نتایج جستجو برای: credibility based fuzzy pro gramming

تعداد نتایج: 3063612  

2009
Christian G Herter Thomas M Warschko Walter F Tichy Michael Philippsen

We present the architecture of Triton a scalable mixed mode SIMD MIMD parallel computer The novel features of Triton are Support for high level machine independent pro gramming languages Fast SIMD MIMD mode switching Special hardware for barrier synchronization of multiple process groups A self routing dead lock free perfect shu e inter connect with latency hiding The architecture is the outcom...

2012
Gerhard Goos Juris Hartmanis Jan van Leeuwen David Hutchison Josef Kittler Jon M. Kleinberg Gerhard Weikum Jeremy Gibbons Pablo Nogueira

We survey the well-known algebraic laws of sequential pro-gramming, and propose some less familiar laws for concurrent program-ming. On the basis of these laws, we derive the rules of a number of classicalprogramming and process calculi, for example, those due to Hoare, Mil-ner, and Kahn. The algebra is simpler than each of the calculi derived fromit, and stronger than all t...

2013
Christian Deffo Tassak Jules Sadefo Kamdem Louis Aimé Fono

This paper studies three notions of fuzzy dominance based on credibility measure, namely, the fuzzy mean-risk dominance, the first credibilistic dominance and the second credibilistic dominance. More precisely, we introduce and examine some properties of the Fuzzy Lower Partial Moments (FLPM) of a fuzzy variable and, we deduce the Fuzzy Kappa index (FK) of a fuzzy variable, that is, a riskadjus...

Journal: :J. Log. Algebr. Program. 2007
Jun Pang Wan Fokkink Rutger F. H. Hofman Ronald Veldema

Jackal is a fine-grained distributed shared memory implementation of the Java pro-gramming language. It aims to implement Java’s memory model and allows mul-tithreaded Java programs to run unmodified on a distributed memory system. Itemploys a multiple-writer cache coherence protocol. In this paper, we report onour analysis of this protocol. We present its formal specification i...

1993
Andrew M. Pitts

For programming languages whose denotational semantics uses xed points of domain constructors of mixed variance proofs of correspondence between operational and denotational semantics or be tween two di erent denotational semantics often depend upon the exis tence of relations speci ed as the xed point of non monotonic operators This paper describes a new approach to constructing such relations...

Journal: :international journal of industrial mathematics 0
a. ‎nadizadeh‎‎ department ‎of industrial engineering, faculty of engineering, ardakan university, ardakan, ‎iran‎. a. sadegheih industrial engineering department, faculty of engineering, yazd university, yazd, ‎iran‎. a. sabzevari ‎zadeh‎ industrial engineering department, faculty of engineering, shahed university, tehran, ‎iran.‎

in this paper, the capacitated location-routing problem with fuzzy demands (clrp-fd) is considered. the clrp-fd is composed of two well-known problems: facility location problem and vehicle routing problem. the problem has many real-life applications of which some have been addressed in the literature such as management of hazardous wastes and food and drink distribution. in clrp-fd, a set of c...

2015
Shah Nazir Sara Shahzad Sher Afzal Khan Norma Binti Alias Sajid Anwar

Software birthmark is a unique quality of software to detect software theft. Comparing birthmarks of software can tell us whether a program or software is a copy of another. Software theft and piracy are rapidly increasing problems of copying, stealing, and misusing the software without proper permission, as mentioned in the desired license agreement. The estimation of birthmark can play a key ...

2007
Jian Zhou Baoding Liu

In order to model capacitated location–allocation problem with fuzzy demands, three types of fuzzy programming models – fuzzy expected cost minimization model, fuzzy a-cost minimization model, and credibility maximization model – are proposed according to different decision criteria. For solving these models, some hybrid intelligent algorithms are also designed. Finally, several numerical exper...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه سیستان و بلوچستان - دانشکده برق و کامپیوتر 1391

در این پایان نامه، کنترل نرو-فازی در پرنده هدایت پذیر از دور (پهپاد) استفاده شده است ابتدا در روش پیشنهادی اول، کنترل کننده نرو-فازی توسط مجموعه اطلاعات یک کنترل کننده pid به صورت off-line آموزش دیده است و در روش دوم یک کنترل کننده نرو-فازی on-line مبتنی بر شناسایی سیستم توسط شبکه عصبی rbf پیشنهاد شده است. سپس کاربرد این کنترل کننده در پهپاد بررسی شده است و مقایسه ای ما بین کنترل کننده های معمو...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید