34 research outputs found

    Fuzzy Sets, Fuzzy Logic and Their Applications

    Get PDF
    The present book contains 20 articles collected from amongst the 53 total submitted manuscripts for the Special Issue “Fuzzy Sets, Fuzzy Loigic and Their Applications” of the MDPI journal Mathematics. The articles, which appear in the book in the series in which they were accepted, published in Volumes 7 (2019) and 8 (2020) of the journal, cover a wide range of topics connected to the theory and applications of fuzzy systems and their extensions and generalizations. This range includes, among others, management of the uncertainty in a fuzzy environment; fuzzy assessment methods of human-machine performance; fuzzy graphs; fuzzy topological and convergence spaces; bipolar fuzzy relations; type-2 fuzzy; and intuitionistic, interval-valued, complex, picture, and Pythagorean fuzzy sets, soft sets and algebras, etc. The applications presented are oriented to finance, fuzzy analytic hierarchy, green supply chain industries, smart health practice, and hotel selection. This wide range of topics makes the book interesting for all those working in the wider area of Fuzzy sets and systems and of fuzzy logic and for those who have the proper mathematical background who wish to become familiar with recent advances in fuzzy mathematics, which has entered to almost all sectors of human life and activity

    Fitting aggregation operators to data

    Full text link
    Theoretical advances in modelling aggregation of information produced a wide range of aggregation operators, applicable to almost every practical problem. The most important classes of aggregation operators include triangular norms, uninorms, generalised means and OWA operators.With such a variety, an important practical problem has emerged: how to fit the parameters/ weights of these families of aggregation operators to observed data? How to estimate quantitatively whether a given class of operators is suitable as a model in a given practical setting? Aggregation operators are rather special classes of functions, and thus they require specialised regression techniques, which would enforce important theoretical properties, like commutativity or associativity. My presentation will address this issue in detail, and will discuss various regression methods applicable specifically to t-norms, uninorms and generalised means. I will also demonstrate software implementing these regression techniques, which would allow practitioners to paste their data and obtain optimal parameters of the chosen family of operators.<br /

    Semantic Similarity of Spatial Scenes

    Get PDF
    The formalization of similarity in spatial information systems can unleash their functionality and contribute technology not only useful, but also desirable by broad groups of users. As a paradigm for information retrieval, similarity supersedes tedious querying techniques and unveils novel ways for user-system interaction by naturally supporting modalities such as speech and sketching. As a tool within the scope of a broader objective, it can facilitate such diverse tasks as data integration, landmark determination, and prediction making. This potential motivated the development of several similarity models within the geospatial and computer science communities. Despite the merit of these studies, their cognitive plausibility can be limited due to neglect of well-established psychological principles about properties and behaviors of similarity. Moreover, such approaches are typically guided by experience, intuition, and observation, thereby often relying on more narrow perspectives or restrictive assumptions that produce inflexible and incompatible measures. This thesis consolidates such fragmentary efforts and integrates them along with novel formalisms into a scalable, comprehensive, and cognitively-sensitive framework for similarity queries in spatial information systems. Three conceptually different similarity queries at the levels of attributes, objects, and scenes are distinguished. An analysis of the relationship between similarity and change provides a unifying basis for the approach and a theoretical foundation for measures satisfying important similarity properties such as asymmetry and context dependence. The classification of attributes into categories with common structural and cognitive characteristics drives the implementation of a small core of generic functions, able to perform any type of attribute value assessment. Appropriate techniques combine such atomic assessments to compute similarities at the object level and to handle more complex inquiries with multiple constraints. These techniques, along with a solid graph-theoretical methodology adapted to the particularities of the geospatial domain, provide the foundation for reasoning about scene similarity queries. Provisions are made so that all methods comply with major psychological findings about people’s perceptions of similarity. An experimental evaluation supplies the main result of this thesis, which separates psychological findings with a major impact on the results from those that can be safely incorporated into the framework through computationally simpler alternatives

    Cyber Security of Critical Infrastructures

    Get PDF
    Critical infrastructures are vital assets for public safety, economic welfare, and the national security of countries. The vulnerabilities of critical infrastructures have increased with the widespread use of information technologies. As Critical National Infrastructures are becoming more vulnerable to cyber-attacks, their protection becomes a significant issue for organizations as well as nations. The risks to continued operations, from failing to upgrade aging infrastructure or not meeting mandated regulatory regimes, are considered highly significant, given the demonstrable impact of such circumstances. Due to the rapid increase of sophisticated cyber threats targeting critical infrastructures with significant destructive effects, the cybersecurity of critical infrastructures has become an agenda item for academics, practitioners, and policy makers. A holistic view which covers technical, policy, human, and behavioural aspects is essential to handle cyber security of critical infrastructures effectively. Moreover, the ability to attribute crimes to criminals is a vital element of avoiding impunity in cyberspace. In this book, both research and practical aspects of cyber security considerations in critical infrastructures are presented. Aligned with the interdisciplinary nature of cyber security, authors from academia, government, and industry have contributed 13 chapters. The issues that are discussed and analysed include cybersecurity training, maturity assessment frameworks, malware analysis techniques, ransomware attacks, security solutions for industrial control systems, and privacy preservation methods

    Essays in causal inference

    Full text link
    This thesis consists of three self-contained chapters: First, I develop a method to assess the sensitivity of local average treatment effect estimates to potential violations of the monotonicity assumption. Second, we propose new confidence sets for the parameter of interest in fuzzy regression discontinuity designs that are valid in a wide range of empirically relevant settings. Third, we propose a novel class of estimators that use pre-treatment covariates more efficiently than estimators that are commonly applied in the literature of regression discontinuity designs

    Symmetry in Applied Mathematics

    Get PDF
    Applied mathematics and symmetry work together as a powerful tool for problem reduction and solving. We are communicating applications in probability theory and statistics (A Test Detecting the Outliers for Continuous Distributions Based on the Cumulative Distribution Function of the Data Being Tested, The Asymmetric Alpha-Power Skew-t Distribution), fractals - geometry and alike (Khovanov Homology of Three-Strand Braid Links, Volume Preserving Maps Between p-Balls, Generation of Julia and Mandelbrot Sets via Fixed Points), supersymmetry - physics, nanostructures -chemistry, taxonomy - biology and alike (A Continuous Coordinate System for the Plane by Triangular Symmetry, One-Dimensional Optimal System for 2D Rotating Ideal Gas, Minimal Energy Configurations of Finite Molecular Arrays, Noether-Like Operators and First Integrals for Generalized Systems of Lane-Emden Equations), algorithms, programs and software analysis (Algorithm for Neutrosophic Soft Sets in Stochastic Multi-Criteria Group Decision Making Based on Prospect Theory, On a Reduced Cost Higher Order Traub-Steffensen-Like Method for Nonlinear Systems, On a Class of Optimal Fourth Order Multiple Root Solvers without Using Derivatives) to specific subjects (Facility Location Problem Approach for Distributed Drones, Parametric Jensen-Shannon Statistical Complexity and Its Applications on Full-Scale Compartment Fire Data). Diverse topics are thus combined to map out the mathematical core of practical problems

    Fuzzy Techniques for Decision Making 2018

    Get PDF
    Zadeh's fuzzy set theory incorporates the impreciseness of data and evaluations, by imputting the degrees by which each object belongs to a set. Its success fostered theories that codify the subjectivity, uncertainty, imprecision, or roughness of the evaluations. Their rationale is to produce new flexible methodologies in order to model a variety of concrete decision problems more realistically. This Special Issue garners contributions addressing novel tools, techniques and methodologies for decision making (inclusive of both individual and group, single- or multi-criteria decision making) in the context of these theories. It contains 38 research articles that contribute to a variety of setups that combine fuzziness, hesitancy, roughness, covering sets, and linguistic approaches. Their ranges vary from fundamental or technical to applied approaches

    Rendiconti dell'Istituto di Matematica dell'UniversitĂ  di Trieste. An International Journal of Mathematics. Vol. 44 (2012)

    No full text
    Rendiconti dell’Istituto di Matematica dell’Università di Trieste was founded in 1969 by Arno Predonzan, with the aim of publishing original research articles in all fields of mathematics and has been the first Italian mathematical journal to be published also on-line. The access to the electronic version of the journal is free. All published articles are available on-line. The journal can be obtained by subscription, or by reciprocity with other similar journals. Currently more than 100 exchange agreements with mathematics departments and institutes around the world have been entered in

    Applied Mathematics and Fractional Calculus

    Get PDF
    In the last three decades, fractional calculus has broken into the field of mathematical analysis, both at the theoretical level and at the level of its applications. In essence, the fractional calculus theory is a mathematical analysis tool applied to the study of integrals and derivatives of arbitrary order, which unifies and generalizes the classical notions of differentiation and integration. These fractional and derivative integrals, which until not many years ago had been used in purely mathematical contexts, have been revealed as instruments with great potential to model problems in various scientific fields, such as: fluid mechanics, viscoelasticity, physics, biology, chemistry, dynamical systems, signal processing or entropy theory. Since the differential and integral operators of fractional order are nonlinear operators, fractional calculus theory provides a tool for modeling physical processes, which in many cases is more useful than classical formulations. This is why the application of fractional calculus theory has become a focus of international academic research. This Special Issue "Applied Mathematics and Fractional Calculus" has published excellent research studies in the field of applied mathematics and fractional calculus, authored by many well-known mathematicians and scientists from diverse countries worldwide such as China, USA, Canada, Germany, Mexico, Spain, Poland, Portugal, Iran, Tunisia, South Africa, Albania, Thailand, Iraq, Egypt, Italy, India, Russia, Pakistan, Taiwan, Korea, Turkey, and Saudi Arabia
    corecore