The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In order to make the solution of logic equation set more flexible, this paper establishes the sufficient and necessary conditions for the logic equation set consist of zero-one, non-zero and non-one type logic equations to hold. Moreover, the method of converting the logic equation set into zero-type or one-type equations is given, through which the logic equation set made up of zero-one, non-zero...
With the technical requirements for automated stereoscopic warehouse increasingly, the application of bend aisle stereoscopic warehouse is more and more extensive. Through taking the stereoscopic automated warehouse in Qinhuangdao as a research object, This paper describes the order picking path optimization and scheduling algorithm for bend aisle, solves the problem of a stacker's order picking in...
The problem of solving max-min fuzzy relation equation is further discussed in this paper. The main matter of solving max-min fuzzy relation equation is to find its whole minimal solutions. Based on the analysis of the characteristic of minimal solution and previous results, this paper transforms the problem of seeking the whole minimal solutions into constructing a bipartite fuzzy graph and finding...
In this paper, how to calculate the importance weights is explored. Importance weights of parameters for fuzzy soft sets with unequal importance weights differ in actual practice. The importance weights can be calculated through the disparity of the results estimations. An example is used to illustrate what have been studied above.
Ranking fuzzy numbers plays a very important role in decision making and some other fuzzy application systems. Many different methods have been proposed to deal with ranking fuzzy numbers. Constructing ranking indexes based on the centroids of fuzzy numbers is an important case. But some weaknesses are found in these indexes. The purpose of this paper is to give a new ranking index to rank various...
This paper describes the development of a decoupled vibratory feeding system (DVFS), while the design and fuzzy control strategy are stressed. In DVFS, the vibration angle and the frequency and the waveform of the driving signals as well as the phase angle between the vertical vibration and horizontal vibration all can be easily adjusted, in software way, to suit agile manufacturing. The computer...
Aiming at the communication and coordination problems of group members in the group decision support system, the structure of role-based collaborative group decision support system model (Role Cooperating Group Decision-making Support System, RCGDSS) is built by inducting the role collaboration to the group decision support system and then the role-based collaborative formal description of RCGDSS...
In this paper, a novel Bot detection algorithm for Windows system based on API call correlation was proposed. the coefficient of product-moment correlation was utilized to calculate the correlation of different API calls. More other activities were correlated as well as keylogging. According to the characteristics of different Bot activities with API calls, the membership of different activities were...
With the constant development of network application nowadays, the network security has become a hot issue. The intrusion detection is a good and active defense technology which will detect network security loopholes, make a response and promote network security in time. In this paper, a distributed collaborative intrusion detection system model will be proposed and a series of relatively complete...
This study utilizes a fuzzy message requirement classifiers system (FMRCS) that integrates both learning and inference into the learning of the computer troubleshooting ability and adopts a teaching strategy of problem-solving. The main purpose in this study is to guide learners to have the conspicuous direction when they face some computer troubles. Consequently, learners can be based on FMRCS with...
Mining frequent itemset is an important research topic in association rule area. There are two main kinds of Algorithm: Apriori Algorithm and FP- growth Algorithm and their varieties. Generating candidate itemset of Apriori and traversing tree nodes of FP-growth affect the efficiency of data mining. This paper puts forward the new simplified algorithm: eliminating and plotting blocks to the matrix...
Combinational ambiguity is a challenging issue in Chinese word segmentation in that its disambiguation depends on the contextual information. This paper collects contextual information of 28 typical combinational ambiguity strings, and makes use of lexical, syntactic and semantic knowledge and large scale corpus to summarize the rules of these combinational ambiguity strings. Using these rules to...
Several features existed in Chinese texts result in technologic bottleneck in Chinese text mining, at present the results of Chinese text clustering obtained by traditional methods are not very satisfactory. In this paper, we propose the text clustering method by the English texts clustering method called as Text Clustering via Particle Swarm Optimizer (TCPSO) to solve the Chinese text clustering...
Sequential pattern mining is an important and useful tool with broad applications, such as analyzing customer purchase behavior, recommending services to customers, and so on. It is challenging since explosive number of subsequences need to be examined and both the memory and computational cost are becoming extremely expensive when the sequence database grows huge. Many previous algorithms developed...
Semantic Web technology highly depends on the quality of ontology as it reduces or eliminates conceptual confusion and reuses knowledge. In order to enhance quality of ontology, there is one major problem with lexical representation of ontology. Current lexical representation is term which may have different meanings, i.e., the term is polysemous, this can result in frustrating misunderstanding and...
Attribute reduction is one of the key problems in Rough Set theory, and many algorithms have been proposed for static data. Very little work has been done in incremental attribute reduction algorithm. In this paper, an incremental attribute reduction algorithm is present. In order to reduce the computational complexity, a fast counting sort algorithm is introduced for dealing with redundant and inconsistent...
In this article, a new method for lower approximation reduction is introduced in inconsistent ordered information systems (IOIS). The dominance matrix and lower approximation decision matrix are proposed in information systems based on dominance relations. Furthermore, the algorithm of lower approximation reduction is obtained, from which we can provide approach to lower approximation reduction operated...
In an ordered decision information system, dominance-based rough set approach (DRSA) were used to compute reducts of the system which preserve the lower and upper approximations of upward union and downward union of decision classes. Recently, class-based reducts (L-reduct and U-reduct) which preserve respectively lower and upper approximates of each decision classes was proposed. In this paper, we...
CP-Nets: CP-nets (Condition Preference Nets) is a tool for representing and reasoning with condition ceteris paribus preference statements put forward by Craig Boutilier, but how to represent and realize is not given. In this paper, after introducing some notions and an example of CP-nets, we adopt binary list as a storage structure to represent and store CPTs, and devise an algorithm for ranking...
As a practical and efficient technique to access XML data, keyword query approaches should address two main problems: enable users to express their query intentions accurately and provide matching algorithms to realize users' query intentions faithfully. Most of the existing researches concentrate on the second problem and the first one is always neglected. In this paper, we propose a novel XML keyword...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.