Based on the above discussion, this article proposes the quantum pythagorean fuzzy evidence theory (QPFET), which is the novel work to consider QPFET from the point of negation. Besides, there are some numerical examples to explain the proposed method. In order to explore the applications of ...
For a decision maker with utility function u, probability weighting function w and initial wealth W, the utility of Lottery L is given by (3)UR(L)=w(p1L)u(W+x1L)+(1−w(p1L))u(W+x2L)From Eq. (3), we can easily retrieve the usual Expected utility theory by letting w(p)=...
As stated above, if the capacitor C couples to the maximally fuzzy charge (reaching linearly into the wire, see Fig. 3c), then ES is simply a constant, and the Legendre transformation can be performed without any problems. We here however want to make predictions which are valid also for ...
This strategy seeks to remove unnecessary nodes from the inputs of feedforward neural networks, leading to substantial improvements in accuracy and precision74,75. A fuzzy inference system that leverages an adaptive network and decision tree methodologies has shown considerable classification accuracies76...
[61,62]. Other studies have demonstrated the efficacy of tribal competition models and rule-based fuzzy classifiers in achieving high classification accuracies, with tribal competition models reaching 98.32% and fuzzy classifiers achieving 97.57% [63,64]. Table1provides a structured summary of key ...
Likelihood-fuzzy analysis: from data, through statistics, to interpretable fuzzy classifiers. Int. J. Approx. Reason. https://doi.org/10.1016/j.ijar.2017.10.022 (2018). Article MathSciNet MATH Google Scholar Maalmi, K. Breast cancer classification with reduced feature set using association ...
a cave so that they can only see the shadows which are cast on the walls of the cave by a fire. To these people, the shadows represent the totality of their existence – it is impossible for them to imagine a reality which consists of anything other than the fuzzy shadows on the wall...
[22] proposed a secure mutual authentication scheme in Metaverse environment for safer user-server and avatar–avatar interactions using elliptic curve cryptography and fuzzy extractor. Ou et al. [23] proposed a TDS-NA scheme based on blockchain and improved public key infrastructure to build a ...
An Efficient Quantum Inspired Genetic Algorithm with Chaotic Map Model Based Interference and Fuzzy Objective Function for Gray Level Image Thresholding A genetic algorithm inspired by the inherent features of parallelism and time discreteness exhibited by quantum mechanical systems, is presented in this ar...
Enlightenment hegemony over the Western intellectual outlook, which can be summarized briefly as follows: that there exists an external world, whose properties are independent of any individual human being and indeed of humanity as a whole; that these properties are encoded in ``eternal'' physical ...