نتایج جستجو برای: fuzzy petri net
تعداد نتایج: 190653 فیلتر نتایج به سال:
This paper presents a new approach for linguistic system modeling which is also suitable for stability analysis of linguistic models. First we present an approach, which is called infinite place model, described using modified fuzzy Petri net, with uses a new place definition based on physical infinity state concept. This method has some practical difficulties, which are taking care of in the s...
It is very important for constructing a FPN (fuzzy petri net) to accurately find out all parameters of fuzzy production rules. In this paper, an improved genetic algorithm is introduced into the process of exploring the optimal parameters of a modified FPN. Realization of the algorithm does not depend on experiential data and requirements for the initial input of the FPN are not stringent. Simu...
In order to exploit the massive image information and to handle overload, techniques for analyzing image content to facilitate indexing and retrieval of images have emerged. In this paper, a low-level and high-level image semantic annotation based on Fuzzy Petri Net is presented. Knowledge scheme is used to define more general and complex semantic concepts and their relations in the context of ...
This article may be used for research, teaching and private study purposes. Any substantial or systematic reproduction, redistribution , reselling , loan or sub-licensing, systematic supply or distribution in any form to anyone is expressly forbidden. The publisher does not give any warranty express or implied or make any representation that the contents will be complete or accurate or up to da...
It is very important for constructing a FPN (fuzzy petri net) to accurately find out all parameters of fuzzy production rules. In this paper, Maximum-Minimum Ant System (MMAS) of ant colony algorithm (ACA) is originally introduced into the process of exploring the optimal parameters of a modified FPN.The optimization algoritnm is based on the techniques of multithreading. Realization of the alg...
With the development of society and information technology, people’s dependence on Internet has gradually increased, including online shopping, downloading files, reading books, banking. However, how to ensure safety legitimacy these network user behaviors become focus attention. As we all know, cybersecurity system resilience originate from symmetry. Due diversity unpredictability cyber-attack...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید