2933 | -- | 2959 | Ronald R. Yager. OWA trees and their role in security modeling using attack trees |
2960 | -- | 2987 | Hui Li, Scott Dick. A similarity measure for fuzzy rulebases based on linguistic gradients |
2988 | -- | 3010 | Hajime Nobuhara, Barnabás Bede, Kaoru Hirota. On various eigen fuzzy sets and their application to image reconstruction |
3011 | -- | 3025 | Funda Karaçal. On the direct decomposability of strong negations and ::::S::::-implication operators on product lattices |
3026 | -- | 3059 | Ewa Straszecka. Combining uncertainty and imprecision in models of medical diagnosis |
3060 | -- | 3078 | Jun Zhang, Yu Zhou, Fanyuan Ma, Gu Dawu, Yingcai Bai. An extension of secure group communication using key graph |
3079 | -- | 3093 | Young Bae Jun, Seok-Zun Song. Generalized fuzzy interior ideals in semigroups |
3094 | -- | 3103 | I. Ahmad, Z. Husain. Second order (::::F::::, ::::alpha::::, ::::rho::::, ::::d::::)-convexity and duality in multiobjective programming |