1831–1843

Vizvári, B., see Taassori, M. (1) 27–43

Volná, E., see Sun, S. (6) 2757–2758

Waghmare, L.M., see Agnihotri, S.P. (3) 1287–1297

Wang L. and Q. Zhang, A further discussion on fuzzy interval cooperative games (1) 185–191

Wang, B., see Ji, F. (1) 91–97

Wang, C., see Gou, J. (6) 2839–2850

Wang, C., see Liu, T. (3) 1535–1544

Wang, D., see Xiang, Z. (2) 815–823

Wang, F., see Wei, S. (1) 601–611

Wang, F., Z. Xiao, W. Chen, X. Li and M. Lu, Tracking objects in video-based education using an enhanced particle filter (5) 2573–2581

Wang, F.L., see Rao, Y. (5) 2533–2542

Wang, G., P. Shi, R.K. Agarwal and Y. Shi, On fuzzy ellipsoid numbers and membership functions (1) 391–403

Wang, H., C. Liu, Z. Zhao, J. Zhang, Z. Li, F. Li and M. Liu, Efficiency evaluation of an Internet Plus University Student Affairs System based on fuzzy theory and the analytic hierarchy process (6) 3121–3130

Wang, H., P. He, M. Yu, L. Liu, M.T. Do, H. Kong and Z. Man, Adaptive neural network sliding mode control for steer-by-wire-based vehicle stability control (2) 885–902

Wang, H., see Bo, L. (4) 2137–2146

Wang, H., see Xu, Y. (1) 503–518

Wang, H., Y. Wu, C. Zhang and W. Tu, The method for generating 3D audio content (6) 3203–3210

Wang, J., L. Sun, H. Zhao and Y. Wang, ARIMA-BP integrated intelligent algorithm for China’s consumer price index forecasting and its applications (4) 2187–2193

Wang, J., see Gao, Z. (6) 2967–2974

Wang, J., see Li, X. (4) 2393–2401

Wang, J., see Shi, B. (6) 3095–3102

Wang, J., see Tian, W. (5) 2525–2531

Wang, J., see Xin, X. (6) 2881–2886

Wang, J.-B. and M.-Z. Wang, Research on comprehensive performance evaluation of communication network based on the fuzzy number intuitionistic fuzzy information (3) 2017–2025

Wang, K., see Gao, W. (4) 2411–2419

Wang, L., S.-L. Li, H. Sun and K.-X. Peng, A classification and regression algorithm based on quantitative association rule tree (3) 1407–1418

Wang, L., see Jiang, B. (2) 1009–1016

Wang, L., see Jiang, S. (2) 927–937

Wang, L., see Jin, H. (6) 3075–3081

Wang, L., see Tian, W. (5) 2525–2531

Wang, L., see Zhao, X. (3) 2001–2008

Wang, M., L. Sun, N. Yang and Z. Mao, Fracture healing process simulation based on 3D model and fuzzy logic (6) 2959–2965

Wang, M.-Z., see Wang, J.-B. (3) 2017–2025

Wang, N., J. Xia, J. Yin and X. Liu, Trend analysis of land surface temperatures using time series segmentation algorithm (2) 1121–1131

Wang, P., J. Shen and B. Zhang, A new method for two-sided matching decision making of PPP projects based on intuitionistic fuzzy choquet integral (4) 2221–2230

Wang, P., see Zheng, Z. (5) 2611–2618

Wang, Q., see Lin, H. (2) 699–706

Wang, Q., see Lin, H. (2) 717–725

Wang, Q., see Ouyang, A. (2) 1041–1051

Wang, R., see Li, L. (6) 2895–2901

Wang, T., R. Xu, X. Han, Y.-W. Chen, Y. Ishizaki, M. Miyamoto and T. Hattori, A principal component analysis based method to automatically inspect wear of throw-away tips (2) 903–913

Wang, W., see Li, G. (4) 2249–2256

Wang, X., F. Yang, H. Wei and L. Ji, A risk assessment model of uncertainty system based on set-valued mapping (6) 3155–3162

Wang, X., H. Dong, X. Sun and X. Yao, PD control of inverted pendulum based on adaptive fuzzy compensation (6) 3013–3019

Wang, X., see Li, X. (4) 2393–2401

Wang, X., see Lu, S. (4) 2431–2440

Wang, X., see Song, Y. (3) 1653–1668

Wang, X.-p., see Sun, F. (3) 1245–1256

Wang, Y., see Cao, S. (2) 691–698

Wang, Y., see Cao, S. (2) 707–716

Wang, Y., see Chu, J. (3) 1271–1285

Wang, Y., see Hao, X. (3) 1819–1929

Wang, Y., see Ouyang, A. (2) 1041–1051

Wang, Y., see Ren, F. (1) 127–136

Wang, Y., see Wang, J. (4) 2187–2193

Wang, Y., see Zhang, H. (4) 2299–2306

Wang, Y., see Zhang, H. (4) 2299–2306

Wang, Y.-J. and S.-S. Yu, Model for evaluating the rural landscape design schemes with fuzzy number intuitionistic fuzzy information (3) 1669–1678

Wang, Y.-X., Research on the efficiency evaluation of venture capital of high-science and technology companies with dual hesitant fuzzy information (3) 1183–1187

Wang, Z., L. Zhao, N. Cao, L. Yang and M. Chen, Vehicle routing optimum model of hazardous materials transportation under fuzzy environment (6) 3067–3074

Wang, Z., see Hao, X. (3) 1819–1929

Wangwei, J., see Yue, L. (2) 825–836

Wei, C., F. Yan and R.M. Rodríguez, Entropy measures for hesitant fuzzy sets and their application in multi-criteria decision-making (1) 673–685

Wei, C., Z. Ren, X. Tang and J. Feng, Information aggregation operators based on hesitant fuzzy sets and prioritization relationship (2) 765–774

Wei, H., see Wang, X. (6) 3155–3162

Wei, H., see Xiong, Z. (3) 1769–1778

Wei, L., H. Dong, J. Zhao and G. Zhou, Optimization model establishment and optimization software development of gas field gathering and transmission pipeline network system (4) 2375–2382

Wei, L., see Zhang, X. (6) 2767–2777

Wei, M. and Q. Dai, A prediction model for traffic emission based on interval-valued intuitionistic fuzzy sets and case-based reasoning theory (6) 3039–3046

Wei, M. and Y. Li, Collaborative ant colony algorithm for online regional bus scheduling (6) 3029–3037

Wei, S., D. Jiang and F. Wang, A new multiobjective genetic programming approach using compromise distance ranking for automated design of nonlinear system design (1) 601–611

Wen, J., see Zheng, Z. (5) 2611–2618

Wen, Z., see Ke, W. (4) 2291–2298

Wong, T.-L., see Rao, Y. (5) 2533–2542

Woods, P., see Saleh, A. (5) 2511–2523

Wu, C., see Guo, H. (3) 1155–1166

Wu, F., see Ji, F. (1) 91–97

Wu, F., see Xiao, G. (2) 1109–1120

Wu, J., see Bai, K. (6) 2949–2957

Wu, J.-Z., L.-P. Yu, G. Li, J. Jin and B. Du, The sum interaction indices of some particular families of monotone measures (3) 1447–1457

Wu, M., see Fang, R. (6) 2813–2819

Wu, Q., see Yang, L. (5) 2713–2720

Wu, X. and H. Guan, Data set replica placement strategy based on fuzzy evaluation in the cloud (6) 2859–2868

Wu, X.-Y. and S.-Z. Bai, Decompositions and representations of L-fuzzy natural numbers (1) 333–344

Wu, Y., see Wang, H. (6) 3203–3210

Wu, Z.B. and J.P. Xu, An interactive consensus reaching model for decision making under hesitation linguistic environment (3) 1635–1644

Xia, F., see Lv, Q. (2) 1017–1028

Xia, G., T. Luan and M. Sun, Evaluation analysis for sortie generation of carrier aircrafts based on nonlinear fuzzy matter-element method (6) 3055–3066

Xia, J., see Wang, N. (2) 1121–1131

Xia, W.-L., see Sun, G. (3) 1419–1425

Xia, W.-L., see Sun, G. (3) 1645–1651

Xian, S., W. Xue and Y. Dong, Intuitionistic fuzzy induced ordered entropic weighted averaging operator for group decision making (3) 1189–1197

Xiang, Z., Z. Xiao, D. Wang and H.M. Georges, Incremental semi-supervised kernel construction with self-organizing incremental neural network and application in intrusion detection (2) 815–823

Xiang-Yang, W., see Pan-Pan, N. (5) 2553–2564

Xiao, G., F. Wu, X. Zhou and K. Li, Probabilistic top-k range query processing for uncertain databases (2) 1109–1120

Xiao, G., see Zhou, X. (2) 849–858

Xiao, J. and M. Oussalah, Performance evaluation of particle filter based visual tracking (5) 2449–2462

Xiao, M.-M., S.-L. Zhang and Y.-P. Luo, Automatic network protocol message format analysis (4) 2271–2279

Xiao, Q., see Yue, Q. (6) 2903–2910

Xiao, S., see Zheng, W. (2) 957–965

Xiao, X., see Song, Z. (3) 1709–1719

Xiao, Y., see Guo, H. (3) 1155–1166

Xiao, Y.C., B.Q. Hu and X.R. Zhao, Three-way decisions based on type-2 fuzzy sets and interval-valued type-2 fuzzy sets (3) 1385–1395

Xiao, Z. and K. Li, Special issue: ICNC-FSKD 2015 (2) 689

Xiao, Z., see Wang, F. (5) 2573–2581

Xiao, Z., see Xiang, Z. (2) 815–823

Xiaofei, C., see Chuantao, W. (4) 2203–2212

Xiaoling, D., L. Peijian, Z. Lixin, W. Chengyi, L. Yibin and C. Naichao, Research and design of intelligent control and precision sowing simulation system for wheat (4) 2313–2320

Xiaoshen, L., Y. Xuehai, J. Mingzuo and Z. Chunling, Fuzzy inference modeling method based on T-S fuzzy system (2) 727–736

Xie, D., see Guan, F. (1) 201–212

Xie, G., see Tao, Y. (6) 2975–2983

Xie, H., see Rao, Y. (5) 2533–2542

Xie, R., see Zhang, P. (4) 2281–2290

Xie, X., see Zhan, Y. (2) 1029–1039

Xie, Y., J. Zhang, Y. He, A. Cheng and Q. Yin, Study on FOA_BP remote sepsis diagnosis based on wireless sensor network (5) 2737–2743

Xin, X., J. Wang and X. Zhang, Generalized lower and upper approximations in hyperrings (6) 2881–2886

Xin, X., P. He and Y. Fu, States on hyper MV-algebras (3) 1299–1309

Xin, X., see Hua, X. (1) 479–485

Xing Y.-J. and C. Xing, Model for evaluating the virtual enterprise’s risk with 2-tuple linguistic information (1) 193–200

Xing, B., see Jin, H. (6) 3075–3081

Xing, C., see Xing Y.-J. (1) 193–200

Xing, L., see Li, C. (2) 1145–1152

Xing, L., see Liu, S., (3) 1365–1375

Xiong, H., see Tao, Y. (6) 2975–2983

Xiong, Z., J. Zhu, H. Yuan, S. He and H. Wei, A new approach to detecting active rule confluence with exclusive rules during an indeterminable rule process (3) 1769–1778

Xiong, Z., N. Luo, W. Cai and Z. Xue, Hybrid differential evolution algorithm combined with heuristic correction and chaotic search for online energy-efficient optimization of server cluster (4) 2421–2429

Xu, F., see Yuan, J. (3) 1909–1919

Xu, J., A risk attitudinal ranking approach of triangular intuitionistic fuzzy numbers and their application to MADM problems (6) 2919–2925

Xu, J., see Lv, Q. (2) 1017–1028

Xu, J., see Zhang, Z. (6) 3103–3111

Xu, J.P., see Wu, Z.B. (3) 1635–1644

Xu, L., see Lin, H. (2) 699–706

Xu, L.J., see Kang, Z.L. (4) 2083–2089

Xu, L.J., Z.L. Kang, P. Huang and H. Luo, Research on intelligent watermelon identification and positioning method in natural scene (4) 2109–2117

Xu, L.-s., see Chen, X. (4) 2231–2239

Xu, M., see Chen, X. (4) 2231–2239

Xu, R., see Wang, T. (2) 903–913

Xu, S., see Cao, B. (5) 2637–2644

Xu, S., see Cao, B. (5) 2675–2683

Xu, W., see Yu, J. (2) 1133–1144

Xu, W., see Zhang, X. (6) 2767–2777

Xu, Y., J. Zhang and H. Wang, Consensus models based on distance for interval fuzzy and multiplicative preference relations (1) 503–518

Xue, W., see Xian, S (3) 1189–1197.

Xue, Y., see Cao, B. (5) 2675–2683

Xue, Z., see Xiong, Z. (4) 2421–2429

Xuehai, Y., see Xiaoshen, L. (2) 727–736

Yagdiran, D., see Altinok, H. (1) 227–235

Yajun, W., see Ke, W. (4) 2291–2298

Yan, C., H. Sun and W. Liu, Study of fuzzy association rules and cross-selling toward property insurance customers based on FARMA (6) 2789–2794

Yan, F., see Wei, C. (1) 673–685

Yang, C., see Jiang, B. (2) 1009–1016

Yang, F., see Liu, Q. (1) 163–172

Yang, F., see Wang, X. (6) 3155–3162

Yang, G., H. Lee, G.W. Kim, C.U. Hong, C. Yu, K. Kim and T.-K. Kwon, A study on development of fuzzy algorithm based on knee joint anterior displacement for identifying gait intention (6) 3171–3179

Yang, J., D. Fan, H. Song, S.H. Ahmed, A. Mehmood and H. Lv, Multimedia security in laboratory system based on cloud platform (5) 2473–2481

Yang, J., D.-F. Li and L.-B. Lai, Parameterized bilinear programming methodology for solving triangular intuitionistic fuzzy number bimatrix games (1) 115–125

Yang, J., see Hu, L. (4) 2403–2410

Yang, J., see Lu, W. (5) 2629–2636

Yang, J., see Zhou, J. (5) 2463–2471

Yang, J.-H., see Cheng, C.-H. (2) 915–925

Yang, K., see Zhang, J. (2) 949–956

Yang, L., G. Zhang, F. Lin and H. Zheng, An efficient estimation method coping with the capture effect for RFID tags identification and application in remote learning (5) 2707–2712

Yang, L., Q. Wu, Y. Bai, H. Zheng and S. Lin, An improved hash-based RFID two-way security authentication protocol and application in remote education (5) 2713–2720

Yang, L., see Bai, K. (6) 2949–2957

Yang, L., see Li, J.-q. (5) 2697–2706

Yang, L., see Wang, Z. (6) 3067–3074

Yang, L., see Zhao, X. (3) 2001–2008

Yang, L., W. Zhang, W. Liu and Y. Chen, An intuitionistic fuzzy method for social network prediction problems (6) 3131–3142

Yang, N., see Wang, M. (6) 2959–2965

Yang, P., see Melthis, J. (5) 2685–2696

Yang, S., see Gong, Y. (6) 2927–2933

Yang, S., see Zhang, H. (1) 457–468

Yang, W., J. Shi, X. Zheng and Y. Pang, Hesitant interval-valued intuitionistic fuzzy linguistic sets and their applications (6) 2779–2788

Yang, W., see Fei, X. (2) 1099–1107

Yang, X., see Tang, X. (2) 1079–1088

Yang, X.-F., see Gao, X.-Y. (3) 1701–1708

Yao, X., see Wang, X. (6) 3013–3019

Yasin, M., see Abbas, H. (5) 2645–2658

Ye, J., The generalized Dice measures for multiple attribute decision making under simplified neutrosophic environments (1) 663–671

Yibin, L., see Xiaoling, D. (4) 2313–2320

Yin, J., see Wang, N. (2) 1121–1131

Yin, M., W. Qian and W. Li, Portfolio selection models based on Cross-entropy of uncertain variables (2) 737–747

Yin, Q., see Xie, Y. (5) 2737–2743

Yousefian, R., S. Aboutorabi and V. Rafe, A greedy algorithm versus metaheuristic solutions to deadlock detection in Graph Transformation Systems (1) 137–149

Yu, B., see Yue, Q. (6) 2903–2910

Yu, C., see Yang, G. (6) 3171–3179

Yu, H., see Zhang, W. (6) 3163–3170

Yu, J., X. Zhang, Z. Zhao and W. Xu, Uncertainty measures in multigranulation with different grades rough set based on dominance relation (2) 1133–1144

Yu, L.-P., see Wu, J.-Z. (3) 1447–1457

Yu, M., see Wang, H. (2) 885–902

Yu, S., K. Li, K. Li, Y. Qin and Z. Tong, A VLSI implementation of an SM4 algorithm resistant to power analysis (2) 795–803

Yu, S.-S., see Wang, Y.-J. (3) 1669–1678

Yuan, H., see Xiong, Z. (3) 1769–1778

Yuan, J., C. Li, F. Xu, B. Sun and W. Li, A group decision making approach in interval-valued intuitionistic hesitant fuzzy environment with confidence levels (3) 1909–1919

Yuan, L.-s., see Li, L.-h. (3) 1459–1467

Yuan, S., see Zhang, Z. (6) 3103–3111

Yuan, S.F., see Li, J (4) 2383–2391

Yuan, X., see Huang, L. (2) 873–884

Yue, H., K. Cai, H. Lin, H. Chen and Z. Zeng, An intelligent method for extraction of shape contour of rice planthoppers (4) 2129–2135

Yue, L., J. Wangwei, Z. Jianguo, G. Junjun, Z. Jiazhou and J. Aiping, Product life cycle based demand forecasting by using artificial bee colony algorithm optimized two-stage polynomial fitting (2) 825–836

Yue, Q., L. Zhang, Y. Peng, B. Yu, Y. Hong and Q. Xiao, Decision method for two-sided matching with interval-valued intuitionistic fuzzy sets considering matching aspirations (6) 2903–2910

Yun, J., see Guan, S. (4) 2213–2220

Yuping, W., see Huiyun, W. (4) 2177–2185

Yu-Yi, Z., see Hong-Li, Z. (3) 1745–1757

Zeng, Y., see Zhou, X. (2) 849–858

Zeng, Z., A novel model for enterprise technological innovation capability evaluation with 2-tuple linguistic information (1) 541–546

Zeng, Z., see Yue, H. (4) 2129–2135

Zhai, J. and W. Zhao, Ensemble of multiresolution probabilistic neural network classifiers with fuzzy integral for face recognition (1) 405–414

Zhai, Y., see Zhang, C. (6) 2829–2837

Zhan, Y., H. Pan, X. Xie, Z. Zhang and W. Li, Graph entropy-based clustering algorithm in medical brain image database (2) 1029–1039

Zhang, B., see Huang, L. (2) 873–884

Zhang, B., see Wang, P. (4) 2221–2230

Zhang, C. and J. Zhang, Interpolation strategies in repeated Richardson extrapolation (6) 2935–2939

Zhang, C., see Huang, L. (2) 873–884

Zhang, C., see Wang, H. (6) 3203–3210

Zhang, C., Y. Zhai, D. Li and Y. Mu, Steam turbine fault diagnosis based on single-valued neutrosophic multigranulation rough sets over two universes (6) 2829–2837

Zhang, C.-L., Risk assessment of supply chain finance with intuitionistic fuzzy information (3) 1967–1975

Zhang, F., S. Zong, X. Li and H. Chen, Hydraulic gap control of rolling mill based on self-tuning fuzzy PID (6) 2985–2997

Zhang, G., see Yang, L. (5) 2707–2712

Zhang, H. and S. Yang, Representations of typical hesitant fuzzy rough sets (1) 457–468

Zhang, H., see Qu, G. (1) 633–650

Zhang, H., see Zheng, Z. (5) 2611–2618

Zhang, H., Y. Wang, Y. Wang and P.L. Soon, Design and realization of two-wheel micro-mouse diagonal dashing (4) 2299–2306

Zhang, J. and K. Yang, Clustering analysis in the evaluation of securities investment funds (2) 949–956

Zhang, J., see Bao, J. (6) 3113–3120

Zhang, J., see Wang, H. (6) 3121–3130

Zhang, J., see Xie, Y. (5) 2737–2743

Zhang, J., see Xu, Y. (1) 503–518

Zhang, J., see Zhang, C. (6) 2935–2939

Zhang, J., see Zhang, Y. (6) 2807–2812

Zhang, L., see Yue, Q. (6) 2903–2910

Zhang, M., see Liu, Q. (1) 163–172

Zhang, N., see Zhou, K. (6) 3143–3153

Zhang, P., R. Xie and B. Huang, Trustworthy services diffusion based on optimizational nodes in online social network (4) 2281–2290

Zhang, Q., see Guan, F. (1) 201–212

Zhang, Q., see Guan, S. (4) 2213–2220

Zhang, Q., see Li, G. (4) 2249–2256

Zhang, Q., see Wang L. (1) 185–191

Zhang, S. and F. Han, Identifying emerging topics in a technological domain (4) 2147–2157

Zhang, S.-L., see Xiao, M.-M. (4) 2271–2279

Zhang, S.-p., see Li, J.-q. (5) 2697–2706

Zhang, T., see Ji, F. (1) 91–97

Zhang, W., B. Li and H. Yu, The correlation analysis of mine roof water inrush grade and influence factors based on Fuzzy Matter-Element (6) 3163–3170

Zhang, W., see Yang, L. (6) 3131–3142

Zhang, X., L. Wei, S. Luo and W. Xu, Similarity degrees and uncertainty measures in intuitionistic fuzzy decision tables (6) 2767–2777

Zhang, X., see Cui, C. (6) 3047–3054

Zhang, X., see Xin, X. (6) 2881–2886

Zhang, X., see Yu, J. (2) 1133–1144

Zhang, X.X., see Liu, J. (3) 1845–1857

Zhang, Y., C. Zhao, A. Chen and X. Qi, Vehicle detection in urban traffic scenes using the Pixel-Based Adaptive Segmenter with Confidence Measurement (3) 1609–1620

Zhang, Y., J. Zhang, Y. Guo and X. Sun, Fuzzy cost-based feature selection using interval multi-objective particle swarm optimization algorithm (6) 2807–2812

Zhang, Y., see Li, T. (6) 2759–2765

Zhang, Z., see Qu, G. (1) 633–650

Zhang, Z., see Zhan, Y. (2) 1029–1039

Zhang, Z., Y. Hu, C. Ma, J. Xu, S. Yuan and Z. Chen, Some risk functions of IVIFS applied to outsourced software project (6) 3103–3111

Zhang. X.-G., see Zhao, Y.-D. (3) 1977–1985

Zhao, A., S. Guan and H. Guan, A computational fuzzy time series forecasting model based on GEM-based discretization and hierarchical fuzzy logical rules (6) 2795–2806

Zhao, A., see Guan, H. (6) 2869–2879

Zhao, C., see Zhang, Y. (3) 1609–1620

Zhao, H., see Wang, J. (4) 2187–2193

Zhao, J., see Wei, L. (4) 2375–2382

Zhao, L., see Wang, Z. (6) 3067–3074

Zhao, W., see Zhai, J. (1) 405–414

Zhao, X., L. Yang and L. Wang, Models for evaluating the resource integration capability of textile enterprise with hesitant fuzzy uncertain linguistic information (3) 2001–2008

Zhao, X.R., see Xiao, Y.C. (3) 1385–1395

Zhao, Y.-D., Z.-M. Li and X.-G. Zhang, Models for software quality evaluation with fuzzy number intuitionistic fuzzy information (3) 1977–1985

Zhao, Z., see Wang, H. (6) 3121–3130

Zhao, Z., see Yu, J. (2) 1133–1144

Zheng, F., see Zhou, X. (2) 849–858

Zheng, G., see Dai, J. (3) 1341–1353

Zheng, H., see Yang, L. (5) 2707–2712

Zheng, H., see Yang, L. (5) 2713–2720

Zheng, J., see Tao, Y. (6) 2975–2983

Zheng, L.-W., see Lv, Z.-Y. (2) 787–794

Zheng, W., S. Xiao, K. Li, K. Li and W. Jiang, A performance-efficient and datapath-regular implementation of modified split-radix fast Fourier transform (2) 957–965

Zheng, X., see Yang, W. (6) 2779–2788

Zheng, Z., T. Huang, H. Zhang, S. Sun, J. Wen and P. Wang, Towards a resource migration method in cloud computing based on node failure rule (5) 2611–2618

Zhi, W., see Guo, H. (3) 1155–1166

Zhou, G., Research on supplier performance evaluation system based on data mining with triangular fuzzy information (3) 2035–2042

Zhou, G., see Wei, L. (4) 2375–2382

Zhou, J., J. Yang, H. Song, S.H. Ahmed, A. Mehmood and H. Lv, An online marking system conducive to learning (5) 2463–2471

Zhou, J., see Deng, Z. (2) 1065–1078

Zhou, K. and N. Zhang, Mineral prospectivity mapping for Porphyry-type and hydrothermal vein-type copper deposits using fuzzy analytical hierarchy process and geographic information system (6) 3143–3153

Zhou, L., see Fan, J. (4) 2195–2202

Zhou, W., see Song, S. (6) 2941–2948

Zhou, X., see Xiao, G. (2) 1109–1120

Zhou, X., Y. Zhou, G. Xiao, Y. Zeng and F. Zheng, Effective approach for an extended P-skyline query (2) 849–858

Zhou, Y., see Li, L. (3) 1355–1363

Zhou, Y., see Zhou, X. (2) 849–858

Zhou, Y.-f., see Li, L.-h. (3) 1459–1467

Zhou, Z., see Lu, W. (5) 2629–2636

Zhu, C., see Cai, L. (4) 2321–2333

Zhu, J., see Xiong, Z. (3) 1769–1778

Zhu, L., see Gao, W. (4) 2411–2419

Zhu, L.-C., Research on the management performance evaluation of the sports sites with intuitionistic fuzzy information (3) 1377–1384

Zhu, T., see Jiang, D. (5) 2497–2509

Zhu, X., see Tang, X. (2) 1079–1088

Zong, S., see Zhang, F. (6) 2985–2997