-
121
Quantitative Evaluation for the Threat Degree of a Thermal Reservoir to Deep Coal Mining
Published 2020-01-01“…Based on the analytic hierarchy process (AHP), the index factor weight is defined, and then, the threat degree of the roof thermal storage aquifer to the coal mining is quantitatively evaluated and divided by using the fuzzy variable set theory. The evaluation results show that the threat degree of the roof in the eastern region is generally greater than that in the western region and that the closer it is to the coal seam outcrop line, the higher the threat degree is; near the boreholes, in the areas Qs1,Qs5, Qs8, Sx1, Tk5, Zc4, and Zc7, which are close to the hidden outcrop line of the coal seam, the classification characteristic value of the threat degree is greater than 3.5, which is in the high-threat zone for disasters caused by roof thermal storage aquifers during coal seam mining. …”
Get full text
Article -
122
A multi-attribute decision making context for supply chain management using possibility single-valued neutrosophic soft settings
Published 2024-01-01“…., possibility theory, single-valued neutrosophic theory, and soft set theory). The basic notions, and set-theoretic operations, i.e., union and intersection, of psv-NSOS are investigated and manipulated with matrix representations. …”
Get full text
Article -
123
Information support for decision making in problem situation description
Published 2021-12-01“…The relevance of the problem is associated with the need to collect and process significant amounts of information, since in the presence of a large number of factors, a person's capabilities are often insufficient to search and organize the necessary information.When solving the problem of user information support at the stage of describing the problem situation, three main goals are pursued: building a mathematical model of the corresponding processes; formalization of the set of basic concepts of the model; development of the algorithms for implementation of user interaction with the information system.Methods. Methods of set theory, probability theory and graph theory are used.Results. …”
Get full text
Article -
124
An improved fuzzy time series forecasting model based on hesitant fuzzy sets
Published 2024-06-01“…The Hesitant Fuzzy Set (HFS) theory better emphasizes the chances of capturing fuzziness and uncertainty due to randomness than the classic fuzzy set theory. This study aims to improve the previously identified hesitant fuzzy TSF models by including various degrees of hesitation to improve forecasting performance. …”
Get full text
Article -
125
The Plurality of Goal-setting in Pedagogical Activity: Integration of Mathematics on a Chessboard
Published 2019-04-01“…To implement the technology, a holistic, hierarchical complex of multi-stage math problems on the chessboard has been composed, which encourages students to master not only various methods (combinatorial, probabilistic, graph and set theory, mathematical and computer modeling), but also to develop the basic qualities of personality, such as creativity, reflection of one’s own choice, creative independence, motivation. …”
Get full text
Article -
126
Soft intersection almost bi-quasi-interior ideals of semigroups
Published 2025-03-01“…With our obtained crucial theorem that states that if a nonempty set of a semigroup is an almost BQI-ideal, then its soft characteristic function is a soft intersection almost BQI-ideal, and vice versa, we achieve to construct a bridge between semigroup theory and soft set theory. With this vital theorem, several interesting relationships between certain types of almost BQI-ideals of semigroups, such as minimal, prime, semiprime, and strongly prime almost BQI-ideals and certain types of soft intersection almost BQI-ideals, are derived. …”
Get full text
Article -
127
Prediction of the RFID Identification Rate Based on the Neighborhood Rough Set and Random Forest for Robot Application Scenarios
Published 2020-01-01“…Firstly, the initial influencing factors of the RFID system identification rate are reduced using neighborhood rough set theory combined with the principle of heuristic attribute reduction of neighborhood weighted dependency, thus obtaining a kernel factor subset. …”
Get full text
Article -
128
Approximate Accuracy Approaches to Attribute Reduction for Information Systems
Published 2014-01-01“…The algorithms are challenged by the variety of data forms in information system. Based on rough sets theory we present a new approach to attribute reduction for incomplete information systems and fuzzy valued information systems. …”
Get full text
Article -
129
A Hesitant Fuzzy Set Approach to Ideal Theory in Γ-Semigroups
Published 2018-01-01“…We apply the hesitant fuzzy sets theory to Γ-semigroups and provide some characterizations of hesitant fuzzy left (right and bi-) ideals. …”
Get full text
Article -
130
Decision-Making Based on Spherical Linear Diophantine Fuzzy Rough Aggregation Operators and EDAS Method
Published 2023-01-01“…Many researchers and scholars have suggested numerous fuzzy set theories to resolve these ambiguities and uncertainties. …”
Get full text
Article -
131
Exploration of a Capability-Focused Aerospace System of Systems Architecture Alternative with Bilayer Design Space, Based on RST-SOM Algorithmic Methods
Published 2014-01-01“…With the data mining RST (rough sets theory) and SOM (self-organized mapping) techniques, the alternative to the aerospace system of systems architecture was mapping from P-space (performance space) to C-space (configuration space), and then from C-space to D-space (design space), respectively. …”
Get full text
Article -
132
THE ROLE OF SOCIAL MEDIA ADVOCACY ON DRUG ABUSE AMONG THE YOUTHS IN OWO LOCAL GOVERNMENT
Published 2023-08-01“…This paper employed Agenda setting theory. Moreover, this study adopted survey design method and Owo local government areawas selected as area of the study. …”
Get full text
Article -
133
THE POLITICS OF INSECURITY REPORTAGE IN NORTHERN NIGERIA
Published 2024-05-01“…With the use of the Political Economy of Communication, Framing, Social Responsibility, and Agenda Setting Theories, the paper reviewed relevant literature and established how Nigerian media used their organisations to report the phenomenon of insecurity both for and against the country’s national interest.The study found that many media outlets, both new and conventional, have over the years engaged inan unethical practice that both exacerbates security challenges as well as threatens Nigeria’s corporate existence. …”
Get full text
Article -
134
PERSPECTIVES ON THE CHALLENGES TO THE WATCHDOG FUNCTION OF THE MEDIA IN NIGERIA
Published 2024-07-01“…The study is anchored on Agenda Setting Theory of the Press. Library Research Method was employed to generate secondary data for the study. …”
Get full text
Article -
135
Steering conservation biocontrol at the frontlines: A fuzzy logic approach unleashing potentials of climate-smart intercropping as a component within the integrated management of f...
Published 2025-02-01“…This study introduces a computational index that employs fuzzy sets theory to identify potential deployment sites for push-pull as a component in the integrated management of Fall Armyworm (FAW) in Africa. …”
Get full text
Article -
136
On $ \left(\mathit{p}, \mathit{q}\right) $-fractional linear Diophantine fuzzy sets and their applications via MADM approach
Published 2024-12-01“…First, the $ \left(p, q\right) $-fractional linear Diophantine fuzzy set represents a new generalization of several fuzzy set theories, including the Pythagorean fuzzy set, $ q $-rung orthopair fuzzy set, linear Diophantine fuzzy set, and $ q $-rung linear Diophantine fuzzy set, with its key features thoroughly discussed. …”
Get full text
Article