Author of the publication

Two algorithms for group decision making based on the consistency of intuitionistic multiplicative preference relation.

, , and . J. Intell. Fuzzy Syst., 38 (2): 2197-2210 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Immune-Based Model for Service Survivability., , , , , and . CANS, volume 4301 of Lecture Notes in Computer Science, page 354-363. Springer, (2006)Incentive-driven attacker for corrupting two-party protocols., , , , and . Soft Comput., 22 (23): 7733-7740 (2018)Safety protection based on electromagnetic navigation in robot-assisted vascular interventional surgery., , , and . CISP-BMEI, page 1-5. IEEE, (2017)SESS: A security-enhanced secret storage scheme for password managers., , , and . WCSP, page 1-5. IEEE, (2015)One memory access bloom filters and their generalization., , and . INFOCOM, page 1745-1753. IEEE, (2011)IC security evaluation against fault injection attack based on FPGA emulation., , , and . FPT, page 285-288. IEEE, (2016)Exploring the diversity in cluster ensemble generation: Random sampling and random projection., , , and . Expert Syst. Appl., 41 (10): 4844-4866 (2014)Low Resolution 3D Reconstructions of Viruses from X-Ray Crystal Diffraction Data., , , and . ICIP (3), page 358-360. IEEE Computer Society, (1998)Multiple Relational Topic Modeling for Noisy Short Texts., , , and . International Journal of Software Engineering and Knowledge Engineering, 28 (11-12): 1559-1574 (2018)Generalized Cluster Aggregation., , and . IJCAI, page 1279-1284. (2009)