Searched over 7.2 Billion pages in 0.72 seconds
Please wait while the eBook Finder searches for your request. Searching through the full text of 2,850,000 books. Full Text searches may take up to 1 min.
... Militaria, Bucharest, Romania. Dr. B.S. Kirangi, Department of Mathematics and Computer Science, University of Mysore, Karnataka, India. Co... ... Novel neural algorithms based on fuzzy S-rules for FRE 87 1.16 Novel neural network part I 94 1.17 Novel neural network part II 101 1.... ...3 1.22 FRE and causal reasoning 126 1.23 Identification of FRE by fuzzy neural networks 134 1.24 Equations in classes of fuzzy relations 140 1.25 ... ...ing algorithms given by several researchers and in some cases methods of neural networks and genetic algorithm is used in solving problems. A comple... ...hm adapting the weights of its interconnections is incorporated into the neural network. These weights are actually the elements of the fuzzy relati... ...) , 0 ( , 1 ], 1 , 0 [ , ), 0 , ( , 0 x x x x which is widely used in neural networks, From Eqs. (1) and (2), a similarity between the two neuron... ...uzzy relational equation algorithm to perform threat analysis in the context of computer Generated Forces Systems such Mod SAF (Modular semi automa... ...aw, Y.K., New Algorithms for Solving Fuzzy Relation Equations, Mathematics and Computers in Simulation, 59 (2002) 329-333. [85-86] 289 64. Mic... ..., Neural Fuzzy Relational Systems with New Learning Algorithm, Mathematics and Computers in Simulation, 51 (2000) 301- 314. [64] 92. Stamou, G.B., ...
...itaria, Bucharest, Romania. Dr. B.S. Kirangi, Department of Mathematics and Computer Science, University of Mysore, Karnataka, India. Copyri... ...ions, which give the current in each branch and each circuit of an electric network. Thus in effect Kirchoff replaced each electrical network by its... ...hat it is not necessary to consider every cycle in the graph of an electric network separately in order to solve the system of equations. T G N ... ...etermined by any of its spanning trees will suffice. A contrived electrical network N, its under lying graph G and a spanning tree T are shown in th... ...y related to the currently fashionable field of graph theory. Although the computer oriented proof of [2, 29] settled the conjecture in 1976 and ha... ...ese two events. This is made explicit in which Markov chain is defined as a network with the sum of the values of the directed lines from each point... ...hoff to generate a “cycle basis” for the cycles in the graphs of electrical networks. Now we consider enumeration of the spanning trees of graphs. T...
...utes a rational expectation of compositional or structural projection. The computer is an example of quantum behavior in structural projection. Each... ...is an example of quantum behavior in structural projection. Each bit in the computer's logic system has two possible quantum states (on/off); yet the... ... quantum theory that gives rise to the uncertainty paradox. However, in the computer analogy, non- projection of quantum behavior is ruled out when w... ...ion of quantum behavior is ruled out when we consider the on/off switch. The computer's near-infinite number of states can be logically reduced to tw... ...ible the Smarandache Uncertainty, Unstable, etc. Paradoxes?", MAD Scientist Network: Physics, Washington University School of Medicine, St. Louis, M...
... of the bigraph G = G 1 ∪ G 2 . We are interested in applying bigraphs to network flows. We now proceed on to define separable bigraphs. DEF... ...Fuzzy Cognitive Maps: Help for the Behavioral Scientist, International Neural Network Society, Annual Meeting World Congress Neural Networks, June 1... ...eferential Neural Architectures, in: Proc. of the Int. Joint Conf. on Neural Networks, 2, 617-622, 1990. 35. Dickerson, J.A., and B. Kosko. Adapti... ...and B. Kosko. Adaptive Cognitive Maps in Virtual Worlds, International Neural Network Society, World Congress on Neural Networks, June 1994. 36. D... ...J.A., Z. Cox, E.S. Wurtele and A.W. Fulmer. Creating Metabolic and Regulatory Network Models using Fuzzy Cognitive Maps. http://www.botany.iastate... ... Maps, IEICE Transactions in Fundamentals of Electronics, Communications and Computer Sciences (JTC-CSCC '95), Sept. 18-21 1996, v E79-A, no. 6, 92... ... S.H. Kim. Fuzzy Cognitive Maps Considering Time Relationships, Int. J. Human Computer Studies, 42, 157-162, 1995. 101. Pelaez, C.E., and J.B. Bow...
...ghly permeated and transformed. It is not surprising that the Internet - a chaotic network with an anarchic modus operandi - flourished at these ti... ...ctor can be constrained to collapse to the most order-enhancing event. If we had a computer the size of the Universe that could infallibly model it... ...manner similar to al-Qaida: they freelance and self- assemble ad hoc in cross-border networks to tackle specific issues. Jewish organizations - many ... ...learned to closely cooperate in order to survive. No wonder that all modern global networks - from Rothschild to Reuters - were established by Jews... ...have been compared to the latest technological innovation in every generation. The computer metaphor is now in vogue. Computer hardware metaphors w... ...r hardware metaphors were replaced by software metaphors and, lately, by (neuronal) network metaphors. Metaphors are not confined to the philosophy ... ... "brain-children", the results of "brain-storming", conceived by "minds". What is a computer, a software application, a communications network if no... ... the developmental phases of the origin. Consider the software-mind metaphor. The computer is a "thinking machine" (however limited, simulated, re... ...o one another. This relation is by virtue of two facts: (1) Both the brain and the computer are "thinking machines" and (2) the latter is the produ...
...fic nature of knowledge industries (where returns increase rather than diminish and network effects prevail). Thus, current economic thinking is wo... ...can be used by everyone simultaneously). Such ease of replication gives rise to network effects and awards first movers with a monopolistic or o... ...nt of information one can transfer through a single fiber optic swelled 100 times. Computer storage catapulted 80,000 times. Broadband and cable mo... ...ing a market is never cheap, nor easy. Huge sunk costs are required to counter the network effects of more veteran products as well as the competit... ... longer hierarchical and rigid, business resembles self-assembling, nimble, ad- hoc networks of entrepreneurship superimposed on ever- shifting produ... ...one involved grows - the very concept of risk is under attack. Value-at-Risk (VAR) computer models - used mainly by banks and hedge funds in "dynam... ...each others and are aptly termed "natural hedges". Enron pioneered the use of such computer applications in the late 1990's - to little gain it wou... ...rms, known as Basle 2, on the banks' internal measures of risk and credit scoring. Computerized VAR models will, in all likelihood, become an offic... ...nia-based design firm dubbed "Innovation U." by Fortune Magazine. These include the computer mouse, the instant camera, and the PDA. The secret of s...
... Fuzzy Cognitive Maps are fuzzy structures that strongly resemble neural networks, and they have powerful and far-reaching consequences as a mathem... ...ment; formalism debate and legal rules; creating metabolic and regulatory network models; traffic and transportation problems; medical diagnostics; ... ...CM for Decision Support in an Intelligent Intrusion Detection System As computer technology advances and the threats of computer crime increase, th... ...ver the years, intrusion detection has become a major area of research in computer science. Intrusion detection systems are often characterized based... ...n two aspects [18]. a. the data source (host based/ multi-host based / network based), or b. the model of intrusion detection (anomaly detection/... ...ed as part of an intrusion detection research effort in the Department of Computer Science at Mississippi State University. The following unique fea... ...nique features characterize IIDS: 1. Real time adaptive distributed and network based architecture. 2. Incorporation of both anomaly and misuse de... ...es, S and T. This 62 entails an increased use of memory storage in the computer, but the computation for causal inferences is greatly facilitated... ...ganisation’s biggest asset: its collective brain-power. 6. The lack of computer based models affects the effectiveness of the SISP process. Th...
...McCabe argues the hypothesis, for instance, that our universe is part of a computer simulation implementation generates empirical predictions and it i... ...bservable substance. I argued that the soundness of the virtual reality or computer simulation hypothesis depends on how Universe is defned. The fact ... ... 19th Biennial Meeting, PSA2004 2004. 15. McCabe G. Universe creation on a computer, 2004. e-print, Pittsburgh Archives/00001891. E. Harokopos. Power ... ...ey will not survive an iteration. Under iterations of the map this spatial network undergoes growth and decay at all levels, but with the higher level... ...at in self-referential systems there are no “things”, but rather a complex network of iterative relations. In the model the iterations of the map have... ...y phenomenon, but the far “future” detailed structure of even this spatial network is completely unknowable without per- forming the iterations. Furth...
...bservation of Anomalous Potential Electric Energy in Distilled Water under Solar Heating, by F. Smarandache & V. Christianto......................74 COMPUTER PROGRAMMING CODIFICATION..............83 9. Algebraic Generalization of Venn Diagram, by Florentin Smarandache.........84 ECONOMICS, BUSINESS, AND POLITICS.................87 10. Introduction to Poly-Emporium Theo...