Fuzzy logic based security region evaluation of the urban rail transit operating system
暂无分享,去创建一个
[1] Tongwen Chen,et al. A new method for stabilization of networked control systems with random delays , 2005 .
[2] John A. Stankovic,et al. Security in wireless sensor networks , 2004, SASN '04.
[3] Krassimir T. Atanassov,et al. Intuitionistic fuzzy sets , 1986 .
[4] Lotfi A. Zadeh,et al. Fuzzy Logic , 2009, Encyclopedia of Complexity and Systems Science.
[5] Sharath Pankanti,et al. Biometrics: a tool for information security , 2006, IEEE Transactions on Information Forensics and Security.
[6] Jerry M. Mendel,et al. Connect Karnik-Mendel Algorithms to Root-Finding for Computing the Centroid of an Interval Type-2 Fuzzy Set , 2011, IEEE Transactions on Fuzzy Systems.
[7] Matthieu R. Bloch,et al. Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.
[8] Tassos Dimitriou,et al. Autonomic Communication Security in Sensor Networks , 2005, WAC.
[9] Hsing-Chia Kuo,et al. An image tracking system for welded seams using fuzzy logic , 2002 .
[10] Dong Tao Wang,et al. Security Region Based Dynamic Security Risk Assessment of Power Transmission System , 2012 .
[11] Lotfi A. Zadeh,et al. Toward extended fuzzy logic - A first step , 2009, Fuzzy Sets Syst..
[12] Pla Information,et al. Identity-Based Secure Inter-Domain Routing Protocol , 2009 .
[13] Shiwei Xia,et al. The Application of Energy Sensitivity for Practical Dynamic Security Region Calculation , 2012 .
[14] Lech J. Janczewski,et al. Development of Information Security Baselines for Healthcare Information Systems in New Zealand , 2002, Comput. Secur..
[15] M. K. Angelova,et al. Intuitionistic fuzzy logic based quality assessment of simple genetic algorithm , 2012, 2012 16th International Conference on System Theory, Control and Computing (ICSTCC).
[16] S. Chakravartya,et al. A PSO based integrated functional link net and interval type-2 fuzzy logic system for predicting stock market indices , 2015 .
[17] Essam A. Al-Ammar,et al. Framework for Identification of Power System Operating Security Regions , 2009, 2009 Third International Conference on Network and System Security.
[18] Masaharu Mizumoto,et al. Some Properties of Fuzzy Sets of Type 2 , 1976, Inf. Control..
[19] Atef Ghobrial,et al. Evaluating security of rail transit systems: A metric system approach , 1995 .
[20] Dimitris Skarlatos,et al. Railway wheel fault diagnosis using a fuzzy-logic method , 2004 .
[21] Jia Limin. Security region estimation of peak amplitudes of track irregularities based on danger points distribution ratio and SVM , 2012 .
[22] Chengshan Wang,et al. Distribution system security region: definition, model and security assessment , 2012 .
[23] Jerry M. Mendel,et al. Interval type-2 fuzzy logic systems , 2000, Ninth IEEE International Conference on Fuzzy Systems. FUZZ- IEEE 2000 (Cat. No.00CH37063).
[24] Yu Yi-xin. Review of Study on Methodology of Security Regions of Power System , 2008 .
[25] George Gargov,et al. Elements of intuitionistic fuzzy logic. Part I , 1998, Fuzzy Sets Syst..
[26] Enrique E. Mombello,et al. Expert system for the assessment of power transformer insulation condition based on type-2 fuzzy logic systems , 2011, Expert Syst. Appl..
[27] A. M. El-Zonkoly,et al. Optimal tunning of lead-lag and fuzzy logic power system stabilizers using particle swarm optimization , 2009, Expert Syst. Appl..
[28] Robert Ivor John,et al. A survey-based type-2 fuzzy logic system for energy management in hybrid electrical vehicles , 2012, Inf. Sci..
[29] J. Mendel. Fuzzy logic systems for engineering: a tutorial , 1995, Proc. IEEE.
[30] Anastasia Loukaitou-Sideris,et al. Rail Transit Security in an International Context , 2006 .
[31] Jerry M. Mendel,et al. Type-2 fuzzy logic systems , 1999, IEEE Trans. Fuzzy Syst..
[32] Hani Hagras,et al. An interval type-2 Fuzzy Logic based system for model generation and summarization of arbitrage opportunities in stock markets , 2012, 2012 12th UK Workshop on Computational Intelligence (UKCI).
[33] Binqiang Wang,et al. Identity-Based Secure Inter-Domain Routing Protocol: Identity-Based Secure Inter-Domain Routing Protocol , 2009 .
[34] Hani Hagras,et al. A hierarchical type-2 fuzzy logic control architecture for autonomous mobile robots , 2004, IEEE Transactions on Fuzzy Systems.
[35] Jerry M. Mendel,et al. Study on enhanced Karnik-Mendel algorithms: Initialization explanations and computation improvements , 2012, Inf. Sci..
[36] G. Pillai,et al. Design of an Interval Type-2 Fuzzy Logic Controller for Automatic Voltage Regulator System , 2011 .
[37] Jerry M. Mendel,et al. Interval Type2 Fuzzy Sets , 2010 .