Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (121)
  • Open Access

    ARTICLE

    Two-Stage Fuzzy MCDM for Green Supplier Selection in Steel Industry

    Chia-Nan Wang, Thi-Ly Nguyen*, Thanh-Tuan Dang

    Intelligent Automation & Soft Computing, Vol.33, No.2, pp. 1245-1260, 2022, DOI:10.32604/iasc.2022.024548 - 08 February 2022

    Abstract Steel is one of the most powerful industries globally, and the associated products have a tremendous impact on nurturing a sustainable society. Considering environmental concerns within this industry's supply chain is highly successful in saving both energy and natural resources and lowering greenhouse gas emissions. In light of this, sustainable suppliers are considered input partners who play a specific role in the chain of business operations of every enterprise, maintaining them to achieve higher levels of customer satisfaction and thus gain more market share. Supplier selection can be characterized as a multi-criteria decision-making (MCDM) problem… More >

  • Open Access

    ARTICLE

    Group Decision-Making Model of Renal Cancer Surgery Options Using Entropy Fuzzy Element Aczel-Alsina Weighted Aggregation Operators under the Environment of Fuzzy Multi-Sets

    Jing Fu1,2, Jun Ye3, Liping Xie1,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.130, No.3, pp. 1751-1769, 2022, DOI:10.32604/cmes.2022.018739 - 30 December 2021

    Abstract Since existing selection methods of surgical treatment schemes of renal cancer patients mainly depend on physicians’ clinical experience and judgments, the surgical treatment options of renal cancer patients lack their scientifical and reasonable information expression and group decision-making model for renal cancer patients. Fuzzy multi-sets (FMSs) have a number of properties, which make them suitable for expressing the uncertain information of medical diagnoses and treatments in group decision-making (GDM) problems. To choose the most appropriate surgical treatment scheme for a patient with localized renal cell carcinoma (RCC) (T1 stage kidney tumor), this article needs to… More >

  • Open Access

    ARTICLE

    Dombi-Normalized Weighted Bonferroni Mean Operators with Novel Multiple-Valued Complex Neutrosophic Uncertain Linguistic Sets and Their Application in Decision Making

    Tahir Mahmood1, Zeeshan Ali1, Dulyawit Prangchumpol2,*, Thammarat Panityakul3

    CMES-Computer Modeling in Engineering & Sciences, Vol.130, No.3, pp. 1587-1623, 2022, DOI:10.32604/cmes.2022.017998 - 30 December 2021

    Abstract Although fuzzy set concepts have evolved, neutrosophic sets are attracting more attention due to the greater power of the structure of neutrosophic sets. The ability to account for components that are true, false or neither true nor false is useful in the resolution of real-life problems. However, simultaneous variations render neutrosophic sets unsuitable in specific circumstances. To enable the management of these sorts of issues, we combine the principle of multi-valued neutrosophic uncertain linguistic sets and complex fuzzy sets to develop the principle of multi-valued complex neutrosophic uncertain linguistic sets. Multi-valued complex neutrosophic uncertain linguistic… More >

  • Open Access

    ARTICLE

    Autonomous Exploration Based on Multi-Criteria Decision-Making and Using D* Lite Algorithm

    Novak Zagradjanin1,*, Dragan Pamucar2, Kosta Jovanovic1, Nikola Knezevic1, Bojan Pavkovic3

    Intelligent Automation & Soft Computing, Vol.32, No.3, pp. 1369-1386, 2022, DOI:10.32604/iasc.2022.021979 - 09 December 2021

    Abstract An autonomous robot is often in a situation to perform tasks or missions in an initially unknown environment. A logical approach to doing this implies discovering the environment by the incremental principle defined by the applied exploration strategy. A large number of exploration strategies apply the technique of selecting the next robot position between candidate locations on the frontier between the unknown and the known parts of the environment using the function that combines different criteria. The exploration strategies based on Multi-Criteria Decision-Making (MCDM) using the standard SAW, COPRAS and TOPSIS methods are presented in… More >

  • Open Access

    ARTICLE

    Analysis of Critical Factors in Manufacturing by Adopting a Cloud Computing Service

    Hsin-Pin Fu1,*, Tsung-Sheng Chang2, Chien-Hung Liu3, Li-Chun Liu1

    Computer Systems Science and Engineering, Vol.42, No.1, pp. 213-227, 2022, DOI:10.32604/csse.2022.021767 - 02 December 2021

    Abstract The advantages of a cloud computing service are cost advantages, availability, scalability, flexibility, reduced time to market, and dynamic access to computing resources. Enterprises can improve the successful adoption rate of cloud computing services if they understand the critical factors. To find critical factors, this study first reviewed the literature and established a three-layer hierarchical factor table for adopting a cloud computing service based on the Technology-Organization-Environment framework. Then, a hybrid method that combines two multi-criteria decision-making tools—called the Fuzzy Analytic Network Process method and the concept of VlseKriterijumska Optimizacija I Kompromisno Resenje acceptable advantage—was More >

  • Open Access

    ARTICLE

    Decision-Making Problems under the Environment of m-Polar Diophantine Neutrosophic N-Soft Set

    Shouzhen Zeng1,2, Shahbaz Ali3,*, Muhammad Khalid Mahmood4, Florentin Smarandache5, Daud Ahmad4

    CMES-Computer Modeling in Engineering & Sciences, Vol.130, No.1, pp. 581-606, 2022, DOI:10.32604/cmes.2022.017397 - 29 November 2021

    Abstract Fuzzy models are present everywhere from natural to artificial structures, embodying the dynamic processes in physical, biological, and social systems. As real-life problems are often uncertain on account of inconsistent and indeterminate information, it seems very demanding for an expert to solve those problems using a fuzzy model. In this regard, we develop a hybrid new model m-polar Diophantine neutrosophic N-soft set which is based on neutrosophic set and soft set. Additionally, we define several different sorts of compliments on the proposed set. A proposed set is a generalized form of fuzzy, soft, Pythagorean fuzzy, More >

  • Open Access

    ARTICLE

    Analyzing the Big Data Security Through a Unified Decision-Making Approach

    Abdulaziz Attaallah1, Hassan Alsuhabi2, Sarita Shukla3, Rajeev Kumar3,*, Bineet Kumar Gupta3, Raees Ahmad Khan4

    Intelligent Automation & Soft Computing, Vol.32, No.2, pp. 1071-1088, 2022, DOI:10.32604/iasc.2022.022569 - 17 November 2021

    Abstract The use of cloud services, web-based software systems, the Internet of Things (IoT), Machine Learning (ML), Artificial Intelligence (AI), and other wireless sensor devices in the health sector has resulted in significant advancements and benefits. Early disease detection, increased accessibility, and high diagnostic reach have all been made possible by digital healthcare. Despite this remarkable achievement, healthcare data protection has become a serious issue for all parties involved. According to data breach statistics, the healthcare data industry is one of the major threats to cyber criminals. In reality, healthcare data breaches have increased at an… More >

  • Open Access

    ARTICLE

    Coronavirus Decision-Making Based on a Locally -Generalized Closed Set

    M. A. El Safty1,*, S. A. Alblowi2, Yahya Almalki3, M. El Sayed4

    Intelligent Automation & Soft Computing, Vol.32, No.1, pp. 483-498, 2022, DOI:10.32604/iasc.2022.021581 - 26 October 2021

    Abstract Real-world applications now deal with a massive amount of data, and information about the world is inaccurate, incomplete, or uncertain. Therefore, we present in our paper a proposed model for solving problems. This model is based on the class of locally generalized closed sets, namely, locally simply* alpha generalized closed* sets and locally simply* alpha generalized closed** sets (briefly, -sets and -sets), based on simply* alpha open set. We also introduce various concepts of their properties and their relationship with other types, and we are studying several of their properties. Finally, we apply the concept More >

  • Open Access

    ARTICLE

    A Modelling and Scheduling Tool for Crowd Movement in Complex Network

    Emad Felemban1, Faizan Ur Rehman2,*, Akhlaq Ahmad2, Muhamad Felemban3

    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1361-1375, 2022, DOI:10.32604/iasc.2022.020235 - 09 October 2021

    Abstract Managing events pose a unique challenge to the stakeholders and authorities to control the crowd in all three phases of the event (pre, during and post), ensuring crowd safety. One of the fundamental keys to provide crowd safety is to consider the mobility infrastructure hosting the crowd, i.e., routes, areas, entrances and exits. During Hajj, where millions of pilgrims worldwide fulfil the annual event’s rites, mina encampment incorporates pilgrims performing recurring stoning ritual conducted over multi-level Jamarat bridge. Pilgrims mobility through the available complex road network, to and back from the Jamarat bridge, forces upon More >

  • Open Access

    ARTICLE

    Hesitant Fuzzy-Sets Based Decision-Making Model for Security Risk Assessment

    Ahmed S. Alfakeeh1, Abdulmohsen Almalawi2, Fawaz Jaber Alsolami2, Yoosef B. Abushark2, Asif Irshad Khan2,*, Adel Aboud S. Bahaddad1, Alka Agrawal3, Rajeev Kumar4, Raees Ahmad Khan3

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 2297-2317, 2022, DOI:10.32604/cmc.2022.020146 - 27 September 2021

    Abstract Security is an important component in the process of developing healthcare web applications. We need to ensure security maintenance; therefore the analysis of healthcare web application's security risk is of utmost importance. Properties must be considered to minimise the security risk. Additionally, security risk management activities are revised, prepared, implemented, tracked, and regularly set up efficiently to design the security of healthcare web applications. Managing the security risk of a healthcare web application must be considered as the key component. Security is, in specific, seen as an add-on during the development process of healthcare web… More >

Displaying 81-90 on page 9 of 121. Per Page