Results 111 to 120 of about 12,051 (200)
A neural network architecture for implementation of expert systems for real time monitoring [PDF]
Since neural networks have the advantages of massive parallelism and simple architecture, they are good tools for implementing real time expert systems.
Ramamoorthy, P. A.
core +1 more source
Abstract Purpose Maps of the MRI parameters R2*$$ {\mathrm{R}}_2^{\ast } $$ and magnetic susceptibility (χ$$ \chi $$) enable the investigation of microscopic tissue changes in brain disease. However, cardiac‐induced signal instabilities increase the variability of brain maps of R2*$$ {\mathrm{R}}_2^{\ast } $$ and χ$$ \chi $$.
Quentin Raynaud +5 more
wiley +1 more source
ABSTRACT Introduction Sharing narratives about recovery is a central activity in peer support work. Researchers have so far investigated many issues related to recovery narratives, but have paid no attention to how the building and sharing of one's story are modified during training courses.
Elena Faccio +3 more
wiley +1 more source
Improving a risk assessment technique for the problem of cyber security is required to modify the technique’s capability to identify, evaluate, assess, and mitigate potential cyber threats and ambiguities.
Zeeshan Ali, Miin-Shen Yang
doaj +1 more source
Bipolar aggregation method for fuzzy nominal classification using Weighted Cardinal Fuzzy Measure (WCFM) [PDF]
The issue of designing a procedure to assign objects (candidates, projects, decisions, options, etc.) characterized by multiple attributes or criteria to predefined classes characterized by fuzzyly defined multiple features, conditions or constraints, is
Tchangani, Ayeley
core +1 more source
ABSTRACT The lack of robust subtyping for insomnia disorder (ID) led to its current classification as a uniform condition. A novel approach to subtyping ID developed a new tool, the insomnia type questionnaire (ITQ). Our research aimed to assess whether the ID subtypes identified in the general population could also be found in ID patients referred to ...
Francesca Canellas +7 more
wiley +1 more source
The term “cloud security (CS)” describes the collection of procedures and tools intended to defend networks, data, apps, and systems used in cloud computing from possible security risks and unauthorized access.
Hafiz Muhammad Waqas +4 more
doaj +1 more source
A neuro-fuzzy architecture for real-time applications [PDF]
Neural networks and fuzzy expert systems perform the same task of functional mapping using entirely different approaches. Each approach has certain unique features. The ability to learn specific input-output mappings from large input/output data possibly
Huang, Song, Ramamoorthy, P. A.
core +1 more source
Making large information sources better accessible using fuzzy set theory [PDF]
B.P. Buckles +6 more
core +1 more source
This manuscript aims to find the most key steps and considerations for selecting industry 4.0 technology. For this, we evaluate the technique of circular bipolar complex fuzzy (CBCF) information.
Zeeshan Ali +4 more
doaj +1 more source

