scholarly journals Investigation of Cyber-Security and Cyber-Crimes in Oil and Gas Sectors Using the Innovative Structures of Complex Intuitionistic Fuzzy Relations

Entropy ◽  
2021 ◽  
Vol 23 (9) ◽  
pp. 1112
Author(s):  
Naeem Jan ◽  
Abdul Nasir ◽  
Mohsin S. Alhilal ◽  
Sami Ullah Khan ◽  
Dragan Pamucar ◽  
...  

Recently, there has been enormous development due to advancements in technology. Industries and enterprises are moving towards a digital system, and the oil and gas industries are no exception. There are several threats and risks in digital systems, which are controlled through cyber-security. For the first time in the theory of fuzzy sets, this research analyzes the relationships between cyber-security and cyber-crimes in the oil and gas sectors. The novel concepts of complex intuitionistic fuzzy relations (CIFRs) are introduced. Moreover, the types of CIFRs are defined and their properties are discussed. In addition, an application is presented that uses the Hasse diagram to make a decision regarding the most suitable cyber-security techniques to implement in an industry. Furthermore, the omnipotence of the proposed methods is explained by a comparative study.

2021 ◽  
Vol 11 (16) ◽  
pp. 7668 ◽  
Author(s):  
Abdul Nasir ◽  
Naeem Jan ◽  
Abdu Gumaei ◽  
Sami Ullah Khan ◽  
Fahad R. Albogamy

Technology is rapidly advancing and every aspect of life is being digitalized. Since technology has made life much better and easier, so organizations, such as businesses, industries, companies and educational institutes, etc., are using it. Despite the many benefits of technology, several risks and serious threats, called cyberattacks, are associated with it. The method of neutralizing these cyberattacks is known as cybersecurity. Sometimes, there are uncertainties in recognizing a cyberattack and nullifying its effects using righteous cybersecurity. For that reason, this article introduces interval-valued complex intuitionistic fuzzy relations (IVCIFRs). For the first time in the theory of fuzzy sets, we investigated the relationships among different types of cybersecurity and the sources of cyberattacks. Moreover, the Hasse diagram for the interval-valued complex intuitionistic partial order set and relation is defined. The concepts of the Hasse diagram are used to inspect different cybersecurity techniques and practices. Then, using the properties of Hasse diagrams, the most beneficial technique is identified. Furthermore, the best possible selection of types of cybersecurity is made after putting some restrictions on the selection. Lastly, the advantages of the proposed methods are illuminated through comparison tests.


2018 ◽  
Vol 8 (3) ◽  
pp. 247-266
Author(s):  
Michelle L. Wilson

Initially, Oliver Twist (1839) might seem representative of the archetypal male social plot, following an orphan and finding him a place by discovering the father and settling the boy within his inheritance. But Agnes Fleming haunts this narrative, undoing its neat, linear transmission. This reconsideration of maternal inheritance and plot in the novel occurs against the backdrop of legal and social change. I extend the critical consideration of the novel's relationship to the New Poor Law by thinking about its reflection on the bastardy clauses. And here, of course, is where the mother enters. Under the bastardy clauses, the responsibility for economic maintenance of bastard children was, for the first time, legally assigned to the mother, relieving the father of any and all obligation. Oliver Twist manages to critique the bastardy clauses for their release of the father, while simultaneously embracing the placement of the mother at the head of the family line. Both Oliver and the novel thus suggest that it is the mother's story that matters, her name through which we find our own. And by containing both plots – that of the father and the mother – Oliver Twist reveals the violence implicit in traditional modes of inheritance in the novel and under the law.


2019 ◽  
Vol 48 (1) ◽  
pp. 57-89
Author(s):  
Mareike Schildmann

Abstract This article traces some of the fundamental poetological changes that the traditional crime novel undergoes in the work of the Swiss author Friedrich Glauser at the beginning of the 20th century. The rational-analytical, conservative approach of the criminal novel in the 19th century implied – according to Luc Boltanski – the separation of an epistemologically structured, institutionalized order of “reality” and a chaotic, unruly, unformatted “world” – a separation that is questioned, but reestablished in the dramaturgy of crime and its resolution. By shifting the attention from the logical structure of ‘whodunnit’ to the sensual material culture and “atmosphere” that surrounds actions and people, Glauser’s novels blur these epistemological and ontological boundaries. The article shows how in Die Fieberkurve, the second novel of Glauser’s famous Wachtmeister Studer-series, material and sensual substances develop a specific, powerful dynamic that dissipates, complicates, crosslinks, and confuses the objects and acts of investigation as well as its narration. The material spoors, dust, fibers, fingerprints, intoxicants and natural resources like oil and gas – which lead the investigation from Switzerland to North Africa – trigger a new sensual mode of perception and reception that replaces the reassuring criminological ideal of solution by the logic of “dissolution”. The novel thereby demonstrates the poetic impact of the slogan of modernity: matter matters.


2018 ◽  
Author(s):  
Satish Kodali ◽  
Liangshan Chen ◽  
Yuting Wei ◽  
Tanya Schaeffer ◽  
Chong Khiam Oh

Abstract Optical beam induced resistance change (OBIRCH) is a very well-adapted technique for static fault isolation in the semiconductor industry. Novel low current OBIRCH amplifier is used to facilitate safe test condition requirements for advanced nodes. This paper shows the differences between the earlier and novel generation OBIRCH amplifiers. Ring oscillator high standby leakage samples are analyzed using the novel generation amplifier. High signal to noise ratio at applied low bias and current levels on device under test are shown on various samples. Further, a metric to demonstrate the SNR to device performance is also discussed. OBIRCH analysis is performed on all the three samples for nanoprobing of, and physical characterization on, the leakage. The resulting spots were calibrated and classified. It is noted that the calibration metric can be successfully used for the first time to estimate the relative threshold voltage of individual transistors in advanced process nodes.


Author(s):  
G. O. Hutchinson

The chapter looks at the division between poetry and prose in ancient and other literatures, and shows the importance of rhythmic patterning in ancient prose. The development of rhythmic prose in Greek and Latin is sketched, the system explained and illustrated (from Latin). It is firmly established, for the first time, which of the main Greek non-Christian authors 31 BC–AD 300 write rhythmically. The method takes a substantial sample of random sentence-endings (usually 400) from each of a large number of Imperial authors; it compares that sample with one sample of the same size (400) drawn randomly from a range of authors earlier than the invention of this rhythmic system. A particular sort of X2-test is applied. Many Imperial authors, it emerges, write rhythmically; many do not. The genres most likely to offer rhythmic writing are, unexpectedly, narrative: historiography and the novel.


Author(s):  
Robert Louis Stevenson ◽  
Ian Duncan

Your bed shall be the moorcock’s, and your life shall be like the hunted deer’s, and ye shall sleep with your hand upon your weapons.’ Tricked out of his inheritance, shanghaied, shipwrecked off the west coast of Scotland, David Balfour finds himself fleeing for his life in the dangerous company of Jacobite outlaw and suspected assassin Alan Breck Stewart. Their unlikely friendship is put to the test as they dodge government troops across the Scottish Highlands. Set in the aftermath of the 1745 rebellion, Kidnapped transforms the Romantic historical novel into the modern thriller. Its heart-stopping scenes of cross-country pursuit, distilled to a pure intensity in Stevenson’s prose, have become a staple of adventure stories from John Buchan to Alfred Hitchcock and Ian Fleming. Kidnapped remains as exhilarating today as when it was first published in 1886. This new edition is based on the 1895 text, incorporating Stevenson’s last thoughts about the novel before his death. It includes Stevenson’s ‘Note to Kidnapped’, reprinted for the first time since 1922.


2021 ◽  
pp. 1-11
Author(s):  
Velichka Traneva ◽  
Stoyan Tranev

Analysis of variance (ANOVA) is an important method in data analysis, which was developed by Fisher. There are situations when there is impreciseness in data In order to analyze such data, the aim of this paper is to introduce for the first time an intuitionistic fuzzy two-factor ANOVA (2-D IFANOVA) without replication as an extension of the classical ANOVA and the one-way IFANOVA for a case where the data are intuitionistic fuzzy rather than real numbers. The proposed approach employs the apparatus of intuitionistic fuzzy sets (IFSs) and index matrices (IMs). The paper also analyzes a unique set of data on daily ticket sales for a year in a multiplex of Cinema City Bulgaria, part of Cineworld PLC Group, applying the two-factor ANOVA and the proposed 2-D IFANOVA to study the influence of “ season ” and “ ticket price ” factors. A comparative analysis of the results, obtained after the application of ANOVA and 2-D IFANOVA over the real data set, is also presented.


1997 ◽  
Vol 75 (6) ◽  
pp. 773-789 ◽  
Author(s):  
Eric J. Dumdei ◽  
Julia Kubanek ◽  
John E. Coleman ◽  
Jana Pika ◽  
Raymond J. Andersen ◽  
...  

Chemical investigations of Cadlinaluteomarginata skin extracts, egg masses, and dietary sponges have led to the identification of the novel terpenoids cadlinaldehyde (30), spongian 32, seco-spongian 35, 20-acetoxy-12-marginatone (38), and lutenolide (39) from the nudibranch skin extracts, the new drimane sesquiterpenoid 1α,2α-diacetoxyalbicanyl acetate (40) from the nudibranch's egg mass, and the new sesquiterpenoids O-methyl-9-oxofurodysininlactone (47), 2-oxomicro-cionin-2-lactone (48), and O-methyl-2-oxomicrocionin-2-lactone (49), from the dietary sponge Pleraplysilla sp. The known terpenoids furodysinin (1), furodysin (16), marginatafuran (21), and 9,11-dihydrogracillin A (37), which have been frequently isolated from C. luteomarginata skin extracts, were found for the first time in extracts of the dietary sponges Pleraplysilla sp. and Aplysilla sp. One of the new terpenoids, cadlinaldehyde (30), has an unprecedented degraded sesterterpenoid skeleton. Keywords: nudibranch, sponge, terpenoids, structure elucidation.


2004 ◽  
Vol 48 (4) ◽  
pp. 1374-1378 ◽  
Author(s):  
Alejandro Beceiro ◽  
Lourdes Dominguez ◽  
Anna Ribera ◽  
Jordi Vila ◽  
Francisca Molina ◽  
...  

ABSTRACT A presumptive chromosomal cephalosporinase (pI, 9.0) from a clinical strain of Acinetobacter genomic species 3 (AG3) is reported. The nucleotide sequence of this β-lactamase shows for the first time the gene encoding an AmpC enzyme in AG3. In addition, the biochemical properties of the novel AG3 AmpC β-lactamase are reported


Sign in / Sign up

Export Citation Format

Share Document