Academic literature on the topic 'P-Fuzzy Set'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'P-Fuzzy Set.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "P-Fuzzy Set"

1

Norahun, Wondwosen Zemene. "P-Fuzzy Ideals and P-Fuzzy Filters in P-Algebras." Advances in Fuzzy Systems 2021 (June 30, 2021): 1–9. http://dx.doi.org/10.1155/2021/4561087.

Full text
Abstract:
In this paper, we introduce the concept of p-fuzzy ideals and p-fuzzy filters in a p-algebra. We provide a set of equivalent conditions for a fuzzy ideal to be a p-fuzzy ideal and a p-algebra to be a Boolean algebra. It is proved that the class of p-fuzzy ideals forms a complete distributive lattice. Moreover, we show that there is an isomorphism between the class of p-fuzzy ideals and p-fuzzy filter.
APA, Harvard, Vancouver, ISO, and other styles
2

S., Subramanian, and Seethalakshmi E. "CERTAIN APPLICATIONS OF P- FUZZY SOFT STRUCTURES." International Journal of Applied and Advanced Scientific Research 2, no. 2 (2017): 294–98. https://doi.org/10.5281/zenodo.1115610.

Full text
Abstract:
In this paper, we investigate the notion of P-fuzzy soft intersection groups which is a generalization of that fuzzy soft groups is provided. By introducing the notion soft fuzzy cosets, soft fuzzy quotient groups based on P-fuzzy soft intersection ideals are established. Finally, isomorphism theorems of   P-fuzzy soft intersection groups related to invariant fuzzy soft sets are discussed.
APA, Harvard, Vancouver, ISO, and other styles
3

V., Ramadas, and Anitha B. "ON PSEUDO COMPATIBLE P-FUZZY SOFT RELATIONS." International Journal of Applied and Advanced Scientific Research 3, no. 1 (2017): 7–11. https://doi.org/10.5281/zenodo.1133940.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

MIRANDA, PEDRO, MICHEL GRABISCH, and PEDRO GIL. "p-SYMMETRIC FUZZY MEASURES." International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 10, supp01 (2002): 105–23. http://dx.doi.org/10.1142/s0218488502001867.

Full text
Abstract:
In this paper we propose a generalization of the concept of symmetric fuzzy measure based in a decomposition of the universal set in what we have called subsets of indifference. Some properties of these are studied, as well as their Choquet integral. Finally, a degree of interaction between the subsets of indifference is defined.
APA, Harvard, Vancouver, ISO, and other styles
5

V., Ramadas, and P. Antony Samy V. "P-FUZZY LEVEL SUBMODULES OF NEAR RINGS." International Journal of Applied and Advanced Scientific Research 3, no. 1 (2018): 84–88. https://doi.org/10.5281/zenodo.1165264.

Full text
Abstract:
A Technique of generating of P- fuzzy R- sub module by a given arbitrary P- fuzzy set is provided. It is shown that (i) The sum of two P- fuzzy R- sub module of a module M is the P- fuzzy R- sub module generated by their union and (ii) The set of all P- fuzzy sub module of a given module forms a complete lattice. Consequently it is established that the collection of all P- fuzzy R- sub module, having the same values at zero, of M of the lattice of P- fuzzy R- sub module of M. Interrelationship of these finite range sub lattices is established. Finally it is shown that the lattice of all P- fuzzy R- sub module of M can be embedded into a lattice of P- fuzzy R- sub module of M. Through out this paper , M denote as P- fuzzy R- sub module where R is the commutative near ring with unity. Characterization of P- fuzzy left R- sub modules with respect to t- norm are also given.
APA, Harvard, Vancouver, ISO, and other styles
6

Zhang, Qiuxiang, and Lili Wei. "Testing fuzzy hypotheses with crisp data based on p-value." Advances in Engineering Technology Research 7, no. 1 (2023): 171. http://dx.doi.org/10.56028/aetr.7.1.171.2023.

Full text
Abstract:
In this paper, we propose the p-value of fuzzy hypothesis by the concept of projection of the fuzzy relation, the small p-value gives evidence that research hypothesis is true. For the crisp hypothesis, we give the fuzzy set description of the test and prove that the rejection region of the test is the cut set of the fuzzy set. Finally, the p-values of fuzzy hypothesis are given by specific examples.
APA, Harvard, Vancouver, ISO, and other styles
7

Haso, Kardo Sleman, and Alias Barakat Khalaf. "On Cubic Fuzzy Groups and Cubic Fuzzy Normal Subgroups." Science Journal of University of Zakho 10, no. 3 (2022): 105–11. http://dx.doi.org/10.25271/sjuoz.2022.10.3.907.

Full text
Abstract:
In this paper, the notions of cubic fuzzy groups and cubic fuzzy normal subgroups are introduced. The internal, external of cubic sets, (P-,R-) order, (P-,R-) intersection and (P-,R-) union of cubic fuzzy groups are investigated and some related properties were obtained. It is proved that a cubic fuzzy group which is both (internal, external) cubic set. Also we provide condition on cubic fuzzy group to be an internal cubic set. We show that (P-,R-) intersection and (P-,R-) union of cubic fuzzy groups are also cubic fuzzy groups. Also the (P-,R-) intersection, (P-,R-) union of cubic fuzzy normal subgroups are proved to be cubic fuzzy normal subgroup.
APA, Harvard, Vancouver, ISO, and other styles
8

Daraby, Bayaz, та S. B. Nimse. "On fuzzy generalized α-closed set and its applications". Filomat 21, № 2 (2007): 99–108. http://dx.doi.org/10.2298/fil0702099d.

Full text
Abstract:
In this paper, we define and study fuzzy generalized ?-closed sets and r-open sets of a given L-fuzzy topological space and prime element r ? P(L) and coprime element a ? M(L). The concept of L-fuzzy r-open sets was introduced in [10], and it was proved that all r-open sets for L-fuzzy topological space form a new L-fuzzy topology, which is called stratiform L-fuzzy topology. Making use of the fuzzy generalized ?-closed sets, fuzzy generalized ?-continuous map is presented. .
APA, Harvard, Vancouver, ISO, and other styles
9

Hameed, M. Shazib, Zaheer Ahmad, Salman Mukhtar та Asad Ullah. "Some results on χ-single valued neutrosophic subgroups". Indonesian Journal of Electrical Engineering and Computer Science 23, № 3 (2021): 1583. http://dx.doi.org/10.11591/ijeecs.v23.i3.pp1583-1589.

Full text
Abstract:
<p>In this study, we develop a novel structure χ-single valued neutrosophic set, which is a generalization of the intuitionistic set, inconsistent intuitionistic fuzzy set, Pythagorean fuzzy set, spherical fuzzy set, paraconsistent set, etc. Fuzzy subgroups play a vital role in vagueness structure, it differ from regular subgroups in that it is impossible to determine which group elements belong and which do not. In this paper, we investigate the concept of a χ-single valued neutrosophic set and χ-single valued neutrosophic subgroups. We explore the idea of χ-single valued neutrosophic set on fuzzy subgroups and several characterizations related to χ-single valued neutrosophic subgroups are suggested.</p>
APA, Harvard, Vancouver, ISO, and other styles
10

Mehmood, Faisal, Tahir Mahmood, and Qaisar Khan. "Cubic Hesitant Fuzzy Sets and Their Applications to Multi Criteria Decision Making." International Journal of Algebra and Statistics 5, no. 1 (2016): 19. http://dx.doi.org/10.20454/ijas.2016.1055.

Full text
Abstract:
In this paper we introduced cubic hesitant fuzzy set and defined internal (external) cubic hesitant fuzzy set, P(R)-union and P(R)-intersection of cubic hesitant fuzzy sets. Furthermore we defined P(R)-addition and P(R)-multiplication of cubic hesitant fuzzy sets. By using the defined operations of cubic hesitant fuzzy sets we proved their different results. We also defined R-weighted averaging and R-weighted geometric operators for cubic hesitant fuzzy sets and practiced it in multi-criteria decision making problem.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "P-Fuzzy Set"

1

Siciliano, Giorgia Giusi. "Managing cyber risk in organizations and supply chains." Doctoral thesis, 2018. http://hdl.handle.net/11562/978872.

Full text
Abstract:
In the Industry 4.0, modern organizations are characterized by an extensive digitalization and use of Information Technology (IT). Even though there are significant advantages in such a technological progress, a noteworthy drawback is represented by cyber risks, whose occurrence dramatically increased over the last years. The information technology literature has shown great interested toward the topic, identifying mainly technical solutions to face these emerging risks. Nonetheless, cyber risks cause business disruption and damages to tangible and intangible corporate assets and require a major integration between technical solutions and a strategic management. Recently, the risk management domain and the supply chain literature have provided studies about how an effective cyber risk management process should be planned, to improve organizational resilience and to prevent financial drawbacks. However, the aforementioned studies are mainly theoretical and there is still a significant lack of empirical studies in the management literature, measuring the potential effects of cyber threats within single companies, and along networks of relationships, in a wider supply chain perspective. The present thesis aims at filling some of these gaps through three empirical essays. The first study has implemented a Grounded Theory approach to develop an interview targeting 15 European organizations. Afterwards, the fuzzy set Qualitative Comparative Analysis (fsQCA) has been performed, in order to ascertain how managers perceive cyber risks. Results contradict studies that focus merely on technical solution, and confirm the dynamic capability literature, which highlights the relevance of a major integration among relational, organizational, and technical capabilities when dealing with technological issues. Moreover, the study proposes a managerial framework that draws on the dynamic capabilities view, in order to consider the complexity and dynamism of IT and cyber risks. The framework proposes to implement both technical (e.g. software, insurance, investments in IT assets) and organizational (e.g. team work, human IT resources) capabilities to protect the capability of the company to create value. The second essay extends the investigation of the drawbacks of cyber risks to supply chains. The study conducts a Grounded Theory empirical investigation toward several European organizations that rely on security and risk management standards in order to choose the drivers of systematic IT and cyber risk management (risk assessment, risk prevention, risk mitigation, risk compliance, and risk governance). The evidence gleaned from the interviews have highlighted that investments in supply chain mitigation strategies are scant, resulting in supply chains that perform like they had much higher risk appetite than managers declared. Moreover, it has emerged a general lack of awareness regarding the effects that IT and cyber risks may have on supply operations and relationships. Thus, a framework drawing on the supply chain risk management is proposed, offering a holistic risk management process, in which strategies, processes, technologies, and human resources should be aligned in coherence with the governance of each organization and of the supply chain as a whole. The final result should be a supply chain where the actors share more information throughout the whole process, which guarantees strategic benefits, reputation protection, and business continuity. The third essay draws on the Situational Crisis Communication Theory (SCCT) to ascertain whether and how different types of cyber breaches differently affect the corporate reputation, defined as a multidimensional construct in which perceptions of customers, suppliers, (potential) employees, investors and local communities converge. Data breaches have been categorized into three groups by the literature, meaning intentional and internal to the organization (e.g., malicious employees stealing customers’ data), unintentional and internal to the organization (e.g., incorrect security settings that expose private information), and intentional and external to the organization (e.g., ransomware infecting companies’ software). However, this is among the first study to analyse the different reputational drawbacks these types may cause. Moreover, the study considers that, in the industry 4.0 era, social media analysis may be of paramount importance for organizations to understand the market. In fact, user-generated content (UGC), meaning the content created by users, might help in understanding which dimensions of the corporate have been more attacked after a data breach. In this context, the study implements the Latent Dirichlet Allocation (LDA) automated method, a base model in the family of “topic models”, to extract the reputational dimensions expressed in UGC of a sample of 35 organizations in nine industries that had a data breach incident between 2013 and 2016. The results reveal that in general, after a data breach, three dimensions—perceived quality, customer orientation and corporate performance— are a subject of debate for users. However, if the data breach was intentional ad malicious, users focused more on the role of firms’ human resources management, whereas if users did not identify a responsible, users focused more on privacy drawbacks. The study complements crisis communication research by categorizing, in a data breach context, stakeholders’ perceptions of a crisis. In addition, the research is informative for risk management literature and reputation research, analysing corporate reputation dimensions in a data breach crisis setting.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "P-Fuzzy Set"

1

Kreinovich, Vladik. "Towards Faster Estimation of Statistics and ODEs Under Interval, P-Box, and Fuzzy Uncertainty: From Interval Computations to Rough Set-Related Computations." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-21881-1_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Jana, Chiranjibe, and Karping Shum. "Lukaswize Triple-Valued Intuitionistic Fuzzy BCK/BCI-Subalgebras." In Handbook of Research on Emerging Applications of Fuzzy Algebraic Structures. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-0190-0.ch012.

Full text
Abstract:
The authors studied the notion of (α,β)-intuitionistic fuzzy BCK/BCI-subalgebras by applying the Lukasiewicz 3-valued implication operator, where α,β∈{∈,q,∈∧q,∈∨q} for α≠∈∧q. In this chapter, an intuitionistic fuzzy set A is an (∈,∈) (or (∈∧q,∈) or (∈,∈∨q))-intuitionistic fuzzy subalgebras if and only if for any p∈(0,1] (or p∈(0,0.5] or p∈(0.5,1]), then Ap is a fuzzy subalgebras of X respectively. Next, the authors defined intuitionistic fuzzy subalgebras with thresholds (s,t) and then provided intuitionistic fuzzy subalgebras with thresholds (0,1) (or (0,0.5) or (0.5,1)) by the concept of quasi-coincidence of fuzzy point respectively. Also, A is an intuitionistic fuzzy subalgebras with thresholds (s,t) if and only if for any p∈(s,t], then cut set A_p is a fuzzy subalgebras.
APA, Harvard, Vancouver, ISO, and other styles
3

Syropoulos, Apostolos. "Fuzzy Multisets and Fuzzy Computing." In Handbook of Research on Generalized and Hybrid Set Structures and Applications for Soft Computing. IGI Global, 2016. http://dx.doi.org/10.4018/978-1-4666-9798-0.ch002.

Full text
Abstract:
Multisets and Multirelations are extensions of ordinary sets and relations while fuzzy multisets and fuzzy multirelations are fuzzy extensions of these concept. Although many generalizations tend to be meaningless, these are quite useful as one can model things we see every day. In addition, these structures have found uses in the theory of computation. In particular, fuzzy multisets are used in fuzzy models of computation, that is, models of computation where vagueness is manifested by fuzzy sets play central role. These fuzzy models of computation include fuzzy P systems, the fuzzy chemical abstract machine, and fuzzy Petri nets.
APA, Harvard, Vancouver, ISO, and other styles
4

Calvo, Clara, Carlos Ivorra, and Vicente Liern. "Fuzzy Techniques for Improving Satisfaction in Economic Decisions." In Exploring Innovative and Successful Applications of Soft Computing. IGI Global, 2014. http://dx.doi.org/10.4018/978-1-4666-4785-5.ch002.

Full text
Abstract:
The authors use fuzzy set theory to improve classical decision-making problems by incorporating the inherent vagueness in decision-makers’ preferences into the model. They specifically study two representative models: the p-median problem and the portfolio selection problem. The first one is a location problem, which on the one hand fits many real world management situations and on the other hand is suitable for a theoretical analysis of the techniques. The version of the portfolio selection problem presented here is a harder problem, which allows the authors to show the scope of their methods. Some numerical examples are provided to illustrate how fuzzy optimal solutions improve classical ones. Finally, the authors present some results about how fuzzy solutions depend on the membership functions of fuzzy parameters.
APA, Harvard, Vancouver, ISO, and other styles
5

PhaniRaghava, B., and S. Ashok Kumar. "An Improved Chatbot for Predicting Disease and Medicines Using Natural Language Processing with Fuzzy Logic." In Advances in Parallel Computing Algorithms, Tools and Paradigms. IOS Press, 2022. http://dx.doi.org/10.3233/apc220035.

Full text
Abstract:
The aim is to create an artificial conversation entity(chatbot) using python to predict disease and medicine for healthcare treatments. Two algorithms fuzzy support vector machine algorithms are compared with Decision tree algorithm sample size taken 28. G power of 81% and sample size is calculated using the G power tool. Performances of the score model validated test set accuracy with 95% confidence interval for fuzzy support vector machine algorithm with different sub-samples has 91.60% accuracy comparing with Decision tree which has 87.90% accuracy.Independent Sample T-test a significance difference in accuracy and loss is observed p<0.005.From the results it is concluded that proposed algorithm Fuzzy support vector machine will produce better results than the existing algorithm.
APA, Harvard, Vancouver, ISO, and other styles
6

Tambouratzis, Tatiana, John Giannatsis, Andreas Kyriazis, and Panayiotis Siotropos. "Applying the Computational Intelligence Paradigm to Nuclear Power Plant Operation." In Research Anthology on Artificial Intelligence Applications in Security. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-7705-9.ch068.

Full text
Abstract:
In the guise of artificial neural networks (ANNs), genetic/evolutionary computation algorithms (GAs/ECAs), fuzzy logic (FL) inference systems (FLIS) and their variants as well as combinations, the computational intelligence (CI) paradigm has been applied to nuclear energy (NE) since the late 1980s as a set of efficient and accurate, non-parametric, robust-to-noise as well as to-missing-information, non-invasive on-line tools for monitoring, predicting and overall controlling nuclear (power) plant (N(P)P) operation. Since then, the resulting CI-based implementations have afforded increasingly reliable as well as robust performance, demonstrating their potential as either stand-alone tools, or - whenever more advantageous - combined with each other as well as with traditional signal processing techniques. The present review is focused upon the application of CI methodologies to the - generally acknowledged as - key-issues of N(P)P operation, namely: control, diagnostics and fault detection, monitoring, N(P)P operations, proliferation and resistance applications, sensor and component reliability, spectroscopy, fusion supporting operations, as these have been reported in the relevant primary literature for the period 1990-2015. At one end, 1990 constitutes the beginning of the actual implementation of innovative, and – at the same time – robust as well as practical, directly implementable in H/W, CI-based solutions/tools which have proved to be significantly superior to the traditional as well as the artificial-intelligence-(AI)derived methodologies in terms of operation efficiency as well as robustness-to-noise and/or otherwise distorted/missing information. At the other end, 2015 marks a paradigm shift in terms of the emergent (and, swiftly, ubiquitous) use of deep neural networks (DNNs) over existing ANN architectures and FL problem representations, thus dovetailing the increasing requirements of the era of complex - as well as Big - Data and forever changing the means of ANN/neuro-fuzzy construction and application/performance. By exposing the prevalent CI-based tools for each key-issue of N(P)P operation, overall as well as over time for the given 1990-2015 period, the applicability and optimal use of CI tools to NE problems is revealed, thus providing the necessary know-how concerning crucial decisions that need to be made for the increasingly efficient as well as safe exploitation of NE.
APA, Harvard, Vancouver, ISO, and other styles
7

Tambouratzis, Tatiana, John Giannatsis, Andreas Kyriazis, and Panayiotis Siotropos. "Applying the Computational Intelligence Paradigm to Nuclear Power Plant Operation." In Research Anthology on Multi-Industry Uses of Genetic Programming and Algorithms. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-8048-6.ch065.

Full text
Abstract:
In the guise of artificial neural networks (ANNs), genetic/evolutionary computation algorithms (GAs/ECAs), fuzzy logic (FL) inference systems (FLIS) and their variants as well as combinations, the computational intelligence (CI) paradigm has been applied to nuclear energy (NE) since the late 1980s as a set of efficient and accurate, non-parametric, robust-to-noise as well as to-missing-information, non-invasive on-line tools for monitoring, predicting and overall controlling nuclear (power) plant (N(P)P) operation. Since then, the resulting CI-based implementations have afforded increasingly reliable as well as robust performance, demonstrating their potential as either stand-alone tools, or - whenever more advantageous - combined with each other as well as with traditional signal processing techniques. The present review is focused upon the application of CI methodologies to the - generally acknowledged as - key-issues of N(P)P operation, namely: control, diagnostics and fault detection, monitoring, N(P)P operations, proliferation and resistance applications, sensor and component reliability, spectroscopy, fusion supporting operations, as these have been reported in the relevant primary literature for the period 1990-2015. At one end, 1990 constitutes the beginning of the actual implementation of innovative, and – at the same time – robust as well as practical, directly implementable in H/W, CI-based solutions/tools which have proved to be significantly superior to the traditional as well as the artificial-intelligence-(AI)derived methodologies in terms of operation efficiency as well as robustness-to-noise and/or otherwise distorted/missing information. At the other end, 2015 marks a paradigm shift in terms of the emergent (and, swiftly, ubiquitous) use of deep neural networks (DNNs) over existing ANN architectures and FL problem representations, thus dovetailing the increasing requirements of the era of complex - as well as Big - Data and forever changing the means of ANN/neuro-fuzzy construction and application/performance. By exposing the prevalent CI-based tools for each key-issue of N(P)P operation, overall as well as over time for the given 1990-2015 period, the applicability and optimal use of CI tools to NE problems is revealed, thus providing the necessary know-how concerning crucial decisions that need to be made for the increasingly efficient as well as safe exploitation of NE.
APA, Harvard, Vancouver, ISO, and other styles
8

Tambouratzis, Tatiana, John Giannatsis, Andreas Kyriazis, and Panayiotis Siotropos. "Applying the Computational Intelligence Paradigm to Nuclear Power Plant Operation." In Research Anthology on Artificial Intelligence Applications in Security. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-7705-9.ch068.

Full text
Abstract:
In the guise of artificial neural networks (ANNs), genetic/evolutionary computation algorithms (GAs/ECAs), fuzzy logic (FL) inference systems (FLIS) and their variants as well as combinations, the computational intelligence (CI) paradigm has been applied to nuclear energy (NE) since the late 1980s as a set of efficient and accurate, non-parametric, robust-to-noise as well as to-missing-information, non-invasive on-line tools for monitoring, predicting and overall controlling nuclear (power) plant (N(P)P) operation. Since then, the resulting CI-based implementations have afforded increasingly reliable as well as robust performance, demonstrating their potential as either stand-alone tools, or - whenever more advantageous - combined with each other as well as with traditional signal processing techniques. The present review is focused upon the application of CI methodologies to the - generally acknowledged as - key-issues of N(P)P operation, namely: control, diagnostics and fault detection, monitoring, N(P)P operations, proliferation and resistance applications, sensor and component reliability, spectroscopy, fusion supporting operations, as these have been reported in the relevant primary literature for the period 1990-2015. At one end, 1990 constitutes the beginning of the actual implementation of innovative, and – at the same time – robust as well as practical, directly implementable in H/W, CI-based solutions/tools which have proved to be significantly superior to the traditional as well as the artificial-intelligence-(AI)derived methodologies in terms of operation efficiency as well as robustness-to-noise and/or otherwise distorted/missing information. At the other end, 2015 marks a paradigm shift in terms of the emergent (and, swiftly, ubiquitous) use of deep neural networks (DNNs) over existing ANN architectures and FL problem representations, thus dovetailing the increasing requirements of the era of complex - as well as Big - Data and forever changing the means of ANN/neuro-fuzzy construction and application/performance. By exposing the prevalent CI-based tools for each key-issue of N(P)P operation, overall as well as over time for the given 1990-2015 period, the applicability and optimal use of CI tools to NE problems is revealed, thus providing the necessary know-how concerning crucial decisions that need to be made for the increasingly efficient as well as safe exploitation of NE.
APA, Harvard, Vancouver, ISO, and other styles
9

Ries, Jana, Patrick Beullens, and Yang Wang. "Instance-Specific Parameter Tuning for Meta-Heuristics." In Meta-Heuristics Optimization Algorithms in Engineering, Business, Economics, and Finance. IGI Global, 2013. http://dx.doi.org/10.4018/978-1-4666-2086-5.ch005.

Full text
Abstract:
Meta-heuristics are of significant interest to decision-makers due to the capability of finding good solutions for complex problems within a reasonable amount of computational time. These methods are further known to perform according to how their algorithm-specific parameters are set. As most practitioners aim for an off-the-shelf approach when using meta-heuristics, they require an easy applicable strategy to calibrate its parameters and use it. This chapter addresses the so-called Parameter Setting Problem (PSP) and presents new developments for the Instance-specific Parameter Tuning Strategy (IPTS). The IPTS presented only requires the end user to specify its preference regarding the trade-off between running time and solution quality by setting one parameter p (0 = p =1), and automatically returns a good set of algorithm-specific parameter values for each individual instance based on the calculation of a set of problem instance characteristics. The IPTS does not require any modification of the particular meta-heuristic being used. It aims to combine advantages of the Parameter Tuning Strategy (PTS) and the Parameter Control Strategy (PCS), the two major approaches to the PSP. The chapter outlines the advantages of an IPTS and shows in more detail two ways in which an IPTS can be designed. The first design approach requires expert-based knowledge of the meta-heuristic’s performance in relation to the problem at hand. The second, automated approach does not require explicit knowledge of the meta-heuristic used. Both designs use a fuzzy logic system to obtain parameter values. Results are presented for an IPTS designed to solve instances of the Travelling Salesman Problem (TSP) with the meta-heuristic Guided Local Search (GLS).
APA, Harvard, Vancouver, ISO, and other styles
10

Kumar, Manoj. "P-F Fuzzy Rings and Normal Fuzzy Ring." In Emerging Research on Applied Fuzzy Sets and Intuitionistic Fuzzy Matrices. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-0914-1.ch004.

Full text
Abstract:
In 1965, Zadeh introduced the concept of fuzzy subset. Since that time many papers were introduced in different mathematical scopes of theoretical and practical applications. In 1982, Liuformulated the term of fuzzy ring and fuzzy ideal of a ring R. In 2004, Hadi and Abou-Draeb, introduced and studied P-F fuzzy rings and normal fuzzy rings and now we are complete it. In this chapter, the concepts P-F fuzzy rings and normal fuzzy rings have been investigated. Several basic results related to these concepts have given and studied. The relationship between them has also been given. Moreover, some properties of t-pure fuzzy ideal of a fuzzy ring have been given which need it later.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "P-Fuzzy Set"

1

Murat, Alper, Ratna Babu Chinnam, Satyendra Rana, et al. "Combat Vehicle Program Management and Product Development Resilience through Set-Based Design." In 2024 NDIA Michigan Chapter Ground Vehicle Systems Engineering and Technology Symposium. National Defense Industrial Association, 2024. http://dx.doi.org/10.4271/2024-01-3963.

Full text
Abstract:
<title>ABSTRACT</title> <p>Product Development (PD) remains a highly uncertain process for both commercial and DoD programs. The presence of multiple stakeholders (e.g., DoD and allied agencies, soldiers/users, PEO, contractors, manufacturing, service, logistics) with varying requirements, preferences, constraints, and evolving priorities make this particularly challenging for the DoD. These risks are well recognized by agencies, and it is widely understood that acquisition is about risk management and not certainties. However, almost all the DoD acquisition processes still require critical reviews, and most importantly, structured decision support for the fuzzy front-end of the acquisition process. What is lacking, are effective decision support tools that explicitly recognize the sequential milestone structure embedded with multi-stakeholder decision making in all acquisition programs. We describe the Resilient Program Management & Development (RPMD) framework to support complex decision making with set-based design approach.</p> <p><bold>Citation:</bold> A. Murat, R.B. Chinnam, S. Rana, S. Rapp, G. Hartman, D. Lamb, and R. Agusti, “Combat Vehicle Program Management and Product Development Resilience through Set-Based Design,” In <italic>Proceedings of the Ground Vehicle Systems Engineering and Technology Symposium</italic> (GVSETS), NDIA, Novi, MI, Aug. 16-18, 2022.</p>
APA, Harvard, Vancouver, ISO, and other styles
2

Fung, E. H. K., H. F. Yu, K. H. Suen, and A. T. Leung. "Anti-Swing Trajectory Control of an Overhead Crane." In ASME 2011 International Mechanical Engineering Congress and Exposition. ASMEDC, 2011. http://dx.doi.org/10.1115/imece2011-63527.

Full text
Abstract:
Imprecise positioning and swing of load of overhead crane cause prolonged transportation time. Some researchers tried to achieve suppression of swing angle and fast transfer simultaneously. But, the hoisting motion is usually ignored which can cause greater swing angle. Hence, a physical 2-DOF overhead crane model which consists of horizontal motion and hoisting motion is set up for this study. The total kinetic energy and the total potential energy are derived to obtain dynamic equations of motion by using Lagrangian method. Secondly, fuzzy logic control (FLC) has been adopted to control positioning of horizontal and hoisting motion and to suppress swing angle during transportation. Moreover, to minimize total transportation time, proportional (P) controller is added to the system forming the switching P+FLC controller. Finally, the proposed methods are evaluated by simulations and experiments. The overall results show that fuzzy logic controller combined with P controller (P+FLC) can effectively reduce the transportation time with a little increase in the swing angle.
APA, Harvard, Vancouver, ISO, and other styles
3

Geng, Xiuli, Xuening Chu, Deyi Xue, and Zaifang Zhang. "Prioritizing Engineering Characteristics of Product-Service System Using Analytic Network Process and Data Envelopment Analysis." In ASME 2010 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2010. http://dx.doi.org/10.1115/detc2010-28382.

Full text
Abstract:
Product-service system (PSS) approach has emerged as a competitive strategy to impel manufacturers to offer a set of products and services as a whole. A new three-domain PSS conceptual design framework supporting engineering design methodology is proposed in this research. Identification of the critical parameters in these domains plays an important role. Engineering characteristics (ECs) in the functional domain, which include product-related ECs (P-ECs) and service-related ECs (S-ECs), are identified by translating customer requirements (CRs) in the customer domain. Quality function deployment (QFD) is used to implement this translation process. Prioritizing ECs is a crucial issue in achieving the optimal PSS planning. First, to consider complex dependency relationships between and within CRs, P-ECs and S-ECs, the analytic network process (ANP) approach is integrated in QFD to determine the initial importance weights of ECs. Second, the data envelopment analysis (DEA) approach is applied to adjust the initial weights of ECs considering requirements of the manufacturers. In order to deal with the vagueness, uncertainty and diversity in decision-making, the fuzzy set theory and group decision-making technique are used in the supermatrix approach of ANP in the first phase. A case study is carried out to demonstrate the effectiveness of the developed prioritizing approach for ECs in PSS conceptual design.
APA, Harvard, Vancouver, ISO, and other styles
4

Zordan, Tobia. "Sustainable Conceptual Design of Structures between Form Finding and Free Form Design: The Ruled Freedom." In IABSE Congress, Seoul 2012: Innovative Infrastructures – Towards Human Urbanism. International Association for Bridge and Structural Engineering (IABSE), 2012. http://dx.doi.org/10.2749/seoul.2012.0006.

Full text
Abstract:
<p>While the definition of “Sustainability” is a rather determined concept for many engineering disciplines, the way we have, as civil engineers, to effectively incorporate sustainability issues into Structural Design is still a fuzzy issue, even if many green rating systems cradle-to-grave are proposed in literature. Sustainability deals with the evaluation of uncertainties and with optimization procedures helping the Engineer to address the choice among a set of possible design alternatives.</p><p>Conceptual design represents a fundamental aspect in all design phases ranging, in its widest meaning, from the first ideas till the definition of the details and involving even aspects related to the life-cycle of the structure, as for instance, the long-term maintenance strategies.</p><p>In an age where digital tools are giving the Designers the possibility of expressing themselves shaping structures whose fundamentals can be completely separated from the principles of Structural Engineering, with the consequent dramatic increase of the uncertainties related to the long-term response of the structure. The lesson learnt from the Masters of Structural Engineering of last Century, with their utmost attention in the definition of the most suitable shape able to fit the structural requirements under given boundary conditions, seems to acquire the greatest importance within a sustainable process where the limitation of uncertainties appears to meaningfully contribute to the reliable quantification of the life cycle costs and resource consumption.</p><p>If we can share the statement, which is probably irrefutable, that the overall development ratio of the increasing world population and the increasing search for wealth is presently incompatible with the available resources, the contribution of Structural Engineering in limiting the uncertainties related to the life-cycle demand of structures and infrastructures can be meaningful.</p><p>There is a “Ruled Freedom” in achieving a piece of Structural Art through a sustainable design that must consider usual issues like safety and serviceability as well as other key features which are sometimes not taken in due consideration such as structural efficiency, aesthetics, adaptability, durability, life-cycle costs and minimal maintenance, risk reduction and value protection. A number of examples related to the mentioned aspects will be supplied in the following.</p>
APA, Harvard, Vancouver, ISO, and other styles
5

Auchariyamet, Suwit, and Nattachote Rugthaicharoencheep. "Solving Multiobjective volt/VAr Control Problem in Distribution Systems by Fuzzy Set Theory and Particle Swarm Optimization." In Intelligent Systems and Control. ACTAPRESS, 2011. http://dx.doi.org/10.2316/p.2011.744-016.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Qi Chen, Wei Li, Xiaohui Wang, Yan Li, Shuo Li, and Bin Xian. "Maintaining constant towing tension between cable ship and burying system under sea waves by hybrid FUZZY P + ID controller." In 2015 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS). IEEE, 2015. http://dx.doi.org/10.1109/iros.2015.7353589.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Bychenko, Artem, Maksym Udovenko, Vitalii Nuianzin, and Andriy Berezovskyi. "Remote Visual Information System for Identification of Dangerous Substances Using Unmanned Aircrafts." In International Scientific Applied Conference "Problems of Emergency Situations". Trans Tech Publications Ltd, 2022. http://dx.doi.org/10.4028/p-i5mfl9.

Full text
Abstract:
Development of a functional model of the process of creating a knowledge base on the recognition of objects and actions of the enemy on the basis of neural networks and fuzzy logic. The aim of the work is to develop a set of software and hardware designed for remote identification of hazardous substances by machine visual recognition of information signs of dangerous goods with the output of relevant information to the means of visual display (interface). Recommendations concerning providing UAVs with the necessary technical means to monitor the zone of emergencies are analyzed. The recommendations of the organization of radio communication between the UAV and the operator depending on the range of the UAV departure, terrain conditions etc are analyzed and given. The structural scheme of the complex of remote recognition of HC in the form of blocks, units and software and hardware is developed. As a result of the analysis of programming systems, it was found that Python programming language is the best choice to ensure the full operation of the software due to the built-in capabilities and the involvement of third-party frameworks. A database containing information on more than 3.000 HCs with detailed recommendations for emergency response is developed. The hardware and software complex for remote identification of dangerous substances by machine visual recognition of information signs of dangerous goods by UAV, consisting of unmanned aerial platform with photo-video recording means, data transmission system to ground control station, PC for processing results and related software are substantiated and developed. A test of the UAV's capabilities in recognizing danger signs with UN numbers in different lighting conditions was tested. In all cases, the HC was accurately identified. The ideas and methods proposed in this article will allow to create cheap and simple tools for rescue units of Ukraine, which deal with the consequences of emergencies related to the leakage of HCs.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography