Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
fuzzy set theory
biblio
Research on Industrial Data Desensitization Algorithm Based on Fuzzy Set
Submitted by grigby1 on Thu, 02/10/2022 - 2:18pm
industrial control
Humidity
Fuzzy sets
fuzzy set theory
emergency services
Databases
Data models
data desensitization
membership
industrial data desensitization scheme
biblio
Implementation of Fuzzy Logic Control in Predictive Analysis and Real Time Monitoring of Optimum Crop Cultivation : Fuzzy Logic Control In Optimum Crop Cultivation
Submitted by grigby1 on Mon, 03/29/2021 - 1:03pm
fuzzy set theory
Temperature distribution
Temperature control
Soil
security
Resiliency
resilience
pubcrawl
predictive analysis
optimum crop cultivation
optimisation
Monitoring
Metrics
Agriculture
fuzzy logic set
fuzzy logic network
fuzzy logic control
Fuzzy logic
fuzzy control
data science
Cyber Physical System
crops
Crop Production
Conferences
Cloud Computing
biblio
An Improved Fuzzy Min–Max Neural Network for Data Classification
Submitted by aekwall on Mon, 03/22/2021 - 12:12pm
Brain modeling
semiperimeter
pattern classification problems
k-nearest FMM
improved fuzzy min-max network
improved FMM network
IFMM network
hyperbox semiperimeter
hyperbox classifier
histopathological images
fuzzy neural nets
fuzzy min–max (FMM) neural network
fuzzy min-max network
Euclidian geometry
Enhanced fuzzy min–max (EFMM) model
Adaptation models
minimax techniques
adaptive systems
Compositionality
expandability
data classification
image classification
Biological neural networks
Artificial Neural Networks
fuzzy set theory
Training
pattern classification
pubcrawl
Resiliency
nearest neighbour methods
biblio
F-DPC: Fuzzy Neighborhood-Based Density Peak Algorithm
Submitted by aekwall on Mon, 03/22/2021 - 12:11pm
expandability
neighborhood membership
local density
fuzzy neighborhood-based density peak algorithm
fuzzy neighborhood relationship
fuzzy neighborhood density peak clustering
fuzzy neighborhood
F-DPC
degree of membership
Compositionality
Partitioning algorithms
data objects
Classification algorithms
Heuristic algorithms
pattern clustering
fuzzy set theory
Data mining
clustering
Clustering algorithms
Shape
Robustness
Licenses
pubcrawl
Resiliency
biblio
Improving Fuzzing through Controlled Compilation
Submitted by aekwall on Mon, 03/15/2021 - 11:09am
beneficial compiler optimizations
standard compilers
rigorous evaluation methodology
qualitative coverage
program line
LLVM
Intermediate Representation
grey-box fuzzers
fuzzing strategy
fuzzing consistency
current coverage-based evaluation measures
coverage metrics
coverage mesaures
coverage
controlled compilation
concolic fuzzers
security of data
AFL's configuration
AFL
open source projects
source code
fuzzing
compiler security
program compilers
Compositionality
fuzzy set theory
program testing
Metrics
pubcrawl
Resiliency
Scalability
biblio
Constrained Interval Type-2 Fuzzy Classification Systems for Explainable AI (XAI)
Submitted by aekwall on Mon, 03/01/2021 - 4:01pm
xai
type-reduction step
output interval centroid
IT2
interval type-2 fuzzy logic
inherently interpretable structure
fuzzy logic systems
explainable type-2 fuzzy systems
explainable CIT2 classifiers
constrained interval type-2 fuzzy sets
constrained interval type-2 fuzzy classification systems
Constrained interval type-2
classification reliability
explainable artificial intelligence
Intelligent systems
Scalability
explainable AI
Artificial Intelligence
Switches
Linguistics
Fuzzy sets
Indexes
Generators
fuzzy set theory
Fuzzy logic
natural language
pattern classification
Shape
pubcrawl
Resiliency
biblio
XAI-Based Fuzzy SWOT Maps for Analysis of Complex Systems
Submitted by aekwall on Mon, 03/01/2021 - 4:00pm
Optimized production technology
XAI-Based system analysis
SWOT+CWW network
SWOT analyses
software tool
fuzzy SWOT maps network structure
Fuzzy SWOT Maps
explanation
explainable artificial intelligence
Dynamic SWOT analysis
computing with words
Fuzzy cognitive maps
Scalability
xai
FCM
cognitive systems
Artificial Intelligence
complex systems
cognition
software tools
fuzzy set theory
pubcrawl
Resiliency
real-time systems
biblio
Safe Traffic Adaptation Model in Wireless Mesh Networks
Submitted by aekwall on Mon, 03/01/2021 - 3:42pm
Linguistics
Wireless Mesh Network Security
self-organized technology
self-configured technology
safe traffic adaptation model
safe traffic adaptation
queue length
performance efficiency
network traffic load
fuzzy framework
future queue state
explicit rate messages
queueing theory
Monitoring
wireless mesh networks
delays
control systems
fuzzy set theory
Fuzzy logic
internet
Metrics
composability
pubcrawl
Resiliency
real-time systems
telecommunication traffic
biblio
Optimal Selection of Cryptographic Algorithms in Blockchain Based on Fuzzy Analytic Hierarchy Process
Submitted by aekwall on Mon, 01/18/2021 - 10:35am
fuzzy set theory
Fuzzy Cryptography
symmetric cryptographic algorithms
suitable cryptographic algorithm
SHA256
fuzzy analytic hierarchy process
FAHP
experts grading method
ECDSA
asymmetric cryptographic algorithms
financial data processing
AES
cryptographic algorithms
security
cryptocurrencies
analytic hierarchy process
Distributed databases
blockchain
Metrics
Cryptography
pubcrawl
Resiliency
Hardware
data privacy
Computational efficiency
Scalability
biblio
A Fuzzy String Matching Scheme Resistant to Statistical Attack
Submitted by aekwall on Mon, 01/18/2021 - 10:35am
Indexes
vector index
string matching
statistical attack
secure fuzzy query
Scalability
S-BF
Resistance
Resiliency
query processing
pubcrawl
noise vector
Metrics
Bloom filter
fuzzy string matching scheme
fuzzy set theory
fuzzy query scheme
Fuzzy Query
Fuzzy Cryptography
frequency distribution
encryption
Encrypted Cloud Database
data structures
Cryptography
Cloud Computing
1
2
3
4
5
6
7
8
9
next ›
last »