نتایج جستجو برای: secure sets
تعداد نتایج: 266654 فیلتر نتایج به سال:
Distributed real-time and embedded (DRE) systems composed of mixed criticality task sets are increasingly being deployed in mobile and embedded cloud computing platforms. These DRE systems not only must operate over a range of temporal and spatial scales, but also require stringent assurances on the secure communications between the system’s tasks without violating timing constraints of the ind...
article 1 of the european convention on human rights provides that the contracting parties shall secure to everyone ‘within their jurisdiction’ the rights and freedoms defined in the convention. at a technical level, the key question is how one should interpret the word ‘jurisdiction’ in article 1. this article plays a key role in the convention system since it sets out the limits on the obliga...
the aim of this paper is to initiate and investigate new soft sets over semihypergroups, named special soft sets and transitive soft sets and denoted by $s_{h}$ and $t_{h},$ respectively. it is shown that $t_{h}=s_{h}$ if and only if $beta=beta^{*}.$ we also introduce the derived semihypergroup from a special soft set and study some properties of this class of semihypergroups.
Our interest in this paper is to define and study the concept of a fuzzy hypergroup, which depends on the concept of a fuzzy space. Indeed, the paper is a continuation of ideas presented by Davvaz [Fuzzy Sets and Systems, 101 (1999) 191-195]. A relation between a fuzzy hypergroup based on a fuzzy space and a fuzzy hypergroup in the sense of Davvaz is obtained 2010 AMS Classification: 20N20
Using mid-infrared and radio criteria, we select a sample of candidate z ∼ 2 obscured quasars. Optical spectroscopy confirms about half of these as type-2 quasars, and modelling the population suggests 50-80% of the quasars are obscured. We find some flat radio spectrum type-2 quasars, and tentative evidence for obscuration unrelated to the torus. Using a similar sample, we also find evidence f...
T is my great pleasure to welcome you to the inaugural I issue of the IEEE TRANSACTIONS ON FUZZY SYSTEMS. Many of you are probably quite familiar with the basic ideas underlying fuzzy sets and systems that utilize fuzzy models. However, there will also be readers who are looking at the contents of this issue, wondering what it’s all about. For this latter group, the papers in this first issue m...
The concepts of fuzzy e-open sets and fuzzy e-continuous are introduced and studied in fuzzifying topology and by making use of these concepts, we introduce and study T e 0 -, R e 0-, T e 1 -, R e 1-, T e 2 -, T e 3 -, T e 4 -, strong T e 3 and strong T e 4 separation axioms in fuzzifying topology and give some of their characterizations as well as the relations of these axioms and other separa...
the purpose of present research was comparing tendency to risky behaviours in secure/insecure attachment in parents (mother/father). the results showed that those showing insecure attachment patterns towards the mother were significantly higher at risk to become cigarette smokers, drug persuasion, and alcohol drinkers compared to those with secure attachment patterns. those showing insecure att...
In this paper we associate the three concepts of language, thinking, and meaning with Fuzzy Sets and Systems and Fuzzy Logic. We present some developments in 20 th century history of science and of humanities that show deep links between these concepts and we give a proposal for a fuzzy theoretical interpretation of what is meaning.
Recently, Vemuri and Jayaram proposed a novel method of generating fuzzy implications from a given pair of fuzzy implications. Viewing this as a binary operation ~ on the set I of all fuzzy implications they obtained, for the first time, a monoid structure (I,~) on the set I. Some algebraic aspects of (I,~) had already been explored and hitherto unknown representation results for the Yager’s fa...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید