[PDF][PDF] Neutrosophic Crisp Set Theory

AA Salama - 2015 - philarchive.org
Page 1 AA Salama & Florentin Smarandache Neutrosophic Crisp Set Theory Neutrosophic
Crisp Set with Type 3. Neutrosophic Crisp Set with Type 2. Neutrosophic Crisp Set with Type …

A botnets circumspection: The current threat landscape, and what we know so far

EC Ogu, OA Ojesanmi, O Awodele, S Kuyoro - Information, 2019 - mdpi.com
Botnets have carved a niche in contemporary networking and cybersecurity due to the
impact of their operations. The botnet threat continues to evolve and adapt to …

Introduction to image processing via neutrosophic techniques

AA Salama, F Smarandache, M Eisa - Infinite study, 2014 - books.google.com
This paper is an attempt of proposing the processing approach of neutrosophic technique in
image processing. As neutrosophic sets is a suitable tool to cope with imperfectly defined …

Review of recommender systems algorithms utilized in social networks based e-learning systems & neutrosophic system

AA Salama, M Eisa, SA ELhafeez… - Neutrosophic Sets and …, 2015 - books.google.com
In this paper, we present a review of different recommender system algorithms that are
utilized in social networks based e-Learning systems. Future research will include our …

Neutrosophic crisp set theory

AA Salama, F Smarandache - Neutrosophic Sets and Systems, 2014 - books.google.com
The purpose of this paper is to introduce new types of neutrosophic crisp sets with three
types 1, 2, 3. After given the fundamental definitions and operations, we obtain several …

Optimizing Security Measures in Decentralized Mobile Networks with Neutrosophic Fuzzy Topology and PKI

AA Salama, MY Shams, R Bhatnagar… - 2023 3rd …, 2023 - ieeexplore.ieee.org
This study proposes a method to improve the security of decentralized mobile networks
using Neutrosophic Fuzzy Local Function Algorithms D*, B*, and A* to optimize the decision …

On the internal workings of botnets: A review

CO Emmanuel, V Nikos, C Ogu… - International …, 2020 - eprints.federalpolyilaro.edu.ng
Denial of Service and Distributed Denial of Service Attacks have significantly shackled the
development of computer networks and the internet, and masked their innumerable benefits …

Neutrosophic Crisp Set Theory

F Smarandache, AA Salama - 2015 - digitalrepository.unm.edu
Since the world is full of indeterminacy, the Neutrosophics found their place into
contemporary research. We now introduce for the first time the notions of Neutrosophic Crisp …

[PDF][PDF] An Intuitionistic Fuzzy Sets Implementation for Key Distribution in Hybrid Message Encryption Over Wsns

YM Wazery, MAS Ali - International Journal of Advances in …, 2018 - pdfs.semanticscholar.org
WSN is a way of handling dangerous and hostile environments safely. It replaces human
existence with nodes and units that could sustain its existence under extreme …

[PDF][PDF] Year of Publication: 2016

PP Jog, AB Patankar - 2016 - academia.edu
This paper presents a novel method for solving the shoulder surfing problem commonly
found in the graphical password authentication system. Authentication of a user is the critical …