The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Shock absorber is widely used on vehicle. The purposes of the shock absorber are to dissipate the energy accumulated by the suspension spring displacement, controlling thus the vertical motion between vehicle body and tires. The shock absorber has great influence on both ride and handling performance of vehicles, and a great many previous researches have been done on modeling and simulation of the...
This paper gives integrated approach to access the risk of Information Systems Project, This method is a comprehensive algorithm based on Delphi method, it means that it sets up the index system by Delphi method, structure model by AHP method, then make assessment on risk of information system project by Fuzzy Comprehensive Evaluation.
A computer aided system is proposed to screen and sort the non-patent literatures in this paper. It is introduced that the present situation and strategy of screening in data processing. The system here is a man-machine interactive system. First, knowledge and experience which stand for the know-how of the experts were inserted into the knowledge base, including the screening rules and principle in...
Aimed to the measuring problem of steam consumption in Dyeing process, a multiple neural network soft sensing modeling of Dyeing steam consumption based on adaptive fuzzy C-means clustering (FCM) is presented. The method is used for separating a whole real-time training data set into several clusters with different centers, and the clustering centers can been modified by an adaptive fuzzy clustering...
Combining the character of landscape and the theory of Markov chain, this paper inferred the forecast model of fuzzy weight Markov chain. The new model which was called FWMC to predict the future value of cultivated land demand in land use planning. Factors to consider in driving conditions was used in this model, the real response to landscape pattern change position using a weighted Markov transfer...
Based on detailed analysis of maritime hazadous cargo transportation, maritime hazadous cargo transportation evaluation index system is established. The index system is characterized by the complicated hierarchy structure and multiple index attributes. A methodology is structured to evaluate hazardous waste transportation firms containing the methods of fuzzy-AHP and comprehensive evaluation. An example...
Due to the disadvantageous effects of rain and snow on image processing, this paper proposed a new removal algorithm of rain and snow based on fuzzy connectedness. Since the distribution of rain and snow was scattered in the image, a single seed point could not recognize all the rain and snow regions. Therefore, according to the impact of rain and snow on the pixel brightness, multiple seed points...
The current static weapon-target assignment (WTA) model is usually out of touch with the tank element tactics. In order to solve this problem, attack effectiveness set is established based on fuzzy. By judging on satisfaction of attack effectiveness, moderate firing principle for tank element is achieved. By re-coding solution space, using relation operator the original model is transferred to unconstrained...
A cluster validity index for fuzzy partitions has two functions. One is to identify the number of clusters of an unlabeled data set. The other is to assess the clustering result of an unlabeled data set. The first function has been thoroughly investigated. However, no researchers attach importance to the second function. This paper devises an experiment to investigate the second function of current...
The diagnosis of the crop is to be made with incomplete information mostly. The method to deal with the diagnosis with incomplete information on interval figure is present in the paper. The similarity formulas of the interval figures and the interval sets are given on the concepts of the interval inclusion and the intersection. A soybean disease database model is proposed on interval figure, and the...
Because the traditional evaluation of the Automatic Test System (ATS) just considered the fuzzification of the evaluation index, and ignored the randomicity and indetermination of the index, so a new method based on neural net and cloud model is proposed to solve the problem. An ameliorated neural net algorithm is used to get the weight of the index. Cloud model is used to express the quantificational...
Being dynamic, open and so on of Educational Resource Grid brought in a lot of security risks. Trust Model of Educational Resource Grid based on fuzzy theory id brought in. Trust is divided into direct trust and indirect trust in this model,improving model of indirect trust value to get more accurate trust value. Experimental results show the validity of the model.
In accordance with the virtual soldiers of mainstream games and military simulations only have vitality model, but no injury and battle efficiency model, first established a virtual soldier partly disable model, this model can describe the influence on the virtual soldier's battle efficiency when injured; then researched the single factor evaluate method, finally utilized the fuzzy decision-making...
Based on fuzzy language field and fuzzy language value structure, a new knowledge representation frame is presented. A generalized cellular automaton and the corresponding generalized inductive logic causal model are also proposed, which can synthetically process random and fuzzy uncertain. Thus, a new uncertain causal inductive auto-reasoning mechanism is presented on the basis of fuzzy state description...
In this paper, we introduce concepts of fuzzy inverse semigroups and redefine fuzzy inverse subsemigroups using the concept of fuzzy spaces introduced by Dib. Further more, the concept of the fuzzy normal subsemigroup of a fuzzy inverse semigroup is introduced. Finally, we study their relationships between fuzzy inverse subsemigroups and classical definitions of fuzzy inverse subsemigroups.
A novel digital image watermarking algorithm for copyright protection of digital products in digital library is proposed by using the generalized fuzzy c-means clustering (GFCM), Information fusion (InF), and discrete cosine transform (DCT). The presented approach can be applied to enhance robustness and security of copyright information in digital library. The original image blocks are classi"ed...
The advent of data mining has contributed significantly to the field of customer management. The payment center in Maersk finds that it's difficult to charge customers for the balance due. Thus the research on the application of artificial neural networks in classification of data mining will be conducted in this paper. Since the knowledge captured by neural networks is represented at a sub-symbolic...
This paper provides an improving multi-index method of synthetic evaluation based on the principal component analysis and entropy weight. By applying the method of principal component analysis, we distill the principal component of the evaluating index and confirm the evaluating system. Using the method of entropy weight, we endue the synthetic weight for each index. The synthetic evaluation for the...
Aiming at solving the problem of the transaction security in C2C E-commerce, a valuation model is proposed based on cloud model theory. By means of using the algorithm of the merger of the trust cloud and the similarity computing of the trust cloud, sub-attribute valuation and comprehensive valuation will be achieved. According to the valuation, the two side of transaction will get strategic advices...
The current trust models for P2P network, are mainly focused on the trust of network nodes, most of which neglect the network service trust and don't fully consider the attribute of service quality. However, the trust of network service is an important factor in P2P network. In order to ensure the trust of P2P network, this paper builds the P2P network service trust model based on QoS in view of P2P...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.