Results 31 to 40 of about 42 (42)

Binary relations applied to the fuzzy substructures of quantales under rough environment

open access: yesDemonstratio Mathematica
Binary relations (BIRs) have many applications in computer science, graph theory, and rough set theory. This study discusses the combination of BIRs, fuzzy substructures of quantale, and rough fuzzy sets.
Mazher Qurashi Saqib   +4 more
doaj   +1 more source

Fuzzy ideals of ordered semigroups with fuzzy orderings

open access: yesOpen Mathematics, 2016
The purpose of this paper is to introduce the notions of ∈, ∈ ∨qk-fuzzy ideals of a fuzzy ordered semigroup with the ordering being a fuzzy relation. Several characterizations of ∈, ∈ ∨qk-fuzzy left (resp. right) ideals and ∈, ∈ ∨qk-fuzzy interior ideals
Huang Xiaokun, Li Qingguo
doaj   +1 more source

State maps on semihoops

open access: yesOpen Mathematics, 2018
In this paper, we introduce the notion of state maps from a semihoop H1 to another semihoop H2, which is a generalization of internal states (or state operators) on a semihoop H.
Fu Yu Long, Xin Xiao Long, Wang Jun Tao
doaj   +1 more source

New topology in residuated lattices

open access: yesOpen Mathematics, 2018
In this paper, by using the notion of upsets in residuated lattices and defining the operator Da(X), for an upset X of a residuated lattice L we construct a new topology denoted by τa and (L, τa) becomes a topological space.
Holdon L.C.
doaj   +1 more source

On L-Fuzzy Multiplication Modules

open access: yesDiscussiones Mathematicae - General Algebra and Applications, 2017
Let L be a complete lattice. In a manner analogous to a commutative ring, we introduce and investigate the L-fuzzy multiplication modules over a commutative ring with non-zero identity.
Atani Shahabaddin Ebrahimi   +1 more
doaj   +1 more source

On implementation of Stickel's key exchange protocol over max-min and max-T semirings

open access: yesJournal of Mathematical Cryptology
Given that the tropical Stickel protocol and its variants are all vulnerable to the generalized Kotov–Ushakov attack, we suggest employing the max-min semiring and, more generally, max-TT semiring where the multiplication is based on a TT-norm, as a ...
Alhussaini Sulaiman, Sergeev Sergeĭ
doaj   +1 more source

On residuated n-lattice

open access: yesAnalele Stiintifice ale Universitatii Ovidius Constanta: Seria Matematica
In this paper, we introduce residuated n-lattice: a variety of residuated semigroup equipped with binary hyperoperations n-sup and n-inf. We define the left bound, right bound, n-supremum, n-infimum, maximum and minimum with respect to it′s relation.
Zahiri Saeide, Saeid Arsham Borumand
doaj   +1 more source

The resolution of excess investment in Fuzzy portfolio selection using piecewise linear function

open access: yesApplied Mathematics in Science and Engineering
Fuzzy portfolio selection on the guaranteed return rate has been proposed to study excess investment in different dimensions of risk preferences. However, the theory of behavioural finance proposes that the investment proportions of securities are not ...
Yin-Yin Huang   +3 more
doaj   +1 more source

Max-min fuzzy bi-level programming: resource sharing system with application

open access: yesApplied Mathematics in Science and Engineering
This study delves into the application of min-max fuzzy relation systems, specifically focusing on equality and inequality, in the examination of educational institution networks and their resource-sharing dynamics, akin to a P2P network structure ...
Lei Zhang
doaj   +1 more source

Triangular intuitionistic fuzzy linear system of equations with applications: an analytical approach

open access: yesApplied Mathematics in Science and Engineering
This study extended an existing semi-analytical technique, the Homotopy Perturbation Method, to the Block Homotopy Modified Perturbation Method by solving two [Formula: see text] crisp triangular intuitionistic fuzzy (TIF) systems of linear equations. In
Mudassir Shams   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy