Nowadays, many real world datasets are inherently overlapping clusters, and it is also a critical problem for the clustering analysis techniques to partition partially overlapping clusters. In this paper we propose a ...
详细信息
ISBN:
(纸本)9789814619967
Nowadays, many real world datasets are inherently overlapping clusters, and it is also a critical problem for the clustering analysis techniques to partition partially overlapping clusters. In this paper we propose a framework for overlapping clustering, and it consists of clustering, selecting and aggregation. In the clustering part, all kinds of clustering algorithms are suitable. In the selecting part, we propose a method called ConSim (confusion-similarity) to select some overlapping clusters. In the aggregation part, the selected clusters will be blended, and the overlapping objects will be found out. The framework is more flexible and powerful and it is demonstrated effective through experiments on datasets.
We try to provide a tentative assessment of the role of fuzzy sets in decision analysis. We discuss membership functions, aggregation operations, linguistic variables, fuzzy intervals and valued preference relations. ...
详细信息
ISBN:
(纸本)9789814619967
We try to provide a tentative assessment of the role of fuzzy sets in decision analysis. We discuss membership functions, aggregation operations, linguistic variables, fuzzy intervals and valued preference relations. The importance of the notion of bipolarity and the potential of qualitative evaluation methods are also pointed out. We take a critical standpoint on the state of the art, in order to highlight the actual achievements and point out research directions for the future.
In this study, supplier reliability is considered as a criterion for selecting the suppliers. Although, there are dozens of studies in the literature that use different models on supplier performance evaluation, only ...
详细信息
ISBN:
(纸本)9789814619967
In this study, supplier reliability is considered as a criterion for selecting the suppliers. Although, there are dozens of studies in the literature that use different models on supplier performance evaluation, only in a few of these studies supplier's reliability is taken as a parameter of the evaluation. The goal of this study is to determine the factors which play important role on the reliability of suppliers and analyze the importance degrees of these factors. For this purpose, fuzzy DEMATEL method which is frequently preferred in the literature is used in order to analyze interaction among the factors.
The polarity of concepts and the dialectic process by which its meaning emerges has been subject of interest since the ancient Greeks. Recently, the term Bipolarity has been used in social and mathematical sciences, r...
ISBN:
(纸本)9789814619967
The polarity of concepts and the dialectic process by which its meaning emerges has been subject of interest since the ancient Greeks. Recently, the term Bipolarity has been used in social and mathematical sciences, referring to the measurement of the meaning of concepts. It is claimed that the measuring process has to consider at least an associated pair of meaningful opposites, such that some type of structure is used to analyze the aspect of reality that is being modeled. From this point of view, we take a quick overview on the genealogy of Bipolarity, discussing some ideas about the nature of negative knowledge, and how it has been examined recently, and not so recently, by the mathematical community.
In numerous real-world problems including a broad range of decision-making tasks, we are faced with a diversity of locally available distributed sources of data and expert knowledge, with which one has to interact, re...
详细信息
ISBN:
(纸本)9789814619967
In numerous real-world problems including a broad range of decision-making tasks, we are faced with a diversity of locally available distributed sources of data and expert knowledge, with which one has to interact, reconcile and form a global and user-oriented model of the system under consideration. While the technology of Soft Computing has been playing a vital and highly visible role with this regard, there are still a number of challenges inherently manifesting in these problems when dealing with collaboration, reconciliation, and efficient fusion of various sources of knowledge. To prudently address these problems, in this study, we introduce a concept of granular fuzzy systems forming an essential generalization of fuzzy systems pursued in Soft Computing. information granularity of fuzzy sets used in these models is formalized in the framework of Granular Computing. We briefly elaborate on the fundamentals of Granular Computing including (i) a principle of justifiable granularity, (ii) an allocation of information granularity being sought as an essential design asset, and (iii) an emergence of higher type and higher order information granules in investigations of hierarchical architectures of systems. We show the roles of these principles in the analysis and synthesis of granular fuzzy systems. A class of group decision-making problems is studied in detail. We investigate granular AHP models and demonstrate a pivotal role of information granularity in the generalization of these constructs.
Most of the dynamic web applications generates HTML web documents that are deemed invalid as they do not adhere to the HTML standards defined under the world Wide Consortium (W3C). Though state-of-the-art web browsers...
详细信息
ISBN:
(纸本)9789814619967
Most of the dynamic web applications generates HTML web documents that are deemed invalid as they do not adhere to the HTML standards defined under the world Wide Consortium (W3C). Though state-of-the-art web browsers are capable of rendering malformed HTML documents by correcting these errors discretely, most of the time such incidents poses compatibility issues which causes performance degradation for some applications. Various validation tools have been developed and are widely available across the Internet to address the mentioned issue, however, these tools only worked well for static web applications since it doesn't address the aggressive nature of dynamic web applications. Furthermore, validation tools targeting dynamic web applications available currently employ a static technique which is impossible in examining every single execution route possible. To resolve such issue, we have presented a novel framework for validating dynamic web applications through a set of heuristic rules which takes into consideration the syntax of several well-known server side languages such as PHP, Java EE and ASP. NET. As an extension to that paper, we now introduces a path finding and cross platform tools to validate HTML tags based on the server side language flow of execution.
In this paper, some results about interval uninorms with the additional property of monotonicity inclusion are introduced;e.g construction of interval uniforms from usual uniforms and constructions of interval t-norms...
详细信息
ISBN:
(纸本)9789814619967
In this paper, some results about interval uninorms with the additional property of monotonicity inclusion are introduced;e.g construction of interval uniforms from usual uniforms and constructions of interval t-norms and t-conorms from interval uninorms. It is also shown that the neutral element of this type of interval uninorm must be a degenerate interval.
New aggregation operators are introduced by using distance measures with the ordered weighted average, the probability and the weighted average. This approach is developed by using the Minkowski distance which uses ge...
详细信息
ISBN:
(纸本)9789814619967
New aggregation operators are introduced by using distance measures with the ordered weighted average, the probability and the weighted average. This approach is developed by using the Minkowski distance which uses generalized means in the aggregation process. In order to do this, it is introduced the generalized probabilistic ordered weighted averaging weighted averaging distance (GPOWAWAD) operator. It provides a parameterized family of aggregation operators between the minimum distance and the maximum one considering subjective and objective information in the analysis. Some of its main properties and particular cases are also studied.
The paper presents the novel approach to detection of some types of network attacks using web server logs. As the web server log files are just collections of strings describing users' requests to the server, the ...
详细信息
ISBN:
(纸本)9789814619967
The paper presents the novel approach to detection of some types of network attacks using web server logs. As the web server log files are just collections of strings describing users' requests to the server, the method of conversion informative part of the requests to numerical values has been proposed. The vector of values obtained as the result of web server log file processing is then used as the input to Self-Organizing Map (SOM) network. Finally, the SOM network has been trained to detect SQL injections and brute force password guessing attack. The method has been validated using the data obtained from a real data center.
We address the use of two strategies for edge detection in polarimetric Synthetic Aperture Radar-SAR imagery. Both approaches stem from the realm of optical images: Canny and one inspired by the Law of Universal Gravi...
详细信息
ISBN:
(纸本)9789814619967
We address the use of two strategies for edge detection in polarimetric Synthetic Aperture Radar-SAR imagery. Both approaches stem from the realm of optical images: Canny and one inspired by the Law of Universal Gravitation. Images are filtered prior to edge detection by two procedures: Lee and Torres filters. Two types of neighborhoods are employed.
暂无评论