-
Article
Open AccessA Lexicographic Method for Matrix Games with Payoffs of Triangular Intuitionistic Fuzzy Numbers
The intuitionistic fuzzy set (IF-set) has not been applied to matrix game problems yet since it was introduced by K.T.Atanassov. The aim of this paper is to develop a methodology for solving matrix games with ...
-
Article
Open AccessModel-based simulation of driver expectation in mountainous road using various control strategies
Driver expectation is about driver’s objective response and expectation for various traffic environments. It might directly influence the driving safety and traffic operation. This paper discusses in enough de...
-
Chapter and Conference Paper
Study on Higher Vocational Education Textbook Problem
The textbook work is a basic work of the higher education, the textbook quality will affect the student training quality directly. The compiling of the higher vocational education textbook should embody the hi...
-
Chapter
Analysis of Flavonoids and Phenolic Acids of Aqueous Extracts in Leaves of Apocynum venetum L.
In the present study a method was built based on liquid chromatography with diode array detection (HPLC/DAD) coupled to an electrospray ionization (ESI) interface for the mainly active compounds in aqueous ext...
-
Chapter and Conference Paper
Effects of Vision Field on Evolution of Cooperation among Mobile Agents
We introduce the heterogeneous vision radius which follows powerlaw distribution into the evolutionary prisoner’s dilemma game among mobile agents to study the evolution of cooperation. It is found that the co...
-
Chapter and Conference Paper
Analysis of Professional Skill and the Teaching of Effective Interface Ordnance N.C.O.
August 2010, the PLA units associated together human resources and social security men made a “People’s Liberation Army soldiers on active service professional skill requirements”, marks the professional skill...
-
Chapter and Conference Paper
A Performance Measurement System for Supply Chain Based on AI and J2EE
Performance measurement systems have become very popular and largely applied in organizations, as they provide not only a tool for measuring and controlling performance activities, but also a powerful manageme...
-
Chapter and Conference Paper
Research on the Information Library for Component Testing
The major objective of Component Based Software Development (CBSD) is to reduce the cost and time of software development by reusing available components. Testing is an important phase in CBSD. During the proc...
-
Chapter and Conference Paper
Computation of Large-Scale Electric Field in Free Space
A method of modeling Spatial Electric Field around the earth is presented to provide the spatial electric field data in virtual test system. Firstly, the electric field in different time in the condition of su...
-
Chapter and Conference Paper
Exploring High Dimension Large Data Correlation Analysis with Mutual Information and Application
Applying for information entropy theory, we present a measure of dependence for multi-variables relationships: the high dimensional maximal mutual information coefficient (HMIC). It is a kind of maximal informati...
-
Chapter and Conference Paper
3D Models to Educated Museum Interactive Exhibition with Computing Techniques
The use of 3D scanner for the digitalization of 3D objects of cultural heritage is now an established approach. This paper aims at contributing to a better understanding of the emergence of new ideas in exhibi...
-
Chapter and Conference Paper
An Improved Virtualization Resource Migration Strategy and Its Application in Data Center
In order to improve the efficiency of virtualization of data center and to reduce the cost of computation migration, this paper studies all kinds of virtualization solutions and migration strategies to make a...
-
Article
Critical node identification for complex network based on a novel minimum connected dominating set
Identifying critical nodes in complex networks aims to fragment a graph \(G = (V, E)\) ...
-
Article
Statistical learning based fully homomorphic encryption on encrypted data
Statistical learning has been widely used in many fields, such as science, engineering and finance, to extract important patterns, trends, and understand “what the data say”. Privacy of statistical learning, i...
-
Chapter and Conference Paper
The Immune System Model Based on B Method
Due to the lack of understanding of immunology, the immune theory is still controversial, which causes the difficulty in the immune system simulation. Based on the strict mathematics, the formal B method which...
-
Chapter and Conference Paper
Research on High-Speed Railway Network Effectiveness Based on Theory of Constraints
Analytical method of carrying capacity based on Theory of Constraints was put forward. The effectiveness of HRN under the existing high-speed railway transportation organization was analyzed. The results show ...
-
Chapter and Conference Paper
A Novel Approach for Objectness Estimation Based on Saliency Segmentation and Superpixels Clustering
Object detection is an important and challenging vision task. It is a critical part in many applications such as image search, robot navigation, and scene understanding. In this paper, we propose a novel objec...
-
Chapter and Conference Paper
Formative Assessment System of College English Based on the Big Data
It is an era of rapid development of network information technology. The informatization becomes one of the most prominent features nowadays. And the field of education has also been considerably influenced. P...
-
Article
An Adaptive Regularization Approach to Colonoscopic Polyp Detection Using a Cascaded Structure of Encoder–Decoders
This research aims to segment colonoscopic images by automatically extracting polyp features by exploiting the strengths of convolution neural networks (CNN). The proposed model employs deep learning and adapt...
-
Article
A density-core-based clustering algorithm with local resultant force
Clustering analysis has been widely used in image segmentation, face recognition, protein identification, intrusion detection, document clustering and so on. Most of the previous clustering algorithms are not ...