Results 11 to 20 of about 1,047,288 (209)

A characterization of trees with equal 2-domination and 2-independence numbers [PDF]

open access: yesDiscrete Mathematics & Theoretical Computer Science, 2017
A set $S$ of vertices in a graph $G$ is a $2$-dominating set if every vertex of $G$ not in $S$ is adjacent to at least two vertices in $S$, and $S$ is a $2$-independent set if every vertex in $S$ is adjacent to at most one vertex of $S$.
Christoph Brause   +2 more
doaj   +3 more sources

From Proof Nets to the Free *-Autonomous Category [PDF]

open access: yesLogical Methods in Computer Science, 2006
In the first part of this paper we present a theory of proof nets for full multiplicative linear logic, including the two units. It naturally extends the well-known theory of unit-free multiplicative proof nets.
Francois Lamarche, Lutz Strassburger
doaj   +10 more sources

Integrating Fuzzy Set Theory with Pandora Temporal Fault Trees for Dynamic Failure Analysis of Complex Systems [PDF]

open access: green
Pandora temporal fault tree, as one notable extension of the fault tree, introduces temporal gates and temporal laws. Pandora Temporal Fault Tree(TFT) enhances the capability of fault trees and enables the modeling of system failure behavior that depends on sequences.
Hitesh Khungla, Mohit Kumar
openalex   +3 more sources

Comparative Study of Decision Trees and Rough Sets Theory as Knowledge ExtractionTools for Design and Control of Industrial Processes

open access: closed, 2010
General requirements for knowledge representation in the form of logic rules, applicable to design and control of industrial processes, are formulated. Characteristic behavior of decision trees (DTs) and rough sets theory (RST) in rules extraction from recorded data is discussed and illustrated with simple examples.
M. Perzyk, A. Soroczyński
openalex   +2 more sources

Overcoming the uncertainty in a research reactor LOCA in level-1 PSA; Fuzzy based fault-tree/event-tree analysis [PDF]

open access: yesJournal of Optimization in Industrial Engineering, 2020
Probabilistic safety assessment (PSA) which plays a crucial role in risk evaluation is a quantitative approach intended to demonstrate how a nuclear reactor meets the safety margins as part of the licensing process.
Masoud Mohsendokht   +1 more
doaj   +1 more source

Meta-Tree Random Forest: Probabilistic Data-Generative Model and Bayes Optimal Prediction

open access: yesEntropy, 2021
This paper deals with a prediction problem of a new targeting variable corresponding to a new explanatory variable given a training dataset. To predict the targeting variable, we consider a model tree, which is used to represent a conditional ...
Nao Dobashi   +3 more
doaj   +1 more source

Revisiting Call-by-value B\"ohm trees in light of their Taylor expansion [PDF]

open access: yesLogical Methods in Computer Science, 2020
The call-by-value lambda calculus can be endowed with permutation rules, arising from linear logic proof-nets, having the advantage of unblocking some redexes that otherwise get stuck during the reduction.
Emma Kerinec   +2 more
doaj   +1 more source

Бінарна класифікація на основі поєднання теорії приблизних множин і дерев рішень

open access: yesСучасний стан наукових досліджень та технологій в промисловості, 2023
Предмет дослідження – підвищення точності та ефективності алгоритмів класифікації на основі дерев рішень за допомогою інтеграції принципів теорії приблизних множин (Rough Set), математичного підходу до апроксимації множин. Мета дослідження – розроблення
Dmytro Chernyshov, Dmytro Sytnikov
doaj   +3 more sources

On Laws of Thought—A Quantum-like Machine Learning Approach

open access: yesEntropy, 2023
Incorporating insights from quantum theory, we propose a machine learning-based decision-making model, including a logic tree and a value tree; a genetic programming algorithm is applied to optimize both the logic tree and value tree.
Lizhi Xin, Kevin Xin, Houwen Xin
doaj   +1 more source

Home - About - Disclaimer - Privacy