Selection of optimal encryption algorithm based on hesitant bipolar complex fuzzy frank aggregation operators DOI
Tahir Mahmood, Hafiz Muhammad Waqas, Ubaid ur Rehman

et al.

Journal of Applied Mathematics and Computing, Journal Year: 2024, Volume and Issue: unknown

Published: Nov. 1, 2024

Language: Английский

Parameter Selection Impacting Software Reliability by Utilizing WASPAS Technique Based on Tangent Trigonometric Complex Fuzzy Aggregation Operators DOI Creative Commons
Farhan Mateen Khan, Asim Munir, Majed Albaity

et al.

IEEE Access, Journal Year: 2024, Volume and Issue: 12, P. 66941 - 66951

Published: Jan. 1, 2024

Software reliability is a paramount quality attribute that manifests itself in the likelihood of failure-free operation. The development systems with growing complexity complicates assessment and enhancement owing to technical managerial factors. vague concept fuzzy sets their generalizations have been useful since they can be applied dealing imprecise unreliable information. To overcome issues software complex, ambiguous nature information parameters, this paper suggests new way use complex set addition multi-criteria decision-making analyze effect various parameters. investigation starts by explaining tangent trigonometric operations connected it. Then, it gives aggregation operators sets, including weighted averaging geometric basic properties. Consequently, we apply obtained method called "Weighted Aggregated Sum Product Assessment" context sets. Next, go into details proposed technique taking case study "Parameter Selection Impacting Reliability". Furthermore, analyzes given approach other existing theories show benefits superiority newly developed approach. This provides detailed original combines methods order obstacles evaluation presence

Language: Английский

Citations

1

Selection of Cloud Security by Employing MABAC Technique in the Environment of Hesitant Bipolar Complex Fuzzy Information DOI Creative Commons
Hafiz Muhammad Waqas, Walid Emam, Tahir Mahmood

et al.

IEEE Access, Journal Year: 2024, Volume and Issue: 12, P. 123127 - 123148

Published: Jan. 1, 2024

The term "cloud security (CS)" describes the collection of procedures and tools intended to defend networks, data, apps, systems used in cloud computing from possible risks unauthorized access. Data breaches, identity access management, network security, adherence industry governmental standards, third-party services apps are a few major issues with CS. Selecting best CS becomes critical for resolving all these problems. Within context hesitant bipolar complex fuzzy sets (HBCFSs) theory, we address this study optimal selection utilizing various conceptions aggregation operators (AOs). notion HBCFSs gives us valuable framework by providing hesitancy nature any object along its positive negative aspects. Moreover, tool eliminate vagueness uncertainty given information. In manuscript, developed some new AOs which obliging convert set information into singleton value. Then calculate aggregate numerical significance To handle our supposed problem mainly (HBCF) weighted averaging (HBCFWA), HBCF ordered (HBCFOWA), geometric (HBCFWG), (HBCFOWG), generalized (GHBCFWA), (GHBCFWG) operators. Furthermore, develop multi-attributive border approximation area comparison (MABAC) method multi-attribute group decision-making (MAGDM) propose analyze CS-related case identify Lastly; demonstrate advantages superiority interpretive work, compared suggested methodology other extant ideas.

Language: Английский

Citations

0

Selection of optimal encryption algorithm based on hesitant bipolar complex fuzzy frank aggregation operators DOI
Tahir Mahmood, Hafiz Muhammad Waqas, Ubaid ur Rehman

et al.

Journal of Applied Mathematics and Computing, Journal Year: 2024, Volume and Issue: unknown

Published: Nov. 1, 2024

Language: Английский

Citations

0