A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Fast flow analysis to compute fuzzy estimates of risk levels
Seventh European Conference onSoftware Maintenance and Reengineering, 2003. Proceedings.
The definite analysis computes the minimum blocking risk levels that statements may encounter on every path, while the possible analysis computes the highest blocking risk levels encountered by statements ...
This paper presents original flow equations to compute the definite and possible blocking risk levels for statements in source code. ...
The authors wish to thank Jean-François Patenaude and Bruno Malenfant for their contribution to the results of this paper in terms of software and experiments. ...
doi:10.1109/csmr.2003.1192443
dblp:conf/csmr/MerloAB03
fatcat:rdqtd25hbnfg3en33bcabta4oe
Risk analysis and crisis response
2008
Stochastic environmental research and risk assessment (Print)
However, there is a growing acceptance that risk analysis involves the development of the probability distribution for the measure of effectiveness. ...
The term risk analysis has different interpretations among various environments. ...
The ninth paper proposes the application of an Artificial Neural Network (ANN) approach as a fast alternative to computational fluid dynamics models to simulate the behavior of a compartment fire. ...
doi:10.1007/s00477-008-0230-x
fatcat:eepyezzimvapzgfez5r37wccrm
Time-based critical infrastructure dependency analysis for large-scale and cross-sectoral failures
2016
International Journal of Critical Infrastructure Protection
We employ different growth models to capture slow, linear and fast evolving effects, but instead of using static projections, the evolution of each dependency is "objectified" by a fuzzy control system ...
These tools 55 are very useful for low-level analysis of small-scale scenarios; for example to identify the critical components within a power transmission network. ...
level of analysis. ...
doi:10.1016/j.ijcip.2015.12.002
fatcat:tlzrus2zbjeqbayfdt7dki2wey
A Novel Method of Emergency Situation Evaluation for Deep-sea Based on Bayesian Network
2020
IEEE Access
of the domain knowledge, which can reduce the computational complexity greatly. 4) Considering the fuzziness of the boundary between any two evaluation levels and the fuzziness of the corresponding relationship ...
In order to realize the quantitative analysis of the overall emergency situation, it is necessary to combine the above reasoning results to obtain a global situation probability risk level. ...
doi:10.1109/access.2020.3039171
fatcat:vgy34pxjrvfz5n3igele7doxc4
A Survey On Heart Disease Prediction Using Soft Computing
2016
Zenodo
Especially in medical sector there is no such adequate research focus on effective analysis tool to discover and trends in data. ...
This project intends to design and develop, diagnosis and prediction system for heart disease based on soft computing technique that is ANFIS. ...
As work is rule based, the easy estimation of the interrelated variables can be identified to understand the approach followed by the fuzzy analysis. ...
doi:10.5281/zenodo.48318
fatcat:g2ymgfbxlvbyffbdnkkmu76xya
Execution Path Classification for Vulnerability Analysis and Detection
[chapter]
2016
Communications in Computer and Information Science
The Risk of each IB is the combination of its computed Severity and Vulnerability measurements through an aggregation operation over two fuzzy sets using a Fuzzy Logic system. ...
Severity quantifies the danger level of an IB using static analysis and a variation of the Information Gain algorithm. ...
and, finally, the fuzzy logic system to compute the Risk (grey and yellow colors). Static Analysis: Static code analysis uses the Java compiler to create Abstract Syntax Trees for the AUT. ...
doi:10.1007/978-3-319-30222-5_14
fatcat:2eiuzug5b5gmlisudgrldjffnm
Project Management Efficiency using Soft Computing and Risk Analysis
2012
International Journal of Computer Applications
This paper quantify the project management efficiency (PME) using a Soft computing tool based fuzzy logic system (SFLS) employing risk analysis. ...
The basic objective of the paper shall revolve around the concepts on project management, soft computing and risk analysis techniques. ...
complex analysis like cash flow or even ROI (Return on Investment).The algorithm developed in this thesis is based upon fuzzy logic, giving it the ability to solve complex problems plagued with uncertainty ...
doi:10.5120/7854-1111
fatcat:lnlngt6pb5fjdnrnvg36w2rzrq
Evaluating Operational Risk Exposure Using Fuzzy umber Approach to Scenario Analysis
2011
Proceedings of the 7th conference of the European Society for Fuzzy Logic and Technology (EUSFLAT-2011)
The methodology is based on the use of fuzzy numbers to express subjective probability of expert estimates. ...
Risks and losses arising from system failure, unauthorized activity, fraud and other operational errors are postulated to be one of the primary banking risks. ...
The paper on "Fuzzy Capital Budgeting" by Kuchta [12] that evaluated fuzzy cash flows was an inspiration of the applicability of fuzzy numbers to scenario description in operational risk. ...
doi:10.2991/eusflat.2011.55
dblp:conf/eusflat/DurfeeT11
fatcat:fdakz4i23zgnfbdzl4vm3m3joq
The Early Detection of Diabetes Mellitus (DM) Using Fuzzy Hierarchical Model
2015
Procedia Computer Science
As a form of our efforts to contribute to the prevention of this phenomenon we propose an application of computational intelligence by using fuzzy hierarchical model that has the ability to perform early ...
In 2013 the number of patients with Diabetes Mellitus (DM) in the world has reached 382 million. It is estimated that the prevalence will increase 55% in 2035 1 . ...
In order to overcome that problems, it has been possible to estimating the potential of DM in someone's body with the application of computational intelligence techniques that demands efficiency and effectiveness ...
doi:10.1016/j.procs.2015.07.571
fatcat:3zqxwznqa5cjhbjoclgxbvd3jy
Modeling of Transient Groundwater Flow Using Fuzzy Approach
2013
Modern Applied Science
The model outputs can be used as the inputs for the subsequent risk analysis, decision making-processes and evaluation. ...
The groundwater flow problem analysis requires interval input values for the parameters, the output may be presented in terms of mean value, upper and lower bounds of the hydraulic head. ...
The environmental-guideline-based risk (ER) and health risk (HR) due to xylene ingestion were systematically examined to obtain the general risk levels through a fuzzy rule base. ...
doi:10.5539/mas.v7n4p77
fatcat:6vvbn4kwr5dg5o4p4afsjtoh7m
Adaptive Contextual Risk-Based Model to Tackle Confidentiality-Based Attacks in Fog-IoT Paradigm
2022
Computers
for the fuzzy risk model to compute the risk factor. ...
The Internet of Things (IoT) allows billions of physical objects to be connected to gather and exchange information to offer numerous applications. ...
Two types of risk estimation methods are created to quantify the risk, risk assessment, and fuzzy model. ...
doi:10.3390/computers11020016
fatcat:ryxi666hrzdi7pficiaapsnbgq
Fuzzy Online Risk Assessment for Distributed Intrusion Prediction and Prevention Systems
2008
Tenth International Conference on Computer Modeling and Simulation (uksim 2008)
The novelty of this paper is the detailed development of Fuzzy Logic Controllers to estimate the various risk(s) that are dependent on several other variables based on the inputs from HMM modules and the ...
To develop the fuzzy risk expert system, if-then fuzzy rules were formulated based on interviews with security experts and network administrators. ...
Fuzzy Modeling of Risk The risk is estimated by F LC 4 and is based on the output from the three fuzzy logic controllers F LC 1 − F LC 3 . ...
doi:10.1109/uksim.2008.30
dblp:conf/uksim/HaslumAK08
fatcat:4f75o2woyrfprgkfdt53nzesba
Maritime Intelligent Monitoring System Based on Wireless Sensor Network and Construction of Shipping Legal System
2022
Wireless Communications and Mobile Computing
value of the index level. ...
If the fuzzy subset method is used to determine the membership matrix in the fuzzy comprehensive evaluation, then there will be a sudden drop in the degree of membership due to a slight change in the critical ...
Experimental Analysis of Risk Assessment Index System for Maritime Law Enforcement
Comprehensive Analysis of Examples. ...
doi:10.1155/2022/1394946
doaj:4ad5235b781e4ca69e6d656723c9071b
fatcat:mnr66cpr4zgsdp2g76t4iglvuq
A fuzzy approach to real option valuation
2003
Fuzzy sets and systems (Print)
In this paper we shall introduce a (heuristic) real option rule in a fuzzy setting, where the present values of expected cash flows and expected costs are estimated by trapezoidal fuzzy numbers. ...
In their study, present values of expected costs and expected cash flows are calculated by trapezoidal fuzzy numbers. ...
or estimating future cash flows is not stochastic in nature, and that the use of the probability theory leads to a misleading level of precision. ...
doi:10.1016/s0165-0114(02)00591-2
fatcat:ym2acrkm2bft7lside7jszezya
Formal Fire Safety Assessment of Passenger Ships
2005
The journal of the Safety and Reliability Society
During the course of the research, it is with much gratitude and sincere respect that I acknowledge and thank my principal supervisor, Professor ...
A fuzzy inference engine comprises the selection or development of the type/types of fuzzy membership function used to represent risk levels and fuzzy rule bases to generate fuzzy safety estimates. ...
A fuzzy inference engine comprises the selection or development of the type/types of fuzzy membership function used to represent risk levels and fuzzy rule bases to generate fuzzy safety estimates. ...
doi:10.1080/09617353.2005.11690813
fatcat:mydhdfwuczefvdpvykiw4e5y4q
« Previous
Showing results 1 — 15 out of 13,704 results