نتایج جستجو برای: fuzzy identity

تعداد نتایج: 208357  

Journal: :Science China Information Sciences 2012

2013
S. E. Alam Sultan Aljahdali Nisar Hundewale

We propose a new class of algebraic structure named as (m, n)-semihyperring which is a generalization of usual semihyperring. We define the basic properties of (m, n)-semihyperring like identity elements, weak distributive (m, n)semihyperring, zero sum free, additively idempotent, hyperideals, homomorphism, inclusion homomorphism, congruence relation, quotient (m, n)-semihyperring etc. We propo...

Journal: :Int. J. Fuzzy Logic and Intelligent Systems 2014
Jeonggon Lee Kul Hur Pyung-Ki Lim

We discuss some interesting sublattices of interval-valued fuzzy subgroups. In our main result, we consider the set of all interval-valued fuzzy normal subgroups with finite range that attain the same value at the identity element of the group. We then prove that this set forms a modular sublattice of the lattice of interval-valued fuzzy subgroups. In fact, this is an interval-valued fuzzy vers...

2003
Xiaohua Hu Setsuo Ohsuga

In this paper we investigate the area of attributeoriented data generalization for knowledge discovery purposes. We utilize a fuzzy database schema as the medium carrying the original information, where the fuzzy relation of similarity or proximity replaces the classical identity relation. Following a well-known approach for exact data generalization in the ordinary databases, Han [1], we propo...

2012
Felix Distel

Fuzzy Logics have been applied successfully within both Formal Concept Analysis and Description Logics. Especially in the latter field, Fuzzy Logics have been gaining significant momentum during the last two years. Unfortunately, the research on fuzzy logics within the two communities has been conducted independently from each other, leading to different approaches being pursued. We show that i...

2004
Dat Tran

A fuzzy approach to normalization methods for pattern verification is presented in this paper. For an input object and a claimed identity, a claimed pattern's score is calculated and compared with a given threshold to accept or reject the claimed pattern. Considering the pattern verification problem based on fuzzy set theory, the claimed pattern's score is viewed as a fuzzy membership function....

Journal: :Computers & Industrial Engineering 2009
Ming-Hung Shu Hsien-Chung Wu

Since fuzzy quality data are ubiquitous in the real world, under this fuzzy environment, the supplier selection and evaluation on the basis of the quality criterion is proposed in this paper. The Cpk index has been the most popular one used to evaluate the quality of supplier’s products. Using fuzzy data collected from q P 2 possible suppliers’ products, fuzzy estimates of q suppliers’ capabili...

2015
Bo Wang Yubin Gao

Image compression technology is to compress the redundancy between the pixels to reduce the transmission broadband and storage space by using the correlation of the image pixels. Fuzzy neural network effectively integrates neural network technology and fuzzy technology; combines learning, selfadaptivity, imagination and identity and uses rule-based reasoning and fuzzy information processing in ...

2015
Jamal Abd Ali Mahammad A Hannan Azah Mohamed Enrico Pontelli

1 Department of Electrical, Electronic and System Engineering, Faculty of Engineering and Built Environments, University Kebangsaan Malaysia, Bangi, Selangor 43600, Malaysia; [email protected] (M.A.H.); [email protected] (A.M.) 2 Ministry of Electricity, General Company of Electricity Production Middle Region, Baghdad 10001, Iraq * Correspondence: [email protected]; Tel.: +60-111-1855-441 † These...

Journal: :IACR Cryptology ePrint Archive 2011
Shweta Agrawal Xavier Boyen Vinod Vaikuntanathan Panagiotis Voulgaris Hoeteck Wee

Cryptosystems based on the hardness of lattice problems have recently acquired much importance due to their average-case to worst-case equivalence, their conjectured resistance to quantum cryptanalysis, their ease of implementation and increasing practicality, and, lately, their promising potential as a platform for constructing advanced functionalities. In this work, we construct “Fuzzy” Ident...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید