منابع مشابه
Fuzzy rule-based networks for control
Charles M. Higgins and Rodney M. Goodman Abstract| We present a method for the learning of fuzzy logic membership functions and rules to approximate a numerical function from a set of examples of the function's independent variables and the resulting function value. This method uses a three-step approach to building a complete function approximation system: rst, learning the membership function...
متن کاملRule-based joint fuzzy and probabilistic networks
One of the important challenges in Graphical models is the problem of dealing with the uncertainties in the problem. Among graphical networks, fuzzy cognitive map is only capable of modeling fuzzy uncertainty and the Bayesian network is only capable of modeling probabilistic uncertainty. In many real issues, we are faced with both fuzzy and probabilistic uncertainties. In these cases, the propo...
متن کاملLearning Fuzzy Rule-Based Neural Networks for Control
A three-step method for function approximation with a fuzzy system is proposed. First, the membership functions and an initial rule representation are learned; second, the rules are compressed as much as possible using information theory; and nally, a computational network is constructed to compute the function value. This system is applied to two control examples: learning the truck and traile...
متن کاملControl Chart Recognition Patterns using Fuzzy Rule-Based System
Control Chart Patterns (CCPs) recognition is one the most important concepts in control chart application. Relating the patterns exhibited on the control chart to assignable causes is an ambiguous and vague task especially when multiple patterns co-exist. In this study, a fuzzy rule-based system is developed for X ̅ control charts to prioritize the control chart causes based on the accumulated e...
متن کاملEntropy Based Fuzzy Rule Weighting for Hierarchical Intrusion Detection
Predicting different behaviors in computer networks is the subject of many data mining researches. Providing a balanced Intrusion Detection System (IDS) that directly addresses the trade-off between the ability to detect new attack types and providing low false detection rate is a fundamental challenge. Many of the proposed methods perform well in one of the two aspects, and concentrate on a su...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Fuzzy Systems
سال: 1994
ISSN: 1063-6706
DOI: 10.1109/91.273129