نتایج جستجو برای: fuzzy end node
تعداد نتایج: 648134 فیلتر نتایج به سال:
A b s t r a c t A neural network for classifcation problems with linguistic terms is proposed. A fuzzy input is represented as a LR-type fizzy set. A generalized pocket algorithm, called f izzy pocket algorithm, that utilizes .IR-type fuzzy sets operations and defuzziJication method is first applied to train a linear threshold unit ( LTU ). This LTU node will classrfj, as many fuzzy input insta...
Vehicular ad hoc networks have been attracting the interest of both academic and industrial communities on account of their potential role in Intelligent Transportation Systems (ITS). However, due to vehicle movement and fading in wireless communications, providing a reliable and efficient multi-hop broadcast service in vehicular ad hoc networks is still an open research topic. In this paper, w...
In wireless sensor networks, the selection of cluster heads relies upon the various selection parameters, such as energy, distance, node concentration and rate of retransmission. There is always uncertainty in the suitability of sensor node for the cluster head role due to these various selection parameters. Fuzzy logic is capable of overcoming uncertainties even with incomplete available infor...
Simultaneous routing and resource allocation has been considered in wireless networks for its performance improvement. In this paper we propose a cross-layer optimization framework for worst-case queue length minimization in some type of FDMA based wireless networks, in which the the data routing and the power allocation problem are jointly optimized with Fuzzy distributed H∞ control strategy ....
In this paper we introduce the concept of strong total domination in fuzzy graphs. We determine the strong total domination number for several classes of fuzzy graphs. A lower bound and an upper bound for the strong total domination number in terms of strong domination number is obtained. Strong total domination in fuzzy trees is studied. A necessary and sufficient condition for the set of fuzz...
in this paper, by presenting some notions and theorems, we obtaindifferent types of fuzzy topologies. in fact, we obtain somelowen-type and chang-type fuzzy topologies on general fuzzyautomata. to this end, first we define a kuratowski fuzzy interioroperator which induces a lowen-type fuzzy topology on the set ofstates of a max- min general fuzzy automaton. also by provingsome theorems, ...
An efficient decoding algorithm for segmental HMMs (SHMMs) is proposed with multi-stage pruning. The generation by SHMMs of a feature trajectory for each state expands the search space and the computational cost of decoding. It is reduced in three ways: pre-cost partitioning, start-node (SN) beam pruning, and conventional endnode (EN) beam pruning. Experiments show that partitioning cuts comput...
This paper describes a transputer-based parallel controller that was developed in the Center for Intelligent Systems at Vanderbilt University to control the Soft Arm robot. The Soft Arm robot is used in a robotic aid system, called ISAC, for the physically challenged. The controller uses a network of T800 transputers as the parallel processing nodes. The controller is composed of a master node,...
Security is the biggest challenge in MANET. MANET presents various types of security attacks on data exchanges taking place between source and destination. In this misbehavior detection schemes for conventional wireless networks has opposed black hole attack and malicious node occur routing, this proposed technique as a great challenges in networks. In this iTrust, a probabilistic misbehavior d...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید