Computing with Words in Risk Assessment

نویسندگان

  • Jun Liu
  • Luis Martínez-López
  • Hui Wang
  • Rosa M. Rodríguez
  • Vasily Novozhilov
چکیده

This paper presents a comprehensive overview of currently known applications of computing with words (CWW) in risk assessment. It is largely grouped into the following 5 categories: (1) fuzzy number based risk assessment; (2) fuzzy rule-based risk assessment; (3) fuzzy extension of typical probabilistic risk assessment; (4) ordinal linguistic approach for risk assessment; and (5) miscellaneous applications. In addition, the role of CWW within the broad area of risk assessment is briefly characterized.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A risk model for cloud processes

Traditionally, risk assessment consists of evaluating the probability of "feared events", corresponding to known threats and attacks, as well as these events' severity, corresponding to their impact on one or more stakeholders. Assessing risks of cloud-based processes is particularly difficult due to lack of historical data on attacks, which has prevented frequency-based identification...

متن کامل

A Fuzzy Rule-based Expert System for the Prognosis of the Risk of Development of the Breast Cancer

Soft Computing techniques play an important role for decision in applications with imprecise and uncertain knowledge. The application of soft computing disciplines is rapidly emerging for the diagnosis and prognosis in medical applications. Between various soft computing techniques, fuzzy expert system takes advantage of fuzzy set theory to provide computing with uncertain words. In a fuzzy exp...

متن کامل

Type-2 fuzzy set extension of DEMATEL method combined with perceptual computing for decision making

Most decision making methods used to evaluate a system or demonstrate the weak and strength points are based on fuzzy sets and evaluate the criteria with words that are modeled with fuzzy sets. The ambiguity and vagueness of the words and different perceptions of a word are not considered in these methods. For this reason, the decision making methods that consider the perceptions of decision...

متن کامل

Assessment Methodology for Anomaly-Based Intrusion Detection in Cloud Computing

Cloud computing has become an attractive target for attackers as the mainstream technologies in the cloud, such as the virtualization and multitenancy, permit multiple users to utilize the same physical resource, thereby posing the so-called problem of internal facing security. Moreover, the traditional network-based intrusion detection systems (IDSs) are ineffective to be deployed in the cloud...

متن کامل

IMPACTS AND CHALLENGES OF CLOUD COMPUTING FOR SMALL AND MEDIUM SCALE BUSINESSES IN NIGERIA

Cloud computing technology is providing businesses, be it micro, small, medium, and large scale enterprises with the same level playing grounds. Small and Medium enterprises (SMEs) that have adopted the cloud are taking their businesses to greater heights with the competitive edge that cloud computing offers. The limitations faced by (SMEs) in procuring and maintaining IT infrastructures has be...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Int. J. Computational Intelligence Systems

دوره 3  شماره 

صفحات  -

تاریخ انتشار 2010