{"title":"信息安全系统中的模糊集几何","authors":"O. Lukina, D. Majewski, E. Kulagina","doi":"10.1109/ICAICT.2014.7035904","DOIUrl":null,"url":null,"abstract":"It was considered the opportunity of using the method of spaced projections planes for visualizing the decision of the task with fuzzy parameters. The sequel of analysis presents that the fuzzy sets analysis exactly and provisions the interpretation of information security system.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"The geometry of fuzzy sets in the systems of information security\",\"authors\":\"O. Lukina, D. Majewski, E. Kulagina\",\"doi\":\"10.1109/ICAICT.2014.7035904\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"It was considered the opportunity of using the method of spaced projections planes for visualizing the decision of the task with fuzzy parameters. The sequel of analysis presents that the fuzzy sets analysis exactly and provisions the interpretation of information security system.\",\"PeriodicalId\":103329,\"journal\":{\"name\":\"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)\",\"volume\":\"7 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICAICT.2014.7035904\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAICT.2014.7035904","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The geometry of fuzzy sets in the systems of information security
It was considered the opportunity of using the method of spaced projections planes for visualizing the decision of the task with fuzzy parameters. The sequel of analysis presents that the fuzzy sets analysis exactly and provisions the interpretation of information security system.