نتایج جستجو برای: fuzzy act

تعداد نتایج: 269321  

Journal: :Industrial Management and Data Systems 2003
Mikael Collan Shuhua Liu

The economic life of large investments is long and thus necessitates constant dynamic managerial actions. To be able to act in an optimal way in the dynamic management of large investments managers need the support of advanced analytical tools. They need to have constant access to information about the real time situation of the investment, as well as, access to up-to-date information about cha...

Journal: :JSW 2014
Yang Liu Xin-Qing Yan Gui-ming Lu

The large number of “false” targets, which are commonly faced by the aviators in real battlefields, will deteriorate the efficiency and initiative of the campaign. To detect and remove these “false” targets, a novel tracking simulation system is presented in this paper. As the key part of a multi-sensor information fusion simulation system, this tracking simulation sub-system consists of tracki...

Journal: :Soft Comput. 2012
Mojtaba Ahmadieh Khanesar Mohammad Teshnehlab Okyay Kaynak

This paper presents a robust indirect model reference fuzzy control scheme for control and synchronization of chaotic nonlinear systems subject to uncertainties and external disturbances. The chaotic system with disturbance is modeled as a Takagi–Sugeno fuzzy system. Using a Lyapunov function, stable adaptation laws for the estimation of the parameters of the Takagi–Sugeno fuzzy model are deriv...

2017
Aref Ebrahimi Parham Pahlavani Zohreh Masoumi

Traffic monitoring and managing in urban intelligent transportation systems (ITS) can be carried out based on vehicular sensor networks. In a vehicular sensor network, vehicles equipped with sensors such as GPS, can act as mobile sensors for sensing the urban traffic and sending the reports to a traffic monitoring center (TMC) for traffic estimation. The energy consumption by the sensor nodes i...

2003
Cengiz Kahraman Ufuk Cebeci Da Ruan

Catering is the act of providing food and services or it may be defined as preparing or providing food for someone else to serve; or preparing, delivering and serving food at the premises of another person or event. The aim of this paper is to provide an analytical tool to select the best catering firm providing the most customer satisfaction. The customers of three Turkish catering firms were ...

Journal: :Inf. Sci. 2010
Humberto Bustince Tomasa Calvo Bernard De Baets János C. Fodor Radko Mesiar Javier Montero Daniel Paternain Ana Pradera

In this paper we prove that, under suitable conditions, Atanassov’s Ka operators, which act on intervals, provide the same numerical results as OWA operators of dimension two. On one hand, this allows us to recover OWA operators from Ka operators. On the other hand, by analyzing the properties of Atanassov’s operators, we can generalize them. In this way, we introduce a class of aggregation fun...

1997
Payman Arabshahi Robert J. Marks Seho Oh Thomas P. Caudell Bong-Gee Song

A new technique for adaptation of fuzzy membership functions in a fuzzy inference system is proposed. The pointer technique relies upon the isolation of the specific membership functions that contributed to the final decision, followed by the updating of these functions’ parameters using steepest descent. The error measure used is thus backpropagated from output to input, through the min and ma...

Journal: :Physical Review E 2021

Polyampholyte field theory and explicit-chain molecular dynamics models of sequence-specific phase separation a system with two intrinsically disordered protein (IDP) species indicate consistently that substantial polymer excluded volume significant mismatch the IDP sequence charge patterns can act in concert, but not isolation, to demix upon condensation. This finding reveals an energetic-geom...

Journal: :Int. J. Hum.-Comput. Stud. 2004
Jose Jesus Castro-Schez Nicholas R. Jennings Xudong Luo Nigel Shadbolt

In this paper, we employ the fuzzy repertory table technique to acquire the necessary domain knowledge for software agents to act as sellers and buyers using a bilateral, multi-issue negotiation model that can achieve optimal results in semi-competitive environments. In this context, the seller’s domain knowledge that needs to be acquired is the rewards associated with the products and restrict...

2014
Swati Sharma Mandeep Kaur

Computer networks have expanded significantly in use and this makes them more vulnerable to attacks. It is really important to secure the data from any intrusive attacks so intrusion detection is really very helpful in the field of computer network security. Intrusion detection is the act of detecting unwanted traffic on a network. Many current intrusion detection systems are unable to find unk...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید