Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Volume 497, Issue CDec 2024
Publisher:
  • Elsevier North-Holland, Inc.
  • 655 Avenue of the Americas New York, NY
  • United States
ISSN:0165-0114
Reflects downloads up to 18 Feb 2025Bibliometrics
Skip Table Of Content Section
research-article
Belief Horn merging operators: Characterization results and implementations
Abstract

The paper contributes to the study of belief merging in many-valued logics, taking both a theoretical and implementation approach motivated by applications in real-world scenarios. We focus, in particular, on the Horn fragment of signed logic. On ...

research-article
Characterizations for convolution lattices based on non-distributive lattices
Abstract

Recently, De Miguel, Bustince and De Baets have conducted a systematic study on convolution lattices based on distributive lattices. There have been few reports on applying non-distributive lattices to a domain of functions. As a complement to ...

research-article
On the local quadratic stability of T–S fuzzy systems in the vicinity of the origin
Abstract

The main goal of this paper is to introduce new local stability conditions for continuous-time Takagi-Sugeno (T-S) fuzzy systems. These stability conditions are based on linear matrix inequalities (LMIs) in combination with quadratic Lyapunov ...

research-article
The continuous Choquet integral representation theorems in an abstract setting
Abstract

The purpose of the paper is to formulate Choquet integral representation theorems for a monotone functional on a collection of functions in such a way that the representing measures are simultaneously inner and outer continuous on appropriate ...

    research-article
    Protocol-based secure guaranteed cost control of sampled-data T-S fuzzy system with denial-of-service attack and input saturation
    Abstract

    This paper proposes a protocol-based secure guaranteed cost sampled-data controller design problem of Takagi-Sugeno (T-S) fuzzy system under denial-of-service (DoS) attack and input saturation. First, in the absence of an effective description ...

    research-article
    Weaker forms of increasingness of binary operations and their role in the characterization of meet and join operations
    Abstract

    Due to the lack of transitivity of the pseudo-order relation of a proper trellis, its meet and join operations are not increasing. In this paper, we identify weaker forms of increasingness of binary operations that are satisfied by the meet and/...

    research-article
    Fuzzy prime filter theorem in multilattices
    Abstract

    This paper mainly focuses on building the fuzzy prime filter theorem for multilattices. Firstly, we introduce the notion of a fuzzy filter generated by a fuzzy subset of a multilattice and we give a characterization. Also, we define four types of ...

    Comments