Computer Science ›› 2019, Vol. 46 ›› Issue (1): 131-137.doi: 10.11896/j.issn.1002-137X.2019.01.020
• CCDM2018 • Previous Articles Next Articles
ZHENG Hong-liang, HOU Xue-hui, SONG Xiao-ying, PANG Kuo, ZOU Li
CLC Number:
[1]谢季坚,刘承平.模糊数学方法及其应用(第4版)[M].武汉:华中科技大学出版社,2013.<br /> [2]刘星成,汤庸.专家系统原理与编程[M].北京:机械工业出版社,2000.<br /> [3]SHORTILIFFE E H.Computer-based medical consultation: MYCIN[M].New York:American Elsevier Publishing,1976.<br /> [4]HAO Q,LU T.Context modeling and reasoning based on certainty factor[C]//Proceedings of 2009 Second Asia-Pacific Conference on Computational Intelligence and Industrial Applications.Wuhan,China:IEEE,2009:38-41.<br /> [5]WU M K.The truth-value estimation in fuzzy reasoning[J].Chinese Journal of Computers,1993,16(2):158-161.(in Chinese)<br /> 吴茂康.关于Fuzzy推理式的可信度估计[J].计算机学报,1993,16(2):158-161.<br /> [6]CHEN Y X,YIN Y.Two kinds of reasoning with credibility[J].Fuzzy Systems and Mathematics,2005,19(3):6-13.(in Chinese)<br /> 陈仪香,尹艳.两种含可信度的推理[J].模糊系统与数学,2005,19(3):6-13.<br /> [7]XIONG C Q,OUYANG Y,MEI Q.Argumentation Model Based on Certainty-Factor and Algorithms of Argument Evaluation[J].Journal of Software,2014,25(6):1225-1238.(in Chinese)<br /> 熊才权,欧阳勇,梅清.基于可信度的辩论模型及争议评价算法[J].软件学报,2014,25(6):1225-1238.<br /> [8]ZOU L,ZHANG Y X,LIU X.Linguistic-Valued approximate reasoning with lattice ordered linguistic-valued credibility[J].International Journal of Computational Intelligence Systems,2015,8(1):53-61.<br /> [9]ZADEH L A.The concept of a linguistic variable and its applications to approximate reasoning-Part I[J].Information Science,1975,8(3):199-249.<br /> FAN J P,XUE K,WU M Q.Cross evaluation method based on intuitionistic fuzzy entropy.Computer Science,2018,45(2):280-286.(in Chinese)<br /> 范建平,薛坤,吴美琴.基于直觉模糊熵的交叉评价方法.计算机科学,2018,45(2):280-286.<br /> [11]YAGER R R,ABBASOV A M.Pythagorean membership grades in multicriteria decision making.IEEE Transaction on Fuzzy Systems,2014,22(4):958-965.<br /> [12]TORRA V,NARUKAWA Y.On hesitant fuzzy sets and decision[C]//IEEE International Conference on Fuzzy Systems.IEEE,2009:1378-1382.<br /> [13]TORRA V.Hesitant fuzzy sets[J].International Journal of Intelligent Systems,2010,25(6):529-539.<br /> [14]ZHANG Z.Deriving the priority weights from incomplete hesitant fuzzy preference relations based on multiplicative consistency[J].Applied Soft Computing,2016,46:37-59.<br /> [15]PUSHPINDER S.Distance and similarity measures for multiple-attribute decision making with dual hesitant fuzzy sets [J].Computational & Applied Mathematics,2015,36(1):1-6.<br /> [16]RODR′IGUEZ R M,MART′INEZ L,HERRERA F.Hesitant Fuzzy Linguistic Term Sets for Decision Making[J].IEEE Transactions on Fuzzy Systems,2012,20(1):109-119.<br /> [17]GUO S,JIN F F,CHEN H Y.Hesitant fuzzy Einstein geometric aggregation operators and their application[J].Computer Engineering and Applications,2015,51(17):53-58.(in Chinese)<br /> 郭甦,金飞飞,陈华友.犹豫模糊Einstein几何算子及应用[J].计算机工程与应用,2015,51(17):53-58.<br /> [18]LIU W F,HE X.Pythagorean Hesitant Fuzzy Set[J].Fuzzy Systems and Mathematics,2016,30(4):107-115.(in Chinese)<br /> 刘卫锋,何霞.毕达哥拉斯犹豫模糊集[J].模糊系统与数学,2016,30(4):107-115.<br /> [19]XU Z S,ZHANG X L.Hesitant fuzzy multi-attribute decision making based on TOPSIS with incomplete weight information[J].Knowledge-Based Systems,2013,52(6):53-64.<br /> [20]LIAO H C,XU Z S,ZENG X J.Distance and similarity measures for hesitant fuzzy linguistic term sets and their application in multi-criteria decision making[J].Information Sciences,2014,271(3):125-142.<br /> [21]BIAN S H.Research and application of uncertainty reasoning in expert system[D].Anhui:Anhui University,2010.(in Chinese)<br /> 卞世晖.专家系统中不确定性推理的研究与应用[D].安徽:安徽大学,2010.<br /> [22]XIA M M,XU Z S,CHEN N.Some hesitant fuzzy aggregation operators with their application in group decision making [J].Group Decis Negot,2013,234(10):259-279.<br /> [23]TORRA V.Hesitant fuzzy sets[J].International Journal of Intelligent Systems,2010,25(6):529-539. |
[1] | WANG Jie, LI Xiao-nan, LI Guan-yu. Adaptive Attention-based Knowledge Graph Completion [J]. Computer Science, 2022, 49(7): 204-211. |
[2] | WANG Yu-fei, CHEN Wen. Tri-training Algorithm Based on DECORATE Ensemble Learning and Credibility Assessment [J]. Computer Science, 2022, 49(6): 127-133. |
[3] | HANG Ting-ting, FENG Jun, LU Jia-min. Knowledge Graph Construction Techniques:Taxonomy,Survey and Future Directions [J]. Computer Science, 2021, 48(2): 175-189. |
[4] | XUE Zhan-ao, SUN Bing-xin, HOU Hao-dong, JING Meng-meng. Optimal Granulation Selection Method Based on Multi-granulation Rough Intuitionistic Hesitant Fuzzy Sets [J]. Computer Science, 2021, 48(10): 98-106. |
[5] | ZHANG Yu, LU Yi-hong, HUANG De-cai. Weighted Hesitant Fuzzy Clustering Based on Density Peaks [J]. Computer Science, 2021, 48(1): 145-151. |
[6] | CHEN Yu-jin, XU Ji-hui, SHI Jia-hui, LIU Yu. Three-way Decision Models Based on Intuitionistic Hesitant Fuzzy Sets and Its Applications [J]. Computer Science, 2020, 47(8): 144-150. |
[7] | GUO Cong-rui, WANG Jun and FENG Yi-ming. Research on Method of Credibility Evaluation of System Simulation [J]. Computer Science, 2020, 47(6A): 567-571. |
[8] | GAO Qing-Ji, WANG Wen-bo, HOU Shi-hao and XING Zhi-wei. Traffic Strategy in Dense Crowd Environments Based on Expandable Path [J]. Computer Science, 2020, 47(6A): 34-39. |
[9] | YANG Xiao-jun, XU Zhong-fu, ZHANG Xing, SUN Dan-hui. Overview and Difficulties Analysis on Credibility Assessment of Simulation Models [J]. Computer Science, 2019, 46(6A): 23-29. |
[10] | GAO Peng, LIU Yun-jiang, GAO Wei-ting, LI Man, CHEN Juan. Double Thresholds DMM Cooperative Spectrum Sensing Algorithm Based on Credibility [J]. Computer Science, 2018, 45(9): 166-170. |
[11] | FENG Lei, JI Jun-zhong, WU Chen-sheng. New Method for Ranking Scientific Publications with Creditworthiness Mechanism [J]. Computer Science, 2018, 45(11A): 132-137. |
[12] | LIU De-hao and WANG Qian. Uncertainty Reasoning Based on Related Planar Cloud and Application in Prediction [J]. Computer Science, 2016, 43(Z6): 99-102. |
[13] | CHEN Hui and MA Ya-ping. Uncertain Extension of Description Logic SROIQ(D) for Uncertain Knowledge Representation [J]. Computer Science, 2016, 43(Z11): 88-92. |
[14] | WU Wei-min, CHEN Dong-xin, LAI Wen-xin and SU Qing. Research and Implementation of EFI OS Loader Security Reinforcement Technology [J]. Computer Science, 2016, 43(9): 188-191. |
[15] | MENG Hua, YUAN Ya-yan, CHU Jie-lei and WANG Hong-jun. Topological Characterization of AGM Belief Contraction Operator [J]. Computer Science, 2016, 43(9): 87-90. |
|