Different Types of Matrices in Intuitionistic Fuzzy Soft Set Theory and Their Application in Predicting Terrorist Attack
Journal Title: International Journal of Management, IT and Engineering - Year 2012, Vol 2, Issue 9
Abstract
The purpose of this paper is to introduce different types of intuitionistic fuzzy soft matrices along with some new operations in the parlance of intuitionistic fuzzy soft set theory. Then based on some of these new matrix operations a new efficient methodology has been developed to solve intuitionistic fuzzy soft set based real life decision making problems which may contain more than one decision maker and an effort to apply it to a more relevant subject of todays world as in Predicting Terrorist Attack.
Authors and Affiliations
Tanushree Mitra Basu, Nirmal Kumar Mahapatra and Shyamal Kumar Mondal
An introduction to Mobile Assisted Language Learning
Mobile learning suggests and supports the new concepts of learning such as ubiquitous-, augmented-, personalized-, online-, mixed reality-, context-sensitive-, informal-, and ambient learning and teaching. This paper a...
slugHIGHLY QUANTITATIVE MINING ASSOCIATION RULES WITH CLUSTERING
ata mining is a step in the knowledge discovery process consisting of certain data mining algorithms that, under some acceptable computational efficiency limitations, finds patterns or models in data. Association rule...
COMPACT DESIGN AND SIMULATION OF LOW PASS MICROWAVE FILTER ON MICROSTRIP TRANSMISSION LINE AT 2.4 GHz
This paper presents a frequency responsive 5 pole microstrip Low Pass filter at 2.4 GHz with Z0 = 50 ohm and passband ripple LAR = 0.04321dB. This presents a novel design of Chebyshev LPF prototype with substrate thic...
Patanjali products and Market Efficiency
Indian consumer segment is broadly segregated into urban and rural markets, and is attracting marketers from across the world. Global corporations view India as one of the key markets from where future growth is likel...
slugELLIPTIC CURVE CRYPTOGRAPHY WITH SECURE TEXT BASED CRYPTOSYSTEM
The paper discusses public key cryptography such as ECC, RSA and also gives mathematical explanations on the working of these algorithms. The paper also proposed an ECC algorithm for secure text based cryptosystem.