نتایج جستجو برای: secure sets
تعداد نتایج: 266654 فیلتر نتایج به سال:
Fuzzy decision-making consists in making decisions under complex and uncertain environments where the information can be assessed with fuzzy sets and systems. The aim of this study is to review the main contributions in this field by using a bibliometric approach. For doing so, the article uses a wide range of bibliometric indicators including the citations and the h-index. Moreover, it also us...
Let X denote a locally compact metric space and φ : X → X be a continuous map. In the 1970s L. Zadeh presented an extension principle, helping us to fuzzify the dynamical system (X, φ), i.e., to obtain a map Φ for the space of fuzzy sets on X. We extend an idea mentioned in [P. Diamond, A. Pokrovskii, Chaos, entropy and a generalized extension principle, Fuzzy Sets and Systems 61 (1994)] and we...
Ying-Ming Wang , Jian-Bo Yang, Dong-Ling Xu, Kwai-Sang Chin a Manchester Business School, The University of Manchester, PO Box 88, Manchester M60 1QD, UK b School of Public Administration, Fuzhou University, Fuzhou, Fujian, 350002, PR China c Department of Manufacturing Engineering and Engineering Management, City University of Hong Kong, Tat Chee, Kowloon, Hong Kong Abstract In a paper by Chen...
The mean-variance methodology for the portfolio selection problem, originally proposed by Markowitz, has been one of the most important research fields in modern finance. In this paper we will assume that (i) each investor can assign a welfare, or utility, score to competing investment portfolios based on the expected return and risk of the portfolios; and (ii) the rates of return on securities...
When abundant, seeds of the high-elevation whitebark pine (WBP; Pinus albicaulis) are an important fall food for grizzly bears (Ursus arctos) in the Greater Yellowstone Ecosystem. Rates of bear mortality and bear/human conflicts have been inversely associated with WBP productivity. Recently, mountain pine beetles (Dendroctonus ponderosae) have killed many cone-producing WBP trees. We used fall ...
An OT-combiner takes n candidate implementations of the oblivious transfer (OT) functionality, some of which may be faulty, and produces a secure instance of oblivious transfer as long as a large enough number of the candidates are secure. We see an OT-combiner as a 2-party protocol that can make several black-box calls to each of the n OT candidates, and we want to protect against an adversary...
in this paper, a new definition of fuzzy bounded sets and totallyfuzzy bounded sets is introduced and properties of such sets are studied. thena relation between totally fuzzy bounded sets and n-compactness is discussed.finally, a geometric characterization for fuzzy totally bounded sets in i- topologicalvector spaces is derived.
Password-based authentication is the most popular authentication mechanism for humans today, not only on the internet. Despite increasing efforts to move to supposedly more secure alternatives, password-based authentication is most likely to stay for the foreseeable future due to its user experience and convenience. However, although secure cryptographic protocols for password-based authenticat...
In this paper, we introduce and study a new topology related to a self mapping on a nonempty set.Let X be a nonempty set and let f be a self mapping on X. Then the set of all invariant subsets ofX related to f, i.e. f := fA X : f(A) Ag P(X) is a topology on X. Among other things,we nd the smallest open sets contains a point x 2 X. Moreover, we find the relations between fand To f . For insta...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید