Analysis of Fuzzy Fault Tree using Intuitionstic Fuzzy Numbers
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2013, Vol 4, Issue 7
Abstract
In generally fuzzy seats are used to analyses the system reliability. In present paper we have presented a new approach to evaluate the reliability of fuzzy fault tree using Intuitionstic Fuzzy Numbers. In application of Intuitionstic Fuzzy fault tree analyses, we have introduced a new distance methods between two interwal estimates of reliability with truth values. Using this methods, the importance index is calculated and compared with the weighted index.
Authors and Affiliations
Neeraj Lata
Deblocking Filtering Method Based on Separate Modes
The compression of digital images has received wide attention of researchers since it reduces the memory, bandwidth and transmission requirements. One of the major drawbacks of the block-based DCT compression methods is...
Optimum Design of Composite Plates under Thermal Buckling Loads using Imperialist Competitive Algorithm
Thermal buckling loads of laminated composite plates are maximized for a given total thickness. Fiber directions and relative thickness of layers are considered as design variables. Analysis of buckling temperature is ca...
Social-aware Context Based Approach for Forwarding Data in Wireless Network Comprising of Selfish Individuals
In social based mobility network comprises of selfish individuals that are not willing to forward the packets but wants to forward their own messages. Proposed system uses a context based protocol that can be used in soc...
Zone Based Feature Extraction and Statistical Classification Technique for Kannada Handwritten Numeral Recognition
This paper presents the zone based feature extraction and statistical classification technique for Kannada handwritten numeral recognition. The Kannada handwritten numeral database required for the experimentation is col...
Operating System Security : Security Policies
Security is the primary concern in the modern world. The main focus of this paper is the security of our information and its supporting infrastructure. By keeping the computer system secure we can provide the security to...