نتایج جستجو برای: fuzzy theory and fuzzy genetic system

تعداد نتایج: 17301479  

Journal: :iranian journal of fuzzy systems 2015
m. otadi m. mosleh

in this paper, we use parametric form of fuzzy number and we converta fuzzy linear system to two linear system in crisp case. conditions for the existence of a minimal solution to $mtimes n$ fuzzy linear equation systems are derived and a numerical procedure for calculating the minimal solution is designed. numerical examples are presented to illustrate the proposed method.

Journal: :Kybernetika 1977
K. S. Raja Sethupathy S. Lakshmivarahan

With the emergence of the fundamental paper [5] by Zadeh in 1965 number of papers have appeared in literature featuring the application of fuzzy sets to pattern recognition, decision problems, function approximation, system theory, fuzzy logic, fuzzy algorithms, fuzzy automata, fuzzy grammars, fuzzy languages, fuzzy algebras, fuzzy topology, etc. [2], [7]. In this note, our interests are in the...

2003
James F. Smith

A fuzzy logic algorithm has been developed that automatically allocates electronic attack (EA) resources distributed over different platforms in real-time. The controller must be able to make decisions based on rules provided by experts. The fuzzy logic approach allows the direct incorporation of expertise. Genetic algorithm based optimization is conducted to determine the form of the membershi...

2005
Amal Elmzabi Mostafa Bellafkih Mohammed Ramdani

The Chiu’s method which generates a Takagi-Sugeno Fuzzy Inference System (FIS) is a method of fuzzy rules extraction. The rules output is a linear function of inputs. In addition, these rules are not explicit for the expert. In this paper, we develop a method which generates Mamdani FIS, where the rules output is fuzzy. The method proceeds in two steps: first, it uses the subtractive clustering...

Journal: :JNW 2013
Tong Zhao Bingbing Qian Yimin Li

For a class of uncertain nonlinear systems, this paper presents a method based on biological adaptation strategies of hybrid adaptive fuzzy control method. The method in the controller design, the ecological niche theory function as a consequent of the fuzzy rule fuzzy system, is established based on the biological adaptation of the adaptive controller. The controller design embodies the biolog...

2007
Pei-Yi Hao Jung-Hsien Chiang

Fuzziness must be considered in systems where available information is uncertain. A model of such a vague phenomenon might be represented as a fuzzy system equation which can be described by the fuzzy functions defined by Zadeh’s extension principle. In this paper, we incorporate the concept of fuzzy set theory into the support vector machine (SVM). This integration preserves the benefits of SV...

2017
I. Burak Parlak

This chapter introduces the underlying theory of Fuzzy Probability and Statistics related to the differences and similarities between discrete probability and possibility spaces. Fuzzy Probability Theory for Discrete Case starts with the fundamental tools to implement an immigration of crisp probability theory into fuzzy probability theory. Fuzzy random variables are the initial steps to develo...

2003
Giangiacomo Gerla

In Gerla [2000] a fuzzy logic in narrow sense is proposed as a theoretical framework for triangular norm based fuzzy control. In this note we show that the resulting theory is also able to express the implicationbased fuzzy control. Introduction The aim of control theory is to define a function f : X → Y whose intended meaning is that f(x) is the correct answer given the input x. Fuzzy approach...

Journal: :journal of agricultural science and technology 2010
s. m. hosseini b. zahraie

this study is focused on developing an integrated optimization-simulation based genetic algorithm model (iosga) to develop the operational policies for a multi-purpose reservoir system. the objective function of the optimization model is considered to be a linear function of reliability (rel), resiliency (res), and vulnerability (vul) of the river-reservoir system. genetic algorithm (ga) is emp...

2015
Shahin Ara Begum

An intrusion detection system (IDS) is used to manage network traffic and monitors for suspicious activity and alerts the system or network administrator. One of the major properties of IDS is to respond for anomalous or malicious traffic by taking action such as blocking the user or source IP address from accessing the network. IDS can identify threats in various ways: 1) it detects specific s...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید