Sciweavers

390 search results - page 71 / 78
» Fuzzy SWOT analysis
Sort
View
ISSA
2004
14 years 11 months ago
Utilizing Neural Networks For Effective Intrusion Detection
Computer security, and intrusion detection in particular, has become increasingly important in today's business environment, to help ensure safe and trusted commerce between ...
Martin Botha
75
Voted
FSS
2008
87views more  FSS 2008»
14 years 9 months ago
Representing parametric probabilistic models tainted with imprecision
Numerical possibility theory, belief function have been suggested as useful tools to represent imprecise, vague or incomplete information. They are particularly appropriate in unc...
Cédric Baudrit, Didier Dubois, Nathalie Per...
71
Voted
EOR
2007
151views more  EOR 2007»
14 years 9 months ago
A possibilistic decision model for new product supply chain design
This paper models supply chain (SC) uncertainties by fuzzy sets and develops a possibilistic SC configuration model for new products with unreliable or unavailable SC statistical...
Juite Wang, Yun-Feng Shu
IAJIT
2007
146views more  IAJIT 2007»
14 years 9 months ago
Adaptive Optimizing of Hello Messages in Wireless Ad-Hoc Networks
: Routing is an important functional aspect in wireless ad-hoc networks that handles discovering and maintaining the paths between nodes within a network. Due to nodes mobility, th...
Essam Natsheh, Adznan B. Jantan, Sabira Khatun, Su...
ASC
2004
14 years 9 months ago
Soft computing applications in dynamic model identification of polymer extrusion process
This paper proposes the applications of soft computing to deal with the constraints in conventional modelling techniques of the dynamic extrusion process. The proposed technique i...
Leong Ping Tan, Ahmad Lotfi, Eugene Lai, J. B. Hul...