Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (31,561)
  • Open Access

    ARTICLE

    Numerical Solution of Fuzzy Equations with Z-numbers Using Neural Networks

    Raheleh Jafaria, Wen Yua, Xiaoou Lib

    Intelligent Automation & Soft Computing, Vol.24, No.1, pp. 151-158, 2018, DOI:10.1080/10798587.2017.1327154

    Abstract In this paper, the uncertainty property is represented by the Z-number as the coefficients of the fuzzy equation. This modification for the fuzzy equation is suitable for nonlinear system modeling with uncertain parameters. We also extend the fuzzy equation into dual type, which is natural for linearin-parameter nonlinear systems. The solutions of these fuzzy equations are the controllers when the desired references are regarded as the outputs. The existence conditions of the solutions (controllability) are proposed. Two types of neural networks are implemented to approximate solutions of the fuzzy equations with Z-number coefficients. More >

  • Open Access

    ARTICLE

    On an Optimization Method Based on Z-Numbers and the Multi-Objective Evolutionary Algorithm

    Dong Qiu, Rongwen Dong, Shuqiao Chen, Andi Li

    Intelligent Automation & Soft Computing, Vol.24, No.1, pp. 147-150, 2018, DOI:10.1080/10798587.2017.1327153

    Abstract In this paper, we research the optimization problems with multiple Z-number valued objectives. First, we convert Z-numbers to classical fuzzy numbers to simplify the calculation. A new dominance relationship of two fuzzy numbers based on the lower limit of the possibility degree is proposed. Then according to this dominance relationship, we present a multi-objective evolutionary algorithm to solve the optimization problems. Finally, a simple example is used to demonstrate the validity of the suggested algorithm. More >

  • Open Access

    ARTICLE

    Sox Compliance with OEE, Enterprise Modeling and Temporal-ABC

    K. Donald Thama, Asad M. Madnib

    Intelligent Automation & Soft Computing, Vol.24, No.1, pp. 17-26, 2018, DOI:10.1080/10798587.2017.1284411

    Abstract The Sarbanes-Oxley (SOX) Act 2002 resulted from the mounting accounting and corporate scandals in the late 1990s and early 2000s. Since the passage of the SOX Act, companies are facing even greater challenges to meet raised expectations to provide accurate, visible, and timely information for SOX compliance. This research puts forth a systems design framework to achieve a real time, accurate, consistently traceable and easily verifiable SOX compliant technology. Our multidisciplinary and integrative systems design incorporates Overall Equipment Effectiveness (OEE) to ensure effective business performance within a knowledge represented company modeled as Enveloped Activity Based More >

  • Open Access

    ARTICLE

    The Research of Address Message of an Unknown Single Protocol Data Frame

    Zheng Jiea,b, Li Jianpinga

    Intelligent Automation & Soft Computing, Vol.24, No.1, pp. 139-144, 2018, DOI:10.1080/10798587.2016.1267445

    Abstract Network protocols are sets of standards for certain network communications. The identification and analysis of network protocol are of significance to network management and security. There are various technologies of protocol identification, but in the process of identification protocols, in order to simplify the identification process and improve the efficiency of protocol identification, unknown mixed multi-protocol needs to be separated into single protocol so as to make further identification. This paper presents an efficient method to determine the single protocol address message based on the previous research of separating unknown mixed data frame into single More >

  • Open Access

    ARTICLE

    The Study on Evaluation Method of Urban Network Security in the Big Data Era

    Qingyuan Zhoua, Jianjian Luob

    Intelligent Automation & Soft Computing, Vol.24, No.1, pp. 133-138, 2018, DOI:10.1080/10798587.2016.1267444

    Abstract Big data is an emerging paradigm applied to datasets whose size is beyond the ability of commonly used software tools to capture, manage, and process the data within a tolerable elapsed time. In a Smarter City, available resources are harnessed safely, sustainably and efficiently to achieve positive, measurable economic and societal outcomes. Most of the challenges of Big Data in Smart Cities are multi-dimensional and can be addressed from different multidisciplinary perspectives. Based on the above considerations, this paper combined the PSR method, the fuzzy logic model and the entropy weight method in an empirical More >

  • Open Access

    ARTICLE

    The Big Data Analysis on the Camera-based Face Image in Surveillance Cameras*

    Zhiguo Yan, Zheng Xu, Jie Dai

    Intelligent Automation & Soft Computing, Vol.24, No.1, pp. 123-132, 2018, DOI:10.1080/10798587.2016.1267251

    Abstract In the Big-Data era, currently how to automatically realize acquisition, refining and fast retrieval of the target information in a surveillance video has become an urgent demand in the public security video surveillance field. This paper proposes a new gun-dome camera cooperative system, which solves the above problem partly. The system adopts a master-slave static panorama-variable view dualcamera cooperative video-monitoring system. In this dual-camera system the gun camera static camera) with a wide viewing -angle lenses is in charge of the pedestrian detection and the dome camera can maneuver its focus and cradle orientation to More >

  • Open Access

    ARTICLE

    Research on Application of Location Technology in 3D Virtual Environment Modeling System for Substation Switch Indicator

    Lijuan Qina,b, Ting Wangb, Chen Yaob

    Intelligent Automation & Soft Computing, Vol.24, No.1, pp. 115-122, 2018, DOI:10.1080/10798587.2016.1267250

    Abstract Substation inspection work plays a very important role in ensuring the normal production and the safe operation of a transformer substation. Use of a substation inspection robot can effectively solve the omission problems of a manual inspection. It can further improve the unmanned and automation of substation and improve security of station. A substation inspection system requires the establishment of a spatial position relation between the robot and the inspection object in the monitoring station. Key technology is the spatial location of the object being detected in the substation. The position of inspection object is… More >

  • Open Access

    ARTICLE

    Enhancing Knowledge Management and Decision-Making Capability of China’s Emergency Operations Center Using Big Data

    Yefeng Maa, Hui Zhangb

    Intelligent Automation & Soft Computing, Vol.24, No.1, pp. 107-114, 2018, DOI:10.1080/10798587.2016.1267249

    Abstract Emerging communication and computing technologies such as social media, Internet of Things and big data provide great opportunities to improve information management systems for emergency operations. This paper studies the issues of information management at China’s Emergency Operations Center (EOC), and proposes a data-driven knowledge management system (KMS) to support decisionmaking, coordination, and collaboration within EOCs and with the public. In the proposed KMS, big data analytics is employed to gather and analyze information from different knowledge domains and track how a crisis evolves in physical world and in cyber space. The proposed system aims More >

  • Open Access

    ARTICLE

    A Hot Event Influence Scope Assessment Method in Cyber-Physical Space For Big Data Application

    Yunlan Xuea, Lingyu Xub, Jie Yub, Gaowei Zhangb

    Intelligent Automation & Soft Computing, Vol.24, No.1, pp. 97-106, 2018, DOI:10.1080/10798587.2016.1267247

    Abstract The increase of scale and complexity of Internet big data presents unprecedented opportunities on Cyber-Physical Systems (CPS). The incompleteness and incredibility of Internet big data are challenging issues for confirming the event influence scope. To solve the above problem, we propose CyberPhysical Space Event Model (CPSEM) to analyze event influence in multi-viewer, which maps real data into Cyber Space (CS) and Physical Space (PS). In addition, we propose Event Influence Scope Detection Algorithm (EISDA) to detect the scope of a hot event in Cyber Space and Physical Space. More >

  • Open Access

    ARTICLE

    Public Health Emergency Management and Multi-Source Data Technology in China

    Xinzhi Wanga, Yi Liub, Hui Zhanga, Qiuju Maa, Zhidong Caoc

    Intelligent Automation & Soft Computing, Vol.24, No.1, pp. 89-96, 2018, DOI:10.1080/10798587.2016.1267246

    Abstract Public health emergency is governed by the physical rules, which are related to the propagation of diseases in the physical space, and the social rules, which are related to government structures, social behaviors, and social media in cyber space. Effective preparedness and response of public health emergency is strongly related to interoperation, collaboration and cooperation among different levels of government agencies and among different regions, as well as information flow and data mining between agencies and general public. In this paper, we review the technologies using multi-source data for public health emergency in China. At More >

Displaying 23451-23460 on page 2346 of 31561. Per Page