Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
Teoría de conjuntos
13
Aritmética
4
Matemáticas
4
Fundamentos
3
Historia
3
Lógica matemática
3
Teoría axiomática de los conjuntos
3
Algebra universal
1
An©Łlisis matem©Łtico
1
Análisis combinatorio
1
Análisis matemático
1
Apreciación musical
1
Archival Science
1
Archivística
1
Aspectos políticos
1
Colección
1
Collection
1
Conjuntos (Matemáticas)
1
Conjuntos (matemáticas)
1
Conjuntos, Teoria de (Matemáticas)
1
Ecuaciones diferenciales
1
Filosofía de las matemáticas
1
Fondo
1
Fonds
1
Formas musicales
1
Libros de textos
1
Lógica
1
Medios de comunicación de masas
1
Política y prensa
1
Principios generales (Logica matematica, graficas, modelos matematicos)
1
-
241“…Outlining a new research direction in fuzzy set theory applied to data mining, this volume proposes a number of new data mining algorithms and includes dozens of figures and illustrations that help the reader grasp the complexities of the concepts.…”
Enlace del recurso
-
242“…It contains most of the authors' research results in the field of fuzzy set theory and has evolved from lecture notes over the last three decades.…”
Enlace del recurso
-
243
-
244por Rucker, Rudy“…Infinity and the mind is a fascinating introduction to different number systems, to set theory, to logical paradoxes, to the ideas behind artificial intelligence. …”
Publicado 1984
Enlace del recurso
-
245por Feizizadeh, Bakhtiar, Shadman Roodposhti, Majid, Jankowski, Piotr, Blaschke, Thomas“…Results indicated that the integration of fuzzy set theory with AHP produced significantly improved accuracies and a high level of reliability in the resulting landslide susceptibility map. …”
Publicado 2014
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
246
-
247“…It includes research papers dealing with determinacy hypotheses and their consequences in descriptive set theory. An appendix contains the new Victoria Delfino Problems.…”
Enlace del recurso
Enlace del recurso
-
248por Rădulescu, Teodora-LilianaTabla de Contenidos: “…Sequences -- Series -- Limits of functions -- Continuity -- Differentiability -- Convex functions -- Inequalities and extremum problems -- Antiderivatives -- Riemann integrability -- Applications of the intergal calculus -- Appendix A: Basic elements of set theory -- Appendix B: Topology of the real line -- Glossary.…”
Publicado 2009
Libro -
249“…These results put excursion set theory on firmer mathematical foundation and confirm that excursion set theory does not reproduce well the results of N-body simulations when combined with the spherical collapse model with fixed collapse barrier. …”
Enlace del recurso
Enlace del recurso
-
250por Żyluk, Andrzej, Kuźma, Konrad, Grzesik, Norbert, Zieja, Mariusz, Tomaszewska, Justyna“…The research objectives include an analysis of statistical data, a reliability analysis in the classical approach, a reliability analysis in the fuzzy set theory approach, and a comparison of the obtained results. …”
Publicado 2021
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
251“…There are several well-known theories to describe uncertainty, for instance, fuzzy set theory, rough set theory, and other mathematical tools. …”
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
252“…It is assumed that the reader has some knowledge of set theory, algebra, analysis and basic general topology.…”
Enlace del recurso
-
253por Roselló, Joan“…From Foundations to Philosophy of Mathematics provides an historical introduction to the most exciting period in the foundations of mathematics, starting with the discovery of the paradoxes of logic and set theory at the beginning of the twentieth century and continuing with the great foundational debate that took place in the 1920s. …”
Publicado 2012
Enlace del recurso
-
254por Tkachuk, Vladimir V“…Additionally, the material can also be considered as an introduction to advanced set theory and descriptive set theory, presenting diverse topics of the theory of function spaces with the topology of pointwise convergence, or Cp-theory which exists at the intersection of topological algebra, functional analysis and general topology. …”
Publicado 2014
Enlace del recurso
Enlace del recurso
-
255“…Since the 1960s, many observed cognitive behaviors have been shown to violate rules based on classical probability and set theory. For example, the order in which questions are posed in a survey affects whether participants answer ‘yes’ or ‘no’, so the population that answers ‘yes’ to both questions cannot be modeled as the intersection of two fixed sets. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
256por Palmer, Tim N.“…Although Invariant Set Theory is deterministic and locally causal, it is not conspiratorial and does not compromise experimenter free will. …”
Publicado 2018
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
257por Ali, Syed Mithun, Hoq, S. M. Nazmul, Bari, A. B. M. Mainul, Kabir, Golam, Paul, Sanjoy Kumar“…Based on the experts’ opinions and weight on the specified evaluating criteria, an empirical test was conducted using a rough set theory to produce a framework for the IT system failure factors. …”
Publicado 2022
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
258por Kuratowski, Kazimierz“…Topology, Volume I deals with topology and covers topics ranging from operations in logic and set theory to Cartesian products, mappings, and orderings. …”
Publicado 1966
Enlace del recurso
-
259por Lutfiyya, Lutfi A“…Modern Algebra includes set theory, operations, relations, basic properties of the integers, group theory, and ring theory.…”
Publicado 2012
Enlace del recurso
-
260por Al-Shaer, Ehab“…It presents methodologies, techniques and tools for researchers as well as professionals to understand the challenges and improve the state-of-the-art of managing firewalls systematically in both research and application domains. Chapters explore set-theory, managing firewall configuration globally and consistently, access control list with encryption, and authentication such as IPSec policies. …”
Publicado 2014
Enlace del recurso