نتایج جستجو برای: fuzzification

تعداد نتایج: 581  

Journal: :International Journal of Man-Machine Studies 1977
Brian R. Gaines Ladislav J. Kohout

The main part of the paper consists of a bibliography of some 1150 items, each keyword-indexed with some 750 being classified as concerned with fuzzy system theory and its applications. The remaining items are concerned with closely related topics in many-valued logic, linguistics, the philosophy of vagueness, etc. These background references are annotated in an initial section that outlines th...

2015
Shiny Mathew Noel Vincent Shilu Mathew Ishtiaq Qadri

AbstractThis paper defines an intelligent decision support system for diagnostics for typhoid fever. Typhoid fever has numerous variables involved in identification of the disease. These variable are transformed into membership functions and passed onto the Fuzzy Logic System. The fuzzy logic System consists of the following stages fuzzification which converts the crisp data into variable data,...

2014
Neetu Gupta

TYPE-2 fuzzy sets (T2 FSs), originally introduced by Zadeh [3], provide additional design degrees of freedom in Mamdani and TSK fuzzy logic systems (FLSs), which can be very useful when such systems are used in situations where lots of uncertainties are present [4]. The implementation of this type-2 FLS involves the operations of fuzzification, inference,and output processing. We focus on ―outp...

2002
YOUNG BAE WOOK HWAN SHIM W. H. SHIM

We consider the fuzzification of the notion of implicative hyper BCK-ideals, and then investigate several properties. Using the concept of level subsets, we give a characterization of a fuzzy implicative hyper BCK-ideal. We state a relation between a fuzzy hyper BCK-ideal and a fuzzy implicative hyper BCK-ideal. We establish a condition for a fuzzy hyper BCK-ideal to be a fuzzy implicative hype...

2017

Using fuzzy logic technique images. The suggested method is introduced for the using a combination of fuzzy algorithm. The fuzzification of underexposed region has been carried o membership function and for fuzzifying function is found suitable. been defined for both underexposed and overexposed saturation and intensity (HSV) color space is used for the trans from RGB to HSV space without chang...

2002
LEONARDA CARNIMEO ANTONIO GIAQUINTO

In this paper a Cellular Fuzzy Associative Memory containing fuzzy rules for bidimensional image fuzzification in robot vision systems is developed. This cellular processor constitutes a subsystem of a CNNbased architecture which can store both bidimensional patterns and the rules to process them. After establishing the fuzzy rules characterizing the Fuzzy Associative Memory, a CNN behaving as ...

2007
Nikolaidis Savvas Lazos C.

The most important part of a Case-Based Reasoning system is the retrieval stage, where the system must find in a sometimes-huge case base, the best matching case or cases from which to produce the prediction for the outcome of a given situation. In this paper we propose a fuzzy logic based approach for identifying cases for the similarity measuring stage of case based reasoning systems. We comb...

2007
Rolly Intan

This paper discusses fuzzification of crisp domains into fuzzy classes providing fuzzy domains. Relationship between two fuzzy domains, Xi and Xj , is represented by a matrix, wij . If Xi and Xj have n and m elements of fuzzy data, respectively, then wij is n × m matrix. The primary goal of the paper is to generate and provide some formulas for predicting interval probability in the relation to...

Journal: :CoRR 2013
Rozaimi Zakaria Abd. Fatah Wahab R. U. Gobithaasan

In this paper, we proposed another new form of type-2 fuzzy data points(T2FDPs) that is perfectly normal type-2 data points(PNT2FDPs). These kinds of brand-new data were defined by using the existing type-2 fuzzy set theory(T2FST) and type-2 fuzzy number(T2FN) concept since we dealt with the problem of defining complex uncertainty data. Along with this restructuring, we included the fuzzificati...

Journal: :CIT 2014
Gulnara Yakhyaeva Olga Yasinskaya

This software outputs hypotheses about the properties and expected consequences of a new computer attack. The system analyses a set of properties of the computer attack known to the user. For this we use the Base of the cyber attack’s precedents, described in the language of fuzzification of Boolean-valued models. Each potential property of the new attack is studied by using the JSM method. Thi...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید