Results 101 to 110 of about 7,080 (311)

Mission Aware Cyber‐Physical Security

open access: yesSystems Engineering, EarlyView.
ABSTRACT Perimeter cybersecurity, while essential, has proven insufficient against sophisticated, coordinated, and cyber‐physical attacks. In contrast, mission‐centric cybersecurity emphasizes finding evidence of attack impact on mission success, allowing for targeted resource allocation to mitigate vulnerabilities and protect critical assets.
Georgios Bakirtzis   +3 more
wiley   +1 more source

Some Properties of Fuzzy Quasimetric Spaces

open access: yesInternational Journal of Mathematics and Mathematical Sciences, 2010
Some properties of fuzzy quasimetric spaces are studied. We prove that the topology induced by any 0𝑥0005𝑒𝑀-complete fuzzy-quasi-space is a 0𝑥0005𝑒𝑑-complete quasimetric space. We also prove Baire's theorem, uniform limit theorem, and second countability
Abdul Mohamad
doaj   +1 more source

AI‐enabled bumpless transfer control strategy for legged robot with hybrid energy storage system

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Designing Hybrid energy storage system (HESS) for a legged robot is significant to improve the motion performance and energy efficiency of the robot. However, switching between the driving mode and regenerative braking mode in the HESS may generate a torque bump, which has brought significant challenges to the stability of the robot locomotion.
Zhiwu Huang   +6 more
wiley   +1 more source

Some Properties of Fuzzy Soft Proximity Spaces

open access: yesThe Scientific World Journal, 2015
We study the fuzzy soft proximity spaces in Katsaras’s sense. First, we show how a fuzzy soft topology is derived from a fuzzy soft proximity. Also, we define the notion of fuzzy soft δ-neighborhood in the fuzzy soft proximity space which offers an ...
İzzettin Demir, Oya Bedre Özbakır
doaj   +1 more source

Fuzzy topological spaces

open access: yesJournal of Mathematical Analysis and Applications, 1985
This paper uses various ideas from the literature: fuzzy points, quasi- coincidence, Lowen's initial topology, and product-induced topologies, which are spaces of lower semi-continuous functions constructed by a variation of the hypergraph functor. These tools form the basis for a transference technique, which allows the author to produce a system of ...
openaire   +2 more sources

A Bridge Transformer Network With Deep Graph Convolution for Hyperspectral Image Classification

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT Transformers have been widely applied to hyperspectral image classification, leveraging their self‐attention mechanism for powerful global modelling. However, two key challenges remain as follows: excessive memory and computational costs from calculating correlations between all tokens (especially as image size or spectral bands increase) and ...
Yuquan Gan   +5 more
wiley   +1 more source

Fuzzy spaces topology change and BH thermodynamics [PDF]

open access: diamond, 2014
C. A. S. Silva, R. R. Landim
openalex   +1 more source

Fault diagnosis method of a cascaded H‐bridge inverter based on a multisource adaptive fusion CNN‐transformer

open access: yesIET Power Electronics, EarlyView.
The multisource adaptive fusion CNN‐transformer method proposed in this study can provide theoretical and technical support for fault diagnosis of high‐voltage MCHBI. It has a promising potential for engineering applications. Abstract In high‐voltage applications, the number of cascaded H‐bridge inverter units is large, the failure probability ...
Weiman Yang   +4 more
wiley   +1 more source

Generalized Forms of Upper and Lower Continuous Fuzzy Multifunctions

open access: yesJournal of New Theory, 2019
In this paper, we introduce the concepts of upper and lower (\alpha, \beta, \theta, \delta, \ell)-continuous fuzzy multifunctions. It is in order to unify several characterizations and properties of some kinds of modifications of fuzzy  ...
İsmail Ibedou, Salah Abbas
doaj  

Home - About - Disclaimer - Privacy