Zobrazeno 1 - 10
of 48
pro vyhledávání: '"Kovács, Szilveszter"'
Autor:
Lone, Mohd Aaqib1 iitaaqib@uni-miskolc.hu, Kovács, Szilveszter1 szilveszter.kovacs@uni-miskolc.hu, Khanday, Owais Mujtaba1 aitowais@uni-miskolc.hu
Publikováno v:
Infocommunications Journal. Sep2024, Vol. 16 Issue 3, p43-56. 14p.
In most fuzzy control applications (applying classical fuzzy reasoning), the reasoning method requires a complete fuzzy rule-base, i.e all the possible observations must be covered by the antecedents of the fuzzy rules, which is not always available.
Externí odkaz:
http://arxiv.org/abs/1912.04999
Autor:
Alzubi, Maen, Kovacs, Szilveszter
Publikováno v:
International Journal on Advanced Science, Engineering and Information Technology 2019. Vol.9. No 5
The goal of this paper is twofold. Once to highlight some basic problematic properties of the KH Fuzzy Rule Interpolation through examples, secondly to set up a brief Benchmark set of Examples, which is suitable for testing other Fuzzy Rule Interpola
Externí odkaz:
http://arxiv.org/abs/1911.05041
Publikováno v:
Journal of Theoretical and Applied Information Technology 15th November 2018. Vol.96. No 21
FRI methods are less popular in the practical application domain. One possible reason is the missing common framework. There are many FRI methods developed independently, having different interpolation concepts and features. One trial for setting up
Externí odkaz:
http://arxiv.org/abs/1904.12178
Publikováno v:
Journal of Theoretical and Applied Information Technology, 31st August 2018. Vol.96. No 16
Fuzzy Rule Interpolation (FRI) methods can serve deducible (interpolated) conclusions even in case if some situations are not explicitly defined in a fuzzy rule based knowledge representation. This property can be beneficial in partial heuristically
Externí odkaz:
http://arxiv.org/abs/1904.08790
It is difficult to implement an efficient detection approach for Intrusion Detection Systems (IDS) and many factors contribute to this challenge. One such challenge concerns establishing adequate boundaries and finding a proper data source. Typical I
Externí odkaz:
http://arxiv.org/abs/1811.08954
Publikováno v:
Intelligent Systems and Informatics (SISY), 2017 IEEE 15th International Symposium
Intrusion detection system (IDS) is one of the implemented solutions against harmful attacks. Furthermore, attackers always keep changing their tools and techniques. However, implementing an accepted IDS system is also a challenging task. In this pap
Externí odkaz:
http://arxiv.org/abs/1801.02330
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
In IFAC PapersOnLine 2015 48(19):244-255