2021
DOI: 10.1155/2021/6649349
|View full text |Cite
|
Sign up to set email alerts
|

Applications of (Neutro/Anti)sophications to Semihypergroups

Abstract: In this paper, we extend the notion of semi-hypergroups (resp. hypergroups) to neutro-semihypergroups (resp. neutro-hypergroups). We investigate the property of anti-semihypergroups (resp. anti-hypergroups). We also give a new alternative of neutro-hyperoperations (resp. anti-hyperoperations), neutro-hyperoperation-sophications (resp. anti-hypersophications). Moreover, we show that these new concepts are different from classical concepts by several examples.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2
2
1

Relationship

1
4

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 12 publications
0
2
0
Order By: Relevance
“…After the AC policy is determined, the system must implement the AC policy by completing three tasks: one is to authorize each user or some users according to the security policy of the system; the other is to identify and confirm the user when the user makes an access request, The third is to execute or reject the user's request according to the system's authorization and AC rules for the user. Generally speaking, AC mainly includes two aspects of authorization and control, and is carried out according to the security policy formulated in advance by the system [7][8].…”
Section: The Principle Of Acmentioning
confidence: 99%
“…After the AC policy is determined, the system must implement the AC policy by completing three tasks: one is to authorize each user or some users according to the security policy of the system; the other is to identify and confirm the user when the user makes an access request, The third is to execute or reject the user's request according to the system's authorization and AC rules for the user. Generally speaking, AC mainly includes two aspects of authorization and control, and is carried out according to the security policy formulated in advance by the system [7][8].…”
Section: The Principle Of Acmentioning
confidence: 99%
“…Agboola in [2]. A. Rezaei et al introduced the notions of neutrosemihypergroup and antisemihypergroup [20]. Recently, S. Mirvakili et al extend the notion of H vsemigroups to neutro-H v -semigroups and anti-H v -semigroups and investigated many of their properties [15].…”
Section: Introductionmentioning
confidence: 99%