Search all articles

+ Advanced search
Search articles within:
121922 articles

Efficient Applications of Risk Analysis in the Chemical Industry and Emergency Response

Roberto Bubbico
Pages: 92 - 101
Despite it is now used in many technical and industrial areas, Risk Analysis is sometimes still considered by many plant managers as a methodology too complex and too timeconsuming to be of practical use. Conversely, it will be shown that Risk Analysis can often provide very useful information on the...

Gene Silencing Genetic Algorithm for 0/1 Knapsack with Object Preferences

S. Siva Sathya, S. Kuppuswami, S. Sendhil Kumar
Pages: 886 - 893
Genetic Algorithms are efficient search and optimization techniques inspired by natural evolution. To show the difficulties in solving constrained optimization problems through GA, the 0/1 knapsack problem with user specific object preferences has been taken up. A new genetic operator, namely, ‘gene...

Automatic registration of remote sensing images based on SIFT and fuzzy block matching for change detection

Cai Guo-Rong, Li Shao-Zi, Wu Yun-Dong, Chen Shui-Li, Su Song-Zhi
Pages: 874 - 885
This paper presents an automated image registration approach to detecting changes in multi-temporal remote sensing images. The proposed algorithm is based on the scale invariant feature transform (SIFT) and has two phases. The first phase focuses on SIFT feature extraction and on estimation of image...

H-infinite State Estimation for Takagi-Sugeno Fuzzy Delayed Hopfield Neural Networks

Choon Ki Ahn
Pages: 855 - 862
This paper presents a H-infinite state estimator for Takagi-Sugeno fuzzy delayed Hopfield neural networks. Based on Lyapunov-Krasovskii stability approach, a delay-dependent criterion is proposed to ensure that the resulting estimation error system is asymptotically stable with a guaranteed H performance....

Integrating Strategic and Tactical Decisions to Robust Designing of Cellular Manufacturing under Uncertainty: Fixed Suppliers in Supply Chain

V.R Ghezavati, S.J. Sadjadi, M. Dehghan Nayeri
Pages: 837 - 854
Cellular manufacturing (CM) has been identified as an innovative practice for manufacturer to achieve efficiency as well as flexibility under an uncertain environment. This study addresses a new mathematical robust model for a cellular manufacturing problem integrated with tactical aspects under supply...

Automatic Design of Robust Optimal Controller for Interval Plants Using Genetic Programming and Kharitonov Theorem

Peng Chen, Yong-Zai Lu
Pages: 826 - 836
This paper presents a novel approach to automatic design of a robust optimal controller for interval plants with Genetic Programming based on Kharitonov Theorem (KT), which provides a theoretical foundation in the design of robust controller for interval plants. The structure and parameters of the robust...

A Convergent Solution to Matrix Bidirectional Projection Based Feature Extraction with Application to Face Recognition

Yubin Zhan, Jianping Yin, Xinwang Liu
Pages: 863 - 873
Recently, many feature extraction methods, which are based on the matrix representation of image and matrix bidirectional projection technique, are proposed. However, these methods in solving the two projection matrices will suffer from non-optimized or non-convergent solution. To overcome this problem,...

A note on the rates of uniform approximation of fuzzy systems

Viet Long Hoang
Pages: 712 - 727
For the fuzzy systems with the kernel-shaped fuzzy sets of if part, we estimate the rates of the uniform approximation for continuous functions. Results are given associatively with the rates of convergence of the sequence (logk/k)a.

Imitation of Honeybee Aggregation with Collective Behavior of Swarm Robots.

Farshad Arvin, Khairulmizam Samsudin, Abdul Rahman Ramli, Masoud Bekravi
Pages: 739 - 748
This paper analyzes the collective behaviors of swarm robots that play role in the aggregation scenario. Honeybee aggregation is an inspired behavior of young honeybees which tend to aggregate around an optimal zone. This aggregation is implemented based on variation of parameters values. In the second...

Mining Multi-scale Intervention Rules from Time Series and Complex Network

Jiaoling Zheng, Changjie Tang, Shaojie Qiao, Ning Yang, Yue Wang
Pages: 728 - 738
This paper proposes the concept of intervention rule which tries to reveal the interventional relationship between elements in a system in the following three aspects. (1) Casual relationship. Intervention rule shows which element is the cause and which element is the consequence. (2) Quantitative relationship:...

WPMSD: A Malicious Script Detection Method Inspired by the Process of Immunoglobulin Secretion

Hui Zhao, Wen Chen, Jie Zeng, Yuanquan Shi, Jian Qin
Pages: 788 - 796
Inspired by the process of immunoglobulin secretion in biological body, we present a Web Page Malicious Script Detection Method (WPMSD). In this paper, Firstly, the basic definitions of artificial immune items are given. Secondly, according to the spreading range of malicious script, the immunoglobulin...

Application of Fuzzy Comprehensive Evaluation Method in Trust Quantification

Shunan Ma, Jingsha He, Shuai Xunbo
Pages: 768 - 776
Trust can play an important role for the sharing of resources and information in open network environments. Trust quantification is thus an important issue in dynamic trust management. By considering the fuzziness and uncertainty of trust, in this paper, we propose a fuzzy comprehensive evaluation method...

Improved Ordinary Measure and Image Entropy Theory based intelligent Copy Detection Method

Dengpan Ye, Longfei Ma, Lina Wang, Robert H. Deng
Pages: 777 - 787
Nowadays, more and more multimedia websites appear in social network. It brings some security problems, such as privacy, piracy, disclosure of sensitive contents and so on. Aiming at copyright protection, the copy detection technology of multimedia contents becomes a hot topic. In our previous work,...

A Projection Pursuit Based Risk Assessment Method in Mobile Ad hoc Networks

Fu Cai, Liu Ming, Chen Jing, Zhang Li, Xiao-Yang Liu
Pages: 749 - 758
Establishing high performance cooperation and estimating nodes’ risk level in mobile ad hoc networks (MANETs) are currently fundamental and challenging due to the inherent characteristics of MANETs, such as the highly dynamic topology and the absence of an effective security mechanism. Trust based...

A Software Behavior Trustworthiness Measurement Method based on Data Mining

Yuyu Yuan, Qiang Han
Pages: 817 - 825
This paper presents a congruence measurement method by partitions to apply software trustworthiness measures in dynamic behavior feature datasets. The datasets are generated at software running time. And the method compares the datasets with the static attribute feature datasets generated at software...

Evaluating Timeliness and Accuracy Trade-offs of Supervised Machine Learning for Adapting Enterprise DRE Systems in Dynamic Environments

Joe Hoffert, Douglas C. Schmidt, Aniruddha Gokhale
Pages: 806 - 816
Several adaptation approaches have been devised to ensure end-to-end quality-of-service (QoS) for enterprise distributed systems in dynamic operating environments. Not all approaches are applicable, however, for the stringent accuracy, timeliness, and development complexity requirements of distributed...

A Reputation Evaluation Approach Based on Fuzzy Relation

Meiyu Fang, Xiaolin Zheng, Deren Chen
Pages: 759 - 767
In traditional models, fuzzy sets are used to describe trust degree and evaluate reputation for vague words. But in some practical applications, the determination of membership functions associated with vague concepts is difficult or impossible. This paper builds a reputation computing model based on...

Adaptive Secret Sharing for Color Images

Jia-Hong Li, Wei-Bin Lee, Dengpan Ye, Tzong-Jye Liu, Chuan Qin
Pages: 797 - 805
A secret sharing model can secure a secret over multiple noise-like shadows and remain recoverable despite multiple shadow failures. Even if some of the shadows are compromised, the secret will not be revealed as long as the number of the compromised shadows is smaller than a pre-determined threshold....

Design of 2-D Recursive Filters Using Self-adaptive Mutation Differential Evolution Algorithm

Lianghong Wu, Yaonan Wang, Xiaofang Yuan
Pages: 644 - 654
This paper investigates a novel approach to the design of two-dimensional recursive digital filters using differential evolution (DE) algorithm. The design task is reformulated as a constrained minimization problem and is solved by an Self-adaptive Mutation DE algorithm (SAMDE), which adopts an adaptive...

A Fuzzy Multi-Criteria SWOT Analysis: An Application to Nuclear Power Plant Site Selection

Mehmet Ekmekcioglu, Ahmet Can Kutlu, Cengiz Kahraman
Pages: 583 - 595
SWOT (Strengths, Weaknesses, Opportunities and Threats) analysis is a commonly used and an important technique for analyzing internal and external environments in order to provide a systematic approach and support for a decision making. SWOT is criticized mostly for considering only qualitative examination...

Content-based Image Hiding Method for Secure Network Biometric Verification

Xiangjiu Che, Jun Kong, Jiangyan Dai, Zhanheng Gao, Miao Qi
Pages: 596 - 605
For secure biometric verification, most existing methods embed biometric information directly into the cover image, but content correlation analysis between the biometric image and the cover image is often ignored. In this paper, we propose a novel biometric image hiding approach based on the content...

Feature Selection in Decision Systems Based on Conditional Knowledge Granularity

Tingquan Deng, Chengdong Yang, Qinghua Hu
Pages: 655 - 671
Feature selection is an important technique for dimension reduction in machine learning and pattern recognition communities. Feature evaluation functions play essential roles in constructing feature selection algorithms. This paper introduces a new notion of knowledge granularity, called conditional...

Nonlinear underwater robot controller design with adaptive disturbance prediction

Xin Songa, Fang Liue, ZaoJian Zoub, Yue-Min Zhuc, JianChuan Yinb, Feng Xub
Pages: 634 - 643
A new hybrid adaptive control algorithm is proposed for the nonlinear system controller design of underwater robot. Compared with the previous works in the controller design of underwater robot, the main advantages of this work are: (1) A new disturbance prediction and compensation model is proposed;...

Optimization of workflow scheduling in Utility Management System with hierarchical neural network

Srdjan Vukmirovic, Aleksandar Erdeljan, Imre Lendak, Darko Capko, Nemanja Nedic
Pages: 672 - 679
Grid computing could be the future computing paradigm for enterprise applications, one of its benefits being that it can be used for executing large scale applications. Utility Management Systems execute very large numbers of workflows with very high resource requirements. This paper proposes architecture...

Fuzzy Mutual Information Based min-Redundancy and Max-Relevance Heterogeneous Feature Selection

Daren Yu, Shuang An, Qinghua Hu
Pages: 619 - 633
Feature selection is an important preprocessing step in pattern classification and machine learning, and mutual information is widely used to measure relevance between features and decision. However, it is difficult to directly calculate relevance between continuous or fuzzy features using mutual information....

Polluants Time-Series Prediction Using the Gamma Classifier

Itzama Lopez-Yanez, Amadeo J. Arguelles-Cruz, Oscar Camacho-Nieto, Cornelio Yanez-Marquez
Pages: 680 - 711
In this work we predict time series of air pollution data taken in Mexico City and the Valley of Mexico, by using the Gamma Classifier which is a novel intelligent associative mathematical model, coupled with an emergent coding technique. Historical and current data about the concentration of specific...

A Modified Super-Efficiency DEA Approach for Solving Multi-Groups Classification Problems

Jie Wu, Qingxian An, Liang Liang
Pages: 606 - 618
Among the various discriminant analysis (DA) methods, researchers have investigated several directions in this area: statistics, econometrics, computer data mining technologies and mathematical programming. Recently, as a nonparametric mathematical programming approach, Data envelopment analysis has...

Survey on Recent Research and Implementation of Ant Colony Optimization in Various Engineering Applications

Mohan B. Chandra, R. Baskaran
Pages: 566 - 582
Ant colony optimization (ACO) takes inspiration from the foraging behaviour of real ant species. This ACO exploits a similar mechanism for solving optimization problems for the various engineering field of study. Many successful implementations using ACO are now available in many applications. This paper...

The Combustible Materials Remote Sensing Ration Calculation and Fire Risk Dynamic

Zhuo Yi, Liu Guixiang, Fengming Yu
Pages: 65 - 74
The amount of combustible material is the primary factor which influences the occurrence and developing of fire. From analyzing the field survey data during the six months of the whole seasons of withered grass in Xilinguole, we obtained the different types grassland dynamic changing rates, which include...

Towards the Development of Regional Risk Profiles and Adaptation Measures for Sea Level Rise

Bilal M. Ayyub, Michael Kearney
Pages: 75 - 89
Risks from future sea level rise entail significant uncertainties concerning overall potential impacts, the specific threats faced by particular areas and what benefit or costs are associated with strategies for addressing such risks. The proposed risk quantification and management framework is consistent...

Biogas - A European Perspective on Safety and Regulation

Chongfu Huang
Pages: 1 - 20
The production of biogas is positioned as energy which can not only generate a source of energy known as "green" but also which can recycle waste. In the context of sustainable development, the place of biogas is therefore essential. The risks corresponding to the production processes and uses of are...

The Risk Assessment of the Fog Disaster

Haibo Hu, Jinjun Pan
Pages: 59 - 64
The fog probability in urban area is determined by the observatory data. Taking the regular grid to be the assessed unit, the Fragility Exponential (FE) is computed upon the gird cell, in which the density of the road-net is stood for, and the FE can be modified according to the important facility distributed...

Fuzzy Multicriteria Risk Assessment for Hazardous Waste Management: The Case of Istanbul

Seda Ugurlu, Cengiz Kahraman
Pages: 29 - 41
A hazardous waste is waste that poses substantial or potential threats to public health or the environment. Hazardous waste management is an area of the waste management field concerned with the proper containment, management, and disposal of wastes which could be considered hazardous. In this paper,...

Risk Indviduality in Crisis Planning: the Case of Gender in Amercan Agriculture

Dana L.K. Hoag, Catherine Keske, Rebecca Goldbach
Pages: 21 - 28
Crisis response can be improved by accounting for differences in risk perception. We confirm that gender individuality can be an important divider by using a case study of agricultural producers. Women were more risk averse and less confident. However, we found less difference than studies have found...

Airborne Levels of Uranium in the Surroundings of Various Industrial Facilities: Human Health Risks

Joaquim Rovira, Victoria Linares, Montserrat Bellés, Marti Nadal, José L. Domingo
Pages: 42 - 47
This study was aimed at determining the levels of natural uranium (U) in air samples collected in the surroundings of various industrial facilities: three cement plants, two municipal solid waste incinerators, and a hazardous waste landfill in Catalonia (NE Spain). Although U concentrations were found...

A Discrete Model of the Expected Loss for Catastrophe Insurance in Natural Disasters

Chongfu Huang, Xing Shi
Pages: 48 - 58
The traditional actuarial model of catastrophe insurance is too theoretical. In many cases, it is of no avail. In this paper, we suggest a discrete model of catastrophe insurance to calculate the expected losses. We successfully applied it to calculate the premium rate of the typhoon in Fujian Province,...

Multi-criteria Group Decision Supplier Selection Problem using Fuzzy TOPSIS Based Approch

Akram Zuoggari, Lyes Benyoucef
This paper presents a new decision making approach for group multi-criteria supplier selection problem, which clubs supplier selection process with order allocation for dynamic supply chains to cope market variations. More specifically, the developed approach imitates the knowledge acquisition and manipulation...

Fuzzy attribute logic with model constraints

Radim Belohlavek, Vilem Vychodil
Presented are preliminary results on ordinary-style and graded-style completeness results for fuzzy attribute logic with models constrained by fuzzy closure operators with hedges.

General aggregation operators acting on the L-fuzzy real line

Pavels Orlovs
The paper is devoted to a general aggregation operator acting on L-fuzzy real numbers. It is defined as a t-norm based extension of an ordinary aggregation operator. The aim of our research is to analyze properties of the general aggregation operator depending on properties of the ordinary aggregation...

Fuzzy Function: Theoretical and Practical Point of View

Irina Perfilieva
The aim of this investigation is to reconsider two notions of fuzzy function, namely: a fuzzy function as a special fuzzy relation and a fuzzy function as a mapping between fuzzy spaces. We propose to combine both notions in such a way that a fuzzy function as a relation determines a fuzzy function...

Fuzzy methods for database protection

Vicenc Torra, Daniel Abril, Guillermo Navarro-Arribas
Data privacy has become an important topic of research. Ubiquitous databases and the eclosion of web technology eases the access to information. This information can be related to individuals, and, thus, sensitive information about users can be easily accessed by interested parties. Data privacy focuses...

Supplementarity measures on fuzzy sets

Susana Cubillo, Elena E. Castiñeira, Wilmer Montilla
In this paper, we tackle the study of so-called supplementarity measures. They are introduced axiomatically and are then related to incompatibility measures by antonyms. To do this, we have to establish what we mean by antonymous measure. We then prove that, under certain conditions, supplementarity...

Linguistic Summarization of Time Series Data using Genetic Algorithms

Rita Castillo-Ortega, Nicolás Marín, Daniel Sánchez, Andrea G.B. Tettamanzi
In this paper, the use of an evolutionary approach when obtaining linguistic summaries from time series data is proposed. We assume the availability of a hierarchical partition of the time dimension in the time series. The use of natural language allows the human users to understand the resulting summaries...

Quasi-arithmetic means and OWA functions in interval-valued and Atanassov's intuitionistic fuzzy set theory

Glad Deschrijver
In this paper we propose an extension of the wellknown OWA functions introduced by Yager to interval-valued (IVFS) and Atanassov's intuitionistic (AIFS) fuzzy set theory. We first extend the arithmetic and the quasi-arithmetic mean using the arithmetic operators in IVFS and AIFS theory and investigate...

Construction of a Choquet integral and the value functions without any commensurateness assumption in multi-criteria decision making

Christophe Labreuche
We consider a multi-criteria evaluation function U defined over a Cartesian product of attributes. We assume that U is written as the combination of an aggregation function and one value function over each attribute. The aggregation function is assumed to be a Choquet integral w.r.t. an unknown capacity....

Intersection and union of type-2 fuzzy sets and connection to (1, 2)-double cuts

Zdenko Takac
It is known that the standard intersection and union of type-1 fuzzy sets (i.e., the intersection and union under the minimum t-norm and maximum tconorm) are the only cutworthy operations for type-

Cluster Tendency Assessment for Fuzzy Clustering of Incomplete Data

Ludmila Himmelspach, Daniel Hommers, Stefan Conrad
The quality of results for partitioning clustering algorithms depends on the assumption made on the number of clusters presented in the data set. Applying clustering methods on real data missing values turn out to be an additional challenging problem for clustering algorithms. Fuzzy clustering approaches...

A Unified Model for Fuzzy Aggregation Operators and its Application in Group Decision Making

José M. Merigó
We develop a new model for fuzzy decision making based on the use of several sources of information in the analysis. We introduce the fuzzy unified aggregation operator (FUAO). It is an aggregation operator that unifies other aggregation operators in the same formulation and considering the degree of...