Risk Analysis for Critical Infrastructures Using Fuzzy TOPSIS

Size: px
Start display at page:

Download "Risk Analysis for Critical Infrastructures Using Fuzzy TOPSIS"

Transcription

1 Rsk Analyss for Crtcal Infrastructures Usng uzzy TOPSIS Morteza Yazdan (Correspondng Author) MSc of Economy, aculty of Economy, Isfahan Unversty, Isfahan, Iran E-mal: Al Aldoost MSc of Mechanc Engneerng, Malek-e-Ashtar Unversty of Technology, Tehran, Iran E-mal: Mohammad Hossen Basr Assstant Professor of Tarbat Modares Unversty, Engneerng aculty, Tehran, Iran E-mal: Receved: September 20, 2011 Accepted: October 19, 2011 Publshed: January 1, 2012 do: /jmr.v URL: Abstract Crtcal nfrastructures are the most mportant sector n countres because of the essentalty of naton securty, publc safety, socoeconomc securty, and way of lfe. Accordng to the mportance of nfrastructures, t s a necessty to analyze the potental rsks to do not allow these rsks convert nto events. The man purpose of ths paper s to provde a developed framework wth the am to overcome lmtatons of the classcal approach to buld a more secure, safer, and more reslent crtcal nfrastructures n order to develop, mplement, control. The proposed framework extends conventonal RAMCAP (Rsk Analyss and Management for Crtcal Asset Protecton) through ntroducng new parameters the effects on rsk value. Accordng to the complexty of problem and the nherent uncertanty, ths research adopts the fuzzy TOPSIS as a fuzzy mult crtera decson makng technque to determne the weghts of each crteron and the mportance of alternatves wth respect to crtera. Case analyss s mplemented to llustrate the capablty and effectveness of the model for rankng the rsk of crtcal nfrastructures. The proposed model demonstrates a sgnfcant 1

2 mprovement n comparson wth conventonal RAMCAP. Keywords: Crtcal Infrastructures, uzzy TOPSIS, RAMCAP, Rsk Rankng 2

3 1. Introducton The countres of all around the world were recently faced wth several events generated by varous causes n the crtcal nfrastructures sector. They have led to a lot of casualtes and major damage to human, machnery, and envronment. That s demonstrated by many events whch rsk connected wth securty, safety, health, and envronment cannot be perfectly avoded. Therefore, mscellaneous methodologes were developed n order to analyze and rank the exstng rsks. Rsk Analyss and Management for Crtcal Asset Protecton (RAMCAP) methodology s one the most well-known methods n ths feld that were presented by the Department of Homeland Securty. The RAMCAP method s a functon of three components threat (T), vulnerablty (V), and consequence (C) (Brashear et al., 2007; ASME-ITI, 2006; Cox, 2009). Regardless of the relatve mportance weghts of the evaluaton crtera, t appears to be an urgent need for crtcal nfrastructures to develop a rsk assessment methodology to manage the effectve components. TOPSIS s one of the most applcaton mult crtera decson makng (MADM) methods, whch assgns the best alternatve among a pool of feasble alternatves by calculatng the dstances from the postve and negatve deal solutons. Ths technque s crtczed due to neglect uncertanty. On the other hand, fuzzy logc s able to model the uncertanty. Ths technque uses lngustc varable nstead of tradtonal quanttatve expresson, whch s a very helpful concept for dealng wth stuatons whch are too complex or not well-defned enough (Zadeh, 1965). Therefore, fuzzy TOPSIS s developed n order to solve dfferent aspects of prorty ssues. Jola et al. (2011) proposed a two-phase approach for suppler selecton and order allocaton problem under fuzzy envronment. The proposed model n ths paper contan of two phases, n the frst phase of the approach, a fuzzy multple crtera decson makng method s used to obtan the overall ratngs of alternatve supplers, and to select the most qualfed ones for further evaluatons, n the second phase, a mult-objectve mxed nteger lnear programmng (MOMILP) model to determne the order quanttes of each selected suppler for each product n each perod s constructed. Kaya & Kahraman (2011) proposed a modfed fuzzy TOPSIS methodology for the selecton of the best energy technology alternatve. Kelemens et al (2011) extend fuzzy TOPSIS for support managers selecton. rass et al (2009) proposed an ntegrated estmatve approach based on the fuzzy logc theory, whch permts more coherence n the evaluaton process, producng a very sutable fnal rank of hazardous actvtes. Yu & Hu (2010) developed an ntegrated mult crtera decson makng approach that combnes the votng method and the fuzzy TOPSIS method to evaluate the performance of multple manufacturng plants n a fuzzy envronment. Sad-Nezhad & Damghan (2010) presented a TOPSIS approach based on preference rato and an effcent fuzzy dstance measurement n assessment of traffc polce centers performance. Torlak et al (2011) used fuzzy TOPSIS mult-methodologcal approach n the Turksh 3

4 domestc arlne ndustry. Sngh & Benyoucef (2011) proposed a fuzzy TOPSIS based methodology along wth a mechansm for determnaton of fuzzy lngustc value of each attrbute. They utlzed entropy method to enumerate the weghts of varous attrbutes automatcally wthout nvolvement of decson makers. Lao & Kao (2011) proposed ntegrated fuzzy TOPSIS and mult-choce goal programmng (MCP) approach to solve the suppler selecton problem. They stated the advantage of ths method s that t allows decson makers to set multple aspraton levels for suppler selecton problems. Based on fuzzy TOPSIS Krohlng & Campanharo (2011) proposed a fuzzy TOPSIS for group decson makng, whch s appled to evaluate the ratngs of response alternatves to a smulated ol spll. Sun & Ln (2009) used fuzzy TOPSIS as the analytcal tool that determnes the weghts of each crteron, from ther research results, the securty and trust are the most mportant factors for mprovng the compettve advantage of shoppng webste. It s clear that fuzzy TOPSIS has demonstrated ts capabltes and effcences as a practcal engneerng and problem-solvng tool. In ths paper, we extend the approach of TOPSIS to develop a rsk-based methodology under fuzzy envronment. uzzy TOPSIS s adopted because of ts capablty and effcency n handlng uncertanty, smultaneous consderaton of the postve deal and the negatve solutons, smple computatons, and logcal concepts. The rest of the paper s organzed as follows: In Sectons 2, the basc structure of the RAMCAP methodology s ntroduced. Secton 3 descrbes fuzzy TOPSIS technque. The proposed framework s summarzed n Secton 4, ncludng rsks dentfcaton, selecton of crtera, rsk evaluaton usng fuzzy TOPSIS procedure, and senstvty analyss. In Secton 5, study for rsk evaluaton n an llustratve case s presented. The comparson of the proposed model wth the conventonal RAMCAP s mplemented and results are dscussed n Secton 6. Conclusons are dscussed and some shortages of the conventonal RAMCAP are lsted n Secton The Basc Concepts of RAMCAP Methodology The RAMCAP methodology provdes a systematc process to dentfy and analyze the sgnfcance of potental events assocated wth crtcal nfrastructures. The RAMCAP process s comprsed of seven steps as follows (ASME-ITI, 2006; Brashear et al., 2007): (1)Asset characterzaton and screenng, (2) Threat characterzaton, (3) Consequence analyss, (4) Vulnerablty analyss, (5) Asset attractveness and threat assessment, (6) Rsk assessment, and (7) Rsk management. Ths steps are depcted n gure 1. gure 1. Process of RAMCAP technque 4

5 The benefts of conventonal RAMCAP, but are not lmted to, nclude (Brashear & Jones, 2010): () More effcent management of captal and human resources, () Ablty to dentfy the assets wth the greatest need and value of mprovement, () ratonal allocaton of resources to maxmze the securty and reslence enhancement wthn a fnte budget. Accordng to the conventonal RAMCAP technque, rsk (R) s determned by the ntersecton of consequences of the attack (C), the threats of the attack (T) and vulnerabltes to the attack (V). More specfcally, rsk s formulated as Eq. (1): 3. uzzy TOPSIS 3.1 uzzy Theory R= C T V (1) Adequate knowledge and comprehensve data base on a number of dfferent problems are requested to analyze crtcal nfrastructures. There are a close relatonshp between complexty and certanty, so that; ncreasng the complexty lead to decrease the certanty. uzzy logc ntroduced by Zadeh (1965) - can take nto account uncertanty and solve problems where there are no sharp boundares and precse values. uzzy logc provdes a methodology for computng drectly wth words (Zadeh, 1996). uzzy set s a powerful mathematcal tool for handlng the exstng uncertan n decson makng. A fuzzy set s general form of a crsp set. A fuzzy number belong to the closed nterval 0 and 1, whch 1 addresses full membershp and 0 expresses non-membershp. hereas, crsp sets only allow 0 or 1. There are dfferent types of fuzzy numbers that can be utlzed based on the stuaton. It s often convenent to work wth trangular fuzzy numbers (TNs) because they are computed smply, and are useful n promotng representaton and nformaton processng n a fuzzy envronment (Torlak et al, 2011). A fuzzy number A on R can be a trangular fuzzy number (TN) f ts membershp functon ( ): R [0,1] be defned as follows: A x 0, x a ( x a) / ( ba), a xb A ( x) ( c x) / ( c b), b x c 0, otherwse (2) 3.2 uzzy TOPSIS Approach TOPSIS s based on the concept that the chosen alternatve should have the shortest dstance from the postve-deal soluton and the longest dstance from the negatve-deal soluton (Seçme et al, 2009; umus, 2009; Sun, 2010; Yue, 2011). The postve deal soluton s a soluton that maxmzes the beneft crtera and mnmzes the cost crtera smultaneously, whereas the negatve deal soluton maxmzes the cost crtera and mnmzes the beneft 5

6 crtera smultaneously. In the conventonal TOPSIS technque, expert judgments are represented wth precse values. In real world problems, t s often dffcult for a decson maker to determne precse weghts for crtera and alternatves wth respect to the crtera under consderaton. The mert of usng a fuzzy approach s to determne the mportance or preference of crtera and alternatves usng fuzzy numbers nstead of crsp numbers to be more adapted to the real world cases. or ths reason, fuzzy TOPSIS was developed to solve the real world problems under fuzzy envronment (Kuo et al, 2007; Yang, Hung, 2007; Chen, Tsao, 2008; Ashtan et al, 2009; Ebrahmnejad et al, 2009; Roghanan et al, 2010; Aydogan, 2011; Jola et al, 2011; Awasth et al, 2011). Ths technque helps decson-makers carry out analyss and comparsons n rankng ther preference of the alternatves wth vague or mprecse data (Yu & Hu, 2010). The mathematcs concept of uzzy TOPSIS can be descrbed as follows: Step 1: Choose the lngustc ratngs for crtera and alternatves wth respect to crtera. In ths step, the mportance weghts of evaluaton crtera and the ratngs of alternatves are consdered as lngustc terms to assess rsk under fuzzy envronment as shown n Table 1 and Table 2. Table 1. Lngustc terms for crtera Lngustc terms uzzy number Very low (VL) (0.0,0.0,0.25) Low (L) (0.0,0.25,0.5) Medum (M) (0.25,0.5,0.75) Hgh (H) (0.5,0.75,1.0) Very Hgh (VH) (0.75,1.0,1.0) Table 2. Lngustc ratng for alternatves Lngustc terms uzzy ratng Very Poor (VP) (0.0,0.0, 2.5) Poor (P) (0.0,2.5,5.0) ar () (2.5,5.0,7.5) ood () (5.0,7.5,10.0) Very ood (V) (7.5,10.0,10.0) Step 2. Construct the fuzzy decson matrx. If assume that the number of crtera s n and the count of alternatves s m, fuzzy decson matrx wll be obtaned wth m rows and n columns as followng matrx: 6

7 C1 C2 Cn x x x A x x x A D xm1 xm2 xmna n n 2 m (3) And crtera are constructed as follows: (,,..., ) (4) w1 w2 w n Step 3. After constructng fuzzy decson matrx, the normalzaton of fuzzy decson matrx s accomplshed usng lnear scale transformaton. The calculatons are done usng formulas (5), (6) to convert the dfferent crtera scales nto a comparable scale. aj bj cj r (,, ) and c maxc c c c, for maxmzaton objectve (5) j j j j j j aj aj aj r (,, ) and a mn a c b a j j j j j j, for mnmzaton objectve (6) The normalzed fuzzy decson matrx can be represented by Eq. (7): R rj, 1, 2,..., m; j 1,2,..., n. mn (7) here the r j s the normalzed value of xj ( aj, bj, cj ). Step 4. Calculate the weghted normalzed fuzzy decson matrx. The weghted normalzed value v s calculated by multplyng the weghts ( w ) of crtera j j wth the normalzed fuzzy decson matrx r j. The weghted normalzed decson matrx V for each crteron s calculated through the followng relatons: V [ v ], 1, 2,..., n, j 1, 2,..., J, j n j (8) here v r () w (9) j j Step 5. Then the fuzzy postve-deal soluton (PIS A ) and fuzzy negatve-deal soluton 7

8 (NIS A ) are determned as descrbed n followng part n A ( v, v, v,..., v ) max v ( 1, 2,..., n) (10) n A ( v, v, v,..., v ) mn v ( 1, 2,..., n) j j Based on the weghted normalzed fuzzy decson matrx, the ranges belong to the closed nterval [0,1]. Therefore, the PIS and NIS can be defned as (1,1,1) and (0,0,0) respectvely. Step 6. After assgnng the PIS and NIS, the dstance of each alternatve from A + and A - are calculated by Eqs. (12) and (13): n j j j1 (11) d d( v, v ), 1,2,..., m (12) n j j j1 d d( v, v ), 1,2,..., m (13) here the dstance measurement between two fuzzy number a ( a1, a2, a3) and b b1 b2 b3 can be calculated by Vertex method as follows: (,, ) dv ( a, b ) ( a1b1) ( a2 b2) ( a3 b3) 3 (14) Step 7. Calculate the closeness coeffcent. The closeness coeffcent ( CC ) takes nto account the dstance of the PIS, d and the NIS, d smultaneously. The closeness coeffcent of each alternatve s obtaned through Eq. (15): d CC d d (15) Step 8. Rank preference order. The rankng of the alternatves can be determned accordng to the closeness coeffcent n descendng order. 4. The Proposed ramework The proposed framework for rankng rsk n crtcal nfrastructures has followng four phases: 8

9 1. Identfy the exstng rsks. 2. Select the evaluaton crtera. 3. Evaluate the dentfed rsks usng fuzzy TOPSIS procedure. 4. Senstvty analyss 4.1 Rsks dentfcaton In the rsk dentfcaton phase, threats and hazards whch could dsrupt the crtcal servces and products should be dentfed. One of the smplest method of dentfyng and analyzng the rsks n a nfrastructure s by askng questons such as whch assets are most crtcal, whch assets are more exposed to danger, and gettng the rght answers. 4.2 Selecton of crtera Selecton of crtera s the frst step for evaluatng rsk of crtcal nfrastructures. The parameters of the RAMCAP methodology were dentfed as a part of evaluaton crtera. Snce these crtera are not enough to cover all aspects of rsks; new crtera for a more precse, accurate, and sure rsk analyss are developed. These crtera are presented n Table 3. As shown n Table 3, the frst three crtera (.e. C1, C2, and C3) are the cost type crtera (the lower, the better). The remanng crtera are the beneft type crtera (the hgher, the better). Table 3. Evaluaton crtera for analyze rsk Crtera Defnton Type of crteron Threat (C1) Threat s defned as an event wth an undesred mpact Cost Vulnerablty Any weakness of an asset that can convert t nto an event Cost (C2) or dsaster by one or more threats Consequence Consequence s defned as the effect of an event or ncdent Cost (C3) Detectablty The capablty and potental for dentfcaton and Beneft (C4) elmnaton of the weakness Reacton aganst event (C5) The capablty of an approprate response n order to reduce or lmt the effect of an event after happenng or prevent aganst the development of casualtes, damage, and loss Beneft 4.3 Evaluatng the exstng rsks usng fuzzy TOPSIS procedure In the thrd phase, evaluatng rsks s determned by usng fuzzy TOPSIS. Lngustc terms are utlzed for evaluatng the ratngs and mportance weghts of alternatves and crtera. The defnton of lngustc terms and trangular fuzzy numbers are presented n Tables (1) and (2). 4.4 Senstvty analyss Senstvty analyss s a useful tool n the present of uncertanty n the defnton of the relatve mportance of evaluaton crtera. Ths technque s appled to determne the effect of crtera weghts on decson makng. 9

10 5. Case analyss The proposed model s utlzed to rank the exstng rsk n a crtcal nfrastructure n order to demonstrate the potental applcatons of the model. A ral transportaton example s adopted from API & NPRA (2004). The example s of a fcttous hydrocarbon tank truck transportaton system, whch ncludes the tank truck, nventory of flammable lquds and the route specfc varables such as the type of road, populaton centers and envronmental receptors, and any stops. 5.1 Rsks Identfcaton In our case, eght crtcal assets were dentfed as rsky assets to be analyzed by the model. These assets nclude 25 ralcars of petroleum products (RPP), rural secton of track to swtch yard - 25 mles from shpper's ste (RST), manlne secton of track n rural area mles (MST-200), swtch yard (SY), rver crossng (RC), manlne secton of track n urban area mles (MST-300), sdng n Urban Area (SUA), and tunnel n Urban Area (TUA). 5.2 Selecton of Crtera rom above dscusson, evaluaton crtera to utlze n the proposed model comprse Threat (C1), Vulnerablty (C2), Consequence (C3), Detectablty (C4), and Reacton aganst event (C5). Thus, the decson herarchy s structured as depcted n gure 2. The decson problem conssts of three levels: the objectve of the problem s stuated at the hghest level, whle n the second level, the crtera are presented, and the last level belongs to the alternatves. Rankng rsks C1 C2 C3 C3 C5 RPP RST MST-200 SY RC MST-300 SUA TUA gure 2. The structure of decson 5.3 Evaluatng the Exstng Rsks Usng uzzy TOPSIS Procedure Regardng the evaluaton of the dentfed rsks, 8 decson makers wth mnmum 5 years experence were nvted to evaluate the weghts of crtera and alternatves wth respect to each crteron by usng lngustc varables gven n Table 1 and Table 2. or achevng the am, two questonnares are desgned; one of them s to obtan the weghts of crtera and other s to acqure the mportance of alternatves wth respect to crtera. To determne the 10

11 fuzzy weght of each crteron, lngustc varables are converted nto trangular fuzzy numbers as shown n the thrd column of Table 4. Table 4. uzzy weghts of crtera Crtera Lngustc term uzzy number C1 M (0.25,0.5,0.75) C2 H (0.5,0.75,1.0) C3 VH (0.75,1.0,1.0) C4 L (0.0,0.25,0.5) C5 M (0.25,0.5,0.75) Then, decson makers were asked to form fuzzy evaluaton matrx by lngustc varables presented n Table 2. It s constructed by comparng eght potental rsks under fve crtera separately. The fuzzy decson matrx s presented n Table 5. Based on the fuzzy TOPSIS procedure, the decson matrx formed n Table 5 needs to be normalzed by usng Eqs. (5) and (6). Then, the fuzzy weghted decson matrx for the exstng alternatves s calculated by multplyng the weghts of crtera wth the normalzed fuzzy decson matrx as depcted n Table 6. Table 5. uzzy decson matrx RPP RST MST-200 SY RC MST-300 SUA TUA C1 C2 C3 C4 C5 V (5.0,7.5,10.0) (2.5,5.0,7.5) (5.0,7.5,10.0) (7.5,10.0,10.0) (2.5,5.0,7.5) P P (2.5,5.0,7.5) (5.0,7.5,10.0) (2.5,5.0,7.5) (0.0,2.5,5.0) (0.0,2.5,5.0) P V (2.5,5.0,7.5) (2.5,5.0,7.5) (0.0,2.5,5.0) (7.5,10.0,10.0) (5.0,7.5,10.0) VP P V (5.0,7.5,10.0) (0.0,0.0, 2.5) (0.0,2.5,5.0) (2.5,5.0,7.5) (7.5,10.0,10.0) P V (2.5,5.0,7.5) (5.0,7.5,10.0) (0.0,2.5,5.0) (2.5,5.0,7.5) (7.5,10.0,10.0) V P (7.5,10.0,10.0) (2.5,5.0,7.5) (2.5,5.0,7.5) (0.0,2.5,5.0) (5.0,7.5,10.0) VP P V (0.0,0.0, 2.5) (0.0,2.5,5.0) (5.0,7.5,10.0) (7.5,10.0,10.0) (5.0,7.5,10.0) P (5.0,7.5,10.0) (5.0,7.5,10.0) (2.5,5.0,7.5) (0.0,2.5,5.0) (2.5,5.0,7.5) 11

12 Table 6. eghted normalzed fuzzy decson matrx C1 C2 C3 C4 C5 RPP (0.12,0.37,0.75) (0.12,0.37,0.75) (0.37,0.75,1.0) (0.0,0.0,0.25) (0.06,0.25,0.56) RST 0.06,0.25,0.56) (0.25,0.56,1.0) (0.19,0.5,0.75) (0.0,0.0,0.12) (0.0,0.12,0.37) MST ,0.25,0.56) (0.12,0.37,.075) (0.0,0.25,0.5) (0.0,0.0,0.25) (0.12,0.37,.075) SY 0.12,0.37,.075) (0.0,0.0, 0.25) (0.0,0.25,0.5) (0.0,0.0,0.19) (0.19,0.5,0.75) RC 0.06,0.25,0.56) (0.25,0.56,1.0) (0.0,0.25,0.5) (0.0,0.0,0.19) (0.19,0.5,0.75) MST-300 (0.19,0.5,0.75) (0.12,0.37,0.75) (0.19,0.5,0.75) (0.0,0.0,0.12) (0.12,0.37,0.75) SUA (0.0,0.0,0.19) (0.0,0.19,0.5) (0.37,0.75,1.0) (0.0,0.0,0.25) (0.12,0.37,.075) TUA 0.12,0.37,.075) (0.25,0.56,1.0) (0.19,0.5,0.75) (0.0,0.0,0.12) (0.06,0.25,0.56) Then for the eght alternatves, the fuzzy postve deal soluton (PIS, A ) and the fuzzy negatve deal solutons (NIS, A ) are calculated usng Eqs. (10), (11). As a result, PIS and NIS are defned as v (1,1,1) v (1,1,1) and v (0,0,0) for beneft crteron, and v (0,0,0) and for cost crteron. As mentoned above, C1, C2, and C3 are cost crtera whereas C4 and C5 are beneft crtera. Then, the dstance of each alternatve from the fuzzy postve deal soluton and fuzzy negatve deal soluton are calculated through Eqs. (12) and (13). or example, the dstances of the PIS and NIS for alternatve A1 are calculated as follows: d 1 ( ) ( ) ( ) ( ) ( ) ( ) 1 1 ( ) ( ) (0.0 1) ( ) (1 0.0) ( ) ( ) 2 (1 0.25) 2 ( ) And d 1 ( ) ( ) ( ) ( ) ( ) ( ) 1 1 ( ) ( ) (1.0 1) ( ) ( ) ( ) ( ) 2 ( ) 2 ( ) Then, d 1 CC1 d 1 d

13 Smlar calculatons are fulflled for the other alternatves and the results are presented n Table 7. Table 7. uzzy TOPSIS result d d CC Rank base on securty RPP RST MST SY RC MST SUA TUA Accordng to CC values, the rsk rankng n descendng order s SY, MST-200, SUA, RC, RPP, TUA, RST and MST-300. Therefore, the rskest asset s MST-300 and the securest asset s SY. 5.4 Senstvty analyss Senstvty analyss plays a sgnfcant role n complex decson makng because of nherent nstablty. Ths technque generates dfferent scenaros that may change the prorty of alternatves and be needed to reach a consensus. If the rankng order be changed by ncreasng or decreasng the mportance of the crtera, the results are expressed to be senstve otherwse t s robust. In ths study, senstvty analyss s mplemented to see how senstve the alternatves change wth the mportance of the crtera. Ths tool graphcal exposes the mportance of crtera weghts n selectng the optmal alternatve among the feasble alternatves. The man goal of senstvty analyss s to see whch crtera s most sgnfcant n nfluencng the decson makng process. or ths reason, twenty fve experments were conducted as presented n Table 8. g. 3 shows how the prorty of each alternatve can be changed wth ncreasng or decreasng the mportance of the crtera. 13

14 Table 8. Senstvty analyss No. eghts of crtera Rankng 1 C1, C5 (0.25,0.5,0.75), C2 (0.5,0.75,1), C3 (0.75,1,1), C4 (0, 0, 0.25) SY> MST-200> SUA> RC> MST-300> RPP> TUA> RST (0.5,0.75,1), (0.75,1,1), (0,0,0.25) SY> SUA> MST-200> RC> MST-300> RST > RPP> TUA 2 C1, C2 C3 C4, C5 (0.5, 0.75,1), (0, 0, 0.25) SY> SUA> MST-200> RC> MST-300> RPP > RST > TUA 3 C1, C2, C3 C4, C5 (0.5, 0.75,1), (0.25, 0.5, 0.75) SUA> MST-200> SY> RC> RPP MST-300 > RST > TUA 4 C1, C2, C3, C4 C5 (0.5, 0.75,1), (0.25, 0.5, 0.75) SUA> SY> MST-200> RC> RPP MST-300 > TUA> RST 5 C2, C3, C4, C5 C1 (0.5,0.75,1), (0.25,0.5,0.75) SUA> MST-200> SY> RC> RPP MST-300 > TUA> RST 6 C3, C4, C5 C1, C2 (0.5, 0.75,1), (0.25, 0.5, 0.75) SUA> MST-200> SY> RC> RPP MST-300 > TUA> RST 7 C4, C5 C1, C2, C3 (0.5, 0.75,1), (0.25, 0.5, 0.75) SUA> SY> MST-200> RC> RPP MST-300 > TUA> RST 8 C5 C1, C2, C3, C4 9 C1, C2, C3, C4, C5 (0.25,0.5,0.75) SUA> MST-200> SY> RC> RPP MST-300 > TUA> RST (0,0,0.25), (0.25,0.5,0.75) SUA> MST-200> SY> RC> RPP > RST> MST-300 > TUA 10 C5 C1, C2, C3, C4 (0,0,0.25), (0.25,0.5,0.75) SUA> SY> MST-200 > RC> RST> MST-300> RPP > TUA 11 C4, C5 C1, C2, C3 (0,0,0.25), (0.25,0.5,0.75) SY> SUA> MST-200 > MST-300> RPP> RC > TUA> RST 12 C1, C3, C4, C5 C2 (0,0,0.25), (0.25,0.5,0.75) SY> MST-200 > SUA> RC >MST-300> RPP> TUA> RST 13 C1, C4, C5 C2, C3 (0,0,0.25), (0.25,0.5,0.75) SY> MST-200 > SUA> RC >MST-300> RPP> TUA> RST 14 C1, C4 C2, C3, C5 (0,0,0.25), (0.25,0.5,0.75), (0.5,0.75,1) SY> MST-200 > SUA> RC >MST-300> RPP> RST> TUA 15 C1, C4, C5 C3 C2 (0,0,0.25), (0.25,0.5,0.75), (0.75,1,1) SY> SUA> MST-200 > RC >MST-300> RPP> RST> TUA 16 C1, C4 C3, C5 C2 (0,0,0.25), (0.25,0.5,0.75), (0.75,1,1) SY> SUA> MST-200 > RC >MST-300> RPP> RST> TUA C (0,0,0.25), C C (0.25,0.5,0.75), C (0.5,0.75,1), SY> SUA> MST-200 > RC >MST-300> RPP> RST> TUA C 2 (0.75,1,1) C (0, 0, 0.25), C C (0.25, 0.5, 0.75), C C (0.75,1,1) SY> SUA> MST-200 > RPP> RC> MST-300> RST> TUA C (0,0,0.25), C (0.25,0.5,0.75), C C (0.75,1,1) SY> SUA> MST-200 > RPP> RC> MST-300> RST> TUA C 5 (0.5,0.75,1) (0, 0, 0.25), (0.25, 0.5, 0.75), (0.75,1,1) SY> SUA> MST-200 > RC> RPP> MST-300> RST> TUA 17 C1 C3, C4, C5 C , , 5 2, , 4 21 C1 C3 C2, C4, C5 (0,0,0.25), (0.5,0.75,1), (0.75,1,1) SY> MST-200 > SUA> RC> RPP> MST-300> RST> TUA 22 C1 C3 C2, C4, C5 (0,0,0.25), (0.75,1,1) SY> MST-200 > SUA> RC> RPP> MST-300> RST> TUA 23 C1 C2, C3, C4, C5 (0.25, 0.5, 0.75), (0.75,1,1) SY> MST-200 > SUA> RC> RPP> MST-300> RST> TUA 24 C1 C2, C3, C4, C5 (0.25, 0.5, 0.75), (0.75,1,1), (0.5, 0.75,1) SY> SUA> MST-200 > RC> RPP> MST-300> RST> TUA 25 C1 C3 C2, C4, C5 14

15 RPP RST MST-200 SY RC MST SUA TUA As depcted n Table 8 and g. 3, asset SY has top rank among all assets n 17 experments out of 25 ones. In the rest of the experments (experment numbers 4-11), the asset SUA s located n the top level as the wnner. As a result, asset SY s the securest asset. 6. Compare the Proposed Model wth the Conventonal RAMCAP In ths subsecton, n order to show the capablty and sutablty of the rsk evaluaton model proposed n ths paper, a comparson of the model wth conventonal RAMCAP s presented. or ths am, we fulfll the rsk analyss by usng the conventonal RAMCAP for prevous case. Based on RAMCAP, rsk s a functon of only three components threat, vulnerablty, and consequence magntude. An evaluaton scale wth fve judgments {1, 2, 3, 4, and 5} was appled, where 1 represents mnmum judgment level and 5 means the maxmum as depcted n Table 8. The results of evaluator team for assets are presented n Table 9. or the am of comparson, the output of fuzzy TOPSIS s shown n the last column of Table 9. 15

16 Table 8. Defnton of the RAMCAP components Components Ratng Threat (C1) Vulnerablty (C2) Consequence (C3) 1 Very Poor (VP) Very Poor (VP) Very Poor (VP) 2 Poor (P) Poor (P) Poor (P) 3 ar () ar () ar () 4 ood () ood () ood () 5 Very ood (V) Very ood (V) Very ood (V) Table 9. RAMCAP matrx C1 C2 C3 Rsk value Rank based on securty RAMCAP result uzzy TOPSIS result RPP RST MST SY RC MST SUA TUA As can be easly seen, the fnal classfcaton shows sgnfcant dfferences between the results of RAMCAP and fuzzy TOPSIS. Accordng to the output of RAMCAP, the rsk value belong to a lmted set and never takes nto account values such as 7, 11, 13, 14, 17, 19, 21. urthermore, from a computatonal pont of vew, there s a reducton n the capablty of the conventonal RAMCAP methodology to defne a precse and accurate rank, then groupng the crtcal assets nto a few categores and allocatng smlar rank to dfferent assets. Ths should be consdered that organzatons are forced wth two man lmtatons fnance and tme. The allocaton of resources for unnecessary actvtes leads to waste opportuntes. Besdes dfferent sets of vulnerablty, threat, and consequence may generate an dentcal value of rsk; however, the rsk mplcaton may not necessarly be the same. or example, two assets RPP and TUA have values of 4, 3, 4 and 4, 4, 3 for C1, C2 and C3 respectvely. Both these assets wll have a rsk value of 48; however, the rsk mplcatons of these two assets may be completely varous. Other example s two assets SUA and SY, whch have values of 1, 2, 4 and 4, 1, 2 for C1, C2 and C3 respectvely, wth smlar rsk value 8; nevertheless, the rsk mplcatons of these two assets may be entrely dfferent. nally, the relatve mportance among C1, C2 and C3 are not consdered. Ths may not be accurate n real world problems. Therefore, the outputs of proposed model are more accurate. Ths may result a more precse, accurate and sure rsk analyss for protecton. 7. Concluson In response to the rapd growth of mltary ndustres and ncreasng the capablty of 16

17 terrorsts to carry out destructve work, partcularly for the crtcal nfrastructures, the need for assets controls and rsk measures has caught much tme and attenton of governments and responsble sectors. On the other hand, the measurement of rsk s dffcult for decson makers to be precsely and accurately measured because of the ntangble nature of dangerous and threats. Most prevous studes only used the RAMCAP parameters to evaluate rsk. In ths paper, a new framework for evaluatng rsk n crtcal nfrastructures s ntroduced and developed. The model proposed extends the conventonal RAMCAP through ntroducng new parameters the effects on rsk level to obtan a more precse classfcaton of the exstng rsks. Accordng to the complexty of the proposed model due to exst dfferent crtera, whch are n conflctng wth each other, a mult-crtera decson makng method based on the fuzzy logc theory s descrbed to also handle the uncertanty of decson makng problem. Ths technque helps decson maker to specfy relatve mportance of crtera and to determne judgments by means of lngustc varables. A case study s presented n order to demonstrate the potental applcatons of ths methodology. Then a comparson between the proposed model and conventonal RAMCAP s fulflled. The results of the comparson show some shortages of the conventonal RAMCAP as lsted n the followng: (1) The values of rsk evaluaton belong to a lmted set, (2) roupng the assets nto a few categores, (3) Allocatng smlar rank to dfferent assets, (4) Neglectng the relatve mportance of crtera. References Amercan Petroleum Insttute (API) and Natonal Petrochemcal Refners Assocaton (NPRA), Securty Vulnerablty Assessment Methodology for the Petroleum and Petrochemcal Industres (2nd ed.), (Appendx C1). Avalable at Ashtan, B., Haghghrad,., Maku, A., & Montazer,. (2009). Extenson of fuzzy TOPSIS method based on nterval-valued fuzzy sets. Appled Soft Computng, 9: ASME Innovatve Technologes Insttute (ASME-ITI), (2006). RAMCAP (Rsk Analyss and Management for Crtcal Asset Protecton); the ramework, ASME Innovatve Technologes Insttute, LLC (Chapter 1). Avalable at age.pdf Awasth, A., Chauhan, S. S., & Omran, H. (2011). Applcaton of fuzzy TOPSIS n evaluatng sustanable transportaton systems. Expert Systems wth Applcatons, 38 (10): Aydogan, E. K. (2011). Performance measurement model for Turksh avaton frms usng the rough-ahp and TOPSIS methods under fuzzy envronment. Expert Systems wth 17

18 Applcatons, 38(4): Brashear, J., Olsten, M., Bnnng, D., & Stenzler, J. (2007). RAMCAP ; Rsk Analyss and Management for Crtcal Asset Protecton for the ater and astewater Sector. ater Envronment ederaton, pp Brashear, J.P., & Jones, J.. (2010). Rsk Analyss and Management for Crtcal Asset Protecton. ley Handbook of Scence and Technology for Homeland Securty (edted by john. Voeller), John ley & Sons, Inc, pp Chen, T. Y., Tsao, Ch. Y. (2008). The nterval-valued fuzzy TOPSIS method and expermental analyss. uzzy Sets and Systems, 159: Ebrahmnejad, S., Mousav, S. M., & Mojtahed, S. M. H. (2009). A fuzzy decson-makng model for rsk rankng wth an applcaton to an onshore gas refnery. Int. J. Busness Contnuty and Rsk Management, 1(1): rass, A., ambern, R., Mora, C., & Rmn, B. (2009). A fuzzy mult-attrbute model for rsk evaluaton n workplaces. Safety Scence, 47: umus, A. T. (2009). Evaluaton of hazardous waste transportaton frms by usng a two step fuzzy-ahp and TOPSIS methodology. Expert Systems wth Applcatons, 36: Jola,., Yazdan, S. A., Shahanagh, K., & Khojasteh, M. A. (2011). Integratng fuzzy TOPSIS and mult-perod goal programmng for purchasng multple products from multple supplers. Journal of Purchasng & Supply Management, 17: Kaya, T., & Kahraman, C. (2011). Multcrtera decson makng n energy plannng usng a modfed fuzzy TOPSIS methodology. Expert Systems wth Applcatons, 38: Kelemens, A., Ergazaks, K., & Askouns, D. (2011). Support managers selecton usng an extenson of fuzzy TOPSIS. Expert Systems wth Applcatons, 38: Krohlng, R.A., & Campanharo, V.C. (2011). uzzy TOPSIS for group decson makng: A case study for accdents wth ol spll n the sea. Expert Systems wth Applcatons, 38: Kuo, M. S., Tzeng,.-H., & Huang,. C. (2007). roup decson makng based on concepts of deal and ant-deal ponts n fuzzy envronment. Mathematcal and Computer modelng, 45(3/4), Lao, Ch.N., & Kao, H.P. (2011). An ntegrated fuzzy TOPSIS and MCP approach to suppler selecton n supply chan management. Expert Systems wth Applcatons, 38: Roghanan, E., Rahm, J., Ansar, A. (2010). Comparson of frst aggregaton and last aggregaton n fuzzy group TOPSIS. Appled Mathematcal Modellng, 34:

19 Sad-Nezhad, S., & Damghan, K.Kh. (2010). Applcaton of a fuzzy TOPSIS method base on modfed preference rato and fuzzy dstance measurement n assessment of traffc polce centers performance. Appled Soft Computng, 10: Seçme, N. Y., Bayrakdaroglu, A., & Kahraman, C. (2009). uzzy performance evaluaton n Turksh Bankng Sector usng Analytc Herarchy Process and TOPSIS. Expert Systems wth Applcatons, 36: Sngh, R.K., & Benyoucef, L. (2011). A fuzzy TOPSIS based approach for e-sourcng. Engneerng Applcatons of Artfcal Intellgence, 24: Sun, Ch. Ch. (2010). A performance evaluaton model by ntegratng fuzzy AHP and fuzzy TOPSIS methods. Expert Systems wth Applcatons, 37: Sun, Ch.Ch., & Ln,.T.R. (2009). Usng fuzzy TOPSIS method for evaluatng the compettve advantages of shoppng webstes. Expert Systems wth Applcatons, 36: Torlak,., Sevkl, M., Sanal, M., & Zam, S. (2011). Analyzng busness competton by usng fuzzy TOPSIS method: An example of Turksh domestc arlne ndustry. Expert Systems wth Applcatons, 38: Yang, T., & Hung, C. C. (2007). Multple-attrbute decson makng methods for plant layout desgn problem. Robotcs and Computer-Integrated Manufacturng, 23(1): Yu, V.., & Hu, K.J. (2010). An ntegrated fuzzy mult-crtera approach for the performance evaluaton of multple manufacturng plants. Computers & Industral Engneerng, 58: Yue, Zh. (2011). An extended TOPSIS for determnng weghts of decson makers wth nterval numbers. Knowledge-Based Systems, 24: Cox, L.A.J. (2009). Rsk Analyss of Complex and Uncertan Systems. Sprnger Scence+Busness Meda, LLC, (Chapter 15). Zadeh, L. A. (1965). uzzy sets. Inform. Contr. 8:

A New Approach For the Ranking of Fuzzy Sets With Different Heights

A New Approach For the Ranking of Fuzzy Sets With Different Heights New pproach For the ankng of Fuzzy Sets Wth Dfferent Heghts Pushpnder Sngh School of Mathematcs Computer pplcatons Thapar Unversty, Patala-7 00 Inda pushpndersnl@gmalcom STCT ankng of fuzzy sets plays

More information

BioTechnology. An Indian Journal FULL PAPER. Trade Science Inc.

BioTechnology. An Indian Journal FULL PAPER. Trade Science Inc. [Type text] [Type text] [Type text] ISSN : 0974-74 Volume 0 Issue BoTechnology 04 An Indan Journal FULL PAPER BTAIJ 0() 04 [684-689] Revew on Chna s sports ndustry fnancng market based on market -orented

More information

OPTIMIZATION OF PROCESS PARAMETERS USING AHP AND TOPSIS WHEN TURNING AISI 1040 STEEL WITH COATED TOOLS

OPTIMIZATION OF PROCESS PARAMETERS USING AHP AND TOPSIS WHEN TURNING AISI 1040 STEEL WITH COATED TOOLS Internatonal Journal of Mechancal Engneerng and Technology (IJMET) Volume 7, Issue 6, November December 2016, pp.483 492, Artcle ID: IJMET_07_06_047 Avalable onlne at http://www.aeme.com/jmet/ssues.asp?jtype=ijmet&vtype=7&itype=6

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

Helsinki University Of Technology, Systems Analysis Laboratory Mat Independent research projects in applied mathematics (3 cr)

Helsinki University Of Technology, Systems Analysis Laboratory Mat Independent research projects in applied mathematics (3 cr) Helsnk Unversty Of Technology, Systems Analyss Laboratory Mat-2.08 Independent research projects n appled mathematcs (3 cr) "! #$&% Antt Laukkanen 506 R ajlaukka@cc.hut.f 2 Introducton...3 2 Multattrbute

More information

A Simple and Efficient Goal Programming Model for Computing of Fuzzy Linear Regression Parameters with Considering Outliers

A Simple and Efficient Goal Programming Model for Computing of Fuzzy Linear Regression Parameters with Considering Outliers 62626262621 Journal of Uncertan Systems Vol.5, No.1, pp.62-71, 211 Onlne at: www.us.org.u A Smple and Effcent Goal Programmng Model for Computng of Fuzzy Lnear Regresson Parameters wth Consderng Outlers

More information

Sum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints

Sum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints Australan Journal of Basc and Appled Scences, 2(4): 1204-1208, 2008 ISSN 1991-8178 Sum of Lnear and Fractonal Multobjectve Programmng Problem under Fuzzy Rules Constrants 1 2 Sanjay Jan and Kalash Lachhwan

More information

CONCURRENT OPTIMIZATION OF MULTI RESPONCE QUALITY CHARACTERISTICS BASED ON TAGUCHI METHOD. Ümit Terzi*, Kasım Baynal

CONCURRENT OPTIMIZATION OF MULTI RESPONCE QUALITY CHARACTERISTICS BASED ON TAGUCHI METHOD. Ümit Terzi*, Kasım Baynal CONCURRENT OPTIMIZATION OF MUTI RESPONCE QUAITY CHARACTERISTICS BASED ON TAGUCHI METHOD Ümt Terz*, Kasım Baynal *Department of Industral Engneerng, Unversty of Kocael, Vnsan Campus, Kocael, Turkey +90

More information

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and

More information

Smoothing Spline ANOVA for variable screening

Smoothing Spline ANOVA for variable screening Smoothng Splne ANOVA for varable screenng a useful tool for metamodels tranng and mult-objectve optmzaton L. Rcco, E. Rgon, A. Turco Outlne RSM Introducton Possble couplng Test case MOO MOO wth Game Theory

More information

Type-2 Fuzzy Non-uniform Rational B-spline Model with Type-2 Fuzzy Data

Type-2 Fuzzy Non-uniform Rational B-spline Model with Type-2 Fuzzy Data Malaysan Journal of Mathematcal Scences 11(S) Aprl : 35 46 (2017) Specal Issue: The 2nd Internatonal Conference and Workshop on Mathematcal Analyss (ICWOMA 2016) MALAYSIAN JOURNAL OF MATHEMATICAL SCIENCES

More information

Support Vector Machines

Support Vector Machines /9/207 MIST.6060 Busness Intellgence and Data Mnng What are Support Vector Machnes? Support Vector Machnes Support Vector Machnes (SVMs) are supervsed learnng technques that analyze data and recognze patterns.

More information

Classifier Selection Based on Data Complexity Measures *

Classifier Selection Based on Data Complexity Measures * Classfer Selecton Based on Data Complexty Measures * Edth Hernández-Reyes, J.A. Carrasco-Ochoa, and J.Fco. Martínez-Trndad Natonal Insttute for Astrophyscs, Optcs and Electroncs, Lus Enrque Erro No.1 Sta.

More information

SOFT COMPUTING BASED ON A MODIFIED MCDM APPROACH UNDER INTUITIONISTIC FUZZY SETS

SOFT COMPUTING BASED ON A MODIFIED MCDM APPROACH UNDER INTUITIONISTIC FUZZY SETS Iranan Journal of Fuzzy Systems Vol. 14, No. 1, (2017 pp. 23-41 23 SOFT COMPUTING BASED ON A MODIFIED MCDM APPROACH UNDER INTUITIONISTIC FUZZY SETS M. R. SHAHRIARI Abstract. The current study set to extend

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance Tsnghua Unversty at TAC 2009: Summarzng Mult-documents by Informaton Dstance Chong Long, Mnle Huang, Xaoyan Zhu State Key Laboratory of Intellgent Technology and Systems, Tsnghua Natonal Laboratory for

More information

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS ARPN Journal of Engneerng and Appled Scences 006-017 Asan Research Publshng Network (ARPN). All rghts reserved. NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS Igor Grgoryev, Svetlana

More information

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique //00 :0 AM Outlne and Readng The Greedy Method The Greedy Method Technque (secton.) Fractonal Knapsack Problem (secton..) Task Schedulng (secton..) Mnmum Spannng Trees (secton.) Change Money Problem Greedy

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points;

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points; Subspace clusterng Clusterng Fundamental to all clusterng technques s the choce of dstance measure between data ponts; D q ( ) ( ) 2 x x = x x, j k = 1 k jk Squared Eucldean dstance Assumpton: All features

More information

(1) The control processes are too complex to analyze by conventional quantitative techniques.

(1) The control processes are too complex to analyze by conventional quantitative techniques. Chapter 0 Fuzzy Control and Fuzzy Expert Systems The fuzzy logc controller (FLC) s ntroduced n ths chapter. After ntroducng the archtecture of the FLC, we study ts components step by step and suggest a

More information

Intra-Parametric Analysis of a Fuzzy MOLP

Intra-Parametric Analysis of a Fuzzy MOLP Intra-Parametrc Analyss of a Fuzzy MOLP a MIAO-LING WANG a Department of Industral Engneerng and Management a Mnghsn Insttute of Technology and Hsnchu Tawan, ROC b HSIAO-FAN WANG b Insttute of Industral

More information

FAHP and Modified GRA Based Network Selection in Heterogeneous Wireless Networks

FAHP and Modified GRA Based Network Selection in Heterogeneous Wireless Networks 2017 2nd Internatonal Semnar on Appled Physcs, Optoelectroncs and Photoncs (APOP 2017) ISBN: 978-1-60595-522-3 FAHP and Modfed GRA Based Network Selecton n Heterogeneous Wreless Networks Xaohan DU, Zhqng

More information

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty

More information

Learning the Kernel Parameters in Kernel Minimum Distance Classifier

Learning the Kernel Parameters in Kernel Minimum Distance Classifier Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department

More information

Solving two-person zero-sum game by Matlab

Solving two-person zero-sum game by Matlab Appled Mechancs and Materals Onlne: 2011-02-02 ISSN: 1662-7482, Vols. 50-51, pp 262-265 do:10.4028/www.scentfc.net/amm.50-51.262 2011 Trans Tech Publcatons, Swtzerland Solvng two-person zero-sum game by

More information

An Indian Journal FULL PAPER ABSTRACT KEYWORDS. Trade Science Inc.

An Indian Journal FULL PAPER ABSTRACT KEYWORDS. Trade Science Inc. [Type text] [Type text] [Type text] ISSN : 97-735 Volume Issue 9 BoTechnology An Indan Journal FULL PAPER BTAIJ, (9), [333-3] Matlab mult-dmensonal model-based - 3 Chnese football assocaton super league

More information

Determining the Optimal Bandwidth Based on Multi-criterion Fusion

Determining the Optimal Bandwidth Based on Multi-criterion Fusion Proceedngs of 01 4th Internatonal Conference on Machne Learnng and Computng IPCSIT vol. 5 (01) (01) IACSIT Press, Sngapore Determnng the Optmal Bandwdth Based on Mult-crteron Fuson Ha-L Lang 1+, Xan-Mn

More information

CHAPTER 3 AHP, FUZZY AHP AND GRA

CHAPTER 3 AHP, FUZZY AHP AND GRA 38 CHAPTER 3 AHP, FUZZY AHP AND GRA 3.1 INTRODUCTION The purpose of ths chapter s to dscuss the fundamental concepts of AHP, Fuzzy AHP and GRA. The steps nvolved n AHP, characterstcs and lmtatons of AHP

More information

Review of approximation techniques

Review of approximation techniques CHAPTER 2 Revew of appromaton technques 2. Introducton Optmzaton problems n engneerng desgn are characterzed by the followng assocated features: the objectve functon and constrants are mplct functons evaluated

More information

X- Chart Using ANOM Approach

X- Chart Using ANOM Approach ISSN 1684-8403 Journal of Statstcs Volume 17, 010, pp. 3-3 Abstract X- Chart Usng ANOM Approach Gullapall Chakravarth 1 and Chaluvad Venkateswara Rao Control lmts for ndvdual measurements (X) chart are

More information

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 An Iteratve Soluton Approach to Process Plant Layout usng Mxed

More information

Selection Of Best Alternative For An Automotive Company By Intuitionistic Fuzzy TOPSIS Method

Selection Of Best Alternative For An Automotive Company By Intuitionistic Fuzzy TOPSIS Method Selecton Of Best lternatve For n utomotve Company By Intutonstc Fuzzy TOPSIS Method Zulqarnan M., Dayan F. bstract: Mult Crtera Decson Makng MCDM uses dfferent technques to fnd a best alternatve from mult-alternatve

More information

COMPLEX METHODOLOGY FOR STUDY OF INTERCITY RAIL TRANSPORT

COMPLEX METHODOLOGY FOR STUDY OF INTERCITY RAIL TRANSPORT ENGINEERING FOR RURA DEVEOPMENT Jelgava 5.-7.05.06. COMPEX METHODOOGY FOR STUDY OF INTERCITY RAI TRANSPORT Svetla Stolova Radna Nkolova Techncal Unversty-Sofa Bulgara stolova@tu-sofa.bg r.nkolova@tu-sofa.bg

More information

ANALYSIS OF ALUMINIUM PROFILE MANUFACTURING INDUSTRIES BY USING TOPSIS METHOD

ANALYSIS OF ALUMINIUM PROFILE MANUFACTURING INDUSTRIES BY USING TOPSIS METHOD Int. J. ech. Eng. & Rob. Res. 2014 Prashant B alve and Shrkant Jachak 2014 Research Paper ISSN 2278 0149 www.jmerr.com Vol. 3 No. 3 July 2014 2014 IJERR. All Rghts Reserved ANALYSIS OF ALUINIU PROFILE

More information

GA-Based Learning Algorithms to Identify Fuzzy Rules for Fuzzy Neural Networks

GA-Based Learning Algorithms to Identify Fuzzy Rules for Fuzzy Neural Networks Seventh Internatonal Conference on Intellgent Systems Desgn and Applcatons GA-Based Learnng Algorthms to Identfy Fuzzy Rules for Fuzzy Neural Networks K Almejall, K Dahal, Member IEEE, and A Hossan, Member

More information

Simulation: Solving Dynamic Models ABE 5646 Week 11 Chapter 2, Spring 2010

Simulation: Solving Dynamic Models ABE 5646 Week 11 Chapter 2, Spring 2010 Smulaton: Solvng Dynamc Models ABE 5646 Week Chapter 2, Sprng 200 Week Descrpton Readng Materal Mar 5- Mar 9 Evaluatng [Crop] Models Comparng a model wth data - Graphcal, errors - Measures of agreement

More information

Proper Choice of Data Used for the Estimation of Datum Transformation Parameters

Proper Choice of Data Used for the Estimation of Datum Transformation Parameters Proper Choce of Data Used for the Estmaton of Datum Transformaton Parameters Hakan S. KUTOGLU, Turkey Key words: Coordnate systems; transformaton; estmaton, relablty. SUMMARY Advances n technologes and

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

Steps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices

Steps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices Steps for Computng the Dssmlarty, Entropy, Herfndahl-Hrschman and Accessblty (Gravty wth Competton) Indces I. Dssmlarty Index Measurement: The followng formula can be used to measure the evenness between

More information

The Research of Support Vector Machine in Agricultural Data Classification

The Research of Support Vector Machine in Agricultural Data Classification The Research of Support Vector Machne n Agrcultural Data Classfcaton Le Sh, Qguo Duan, Xnmng Ma, Me Weng College of Informaton and Management Scence, HeNan Agrcultural Unversty, Zhengzhou 45000 Chna Zhengzhou

More information

Multicriteria Decision Making

Multicriteria Decision Making Multcrtera Decson Makng Andrés Ramos (Andres.Ramos@comllas.edu) Pedro Sánchez (Pedro.Sanchez@comllas.edu) Sonja Wogrn (Sonja.Wogrn@comllas.edu) Contents 1. Basc concepts 2. Contnuous methods 3. Dscrete

More information

VIKOR : VIKOR VIKOR VIKOR

VIKOR :   VIKOR VIKOR VIKOR VIKOR *1 2 3 4 1 - a.yazdan@modares.ac.r -2 z.ahmad@modares.ac.r -3 sko1@str.ac.uk -4 mhbasr@modares.ac.r..... VIKOR.. VIKOR. C VIKOR : -1..[1]....[2] -...[4] :[1]. -1-2 -3.. -.[5]. ( TOPSIS AHP SAW) MADM

More information

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

LECTURE NOTES Duality Theory, Sensitivity Analysis, and Parametric Programming

LECTURE NOTES Duality Theory, Sensitivity Analysis, and Parametric Programming CEE 60 Davd Rosenberg p. LECTURE NOTES Dualty Theory, Senstvty Analyss, and Parametrc Programmng Learnng Objectves. Revew the prmal LP model formulaton 2. Formulate the Dual Problem of an LP problem (TUES)

More information

Support Vector Machines

Support Vector Machines Support Vector Machnes Decson surface s a hyperplane (lne n 2D) n feature space (smlar to the Perceptron) Arguably, the most mportant recent dscovery n machne learnng In a nutshell: map the data to a predetermned

More information

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster

More information

SENSITIVITY ANALYSIS IN LINEAR PROGRAMMING USING A CALCULATOR

SENSITIVITY ANALYSIS IN LINEAR PROGRAMMING USING A CALCULATOR SENSITIVITY ANALYSIS IN LINEAR PROGRAMMING USING A CALCULATOR Judth Aronow Rchard Jarvnen Independent Consultant Dept of Math/Stat 559 Frost Wnona State Unversty Beaumont, TX 7776 Wnona, MN 55987 aronowju@hal.lamar.edu

More information

TN348: Openlab Module - Colocalization

TN348: Openlab Module - Colocalization TN348: Openlab Module - Colocalzaton Topc The Colocalzaton module provdes the faclty to vsualze and quantfy colocalzaton between pars of mages. The Colocalzaton wndow contans a prevew of the two mages

More information

Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research

Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research Schedulng Remote Access to Scentfc Instruments n Cybernfrastructure for Educaton and Research Je Yn 1, Junwe Cao 2,3,*, Yuexuan Wang 4, Lanchen Lu 1,3 and Cheng Wu 1,3 1 Natonal CIMS Engneerng and Research

More information

The environment bills that passed by the legislators triggered a new dimension towards the manufacturers to consider producing eco friendly

The environment bills that passed by the legislators triggered a new dimension towards the manufacturers to consider producing eco friendly Ffth Internatonal Workshop on Computatonal Intellgence & Applcatons IEEE SMC Hroshma Chapter, Hroshma Unversty, Japan, November 10, 11 & 12, 2009 The Development of the Computer Aded Remanufacturng System

More information

Virtual Machine Migration based on Trust Measurement of Computer Node

Virtual Machine Migration based on Trust Measurement of Computer Node Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on

More information

Classifying Acoustic Transient Signals Using Artificial Intelligence

Classifying Acoustic Transient Signals Using Artificial Intelligence Classfyng Acoustc Transent Sgnals Usng Artfcal Intellgence Steve Sutton, Unversty of North Carolna At Wlmngton (suttons@charter.net) Greg Huff, Unversty of North Carolna At Wlmngton (jgh7476@uncwl.edu)

More information

COTS evaluation using modified TOPSIS and ANP

COTS evaluation using modified TOPSIS and ANP Appled Mathematcs and Computaton 177 (2006) 251 259 www.elsever.com/locate/amc COTS evaluaton usng modfed TOPSIS and ANP Huan-Jyh Shyur Department of Informaton Management, Tamkang Unversty, Tawan 151

More information

Load-Balanced Anycast Routing

Load-Balanced Anycast Routing Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance

More information

Port Performance Analysis Using Extent Fuzzy AHP Approach

Port Performance Analysis Using Extent Fuzzy AHP Approach Journal of the ersan Gulf (arne Scence)/Vol. 5/No. 7/September 04/8/57-64 ort erformance Analyss Usng xtent Fuzzy AH Approach Kan oghadam, ansoor * habahar artme Unversty, habahar, Ir Iran Receved: January

More information

GSLM Operations Research II Fall 13/14

GSLM Operations Research II Fall 13/14 GSLM 58 Operatons Research II Fall /4 6. Separable Programmng Consder a general NLP mn f(x) s.t. g j (x) b j j =. m. Defnton 6.. The NLP s a separable program f ts objectve functon and all constrants are

More information

An Image Fusion Approach Based on Segmentation Region

An Image Fusion Approach Based on Segmentation Region Rong Wang, L-Qun Gao, Shu Yang, Yu-Hua Cha, and Yan-Chun Lu An Image Fuson Approach Based On Segmentaton Regon An Image Fuson Approach Based on Segmentaton Regon Rong Wang, L-Qun Gao, Shu Yang 3, Yu-Hua

More information

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,

More information

A new paradigm of fuzzy control point in space curve

A new paradigm of fuzzy control point in space curve MATEMATIKA, 2016, Volume 32, Number 2, 153 159 c Penerbt UTM Press All rghts reserved A new paradgm of fuzzy control pont n space curve 1 Abd Fatah Wahab, 2 Mohd Sallehuddn Husan and 3 Mohammad Izat Emr

More information

A Semi-parametric Regression Model to Estimate Variability of NO 2

A Semi-parametric Regression Model to Estimate Variability of NO 2 Envronment and Polluton; Vol. 2, No. 1; 2013 ISSN 1927-0909 E-ISSN 1927-0917 Publshed by Canadan Center of Scence and Educaton A Sem-parametrc Regresson Model to Estmate Varablty of NO 2 Meczysław Szyszkowcz

More information

A Fuzzy Goal Programming Approach for a Single Machine Scheduling Problem

A Fuzzy Goal Programming Approach for a Single Machine Scheduling Problem Proceedngs of e 9 WSEAS Internatonal Conference on Appled Maematcs, Istanbul, Turkey, May 7-9, 006 (pp40-45 A Fuzzy Goal Programmng Approach for a Sngle Machne Schedulng Problem REZA TAVAKKOLI-MOGHADDAM,

More information

An Application of the Dulmage-Mendelsohn Decomposition to Sparse Null Space Bases of Full Row Rank Matrices

An Application of the Dulmage-Mendelsohn Decomposition to Sparse Null Space Bases of Full Row Rank Matrices Internatonal Mathematcal Forum, Vol 7, 2012, no 52, 2549-2554 An Applcaton of the Dulmage-Mendelsohn Decomposton to Sparse Null Space Bases of Full Row Rank Matrces Mostafa Khorramzadeh Department of Mathematcal

More information

APPLICATION OF MULTIVARIATE LOSS FUNCTION FOR ASSESSMENT OF THE QUALITY OF TECHNOLOGICAL PROCESS MANAGEMENT

APPLICATION OF MULTIVARIATE LOSS FUNCTION FOR ASSESSMENT OF THE QUALITY OF TECHNOLOGICAL PROCESS MANAGEMENT 3. - 5. 5., Brno, Czech Republc, EU APPLICATION OF MULTIVARIATE LOSS FUNCTION FOR ASSESSMENT OF THE QUALITY OF TECHNOLOGICAL PROCESS MANAGEMENT Abstract Josef TOŠENOVSKÝ ) Lenka MONSPORTOVÁ ) Flp TOŠENOVSKÝ

More information

Mathematics 256 a course in differential equations for engineering students

Mathematics 256 a course in differential equations for engineering students Mathematcs 56 a course n dfferental equatons for engneerng students Chapter 5. More effcent methods of numercal soluton Euler s method s qute neffcent. Because the error s essentally proportonal to the

More information

AN INTERVAL-VALUED FUZZY NUMBER APPROACH FOR SUPPLIER SELECTION

AN INTERVAL-VALUED FUZZY NUMBER APPROACH FOR SUPPLIER SELECTION 384 Journal of Marne Scence and Technology, Vol. 24, No. 3, pp. 384-389 (2016 DOI: 10.6119/JMST-015-0521-8 N INTERV-VED FZZY NMBER PPROCH FOR SPPIER SEECTION Chan-Shal ee 1, Cheng-Ch Chung 1, Hsuan-Shh

More information

A Revised Method for Ranking Generalized Fuzzy Numbers

A Revised Method for Ranking Generalized Fuzzy Numbers 8th Internatonal Conference on Informaton Fuson Washngton DC - July 6-9 5 evsed Method for ankng Generalzed Fuzzy Numbers Yu uo a Wen Jang b DeYun Zhou c XYun Qn d Jun Zhan e abcde School of Electroncs

More information

User Authentication Based On Behavioral Mouse Dynamics Biometrics

User Authentication Based On Behavioral Mouse Dynamics Biometrics User Authentcaton Based On Behavoral Mouse Dynamcs Bometrcs Chee-Hyung Yoon Danel Donghyun Km Department of Computer Scence Department of Computer Scence Stanford Unversty Stanford Unversty Stanford, CA

More information

OPTIMIZATION OF PROCESS PARAMETERS USING AHP AND VIKOR WHEN TURNING AISI 1040 STEEL WITH COATED TOOLS

OPTIMIZATION OF PROCESS PARAMETERS USING AHP AND VIKOR WHEN TURNING AISI 1040 STEEL WITH COATED TOOLS Internatonal Journal of Mechancal Engneerng and Technology (IJMET) Volume 8, Issue 1, January 2017, pp. 241 248, Artcle ID: IJMET_08_01_026 Avalable onlne at http://www.aeme.com/ijmet/ssues.asp?jtype=ijmet&vtype=8&itype=1

More information

Performance Evaluation of Information Retrieval Systems

Performance Evaluation of Information Retrieval Systems Why System Evaluaton? Performance Evaluaton of Informaton Retreval Systems Many sldes n ths secton are adapted from Prof. Joydeep Ghosh (UT ECE) who n turn adapted them from Prof. Dk Lee (Unv. of Scence

More information

S1 Note. Basis functions.

S1 Note. Basis functions. S1 Note. Bass functons. Contents Types of bass functons...1 The Fourer bass...2 B-splne bass...3 Power and type I error rates wth dfferent numbers of bass functons...4 Table S1. Smulaton results of type

More information

Meta-heuristics for Multidimensional Knapsack Problems

Meta-heuristics for Multidimensional Knapsack Problems 2012 4th Internatonal Conference on Computer Research and Development IPCSIT vol.39 (2012) (2012) IACSIT Press, Sngapore Meta-heurstcs for Multdmensonal Knapsack Problems Zhbao Man + Computer Scence Department,

More information

Module Management Tool in Software Development Organizations

Module Management Tool in Software Development Organizations Journal of Computer Scence (5): 8-, 7 ISSN 59-66 7 Scence Publcatons Management Tool n Software Development Organzatons Ahmad A. Al-Rababah and Mohammad A. Al-Rababah Faculty of IT, Al-Ahlyyah Amman Unversty,

More information

International Journal of Mathematical Archive-3(11), 2012, Available online through ISSN

International Journal of Mathematical Archive-3(11), 2012, Available online through   ISSN Internatonal Journal of Mathematcal rchve-(), 0, 477-474 valable onlne through www.jma.nfo ISSN 9 5046 FUZZY CRITICL PTH METHOD (FCPM) BSED ON SNGUNST ND CHEN RNKING METHOD ND CENTROID METHOD Dr. S. Narayanamoorthy*

More information

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour 6.854 Advanced Algorthms Petar Maymounkov Problem Set 11 (November 23, 2005) Wth: Benjamn Rossman, Oren Wemann, and Pouya Kheradpour Problem 1. We reduce vertex cover to MAX-SAT wth weghts, such that the

More information

Corner-Based Image Alignment using Pyramid Structure with Gradient Vector Similarity

Corner-Based Image Alignment using Pyramid Structure with Gradient Vector Similarity Journal of Sgnal and Informaton Processng, 013, 4, 114-119 do:10.436/jsp.013.43b00 Publshed Onlne August 013 (http://www.scrp.org/journal/jsp) Corner-Based Image Algnment usng Pyramd Structure wth Gradent

More information

Wishing you all a Total Quality New Year!

Wishing you all a Total Quality New Year! Total Qualty Management and Sx Sgma Post Graduate Program 214-15 Sesson 4 Vnay Kumar Kalakband Assstant Professor Operatons & Systems Area 1 Wshng you all a Total Qualty New Year! Hope you acheve Sx sgma

More information

Research on the Comprehensive Strength Evaluation for Universities based on the Fuzzy TOPSIS Method

Research on the Comprehensive Strength Evaluation for Universities based on the Fuzzy TOPSIS Method Paper Research on the Comprehensve Strength Evaluaton for Unverstes based on the Fuzzy Research on the Comprehensve Strength Evaluaton for Unverstes based on the Fuzzy TOPSIS Method https://do.org/0.399/jet.v2.08.736

More information

A Novel Fuzzy Multi-Objective Method for Supplier Selection and Order Allocation Problem Using NSGA II

A Novel Fuzzy Multi-Objective Method for Supplier Selection and Order Allocation Problem Using NSGA II A Novel Fuzzy Mult-Objectve Method for Suppler Selecton and Order Allocaton Problem Usng NSGA II Mohammad Al Sobhanolah a, Ahmad Mahmoodzadeh *, Bahman Nader b Department of Industral Engneerng, Faculty

More information

Robust-fuzzy model for supplier selection under uncertainty: An application to the automobile industry

Robust-fuzzy model for supplier selection under uncertainty: An application to the automobile industry Robust-fuzzy model for suppler selecton under uncertanty: An applcaton to the automoble ndustry Masood Rabehª,*, Mohammad Modarres b, Adel Azar c ª Department of Industral Management, hahd Behesht Unversty,

More information

Feature Reduction and Selection

Feature Reduction and Selection Feature Reducton and Selecton Dr. Shuang LIANG School of Software Engneerng TongJ Unversty Fall, 2012 Today s Topcs Introducton Problems of Dmensonalty Feature Reducton Statstc methods Prncpal Components

More information

MODULE DESIGN BASED ON INTERFACE INTEGRATION TO MAXIMIZE PRODUCT VARIETY AND MINIMIZE FAMILY COST

MODULE DESIGN BASED ON INTERFACE INTEGRATION TO MAXIMIZE PRODUCT VARIETY AND MINIMIZE FAMILY COST INTERNATIONAL CONFERENCE ON ENGINEERING DESIGN, ICED 07 28-31 AUGUST 2007, CITE DES SCIENCES ET DE L'INDUSTRIE, PARIS, FRANCE MODULE DESIGN BASED ON INTERFACE INTEGRATION TO MAIMIZE PRODUCT VARIETY AND

More information

An Entropy-Based Approach to Integrated Information Needs Assessment

An Entropy-Based Approach to Integrated Information Needs Assessment Dstrbuton Statement A: Approved for publc release; dstrbuton s unlmted. An Entropy-Based Approach to ntegrated nformaton Needs Assessment June 8, 2004 Wllam J. Farrell Lockheed Martn Advanced Technology

More information

The Cruise Port Place Selection Problem with Extended VIKOR and ANP Methodologies under Fuzzy Environment

The Cruise Port Place Selection Problem with Extended VIKOR and ANP Methodologies under Fuzzy Environment Proceedngs of the World Congress on Engneerng 2011 Vol II, July 6-8, 2011, London, U.K. The Cruse Port Place Selecton Problem wth Extended VIKOR and ANP Methodologes under Fuzzy Envronment Nhan ÇETİN DEMİREL,

More information

Prediction of Migration Path of a Colony. of Bounded-Rational Species Foraging. on Patchily Distributed Resources

Prediction of Migration Path of a Colony. of Bounded-Rational Species Foraging. on Patchily Distributed Resources Advanced Studes n Bology, Vol. 3, 20, no. 7, 333-345 Predcton of Mgraton Path of a Colony of Bounded-Ratonal Speces Foragng on Patchly Dstrbuted Resources Rebysarah S. Tambaoan, Jomar F. Rabaante, Ramon

More information

Distributed Resource Scheduling in Grid Computing Using Fuzzy Approach

Distributed Resource Scheduling in Grid Computing Using Fuzzy Approach Dstrbuted Resource Schedulng n Grd Computng Usng Fuzzy Approach Shahram Amn, Mohammad Ahmad Computer Engneerng Department Islamc Azad Unversty branch Mahallat, Iran Islamc Azad Unversty branch khomen,

More information

TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z.

TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z. TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS Muradalyev AZ Azerbajan Scentfc-Research and Desgn-Prospectng Insttute of Energetc AZ1012, Ave HZardab-94 E-mal:aydn_murad@yahoocom Importance of

More information

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto

More information

Identifying Top-k Most Influential Nodes by using the Topological Diffusion Models in the Complex Networks

Identifying Top-k Most Influential Nodes by using the Topological Diffusion Models in the Complex Networks (IJACSA) Internatonal Journal of Advanced Computer Scence and Applcatons, Vol. 8, No., 07 Identfyng Top-k Most Influental Nodes by usng the Topologcal Dffuson Models n the Complex Networks Maryam Padar,

More information

Complex Numbers. Now we also saw that if a and b were both positive then ab = a b. For a second let s forget that restriction and do the following.

Complex Numbers. Now we also saw that if a and b were both positive then ab = a b. For a second let s forget that restriction and do the following. Complex Numbers The last topc n ths secton s not really related to most of what we ve done n ths chapter, although t s somewhat related to the radcals secton as we wll see. We also won t need the materal

More information

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision SLAM Summer School 2006 Practcal 2: SLAM usng Monocular Vson Javer Cvera, Unversty of Zaragoza Andrew J. Davson, Imperal College London J.M.M Montel, Unversty of Zaragoza. josemar@unzar.es, jcvera@unzar.es,

More information

UB at GeoCLEF Department of Geography Abstract

UB at GeoCLEF Department of Geography   Abstract UB at GeoCLEF 2006 Mguel E. Ruz (1), Stuart Shapro (2), June Abbas (1), Slva B. Southwck (1) and Davd Mark (3) State Unversty of New York at Buffalo (1) Department of Lbrary and Informaton Studes (2) Department

More information

Novel Fuzzy logic Based Edge Detection Technique

Novel Fuzzy logic Based Edge Detection Technique Novel Fuzzy logc Based Edge Detecton Technque Aborsade, D.O Department of Electroncs Engneerng, adoke Akntola Unversty of Tech., Ogbomoso. Oyo-state. doaborsade@yahoo.com Abstract Ths paper s based on

More information

Website Structures Ranking: Applying Extended ELECTRE III Method Based on Fuzzy Notions

Website Structures Ranking: Applying Extended ELECTRE III Method Based on Fuzzy Notions Proceedngs of the 8th WSEAS Internatonal Conference on Fuzzy Systems, Vancouver, Brtsh Columb Canad June 9-, 007 0 Webste Structures Rankng: Applyng Extended ELECTRE III Method Based on Fuzzy Notons HAMED

More information

Structural Optimization Using OPTIMIZER Program

Structural Optimization Using OPTIMIZER Program SprngerLnk - Book Chapter http://www.sprngerlnk.com/content/m28478j4372qh274/?prnt=true ق.ظ 1 of 2 2009/03/12 11:30 Book Chapter large verson Structural Optmzaton Usng OPTIMIZER Program Book III European

More information

Related-Mode Attacks on CTR Encryption Mode

Related-Mode Attacks on CTR Encryption Mode Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory

More information

Course Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms

Course Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms Course Introducton Course Topcs Exams, abs, Proects A quc loo at a few algorthms 1 Advanced Data Structures and Algorthms Descrpton: We are gong to dscuss algorthm complexty analyss, algorthm desgn technques

More information

Behavioral Model Extraction of Search Engines Used in an Intelligent Meta Search Engine

Behavioral Model Extraction of Search Engines Used in an Intelligent Meta Search Engine Behavoral Model Extracton of Search Engnes Used n an Intellgent Meta Search Engne AVEH AVOUSI Computer Department, Azad Unversty, Garmsar Branch BEHZAD MOSHIRI Electrcal and Computer department, Faculty

More information

Petri Net Based Software Dependability Engineering

Petri Net Based Software Dependability Engineering Proc. RELECTRONIC 95, Budapest, pp. 181-186; October 1995 Petr Net Based Software Dependablty Engneerng Monka Hener Brandenburg Unversty of Technology Cottbus Computer Scence Insttute Postbox 101344 D-03013

More information

Decision Strategies for Rating Objects in Knowledge-Shared Research Networks

Decision Strategies for Rating Objects in Knowledge-Shared Research Networks Decson Strateges for Ratng Objects n Knowledge-Shared Research etwors ALEXADRA GRACHAROVA *, HAS-JOACHM ER **, HASSA OUR ELD ** OM SUUROE ***, HARR ARAKSE *** * nsttute of Control and System Research,

More information