نتایج جستجو برای: zadehs extension principle

تعداد نتایج: 297288  

2018
Hui Cao Senlin Li Rui Xie Na Xu Ying Qian Hongdan Chen Qinyu Hu Yihong Quan Zhihong Yu Junjun Liu Ming Xiang

Dangguiliuhuang decoction (DGLHD) has been demonstrated to be effective in treating inflammatory, hepatic steatosis, and insulin resistance. In the study, we tried to elucidate the pharmacological efficacy and mechanism of DGLHD against liver fibrosis and predicate potential active ingredients and targets via network analysis and experimental validation. In the formula, we totally discovered 76...

Journal: :IEICE Transactions 2008
Kiyoshi Nishiyama Xin Lu

An extension of the traditional color-based visual tracker, i.e., the continuously adaptive mean shift tracker, is given for improving the convenience and generality of the color-based tracker. This is achieved by introducing a probability density function for pixels based on the hue histogram of object. As its merits, the direction and size of the tracked object are easily derived by the princ...

2000
Peter P. Wakker Enrico Diecidue

This paper shows how de Finetti's book-making principle, commonly used to justify additive subjective probabilities, can be modi ̄ed to agree with some nonexpected utility models. More precisely, a new foundation of the rankdependent models is presented that is based on a comonotonic extension of the book-making principle. The extension excludes book-making only if all gambles considered induce ...

2011
Marcos Rabelo L. F. C. Alberto

An extension of the uniform invariance principle for ordinary differential equations with finite delay is developed. The uniform invariance principle allows the derivative of the auxiliary scalar function V to be positive in some bounded sets of the state space while the classical invariance principle assumes that V̇ ≤ 0. As a consequence, the uniform invariance principle can deal with a larger ...

2009
Guido Boella Souhila Kaci Leon van der Torre

We introduce nine attack refinement principles stating whether the extension stays the same if we add a single attack, and we show that the grounded extension satisfies five of them. We define also an extension called acyclic attack refinement by adding a loop condition, and we show that the grounded extension satisfies one of the acyclic attack refinement principles. Moreover, we define an ext...

Journal: :زبان شناسی و گویش های خراسان 0
عباسعلی آهنگر ابراهیم مرادی

this paper studies the semantic contribution of –e suffix based on lieber (2004). this theory using seven semantic features and a principle called coindexation principle studies the semantic contribution of lexical items and their function in compounding, derivation and conversion. in this theory each lexical item even affixes have a semantic skeleton and a semantic body. each affix has to have...

Journal: :Physical review. E, Statistical physics, plasmas, fluids, and related interdisciplinary topics 1995
Benguria Depassier

We show that the minimal speed for the existence of monotonic fronts of the equation ut = (u )xx + f(u) with f(0) = f(1) = 0, m > 1 and f > 0 in (0, 1), derives from a variational principle. The variational principle allows to calculate, in principle, the exact speed for general f . The case m = 1 when f (0) = 0 is included as an extension of the results.

Journal: :حقوق خصوصی 0
سید محمد صادق طباطبایی دانشیار، گروه حقوق، دانشگاه اصفهان، اصفهان، ایران داریوش کیوانی هفشجانی دانشجوی دکتری حقوق خصوصی، دانشگاه اصفهان، اصفهان، ایران

in donation contract, the principle is that donor can refer to given property and to take its possession. this principle has some exceptions. one of these exceptions is “donation to children”, which is irrevocable in accordance with the first paragraph of article 803 of civil law. most of the civil law’s writers believe that judgment about donation to children include the donation to grandchild...

2010
Adam Barth Adrienne Porter Felt Prateek Saxena Aaron Boodman

Browser extensions are remarkably popular, with one in three Firefox users running at least one extension. Although well-intentioned, extension developers are often not security experts and write buggy code that can be exploited by malicious web site operators. In the Firefox extension system, these exploits are dangerous because extensions run with the user’s full privileges and can read and w...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید