2020
DOI: 10.1049/trit.2019.0093
|View full text |Cite
|
Sign up to set email alerts
|

Outlier detection in neutrosophic sets by using rough entropy based weighted density method

Abstract: Neutrosophy is the study of neutralities, which is an extension of discussing the truth of opinions. Neutrosophic logic can be applied to any field, to provide the solution for indeterminacy problem. Many of the real-world data have a problem of inconsistency, indeterminacy and incompleteness. Fuzzy sets provide a solution for uncertainties, and intuitionistic fuzzy sets handle incomplete information, but both concepts failed to handle indeterminate information. To handle this complicated situation, researcher… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(8 citation statements)
references
References 40 publications
0
8
0
Order By: Relevance
“…is tabular comparison reveals the effectiveness of the presented method evaluating its credibility for sentence recognition and semantic model construction. is method utilizes structural modeling in order to create a link between natural language processing and the object-oriented knowledge system [56][57][58][59][60].…”
Section: Validation Of the Object-oriented Knowledge-basedmentioning
confidence: 99%
“…is tabular comparison reveals the effectiveness of the presented method evaluating its credibility for sentence recognition and semantic model construction. is method utilizes structural modeling in order to create a link between natural language processing and the object-oriented knowledge system [56][57][58][59][60].…”
Section: Validation Of the Object-oriented Knowledge-basedmentioning
confidence: 99%
“…ese are classified as different scenarios so that the lapse of the architecture in the aspect of security or, in other words, the weak points and vulnerabilities could be identified. To further address the security vulnerabilities within the architecture and to pave the way for future scope of this work entropy-based algorithms [24], machine-learning approaches and genetic algorithms [25] could be considered within the architecture.…”
Section: Evolving Architecture: In the Perspective Of Security Behavior And Lapsesmentioning
confidence: 99%
“…Currently, object detection achieved a lot of progress due to the use of GA, PSO, ANN, and DCNNs [13][14][15][16][17][18]. Modern object detectors founded on these networks-such as Faster R-CNN [19], SSD [20], and YOLOv3 [21]-are now robust enough to be deployed in customer products (e.g., Google Photos and Pinterest Visual Search), and some are fast enough to be run on mobile devices such as MobileNet.…”
Section: Introductionmentioning
confidence: 99%