نتایج جستجو برای: adversary fuzzy structure

تعداد نتایج: 1657955  

Journal: :iranian journal of fuzzy systems 2004
fu-gui shi

in this paper, countable compactness and the lindel¨of propertyare defined for l-fuzzy sets, where l is a complete de morgan algebra. theydon’t rely on the structure of the basis lattice l and no distributivity is requiredin l. a fuzzy compact l-set is countably compact and has the lindel¨ofproperty. an l-set having the lindel¨of property is countably compact if andonly if it is fuzzy compact. ...

2004
Ronald R. Yager

We discuss the use of the fuzzy measure for representing information about uncertain variables. We describe the relationship between the fuzzy measure and the Dempster-Shafer belief structure. A method for generating the fuzzy measures associated with a D-S belief structure is described. We discuss the use of the Shapley index as a means for providing an entropy for fuzzy measures. We introduce...

2016
Ashe Magalhaes

Cyber enterprise systems often are difficult to protect due to a large number of sub-components that must work in concert to remain resilient. In cyber enterprises where incoming traffic may approach a few megabits per second, an IDS and host system controlled by a Markov Decision Process may serve as an efficient resiliency solution. However, the structure of this model leverages very little i...

2013
VILDAN ÇETKIN HALIS AYGÜN

The purpose of this paper is to introduce Shi’s (quasi-)uniformity structure in the context of fuzzy soft sets. We define the notion of a fuzzy soft (quasi-)uniformity in the sense of Shi. We give the relations between a fuzzy soft (quasi-)uniformity and a fuzzy soft cotopology. Also, we investigate the relations between fuzzy soft remote neighborhood structures which are generated by a given f...

2005
Zhifang Zhang Mulan Liu Liangliang Xiao

As an extension of multi-party computation (MPC), we propose the concept of secure parallel multi-party computation which is to securely compute multi-functions against an adversary with multistructures. Precisely, there are m functions f1, ..., fm and m adversary structures A1, ...,Am, where fi is required to be securely computed against an Ai-adversary. We give a general construction to build...

Journal: :Electronic Notes in Theoretical Computer Science 2003

Journal: :Marshall journal of medicine 2023

Propofol Related Infusion Syndrome (PRIS) was first described in 1998. It has a strange collection of symptoms, including marked bradycardia, persistent, recalcitrant metabolic acidosis, liver enlargement, rhabdomyolysis, and lipemic blood. We present two recent patients who appeared to have had PRIS. Creatinine kinase seems be an early detector If PRIS is recognized early, this complex process...

Journal: :Fuzzy Sets and Systems 2016
Branka Budimirovic Vjekoslav Budimirovic Branimir Seselja Andreja Tepavcevic

Abstract An E -fuzzy group is a lattice-valued algebraic structure, defined on a crisp algebra which is not necessarily a group. The crisp equality is replaced by a particular fuzzy one denoted by E . Classical group-like properties are formulated as appropriate fuzzy identities special lattice theoretic formulas. We prove basic features of E -fuzzy groups: properties of the unit and inverses, ...

Journal: :IEEE Trans. Knowl. Data Eng. 2013
HweeHwa Pang Jilian Zhang Kyriakos Mouratidis

Users of databases that are hosted on shared servers cannot take for granted that their queries will not be disclosed to unauthorized parties. Even if the database is encrypted, an adversary who is monitoring the I/O activity on the server may still be able to infer some information about a user query. For the particular case of a B-tree that has its nodes encrypted, we identify properties that...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید