Search results for "Fuzzy logi"

showing 10 items of 471 documents

Fuzzy $$\varphi $$ -pseudometrics and Fuzzy $$\varphi $$ -pseudometric Spaces

2017

By replacing the axiom \(m(x,x,t) = 1\) for all \(x\in X, t>0\) in the definition of a fuzzy pseudometric in the sense of George-Veeramani with a weaker axiom \(m(x,x,t) = \varphi (t)\) for all \(x\in X, t>0\) where \(\varphi : {\mathbb R}^+ \rightarrow (0,1]\) is a non-decreasing function, we come to the concept of a fuzzy \(\varphi \)-pseudometric space. Basic properties of fuzzy \(\varphi \)-pseudometric spaces and their mappings are studied. We show also an application of fuzzy \(\varphi \)-pseudometrics in the words combinatorics.

CombinatoricsBaire category theoremPseudometric spaceFunction (mathematics)Space (mathematics)Fuzzy logicAxiomCauchy sequenceMathematics
researchProduct

Modelling the Effects of Internal Textures on Symmetry Detection Using Fuzzy Operators

2009

Symmetry is a crucial dimension which aids the visual system, human as well as artificial, to organize its environment and to recognize forms and objects. In humans, detection of symmetry, especially bilateral and rotational, is considered to be a primary factor for discovering and interacting with the surrounding environment. Rotational symmetry detecting can be affected by less-known factors, such as the stimulus internal texture. This paper explores how fuzzy operators can be usefully employed in modeling the effects of the internal texture on symmetry detection. To this aim, we selected two symmetry detection algorithms, based on different computational models, and compared their output…

Computational modelVisual perceptionSettore INF/01 - InformaticaComputer sciencebusiness.industryRotational symmetryFuzzy operatorsPattern recognitionFuzzy logicMemetic algorithmComputer visionArtificial intelligencebusinessvisual perception symmetry fuzzy logic
researchProduct

Fairness aware rate adaptation and proportional scheduling for IEE 802.11 wlans using FSE

2015

With its rapid development in the wireless markets, IEEE 802.11 WLAN is experiencing a huge popularity. However, due to the limitation of frequency bandwidth of WLANs, it is essential that the available radio resource should be fully utilized to offer different services to multiple users. In order to maximize system throughput while still guaranteeing the fairness among users, a proportional fairness based algorithm is proposed in this work. Since most of the previous resource allocation algorithms were simply based on the channel conditions without taking into account user’s demand, in this paper, we introduce the theory of fuzzy synthetic evaluation (FSE) which also allows us to consider …

Computer Networks and CommunicationsComputer sciencebusiness.industryFuzzy logicScheduling (computing)Channel state informationMax-min fairnessFairness measureBit error rateWirelessMaximum throughput schedulingElectrical and Electronic EngineeringbusinessComputer networkChina Communications
researchProduct

Automatic skull stripping in MRI based on morphological filters and fuzzy c-means segmentation

2012

In this paper a new automatic skull stripping method for T1-weighted MR image of human brain is presented. Skull stripping is a process that allows to separate the brain from the rest of tissues. The proposed method is based on a 2D brain extraction making use of fuzzy c-means segmentation and morphological operators applied on transversal slices. The approach is extended to the 3D case, taking into account the result obtained from the preceding slice to solve the organ splitting problem. The proposed approach is compared with BET (Brain Extraction Tool) implemented in MRIcro software.

Computer scienceComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONSensitivity and SpecificityFuzzy logicPattern Recognition AutomatedFuzzy LogicImage Interpretation Computer-AssistedmedicineHumansSegmentationComputer visionSettore ING-INF/05 - Sistemi Di Elaborazione Delle Informazionimedicine.diagnostic_testSkull Stripping Fuzzy C-means Morphological Filters.business.industrySkullProcess (computing)BrainReproducibility of ResultsMagnetic resonance imagingImage segmentationImage EnhancementMagnetic Resonance ImagingSubtraction TechniquePattern recognition (psychology)Skull strippingArtificial intelligenceMr imagesbusinessAlgorithms2011 Annual International Conference of the IEEE Engineering in Medicine and Biology Society
researchProduct

Concentrated Solar Power: Ontologies for Solar Radiation Modeling and Forecasting

2014

This chapter considers the possibility of formally representing implicit and explicit knowledge of solar radiation modeling and forecasting by means of ontologies, with particular reference to the implications of concentrated solar power. The various applications discussed in the literature include various methods, such as spectral, parametric and empirical models, artificial neural networks and fuzzy logic approaches, as well as satellite and ground based imaging techniques. We want to use the principles of semantic technologies and formal ontologies, to represent knowledge in solar radiation models. The purpose is to capture the semantics of information and realize a system for sharing an…

Computer scienceConcentrated solar powerSystems engineeringSemantic technologyExplicit knowledgeOntology (information science)SemanticsFuzzy logicDomain (software engineering)
researchProduct

Fuzzy Logic Based Security Trust Evaluation for IoT Environments

2019

In the new technological era called the Internet of Things (IoT), people, machines and objects communicate with each other via the Internet by exchanging information. In this context, trust plays an important role and is considered as a key factor in the success of the IoT services expansion. IoT services and applications use in some cases data concerning the privacy of their users. Consequently, users should trust the entities exchanging their personal information. In this paper, we present a framework that evaluates the security trust level of IoT nodes based on a Fuzzy Logic model using different input parameters such as Device Physical Security, Device Security Level and Device Ownershi…

Computer scienceContext (language use)02 engineering and technology[INFO] Computer Science [cs]TrustComputer securitycomputer.software_genreFuzzy logicFuzzy LogicFactor (programming language)Node (computer science)0202 electrical engineering electronic engineering information engineeringcomputer.programming_languagePrivacy.[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI]business.industry020206 networking & telecommunicationsInternet of Things (IoT)SecurityKey (cryptography)020201 artificial intelligence & image processingThe InternetbusinessPersonally identifiable informationcomputerPhysical security2019 IEEE/ACS 16th International Conference on Computer Systems and Applications (AICCSA)
researchProduct

Imperialist competitive algorithm for determining the parameters of a Sugeno fuzzy controller

2020

Abstract We used an imperialist competitive algorithm to determine the parameters of a fuzzy controller of type Sugeno that would ensure a good unit step response of a second-order single-input and single-output automatic system.

Computer scienceControl theory020208 electrical & electronic engineering010401 analytical chemistry0202 electrical engineering electronic engineering information engineeringImperialist competitive algorithm02 engineering and technology01 natural sciencesFuzzy logic0104 chemical sciencesInternational Journal of Advanced Statistics and IT&C for Economics and Life Sciences
researchProduct

Tuning a Mamdani Fuzzy Controller with an Imperialist Competitive Algorithm

2021

We have implemented a fuzzy controller with a view to regulating a single-input and single-output second-order linear system. The fuzzy controller was a Mamdami proportional-derivative controller. To determine the parameters of the fuzzy controller we have used an imperialist competitive algorithm. This type of algorithm has a long running time so we implemented also a parallel version of the algorithm that we run on HPC Zamolxes located at the Engineering Faculty of “Lucian Blaga” University from Sibiu. Because we did not have on this computer a version of MATLAB allowing to write parallel algorithms, we implemented the entire application in the C language using the MPI library.

Computer scienceControl theoryLinear systemParallel algorithmImperialist competitive algorithmMATLABcomputerFuzzy logicRunning timecomputer.programming_language
researchProduct

Exudates as Landmarks Identified through FCM Clustering in Retinal Images

2020

The aim of this work was to develop a method for the automatic identification of exudates, using an unsupervised clustering approach. The ability to classify each pixel as belonging to an eventual exudate, as a warning of disease, allows for the tracking of a patient&rsquo

Computer scienceDiabetic retinopathy; Exudates; Fuzzy C-means clustering; Morphological processing; Retinal landmarks; SegmentationFundus (eye)Fuzzy logiclcsh:TechnologyField (computer science)030218 nuclear medicine & medical imaginglcsh:Chemistry03 medical and health sciences0302 clinical medicineFcm clusteringfuzzy C-means clusteringretinal landmarksGeneral Materials ScienceSegmentationSensitivity (control systems)Cluster analysisInstrumentationlcsh:QH301-705.5Fluid Flow and Transfer ProcessesSettore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniPixelSettore INF/01 - Informaticabusiness.industrylcsh:TProcess Chemistry and TechnologyexudatessegmentationGeneral EngineeringPattern recognitionlcsh:QC1-999Computer Science Applicationsdiabetic retinopathyComputingMethodologies_PATTERNRECOGNITIONlcsh:Biology (General)lcsh:QD1-999lcsh:TA1-2040Artificial intelligencebusinesslcsh:Engineering (General). Civil engineering (General)030217 neurology & neurosurgerylcsh:Physicsmorphological processingApplied Sciences
researchProduct

Modelling and Control of a 2-DOF Robot Arm with Elastic Joints for Safe Human-Robot Interaction

2021

Collaborative robots (or cobots) are robots that can safely work together or interact with humans in a common space. They gradually become noticeable nowadays. Compliant actuators are very relevant for the design of cobots. This type of actuation scheme mitigates the damage caused by unexpected collision. Therefore, elastic joints are considered to outperform rigid joints when operating in a dynamic environment. However, most of the available elastic robots are relatively costly or difficult to construct. To give researchers a solution that is inexpensive, easily customisable, and fast to fabricate, a newly-designed low-cost, and open-source design of an elastic joint is presented in this w…

Computer scienceFuzzy logicHuman–robot interactionhuman-robot interactionArtificial IntelligenceControl theorycollaborative robotTJ1-1570Mechanical engineering and machineryVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550series elastic actuatorOriginal ResearchRobotics and AIroboticsbusiness.industryRoboticsQA75.5-76.95Computer Science Applicationsrobot armElectronic computers. Computer scienceControl systemRobotArtificial intelligencebusinessActuatorRobotic armFrontiers in Robotics and AI
researchProduct