Filters








22,861 Hits in 8.4 sec

FARM: Fuzzy Action Rule Mining

Zahra Entekhabi, Pirooz Shamsinejadbabki
2018 International Journal of Advanced Computer Science and Applications  
Because the space of all fuzzy action rules can be so huge a Genetic Algorithm-based Fuzzy Action Rule Mining (GA-FARM) method has been devised for finding the most costeffective fuzzy action rules with  ...  Action Mining is a sub-field of Data Mining that concerns about finding ready-to-apply action rules.  ...  Besides, a method has been devised for derivation of fuzzy action sets with maximum net profit from data using Genetic Algorithm.  ... 
doi:10.14569/ijacsa.2018.090134 fatcat:cyvvkdyjdbfprm6pxzdx5mpcsy

Development of an intelligent quality management system using fuzzy association rules

H.C.W. Lau, G.T.S. Ho, K.F. Chu, William Ho, C.K.M. Lee
2009 Expert systems with applications  
This paper proposes an intelligent system with a newly designed algorithm and the universal process data exchange standard to overcome the challenges of demanding customers who seek high-quality and low-cost  ...  However, only a small number of the currently used systems are reported to be operating effectively because they are designed to maintain a quality level within the specified process, rather than to focus  ...  A Genetic Neural Fuzzy System (GNFS) with the hybrid learning strategy was developed to construct a quality prediction model for the injection of process from the input and output data (Li, Jia, & Yu,  ... 
doi:10.1016/j.eswa.2007.12.066 fatcat:idzl3cqqrjbqfjugdm2ybx5z6y

Knowledge actionability: satisfying technical and business interestingness

Longbing Cao, Dan Luo, Chengqi Zhang
2007 International Journal of Business Intelligence and Data Mining  
In this paper, we propose a two-way significance framework for measuring knowledge actionability, which highlights both technical interestingness and domain-specific expectations.  ...  We further develop a fuzzy interestingness aggregation mechanism to generate a ranked final pattern set balancing technical and business interests.  ...  has disclosed a more practical way for discovering actionable trading patterns using data mining methods.  ... 
doi:10.1504/ijbidm.2007.016385 fatcat:kaqnldbu5be5tii3uwjjpk5aqm

D-FICCA: A density-based fuzzy imperialist competitive clustering algorithm for intrusion detection in wireless sensor networks

Shahaboddin Shamshirband, Amineh Amini, Nor Badrul Anuar, Miss Laiha Mat Kiah, Ying Wah Teh, Steven Furnell
2014 Measurement (London)  
In the current paper, a hybrid clustering method is introduced, namely a density-based fuzzy imperialist competitive clustering algorithm (D-FICCA).  ...  Hereby, the imperialist competitive algorithm (ICA) is modified with a density-based algorithm and fuzzy logic for optimum clustering in WSNs.  ...  K-MICA is introduced as a hybrid unsupervised data partitioning method that incorporates an ICA with K-means for effective data clustering [30] .  ... 
doi:10.1016/j.measurement.2014.04.034 fatcat:z7ofpaluifahbfblqre5ulrin4

Data mining in soft computing framework: a survey

S. Mitra, S.K. Pal, P. Mitra
2002 IEEE Transactions on Neural Networks  
Genetic algorithms provide efficient search algorithms to select a model, from mixed media data, based on some preference criterion/objective function.  ...  Generally fuzzy sets are suitable for handling the issues related to understandability of patterns, incomplete/noisy data, mixed media information and human interaction, and can provide approximate solutions  ...  A rough set learning algorithm can be used to obtain a set of rules in IF-THEN form, from a decision table. The rough set method provides an effective tool for extracting knowledge from databases.  ... 
doi:10.1109/72.977258 pmid:18244404 fatcat:wz6gxwj3mvgexl6slz3dl4q54i

A novel approach for risk evaluation and risk response planning in a geothermal drilling project using DEMATEL and fuzzy ANP

Alireza Ghassemi, Ayoub Darvishpour
2018 Decision Science Letters  
In the second phase, ANP, DEMATEL and fuzzy theory play important roles in weighting risks and responses.  ...  After obtaining the optimal responses, the effect of budget is analyzed. In addition, the influences of risks on each other are discussed more deeply.  ...  well 835 0.1 Table 5 5 Set of risk response actions for a geothermal drilling project (the third column refers to implementation cost of actions) Response Name Description Estimated Cost  ... 
doi:10.5267/j.dsl.2017.10.001 fatcat:amyoptlllff7hd5p2docczmrjm

Fuzzy Relational Modeling of Cost and Affordability for Advanced Technology Manufacturing Environment [article]

Ladislav J. Kohout, Eunjin Kim, Gary Zenz
2003 arXiv   pre-print
Testing fuzzy relational structures for various relational properties allows us to discover dependencies, hierarchies, similarities, and equivalences of the attributes characterizing technological processes  ...  and manufactured artifacts in their relationship to costs and performance.  ...  [Also partially Use of Fuzzy Relational Methods for data and knowledge elicitation and representation, and affordability modeling.2.  ... 
arXiv:cs/0310021v1 fatcat:xt6tccjcgzdutn5ky2g7ytdnfe

Data Mining in Healthcare

Matthew N. O. Sadiku, Kelechi G. Eze, Sarhan M. Musa
2018 International Journal of Advances in Scientific Research and Engineering  
Data mining is a newly developed technology, which has its own methods, procedures and techniques. It is the task of discovering useful patterns from a large amount of data.  ...  The future of healthcare will depend on using data mining to decrease healthcare costs and improve the standard of patient care.  ...  However, there is a lack of effective analysis tools to discover hidden relationships and trends in data.  ... 
doi:10.31695/ijasre.2018.32881 fatcat:pdrflbnieferlnu7scrcnkpbpi

Verification of Ranked Keyword Search in Cloud Computing

2017 International Journal of Science and Research (IJSR)  
.With our methodically designed verification construction, the cloud server can't know which Data Owner data are embedded in the verification data buffer, or what no of Data Owner's verification data  ...  With our carefully devised verification data, the cloud server can't know which data owner, or what number of data owner exchange anchor data which will be utilized for verifying the cloud server's misbehavior  ...  cloud: Enabling keyword search directly over encrypted data is a desirable technique for effective utilization of encrypted data Volume 6 Issue 1, January 2017 www.ijsr.net Licensed Under Creative Commons  ... 
doi:10.21275/art20164006 fatcat:o5ezqlmnvbgcbdlnlvj6z3spnu

DATA STORAGE MANAGEMENT USING AI METHODS

Funika Wlodzimierz, Szura Filip
2013 Computer Science  
In this paper we aim to present our system which uses such AI techniques like fuzzy logic or a rule-based expert system to deal with data storage management.  ...  We exploit in this system a cost model to analyze the proposed solutions. The operations performed by our system are aimed to optimize the usage of the monitored infrastructure.  ...  This approach exploits not only AI methods but also it introduces the cost model which is used to pick the cheapest action from the actions proposed by the knowledge engines.  ... 
doi:10.7494/csci.2012.14.2.177 fatcat:ajb7d3lxnba4lkgkiyc6ekcjju

DATA STORAGE MANAGEMENT USING AI METHODS

Funika Wlodzimierz, Szura Filip
2013 Computer Science  
In this paper we aim to present our system which uses such AI techniques like fuzzy logic or a rule-based expert system to deal with data storage management.  ...  We exploit in this system a cost model to analyze the proposed solutions. The operations performed by our system are aimed to optimize the usage of the monitored infrastructure.  ...  This approach exploits not only AI methods but also it introduces the cost model which is used to pick the cheapest action from the actions proposed by the knowledge engines.  ... 
doi:10.7494/csci.2013.14.2.177 fatcat:6zsqe4v4pzfozo7xh7nsauswiq

Software Risk Analysis with the use of Classification Techniques: A Review

M. N. A. Khan, A. M. Mirza, I. Saleem
2020 Zenodo  
The early identification of risks in each phase of software development coupled with mitigating plans can help to reduce the cost of the product and increase software quality.  ...  Most risk analysis techniques have been applied in the requirement analysis phase, so there is a scarcity of tools supporting automated risk analysis.  ...  [1] Fault-prone effect software quality and software cost. -Fuzzy integral -Object-oriented metrics -Method-level metrics -Fuzzy integral classifier.  ... 
doi:10.5281/zenodo.3934583 fatcat:4mz565mkzvbvvngszld5vedmn4

A fuzzy method for the usability evaluation of nuclear medical equipment

Cláudio Henrique dos Santos Grecco, Isaac José Antonio Luquetti Dos Santos, Marcos Santana Farias, Larissa Pereira De Farias, Alfredo Marques Vianna Filho
2021 Brazilian Journal of Radiation Sciences  
In order to remedy this deficiency, the purpose of this work is to adopt a Fuzzy Set Theory (FST) approach to establish a method for the usability evaluation of nuclear medical equipment based on usability  ...  To gather information about usability, practitioners use a variety of methods that gather feedback from users about an existing interface or plans related to a new interface.  ...  Heuristic evaluation is widely used based on its cost-effectiveness. On the other hand, heuristic evaluation is a subjective and unstructured method.  ... 
doi:10.15392/bjrs.v9i2a.363 fatcat:dfi7zfx6zfc5tip575cv2klcky

Fuzzy Multiple Agent Decision Support Systems for Supply Chain Management [chapter]

Mohammad Hossein Fazel Zarandi, Mohammad Mehdi Fazel Zarandi
2008 Supply Chain  
Therefore, we use a normalization method to standardize input information and data. For normalizing a set of input information and data, the data is divided by the larges one in the set.  ...  Thus, it can use tendering process to discover the response. For organizing tendering process we have used brokering method (Klusch 1999) .  ...  Modern supply chain management is a highly complex, multidimensional problem set with virtually endless number of variables for optimization.  ... 
doi:10.5772/5343 fatcat:xjnucxf2bfcptnn4oyn7gog2va

Actionable Knowledge Discovery for Increasing Enterprise Profit, using Domain Driven-Data Mining

Rakhi Batra, M. Abdul Rehman
2019 IEEE Access  
These actions suggest how to transform an object from an undesirable status to a desirable status by incurring less cost and high profit.  ...  Performance of the proposed method is compared with Yang's method and OF-CEAMA on the basis of four parameters i.e. the total number of rules required for action generation, run time of the methods, the  ...  In addition, discovered information from data mining methods does not suggest how to use this information for business decision-making.  ... 
doi:10.1109/access.2019.2959841 fatcat:soqkagsgdba6lnhplbcdhrrknq
« Previous Showing results 1 — 15 out of 22,861 results