期刊文献+

Study on the Universality of the Normal Cloud Model 被引量:8

Study on the Universality of the Normal Cloud Model
下载PDF
导出
摘要 The distribution function is an important tool in the study of the stochastic variances. The normal distribution is very popular in the nature and our society. The idea of membership functions is the foundation of the fuzzy sets theory. While the fuzzy theory is widely used, the completely certain membership function that has no any fuzziness at all has been the bottleneck of the applications of this theory. Cloud models are the effective tools in transforming between qualitative concepts and their quantitative expressions. It can represent the fuzziness and randomness and their relations of uncertain concepts. Also cloud models can show the concept granularity in multi-scale spaces by the digital characteristic Entropy (En). The normal cloud model not only broadens the form conditions of the normal distribution but also makes the normal membership function be the expectation of the random membership degree. In this paper, the universality of the normal cloud model is proved, which is more superior and easier, and can fit the fuzziness and gentleness of human cognitive processing. It would be more applicable and universal in the representation of uncertain notions. The distribution function is an important tool in the study of the stochastic variances. The normal distribution is very popular in the nature and our society. The idea of membership functions is the foundation of the fuzzy sets theory. While the fuzzy theory is widely used, the completely certain membership function that has no any fuzziness at all has been the bottleneck of the applications of this theory. Cloud models are the effective tools in transforming between qualitative concepts and their quantitative expressions. It can represent the fuzziness and randomness and their relations of uncertain concepts. Also cloud models can show the concept granularity in multi-scale spaces by the digital characteristic Entropy (En). The normal cloud model not only broadens the form conditions of the normal distribution but also makes the normal membership function be the expectation of the random membership degree. In this paper, the universality of the normal cloud model is proved, which is more superior and easier, and can fit the fuzziness and gentleness of human cognitive processing. It would be more applicable and universal in the representation of uncertain notions.
出处 《工程科学(英文版)》 2005年第2期18-24,共7页 Engineering Sciences
基金 ThisprojectissupportedbytheNationalNaturalScienceFoundationofChinaunderGrantNo.60375016andNo.60496323.
关键词 正态分布函数 从属度 粒度 普遍性 模糊集 云模式 normal distribution function membership degree normal cloud model granularity universality
  • 相关文献

参考文献2

二级参考文献14

  • 1李德毅.发现状态空间理论[J].小型微型计算机系统,1994,15(11):1-6. 被引量:25
  • 2李德毅,孟海军,史雪梅.隶属云和隶属云发生器[J].计算机研究与发展,1995,32(6):15-20. 被引量:1221
  • 3李德毅,计算机智能接口与智能应用论文集,1993年
  • 4吴国富,实用数据分析方法,1992年
  • 5李中夫,模糊系统与数学,1987年,1卷,1期,1页
  • 6李德毅
  • 7Li Deyi,J Software,2000年,11卷,2期,143页
  • 8Jiang R,Lecture Notesin Artificial Intelligence.1574,Subseriesof Lecture Notesin Computer Science,1999年,525页
  • 9Li Deyi,Computers and Mathematic Swith Application Elsevier Science,1998年,35卷,3期,99页
  • 10Li Deyi,PAKDD’98 The Second Pacific Asia Conference on Knowledge Discovery Data Mining,1998年

共引文献1348

同被引文献91

  • 1李德毅,刘常昱,杜鹢,韩旭.不确定性人工智能[J].软件学报,2004,15(11):1583-1594. 被引量:396
  • 2肖峻,王成山,罗凤章.区间层次分析法的权重求解方法初探[J].系统工程与电子技术,2004,26(11):1597-1600. 被引量:47
  • 3李德毅,孟海军,史雪梅.隶属云和隶属云发生器[J].计算机研究与发展,1995,32(6):15-20. 被引量:1221
  • 4叶跃祥,糜仲春,王宏宇,梁晓艳.一种基于集对分析的区间数多属性决策方法[J].系统工程与电子技术,2006,28(9):1344-1347. 被引量:74
  • 5何海涛,李楠.基于SVM的改进RBF网络板形模式识别方法[J].自动化仪表,2007,28(5):1-4. 被引量:11
  • 6BATES A, MOOD B, PLETCHER J, et al. On de- tecting co-resident cloud instances using network flow water-marking techniques [J]. International Journal of Information Security, 2014, 13(2): 171-189.
  • 7GENKIN D, PIPMAN I, TROMER E. Get your hands off my laptop: physical side-channel key- extraction attacks on PCs [J]. Lecture Notes in Com- puter Science, 2014, 8731: 242-260.
  • 8WU Z, XU Z, WANG H. Whispers in the hyper- space: high-bandwidth and reliable covert channel at- tacks inside the cloud [J]. IEEE/ACM Transactions on Networking, 2015, 23(2): 603-614.
  • 9LING Z, LUO J, ZHANG Y, et al. A novel network delay based side channel attack: modeling and defense[C] /// Proceedings of the 2012 IEEE Conference on Computer Communications. Piscataway, NJ, USA: IEEE, 2012: 2390-2398.
  • 10RAJ H, NATHUJI R, SINGH A, et al. Resource management for isolation enhanced cloud services [C] //Proceedings of the 2009 ACM Workshop on Cloud Computing Security. New York, USA.. ACM, 2009: 77-84.

引证文献8

二级引证文献24

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部