نتایج جستجو برای: adversary fuzzy structure
تعداد نتایج: 1657955 فیلتر نتایج به سال:
We present a new method for proving lower bounds on quantum query algorithms. The new method is an extension of adversary method, by analyzing the eigenspace structure of the problem. Using the new method, we prove a strong direct product theorem for quantum search. This result was previously proven by Klauck, Špalek and de Wolf (quant-ph/0402123) using polynomials method. No proof using advers...
In this paper, we introduce the concept of an intuitionistic fuzzy graph structure (IFGS). We discuss certain notions, including intuitionistic fuzzy Bi-cycles, intuitionistic fuzzy Bi-trees and φ-complement of an intuitionistic fuzzy graph structure with several examples. We also present φ-complement of an intuitionistic fuzzy graph structure along with self-complementary and strong self-compl...
the aim of this paper is to introduce $(l,m)$-fuzzy closurestructure where $l$ and $m$ are strictly two-sided, commutativequantales. firstly, we define $(l,m)$-fuzzy closure spaces and getsome relations between $(l,m)$-double fuzzy topological spaces and$(l,m)$-fuzzy closure spaces. then, we introduce initial$(l,m)$-fuzzy closure structures and we prove that the category$(l,m)$-{bf fc} of $(l,m...
correct estimation of suspended sediment transported by a river is an important practice in water structure design, environmental problems and water quality issues. conventionally, sediment rating curve used for suspended sediment estimation in rivers. in this method discharge and sediment discharge or concentration related using regression relation that generally is exponential model. respect ...
Obtaining a weaker condition that preserves some inspired topological properties is always desirable. As result, we introduce the concept of infra-fuzzy topology, which subset family degrades fuzzy topology by omitting closedness under arbitrary unions. Fundamental spaces are investigated, including open and closed sets, interior closure operators, boundary set. It not possible to expect latter...
An adversary can easily compromise sensor nodes in wireless sensor networks, and generate multiple attacks through compromised nodes, such as false vote injection attacks and false report injection attacks. The false vote injection attack tries to drop legitimate reports in an intermediate node, and the false report injection attack tries to drain the energy consumption of each node. To prevent...
Competition has been studied as something to be averted, yet rarely has it been asked what processes may be involved in successful competition. We tested whether more accurate modeling of an adversary can assist competitive success. Pairs played a zero-sum game with no specific skill component over 40 trials. We measured the relative accuracy of the players’ second-order model (i.e., what I thi...
In this paper, we make a study of the Owen value for cooperative fuzzy games with a coalition structure, which can be regarded as the generalization of crisp case. An axiomatic system of the Owen value for fuzzy games with a coalition structure is obtained by extending the corresponding characterizations given by Owen. The relationship between the Owen value and the fuzzy core of fuzzy games wi...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید