نتایج جستجو برای: fuzzy normal
تعداد نتایج: 646803 فیلتر نتایج به سال:
An intrusion detection system’s main goal is to classify activities of a system into two major categories: normal and suspicious (intrusive) activities. Intrusion detection systems usually specify the type of attack or classify activities in some specific groups. The objective of this paper is to incorporate several soft computing techniques into the classifying system to detect and classify in...
This study proposes a new single-solution based metaheuristic, namely the Vortex Search algorithm (VS), for fuzzy clustering of ECG beats. The newly proposed metaheuristic is quite simple and highly competitive when compared to the population-based metaheuristics. In order to study the performance of the proposed method a number of experiments are performed over a dataset which is created by us...
The “Double Fuzzy Point” rule representation opens a new dimension for expressing changes of fuzziness in fuzzy rule-based systems. In the case of standard “Fuzzy Point” rule representations, it is difficult to describe fuzzy functions in which crisp observations are required to have fuzzy conclusions, or in which an increase in the fuzziness of observations leads to reduced fuzziness in conclu...
This paper introduces a singular value-based method for reducing a given fuzzy rule set. The method conducts singular value decomposition of the rule consequents and generates certain linear combinations of the original membership functions to form new ones for the reduced set. The present work characterizes membership functions by the conditions of sum normalization (SN), nonnegativeness (NN),...
In this paper, we made an attempt to study the algebraic nature of an anti (T, S)-fuzzy normal ideals and translations of anti S-fuzzy subhemiring of a hemiring. 2000 AMS Subject classification: 03F55, 06D72, 08A72.
In this paper, fuzzy truncated normal distribution is shown. Also, some examples and applications are presented.
Given a fuzzy logic system, how can we determine the membership functions that will result in the best performance? If we constrain the membership functions to a certain shape (e.g., triangles or trapezoids) then each membership function can be parameterized by a small number of variables and the membership optimization problem can be reduced to a parameter optimization problem. This is the app...
In this paper, we examine and compare de Morgan-, Kleene-, and Boolean-disjunctive and conjunctive normal forms in fuzzy settings. This generalizes papers of Turksen on the subject of Boolean-normal forms.
In this paper, by using the notions of ”not belonging” (∈) and ”non quasi-k-coincidence” (qk) of a fuzzy point with a fuzzy set, we define the notion of (∈,∈ ∨ qk)-fuzzy subgroups of a group which is a generalization of fuzzy subgroups and (∈,∈ ∨ q)-fuzzy subgroups. Aslo, we generalized the concept of ∈-level set, (∈ ∨ q)-level set and (∈,∈ ∨ q)level set by using ”not belonging” (∈) and ”non qu...
Most of the researches in the domain of fuzzy number comparisons serve the fuzzy number ordering purpose. For making a comparison between two fuzzy numbers, beyond the determination of their order, it is needed to derive the magnitude of their order. In line with this idea, the concept of inequality is no longer crisp however it becomes fuzzy in the sense of representing partial belonging or de...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید