نتایج جستجو برای: fuzzy credibility

تعداد نتایج: 99680  

Journal: :international journal of supply and operations management 2014
mehdi alinaghian seyed reza hejazi noushin bajoul

in the field of health losses resulting from failure to establish the facilities in a suitable location and the required number, beyond the cost and quality of service will result in an increase in mortality and the spread of diseases. so the facility location models have special importance in this area. in this paper, a successively inclusive hierarchical model for location of health centers i...

In this paper, the fuzzy multi-depot vehicle routing problem with simultaneous pickup and delivery (FMDVRP-SPD) is investigated. The FMDVRP-SPD is the problem of allocating customers to several depots, so that the optimal set of routes is determined simultaneously to serve the pickup and the delivery demands of each customer within scattered depots. In the problem, both pickup and delivery dema...

2005
Tatjana Petković Risto Lahdelma

A framework for a multi-attribute multi-source data fusion is described. Uncertainty of data is modeled by fuzzy sets. The problem is considered on a general level. Credibility of sources, compatibility of data, as well as their reasonableness, are taken into consideration. The proposed method is illustrated by an example.

Journal: :Symmetry 2017
Kwan Woo Lee Hyung Gil Hong Kang Ryoung Park

The application of user emotion recognition for fear is expanding in various fields, including the quantitative evaluation of horror movies, dramas, advertisements, games, and the monitoring of emergency situations in convenience stores (i.e., a clerk threatened by a robber), in addition to criminal psychology. Most of the existing methods for the recognition of fear involve referring to a sing...

2014
James Melton

Economic theory predicts a positive relationship between property rights and economic growth. However, few developing countries have experienced better economic performance after improving their protection of property rights. The following manuscript addresses this puzzle by directly assessing where property rights reforms have been effective. I argue that multiple, reinforcing credibility mech...

2012
Jiang Yang Scott Counts Meredith Ringel Morris Aaron Hoff

Microblogs have become an increasingly important source of information, both in the U.S. (Twitter) and in China (Weibo). However, the brevity of microblog updates, combined with increasing access of microblog content through search rather than through direct network connections, makes it challenging to assess the credibility of news relayed in this manner [34]. This paper reports on experimenta...

2011
Yongqing Feng Wenchuan Wu Boming Zhang Jinwu Gao

The failure possibility of transmission lines in power system may change from time to time since it will be affected by weather, environment and operating conditions, especially under short-time period. Impacts of various conditions on failure possibility can be described using fuzzy words. In this paper, credibility theory was introduced to model the short-term line maintenance-scheduling prob...

Xue-Jie Bai Yan-Kui Liu

Based on credibilistic value-at-risk (CVaR) of regularfuzzy variable, we introduce a new CVaR reduction method fortype-2 fuzzy variables. The reduced fuzzy variables arecharacterized by parametric possibility distributions. We establishsome useful analytical expressions for mean values and secondorder moments of common reduced fuzzy variables. The convex properties of second order moments with ...

Journal: :Computers & Industrial Engineering 2012
Mir Saman Pishvaee S. Ali Torabi J. Razmi

Measuring and controlling emissions across the logistics network is an important challenge for today’s firms according to increasing concern about the environmental impact of business activities. This paper proposes a bi-objective credibility-based fuzzy mathematical programming model for designing the strategic configuration of a green logistics network under uncertain conditions. The model ai...

2015
Shah Nazir Sara Shahzad Sher Afzal Khan Norma Binti Alias Sajid Anwar

Software birthmark is a unique quality of software to detect software theft. Comparing birthmarks of software can tell us whether a program or software is a copy of another. Software theft and piracy are rapidly increasing problems of copying, stealing, and misusing the software without proper permission, as mentioned in the desired license agreement. The estimation of birthmark can play a key ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید