[PDF][PDF] Neutrosophic Crisp Set Theory
AA Salama - 2015 - philarchive.org
Page 1 AA Salama & Florentin Smarandache Neutrosophic Crisp Set Theory Neutrosophic
Crisp Set with Type 3. Neutrosophic Crisp Set with Type 2. Neutrosophic Crisp Set with Type …
Crisp Set with Type 3. Neutrosophic Crisp Set with Type 2. Neutrosophic Crisp Set with Type …
A botnets circumspection: The current threat landscape, and what we know so far
Botnets have carved a niche in contemporary networking and cybersecurity due to the
impact of their operations. The botnet threat continues to evolve and adapt to …
impact of their operations. The botnet threat continues to evolve and adapt to …
Introduction to image processing via neutrosophic techniques
AA Salama, F Smarandache, M Eisa - Infinite study, 2014 - books.google.com
This paper is an attempt of proposing the processing approach of neutrosophic technique in
image processing. As neutrosophic sets is a suitable tool to cope with imperfectly defined …
image processing. As neutrosophic sets is a suitable tool to cope with imperfectly defined …
Review of recommender systems algorithms utilized in social networks based e-learning systems & neutrosophic system
AA Salama, M Eisa, SA ELhafeez… - Neutrosophic Sets and …, 2015 - books.google.com
In this paper, we present a review of different recommender system algorithms that are
utilized in social networks based e-Learning systems. Future research will include our …
utilized in social networks based e-Learning systems. Future research will include our …
Neutrosophic crisp set theory
AA Salama, F Smarandache - Neutrosophic Sets and Systems, 2014 - books.google.com
The purpose of this paper is to introduce new types of neutrosophic crisp sets with three
types 1, 2, 3. After given the fundamental definitions and operations, we obtain several …
types 1, 2, 3. After given the fundamental definitions and operations, we obtain several …
Optimizing Security Measures in Decentralized Mobile Networks with Neutrosophic Fuzzy Topology and PKI
AA Salama, MY Shams, R Bhatnagar… - 2023 3rd …, 2023 - ieeexplore.ieee.org
This study proposes a method to improve the security of decentralized mobile networks
using Neutrosophic Fuzzy Local Function Algorithms D*, B*, and A* to optimize the decision …
using Neutrosophic Fuzzy Local Function Algorithms D*, B*, and A* to optimize the decision …
On the internal workings of botnets: A review
CO Emmanuel, V Nikos, C Ogu… - International …, 2020 - eprints.federalpolyilaro.edu.ng
Denial of Service and Distributed Denial of Service Attacks have significantly shackled the
development of computer networks and the internet, and masked their innumerable benefits …
development of computer networks and the internet, and masked their innumerable benefits …
Neutrosophic Crisp Set Theory
F Smarandache, AA Salama - 2015 - digitalrepository.unm.edu
Since the world is full of indeterminacy, the Neutrosophics found their place into
contemporary research. We now introduce for the first time the notions of Neutrosophic Crisp …
contemporary research. We now introduce for the first time the notions of Neutrosophic Crisp …
[PDF][PDF] An Intuitionistic Fuzzy Sets Implementation for Key Distribution in Hybrid Message Encryption Over Wsns
YM Wazery, MAS Ali - International Journal of Advances in …, 2018 - pdfs.semanticscholar.org
WSN is a way of handling dangerous and hostile environments safely. It replaces human
existence with nodes and units that could sustain its existence under extreme …
existence with nodes and units that could sustain its existence under extreme …
[PDF][PDF] Year of Publication: 2016
PP Jog, AB Patankar - 2016 - academia.edu
This paper presents a novel method for solving the shoulder surfing problem commonly
found in the graphical password authentication system. Authentication of a user is the critical …
found in the graphical password authentication system. Authentication of a user is the critical …