首页 > 最新文献

International Journal of Advances in Soft Computing and its Applications最新文献

英文 中文
An Efficient PSO Based Ensemble Classification Model on High Dimensional Datasets 基于粒子群算法的高维数据集集成分类模型
Q3 Computer Science Pub Date : 2017-11-30 DOI: 10.5121/IJSC.2017.8401
G. Lalithakumari, N. NagamalleswaraRao.
{"title":"An Efficient PSO Based Ensemble Classification Model on High Dimensional Datasets","authors":"G. Lalithakumari, N. NagamalleswaraRao.","doi":"10.5121/IJSC.2017.8401","DOIUrl":"https://doi.org/10.5121/IJSC.2017.8401","url":null,"abstract":"","PeriodicalId":38638,"journal":{"name":"International Journal of Advances in Soft Computing and its Applications","volume":"52 1","pages":"01-11"},"PeriodicalIF":0.0,"publicationDate":"2017-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86160330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Intelligent Call Admission Controller for Guaranteed QoS in 4G Mobile Networks Full Text 面向4G移动网络QoS保障的智能呼叫接纳控制器
Q3 Computer Science Pub Date : 2017-11-30 DOI: 10.5121/ijsc.2017.8403
U. Umoh, D. Asuquo, Imo J. Eyoh, Margaret Offisong
Call admission control (CAC), a resource management function, is required to regulate network access to provide the required levels of QoS to emerging services in Fourth Generation (4G) mobile networks. However, CAC is one of the challenging issues for quality of service (QoS) due to imprecise, uncertain and inaccurate measurements of network data. Although type-1 fuzzy system (T1FLS) can handle the uncertainties related to imprecise data, it cannot adequately handle new problems posed by the complex nature of data traffic and diversity of the QoS requirements of data users. This is because T1FLS is characterised by precise membership functions. This study presents an intelligent CAC controller for 4G network using interval type-2 fuzzy logic (IT2FL) for providing guaranteed QoS requirements. The IT2FLS with fuzzy membership functions can fully cope with uncertainties associated with such dynamic network environments by raising its accuracy for a better performance. The Karnik–Mendel (KM) iterative algorithm and Wu-Mendel (WM) approach are explored for computing the centroid and to derive innerand outer-bound sets for the type-reduced set of IT2FS respectively. The study also implements a T1FLS – CAC for comparison with the KM and WM methods. The empirical comparison is made on the designed system with synthetic datasets. Simulation and analyses of results indicate that IT2FLS-CAC using WU approach achieves minimal call blocking probability and provides high performance in CAC decision making with a more reduced root mean square error (RMSE) than IT2FLS-CAC using KM and IT1FLS approaches.
呼叫准入控制(Call admission control, CAC)是一种资源管理功能,用于规范网络接入,为4G移动网络中的新兴业务提供所需的QoS水平。然而,由于网络数据测量的不精确、不确定和不准确,CAC是服务质量(QoS)的挑战问题之一。虽然1型模糊系统(type-1 fuzzy system, T1FLS)可以处理与不精确数据相关的不确定性,但它不能充分处理由于数据流量的复杂性和数据用户QoS需求的多样性所带来的新问题。这是因为T1FLS具有精确的隶属函数。本文提出了一种基于区间2型模糊逻辑(IT2FL)的4G网络智能CAC控制器,以提供有保证的QoS要求。具有模糊隶属函数的IT2FLS可以充分应对这种动态网络环境带来的不确定性,提高其精度,从而获得更好的性能。分别探讨了计算IT2FS类型约简集质心的Karnik-Mendel (KM)迭代算法和Wu-Mendel (WM)方法,并推导了IT2FS类型约简集的内界集和外界集。为了与KM和WM方法进行比较,本文还实现了一个T1FLS - CAC。将设计的系统与综合数据集进行了实证比较。仿真和分析结果表明,与使用KM和IT1FLS方法的IT2FLS-CAC相比,使用WU方法的IT2FLS-CAC实现了最小的呼叫阻塞概率,并提供了更高的CAC决策性能,其均方根误差(RMSE)更小。
{"title":"An Intelligent Call Admission Controller for Guaranteed QoS in 4G Mobile Networks Full Text","authors":"U. Umoh, D. Asuquo, Imo J. Eyoh, Margaret Offisong","doi":"10.5121/ijsc.2017.8403","DOIUrl":"https://doi.org/10.5121/ijsc.2017.8403","url":null,"abstract":"Call admission control (CAC), a resource management function, is required to regulate network access to provide the required levels of QoS to emerging services in Fourth Generation (4G) mobile networks. However, CAC is one of the challenging issues for quality of service (QoS) due to imprecise, uncertain and inaccurate measurements of network data. Although type-1 fuzzy system (T1FLS) can handle the uncertainties related to imprecise data, it cannot adequately handle new problems posed by the complex nature of data traffic and diversity of the QoS requirements of data users. This is because T1FLS is characterised by precise membership functions. This study presents an intelligent CAC controller for 4G network using interval type-2 fuzzy logic (IT2FL) for providing guaranteed QoS requirements. The IT2FLS with fuzzy membership functions can fully cope with uncertainties associated with such dynamic network environments by raising its accuracy for a better performance. The Karnik–Mendel (KM) iterative algorithm and Wu-Mendel (WM) approach are explored for computing the centroid and to derive innerand outer-bound sets for the type-reduced set of IT2FS respectively. The study also implements a T1FLS – CAC for comparison with the KM and WM methods. The empirical comparison is made on the designed system with synthetic datasets. Simulation and analyses of results indicate that IT2FLS-CAC using WU approach achieves minimal call blocking probability and provides high performance in CAC decision making with a more reduced root mean square error (RMSE) than IT2FLS-CAC using KM and IT1FLS approaches.","PeriodicalId":38638,"journal":{"name":"International Journal of Advances in Soft Computing and its Applications","volume":"137 1","pages":"21-37"},"PeriodicalIF":0.0,"publicationDate":"2017-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87958490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis of traversable pits model to make intelligent wheeled vehicles 智能轮式车辆可穿越坑模型分析
Q3 Computer Science Pub Date : 2017-11-01 DOI: 10.5899/2017/JSCA-00100
F. Abbasi
In this paper, the issue of passing wheeled vehicles from pits is discussed. The issue is modeled by defining the limits of passing wheeled vehicles. The proposed model has been studied based on changes in the effective parameters. Finally, in order to describe the problem, the proposed model has been solved for wheeled vehicles based on the effective parameters by using one of the numerical methods.
本文讨论了轮式车辆从坑中通过的问题。这个问题是通过定义通过的轮式车辆的限制来模拟的。基于有效参数的变化对所提出的模型进行了研究。最后,为了描述这一问题,采用一种数值方法对基于有效参数的轮式车辆模型进行求解。
{"title":"Analysis of traversable pits model to make intelligent wheeled vehicles","authors":"F. Abbasi","doi":"10.5899/2017/JSCA-00100","DOIUrl":"https://doi.org/10.5899/2017/JSCA-00100","url":null,"abstract":"In this paper, the issue of passing wheeled vehicles from pits is discussed. The issue is modeled by defining the limits of passing wheeled vehicles. The proposed model has been studied based on changes in the effective parameters. Finally, in order to describe the problem, the proposed model has been solved for wheeled vehicles based on the effective parameters by using one of the numerical methods.","PeriodicalId":38638,"journal":{"name":"International Journal of Advances in Soft Computing and its Applications","volume":"20 1","pages":"67-78"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78204814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparative Analysis of Route Information Based Enhanced Divide and Rule Strategy in WSNs 基于路由信息的wsn增强型分规则策略比较分析
Q3 Computer Science Pub Date : 2017-05-30 DOI: 10.5121/ijsc.2017.8201
Rajeev Kumar, H. Singh, Amit Sharma
In wireless sensor network, routing data efficiently to the base station is a big issue and for this purpose, a number of routing algorithms are invented by researchers. Clustering plays a very important role in the design and as well as development of wireless sensor networks for well distribution of network and also to route data efficiently. In this paper, we had done the enhancement of divide and rule strategy that is basically route information protocol based upon static clustering and dynamic cluster head selection. Simulation results show that our technique outperforms DR, LEACH, and AODV on the basis of packet loss, delay, and throughput. INDEX TERMS Routing protocols, clustering, Coverage hole and energy hole.
在无线传感器网络中,有效地将数据路由到基站是一个大问题,为此,研究人员发明了许多路由算法。聚类在无线传感器网络的设计和开发中起着非常重要的作用,可以保证网络的良好分布和数据的高效路由。本文对基于静态聚类和动态簇头选择的路由信息协议的分而治之策略进行了改进。仿真结果表明,我们的技术在丢包、延迟和吞吐量方面都优于DR、LEACH和AODV。索引术语路由协议,聚类,覆盖洞和能量洞。
{"title":"Comparative Analysis of Route Information Based Enhanced Divide and Rule Strategy in WSNs","authors":"Rajeev Kumar, H. Singh, Amit Sharma","doi":"10.5121/ijsc.2017.8201","DOIUrl":"https://doi.org/10.5121/ijsc.2017.8201","url":null,"abstract":"In wireless sensor network, routing data efficiently to the base station is a big issue and for this purpose, a number of routing algorithms are invented by researchers. Clustering plays a very important role in the design and as well as development of wireless sensor networks for well distribution of network and also to route data efficiently. In this paper, we had done the enhancement of divide and rule strategy that is basically route information protocol based upon static clustering and dynamic cluster head selection. Simulation results show that our technique outperforms DR, LEACH, and AODV on the basis of packet loss, delay, and throughput. INDEX TERMS Routing protocols, clustering, Coverage hole and energy hole.","PeriodicalId":38638,"journal":{"name":"International Journal of Advances in Soft Computing and its Applications","volume":"49 1","pages":"01-08"},"PeriodicalIF":0.0,"publicationDate":"2017-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74574907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using blocking approach to preserve privacy in classification rules by inserting dummy Transaction 在分类规则中插入虚拟事务,采用阻塞方法保护隐私
Q3 Computer Science Pub Date : 2017-03-01 DOI: 10.5899/2017/JSCA-00073
Doryaneh Hossien Afshari, F. Z. Boroujeni
The increasing rate of data sharing among organizations could maximize the risk of leaking sensitive knowledge. Trying to solve this problem leads to increase the importance of privacy preserving within the process of data sharing. In this study is focused on privacy preserving in classification rules mining as a technique of data mining. We propose a blocking algorithm to hiding sensitive classification rules. In the solution, rules' hiding occurs as a result of editing a set of transactions which satisfy sensitive classification rules. The proposed approach tries to deceive and block adversaries by inserting some dummy transactions. Finally, the solution has been evaluated and compared with other available solutions. Results show that limiting the number of attributes existing in each sensitive rule will lead to a decrease in both the number of lost rules and the production rate of ghost rules.
组织之间日益增长的数据共享率可能使敏感知识泄露的风险最大化。试图解决这个问题会增加数据共享过程中隐私保护的重要性。作为数据挖掘的一种技术,本文主要研究分类规则挖掘中的隐私保护问题。提出了一种隐藏敏感分类规则的块算法。在该解决方案中,规则隐藏是由于编辑一组满足敏感分类规则的事务而发生的。所提出的方法试图通过插入一些虚拟交易来欺骗和阻止对手。最后,对该解决方案进行了评价,并与其他可用解决方案进行了比较。结果表明,限制每个敏感规则中存在的属性数量,可以减少丢失的规则数量和幽灵规则的产生率。
{"title":"Using blocking approach to preserve privacy in classification rules by inserting dummy Transaction","authors":"Doryaneh Hossien Afshari, F. Z. Boroujeni","doi":"10.5899/2017/JSCA-00073","DOIUrl":"https://doi.org/10.5899/2017/JSCA-00073","url":null,"abstract":"The increasing rate of data sharing among organizations could maximize the risk of leaking sensitive knowledge. Trying to solve this problem leads to increase the importance of privacy preserving within the process of data sharing. In this study is focused on privacy preserving in classification rules mining as a technique of data mining. We propose a blocking algorithm to hiding sensitive classification rules. In the solution, rules' hiding occurs as a result of editing a set of transactions which satisfy sensitive classification rules. The proposed approach tries to deceive and block adversaries by inserting some dummy transactions. Finally, the solution has been evaluated and compared with other available solutions. Results show that limiting the number of attributes existing in each sensitive rule will lead to a decrease in both the number of lost rules and the production rate of ghost rules.","PeriodicalId":38638,"journal":{"name":"International Journal of Advances in Soft Computing and its Applications","volume":"31 1","pages":"44-52"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87487728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Implementation of Clustering Algorithms for real datasets in Medical Diagnostics using MATLAB 医学诊断中真实数据集聚类算法的MATLAB实现
Q3 Computer Science Pub Date : 2017-03-01 DOI: 10.5899/2017/JSCA-00087
B. Venkataramana, L. Padmasree, M. S. Rao, G. Ganesan, K. R. Krishna
As in the medical field, for one disease there require samples given by diagnosis. The samples will be analyzed by a doctor or a pharmacist. As the no. of patients increases their samples also increases, there require more time to analyze samples for deciding the stage of the disease. To analyze the sample every time requires a skilled person. The samples can be classified by applying them to clustering algorithms. Data clustering has been considered as the most important raw data analysis method used in data mining technology. Most of the clustering techniques proved their efficiency in many applications such as decision making systems, medical sciences, earth sciences etc. Partition based clustering is one of the main approach in clustering. There are various algorithms of data clustering, every algorithm has its own advantages and disadvantages. This work reports the results of classification performance of three such widely used algorithms namely K-means (KM), Fuzzy c-means and Fuzzy Possibilistic c-Means (FPCM) clustering algorithms. To analyze these algorithms three known data sets from UCI machine learning repository are taken such as thyroid data, liver and wine. The efficiency of clustering output is compared with the classification performance, percentage of correctness. The experimental results show that K-means and FCM give same performance for liver data. And FCM and FPCM are giving same performance for thyroid and wine data. FPCM has more efficient classification performance in all the given data sets.
就像在医学领域一样,对于一种疾病,需要通过诊断提供样本。这些样本将由医生或药剂师进行分析。作为no。随着患者数量的增加,他们的样本也会增加,这就需要更多的时间来分析样本,以确定疾病的阶段。每次分析样品都需要一个熟练的人。通过将样本应用于聚类算法,可以对样本进行分类。数据聚类是数据挖掘技术中最重要的原始数据分析方法。大多数聚类技术在决策系统、医学、地球科学等领域的应用证明了它们的有效性。基于分区的聚类是聚类的主要方法之一。数据聚类的算法有很多种,每种算法都有自己的优点和缺点。本工作报告了三种广泛使用的算法分类性能的结果,即K-means (KM),模糊c-means和模糊可能性c-means (FPCM)聚类算法。为了分析这些算法,我们从UCI机器学习存储库中获取了三个已知的数据集,如甲状腺数据、肝脏数据和葡萄酒数据。将聚类输出的效率与分类性能、正确率进行比较。实验结果表明,K-means和FCM对肝脏数据具有相同的性能。FCM和FPCM对甲状腺和葡萄酒数据的处理效果相同。FPCM在所有给定的数据集上都具有更高效的分类性能。
{"title":"Implementation of Clustering Algorithms for real datasets in Medical Diagnostics using MATLAB","authors":"B. Venkataramana, L. Padmasree, M. S. Rao, G. Ganesan, K. R. Krishna","doi":"10.5899/2017/JSCA-00087","DOIUrl":"https://doi.org/10.5899/2017/JSCA-00087","url":null,"abstract":"As in the medical field, for one disease there require samples given by diagnosis. The samples will be analyzed by a doctor or a pharmacist. As the no. of patients increases their samples also increases, there require more time to analyze samples for deciding the stage of the disease. To analyze the sample every time requires a skilled person. The samples can be classified by applying them to clustering algorithms. Data clustering has been considered as the most important raw data analysis method used in data mining technology. Most of the clustering techniques proved their efficiency in many applications such as decision making systems, medical sciences, earth sciences etc. Partition based clustering is one of the main approach in clustering. There are various algorithms of data clustering, every algorithm has its own advantages and disadvantages. This work reports the results of classification performance of three such widely used algorithms namely K-means (KM), Fuzzy c-means and Fuzzy Possibilistic c-Means (FPCM) clustering algorithms. To analyze these algorithms three known data sets from UCI machine learning repository are taken such as thyroid data, liver and wine. The efficiency of clustering output is compared with the classification performance, percentage of correctness. The experimental results show that K-means and FCM give same performance for liver data. And FCM and FPCM are giving same performance for thyroid and wine data. FPCM has more efficient classification performance in all the given data sets.","PeriodicalId":38638,"journal":{"name":"International Journal of Advances in Soft Computing and its Applications","volume":"15 1","pages":"53-66"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81828213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Proposed Multi-Domain Approach for Automatic Classification of Text Documents 一种多领域文本文档自动分类方法
Q3 Computer Science Pub Date : 2017-02-28 DOI: 10.5121/IJSC.2017.8101
Abdelrahman M. Arab, A. Gadallah, A. Salah
{"title":"A Proposed Multi-Domain Approach for Automatic Classification of Text Documents","authors":"Abdelrahman M. Arab, A. Gadallah, A. Salah","doi":"10.5121/IJSC.2017.8101","DOIUrl":"https://doi.org/10.5121/IJSC.2017.8101","url":null,"abstract":"","PeriodicalId":38638,"journal":{"name":"International Journal of Advances in Soft Computing and its Applications","volume":"2 1","pages":"01-12"},"PeriodicalIF":0.0,"publicationDate":"2017-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87150533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Resource discovery algorithm based on hierarchical model and Conscious search in Grid computing system 网格计算系统中基于层次模型和有意识搜索的资源发现算法
Q3 Computer Science Pub Date : 2017-01-01 DOI: 10.5899/2017/JSCA-00086
Nasim Nickbakhsh, M. Aghaei
The distributed system of Grid subscribes the non-homogenous sources at a vast level in a dynamic manner. The resource discovery manner is very influential on the efficiency and of quality the system functionality. The “Bitmap” model is based on the hierarchical and conscious search model that allows for less traffic and low number of messages in relation to other methods in this respect. This proposed method is based on the hierarchical and conscious search model that enhances the Bitmap method with the objective to reduce traffic, reduce the load of resource management processing, reduce the number of emerged messages due to resource discovery and increase the resource according speed. The proposed method and the Bitmap method are simulated through Arena tool. This proposed model is abbreviated as RNTL.
网格的分布式系统以动态的方式对海量的非同质源进行订阅。资源发现的方式直接影响到系统功能的效率和质量。“位图”模型基于分层和有意识的搜索模型,在这方面,与其他方法相比,它允许更少的流量和更少的消息数量。该方法基于层次意识搜索模型,对位图方法进行了改进,目的是减少流量,减少资源管理处理负荷,减少因资源发现而产生的消息数量,提高资源查找速度。通过Arena工具对该方法和位图方法进行了仿真。这个模型被缩写为RNTL。
{"title":"Resource discovery algorithm based on hierarchical model and Conscious search in Grid computing system","authors":"Nasim Nickbakhsh, M. Aghaei","doi":"10.5899/2017/JSCA-00086","DOIUrl":"https://doi.org/10.5899/2017/JSCA-00086","url":null,"abstract":"The distributed system of Grid subscribes the non-homogenous sources at a vast level in a dynamic manner. The resource discovery manner is very influential on the efficiency and of quality the system functionality. The “Bitmap” model is based on the hierarchical and conscious search model that allows for less traffic and low number of messages in relation to other methods in this respect. This proposed method is based on the hierarchical and conscious search model that enhances the Bitmap method with the objective to reduce traffic, reduce the load of resource management processing, reduce the number of emerged messages due to resource discovery and increase the resource according speed. The proposed method and the Bitmap method are simulated through Arena tool. This proposed model is abbreviated as RNTL.","PeriodicalId":38638,"journal":{"name":"International Journal of Advances in Soft Computing and its Applications","volume":"37 1","pages":"24-43"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85064239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Numerical solution of first-order fully fuzzy differential equations by Runge-Kutta Fehlberg method under strongly generalized H-differentiability 强广义h -可微条件下一阶完全模糊微分方程的龙格-库塔-费贝格方法数值解
Q3 Computer Science Pub Date : 2017-01-01 DOI: 10.5899/2017/JSCA-00069
D. Vivek, K. Kanagarajan, S. Harikrishnan
In this paper we propose Runge-Kutta Fehlberg method for solving fully fuzzy differential equations (FFDEs) of the form $y^{'}(t)=aotimes y(t), y(0)=y_{0}, tin[0,T] $ under strongly generalized H-differentiability. The algorithm used here is based on cross product of two fuzzy numbers. Using cross product we investigate the problem of finding a numerical approximation of solutions. The convergence of this method is discussed and numerical example is included to verify the reliability of proposed method.
在强广义h -可微性条件下,给出了求解形式为$y^{'}(t)=a o_ y(t), y(0)=y_{0}, t In [0, t] $的全模糊微分方程的Runge-Kutta Fehlberg方法。这里使用的算法是基于两个模糊数的外积。利用叉乘研究了求解的数值逼近问题。讨论了该方法的收敛性,并通过数值算例验证了该方法的可靠性。
{"title":"Numerical solution of first-order fully fuzzy differential equations by Runge-Kutta Fehlberg method under strongly generalized H-differentiability","authors":"D. Vivek, K. Kanagarajan, S. Harikrishnan","doi":"10.5899/2017/JSCA-00069","DOIUrl":"https://doi.org/10.5899/2017/JSCA-00069","url":null,"abstract":"In this paper we propose Runge-Kutta Fehlberg method for solving fully fuzzy differential equations (FFDEs) of the form $y^{'}(t)=aotimes y(t), y(0)=y_{0}, tin[0,T] $ under strongly generalized H-differentiability. The algorithm used here is based on cross product of two fuzzy numbers. Using cross product we investigate the problem of finding a numerical approximation of solutions. The convergence of this method is discussed and numerical example is included to verify the reliability of proposed method.","PeriodicalId":38638,"journal":{"name":"International Journal of Advances in Soft Computing and its Applications","volume":"176 1","pages":"1-23"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79825444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Face Sketch Generation Using Evolutionary Computing 使用进化计算生成人脸草图
Q3 Computer Science Pub Date : 2016-11-30 DOI: 10.5121/IJSC.2016.7401
K. BansodeN, K. SinhaP.
{"title":"Face Sketch Generation Using Evolutionary Computing","authors":"K. BansodeN, K. SinhaP.","doi":"10.5121/IJSC.2016.7401","DOIUrl":"https://doi.org/10.5121/IJSC.2016.7401","url":null,"abstract":"","PeriodicalId":38638,"journal":{"name":"International Journal of Advances in Soft Computing and its Applications","volume":"93 1","pages":"01-10"},"PeriodicalIF":0.0,"publicationDate":"2016-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75016703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
International Journal of Advances in Soft Computing and its Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1