نتایج جستجو برای: we use fuzzy numbers instead of crisp values

تعداد نتایج: 21313063  

2014
D. Arotaritei Dragos Arotaritei

In this paper, we propose an approximate "fuzzy Voronoi" diagram (FVD)for fuzzy numbers of dimension two (FNDT) by designing an extension of crisp Voronoi diagram for fuzzy numbers. The fuzzy Voronoi sites are defined as fuzzy numbers of dimension two. In this approach, the fuzzy numbers have a convex continuous differentiable shape. The proposed algorithm has two stages: in the first stage we ...

Journal: :journal of linear and topological algebra (jlta) 0
s. p mondal department of mathematics, national institute of technology, agartala, jirania-799046, tripura, india t. k roy department of mathematics, indian institute of engineering science and technology, shibpur, howrah-711103, west bengal, india

in this paper the solution of a second order linear di erential equations with intu-itionistic fuzzy boundary value is described. it is discussed for two di erent cases: coecientis positive crisp number and coecient is negative crisp number. here fuzzy numbers aretaken as generalized trapezoidal intutionistic fuzzy numbers (gtrifns). further a numericalexample is illustrated.

Journal: :Rairo-operations Research 2021

This paper addresses the scheduling of robotic cells with job-dependent transportation and set-up effects fuzzy methodology. Since times are a large portion production time in flexible manufacturing cell, ignoring these parameters may cause significant errors determining optimal makespan. Furthermore, exact values is challenging task. To overcome this problem, we represent using L-R numbers. Us...

2014
Karina Tomaszewska

The fuzzy numbers arise in decision making, control theory, fuzzy systems and approximate reasoning problems. The operations on them are becoming more and more popular. The aim of this paper is to present the fuzzy arithmetic operations on fuzzy numbers in a new way, using the horizontal membership functions (HMFs). The horizontal membership functions enable to introduce uncertain, interval or ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه بوعلی سینا - دانشکده علوم پایه 1391

abstract: in this thesis, we focus to class of convex optimization problem whose objective function is given as a linear function and a convex function of a linear transformation of the decision variables and whose feasible region is a polytope. we show that there exists an optimal solution to this class of problems on a face of the constraint polytope of feasible region. based on this, we dev...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی - دانشکده اقتصاد 1391

reinsurance is widely recognized as an important instrument in the capital management of an insurance company as well as its risk management tool. this thesis is intended to determine premium rates for different types of reinsurance policies. also, given the fact that the reinsurance coverage of every company depends upon its reserves, so different types of reserves and the method of their calc...

2007
G. Naadimuthu Fairleigh Dickinson E. S. Lee

We propose a generalized approach to the already existing crisp methods to solve the fuzzy multiattribute decision making problem. Specifically we deal with four methods, namely Simple Additive Weighting, Linear Assignment, TOPSIS and ELECTRE, where fuzzy numbers are used to represent the ratings of the alternatives and relative weights of the attributes. Through the use of fuzzy mathematics we...

2014
K. Selvakumari S. Lavanya

In this paper, we consider a two persons zero sum game with imprecise values in payoff matrix. All the imprecise values are assumed to be octagonal fuzzy numbers. An approach for solving problems by using ranking of the fuzzy numbers has been considered to solve the fuzzy game problem. By using ranking to the payoffs we convert the fuzzy valued game problem to crisp valued game problem, which c...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

2004
Michael Winter

This paper is a survey of the theory of Goguen categories which establishes a suitable categorical description of L-fuzzy relations, i.e., of relations taking values from an arbitrary complete Brouwerian lattice L instead of the unit interval [0, 1] of the real numbers. In particular, we concentrate on representability, the existence of crisp versions of several categorical constructions, and o...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید