نتایج جستجو برای: secure sets
تعداد نتایج: 266654 فیلتر نتایج به سال:
Fuzziness is not a priori an obvious concept and demands some explanation. “Fuzziness” is what Black (NF 1937) calls “vagueness” when he distinguishes it from “generality” and from “ambiguity.” Generalizing refers to the application of a symbol to a multiplicity of objects in the field of reference, ambiguity to the association of a finite number of alternative meanings having the same phonetic...
Atanassov K. , Intuitionistic Fuzzy Sets. , VII ITKR's Section, Sofia, June 1983. Hashimoto H. , Sub-inverses of fuzzy Matrices, Fuzzy Sets and Systems, Vol. 12(1984),155-168. Murugadas P and Lalitha K. , Dual Implication Operator in Intuitionistic Fuzzy Matrices, International conference on Mathematical Modelling and its Application-2012. Sriram S and Murugadas P. , Sub-inverses of Intuit...
Some simple yet pragmatic methods of consistency test are developed to check whether an interval fuzzy preference relation is consistent. Based on the definition of additive consistent fuzzy preference relations proposed by Tanino [Fuzzy Sets and Systems 12 (1984) 117131], a study is carried out to examine the correspondence between the element and weight vector of a fuzzy preference relation. ...
the main purpose of this research was 10 study the relationship between attachment styles (secure. avoidant, ambivalent) and personality dimensions (neuroticism. extraversion, openness, agreeableness. consciousness) . two hundred and thirty three students ( 102 male. 131 female ) from the university of tehran participated in this study . adult attachment inventory (aai) was applied for measurin...
Abstract Most existing Secure Multi-Party Computation (MPC) protocols for privacy-preserving training of decision trees over distributed data assume that the features are categorical. In real-life applications, often numerical. The standard “in clear” algorithm to grow on with continuous values requires sorting examples each feature in quest an optimal cut-point range node. Sorting is expensive...
Traditional database access control mechanisms use role based methods, with generally row based and attribute based constraints for granularity, and privacy is achieved mainly by using views. However if only a set of views according to policy are made accessible to users, then this set should be checked against the policy for the whole probable query history. The aim of this work is to define a...
This study aimed to examine the relationship between adolescents' psychological resilience and attachment styles. research was designed according correlational design, which is one of quantitative methods. The population consists high school students studying in Şahinbey District Gaziantep. sample 570 3 Anatolian High Schools, 2 Vocational Technical 1 Imam Hatip School, determined randomly by s...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید