scholarly journals Approximation of fuzzy numbers by nonlinear Bernstein operators of max-product kind

Author(s):  
Lucian Coroianu ◽  
Sorin G. Gal ◽  
Barnabas Bede
2020 ◽  
Vol 2020 ◽  
pp. 1-8
Author(s):  
Abdullah Alotaibi

We define the notions of weighted λ,μ-statistical convergence of order γ1,γ2 and strongly weighted λ,μ-summability of γ1,γ2 for fuzzy double sequences, where 0<γ1,γ2≤1. We establish an inclusion result and a theorem presenting a connection between these concepts. Moreover, we apply our new concept of weighted λ,μ-statistical convergence of order γ1,γ2 to prove Korovkin-type approximation theorem for functions of two variables in a fuzzy sense. Finally, an illustrative example is provided with the help of q-analogue of fuzzy Bernstein operators for bivariate functions which shows the significance of our approximation theorem.


2014 ◽  
Vol 257 ◽  
pp. 41-66 ◽  
Author(s):  
Lucian Coroianu ◽  
Sorin G. Gal ◽  
Barnabás Bede

2020 ◽  
Vol 7 (1) ◽  
pp. 72-83
Author(s):  
Alevtina Yu. Shatalova ◽  
◽  
Igor V. Shevchenko ◽  
Boureima Bamadio ◽  
Konstantin A. Lebedev ◽  
...  

2020 ◽  
Vol S (1) ◽  
pp. 295-298
Author(s):  
Stephen Dinagar D. ◽  
Manvizhi M.
Keyword(s):  

2018 ◽  
Vol 9 (11) ◽  
pp. 1717-1727
Author(s):  
Ajay Minj ◽  
Pathinathan T.

Entropy ◽  
2020 ◽  
Vol 22 (4) ◽  
pp. 474 ◽  
Author(s):  
Lazaros Moysis ◽  
Christos Volos ◽  
Sajad Jafari ◽  
Jesus M. Munoz-Pacheco ◽  
Jacques Kengne ◽  
...  

A modification of the classic logistic map is proposed, using fuzzy triangular numbers. The resulting map is analysed through its Lyapunov exponent (LE) and bifurcation diagrams. It shows higher complexity compared to the classic logistic map and showcases phenomena, like antimonotonicity and crisis. The map is then applied to the problem of pseudo random bit generation, using a simple rule to generate the bit sequence. The resulting random bit generator (RBG) successfully passes the National Institute of Standards and Technology (NIST) statistical tests, and it is then successfully applied to the problem of image encryption.


Author(s):  
Raissa T. Vieira ◽  
Carlos Eduardo de Oliveira Chierici ◽  
Carolina T. Ferraz ◽  
Adilson Gonzaga

Sign in / Sign up

Export Citation Format

Share Document