In this paper, a procedure to establish the different performance measures in terms of crisp value is proposed for two classes of arrivals and multiple channel queueing models, where both arrival and service rate are fuzzy numbers. The main idea is to convert the arrival rates and service rates under fuzzy queues into crisp queues by using graded mean integration approach, which can be represented as median rule number. Hence, we apply the crisp values obtained to establish the performance measure of conventional multiple queueing models. This procedure has shown its effectiveness when incorporated with many types of membership functions in solving queuing problems. Two numerical illustrations are presented to determine the validity of the procedure in this queueing model, which involved using trapezoidal and hexagonal fuzzy numbers. It can be concluded that graded mean integration approach is efficient with fuzzy queueing models to convert fuzzy queues into crisp queues. This finding has contributed to the body of knowledge by suggesting a new procedure of defuzzification as another efficient alternative.
Fuzzy Based Clustering for Grayscale Image Steganalysis
Background: Multiple sclerosis is a chronic heterogeneous demyelinating axonal and inflammatory disease involving the Central Nervous System [CNS] white matter with a possibility of gray matter involvement in which the insulating covers of nerve cells in the brain and spinal cord are damaged. This damage disrupts the ability of parts of the nervous system to communicate, resulting in a wide range of signs and symptoms. Cerebral venous insufficiency theory was raised as a possible etiology for the disease at 2008 by Zamboni an Italian cardiothoracic surgeon. This theory was defeated by Multiple Sclerosis[ MS] researchers and scientists who thought that the disease is an autoimmune rather than vascular.
Obj
... Show MoreAd-Hoc Networks are a generation of networks that are truly wireless, and can be easily constructed without any operator. There are protocols for management of these networks, in which the effectiveness and the important elements in these networks are the Quality of Service (QoS). In this work the evaluation of QoS performance of MANETs is done by comparing the results of using AODV, DSR, OLSR and TORA routing protocols using the Op-Net Modeler, then conduct an extensive set of performance experiments for these protocols with a wide variety of settings. The results show that the best protocol depends on QoS using two types of applications (+ve and –ve QoS in the FIS evaluation). QoS of the protocol varies from one prot
... Show MoreThe objective of this research is employ the special cases of function trapezoid in the composition of fuzzy sets to make decision within the framework of the theory of games traditional to determine the best strategy for the mobile phone networks in the province of Baghdad and Basra, has been the adoption of different periods of the functions belonging to see the change happening in the matrix matches and the impact that the strategies and decision-making available to each player and the impact on societ
... Show MoreEnergy Loss Function (ELF) of 2 5 Ta O derived from optical limit
and extended to the total part of momentum and their energy
excitation region ELF plays an important function in calculating
energy loss of electron in materials. The parameter Inelastic Mean
Free Path (IMFP) is most important in quantitative surface sensitive
electron spectroscopies, defined as the average distance that an
electron with a given energy travels between successive inelastic
collisions. The stopping cross section and single differential crosssection
SDCS are also calculated and gives good agreement with
previous work.
Secure data communication across networks is always threatened with intrusion and abuse. Network Intrusion Detection System (IDS) is a valuable tool for in-depth defense of computer networks. Most research and applications in the field of intrusion detection systems was built based on analysing the several datasets that contain the attacks types using the classification of batch learning machine. The present study presents the intrusion detection system based on Data Stream Classification. Several data stream algorithms were applied on CICIDS2017 datasets which contain several new types of attacks. The results were evaluated to choose the best algorithm that satisfies high accuracy and low computation time.