Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "Zarzycki, T." wg kryterium: Autor


Wyświetlanie 1-2 z 2
Tytuł:
Center of circles intersection, a new defuzzification method for fuzzy numbers
Autorzy:
Zarzycki, H.
Dobrosielski, W. T.
Apiecionek, Ł.
Vince, T.
Powiązania:
https://bibliotekanauki.pl/articles/200363.pdf
Data publikacji:
2020
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
defuzzification
fuzzy logic
ordered fuzzy numbers
Opis:
The article introduces a new proposal of a def uzzification method, which can be implemented in fuzzy controllers. The first chapter refers to the origin of fuzzy sets. Next, a modern development based on this theory is presented in the form of ordered fuzzy numbers (OFN). The most important characteristics of ordered fuzzy numbers are also presented. In the following chapter, details about the defuzzification process are given as part of the fuzzy controller model. Then a new method of defuzzification is presented. The method is named center of circles intersection (CCI). The authors compare this method with a similar geometric solution: triangular expanding (TE) and geometric mean (GM). Also, the results are compared with other methods such as center of gravity (COG), first of maxima (FOM) and last of maxima (LOM). The analysis shows that the proposed solution works correctly and provides results for traditional fuzzy numbers as well as directed fuzzy numbers. The last chapter contains a summary, in which more detailed conclusions are provided and further directions of research are indicated.
Źródło:
Bulletin of the Polish Academy of Sciences. Technical Sciences; 2020, 68, 2; 185-190
0239-7528
Pojawia się w:
Bulletin of the Polish Academy of Sciences. Technical Sciences
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Authentication over Internet Protocol
Autorzy:
Apiecionek, Ł.
Czerniak, J. M.
Romantowski, M.
Ewald, D.
Tsizh, B.
Zarzycki, H.
Dobrosielski, W. T.
Powiązania:
https://bibliotekanauki.pl/articles/202193.pdf
Data publikacji:
2020
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
network security
communication
Internet Protocol
DoS attacks
Opis:
Defending against DoS (denial of service) attacks has become a great challenge, especially for institutions that provide access to their services in the public network. State-of-the-art identity concealing tools and vast number of computers connected to the network require ensuring appropriate means for entities at risk to enable defence from the particular type of threats. This article presents a concept of user authentication in IP communication. The concept consists in providing the receiver with the possibility to determine sender՚s identity at the Internet layer level. This provides both the capability of defence against DoS attacks and possibility of utilizing the presented model over existing Internet network, which is directly responsible for transmission. The authors hope that the concept is a significant step in the perception of public network data transmission.
Źródło:
Bulletin of the Polish Academy of Sciences. Technical Sciences; 2020, 68, 2; 245-253
0239-7528
Pojawia się w:
Bulletin of the Polish Academy of Sciences. Technical Sciences
Dostawca treści:
Biblioteka Nauki
Artykuł
    Wyświetlanie 1-2 z 2

    Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies