Search Results (11 titles)

Searched over 7.2 Billion pages in 0.72 seconds

 
Computer network (X) Mathematics (X)

       
1
Records: 1 - 11 of 11 - Pages: 
  • Cover Image

Noi Functii in Teoria Numerelor

By: Florentin Smarandache

... Militaria, Bucharest, Romania. Dr. B.S. Kirangi, Department of Mathematics and Computer Science, University of Mysore, Karnataka, India. Co... ... Novel neural algorithms based on fuzzy S-rules for FRE 87 1.16 Novel neural network part I 94 1.17 Novel neural network part II 101 1.... ...3 1.22 FRE and causal reasoning 126 1.23 Identification of FRE by fuzzy neural networks 134 1.24 Equations in classes of fuzzy relations 140 1.25 ... ...ing algorithms given by several researchers and in some cases methods of neural networks and genetic algorithm is used in solving problems. A comple... ...hm adapting the weights of its interconnections is incorporated into the neural network. These weights are actually the elements of the fuzzy relati... ...) , 0 ( , 1 ], 1 , 0 [ , ), 0 , ( , 0 x x x x which is widely used in neural networks, From Eqs. (1) and (2), a similarity between the two neuron... ...uzzy relational equation algorithm to perform threat analysis in the context of computer Generated Forces Systems such Mod SAF (Modular semi automa... ...aw, Y.K., New Algorithms for Solving Fuzzy Relation Equations, Mathematics and Computers in Simulation, 59 (2002) 329-333. [85-86] 289 64. Mic... ..., Neural Fuzzy Relational Systems with New Learning Algorithm, Mathematics and Computers in Simulation, 51 (2000) 301- 314. [64] 92. Stamou, G.B., ...

Read More
  • Cover Image

Basic Neutrosophic Algebraic Structures and Their Application to Fuzzy and Neutrosophic Models

By: W. B. Vasantha Kandasamy and Florentin Smarandache

...itaria, Bucharest, Romania. Dr. B.S. Kirangi, Department of Mathematics and Computer Science, University of Mysore, Karnataka, India. Copyri... ...ions, which give the current in each branch and each circuit of an electric network. Thus in effect Kirchoff replaced each electrical network by its... ...hat it is not necessary to consider every cycle in the graph of an electric network separately in order to solve the system of equations. T G N ... ...etermined by any of its spanning trees will suffice. A contrived electrical network N, its under lying graph G and a spanning tree T are shown in th... ...y related to the currently fashionable field of graph theory. Although the computer oriented proof of [2, 29] settled the conjecture in 1976 and ha... ...ese two events. This is made explicit in which Markov chain is defined as a network with the sum of the values of the directed lines from each point... ...hoff to generate a “cycle basis” for the cycles in the graphs of electrical networks. Now we consider enumeration of the spanning trees of graphs. T...

Read More
  • Cover Image

G-Dimensional Theory & the Smarandache Quantum Paradoxes : Comparative Logic and Modern Quantum Theory

By: L. Stephen Young

...utes a rational expectation of compositional or structural projection. The computer is an example of quantum behavior in structural projection. Each... ...is an example of quantum behavior in structural projection. Each bit in the computer's logic system has two possible quantum states (on/off); yet the... ... quantum theory that gives rise to the uncertainty paradox. However, in the computer analogy, non- projection of quantum behavior is ruled out when w... ...ion of quantum behavior is ruled out when we consider the on/off switch. The computer's near-infinite number of states can be logically reduced to tw... ...ible the Smarandache Uncertainty, Unstable, etc. Paradoxes?", MAD Scientist Network: Physics, Washington University School of Medicine, St. Louis, M...

Read More
  • Cover Image

Fuzzy Relational Maps and Neutrosophic Relational Maps

By: W. B. Vasantha Kandasamy and Florentin Smarandache

... Militaria, Bucharest, Romania. Dr. B.S. Kirangi, Department of Mathematics and Computer Science, University of Mysore, Karnataka, India. Co... ... Novel neural algorithms based on fuzzy S-rules for FRE 87 1.16 Novel neural network part I 94 1.17 Novel neural network part II 101 1.... ...3 1.22 FRE and causal reasoning 126 1.23 Identification of FRE by fuzzy neural networks 134 1.24 Equations in classes of fuzzy relations 140 1.25 ... ...ing algorithms given by several researchers and in some cases methods of neural networks and genetic algorithm is used in solving problems. A comple... ...hm adapting the weights of its interconnections is incorporated into the neural network. These weights are actually the elements of the fuzzy relati... ...) , 0 ( , 1 ], 1 , 0 [ , ), 0 , ( , 0 x x x x which is widely used in neural networks, From Eqs. (1) and (2), a similarity between the two neuron... ...uzzy relational equation algorithm to perform threat analysis in the context of computer Generated Forces Systems such Mod SAF (Modular semi automa... ...aw, Y.K., New Algorithms for Solving Fuzzy Relation Equations, Mathematics and Computers in Simulation, 59 (2002) 329-333. [85-86] 289 64. Mic... ..., Neural Fuzzy Relational Systems with New Learning Algorithm, Mathematics and Computers in Simulation, 51 (2000) 301- 314. [64] 92. Stamou, G.B., ...

Read More
  • Cover Image

Applications of Bimatrices to Some Fuzzy and Neutrosophic Models

By: Florentin Smarandache

... of the bigraph G = G 1 ∪ G 2 . We are interested in applying bigraphs to network flows. We now proceed on to define separable bigraphs. DEF... ...Fuzzy Cognitive Maps: Help for the Behavioral Scientist, International Neural Network Society, Annual Meeting World Congress Neural Networks, June 1... ...eferential Neural Architectures, in: Proc. of the Int. Joint Conf. on Neural Networks, 2, 617-622, 1990. 35. Dickerson, J.A., and B. Kosko. Adapti... ...and B. Kosko. Adaptive Cognitive Maps in Virtual Worlds, International Neural Network Society, World Congress on Neural Networks, June 1994. 36. D... ...J.A., Z. Cox, E.S. Wurtele and A.W. Fulmer. Creating Metabolic and Regulatory Network Models using Fuzzy Cognitive Maps. http://www.botany.iastate... ... Maps, IEICE Transactions in Fundamentals of Electronics, Communications and Computer Sciences (JTC-CSCC '95), Sept. 18-21 1996, v E79-A, no. 6, 92... ... S.H. Kim. Fuzzy Cognitive Maps Considering Time Relationships, Int. J. Human Computer Studies, 42, 157-162, 1995. 101. Pelaez, C.E., and J.B. Bow...

Read More
  • Cover Image

Cyclopedia of Economics

By: Sam Vaknin

...ghly permeated and transformed. It is not surprising that the Internet - a chaotic network with an anarchic modus operandi - flourished at these ti... ...ctor can be constrained to collapse to the most order-enhancing event. If we had a computer the size of the Universe that could infallibly model it... ...manner similar to al-Qaida: they freelance and self- assemble ad hoc in cross-border networks to tackle specific issues. Jewish organizations - many ... ...learned to closely cooperate in order to survive. No wonder that all modern global networks - from Rothschild to Reuters - were established by Jews... ...have been compared to the latest technological innovation in every generation. The computer metaphor is now in vogue. Computer hardware metaphors w... ...r hardware metaphors were replaced by software metaphors and, lately, by (neuronal) network metaphors. Metaphors are not confined to the philosophy ... ... "brain-children", the results of "brain-storming", conceived by "minds". What is a computer, a software application, a communications network if no... ... the developmental phases of the origin. Consider the software-mind metaphor. The computer is a "thinking machine" (however limited, simulated, re... ...o one another. This relation is by virtue of two facts: (1) Both the brain and the computer are "thinking machines" and (2) the latter is the produ...

Read More
  • Cover Image

Capitalistic Musings

By: Sam Vaknin

...fic nature of knowledge industries (where returns increase rather than diminish and network effects prevail). Thus, current economic thinking is wo... ...can be used by everyone simultaneously). Such ease of replication gives rise to network effects and awards first movers with a monopolistic or o... ...nt of information one can transfer through a single fiber optic swelled 100 times. Computer storage catapulted 80,000 times. Broadband and cable mo... ...ing a market is never cheap, nor easy. Huge sunk costs are required to counter the network effects of more veteran products as well as the competit... ... longer hierarchical and rigid, business resembles self-assembling, nimble, ad- hoc networks of entrepreneurship superimposed on ever- shifting produ... ...one involved grows - the very concept of risk is under attack. Value-at-Risk (VAR) computer models - used mainly by banks and hedge funds in "dynam... ...each others and are aptly termed "natural hedges". Enron pioneered the use of such computer applications in the late 1990's - to little gain it wou... ...rms, known as Basle 2, on the banks' internal measures of risk and credit scoring. Computerized VAR models will, in all likelihood, become an offic... ...nia-based design firm dubbed "Innovation U." by Fortune Magazine. These include the computer mouse, the instant camera, and the PDA. The secret of s...

Read More
  • Cover Image

Fuzzy Cognitive Maps and Neutrosophic Cognitive Maps

By: W. B. Vasantha Kandasamy and Florentin Smarandache

... Fuzzy Cognitive Maps are fuzzy structures that strongly resemble neural networks, and they have powerful and far-reaching consequences as a mathem... ...ment; formalism debate and legal rules; creating metabolic and regulatory network models; traffic and transportation problems; medical diagnostics; ... ...CM for Decision Support in an Intelligent Intrusion Detection System As computer technology advances and the threats of computer crime increase, th... ...ver the years, intrusion detection has become a major area of research in computer science. Intrusion detection systems are often characterized based... ...n two aspects [18]. a. the data source (host based/ multi-host based / network based), or b. the model of intrusion detection (anomaly detection/... ...ed as part of an intrusion detection research effort in the Department of Computer Science at Mississippi State University. The following unique fea... ...nique features characterize IIDS: 1. Real time adaptive distributed and network based architecture. 2. Incorporation of both anomaly and misuse de... ...es, S and T. This 62 entails an increased use of memory storage in the computer, but the computation for causal inferences is greatly facilitated... ...ganisation’s biggest asset: its collective brain-power. 6. The lack of computer based models affects the effectiveness of the SISP process. Th...

Read More
  • Cover Image

Progress in Physics : The Journal on Advanced Studies in Theoretical and Experimental Physics, Including Related Themes from Mathematics, Volume 2

By: Florentin Smarandache

...McCabe argues the hypothesis, for instance, that our universe is part of a computer simulation implementation generates empirical predictions and it i... ...bservable substance. I argued that the soundness of the virtual reality or computer simulation hypothesis depends on how Universe is defned. The fact ... ... 19th Biennial Meeting, PSA2004 2004. 15. McCabe G. Universe creation on a computer, 2004. e-print, Pittsburgh Archives/00001891. E. Harokopos. Power ... ...ey will not survive an iteration. Under iterations of the map this spatial network undergoes growth and decay at all levels, but with the higher level... ...at in self-referential systems there are no “things”, but rather a complex network of iterative relations. In the model the iterations of the map have... ...y phenomenon, but the far “future” detailed structure of even this spatial network is completely unknowable without per- forming the iterations. Furth...

Read More
  • Cover Image

Multispace & Multistructure Neutrosophic Transdisciplinary : 100 Collected Papers of Sciences : Volume 4

By: Florentin Smarandache

...bservation of Anomalous Potential Electric Energy in Distilled Water under Solar Heating, by F. Smarandache & V. Christianto......................74 COMPUTER PROGRAMMING CODIFICATION..............83 9. Algebraic Generalization of Venn Diagram, by Florentin Smarandache.........84 ECONOMICS, BUSINESS, AND POLITICS.................87 10. Introduction to Poly-Emporium Theo...

Read More
  • Cover Image

Multispace & Multistructure Neutrosophic Transdisciplinary : 100 Collected Papers of Sciences : Volume 4

By: Florentin Smarandache

...bservation of Anomalous Potential Electric Energy in Distilled Water under Solar Heating, by F. Smarandache & V. Christianto......................74 COMPUTER PROGRAMMING CODIFICATION..............83 9. Algebraic Generalization of Venn Diagram, by Florentin Smarandache.........84 ECONOMICS, BUSINESS, AND POLITICS.................87 10. Introduction to Poly-Emporium Theo...

Read More
       
1
Records: 1 - 11 of 11 - Pages: 
 
 





Copyright © World Library Foundation. All rights reserved. eBooks from Project Gutenberg are sponsored by the World Library Foundation,
a 501c(4) Member's Support Non-Profit Organization, and is NOT affiliated with any governmental agency or department.