• Title/Summary/Keyword: set theory

Search Result 2,009, Processing Time 0.034 seconds

Use of Fuzzy Set Theory in the Inspection of Transmission Lines of Nuclear Installations

  • Durpel, L.Van-den;D.Ruan;P.D hondt
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 1993.06a
    • /
    • pp.1066-1069
    • /
    • 1993
  • The presence of older installations, in particular nuclear facilities, demands extra studies concerning the safety evaluation of those installations. One of the aspects to deal with is the safety of the several transmission lines in a nuclear installation, for instance the safety of control, safety against fire, etc.. . This paper investigates the use of fuzzy set theory in the inspection of transmission lines of nuclear installations at SCK/CEN, Belgium.

  • PDF

T-FUZZY INTEGRALS OF SET-VALUED MAPPINGS

  • CHO, SUNG JIN
    • Journal of the Korean Society for Industrial and Applied Mathematics
    • /
    • v.4 no.1
    • /
    • pp.39-48
    • /
    • 2000
  • In this paper we define T-fuzzy integrals of set-valued mappings, which are extensions of fuzzy integrals of the single-valued functions defined by Sugeno. And we discuss their properties.

  • PDF

CONFORMAL DENSITY OF VISIBILITY MANIFOLD

  • Kim, Hyun-Jung
    • Bulletin of the Korean Mathematical Society
    • /
    • v.38 no.1
    • /
    • pp.211-222
    • /
    • 2001
  • In this paper, we prove the existence and uniqueness of a $\delta(\Gamma)$-conformal density on the limit set of $\Gamma$ acting on visibility manifold H for a Fuchsian group $\Gamma$.

  • PDF

A Design of Control Chart for Fraction Nonconforming Using Fuzzy Data (퍼지 데이터를 이용한 불량률(p) 관리도의 설계)

  • 김계완;서현수;윤덕균
    • Journal of Korean Society for Quality Management
    • /
    • v.32 no.2
    • /
    • pp.191-200
    • /
    • 2004
  • Using the p chart is not adequate in case that there are lots of data and it is difficult to divide into products conforming or nonconforming because of obscurity of binary classification. So we need to design a new control chart which represents obscure situation efficiently. This study deals with the method to performing arithmetic operation representing fuzzy data into fuzzy set by applying fuzzy set theory and designs a new control chart taking account of a concept of classification on the term set and membership function associated with term set.

HAUSDORFF DIMENSION OF DERANGED CANTOR SET WITHOUT SOME BOUNDEDNESS CONDITION

  • Baek, In-Soo
    • Communications of the Korean Mathematical Society
    • /
    • v.19 no.1
    • /
    • pp.113-117
    • /
    • 2004
  • A deranged Cantor set (without the uniform bounded-ness condition away from zero of contraction ratios) whose weak local dimensions for all points coincide has its Hausdorff dimension of the same value of weak local dimension. We will show it using an energy theory instead of Frostman's density lemma which was used for the case of the deranged Cantor set with the uniform boundedness condition of contraction ratios. In the end, we will give an example of such a deranged Cantor set.

ON FUZZY CLOSEDNESS IN LATTICE IMPLICATION ALGEBRAS

  • Jun, Young-Bae;Song, Seok-Zun;Roh, Eun-Hwan
    • Journal of applied mathematics & informatics
    • /
    • v.11 no.1_2
    • /
    • pp.341-355
    • /
    • 2003
  • The fuzzification of ${\bigotimes}-closed$ set is considered, and its basic properties we investigated. Characterizations of fuazzy ${\bigotimes}-closed$ set we given. Using a collection of ${\bigotimes}-closed$ sets with additional conditions, a fuzzy ${\bigotimes}-closed$ set is stated. The theory of fuzzy topological ${\bigotimes}-closed$ sets is discussed.

INDEPENDENT TRANSVERSAL DOMINATION NUMBER IN COMPLEMENTARY PRISMS

  • Aytac, Aysun;Erkal, Cem
    • Honam Mathematical Journal
    • /
    • v.43 no.1
    • /
    • pp.17-25
    • /
    • 2021
  • A set D ⊆ V (G) is an independent transversal dominating set of G if D is a dominating set and also intersects every maximum independent set in G. The minimum cardinality of such a set is equal to the transversal domination number, denoted by ��it(G). This paper is devoted to the computation of the independent transversal domination number of some complementary prism.

Design of Rough Set Theory Based Disease Monitoring System for Healthcare (헬스 케어를 위한 RDMS 설계)

  • Lee, Byung-Kwan;Jeong, Eun-Hee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.12
    • /
    • pp.1095-1105
    • /
    • 2013
  • This paper proposes the RDMS(Rough Set Theory based Disease Monitoring System) which efficiently manages diseases in Healthcare System. The RDMS is made up of DCM(Data Collection Module), RDRGM(RST based Disease Rules Generation Module), and HMM(Healthcare Monitoring Module). The DCM collects bio-metric informations from bio sensor of patient and stores it in RDMS DB according to the processing procedure of data. The RDRGM generates disease rules using the core of RST and the support of attributes. The HMM predicts a patient's disease by analyzing not only the risk quotient but also that of complications on the patient's disease by using the collected patient's information by DCM and transfers a visualized patient's information to a patient, a family doctor, etc according to a patient's risk quotient. Also the HMM predicts the patient's disease by comparing and analyzing a patient's medical information, a current patient's health condition, and a patient's family history according to the rules generated by RDRGM and can provide the Patient-Customized Medical Service and the medical information with the prediction result rapidly and reliably.

A Design of RSIDS using Rough Set Theory and Support Vector Machine Algorithm (Rough Set Theory와 Support Vector Machine 알고리즘을 이용한 RSIDS 설계)

  • Lee, Byung-Kwan;Jeong, Eun-Hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.12
    • /
    • pp.179-185
    • /
    • 2012
  • This paper proposes a design of RSIDS(RST and SVM based Intrusion Detection System) using RST(Rough Set Theory) and SVM(Support Vector Machine) algorithm. The RSIDS consists of PrePro(PreProcessing) module, RRG(RST based Rule Generation) module, and SAD(SVM based Attack Detection) module. The PrePro module changes the collected information to the data format of RSIDS. The RRG module analyzes attack data, generates the rules of attacks, extracts attack information from the massive data by using these rules, and transfers the extracted attack information to the SAD module. The SAD module detects the attacks by using it, which the SAD module notifies to a manager. Therefore, compared to the existing SVM, the RSIDS improved average ADR(Attack Detection Ratio) from 77.71% to 85.28%, and reduced average FPR(False Positive ratio) from 13.25% to 9.87%. Thus, the RSIDS is estimated to have been improved, compared to the existing SVM.