A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
A fuzzy logic approach to analyzing gene expression data
2000
Physiological Genomics
A fuzzy logic approach to analyzing gene expression data. Physiol Genomics 3: 9-15, 2000.-We have developed a novel algorithm for analyzing gene expression data. ...
By using a fuzzy logic approach to analyzing expression profile data, it is possible to confirm the mechanism of a known target. ...
doi:10.1152/physiolgenomics.2000.3.1.9
pmid:11015595
fatcat:rslowiqhfzbkvlig5qky52lrne
A fuzzy approach to ecological modelling and data analysis
[chapter]
2009
Handbook of Ecological Modelling and Informatics
A fuzzy clustering approach was chosen to handle the uncertainty of the input data. ...
Hybrid approaches to data analysis and ecological modelling There are also a number of hybrid approaches, which result from linking the fuzzy approach with other techniques, e.g.: fuzzy approach with neural ...
doi:10.2495/978-1-84564-207-5/08
fatcat:kkjcrbxwkvcbdie2y4xur7g3vq
Optimal Fall Protection System Selection Using a Fuzzy Multi-Criteria Decision-Making Approach for Construction Sites
2021
Applied Sciences
This study develops a fuzzy multi-criteria decision-making model integrating analytical hierarchy process, fuzzy set theory and Technique for Order Preference by Similarity to Ideal Solution approach to ...
Construction falls are a leading cause of fatalities in almost every construction industry around the globe, and fall protection systems are the key measures to ensure the safety of labor crews. ...
Data Availability Statement: The data presented in this study are available on request from the corresponding author.
Conflicts of Interest: The authors declare no conflict of interest. ...
doi:10.3390/app11115296
fatcat:2jald35ynvbzhoivpufxapvygu
A Novel Fuzzy Search Approach over Encrypted Data with Improved Accuracy and Efficiency
[article]
2019
arXiv
pre-print
In this paper, we propose a new scheme of multi-keyword fuzzy search over encrypted and outsourced data. ...
Our approach introduces a new mechanism to map a natural language expression into a word-vector space. ...
Non-fuzzy Search 0.25
As a basic requirement, fuzzy search approaches ...
arXiv:1904.12111v2
fatcat:cosfwknxhnfopiguc75nx3txk4
Robust frequency control in a renewable penetrated power system: an adaptive fractional order-fuzzy approach
2019
Protection and Control of Modern Power Systems
) controller, optimal fractional order (FO)-PID controller, optimal fuzzy PID controller, optimal FO-fuzzy PID controller are compared with the proposed approach. ...
Originality/value: In this paper, an adaptive FO-fuzzy-PID controller is proposed for LFC of a renewable penetrated power system. ...
Availability of data and materials Data sharing not applicable to this article as no data were generated or analyzed during the study. ...
doi:10.1186/s41601-019-0130-8
fatcat:cu3cma6yhvaaxn2isrlxpd7ddq
A Multi-Level Privacy-Preserving Approach to Hierarchical Data Based on Fuzzy Set Theory
2018
Symmetry
However, the existing anonymization method based on l-diversity for hierarchical data may cause a serious similarity attack, and cannot protect data privacy very well. ...
In this paper, we utilize fuzzy sets to divide levels for sensitive numerical and categorical attribute values uniformly (a categorical attribute value can be converted into a numerical attribute value ...
To avoid similarity attack, we propose a multi-level privacy-preserving approach in hierarchical data based on fuzzy sets. ...
doi:10.3390/sym10080333
fatcat:7ayfsyfez5djfgy62xnobdcklq
Carbon and nutrient removal from domestic wastewaters in a modified 5-stage Bardenpho process via fuzzy modeling approach
2019
Environment Protection Engineering
In the study, the effluent COD, TKN, and TP concentrations were also estimated using a fuzzy logic approach. ...
The results showed that coefficients of determination are higher than 0.80 suggesting that the presented fuzzy logic approach may confidently be used for the estimation of the treatment performance. ...
The fuzzifier converts the input data into a fuzzy input set. ...
doi:10.37190/epe190101
fatcat:keyu3gmkvfdg3erurek6rpx4ee
A Fuzzy Approach for Overcurrent Relays Simulation
[chapter]
2003
Lecture Notes in Computer Science
This paper proposes a new method for modelling of OC relays based on fuzzy logic. ...
Accurate models for Overcurrent relays (OC) with inverse time characteristics have an important role for efficient coordination of power system protection devices. ...
Subsequently, the curve between two neighbouring data is close to a direct line. Therefore, the value of r increases and approaches a value close to one. ...
doi:10.1007/3-540-44863-2_10
fatcat:2ehxcbzipjhclhuh3qpeff5gti
FMEA in Smartphones: A Fuzzy Approach
2022
Mathematics
This work aims to investigate these failures in a typical smartphone by collecting data from a class of people. ...
The widely used hybridized engineering method, Fuzzy Failure Mode and Effect Analysis (F-FMEA), is an excellent approach to solving these problems. ...
We hope that further tests and comparative analysis of different fuzzy applications will confirm our approach. ...
doi:10.3390/math10030513
fatcat:fzjz4xzlavejdh3laovzgyjgw4
Measuring flood resilience: a fuzzy logic approach
2017
International Journal of Building Pathology and Adaptation
The fuzzy logic: A general Overview Fuzzy set theory provides a mathematical tool for modeling uncertain, imprecise vague and subjective data which represents a huge class of data encountered in most real ...
The fuzzy logic approach accommodates the imprecise, incomplete, vague and subjective data that characterize many real life flood risk management problems. ...
Appendix 1: Fuzzy rules
Rules premise Rules Consequence ...
doi:10.1108/ijbpa-12-2016-0029
fatcat:7ipzxry43rhyneto46mile22ey
A New Perspective on Formation of Haze-Fog: The Fuzzy Cognitive Map and Its Approaches to Data Mining
2017
Sustainability
Third, a data mining method based on the genetic algorithm is used to discover the causality values of a fuzzy cognitive map (FCM) for haze-fog formation. ...
The validity of this approach is determined by definition of a simple rule and the Kappa values. ...
Author Contributions: Zhen Peng performed the studies on the fuzzy cognitive map and its approaches to data mining. ...
doi:10.3390/su9030352
fatcat:dexk46bxbbc6bavy5b3clmvpee
A fuzzy logic based approach to support users self-control of their private contextual data retrieval
2004
European Conference on Information Systems
fuzzy logic reasoning. ...
Increasingly, we define a new data set called "contextual privacy attributes" which is associated with each user contextual data, and corresponds to influencing factors. ...
Figure 2 Consent _decide fuzzy rules In the proposed fuzzy approach, rules are defined as "if then" blocks. ...
dblp:conf/ecis/EldinW04
fatcat:pahasto43zfiffnhoqiogzyvoq
Fuzzy Model Identification: A Firefly Optimization Approach
2012
International Journal of Computer Applications
Simulations on two well known problems, one battery charger that is a fuzzy control problem and another Iris data classification problem are conducted to verify the performance of above approach. ...
This paper presents a recent nature-inspired algorithm named Firefly algorithm (FA) for automatically evolving a fuzzy model from numerical data. ...
Two different approaches are used for the design of fuzzy models: Knowledge driven and Data driven models. ...
doi:10.5120/9283-3475
fatcat:hqgkd7uco5fannyknkkthezplq
Unsupervised feature evaluation: a neuro-fuzzy approach
2000
IEEE Transactions on Neural Networks
The present article demonstrates a way of formulating neuro-fuzzy approaches for both feature selection and extraction under unsupervised learning. ...
A fuzzy feature evaluation index for a set of features is defined in terms of degree of similarity between two patterns in both the original and transformed feature spaces. ...
That is, any occurrence of such a situation will be automatically protected by the process of minimizing . ...
doi:10.1109/72.839007
pmid:18249767
fatcat:f4tmr2ajbjhqhl7fqvml3kwqkq
A Fuzzy Approach for Assessing Transportation Infrastructure Security
[chapter]
2015
Complex Systems Design & Management
Fuzzy Degree of Resilience: 1.53 Case Study • LFM Bridge Consequence Factor Data Fuzzy Degree of Consequence: 1.78 Methodology
• Membership Functions
32
Case Study
• Leo Frigo Memorial Bridge ...
Investigates the ability of a
determined adversary to
successfully defeat security
countermeasures put in place
to protect an asset and execute
an attack
Estimates the losses
associated with each ...
doi:10.1007/978-3-319-11617-4_15
dblp:conf/csdm/DojutrekLD14
fatcat:32i3qvqdxfbexlab56kfij2l3i
« Previous
Showing results 1 — 15 out of 66,562 results