ARTICLE
TITLE

New Discrete Tanaka Sugeno Kang Fuzzy Systems Characterization and Stability Domain

SUMMARY

In this paper, an analytical approach to characterize discrete Tanaka Sugeno Kang (TSK) fuzzy systems is presented. This characterization concerns the choice of the adequate conjunctive operator between input variables of discrete TSK fuzzy models, t-norm, and its impact on stability domain estimation. This new approach is based on stability conditions issued from vector norms corresponding to a vector-Lyapunov function. In particular, second order discrete TSK models are considered and this work concludes that Zadeh’s t-norm, logic product min, gives the largest estimation of stability domain.

 Articles related

Amelia Pratiwi, Aries Suharso, Hannie Hannie    

The e-KTP service is very important for the community as an identification or identity card for Indonesian citizens. So it is necessary to do this research to find out the value of community satisfaction with e-KTP services, so that later it becomes a re... see more


(1) Heri Prasetyo (Department of Informatics, Universitas Sebelas Maret, Indonesia) (2) Didi Rosiyadi (Research Center for Informatics, Indonesian Institute of Sciences (LIPI), Indonesia) (3) Shi Jinn Horng (Department of Computer Science and Information Engineering, National Taiwan University of Science and Technology, Taiwan, Province of China) (4) Iwan Setiawan (Research Center for Informatics, Indonesian Institute of Sciences (LIPI), Indonesia) (5) Akbari Indra Basuki (Research Center for Informatics, Indonesian Institute of Sciences (LIPI), Indonesia)    

Currently, with a malicious attacker against the authorization of an image it is necessary to have a method to secure the content of the image. Therefore this paper presents a new technique for performing image confusion and diffusion using Two Dimension... see more


Darko Skorin-Kapov    

We investigate the cost allocation strategy associated with the problem of providing some network service from source to a number of users, via the Minimum Cost Steiner Tree Network that spans the source and all the receivers. The cost of such a Steiner ... see more


Youcef Gheraibia,Abdelouahab Moussaoui,Youcef Djenouri,Sohag Kabir,Peng Yeng Yin    

Association Rules Mining (ARM) is one of the most popular and well-known approaches for the decision-making process. All existing ARM algorithms are time consuming and generate a very large number of association rules with high overlapping. To deal with ... see more


Nur Sahida Amin,Dalilah Abdullah    

Image forgery is a manipulation of digital image to hide or remove some meaningful information or object in the image. The detection of forged image is driven by need of authenticity and to maintain integrity also confidentiality of the image. “Image For... see more