Results 121 to 130 of about 14,981 (203)

Selection of Cloud Security by Employing MABAC Technique in the Environment of Hesitant Bipolar Complex Fuzzy Information

open access: yesIEEE Access
The term “cloud security (CS)” describes the collection of procedures and tools intended to defend networks, data, apps, and systems used in cloud computing from possible security risks and unauthorized access.
Hafiz Muhammad Waqas   +4 more
doaj   +1 more source

A neural network architecture for implementation of expert systems for real time monitoring [PDF]

open access: yes
Since neural networks have the advantages of massive parallelism and simple architecture, they are good tools for implementing real time expert systems.
Ramamoorthy, P. A.
core   +1 more source

Making large information sources better accessible using fuzzy set theory [PDF]

open access: yes, 2013
B.P. Buckles   +6 more
core   +1 more source

Automated implementation of rule-based expert systems with neural networks for time-critical applications [PDF]

open access: yes
In fault diagnosis, control and real-time monitoring, both timing and accuracy are critical for operators or machines to reach proper solutions or appropriate actions.
Govind, Girish   +2 more
core   +1 more source

Decision-Making Approach Based on Bipolar Complex Fuzzy Uncertain Linguistic Aggregation Operators

open access: yesIEEE Access
There are many computer vision technologies available, each having advantages and disadvantages of its own. Effective visual data analysis requires choosing the best technology and giving its deployment top priority.
Tahir Mahmood   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy