نتایج جستجو برای: adversary fuzzy structure
تعداد نتایج: 1657955 فیلتر نتایج به سال:
quad rotor is a renowned underactuated unmanned aerial vehicle (uav) with widespread military and civilian applications. despite its simple structure, the vehicle suffers from inherent instability. therefore, control designers always face formidable challenge in stabilization and control goal. in this paper fuzzy membership functions of the quad rotor’s fuzzy controllers are optimized using nat...
The automatic assignment of protein secondary structure from three dimensional coordinates is an essential step in the characterization of protein structure. <span style="font...
The Internet has unlimited resources of knowledge and is widely used in many applications. Web mining plays an important role in discovering such knowledge, it is roughly divided into three categories : Web Content Mining , Web Usage Mining and Web Structure Mining. The web consists of imprecise, incomplete and uncertain data and knowledge. Fuzzy Set Theory is often used to handle such data. Se...
State reduction of fuzzy automata has been studied by many authors. All of them have dealt with classical fuzzy automata over the Gödel structure and reduction has been done using crisp equivalence relations. In [2, 3, 7] we have made several innovations. We have studied fuzzy automata over a more general structure of truth values, over a complete residuated lattice, we have shown that better r...
in this paper, a new structure possessing the advantages of low-power consumption, less hardware and high-speed is proposed for fuzzy controller. the maximum output delay for general fuzzy logic controllers (flc) is about 86 ns corresponding to 11.63 mflips (fuzzy logic inference per second) while this amount of the delay in the designed fuzzy controller becomes 52ns that corresponds to 19.23 m...
The paper proposes a novel fuzzy system structure to enhance the performance of fuzzy neural network systems. The structure of enhanced fuzzy system (EFS) is to decompose each fuzzy variable into fuzzy subsystems called component fuzzy systems to act as type 2 fuzzy, and each component fuzzy system is based on one traditional fuzzy set with one pair of symmetry fuzzy sets. In addition, in order...
The quantum adversary method is one of the most versatile lower-bound methods for quantum algorithms. We show that all known variants of this method are equal up to a multiplicative factor: weighted adversary [Amb03], strong weighted adversary [Zha04], spectral adversary [BSS03], and the Kolmogorov complexity adversary [LM04]. We also present a few new equivalent formulations of the method. Thi...
In [15] an efficient two-party, two-prime RSA function sharing protocol was proposed. The protocol proves efficiency over previously proposed protocols. When the sharing of standard RSA is considered, the protocol is faster than ever. In this paper, under the assumption that the adversary has eavesdropping and halting capabilities, we propose an efficient extension to the protocol of [15]. Our ...
In this paper, the concept of a fuzzy graph structure is introduced based on the concept of graph structure given by E. Sampathkumar, in Bull. Kerala Math. Assoc., Vol 3, No.2 (2006 December), 65123. New concepts like ρi − edge, ρi − path, ρi − cycle, ρi − tree, ρi − forest, fuzzy ρi − cycle, fuzzy ρi − tree, fuzzy ρi − forest etc. are introduced. Some results are obtained. We continue the stud...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید