—Use-after-free vulnerabilities have become an important class of security problems due to the existence of mitigations that protect against other types of vulnerabilities. The e...
: Technology intelligence indicates the concept and applications that transform data hidden in patents or scientific literatures into technical insight for technology strategy-maki...
Hongshu Chen, Guangquan Zhang, Donghua Zhu, Jie Lu
: The Neutrosophic set and Hesitant set are the important tools to describe the fuzzy information, in this paper, we combine the interval neutrosophic sets (INSs) and interval valu...
Transfer functions are considered the simplest and cheapest operators in designing discrete heuristic algorithms. The main advantage of such operators is the maintenance of the str...