Search all articles

+ Advanced search
Search articles within:
93154 articles
Anett Hoppe, Rudolf Seising, Andreas Nürnberger, Constanze Wenzel
Wisdom is an ancient concept, that experiences a renaissance since the last century throughout several scientific communities. In each of them it is interpreted in rather different ways - from a key ability to succesful aging to a human peak perfomance transcending mere knowledge. As a result, miscellaneous...
Antonin Dvorak, Martin Stepnicka, Lenka Vavrícková
In this paper we will investigate which fuzzy/linguistic rules are redundant in systems of such rules called linguistic descriptions. We present a formal definition of redundancy and show that rules which are seemingly redundant can be in fact indispensable. These results apply for IF-THEN rules which...
Martin Víta , Petr Cintula
This paper presents a generalization of many particular results about special types of filters (e.g., (positive) implicative, fantastic) on algebras of nonclassical (mostly fuzzy) logics. Our approach is rooted in the framework of Abstract Algebraic Logic, and is based on the close connection between the...
Ludmila Himmelspach, Daniel Hommers, Stefan Conrad
The quality of results for partitioning clustering algorithms depends on the assumption made on the number of clusters presented in the data set. Applying clustering methods on real data missing values turn out to be an additional challenging problem for clustering algorithms. Fuzzy clustering approaches adapted...
Pavels Orlovs
The paper is devoted to a general aggregation operator acting on L-fuzzy real numbers. It is defined as a t-norm based extension of an ordinary aggregation operator. The aim of our research is to analyze properties of the general aggregation operator depending on properties of the ordinary aggregation operator...
Irina Perfilieva
The aim of this investigation is to reconsider two notions of fuzzy function, namely: a fuzzy function as a special fuzzy relation and a fuzzy function as a mapping between fuzzy spaces. We propose to combine both notions in such a way that a fuzzy function as a relation determines a fuzzy function...
Vicenc Torra, Daniel Abril, Guillermo Navarro-Arribas
Data privacy has become an important topic of research. Ubiquitous databases and the eclosion of web technology eases the access to information. This information can be related to individuals, and, thus, sensitive information about users can be easily accessed by interested parties. Data privacy focuses on...
Nuno Homem, Joao Paulo Carvalho
Fingerprint identification is a well-known technique in forensic sciences. The basic idea of identifying a subject based on a set of features left by the subject actions or behavior can be applied to other domains. Identifying a mobile phone user based on a user fingerprint is one such application....
Anna Krol
This paper deals with some dependencies between fuzzy conjunctions and fuzzy implications. More precisely, a fuzzy implication generated from a fuzzy conjunction and a fuzzy conjunction induced by a fuzzy implication is considered. In the case of a fuzzy conjunction only border conditions and monotonicity are...
Magdalena Kacprzak, Witold Kosinski
Ordered fuzzy numbers (OFN) invented by the second author and his two coworkers in 2002 make possible to utilize the fuzzy arithmetic and to construct the Abelian group of fuzzy numbers and then an ordered ring. The definition of OFN uses the extension of the parametric representation of convex fuzzy...
Linghong Xue, Fuan Wen, Chunmei Fan, Jun Wang, Xiao Wang
In order to improve the user experience and reduce the operators’ cost, Real-Time Rich Internet Application (RIA) has become more and more important compared with other Web Applications. Real-time RIA combines the Multimedia and Real-time experience in the client side, which provides the live collaboration...
Shuai Shao, Fuqing Duan, Ping Guo
Image segmentation is the basis of image processing and image analysis. However, there are no common method that can be used in natural images, and present methods fail to explain understandings of human’s visual system. In this paper, we propose to apply Karklin's visual perception model to extract...
Qiaoyu Xu, Xing Wang
Aiming at the complexity of time unified hardware architecture, this paper presents the design scheme of IRIG-B encoder and system control based on SOPC. The NIOSII processor is configured with NIOSII IDE. Firstly, the design of IRIG-B(DC) coding module is accomplished to realize with Verilog HDL, and...
Yi Zheng, Zhongqiu Wang, Juncheng Wang, Hongru Wang
Virtual test Platform for marine instrument could provide visualized and interactive simulation solution for the development process. It could be used for virtual test or virtual experiment of mechanical or electro characters of marine instrument. The marine virtual instrument test environment is established...
Xuemin Zhang, Shixin Liu, Xiuyan Wang
A novel method to simulate the IIR filter based on GUI(Graphic User Interface) is introduced in this paper. This method not only depended on Matlab code, but also made use of controls which generate a GUI. All the operations have been done by GUI. This paper took bilinear transformation method to realize...
Wenchao Xu, Enjuan Wang, Qing Xue, Changwei Zheng
To simulate human memory, this paper introduces granular computing into modeling of memory, establishes a three order system, divides the memory model into instantaneous memory module, working memory module and the long-term memory module, filters out the memory information, granular coding the information...
Hailan Gu, Wenzhe Lv
In the paper, the homomorphic filter is improved , and a new filter is made , which is based on the low-pass frequency filter and high-pass filter. The performance of the new filter is analysised through comparing to other classical filter. The new filter is experimented, and its application was discussed.
Weifeng Wu
Basic block in program analysis plays an important role and it be applied to wide range, such as program compilation, program optimization, reverse engineering, program correctness verification, software security analysis and core module selection, etc. The binary executable analyzed by reverse engineering...
Yong Huang, Huamei Sun
In the field of data mining, Apriori is a classical algorithm for mining association rules. In this paper, an improved Apriori algorithm is proposed, which is based on the principle of memory indexing. By recording unnecessary scanning transactions and storing relatively frequent transactions, the algorithm...
Yongfeng Liu, Qinhui Zhou, Jianwei Yang, Aihua Zhu
to carry out electronic control EGR strategy in diesel engine the calculation model using GT-POWER is built. the thesis uses simulation software GT-POWER to establish the calculation model of 4JB1 intake system of turbocharged diesel engine with EGR system and the results agree well. According to the...
Gang Wang, Liwu Song
The technology of Davinci contains Davinci processor, related software, development environment, algorithm library and some other technical support. This paper designs the software and hardware to complete the intelligent Video Surveillance such as motion detection, self-tracking, analysis and determine...
Hanrong Chen, JunMei He
With the speed of computer network development, more economic activity went into the Internet era. It completed through the Internet such as online shopping, bank transfer and other commercial activities. The most important thing is for e-commerce security, e-commerce web site e-commerce activities,...
Jingbo Mao, Lin Wang, Yan Meng
The paper discussed the key techniques to build 3D simulation environment for wireless communication system based on Vega Prime and HLA. The LOD with 2D symbols and size-keeping rendering for communication entities are designed to improve the usability and intelligibility. The invisible electromagnetic...