Zobrazeno 1 - 10
of 381
pro vyhledávání: '"Ubaid ur Rehman"'
Publikováno v:
Scientific Reports, Vol 14, Iss 1, Pp 1-28 (2024)
Abstract In recent days researchers have tried to handle the maximum information and use those techniques and methods in which there is no chance of data loss or loss of information is minimum. The structure like fuzzy set and complex fussy set canno
Externí odkaz:
https://doaj.org/article/ff7f599a2ba24b7e89d7593c74dd15d2
Publikováno v:
Ain Shams Engineering Journal, Vol 15, Iss 7, Pp 102852- (2024)
In recent scenarios, we cannot ignore the importance of artificial intelligence in many fields like medical diagnosis, computer science, economics and agriculture, etc. In 1960, Schweizer and Sklar developed the concept of Schweizer-Sklar (SS) t-norm
Externí odkaz:
https://doaj.org/article/5fb2ff48fb23470a96b70fe7e3344a19
Publikováno v:
IEEE Access, Vol 12, Pp 123127-123148 (2024)
The term “cloud security (CS)” describes the collection of procedures and tools intended to defend networks, data, apps, and systems used in cloud computing from possible security risks and unauthorized access. Data breaches, identity and access
Externí odkaz:
https://doaj.org/article/5ce5990575ce48d8a7ddfd40c0f9ccc6
Publikováno v:
IEEE Access, Vol 12, Pp 110146-110159 (2024)
Data sources are the raw information that is required for analysis and modeling in data sciences. They assist data scientists in making proper conclusions, proving hypotheses, and making rational decisions. It is always preferable if analytical resul
Externí odkaz:
https://doaj.org/article/3daeae36aee04ad89ccf31a6b25dd375
Publikováno v:
IEEE Access, Vol 12, Pp 80847-80858 (2024)
The selection of the proper P2P energy trading platform is a complicated multi-attribute decision-making (MADM) dilemma that involves evaluating different alternatives against various attribute. Traditional MADM techniques often fail to capture the b
Externí odkaz:
https://doaj.org/article/b9d0eb2cd6094d65a125e1b0394cc9a7
Publikováno v:
IEEE Access, Vol 12, Pp 66453-66465 (2024)
Two-dimensional approach is very important in real-life scenarios. To address situations where two-dimensional information is involved, the theory of complex fuzzy set (CFS) is a reliable and applicable structure. The CFS gives a more expressive stru
Externí odkaz:
https://doaj.org/article/15e4a56eac4948bba9e06e41f7e792a9
Publikováno v:
IEEE Access, Vol 12, Pp 65838-65855 (2024)
The theory of complex Pythagorean fuzzy set (CPFS) has been already interpreted. This theory states that in both polar and Cartesian form the degree of membership and degree of non-membership are located in a complex plane’s unit disc. However the
Externí odkaz:
https://doaj.org/article/45ca73e3b3de489b84fa3346fdedc22e
Publikováno v:
IEEE Access, Vol 12, Pp 56383-56399 (2024)
There are many computer vision technologies available, each having advantages and disadvantages of its own. Effective visual data analysis requires choosing the best technology and giving its deployment top priority. A strong framework for decision-m
Externí odkaz:
https://doaj.org/article/b006d43b9a624a0392ebab4c473081e6
Publikováno v:
IEEE Access, Vol 12, Pp 35417-35447 (2024)
A trustworthy cloud services provider makes sure that data backups, disaster recovery, and compliance with industry standards are all met, allowing businesses to concentrate on their core competencies and innovation while leaving the complexity of IT
Externí odkaz:
https://doaj.org/article/def1887c559e44f688bef5d48a234149
Publikováno v:
IEEE Access, Vol 12, Pp 38163-38179 (2024)
Numerous factors, including project complexity, team size, customer collaboration, and development pace, must be taken into consideration while choosing a software development methodology. This problem is a multi-criteria decision-making dilemma sinc
Externí odkaz:
https://doaj.org/article/cf4232f12233471f84fcddd5a72c236e