نتایج جستجو برای: symmetric fuzzy linear system
تعداد نتایج: 2693115 فیلتر نتایج به سال:
in this paper, we introduce the concepts of $2$-isometry, collinearity, $2$%-lipschitz mapping in $2$-fuzzy $2$-normed linear spaces. also, we give anew generalization of the mazur-ulam theorem when $x$ is a $2$-fuzzy $2$%-normed linear space or $im (x)$ is a fuzzy $2$-normed linear space, thatis, the mazur-ulam theorem holds, when the $2$-isometry mapped to a $2$%-fuzzy $2$-normed linear space...
This paper suggests an algorithm to solve a three level large scale linear programming problem with fuzzy numbers, where all coefficients of the objective functions are symmetric trapezoidal fuzzy numbers. A three-level programming problem can be thought as a static version of the Stackelberg strategy. The suggested algorithm uses a linear ranking function at each level to define a crisp model ...
introduced and applied to the problems of signal restoration. A fuzzy approach for system identification and state estimation is developed. The estimated values obtained from the fuzzy model are in the form of fuzzy numbers which present the possibility of the system structure. Both L-R and symmetric triangular type membership functions are employed to derive the fuzzy-data based estimator (FBE...
This chapter presents two fuzzy adaptive variable structure controllers for a class of uncertain multiinput multi-output nonlinear systems with actuator nonlinearities (i.e. with sector nonlinearities and dead-zones). The design of the first controller concerns systems with symmetric and positive definite control-gain matrix, while the design of the second one is extended to the case of non-sym...
The combination of cryptology and biometrics has emerged as promising component of information security. Despite the current popularity of palmprint biometric, there has not been any attempt to investigate its usage for the fuzzy vault. This paper therefore investigates the possible usage of palmprint in fuzzy vault to develop a user friendly and reliable crypto system. We suggest the use of bo...
Passwords bootstrap symmetric and asymmetric cryptography, tying keys to an individual user. Biometrics are intended to strengthen this tie. Unfortunately, biometrics exhibit noise between repeated readings. Fuzzy extractors (Dodis et al., Eurocrypt 2004) derive stable symmetric keys from noisy sources. We ask if it is also possible for noisy sources to directly replace private keys in asymmetr...
Linear and Non-linear distortion influenced data transmission rate in communication system. In the presence of White Gaussian Noise linear distortion occurs in form of intersymbol interference (ISI) and co-channel interference (CCI). Amplifiers, modulator and demodulator subsystems are caused for Non-linear distortions along with nature of the medium. Different techniques are used to equalized ...
The combination of cryptology and biometrics has emerged as promising component of information security. Despite the current popularity of palmprint biometric, there has not been any attempt to investigate its usage for the fuzzy vault. This paper therefore investigates the possible usage of palmprints in fuzzy vault to develop a user friendly and reliable crypto system. We suggest the use of b...
Research on control of non-linear systems over the years has produced many results: control based on linearization, global feedback linearization, non-linear H∞ control, sliding mode control, variable structure control, state dependent Riccati equation control, etc [5]. This chapter will focus on fuzzy control techniques. Fuzzy control systems have recently shown growing popularity in non-linea...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید