Results 1 to 10 of about 1,054,854 (285)

Бінарна класифікація на основі поєднання теорії приблизних множин і дерев рішень

open access: diamondСучасний стан наукових досліджень та технологій в промисловості, 2023
Предмет дослідження – підвищення точності та ефективності алгоритмів класифікації на основі дерев рішень за допомогою інтеграції принципів теорії приблизних множин (Rough Set), математичного підходу до апроксимації множин. Мета дослідження – розроблення
Дмитро Чернишов   +1 more
doaj   +5 more sources

A characterization of trees with equal 2-domination and 2-independence numbers [PDF]

open access: yesDiscrete Mathematics & Theoretical Computer Science, 2017
A set $S$ of vertices in a graph $G$ is a $2$-dominating set if every vertex of $G$ not in $S$ is adjacent to at least two vertices in $S$, and $S$ is a $2$-independent set if every vertex in $S$ is adjacent to at most one vertex of $S$.
Christoph Brause   +2 more
doaj   +3 more sources

From Proof Nets to the Free *-Autonomous Category [PDF]

open access: yesLogical Methods in Computer Science, 2006
In the first part of this paper we present a theory of proof nets for full multiplicative linear logic, including the two units. It naturally extends the well-known theory of unit-free multiplicative proof nets.
Francois Lamarche, Lutz Strassburger
doaj   +10 more sources

Overcoming the uncertainty in a research reactor LOCA in level-1 PSA; Fuzzy based fault-tree/event-tree analysis [PDF]

open access: yesJournal of Optimization in Industrial Engineering, 2020
Probabilistic safety assessment (PSA) which plays a crucial role in risk evaluation is a quantitative approach intended to demonstrate how a nuclear reactor meets the safety margins as part of the licensing process.
Masoud Mohsendokht   +1 more
doaj   +1 more source

Meta-Tree Random Forest: Probabilistic Data-Generative Model and Bayes Optimal Prediction

open access: yesEntropy, 2021
This paper deals with a prediction problem of a new targeting variable corresponding to a new explanatory variable given a training dataset. To predict the targeting variable, we consider a model tree, which is used to represent a conditional ...
Nao Dobashi   +3 more
doaj   +1 more source

Revisiting Call-by-value B\"ohm trees in light of their Taylor expansion [PDF]

open access: yesLogical Methods in Computer Science, 2020
The call-by-value lambda calculus can be endowed with permutation rules, arising from linear logic proof-nets, having the advantage of unblocking some redexes that otherwise get stuck during the reduction.
Emma Kerinec   +2 more
doaj   +1 more source

On Laws of Thought—A Quantum-like Machine Learning Approach

open access: yesEntropy, 2023
Incorporating insights from quantum theory, we propose a machine learning-based decision-making model, including a logic tree and a value tree; a genetic programming algorithm is applied to optimize both the logic tree and value tree.
Lizhi Xin, Kevin Xin, Houwen Xin
doaj   +1 more source

Construction of a local location program on the basis of “decision tree” [PDF]

open access: yesBiuletyn Wojskowej Akademii Technicznej, 2019
The article presents the problems of building a damage location program in a technical facility based on the theory of the “decision tree”. The basis in such a decision-making process is the functional and diagnostic analysis of the tested technical ...
Przemysław Duer   +2 more
doaj   +1 more source

Qualitative motivation with sets and relations

open access: yesFrontiers in Psychology, 2023
In self-determination theory (SDT), multiple conceptual regulations of motivation are posited. These forms of motivation are especially qualitatively viewed by SDT researchers, and there are situations in which combinations of these regulations occur. In
Ali Ünlü
doaj   +1 more source

Hardware Reliability Analysis of a Coal Mine Gas Monitoring System Based on Fuzzy-FTA

open access: yesApplied Sciences, 2021
The hardware reliability of a gas monitoring system was investigated using the fuzzy fault tree analysis method. A fault tree was developed considering the hardware failure of the gas monitoring system as a top event.
Jingtian Xu, Man Yang, Shugang Li
doaj   +1 more source

Home - About - Disclaimer - Privacy