Results 111 to 120 of about 41,990 (276)
Never … Often? Comparisons That Shape People's Likert‐Type Ratings of Behavior Frequencies
ABSTRACT Responses to Likert‐type behavioral frequency (LBF) questions often do not consistently map onto objective numerical estimates. Prior research suggests that social and other comparisons may underlie this divergence, but the relative influence of different comparison standards—and the cognitive processes supporting them—remains unclear.
Jeremy D. Strueder +3 more
wiley +1 more source
Computing with words with the use of inverse RDM models of membership functions
Computing with words is a way to artificial, human-like thinking. The paper shows some new possibilities of solving difficult problems of computing with words which are offered by relative-distance-measure RDM models of fuzzy membership functions.
Piegat Andrzej, Pluciński Marcin
doaj +1 more source
ESTABLISHING THE MOST INFLUENCING CAUSES OF COMPANIES’ FINANCIAL HEALTH AND PERFORMANCE – A GREY FUZZY APPROACH [PDF]
The core of our paperwork consists in construction of a model for determining a hierarchy of qualitative and quantitative causes that are influencing service companies’ financial health.
Camelia Delcea +2 more
core
A Preconditioned Majorization‐Minimization Method for ℓ2$$ {\ell}^2 $$‐ℓq$$ {\ell}^q $$ Minimization
ABSTRACT The need to minimize a linear combination of an expression that involves an ℓq$$ {\ell}^q $$‐norm of a linear transformation of the computed solution and the ℓ2$$ {\ell}^2 $$‐norm of the residual error arises in image restoration as well as in statistics.
A. Buccini +3 more
wiley +1 more source
Generating Pattern‐Based Datasets for Cyber Attack Detection Using Machine‐Learning Techniques
The aim of this work is to review the state of the art in the design, generation, and labeling of attack pattern datasets for training of detection systems based on machine learning. ABSTRACT This work aims to review the state of the art in the design, generation, and labeling of attack pattern datasets for the training of detection systems based on ...
Pedro Díaz García +4 more
wiley +1 more source
Four-quadrant Mine Converter Based on Fuzzy-PID Controller
In order to realize four-quadrant mine converter with 1 140 V, the diode rectifier is replaced by the voltage source PWM rectifier ( VSR ) with double closed-loop arithmetic based on the Fuzzy-PID. Var analyzing VSR model which is established in Simulink
NIU Ying +3 more
doaj
The complex bipolar fuzzy sets fundamentally expand upon bipolar fuzzy sets and complex fuzzy set, and demonstrate efficacy in dealing with two-dimensional uncertainty, specifically where amplitude and phase information are both relevant.
Naveed Yaqoob +4 more
doaj +1 more source
Approximate Solution of LR Fuzzy Sylvester Matrix Equations
The fuzzy Sylvester matrix equation AX~+X~B=C~ in which A,B are m×m and n×n crisp matrices, respectively, and C~ is an m×n LR fuzzy numbers matrix is investigated.
Xiaobin Guo, Dequan Shang
doaj +1 more source
Fairness at Risk: Where Bias Emerges in Machine Learning
ABSTRACT Artificial intelligence and machine learning (ML) now shape decisions in healthcare, finance and security, but they can reproduce historical prejudice and inequality. Bias in training data and in model implementation can amplify harm, especially for racial and gender minorities.
Otavio de Paula Albuquerque +2 more
wiley +1 more source

