Results for 'Ēdoward Shamiri Harowtʻyownyan'

4 found
Order:
  1. Dedowktiv tramabanowtʻyan tesowtʻyan hartsʻer.Ēdoward Shamiri Harowtʻyownyan - 1972
  2. Hay pʻilisopʻayakan mitkʻě tasninnerord dari arahajin kesin.Ēdoward Shamiri Harowtʻyownyan - 1965
     
    Export citation  
     
    Bookmark  
  3.  14
    Evaluation of Network Security Service Provider Using 2-Tuple Linguistic Complex q -Rung Orthopair Fuzzy COPRAS Method.Sumera Naz, Muhammad Akram, Mohammed M. Ali Al-Shamiri & Muhammad Ramzan Saeed - 2022 - Complexity 2022:1-27.
    In recent years, network security has become a major concern. Using the Internet to store and analyze data has become an integral aspect of the production and operation of many new and traditional enterprises. However, many enterprises lack the necessary resources to secure information security, and selecting the best network security service provider has become a real issue for many enterprises. This research introduces a novel decision-making method utilizing the 2-tuple linguistic complex q-rung orthopair fuzzy numbers to tackle this issue. (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  4.  15
    Novel Development to the Theory of Dombi Exponential Aggregation Operators in Neutrosophic Cubic Hesitant Fuzzy Sets: Applications to Solid Waste Disposal Site Selection.Ateeq Ur Rehman, Muhammad Gulistan, Nasreen Kausar, Sajida Kousar, Mohammed M. Al-Shamiri & Rashad Ismail - 2022 - Complexity 2022:1-16.
    The neutrosophic cubic hesitant fuzzy set can efficiently handle the complex information in a decision-making problem because it combines the advantages of the neutrosophic cubic set and the hesitant fuzzy set. The algebraic operations based on Dombi norms and co-norms are more flexible than the usual algebraic operations as they involve an operational parameter. First, this paper establishes Dombi algebraic operational laws, score functions, and similarity measures in neutrosophic cubic hesitant fuzzy sets. Then, we proposed Dombi exponential operational laws in (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark