Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,212)
  • Open Access

    ARTICLE

    Modeling of Consumer Buying Behaviour Using Z-Number Concept

    Gunay Sadikoglu

    Intelligent Automation & Soft Computing, Vol.24, No.1, pp. 173-178, 2018, DOI:10.1080/10798587.2017.1327159

    Abstract Consumer behaviour has always been of a great interest in marketing research. The consumer buying behaviour has become an integral part of strategic market planning and includes mental, emotional and physical activities. The consumer behaviour and decision-making process are usually subject to uncertainties related to influences of socio-cultural, psychological and personal factors. In this paper, the Z-number concept is applied for handling uncertainties in analysing the consumer buying behaviour. More >

  • Open Access

    ARTICLE

    Failure Mode and Effects Analysis Based on Z-numbers

    Wen Jiang, Chunhe Xie, Boya Wei, Yongchuan Tang

    Intelligent Automation & Soft Computing, Vol.24, No.1, pp. 165-172, 2018, DOI:10.1080/10798587.2017.1327158

    Abstract The main objective of this paper is to propose a new method for failure mode and effects analysis (FMEA) based on Z-numbers. In the proposed method, firstly, Z-numbers are used to perform the valuations (Z-valuation) of the risk factors like occurrence (O), severity (S) and detection (D). Secondly, the Z-valuations of the risk factors are integrated by fuzzy weighted mean method. A new risk priority number named as ZRPN is calculated to prioritize failure modes based on a modified method of ranking fuzzy numbers. Finally, a case study for the rotor blades of an aircraft turbine is performed to demonstrate… More >

  • Open Access

    ARTICLE

    The Identification of Job Satisfaction under Z-Information

    S. Z. Eyupoglua, K. I. Jabbarovab, K. R. Aliyevac

    Intelligent Automation & Soft Computing, Vol.24, No.1, pp. 159-164, 2018, DOI:10.1080/10798587.2017.1327156

    Abstract Complexities in organizational and economical environments have lead psychologists, management scholars, and economists to investigate the multi-dimensional essence of job satisfaction. Unfortunately, existing studies are based on exact data, whereas relevant information is imperfect. To deal with imprecise and partially reliable information, Zadeh proposed the concept of a Z-number. In this paper we consider the Z-number valued rule based model to represent the relationship between job satisfaction and the facets/factors influencing job satisfaction. A real-world job satisfaction index evaluation problem is used to illustrate the suggested approach More >

  • Open Access

    ARTICLE

    Numerical Solution of Fuzzy Equations with Z-numbers Using Neural Networks

    Raheleh Jafaria, Wen Yua, Xiaoou Lib

    Intelligent Automation & Soft Computing, Vol.24, No.1, pp. 151-158, 2018, DOI:10.1080/10798587.2017.1327154

    Abstract In this paper, the uncertainty property is represented by the Z-number as the coefficients of the fuzzy equation. This modification for the fuzzy equation is suitable for nonlinear system modeling with uncertain parameters. We also extend the fuzzy equation into dual type, which is natural for linearin-parameter nonlinear systems. The solutions of these fuzzy equations are the controllers when the desired references are regarded as the outputs. The existence conditions of the solutions (controllability) are proposed. Two types of neural networks are implemented to approximate solutions of the fuzzy equations with Z-number coefficients. More >

  • Open Access

    ARTICLE

    On an Optimization Method Based on Z-Numbers and the Multi-Objective Evolutionary Algorithm

    Dong Qiu, Rongwen Dong, Shuqiao Chen, Andi Li

    Intelligent Automation & Soft Computing, Vol.24, No.1, pp. 147-150, 2018, DOI:10.1080/10798587.2017.1327153

    Abstract In this paper, we research the optimization problems with multiple Z-number valued objectives. First, we convert Z-numbers to classical fuzzy numbers to simplify the calculation. A new dominance relationship of two fuzzy numbers based on the lower limit of the possibility degree is proposed. Then according to this dominance relationship, we present a multi-objective evolutionary algorithm to solve the optimization problems. Finally, a simple example is used to demonstrate the validity of the suggested algorithm. More >

  • Open Access

    ARTICLE

    Sox Compliance with OEE, Enterprise Modeling and Temporal-ABC

    K. Donald Thama, Asad M. Madnib

    Intelligent Automation & Soft Computing, Vol.24, No.1, pp. 17-26, 2018, DOI:10.1080/10798587.2017.1284411

    Abstract The Sarbanes-Oxley (SOX) Act 2002 resulted from the mounting accounting and corporate scandals in the late 1990s and early 2000s. Since the passage of the SOX Act, companies are facing even greater challenges to meet raised expectations to provide accurate, visible, and timely information for SOX compliance. This research puts forth a systems design framework to achieve a real time, accurate, consistently traceable and easily verifiable SOX compliant technology. Our multidisciplinary and integrative systems design incorporates Overall Equipment Effectiveness (OEE) to ensure effective business performance within a knowledge represented company modeled as Enveloped Activity Based Enterprise Model (EABEM) that facilitates… More >

  • Open Access

    ARTICLE

    The Research of Address Message of an Unknown Single Protocol Data Frame

    Zheng Jiea,b, Li Jianpinga

    Intelligent Automation & Soft Computing, Vol.24, No.1, pp. 139-144, 2018, DOI:10.1080/10798587.2016.1267445

    Abstract Network protocols are sets of standards for certain network communications. The identification and analysis of network protocol are of significance to network management and security. There are various technologies of protocol identification, but in the process of identification protocols, in order to simplify the identification process and improve the efficiency of protocol identification, unknown mixed multi-protocol needs to be separated into single protocol so as to make further identification. This paper presents an efficient method to determine the single protocol address message based on the previous research of separating unknown mixed data frame into single protocol. By this way, the… More >

  • Open Access

    ARTICLE

    The Study on Evaluation Method of Urban Network Security in the Big Data Era

    Qingyuan Zhoua, Jianjian Luob

    Intelligent Automation & Soft Computing, Vol.24, No.1, pp. 133-138, 2018, DOI:10.1080/10798587.2016.1267444

    Abstract Big data is an emerging paradigm applied to datasets whose size is beyond the ability of commonly used software tools to capture, manage, and process the data within a tolerable elapsed time. In a Smarter City, available resources are harnessed safely, sustainably and efficiently to achieve positive, measurable economic and societal outcomes. Most of the challenges of Big Data in Smart Cities are multi-dimensional and can be addressed from different multidisciplinary perspectives. Based on the above considerations, this paper combined the PSR method, the fuzzy logic model and the entropy weight method in an empirical study for feasible urban public… More >

  • Open Access

    ARTICLE

    The Big Data Analysis on the Camera-based Face Image in Surveillance Cameras*

    Zhiguo Yan, Zheng Xu, Jie Dai

    Intelligent Automation & Soft Computing, Vol.24, No.1, pp. 123-132, 2018, DOI:10.1080/10798587.2016.1267251

    Abstract In the Big-Data era, currently how to automatically realize acquisition, refining and fast retrieval of the target information in a surveillance video has become an urgent demand in the public security video surveillance field. This paper proposes a new gun-dome camera cooperative system, which solves the above problem partly. The system adopts a master-slave static panorama-variable view dualcamera cooperative video-monitoring system. In this dual-camera system the gun camera static camera) with a wide viewing -angle lenses is in charge of the pedestrian detection and the dome camera can maneuver its focus and cradle orientation to get the clear and enlarged… More >

  • Open Access

    ARTICLE

    Research on Application of Location Technology in 3D Virtual Environment Modeling System for Substation Switch Indicator

    Lijuan Qina,b, Ting Wangb, Chen Yaob

    Intelligent Automation & Soft Computing, Vol.24, No.1, pp. 115-122, 2018, DOI:10.1080/10798587.2016.1267250

    Abstract Substation inspection work plays a very important role in ensuring the normal production and the safe operation of a transformer substation. Use of a substation inspection robot can effectively solve the omission problems of a manual inspection. It can further improve the unmanned and automation of substation and improve security of station. A substation inspection system requires the establishment of a spatial position relation between the robot and the inspection object in the monitoring station. Key technology is the spatial location of the object being detected in the substation. The position of inspection object is unknown. This paper gives technical… More >

Displaying 14341-14350 on page 1435 of 22212. Per Page