The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The development of internet technologies makes the multi-attribute reverse auction to be a powerful tool in the business to business sector for lowering transaction costs and improving supply chain management capabilities. The multiattribute reverse auction has important significance in items procurement. In this paper, the fuzzy data envelopment analysis (DEA) models of multi-attribute reverse auction...
Fuzzy ID3 algorithm is a widely studied classification algorithm in order to induce fuzzy decision trees. The structure of fuzzy decision trees combines the interpretability of the decision trees with the capability of fuzzy logic on uncertainty. The fuzzy inference procedure of fuzzy decision trees is a crucial manner for the classification problems. So, the choice of the aggregation operators for...
The idea screening of a new product concept is perhaps the most critical activity in new product development (NPD). This paper presents a fuzzy synthetic evaluation method (FSEM) for selecting an optimum design alternatives based on fuzzy set theory. The process involves constructing a hierarchical objective, setting evaluation criteria, establishing a fuzzy judgment matrix and weight vector, and...
Traditional FMEA (failure mode and effect analysis) analysis has some drawbacks so that affect the risk evaluation and correction action. It is very difficult for three risk factors to be evaluated precisely. Simultaneously, traditional FMEA doesn't consider the relative importance of three risk factors. The critical problem is that same RPN (risk priority number) can be obtained by different combination...
One critical threat facing many organizations is the inside attacks from masqueraders, internal users or external intruders who exploit legitimate user identity and perform malicious attacks. Anomaly intrusion detection systems can be deployed to build a user behavior profile from his/her past activities in a computer system and detect masqueraders if a large deviation is observed. In this paper,...
One of the main issues concerning the design of a fuzzy logic system is generation of the membership functions for the linguistic variable values. Regarding this point, in this paper, we present a new approach for generation of FMF for a new user emphasizing the important role of past experiences, which have been generated in past experiences, and the genealogical factors with respect to the given...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.