The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Trust quantification is an important issue of dynamic trust management. Trust is fuzzy and dynamic, if exact math tools are used to calculate trust, there is information missing in the calculation. In this paper, we use fuzzy comprehensive evaluation method to quantify trust and propose a trust quantification algorithm. Simulation results show that the trust quantification algorithm can effectively...
Network intrusion detection is one of the hottest research issues on the network security recently. In the paper, three kinds intrusion detection model are introduced. By using Bayesian methods, Fuzzy Decision Engine and Immunity-Based Model, we can improve the performance of intrusion detection system and effectively reduce the false positive alarm. Based on the three models, some drawbacks of NIDS...
Through analysis of the development of information retrieval and information push services in digital library, this paper brings forward an intelligent analysis algorithm of reader's information retrieve interest. The main idea is getting the resembling degree between reader's access behavior and built-in specific behaviors classified by information retrieve interests through fuzzy matching of reader's...
User's behaviors in information systems have different formats in different working modes, they mean users' intention actually. API callings, menu selections or requests are the familiar base elements of software behaviors, and different technologies are required to monitor and understand them. In information systems, it is necessary to insure that users' software behavior is trusted while processing...
This paper proposes an Adaptive Fuzzy Classifier Approach (AFCA) to local edge detection in order to address the challenges of detecting latent fingerprint in severely degraded images. The proposed approach adapts classifier parameters to different parts of input images using the concept of reference neighborhood. Three variants of AFCAs, namely K-means-clustering AFCA, Entropy-based AFCA, and Statistical...
It is meaningful for a teacher to evaluate his teaching effect impersonally. This paper advances a new method to make fuzzy evaluation of study effect based on fuzzy math theory. The main idea is establishing some correlation matrices representing the knowledge point distribution of test questions and student's answers, getting the study result of one student by fuzzy computing, and making intelligent...
With the rapid development of computer network technology, network not only provides the service for the people, but also has brought many negative effects. Intrusion detection is used to solve this problem. In order to improve the speed and intensity of intrusion detection, data mining technology can be applied to intrusion detection systems. Association rules are a common method in data mining....
Trustworthiness evaluation is an increasingly common theme in service-oriented computing. However, existing approaches are not effective for web services trustworthiness assessment. In this paper, we present a web services trustworthiness evaluation model based on Fuzzy Cognitive Maps. The model combines the trust evidence framework and the dynamic context reputation feedback at runtime. The simulation...
Applied fuzzy algorithm to a given situation assessment in unconventional emergency management process, and given concepts of situation assessment in unconventional emergency management, and analyzed the mechanism of situation assessment in the emergency management, and describes the situation assessment process. Situation assessment model is established, and establish evaluation matrix of subordinate...
In this paper, we consider the discrete risk order in random fuzzy environments, the concepts and some useful properties of the discrete random fuzzy order, discrete random fuzzy stop-loss order are given. Based on the all random fuzzy orders mentioned above, how the individual claim affects the mean chance of the ultimate ruin are explored in random fuzzy compound binomial ruin risk model.
Due to the features of unconventional emergency itself, “Scenario-Response” is regarded as a more effective emergency management mode to unconventional emergency. The whole process of disposal assessment is an important basis for relief decision. This paper describes the scenario-based assessment of whole unconventional emergencies disposal process (pre-disposal, the medium-term disposal, post-disposal),...
The application of critical chain breaks through the bottleneck of project management, and enhances the project risk management. However, the calculation of the buffer is a hot issue in Critical Chain Project Management (CCPM), and the current calculation methods lack management theory. In this paper,the management strength fuzzy variable is introduced creatively, and it provides a bridge between...
Presently, in the data mining scenario clustering of large dataset is one of the very important techniques widely applied to many applications including social network analysis. Applying more specific pre-processing method to prepare the data for clustering algorithms is considered to be a significant step for generating meaningful segments. In this paper we propose an innovative clustering technique...
At present, there are some academic studies on manufacture enterprise virtual operating, but a little academic study on service enterprise virtual operating. Moreover, the study focused on strategic performance appraisal system is almost blank and the empirical study on service enterprises has no discriminative samples. In this thesis, by using value chain analysis as the qualitative investigation...
This paper is inclined to introduce the authors' study on a new method for evaluating the production safety in a workshop based on the multi-dimensional and multi-level factors including a lot of uncertainties. Since the safety management of the workshop production involve so many factors and uncertainties, it is necessary to use the interval number fuzzy integrated evaluation, which is based on the...
In this paper a new fuzzy approach is developed for defining the general criticality of activities where some other features such as probability of finishing on time zone, probability of impact, impact threat and ability to retaliate are considered as criticality factors of activities in project management process. In this way the risky situation (vulnerability) of activities are calculated by using...
In recent years, the subway emergencies of the world occurred frequently which would give rise to the great casualties and property loss, as well as unfavorable political influence on public security and stability, then cause the social panic. This paper analyzes four logic stages (prevention, preparation, response and restore) of whole emergency management process of emergency in subway, aiming at...
In this paper, we consider the fuzzy linear regression model proposed by Kim et al. and construct empirical likelihood ratio statistics of unknown parameters. Under suitable conditions, we prove that the statistics converges in distribution to χ2(p+1). Using these results, we can construct the confidence region of unknown parameters.
The paper is reviewing the new trends of the image sensing, the Super CCDs and the Backlit CMOS. One proposes a new HDR fuzzy-interpolative algorithm that can extend the dynamic range of a still Backlit CMOS image in the Super CCD SR manner: the fusion of two images, the first one with a normal exposure and the other underexposed.
The eco-port is the future development and tendency of port. Based on the composition analysis of traditional port logistics operation system, this paper introduces eco-environmental factors, constructs the evaluation index system of eco-port logistics operation system and decides the weight of indexes by using AHP. Then we acquire the score of the eco-port logistics operation system by using the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.