Results 1 to 10 of about 1,387,939 (190)
Networked Systems with Incomplete Information [PDF]
Copyright © 2015 Zidong Wang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Zidong Wang +4 more
doaj +5 more sources
TFD-IIS-CRMCB: Telecom Fraud Detection for Incomplete Information Systems Based on Correlated Relation and Maximal Consistent Block [PDF]
Telecom fraud detection is of great significance in online social networks. Yet the massive, redundant, incomplete, and uncertain network information makes it a challenging task to handle.
Ran Li +5 more
doaj +2 more sources
Extensive Generalization of Statistical Mechanics Based on Incomplete Information Theory
Statistical mechanics is generalized on the basis of an additive information theory for incomplete probability distributions. The incomplete normalization is used to obtain generalized entropy . The concomitant incomplete statistical mechanics is applied
Qiuping A. Wang
doaj +4 more sources
On general systems with randomly occurring incomplete information [PDF]
In the system and control community, the incomplete information is generally regarded as the results of (1) our limited knowledge in modelling real-world systems; and (2) the physical constraints on the devices for collecting, transmitting, storing and ...
Dong, H, Hu, J, Wang, Z
core +5 more sources
Information structures in an incomplete information system: A granular computing viewpoint [PDF]
Granular computing is a essential mathematical tool in artificial intelligence. An incomplete information system is an important model and its basic structures are information structures.
Guangji Yu
doaj +2 more sources
A Bayesian Stackelberg Game Approach to Remote State Estimation Under SINR-Based DoS Attacks with Incomplete Information [PDF]
With limited energy constraints, the issue of transmission and interference strategies have received considerable critical attention in cyber–physical security.
Di Deng, Peng Yi, Mingze Qi
doaj +2 more sources
Constrained tolerance rough set in incomplete information systems
The tolerance rough set is developed as one of the outstanding extensions of the Pawlak's rough set model under incomplete information, and the limited tolerance relation is developed to overcome the problem that objects leniently satisfy the tolerance ...
Renxia Wan, Duoqian Miao, Witold Pedrycz
doaj +1 more source
Knowledge reduction of information systems is one of the most important parts of rough set theory in real-world applications. Based on the connections between the rough set theory and the theory of topology, a kind of topological reduction of incomplete ...
Li Changqing, Zhang Yanlan
doaj +1 more source
Attribute Reduction Algorithm for Incomplete Information Systems Based on Intuitive Fuzzy Pairs
The current attribute reduction algorithms for information systems are difficult to handle imbalanced data with default values. Therefore, to address the shortcomings of traditional attribute reduction algorithms (ARAs) in incomplete information systems,
Weihan Li, Jianwei Guo
doaj +1 more source
This research is focused on decision-making problems with redundant and incomplete information under a fuzzy environment. Firstly, we present the definition of incomplete fuzzy soft sets and analyze their data structures.
Xia Sisi +3 more
doaj +1 more source

