Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (7)
  • Open Access

    ARTICLE

    An Evidence-Based CoCoSo Framework with Double Hierarchy Linguistic Data for Viable Selection of Hydrogen Storage Methods

    Raghunathan Krishankumar1, Dhruva Sundararajan2, K. S. Ravichandran2, Edmundas Kazimieras Zavadskas3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.3, pp. 2845-2872, 2024, DOI:10.32604/cmes.2023.029438

    Abstract Hydrogen is the new age alternative energy source to combat energy demand and climate change. Storage of hydrogen is vital for a nation’s growth. Works of literature provide different methods for storing the produced hydrogen, and the rational selection of a viable method is crucial for promoting sustainability and green practices. Typically, hydrogen storage is associated with diverse sustainable and circular economy (SCE) criteria. As a result, the authors consider the situation a multi-criteria decision-making (MCDM) problem. Studies infer that previous models for hydrogen storage method (HSM) selection (i) do not consider preferences in the natural language form; (ii) weights… More >

  • Open Access

    ARTICLE

    Linguistic Knowledge Representation in DPoS Consensus Scheme for Blockchain

    Yixia Chen1,2, Mingwei Lin1,2,*

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 845-866, 2023, DOI:10.32604/cmc.2023.040970

    Abstract The consensus scheme is an essential component in the real blockchain environment. The Delegated Proof of Stake (DPoS) is a competitive consensus scheme that can decrease energy costs, promote decentralization, and increase efficiency, respectively. However, how to study the knowledge representation of the collective voting information and then select delegates is a new open problem. To ensure the fairness and effectiveness of transactions in the blockchain, in this paper, we propose a novel fine-grained knowledge representation method, which improves the DPoS scheme based on the linguistic term set (LTS) and proportional hesitant fuzzy linguistic term set (PHFLTS). To this end,… More >

  • Open Access

    ARTICLE

    Information Security Evaluation of Industrial Control Systems Using Probabilistic Linguistic MCDM Method

    Wenshu Xu, Mingwei Lin*

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 199-222, 2023, DOI:10.32604/cmc.2023.041475

    Abstract Industrial control systems (ICSs) are widely used in various fields, and the information security problems of ICSs are increasingly serious. The existing evaluation methods fail to describe the uncertain evaluation information and group evaluation information of experts. Thus, this paper introduces the probabilistic linguistic term sets (PLTSs) to model the evaluation information of experts. Meanwhile, we propose a probabilistic linguistic multi-criteria decision-making (PL-MCDM) method to solve the information security assessment problem of ICSs. Firstly, we propose a novel subscript equivalence distance measure of PLTSs to improve the existing methods. Secondly, we use the Best Worst Method (BWM) method and Criteria… More >

  • Open Access

    ARTICLE

    Multidimensional Quality Evaluation of Graduate Thesis: Based on the Probabilistic Linguistic MABAC Method

    Yuyan Luo1,2, Xiaoxu Zhang1,*, Tao Tong1, Yong Qin3,*, Zheng Yang1

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.2, pp. 2049-2076, 2023, DOI:10.32604/cmes.2023.025413

    Abstract Graduate education is the main way to train high-level innovative talents, the basic layout to cope with the global talent competition, and the important cornerstone for implementing the innovation-driven development strategy and building an innovation-driven country. Therefore, graduate education is of great remarkably to the development of national education. As an important manifestation of graduate education, the quality of a graduate thesis should receive more attention. It is conducive to promoting the quality of graduates by supervising and examining the quality of the graduate thesis. For this purpose, this work is based on text mining, expert interviews, and questionnaire surveys… More >

  • Open Access

    ARTICLE

    A Multi-Attribute Decision-Making Method Using Belief-Based Probabilistic Linguistic Term Sets and Its Application in Emergency Decision-Making

    Runze Liu, Liguo Fei*, Jianing Mi

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.2, pp. 2039-2067, 2023, DOI:10.32604/cmes.2023.024927

    Abstract Probabilistic linguistic term sets (PLTSs) are an effective tool for expressing subjective human cognition that offer advantages in the field of multi-attribute decision-making (MADM). However, studies have found that PLTSs have lost their ability to accurately capture the views of decision-makers (DMs) in certain circumstances, such as when the DM hesitates between multiple linguistic terms or the decision information is incomplete, thus affecting their role in the decision-making process. Belief function theory is a leading stream of thought in uncertainty processing that is suitable for dealing with the limitations of PLTS. Therefore, the purpose of this study is to extend… More > Graphic Abstract

    A Multi-Attribute Decision-Making Method Using Belief-Based Probabilistic Linguistic Term Sets and Its Application in Emergency Decision-Making

  • Open Access

    ARTICLE

    Estimating Usable-Security Through Hesitant Fuzzy Linguistic Term Sets Based Technique

    Abdulaziz Attaallah1, Raees Ahmad Khan2,*

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 5683-5705, 2022, DOI:10.32604/cmc.2022.021643

    Abstract The apparent contradiction between usability and security has been discussed in the literature for several years. This continuous trade-off requires be acknowledging and handling whenever security solutions are introduced. However, some progressive analysts point out that present security solutions are usually very difficult for several users, and they have expressed a willingness to simplify the security product user experience. Usable security is still mostly unexplored territory in computer science. Which we are all aware with security and usability on many levels, usable security has received little operational attention. Companies have recently focused primarily on usable security. As consumers prefer to… More >

  • Open Access

    ARTICLE

    Computational Technique for Effectiveness of Treatments Used in Curing SARS-CoV-2

    Wael Alosaimi1, Rajeev Kumar2,*, Abdullah Alharbi1, Hashem Alyami3, Alka Agrawal4, Gaurav Kaithwas5, Sanjay Singh6, Raees Ahmad Khan4

    Intelligent Automation & Soft Computing, Vol.28, No.3, pp. 617-628, 2021, DOI:10.32604/iasc.2021.016703

    Abstract COVID-19 pandemic has unleashed an unprecedented humanitarian crisis in the world at present. With each passing day, the number of patients afflicted with Severe Acute Respiratory Syndrome Coronavirus 2 (SARS-CoV-2) is rising at an alarming pace, so much so that some countries are now combating the second wave of the contagion. As the death ratio due to the Virus increases, the medical fraternity and pharmacologists are working relentlessly to identify and prescribe a standardized and effective course of treatment for treating COVID-19 patients. However, medical specialists are confused about opting for the most efficacious course of treatment because the patients… More >

Displaying 1-10 on page 1 of 7. Per Page