An Approach For Detection Of Logical Inconsistency
Online responses to multi-criteria decision making questionnaires often contain inconsistencies, due to possible inconsistent interpretations of the questions or the erratic mental states of the respondents. If such inconsistent responses remain undetected and no appropriate corrective actions are t...
| Main Author: | Yadav, Rinki |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2012
|
| Subjects: | |
| Online Access: | http://eprints.usm.my/42446/ http://eprints.usm.my/42446/1/RINKI_YADAV.pdf |
Similar Items
CPT114 - LOGIC & APLIKASI APRIL 2008.
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2008)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2008)
CPT114 - LOGIC & APPLICATIONS NOV 2010
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2010)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2010)
CPT 114 - LOGIC & APLIKASI APRIL 08.
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2008)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2008)
Variable order verification use of logic representation
by: Prasad, , PWC, et al.
Published: (2003)
by: Prasad, , PWC, et al.
Published: (2003)
Unconstrained handwritten character recognition based on fuzzy logic
by: Hanmandlu, M
Published: (2003)
by: Hanmandlu, M
Published: (2003)
CPT104 - INTRODUCTION TO LOGIC AND ABSTRACTION MAC 05.
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2005)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2005)
CPT104 - INTRODUCTION TO LOGIC AND ABSTRACTION APRIL 08.
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2008)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2008)
CSI 501 - LOGIC AND INFERENCE SYSTEMS APRIL 1993
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1993)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1993)
CPT 104 - INTRODUCTION TO LOGIC AND ABSTRACTION - SEPT. 2002
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2002)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2002)
CSI 501 - LOGIC AND INFERENCE SYSTEMS - APR. 1994
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1994)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1994)
CPT 104 - INTRODUCTION TO LOGIC AND ABSTRACTION APRIL 08.
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2008)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2008)
Using fuzzy logic to identify significant factors of negotiation performance
by: Tameur, Nachef
Published: (2013)
by: Tameur, Nachef
Published: (2013)
CPT 104 - INTRODUCTION TO LOGIC & ABSTRACTION MARCH 05 - BI.
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2005)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2005)
CAT102 - Introduction to Logic and Abstraction August/September 1998
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1998)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1998)
CPS201 - Digital Logic Design August/September 1998
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1998)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1998)
Intelligent Network-Based Stepping Stone Detection Approach.
by: Omar, Mohd Nizam, et al.
by: Omar, Mohd Nizam, et al.
A cascaded classifier approach for improving detection rates on rare attack categories in network intrusion detection
by: Khor, Kok Chin, et al.
Published: (2012)
by: Khor, Kok Chin, et al.
Published: (2012)
CPT114 – LOGIC & APPLICATIONS [LOGIK & APLIKASI] DEC. 2014 - JAN. 2015
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2015)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2015)
CPT114 – LOGIC & APPLICATIONS [LOGIK & APLIKASI] DEC. 2014 - JAN. 2015
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2015)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2015)
CPT114 – LOGIC & APPLICATION [LOGIK & APLIKASI] DEC. 2016 - JAN. 2017
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2017)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2017)
CPT114 – LOGIC & APPLICATIONS [LOGIK & APLIKASI] DEC. 2015 - JAN. 2016
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2016)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2016)
CPC151 – Fundamentals of Logic & Artificial Intelligence Asas Logik dan Kecerdasan Buatan
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2021)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2021)
Rule-Based Approach For Detecting Botnet Based On Domain Name System
by: Alieyan, Kamal Ibrahim Ahmed
Published: (2018)
by: Alieyan, Kamal Ibrahim Ahmed
Published: (2018)
Flow-Representation Approach For ICMPV6-Based Ddos Attacks Detection
by: Elejla, Omar E. O.
Published: (2018)
by: Elejla, Omar E. O.
Published: (2018)
Approach for solving active perturbation attack problem in stepping stone detection.
by: Omar, Mohd Nizam
Published: (2011)
by: Omar, Mohd Nizam
Published: (2011)
A Statistical Approach Towards Worm Detection Using Cross-Relation Technique
by: Anbar, Mohammed F.R.
Published: (2013)
by: Anbar, Mohammed F.R.
Published: (2013)
A New Approach Based On Honeybee Guarding
System To Improve Intrusion Detection System
by: Ahmed Ali, Ghassan
Published: (2011)
by: Ahmed Ali, Ghassan
Published: (2011)
A new approach based on honeybee guarding system to improve intrusion detection system.
by: Ahmed Ali, Ghassan
Published: (2011)
by: Ahmed Ali, Ghassan
Published: (2011)
Rule-Based Approach For Detecting Advanced Persistent Threat Using Behavioral Features Of Credential Dumping Technique
by: Ali Mohamed, Nachaat Abdelatif
Published: (2022)
by: Ali Mohamed, Nachaat Abdelatif
Published: (2022)
A Machine Learning Classification Approach To Detect Tls-Based Malware Using Entropy-Based Flow Set Features
by: Keshkeh, Kinan
Published: (2022)
by: Keshkeh, Kinan
Published: (2022)
A Feature Selection Approach Based On Hybridizing Flower Pollination Algorithm With Particle Swarm Optimization For Enhancing The Performance Of Ipv6 Intrusion Detection System
by: Al Ghuraibawi, Adnan Hasan Bdair
Published: (2023)
by: Al Ghuraibawi, Adnan Hasan Bdair
Published: (2023)
Design and development of network intrusion detection system detection scheme on network processing unit
by: Robin Salim,, et al.
Published: (2006)
by: Robin Salim,, et al.
Published: (2006)
Automated Fish Detection And Identification
by: Wong , Poh Lee
Published: (2015)
by: Wong , Poh Lee
Published: (2015)
Crisp-fuzzy representation of Allen's temporal logic
by: Nor Azlinayati Abdul Manaf,, et al.
Published: (2007)
by: Nor Azlinayati Abdul Manaf,, et al.
Published: (2007)
Modelling, Detection And Exploitation Of Lexical Functions For Analysis.
by: Schwab, Didier, et al.
Published: (2007)
by: Schwab, Didier, et al.
Published: (2007)
A Framework For Detecting Bluetooth Mobile Worms.
by: Sarwar, Usman, et al.
Published: (2007)
by: Sarwar, Usman, et al.
Published: (2007)
Typing Dynamics Biometric Authentication through Fuzzy Logic
by: Zhe, Jin, et al.
Published: (2008)
by: Zhe, Jin, et al.
Published: (2008)
Multithreaded Scalable Matching Algorithm For Intrusion Detection Systems
by: Hnaif, Adnan Ahmad Abdelfattah
Published: (2010)
by: Hnaif, Adnan Ahmad Abdelfattah
Published: (2010)
A behavior based algorithm to detect spam bots
by: Zamil, Mohammed Fadhil
Published: (2009)
by: Zamil, Mohammed Fadhil
Published: (2009)
Enhanced Techniques For Detection And Classification Of Neighbor Discovery Protocol Anomalies
by: Firas (M.H.) S., Najjar
Published: (2016)
by: Firas (M.H.) S., Najjar
Published: (2016)
Similar Items
-
CPT114 - LOGIC & APLIKASI APRIL 2008.
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2008) -
CPT114 - LOGIC & APPLICATIONS NOV 2010
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2010) -
CPT 114 - LOGIC & APLIKASI APRIL 08.
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2008) -
Variable order verification use of logic representation
by: Prasad, , PWC, et al.
Published: (2003) -
Unconstrained handwritten character recognition based on fuzzy logic
by: Hanmandlu, M
Published: (2003)