Search all articles

+ Advanced search
Search articles within:
96009 articles
Shan Huo Chen, Chien-Chung Wang
Fuzzy distance is applied on data analysis, classification, and production positioning analysis widely. In this paper, We introduction a fuzzy distance by using graded mean integration representation of generalized fuzzy number and the span of fuzzy number, We also discuss the distance of the linguistic...
Shien Kuei Liaw
We report the investigation of ring cavity tunable laser, which is based on FBG technology. The laser linewidth, power variation and tuning range are 0.015 nm, 0.5 dB and 31.0 nm, respectively. The ring-cavity tunable laser also has 60 dB of SMSR to insure high-quality operation. With the features mentioned...
Yann-ching Tsai, Hsueh-Fang Chien, Shu-Hua Lee
Security Exchange Commission in Taiwan requires all public companies to file and announce their monthly sales figure by the of the following month. This requirement has established another channel for market investors to obtain additional accounting information on a more timely basis than quarterly or...
Shao-Shin Hung, Damon Shing-Min Liu
Knowledge management (KM) is suggested as a method to manage and apply knowledge for business management. In this paper, we suggest a framework based on OPF (Open Process Framework) meta model for the knowledge-based decision-making. Based on the modeling method of OPF, we can translate partial and implicit...
Tung-Shih Su, Chih-Hung Lin, Wen-Shyong Hsieh
Most routing protocols focus on obtaining a workable route without considering network traffic condition for a mobile ad hoc network (MANET). Therefore, the quality of service (QoS) is not easily achieved by the real time or multimedia applications. To support QoS, this work proposes a QoS-aware routing...
Shao-Shin Hung, Damon Shing-Min Liu
In the security infrastructure, intrusion detection has become an indispensable defense line in face of increasing vulnerabilities exposed in today’s computing systems and Internet. In this paper, our approach uses ontologies as a way of grasping the knowledge of a domain, expressing the intrusion detection...
Jung-Bin Li, Shih-Chuan Fu, An-Pin Chen
This study attempts to find the possibility of making relatively higher profit with lower risk when trading futures commodities. The system applies XCS classifiers to explore the rules of spread trading of these commodities. Our simulation holds a trading strategy that in every transaction, the proposed...
Takumi Shimizu, Yusuke Takada, Takashi Iba
In this paper, we replicate Nelson-Winter model in order to analyze the inter-enterprise competition from the perspective of economic change. For this purpose, we build the simulation model as Multi-Agent-Based Simulation in PlatBox Simulator. By replicating the Nelson-Winter model, which clarifies the...
Jane Binner, Barry Jones, Graham Kendall, Jonathan Tepper, Peter Tino
This paper provides the most complete evidence to date on the importance of monetary aggregates as a policy tool in an inflation forecasting experiment. Every possible definition of ‘money’ in the USA is being considered for the full data period (1960 – 2006), using the most sophisticated non-linear...
Longbing Cao, Chao Luo, Jiarui Ni, Dan Luo, Chengqi Zhang
Stock data mining such as financial pairs mining is useful for trading supports and market surveillance. Financial pairs mining targets mining pair relationships between financial entities such as stocks and markets. This paper introduces a fuzzy genetic algorithm framework and strategies for discovering...
Cheng-Hong Yang, Chung-Jui Tu, Jun-Yang Chang, Hsiou-Hsiang Liu, Po-Chang Ko
The feature selection process can be considered a problem of global combinatorial optimization in machine learning, which reduces the number of features, removes irrelevant, noisy and redundant data, and results in acceptable classification accuracy. In this paper, we propose a combination of genetic...
Ming-Yuan Li
In this paper we adopt the Markov-switching specification to establish the hybrid model with time-varying loading on each of chartist and fundamentalist techniques. The US dollar exchange rates of four Asian tiger countries’ currencies serve as the representative examples in this paper. Our empirical...
Hongxing He, Jie Chen, Jin Huidong, Chen Shu-Heng
This paper outlines a data mining approach to analysis and prediction of the trend of stock prices. The approach consists of three steps, namely partitioning, analysis and prediction. A modification of the commonly used k-means clustering algorithm is used to partition stock price time series data....
Tay-Cheng Ma
This paper uses data from Taiwan’s banking sector to investigate if state-owned banks can serve as an internal regulation mechanism to sustain market competition. In contrast to the traditional second-best literature, the evidence shows that a certain degree of market coordination exists in the industry,...
HS Raymond NG, KP LAM
GARCH model has a long history and permeates the modern financial theory. Most researchers use several thousands of financial data and maximum likelihood to estimate the coefficients of model. Statistically, more samples imply better estimation but are hard to obtain. How many samples are sufficient...
Tzung-Pei Hong, Ming-Wen Tsai, Tung-Kuan Liu
In this paper, we propose a new genetic algorithm based on the two-dimensional encoding method. Appropriate two-dimensional crossover and mutation operations are designed based on the two-dimensional representation to generate the next generations. A two-dimensional repairing mechanism is also proposed...
Sheng-Tun Li, Fu-Ching Tsai, Shu-Ching Kuo, Yi-Chung Cheng
The main objective of this study is developing a linguistic cluster model in order to meet the public security index requirement and extract crime rule in time series. In contrast to the current studies in crime theory which mostly rely on traditional behavior science, we turned to a hybrid approach...