نتایج جستجو برای: fuzzy event tree analysis feta

تعداد نتایج: 3170994  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شهید باهنر کرمان - دانشکده مهندسی 1390

محاسبه قابلیت اعتماد سیستم نگهداری از مسائل مهم در امر تونلسازی است که اگر به درستی صورت نگیرد، صدمات جبران ناپذیری را در پی خواهد داشت. تونل راه آهن مرودشت، قطعه 20 مسیر راه آهن اصفهان-شیراز می باشد که به دلیل اهمیت بالای این تونل در ارتباط بین دو شهر بزرگ، مورد بررسی قرار گرفته است. تحقیق حاضر شامل سه بخش «تعیین سیستم نگهداری تونل راه آهن مرودشت به روش rmr » ، «تعیین فضای نمونه و فضای احتمال ...

Journal: :Soft Comput. 2009
Qiang Shen Ruiqing Zhao Wansheng Tang

Random fuzzy theory offers an appropriate mechanism to model random fuzzy phenomena, with a random fuzzy variable defined as a function from a credibility space to a collection of random variables. Based on this theory, this paper presents the results of an investigation into the representation of properties of alternating renewal processes that are described by sequences of positive random fuz...

2003
James F. Smith

A fuzzy logic algorithm has been developed that automatically allocates electronic attack (EA) resources distributed over different platforms in real-time. The controller must be able to make decisions based on rules provided by experts. The fuzzy logic approach allows the direct incorporation of expertise. Genetic algorithm based optimization is conducted to determine the form of the membershi...

Introduction: Risk assessment of hazardous processes is the priority of risk management. Layer of protection analysis (LOPA) is one of the most popular methods used for risk assessment. Due to the insufficient information or uncertainty in failure rates (PFD) of protective layers, risk assessment based on the conventional LOPA can result in error in calculations. In this study, we tried to use ...

Journal: :IEEJ Transactions on Electronics, Information and Systems 1997

2012
Krishnamoorthi Makkithaya N. V. Subba Reddy

As the number of networked computers grows, intrusion detection is an essential component in keeping networks secure. Various approaches for intrusion detection are currently being in use with each one has its own merits and demerits. This paper presents our work to test and improve the performance of a new class of decision tree c-fuzzy decision tree to detect intrusion. The work also includes...

Journal: :CoRR 2014
Jooyeol Yun Jun won Seo Taeseon Yoon

Decision trees have been widely used in machine learning. However, due to some reasons, data collecting in real world contains a fuzzy and uncertain form. The decision tree should be able to handle such fuzzy data. This paper presents a method to construct fuzzy decision tree. It proposes a fuzzy decision tree induction method in iris flower data set, obtaining the entropy from the distance bet...

2014
Jooyeol Yun Jun won Seo Taeseon Yoon

Decision trees have been widely used in machine learning. However, due to some reasons, data collecting in real world contains a fuzzy and uncertain form. The decision tree should be able to handle such fuzzy data. This paper presents a method to construct fuzzy decision tree. It proposes a fuzzy decision tree induction method in iris flower data set, obtaining the entropy from the distance bet...

Journal: :Mathematical Problems in Engineering 2021

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید