Hugendubel.info - Die B2B Online-Buchhandlung 

Merkliste
Die Merkliste ist leer.
Bitte warten - die Druckansicht der Seite wird vorbereitet.
Der Druckdialog öffnet sich, sobald die Seite vollständig geladen wurde.
Sollte die Druckvorschau unvollständig sein, bitte schliessen und "Erneut drucken" wählen.

Backward Fuzzy Rule Interpolation

BuchGebunden
159 Seiten
Englisch
Springererschienen am21.08.20181st ed. 2019
In addition, to further enhance the versatility and potential of BFRI, the backward fuzzy interpolation method isextended to support α-cut based interpolation by employing a fuzzy interpolation mechanism for multi-dimensional input spaces (IMUL).mehr
Verfügbare Formate
BuchGebunden
EUR106,99
BuchKartoniert, Paperback
EUR106,99
E-BookPDF1 - PDF WatermarkE-Book
EUR96,29

Produkt

KlappentextIn addition, to further enhance the versatility and potential of BFRI, the backward fuzzy interpolation method isextended to support α-cut based interpolation by employing a fuzzy interpolation mechanism for multi-dimensional input spaces (IMUL).
Details
ISBN/GTIN978-981-13-1653-1
ProduktartBuch
EinbandartGebunden
Verlag
Erscheinungsjahr2018
Erscheinungsdatum21.08.2018
Auflage1st ed. 2019
Seiten159 Seiten
SpracheEnglisch
Gewicht420 g
IllustrationenXVII, 159 p. 44 illus., 27 illus. in color.
Artikel-Nr.15800561

Inhalt/Kritik

Inhaltsverzeichnis
Introduction.- Background: Fuzzy Rule Interpolation (FRI).- BFRI with a Single Missing Antecedent Value (S-BFRI).- BFRI with Multiple Missing Antecedent Values (M-BFRI).- An Alternative BFRI Method.- Backward rough-fuzzy rule interpolation.- Application: Terrorism Risk Assessment using BFRI.- Conclusion.- Appendix A Publications Arising from the Thesis.- Appendix B List of Acronyms.- Appendix C Glossary of terms.- Bibliography.mehr

Autor



Shangzhu Jin received his B.Sc. degree in Computer Science from Beijing Technology and Business University, China, his M.Sc. degree in Control Theory and Control from Yanshan University, China, and his Ph.D. degree from Aberystwyth University, UK. He is currently an Associate Professor at the School of Electronic Information Engineering, Chongqing University of Science and Technology. His research interests include fuzzy systems, approximate reasoning, and network security. His paper, entitled Backward Fuzzy Interpolation and Extrapolation with Multiple Multi-antecedent Rules won the best student paper award at the 21st IEEE International Conference on Fuzzy Systems. 

Qiang Shen is a Professor and Director of the Institute of Mathematics, Physics and Computer Science (IMPACS) at Aberystwyth University. His major research interests include computational intelligence, fuzzy and qualitative systems, reasoning and learning under uncertainty, pattern recognition, data mining, and real-world applications of such techniques for decision support (e.g., crime detection, space exploration, consumer profiling, systems monitoring, and medical diagnosis). He has published two research monographs and over 360 peer-refereed papers. A number of his papers have received prestigious international prizes. 
Jun Peng received a Ph.D. degree in Computer Software and Theory from Chongqing University in 2003, an M.A. in Computer System Architecture from Chongqing University in 2000, and a BSc in Applied Mathematics from Northeast University in 1992. From 1992 to present he has worked at Chongqing University of Science and Technology, where he is currently a Professor and Dean of the School of Electrical and Information Engineering. He was a visiting scholar in the Laboratory of Cryptography and Information Security at Tsukuba University, Japan in 2004, and at theDepartment of Computer Science at California State University, Sacramento in 2007, respectively. He has authored or coauthored over 60 peer-reviewed journal and conference papers. He has served as a program committee member or session co-chair for over 10 international conferences, e.g. the IEEE SEKE´10, ICCI*CC´11-17, ICISME 2012, andICOACS´16. His current research interests are in cryptography, chaos and network security, image processingand intelligence computation.