Results 1 to 10 of about 1,699,180 (304)

Meta-Tree Random Forest: Probabilistic Data-Generative Model and Bayes Optimal Prediction

open access: yesEntropy, 2021
This paper deals with a prediction problem of a new targeting variable corresponding to a new explanatory variable given a training dataset. To predict the targeting variable, we consider a model tree, which is used to represent a conditional ...
Nao Dobashi   +3 more
doaj   +2 more sources

A characterization of trees with equal 2-domination and 2-independence numbers [PDF]

open access: yesDiscrete Mathematics & Theoretical Computer Science, 2017
A set $S$ of vertices in a graph $G$ is a $2$-dominating set if every vertex of $G$ not in $S$ is adjacent to at least two vertices in $S$, and $S$ is a $2$-independent set if every vertex in $S$ is adjacent to at most one vertex of $S$.
Christoph Brause   +2 more
doaj   +3 more sources

A Method for Temporal Fault Tree Analysis Using Intuitionistic Fuzzy Set and Expert Elicitation

open access: yesIEEE Access, 2020
Temporal fault trees (TFTs), an extension of classical Boolean fault trees, can model time-dependent failure behaviour of dynamic systems. The methodologies used for quantitative analysis of TFTs include algebraic solutions, Petri nets (PN), and Bayesian
Sohag Kabir   +4 more
doaj   +2 more sources

From Proof Nets to the Free *-Autonomous Category [PDF]

open access: yesLogical Methods in Computer Science, 2006
In the first part of this paper we present a theory of proof nets for full multiplicative linear logic, including the two units. It naturally extends the well-known theory of unit-free multiplicative proof nets.
Francois Lamarche, Lutz Strassburger
doaj   +10 more sources

Quantification of Temporal Fault Trees Based on Fuzzy Set Theory

open access: greenInternational Conference on Dependability of Computer Systems, 2014
Sohag Kabir   +3 more
openalex   +3 more sources

Overcoming the uncertainty in a research reactor LOCA in level-1 PSA; Fuzzy based fault-tree/event-tree analysis [PDF]

open access: yesJournal of Optimization in Industrial Engineering, 2020
Probabilistic safety assessment (PSA) which plays a crucial role in risk evaluation is a quantitative approach intended to demonstrate how a nuclear reactor meets the safety margins as part of the licensing process.
Masoud Mohsendokht   +1 more
doaj   +1 more source

Revisiting Call-by-value B\"ohm trees in light of their Taylor expansion [PDF]

open access: yesLogical Methods in Computer Science, 2020
The call-by-value lambda calculus can be endowed with permutation rules, arising from linear logic proof-nets, having the advantage of unblocking some redexes that otherwise get stuck during the reduction.
Emma Kerinec   +2 more
doaj   +1 more source

Бінарна класифікація на основі поєднання теорії приблизних множин і дерев рішень

open access: yesСучасний стан наукових досліджень та технологій в промисловості, 2023
Предмет дослідження – підвищення точності та ефективності алгоритмів класифікації на основі дерев рішень за допомогою інтеграції принципів теорії приблизних множин (Rough Set), математичного підходу до апроксимації множин. Мета дослідження – розроблення
Dmytro Chernyshov, Dmytro Sytnikov
doaj   +3 more sources

Home - About - Disclaimer - Privacy