نتایج جستجو برای: fuzzy techniques
تعداد نتایج: 710207 فیلتر نتایج به سال:
This volume is about knowledge processing with interval and soft computing, i.e., about techniques that use both interval and soft computing to process knowledge and about the results of applying these techniques. To better understand these techniques, in Chapter 1, we described fundamentals of interval computing, and in Chapter 2, we described the fundamentals of soft computing. Now it is time...
predicting the effort of a successful project has been a major problem for software engineers the significance of which has led to extensive investigation in this area. One of the main objectives of software engineering society is the development of useful models to predict the costs of software product development. The absence of these activities before starting the project will lead to variou...
Soft Computing techniques play an important role for decision in applications with imprecise and uncertain knowledge. The application of soft computing disciplines is rapidly emerging for the diagnosis and prognosis in medical applications. Between various soft computing techniques, fuzzy expert system takes advantage of fuzzy set theory to provide computing with uncertain words. In a fuzzy exp...
This paper proposes a vision-based fuzzy 8051 surveillance system which emphasizes on designing the image processing function to detect the invaded states and the 8051 fuzzy servomotors controller to track the invader region. The techniques include discrete wavelet transformation (DWT) image data reducing, edge detection, motion detection, and fuzzy servomotor control. In this paper, image proc...
Considering non-normative extension and too much development of cities, the lack of accurate model of consumption, increasing waste production, the most logical and most economical method for disposal of municipal waste is sanitary landfill. Given that, to identify areas prone to waste landfilling requires application of comprehensive techniques. The main objective for the present research is t...
Tools from the armoury of soft computing have been in focus of researches recently, since soft computing techniques are used for fault detection (classification techniques), forecasting of time-series data, inference, hypothesis testing, and modelling of causal relationships (regression techniques) in process engineering. These techniques solve two cardinal problems: learning from experimental ...
Security of a biometric system is of paramount importance considering increased commercial use for allowing access to sensitive areas. In this context protection of stored biometric templates is of particular interest as these templates are irrevocable once leaked. Fuzzy vault has emerged as a novel cryptographic construct for the protection of biometric templates. But like every other techniqu...
In reality, a lot of information is available only in an imperfect form. This might be due to imprecision, vagueness, uncertainty, incompleteness, or ambiguities. Traditional database systems can only adequately cope with perfect data. Among others, fuzzy set theory has been applied to deal with imperfections of data in a more natural way and to enhance the accessibility of databases. In this c...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید