In this paper, Cauchy criterion, the necessary and sufficient conditions for Henstock integrability of fuzzy number-valued functions defined on a compact interval in the real line is presented. The results can be used...
详细信息
ISBN:
(纸本)9781479930814
In this paper, Cauchy criterion, the necessary and sufficient conditions for Henstock integrability of fuzzy number-valued functions defined on a compact interval in the real line is presented. The results can be used to characterize the integrability of a fuzzy number valued function without calculation the value of the integral. In addition, the notion, the elementary properties and the relation of R and R* integrals of fuzzy number-valued function defined on a compact interval in the real line are also presented.
This study is concerned with a fundamental issue of time series representation for modeling and prediction with Fuzzy Cognitive Maps. We introduce two distinct time series representation schemes for Fuzzy Cognitive Ma...
This study is concerned with a fundamental issue of time series representation for modeling and prediction with Fuzzy Cognitive Maps. We introduce two distinct time series representation schemes for Fuzzy Cognitive Map design. First method is based on time series amplitude, amplitude change, and change of amplitude change (dynamics perspective). Second scheme is based on three consecutive historical observations: present value, past value and before past value (history perspective). Introduced procedures are experimentally verified and compared on several synthetic and real-world time series of various characteristics. The history-oriented time series representation turned out to be more advantageous. Quality of FCM-based time series models and one-step-ahead predictions were measured in terms of Mean Squared Error. We have shown that models designed with history-oriented time series representation generally require less FCM nodes to be of comparable quality as models built on dynamics-oriented time series representation. As a result, with the history-oriented time series representation scheme we are able to construct simpler and therefore better models.
In the past decade, the accelerometer has been used to enable activity recognition in different application domains. In recent years, the accelerometer in a smartphone is also being applied to provide unobtrusive move...
详细信息
The paper is focused on man-machine communication, which is perceived in terms of data exchange. Understanding of data being exchanged is the fundamental property of intelligent communication. The main objective of th...
The paper is focused on man-machine communication, which is perceived in terms of data exchange. Understanding of data being exchanged is the fundamental property of intelligent communication. The main objective of this paper is to introduce the paradigm of intelligent data understanding. The paradigm stems from syntactic and semantic characterization of data and is soundly based on the paradigm of granular structuring of data and computation. The paper does not introduce a formal theory of intelligent data understanding. Instead this paradigm as well as notions of granularity, semantics and syntax are cast on the domain of music information. The domain immersion is forced by heavy dependence of details of the paradigm of automatic data understanding on application in a given domain.
A reverse direction transmission and block acknowledgement are the main features to improve the performance of MAC layer based on next generation wireless LANs. When the data send it in reverse direction from side A t...
详细信息
In cognitive radio networks (CRNs), unlicensed users (secondary users - SUs) lease free spectrum with quality of service (QoS) guarantees from a multitude of spectrum owners (primary users, PUs) based on service level...
详细信息
Mobile ad hoc networks have a wide range of application usage today, due to its great services, easy installation and configuration, and its other distinctive characteristics. In contrast, the attackers also have deve...
详细信息
Mobile ad hoc networks have a wide range of application usage today, due to its great services, easy installation and configuration, and its other distinctive characteristics. In contrast, the attackers also have developed their own way to disrupt MANET normal operations. Many techniques, approaches and protocols have proposed to support Mobile Ad hoc Network (MANET) survivability in adversarial environment. Survivable of routing operations is the key aspects of the challenge in MANETs because most of destructive attacks classified as active attacks and all are intent to attack MANET routing operation to prevent it from providing it services in a right time. In this paper, we will discuss the most effective and practical initiatives have designed to keep MANET survive in an adversarial environment and how it supporting MANET availability.
Telemedicine is not yet all worked out where it can be utilized constantly or flexibly. But, it has enormous potential to be a tremendous asset to the world and all its civilizations. Telemedicine has had a positive i...
详细信息
Education plays a key role in providing individuals with the knowledge, skills and competences needed to participate effectively in society and in the economy. In 21st century ICT roadmap, ICT (information, communicat...
详细信息
Education plays a key role in providing individuals with the knowledge, skills and competences needed to participate effectively in society and in the economy. In 21st century ICT roadmap, ICT (information, communication and technology) has become one of the fundamental skills that higher education institution (HEI) students need to acquire and grasp in preparation for future employment. This study has two folds (i) to discover the relationship between human capital development, economic growth, education and employment;and (ii) to identify the factors affecting the acquisition of ICT skill using UTAUT model. Exhaustive literature reviews and studies were done on numerous reports that followed with critical analysis, categorising and tabulation. The use of UTAUT model provides rich understanding on factors affecting the acquisition of ICT skill by the students in higher learning institutions.
In this paper, we propose a new method able to correct errors related to the recognition of invoice type documents. We rely on automated document readers that can read and recognize the various, relevant information i...
详细信息
In this paper, we propose a new method able to correct errors related to the recognition of invoice type documents. We rely on automated document readers that can read and recognize the various, relevant information in a scanned document. The process consists of digitizing a large volume of documents, and passes them through automatic documents readers, then carries out the correction of the different errors. The final objective is to find an electronic document reflecting all information included in the background document. The main goal is the generation of organized electronic documents, like a data basis or files XML. To achieve this issue we develop a new parser which is applicable to a various kind of documents, especially the corrections for the recognition errors by using the fuzzy closed concept, this formalism allow the detection of the set of rules to be applied in a set of documents.
暂无评论