Note on the limit property of triangular norms1
In this article, we characterize triangular norms that have not the limit property, which are applied for exploring the characterizations of function f : [0, 1] → [0, 1] with f ( x ) = lim n → ∞ x T ( n ) for a triangular norm T when the function f is continuous. In particular, we ...
Decentralized fuzzy DSC for uncertain large-scale interconnected switched systems in non-strict feedback form with input saturation
This paper demonstrates a fuzzy decentralized dynamic surface control (DSC) scheme for switched large-scale interconnected nonlinear systems under arbitrary switching, which contains non-strict feedback form and unknown input saturation uncertainties. An ...
Distance functions and filter topological residuated lattices1
In this paper, we firstly extend C. C. chang’s distance functions from MV-algebras into residuated lattices. But in general, the functions may not be a distance function on residuated lattices. We introduce weak involutory residuated lattices, in which ...
A consensus reaching model for expert behavior-driven adjustment of expert weights based on picture fuzzy sets
This article proposes an expert-driven consensus and decision-making model that comprehensively considers expert behavior in Multi-criteria decision-making (MCDM) scenarios. Under the premise that experts are willing to adjust their viewpoints, the ...
An efficient fire detection network with enhanced multi-scale feature learning and interference immunity
Effective fire detection can identify the source of the fire faster, and reduce the risk of loss of life and property. Existing methods still fail to efficiently improve models’ multi-scale feature learning capabilities, which are significant to the ...
Fusing semantic and syntactic information for aspect sentiment triplet extraction
Aspect Sentiment Triplet Extraction (ASTE) aims to extract aspect terms, sentiment polarity and opinion terms explaining the reason for the sentiment from a sentence in the form of triplets. Many existing studies model the context by graph neural ...
Dynamic security in cloud computing based on fuzzy cognitive maps
Cloud Computing is a new paradigm that provides software and hardware resources based on customers’ needs. However, data security remains a significant concern, acting as a major barrier to its widespread adoption. The objective of this work is to ...
Multi-objective configuration optimization method based on antlion algorithm for customer-oriented modular process
Process parameter configuration needs to respond quickly in the customized manufacturing environment. A multi-objective optimization method based on antlion algorithm for product process configuration design is proposed. The weight mapping mechanism of ...
Improving point cloud registration accuracy under low overlap conditions based on deep learning
Point cloud registration is crucial for analyzing and utilizing point cloud data. However, in specific scenarios, the overlap between the target and source point clouds is relatively low, significantly reducing the success rate of point cloud ...
Dynamic graph spatial-temporal dependence information extraction for remaining useful life prediction of rolling bearings
As a powerful tool for learning high-dimensional data representation, graph neural networks (GNN) have been applied to predict the remaining useful life (RUL) of rolling bearings. Existing GNN-based RUL prediction methods predominantly rely on constant ...
A network security situation prediction approach based on MAML and BiGRU
Network security situation prediction is a complex task that typically requires extensive retraining of deep-learning models on vast amounts of sample data to achieve optimal performance. This paper proposes an innovative approach that integrates Model-...
Research on adaptive circuit structure optimization in electronic design based on Asynchronous Advantage Actor Critic (A3C) algorithm
The circuit structure optimizationed with the traditional method is often difficult to meet the complex and changeable design requirements. In this paper the A3C algorithm has been applied to integrate strategy learning and value learning for the circuit ...