Modeling Rules

Author(s):  
Luca Iandoli ◽  
Giuseppe Zollo

In Chapter XII we outlined the basic structure of a verbal model and its main components: Judgments, rules and qualifiers. This chapter illustrates several approaches in representing the relationships among linguistic variables contained in a verbal model (rules). The description of the examples will skip technical details and it is mainly aimed at illustrating possible applications, finalities and advantages of verbal models.

Author(s):  
Luca Iandoli ◽  
Giuseppe Zollo

In the previous chapter we have outlined the basic structure of a verbal model and its main components: Judgments, rules and qualifiers. This chapter proposes a model, called the dual truth model, to represent verbal judgments through fuzzy logic. Furthermore, the dual truth model permits us to examine more in depth and quantitatively assess the vagueness and ambiguity contained in a verbal judgment. An application of the model to the definition of assessment scale for personnel appraisal is also provided.


Author(s):  
Vidyasagar Potdar ◽  
Chen Wu ◽  
Elizabeth Chang

In this chapter we provide an introduction to RFID technology. We discuss the main components of the RFID technology, which includes RFID transponders, RFID readers, RFID middleware, and RFID labels. A detailed classification and explanation for each of these components is provided, followed by the benefits and applications that can be achieved by adopting this technology. After discussing all possible applications, we describe the business benefits and how stakeholders can benefit. This is followed by a detailed outline of the adoption challenges, where we discuss issues like the security, privacy, cost, scalability, resilience, and deployment and some existing solutions. Once the issues are discussed, we divert our attention to some successful RFID deployment case studies to describe the adoption of RFID technology that has already begun and how many big organizations across the world are showing interest in this technology. Since this chapter takes into consideration 83 Automated Data Capture Technologies a variety of audiences like researchers, business executives, business consultants, hobbyists, and general readers, we tried to cover material relevant to each target audience. For business executives and consultants interested in knowing who can offer complete RFID solutions, we allocated a dedicated section for RFID vendors where we provide a comprehensive list of RFID vendors across the globe. For researchers, we listed some open issues in the section of adoption challenges. For advanced users, in-depth technical details are provided in the section where we discuss security and privacy enhancing protocols.


Author(s):  
Malcolm J. Beynon ◽  
Kirsty Park

This chapter employs the fuzzy decision tree classification technique in a series of biological based application problems. With its employment in a fuzzy environment, the results, in the form of fuzzy ‘if .. then ..’ decision rules, bring with them readability and subsequent interpretability. The two contrasting applications considered concern, the age of abalones and the lengths of torpor bouts of hibernating Greater Horseshoe bats. Emphasis is on the visual results presented, including the series of membership functions used to construct the linguistic variables representing the considered attributes and the final fuzzy decision trees constructed. Technical details presented further offer the opportunity to readers to future employ the technique in other biological applications.


2021 ◽  
Vol 11 (23) ◽  
pp. 11175
Author(s):  
Vitalii Yesin ◽  
Mikolaj Karpinski ◽  
Maryna Yesina ◽  
Vladyslav Vilihura ◽  
Stanislaw A. Rajba

Obtaining convincing evidence of database security, as the basic corporate resource, is extremely important. However, in order to verify the conclusions about the degree of security, it must be measured. To solve this challenge, the authors of the paper enhanced the Clements–Hoffman model, determined the integral security metric and, on this basis, developed a technique for evaluating the security of relational databases. The essence of improving the Clements–Hoffmann model is to expand it by including a set of object vulnerabilities. Vulnerability is considered as a separate objectively existing category. This makes it possible to evaluate both the likelihood of an unwanted incident and the database security as a whole more adequately. The technique for evaluating the main components of the security barriers and the database security as a whole, proposed by the authors, is based on the theory of fuzzy sets and risk. As an integral metric of database security, the reciprocal of the total residual risk is used, the constituent components of which are presented in the form of certain linguistic variables. In accordance with the developed technique, the authors presented the results of a quantitative evaluation of the effectiveness of the protection of databases built on the basis of the schema with the universal basis of relations and designed in accordance with the traditional technology of relational databases.


2013 ◽  
Vol 650 ◽  
pp. 698-704
Author(s):  
Chun Lei Sang ◽  
Jin Dong Ren ◽  
Yong Qing Liu ◽  
Meng Dong Mi ◽  
Shi Hai Li ◽  
...  

Ergonomics and interior geometry are important validation contents in vehicle product development. In this paper, a fully adjustable physical mockup with the flexibility to install various interiors was developed, which can be used to validate the ergonomics and interiors for any target population and various passenger cars. By requirements analysis, target vehicle types and contents needed to be validated using this equipment were identified. Based on statistical analysis of the sizes of different passenger cars, the dimensions of basic structure and the adjustments ranges of main components were determined, as well as the main functions and structural requirements. Based on above analysis, reference fiducial marks system, and the positions and travels of adjustment devices were calculated. According to the validated concept design, considering the standards of section bars and machines, the main structure and adjustment devices of every component were designed and analyzed of their strength, stiffness and kinematics. Together with the manufacturer, the sub-systems of the mockup were produced, assembled and tested. The acceptance test showed that this mockup could simulate and present different passenger cars well as the design target, and could evaluate, modify and reevaluate various ergonomic problems and interior designs.


Author(s):  
Luca Iandoli ◽  
Giuseppe Zollo

In this chapter we introduce the concept of verbal model. A verbal model is a mathematical modeling of the variables contained in a discourse and of the relationships among them. A discourse may contain linguistic variables, i.e., variables assuming linguistic values. For instance the variable “performance” can assume values such as poor, satisfying, above average, excellent, etc. Verbal models can accept linguistic inputs as well as quantitative variables and can be implemented starting from the discourse map through fuzzy logic algorithms. Such algorithms can simulate to a certain degree the theories of action contained in explanations. This chapter presents an introduction to fuzzy logic and to some possible ways of constructing verbal models, while we provide several examples in Chapters XIII and XIV.


Author(s):  
V. Potdar

In this chapter we provide an introduction to RFID technology. We discuss the main components of the RFID technology, which includes RFID transponders, RFID readers, RFID middleware, and RFID labels. A detailed classification and explanation for each of these components is provided, followed by the benefits and applications that can be achieved by adopting this technology. After discussing all possible applications, we describe the business benefits and how stakeholders can benefit. This is followed by a detailed outline of the adoption challenges, where we discuss issues like the security, privacy, cost, scalability, resilience, and deployment and some existing solutions. Once the issues are discussed, we divert our attention to some successful RFID deployment case studies to describe the adoption of RFID technology that has already begun and how many big organizations across the world are showing interest in this technology. Since this chapter takes into consideration a variety of audiences like researchers, business executives, business consultants, hobbyists, and general readers, we tried to cover material relevant to each target audience. For business executives and consultants interested in knowing who can offer complete RFID solutions, we allocated a dedicated section for RFID vendors where we provide a comprehensive list of RFID vendors across the globe. For researchers, we listed some open issues in the section of adoption challenges. For advanced users, in-depth technical details are provided in the section where we discuss security and privacy enhancing protocols.


2012 ◽  
Vol 195-196 ◽  
pp. 23-28
Author(s):  
Yi Ming He ◽  
Xian Yi Qian

We have mainly studied the main structure of wind power turbines components in accordance with the principle aerodynamics. We also have taken horizontal axis wind power turbine for example and studied the basic structure and producing technology about wheel, base and other equipments. We have computed the wind power turbines output power and efficiency, and compared with some kinds of different wind power turbines output power and efficiency. All what have studied is important to design wind power turbine.


Author(s):  
H. Engelhardt ◽  
R. Guckenberger ◽  
W. Baumeister

Bacterial photosynthetic membranes contain, apart from lipids and electron transport components, reaction centre (RC) and light harvesting (LH) polypeptides as the main components. The RC-LH complexes in Rhodopseudomonas viridis membranes are known since quite seme time to form a hexagonal lattice structure in vivo; hence this membrane attracted the particular attention of electron microscopists. Contrary to previous claims in the literature we found, however, that 2-D periodically organized photosynthetic membranes are not a unique feature of Rhodopseudomonas viridis. At least five bacterial species, all bacteriophyll b - containing, possess membranes with the RC-LH complexes regularly arrayed. All these membranes appear to have a similar lattice structure and fine-morphology. The lattice spacings of the Ectothiorhodospira haloohloris, Ectothiorhodospira abdelmalekii and Rhodopseudomonas viridis membranes are close to 13 nm, those of Thiocapsa pfennigii and Rhodopseudomonas sulfoviridis are slightly smaller (∼12.5 nm).


Author(s):  
C. Wolpers ◽  
R. Blaschke

Scanning microscopy was used to study the surface of human gallstones and the surface of fractures. The specimens were obtained by operation, washed with water, dried at room temperature and shadowcasted with carbon and aluminum. Most of the specimens belong to patients from a series of X-ray follow-up study, examined during the last twenty years. So it was possible to evaluate approximately the age of these gallstones and to get information on the intensity of growing and solving.Cholesterol, a group of bile pigment substances and different salts of calcium, are the main components of human gallstones. By X-ray diffraction technique, infra-red spectroscopy and by chemical analysis it was demonstrated that all three components can be found in any gallstone. In the presence of water cholesterol crystallizes in pane-like plates of the triclinic crystal system.


Sign in / Sign up

Export Citation Format

Share Document