The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
To overcome the disadvantages of the traditional subjective weight method-AHP (eigenvalue method), research paper gives a direct, simple and easy to calculation method-relations sequence analysis. The paper will develop sequence analysis relations, puts forward an interval estimation relations sequence analysis, the method is closer to the actual application. Finally, a numerical example will be given...
Most of the traditional dynamic multi-criteria decision-making methods utilize only differences of the systems' evaluation values (which can be called absolute difference), then the conclusion of the evaluation is unfair to some evaluated objects. In consideration of disadvantages of the traditional method, a new method based on integration of absolute and relative differences is suggested. In this...
Aiming at wide variations in loads and moment of inertia, large disturbed moment of a rocket launcher position servo system, a backstepping and sliding mode cascaded compound control method was present. The sliding mode variable structure controller of velocity loop and the backstepping controller of position loop were designed. The sliding mode control can restrain effects of parameter uncertainties...
Facing the security threats and the energy shortage, a multi-angle trust mechanism for nodes in wireless sensor networks was proposed, which extended the previous trust model only base on communication trust. With adding the sensing data and the node's energy in the factors of trust assessment, and new trust models to calculate the trust values of the sensed data and the node's energy, a more reliable...
Clustering analysis has become an important tool in knowledge engineering and business intelligence. There are rapidly growing number of clustering algorithms, however, one of the most important clustering algorithms is the density based spatial clustering, and its various variations. These algorithms are either based on the density connected chains, or weighted density, or the gravity based connected...
Coordinated development theory is the precondition and an important portion of sustainable development theory. In this paper, several works have been done as follows: (1) An improved integrated evaluation method based on coordinated development theory was discussed, and then we estimate the developmental status of system depending on this method. (2) Coordinated development space was defined and partitioned...
The one-level sealed bidding is studied under the circumstance of project construction in build-operate-transfer (BOT) mode, where the bidding variable is considered separately as concession term, toll per product, payment and the total revenue. A game model with incomplete information among tenderers is presented and the optimal bidding strategies of tenderers are given. When the tenderer's construction...
With the rapid development of e-commerce and network, many manufacturers redesign their distribution channel through adding e-market based on traditional channel. This paper develops the aggregate demand function under hybrid dual channel based on consumer utility theory, analyzes the pricing strategy and profit under different channel by using game theory. The result shows that when the purchase...
This paper investigates the following factors: population scale; income level; the expenditure proportion on industrial products; wages level; transaction costs; elasticity of substitution; marginal costs ,which functions acted on the vertical FDI scale of host country from developed country in a monopolistic competition model composed of the developed country enterprises and the developing country...
Aiming at the condition that existing information aggregation operators neglect the density degree of attribute information distribution, the theories and a method of one-dimensional clustering are introduced in the work. On the basis of above theories, the density weighted averaging (DWA) middle operator is developed. Composite operators composed of the DWA and other five existing operators give...
Traditional computer system depends on access policy and user's identities to grant or deny their access to resources. The basic assumption in this system is the entities had been known. It is unsuitable to use identity-based access control in ubiquitous computing environment where entities are not foreknown to each other. In this paper, we present a trust based access control model to secure ubiquitous...
Treatment of metastatic melanoma remains one of the major challenges in dermatological oncology. Tumor cells may escape the immune surveillance because they do not express signals that are essential for activation of the host immune system such as MHC molecules or co-stimulatory molecules. Activated B cells are among the most effective antigen presenting cells. In addition to expressing high levels...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.