The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The Graphs are very powerful and widely used tool for data representation in various fields of science and engineering. Due to their versatile representational power graphs are widely used for dealing with structural information in different domains such as pattern recognition, computer vision, networks, biochemical applications, psycho-sociology, image interpretation, and many others. In many applications,...
Two-person zero-sum games with fuzzy payoffs are investigated on credibility space. In other word, this paper introduces the credibility measures and presents the credibility space based on it. Then, some basic characteristics of fuzzy events were given in the credibility space and the expected value of the fuzzy variables is propoed based on the credibility measures. Last, the expected model of two-person...
A set of some predictable fuzzy stochastic processes is a complete metric space for some metric. A set of some square integrable fuzzy martingales is a complete metric space for some metric and the set of all almost surely continuous square integrable martingales is its closed subset.
Many applications such as sensor networks, RFID, scientific experimental measurements, stock market prediction, information extraction, etc., need to manage uncertain data and process complex correlations among uncertain data. In probabilistic database systems, uncertain data are represented through attaching probability value to tuples, maybe attributes. Some probabilistic data models assume that...
Intuitionistic fuzzy complementary judgment matrix (IFCJM) and multiplicative consistent intuitionistic fuzzy complementary judgement matrix (MCIFCJM) were introduced in [1]. Based on the properties of MCIFCJM, a priority method for IFCJM is proposed in this paper. Then IFCJM is applied to analytic hierarchy process (AHP). Finally, this method is applied to classroom teaching quality evaluation example...
This paper makes research on two log-periodogram estimators of long memory and takes importance to the short-term noise effects on the bandwidth choice. It turned out that under finite samples, both the short-term and long-term impact on the performance of the log-periodogram estimators. Experiments found that it caused difficulty in choosing an optimum bandwidth with the presence of short-term noise,...
The accelerating pace of urban development has given birth to the large-scale transportation pivot, in which abundant passengers are abstracted. Passengers often have difficulty in obtaining reader-friendly guidance information in this area, inversely been confused with complicated layout of transportation pivot and hard to find an appropriate measure to optimize their trip. This paper describes a...
Named entity recognition plays an important role in many natural language processing applications. While considerable attention has been pain in the past to research issues related to named entity recognition, few studies have been reported on the recognition of nested named entities. This paper presents a morpheme-based method to Chinese nested named entity recognition. To approach this task, we...
In this paper, we study overload handling for frequent-pattern mining in online data streams. For a mining system with an e-deficient synopsis based algorithm, we propose a load shedding scheme to deal with the overload situation. The heavy workload of the mining algorithm lies mostly in the great deal of itemsets which need to be enumerated and counted by the mining algorithm. Therefore, our proposed...
Ontology, as a representation of shared conceptualization of specific domain, is a key technology for the Semantic Web. In recent years, many ontologies have been developed and many of these ontologies contain overlapping information. To be able to use multiple ontologies we need a flexible mechanism to integrate ontologies. In this paper we present an approach to ontology integration which combines...
A supplier evaluation index system which takes the manufacturer as the core enterprise is established. GAHP is used to organize the evaluation information of a group of experts, by which manufacturer can decide the relative importance of each attribute. A ranking process is conducted on several suppliers based on TOPSIS method with interval numbers. Finally, a numerical example is used to prove the...
This paper considers a fuzzy DEA-based model of technical and cost efficiencies with a ranking function. Previous studies of fuzzy DEA model in terms of cost efficiency had critical shortcoming if the unit prices of the inputs are not identical across DMUs in the economy. Therefore, in this paper, a new fuzzy model is proposed by extending the revised scheme of DEA-based technical and cost efficiencies...
With the market competition being increasingly intensive, it is necessary for company to carry out one-to-one marketing to consumers. Therefore, the ability to predict consumer's consumption behavior basing on data mining has become a key source of competitive advantage for company. In this paper, we propose a novel algorithm, which bases on ant colony optimization (ACO) to cluster consumer's consumption...
Under the research and analysis on different types of clustering algorithms, focus on the limitation of the Jarvis-Patrick algorithm and other clustering algorithm based on SNN density, a new clustering algorithm is proposed in this paper, that is, Improved Clustering algorithm based on Local Gathering Features. The paper gives the definition of the Gathering Features during the procedure of the clustering,...
How to coordinate the behavior of different agents through learning is a challenging problem within multi-agent domains. This paper addressed a kind of reinforcement learning algorithm to learn coordinated actions of a group of cooperative agents. This algorithm combines advantages of teammate modeling and reward allotment mechanism in a multi-agent Q-learning framework. The effectiveness of the proposed...
The level of certain or set of physico-chemical parameter(s) determinates the optimal living condition for the organism. These thresholds in biology are express using categories of classes. One such category which consists from five classes is water quality (WQ) category based on Saturated Oxygen. Due to natural or human-made pressure on the ecosystem, bottom line as that we have to monitor the levels...
The development of information technology brings numerous online news and events to our daily life. One big problem of such information explosion is, many times there are diverse descriptions for one incident which make people confused. Although previous researches have provided various algorithms to detect and track events, few of them focus on uncovering the diversified versions of an event. In...
Fraud in the telecommunications industry is growing, and it has seriously affected the development of the industry. Naive Bayesian Classification in data mining has a market value in the anti-fraud systems used in telecommunications. And it can tap the potential risks and identify the customers' fraud, so as to solve much small-scale dispersion of a large telecommunications fraud.
Community related applications such as instant messengers or file-sharing tools enjoy a great popularity in the Internet. But, the forming of communities is unprompted and the joining of users is based on their interesting. The opportunity to spread malicious-programs or purloin user's information is provided to malicious users. So, a clustering algorithm based on trust is presented to form a safe...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.