Soft Computing, Volume 30, Issue 2, February 2026

1) Quantum-secure lightweight fuzzy extractor based user authentication scheme for internet of medical thingsAuthor(s): Arman Ahmad, S. Jagatheswari, R. PraveenPages: 787 – 808
2) Decision making based on interval type-2 neutrosophic numbers involving the optimal selection of a houseAuthor(s): Muhammad Touqeer, Ehtisham Rasool, Soheil SalahshourPages: 809 – 821
3) Trading strategy for Bitcoin and Ethereum by neural network modelAuthor(s): Mimmo Parente, Luca RizzutiPages: 823 – 834
4) A many-objective evolutionary algorithm based on reference vectors and hyper-distanceAuthor(s): Xujian Wang, Yongjin Jing, Minli YaoPages: 835 – 852
5) A novel probabilistic risk measure model for multi-period uncertain portfolio selectionAuthor(s): Hong-Liang Dai, Cui-Yin Huang, Ye-Sen SunPages: 853 – 866
6) Assessing managerial challenges to industry 4.0 adoption in the lighting industry using pythagorean fuzzy SWARAAuthor(s): Ali Ihsan Boyaci, Gülşen Akman, Serra UtkuPages: 867 – 890
7) FarsTail: a Persian natural language inference datasetAuthor(s): Hossein Amirkhani, Mohammad AzariJafari, Azadeh AmirakPages: 891 – 903
8) An intelligent homomorphic blockchain approach for securing stock market dataAuthor(s): K. Swanthana, S. S. AravinthPages: 905 – 919
9) A technical Chinese stock selection model with two autoencodersAuthor(s): Peiwu Dong, Huimin TangPages: 921 – 934
10) Symmetric key and polynomial-based key generation mechanism for secured data communications in 5G networksAuthor(s): S. Pradeep, S. Muthurajkumar, A. KannanPages: 935 – 950
11) Large-scale alternative processing group decision-making under Pythagorean linguistic preference environmentAuthor(s): Prasenjit Mandal, Sovan Samanta, Madhumangal PalPages: 951 – 964
12) A study on hand gesture recognition algorithm realized with the aid of efficient feature extraction method and convolution neural networks: design and its application to VR environmentAuthor(s): Zhen Wang, Sung-Hoon Yoo, Witold PedryczPages: 965 – 988
13) A development of coordinate-based fuzzy encoding algorithm in compression of grayscale imagesAuthor(s): Dan Wang, Xiubin Zhu, Zhiwu LiPages: 989 – 999
14) A dominance-inferiority-based rough set model and its application to car evaluationAuthor(s): Bin Yu, Hengjie Xie, Zeshui XuPages: 1001 – 1009
15) Time-series forecasting based on fuzzy cognitive maps and GRU-autoencoderAuthor(s): Xiaoqian Liu, Yingjun Zhang, Hua HuangPages: 1011 – 1027
16) Social context-aware and fuzzy preference temporal graph for personalized B2B marketing campaigns recommendationsAuthor(s): Sarita Patil, Vinod Vaze, Hemant MahajanPages: 1029 – 1044
17) Hybrid whale optimization algorithm with simulated annealing for load frequency controller design of hybrid power systemAuthor(s): Pratap Chandra Nayak, Sonalika Mishra, Sidhartha PandaPages: 1045 – 1068
18) An improved sparrow search algorithm optimized fuzzy controller for the tea water-removin temperature control systemAuthor(s): Xingran Chen, Haisong Huang, Pengfei HuPages: 1069 – 1088
19) A mutation-based modified binary fruit fly optimization for feature selection to predict CD4+/CD8+ T-cells epitopesAuthor(s): Pratik Angaitkar, Rekh Ram Janghel, Tirath Prasad SahuPages: 1089 – 1108
20) Model order reduction for SISO and MIMO system using improved adaptive differential evolution algorithmAuthor(s): Aditya Prasad Padhy, Sibarama Panigrahi, Prateek PratyashaPages: 1109 – 1128
21) Utilizing heuristic strategies for predicting the backbreak occurrences in open-pit mines, Gol Gohar Mine, IranAuthor(s): Parviz Sorabi, Mohammad Ataei, Mohammad Hosein HabibiPages: 1129 – 1144
22) Exploring and mining rationale information for low-rating software applicationsAuthor(s): Tahir Ullah, Javed Ali Khan, Hasna ArshadPages: 1145 – 1170
23) Bidirectional normalized q-rung orthopair fuzzy projection and extended TOPSIS approach to multiattribute group decision makingAuthor(s): Xiaoping Jia, Baozhu Jia, Shoujun ZhangPages: 1171 – 1192
24) Novel rough set models based on hesitant fuzzy informationAuthor(s): José Carlos R. Alcantud, Feng Feng, Stefania TomasielloPages: 1193 – 1214
25) A secure and intelligent public distribution system (SIPDS) based on deep learning and Ethereum using predictive analytics for supply chain servicesAuthor(s): C. Devi Parameswari, M. IlayarajaPages: 1215 – 1231
26) A novel EZS-MSCA and SeLu SqueezeNet-based lung tumor detection and classificationAuthor(s): Vijay Kumar Gugulothu, Savadam BalajiPages: 1233 – 1244
27) A recurrent neural network-based identification of complex nonlinear dynamical systems: a novel structure, stability analysis and a comparative studyAuthor(s): R. Shobana, Rajesh Kumar, Bhavnesh JaintPages: 1245 – 1261
28) Development of a multi-stage, multi-product solid supply chain network design and solution with meta-heuristic algorithmsAuthor(s): Amir Rezaei, Golara Chaharmahali, Mostafa Hajiaghaei-KeshteliPages: 1263 – 1278
29) A crossover-based optimization algorithm for multilevel image segmentationAuthor(s): Dikshit Chauhan, Anupam YadavPages: 1279 – 1311
30) Development of trust-based authorization and authentication framework for secure electronic health payment in cloud environmentAuthor(s): A. Saranya, R. Naresh, M. JeniferPages: 1313 – 1328
31) Increasing drilling efficiency: rock drillability assessment with improved reliability methodsAuthor(s): Hadi Fattahi, Fateme JiryaeePages: 1329 – 1346
32) Mitigating concept drift in data streams: an incremental decision tree approachAuthor(s): Hadi Tarazodar, Karamollah Bagherifard, Razieh MalekhosseiniPages: 1347 – 1376
33) Sensorless control of permanent magnet synchronous motor based on two stage low pass filtering sliding mode observerAuthor(s): Xinhong Zou, Kai Yang, Yixiao LuoPages: 1377 – 1390
34) A novel image encryption algorithm using tent and Lorenz chaotic systemAuthor(s): Balmukund Jha, Piyush Kumar Singh, Vandna Rani VermaPages: 1391 – 1412
35) CCNet: Cross-teaching semi-supervised ultrasound image segmentation with hybrid convolutional kernelsAuthor(s): Huabiao Zhou, Yanmin Luo, Weiwei LinPages: 1413 – 1429
36) Vision transformer-based fuzzy semi-supervised multimodal learning for skin lesion image classificationAuthor(s): Israt Yasmin, Suriya Sultana, M. Jamshed Alam PatwaryPages: 1431 – 1449
37) Correction to: Note on modular equations in the theory of signature 4Author(s): B. R. Srivatsa Kumar, P. S. Guruprasad, RakshaPages: 1451 – 1451
38) Correction to: Automated facial expression recognition using exemplar hybrid deep feature generation techniqueAuthor(s): Mehmet Baygin, Ilknur Tuncer, U. Rajendra AcharyaPages: 1453 – 1454
39) Correction to: An asymmetric lightweight multi-task network based on KAN ConvolutionAuthor(s): Fanyun Meng, Yongqiang Sun, Jinlong WangPages: 1455 – 1455
40) Correction to: On multi-objective multi-coverage covering salesman problemAuthor(s): Amiya Biswas, Erfan Babaee Tirkolaee, Tandra PalPages: 1457 – 1457