作者:
Ta-Wei HUNGShu-Cherng FANGHenry L.W.NUTTLEDepartment of Information Management Shih Chien University
Taipei Taiwan 10497 ChinaGraduate Program in Operations Research and Department of Industrial Engineering North Carolina State University Raleigh NC 27695-7906 U.S.A.Graduate Program in Operations Research and Department of Industrial Engineering North Carolina State University Raleigh NC 27695-7906 U.S.A.
A two-phase approach to fuzzy system identification is proposed. The first phase produces a baseline design to identify a prototype fuzzy system for a target system from a collection of input-output data pairs. It use...
详细信息
A two-phase approach to fuzzy system identification is proposed. The first phase produces a baseline design to identify a prototype fuzzy system for a target system from a collection of input-output data pairs. It uses two easily implemented clustering techniques: the subtractive clustering method and the fuzzy c-means (FCM) clustering algorithm. The second phase (fine tuning) is executed to adjust the parameters identified in the baseline design. This phase uses the steepest descent and recursive least-squares estimation methods. The proposed approach is validated by applying it to both a function approximation type of problem and a classification type of problem. An analysis of the learning behavior of the proposed approach for the two test problems is conducted for further confirmation.
Security and safety, in a variety of situations, are related in terms of content and also share analysis methods. One such system-level method is Zwicky's morphological approach which is especially helpful when a ...
详细信息
Security and safety, in a variety of situations, are related in terms of content and also share analysis methods. One such system-level method is Zwicky's morphological approach which is especially helpful when a problem area is being addressed from several perspectives. This paper reports upon the explicit mapping of general management functions against safety-related matters, leading to two tables with 65 and 70 cells, respectively. These cells represent discrete areas which may then be formally evaluated in order to assess the overall management control of a safety program. For each of the resulting 135 cells, a set of specific questions was formulated. The answers lead to a numeric score reflecting the degree to which each management function is being appropriately executed. In the aggregate, an overall measure is obtained of the extent to which the totality of management functions deal with all safety-related matters.
The purpose of this paper is to describe a new active queue management and packet scheduling technique to be used by real-time Internet video applications. In this technique packets are classified into classes accordi...
详细信息
The purpose of this paper is to describe a new active queue management and packet scheduling technique to be used by real-time Internet video applications. In this technique packets are classified into classes according to its importance to the application. Also, every packet is marked with a time limit to arrive at the destination and the expected number of hops until arrival. It is used as a measure of distance. Time limit and number of hops are combined to form a relay priority for forwarding and are used to find the packet a preferential position in the router output queue. Packet transmission using this technique helps us assure quality of service to the operation of real-time video applications.
This study investigates an influence of catastrophic damage caused by natural disaster on international market. In case a large country in the world economy is damaged, fiscal policies for recovery from disaster vary ...
详细信息
This study investigates an influence of catastrophic damage caused by natural disaster on international market. In case a large country in the world economy is damaged, fiscal policies for recovery from disaster vary rates of return in international capital market and consequently affect consumption and investment behavior of households even undamaged countries. This study formulates an overlapping-generation-model, which contains two counties, to investigate international externality in dynamic reconstruction process and strategic tax policies adopted by two national governments in the market where source-based taxation rule is applied. The government of the damaged country is motivated to discount tax rates on capital income in order to attract international capital, causing outflow of capital from the undamaged country. The study further investigates the tax-subsidy policies by the government of the undamaged country to mitigate the negative externality, and refers to possibility of tax competition.
In case of emergency, we need to grasp the situation and make correct assessment quickly. The video data taken from the monitoring camera is important information in the emergent situation. In our research, we attempt...
详细信息
In case of emergency, we need to grasp the situation and make correct assessment quickly. The video data taken from the monitoring camera is important information in the emergent situation. In our research, we attempt to build a support system for identifying the video data of the monitoring camera by dealing with video data as spatio-temporal data. We proposed a method, which displays those video data on one virtual large wall. For this presentation, the search key in our system is the location and the size of this large screen and from which direction to look. First we developed a general algorithm to index spatio-temporal data to get an idea for developing the algorithm for this search key.
The concepts and practice of information security have for the most part been contained within computer science or electrical engineeringdepartments in academia. However, as the information age matures and pervasive ...
详细信息
The concepts and practice of information security have for the most part been contained within computer science or electrical engineeringdepartments in academia. However, as the information age matures and pervasive IT supports every engineering discipline, a requirement to teach information security to engineering managers emerges. The challenges of presenting concepts, theories, and approaches to engineering managers are many when those concepts have been developed from a decidedly computer-oriented perspective. This paper explores experiences, challenges, and innovative solutions based on the last five years of educational efforts at the graduate level.
The focus of this paper is the searching behavior in peer-to-peer (P2P) communities and in that context, will discuss potential for enhancement of the P2P protocol using searching behavior. Due to excessive network tr...
详细信息
The focus of this paper is the searching behavior in peer-to-peer (P2P) communities and in that context, will discuss potential for enhancement of the P2P protocol using searching behavior. Due to excessive network traffic, network scalability is a major P2P problem. The purpose of this paper is to study searching behavior by using log files and subsequently, will propose solutions to reduce the amount of redundant searching activities. In the current research, log data containing over 5 million query messages was collected over seven consecutive days using a Gnutella-based P2P program. The results of this study will be instrumental in providing ways to reduce existing problems with P2P network traffic.
This study aims to develop general programs, irrespective of the governing equations, schemes, grid structures, and vascular models, for numerical analyses of bio-heat and mass transfer. We have used the CFSV-model pr...
详细信息
This study aims to develop general programs, irrespective of the governing equations, schemes, grid structures, and vascular models, for numerical analyses of bio-heat and mass transfer. We have used the CFSV-model proposed on the basis that every equation discretized for numerical analysis of three-dimensional continuous media is no other than the relation among quantities on elements such as cells, faces, sides, and vertices, to generate the data file with the kind, category, serial number of the every tissue element, and the junction relation with its ambient elements. Since these data can be referred at ease in a program with some functions, it is effective to produce the program. The element data has been applied to a simple vascular model, and it can be useful for the numerical calculation.
In this paper, as the first step of managing both storagability and operatability in the floor warehouse, we deal with a scheduling for assignment of forklifts on an arrangement work. We propose an algorithm that calc...
详细信息
In this paper, as the first step of managing both storagability and operatability in the floor warehouse, we deal with a scheduling for assignment of forklifts on an arrangement work. We propose an algorithm that calculates a semi-optimal solution in practical time for this problem. This algorithm bases on simulated annealing and consists of three layers with a different search domain. We also propose methods of online re-planning against the model error in offline plan stage, and the uncertainty of human work. The validity of our method is verified in simulation.
We constructed a biomolecular structural information database using object-oriented database management system (ODBMS). In this paper, evaluation of the constructed DB and an application of data mining method using th...
详细信息
We constructed a biomolecular structural information database using object-oriented database management system (ODBMS). In this paper, evaluation of the constructed DB and an application of data mining method using the DB are shown.
暂无评论