... understanding of the theory of type- 2 fuzzy logic, Chapter provides a brief description of the fundamental theory of type- 2 fuzzy logic including the basics of type- 2 fuzzy set and type- 2 fuzzy logic ... Type- 2 Fuzzy Sets 21 Centroid of a Type- 2 Fuzzy Set 23 2. 2.1 Centroid of a Type- 2 Fuzzy Set 23 2. 2 .2 Centroid...
Ngày tải lên: 09/09/2015, 18:49
Tài liệu The Benefits of Bank Deposit Rate Ceilings: New Evidence on Bank Rates and Risk in the 1920s (p. 2) docx
... 1987 The Benefits of Bank Deposit Rate Ceilings: New Evidence on Bank Rates and Risk in the 1920s Arthur J Rolnick Senior Vice President and Director of Research Federal Reserve Bank of Minneapolis ... removal of ceilings, the result that there was no correlation between bank rates and bank risk The result is suspect for both methodolo...
Ngày tải lên: 15/02/2014, 05:20
Tài liệu Báo cáo khoa học: "An Entity-Mention Model for Coreference Resolution with Inductive Logic Programming" pdf
... the ordinary entity-mention model with heuristic first-order features Conclusions This paper presented an expressive entity-mention model for coreference resolution by using Inductive Logic Programming ... cannot co-refer with “she” The entity-mention model based on Eq (2) performs coreference resolution at an entity-level For simplicity, the framework considere...
Ngày tải lên: 20/02/2014, 09:20
Tài liệu Báo cáo khoa học: "ISSUES IN NATURAL LANGUAGE ACCESS TO DATABASES FROM A LOGIC PROGRAMMING PERSPECTIVE" doc
... 309-336 [Presented as -~-An interesting natural language subset" at the Workshop on Logic and Databases, Toulouse, 1977] Dahl V Translating Spanish into logic through loglc AJCL 7, (Sep 1981), ... predicates over indexed sets Consider, for example, "Are the major cities of the Scandinavian countries linked by rail?" In cases involving aggregate operators such as "total" and "averag...
Ngày tải lên: 21/02/2014, 20:20
A logic-programming approach to network security analysis potx
... various information and tools together, yielding an end -to- end automatic system Attack graphs One purpose of network security analysis is to generate an attackgraph Roughly speaking, an attack ... suitable for network attack analysis Datalog is popular in deductive databases, and several decades of work in developing reasoning engines for databases has yielded tools that can eva...
Ngày tải lên: 05/03/2014, 21:20
Báo cáo khoa học: "Learning Constraint Grammar-style disambiguation rules using Inductive Logic Programming" potx
... lexical rules were produced this way The role of lexical rules and 'idioms' is to remove the simple cases of ambiguities, making it possible for the induced rules to fire, since these rules are ... tagging using Progol In Proceedings of the 7th Inter- 779 national Workshop on Inductive Logic Programming (ILP-97), pages 93-108 Martin Eineborg and Nikolaj Lindberg 1998 Induction o...
Ngày tải lên: 17/03/2014, 07:20
Báo cáo khoa học: Functional expression of the quinoline 2-oxidoreductase genes (qorMSL) in Pseudomonas putida KT2440 pUF1 and in P. putida 86-1 Dqor pUF1 and analysis of the Qor proteins doc
... the pyranopterin part of the cofactor is somehow defective in Qor from strain KT2440 pUF1 UV/Visual spectra of the Qor proteins from P putida 86, P putida KT2440 pUF1 and P putida 86-1 Dqor pUF1 ... putida 86-1 Dqor pUF1 is not able to grow on quinoline as a sole source of carbon Kinetic properties of the Qor proteins from P putida...
Ngày tải lên: 17/03/2014, 10:20