2021
DOI: 10.1155/2021/9427492
|View full text |Cite|
|
Sign up to set email alerts
|

[Retracted] Analysis of Communication and Network Securities Using the Concepts of Complex Picture Fuzzy Relations

Abstract: In our lives, we cannot avoid the uncertainty. Randomness, rough knowledge, and vagueness lead us to uncertainty. In mathematics, the fuzzy set (FS) theory and logics are used to model uncertain events. This article defines a new concept of complex picture fuzzy relation (CPFR) in the field of FS theory. In addition, the types of CPFRs are also discussed to make the paper more fruitful. Today’s complex network architecture faces the ever-changing threats. The cyber-attackers are always trying to discover, catc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
10
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
8

Relationship

4
4

Authors

Journals

citations
Cited by 11 publications
(10 citation statements)
references
References 39 publications
0
10
0
Order By: Relevance
“…13. Let Y � y, ξ(y)e ρ ξ (y)2πi , α(y)e ρ α (y)2πi , 􏼈 η(y)e ρ η (y)2πi : y ∈ R} and Z � z, ξ(z)e ρ ξ (z)2πi , α(z)e ρ α (z)2πi , 􏼈 η(z)e ρ η (z)2πi : z ∈ R} be any CPFSs on a referential set R, then their correlation coefficient denoted by ∁' is also calculated by formula (18) or alternatively formula (19):…”
Section: Definitionmentioning
confidence: 99%
See 1 more Smart Citation
“…13. Let Y � y, ξ(y)e ρ ξ (y)2πi , α(y)e ρ α (y)2πi , 􏼈 η(y)e ρ η (y)2πi : y ∈ R} and Z � z, ξ(z)e ρ ξ (z)2πi , α(z)e ρ α (z)2πi , 􏼈 η(z)e ρ η (z)2πi : z ∈ R} be any CPFSs on a referential set R, then their correlation coefficient denoted by ∁' is also calculated by formula (18) or alternatively formula (19):…”
Section: Definitionmentioning
confidence: 99%
“…Yaqoob et al [16] used CIFSs in cellular network providers' corporations. Nasir et al [17][18][19] applied the CFSs, complex fuzzy relations (CFRs), and their generalizations to cybersecurity and network security. References [20][21][22] majorly worked on DM methods under the complex fuzzy information.…”
Section: Introductionmentioning
confidence: 99%
“…CPFS defines three stages of an element with both amplitude term (AT) and phase term (PT). Nasir et al [33] introduced the complex picture FR (CPFR) using the Cartesian product (CP) of two CPFS with the application of network security. Mahmood et al [34] established the concept of spherical fuzzy set (SFS) with the application of decision-making and medical diagnosis problems.…”
Section: Introductionmentioning
confidence: 99%
“…All the three stages represent in form of complex number and sum of right extremes of interval and sum of left extremes of interval ranging between [0,1]. Nasir et al [29] proposed an application of CoPFRs in communication and network security.…”
Section: Introductionmentioning
confidence: 99%