Fuzzy Models and Methods of Rational Resource Allocation

We consider the application of fuzzy sets theory to classical rationing problem. Fuzzy generalizations of classical methods are proposed, the theory is illustrated by a numeric example. The fuzzy methods are compared with their crisp analogs using the inequality measures.

[1]  Jessica J. Fridrich,et al.  Random Projections of Residuals for Digital Image Steganalysis , 2013, IEEE Transactions on Information Forensics and Security.

[2]  Horngren Datar Rajan,et al.  3RD EDITION , 2008 .

[3]  Ian T. Foster,et al.  Virtual Workspaces in the Grid , 2005, Euro-Par.

[4]  H. Simon,et al.  Administrative Behavior: A Study of Decision-Making Processes in Administrative Organization. , 1959 .

[5]  Rajkumar Buyya,et al.  GridSim: a toolkit for the modeling and simulation of distributed resource management and scheduling for Grid computing , 2002, Concurr. Comput. Pract. Exp..

[6]  Jessica J. Fridrich,et al.  Ensemble Classifiers for Steganalysis of Digital Media , 2012, IEEE Transactions on Information Forensics and Security.

[7]  Mark J. Huiskes,et al.  The MIR flickr retrieval evaluation , 2008, MIR '08.

[8]  M. S. Santhanam,et al.  Digital Watermarking in the Singular Vector Domain , 2008, Int. J. Image Graph..

[9]  Еліяшів Олег Миронович,et al.  Дослідження властивостей нелінійного елемента передавача хаотичної системи зв’язку , 2011 .

[10]  Kevin P. Murphy,et al.  Machine learning - a probabilistic perspective , 2012, Adaptive computation and machine learning series.

[11]  Charles L. A. Clarke,et al.  Efficient construction of large test collections , 1998, SIGIR '98.

[12]  Fernando De Maio,et al.  Income inequality measures , 2007 .

[13]  O Voloshyn,et al.  GENERALIZATION OF DISTRIBUTING METHODS FOR FUZZY PROBLEMS , 2013 .

[14]  В. И. Егоров,et al.  Волоконно-оптические сети на основе метода квантовой коммуникации на боковых частотах , 2018 .

[15]  Tomás Pevný,et al.  Steganalysis by Subtractive Pixel Adjacency Matrix , 2009, IEEE Transactions on Information Forensics and Security.

[16]  Barry O'Neill,et al.  A problem of rights arbitration from the Talmud , 1982, Math. Soc. Sci..

[17]  Alfredo Milani,et al.  International Journal INFORMATION TECHNOLOGIES & KNOWLEDGE , 2009 .

[18]  Hervé Moulin,et al.  Axiomatic cost and surplus sharing , 2002 .

[19]  E. M. Hartwell Boston , 1906 .

[20]  Matthew C. Stamm,et al.  Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security , 2017, IH&MMSec.

[21]  Сергей Витальевич Новиков,et al.  Подход к построению защищенных распределенных сетей обработки данных на основе доверенной инфраструктуры , 2015 .

[22]  Shahriar B. Shokouhi,et al.  Improved Robust DWT-Watermarking in YCbCr Color Space , 2012, ArXiv.

[23]  H. Young,et al.  Distributive justice in taxation , 1988 .

[24]  Tomás Pevný,et al.  Merging Markov and DCT features for multi-class JPEG steganalysis , 2007, Electronic Imaging.

[25]  Suresh N. Mali,et al.  Secured color image watermarking technique in DWT-DCT domain , 2011, ArXiv.

[26]  Andrew Moore,et al.  The long sentence: A disservice to science in the Internet age , 2011 .

[27]  Anumol Joseph,et al.  Robust watermarking based on DWT SVD , 2013, ArXiv.

[28]  Dmytro Progonov,et al.  PASSIVE STEGANALYSIS OF MULTIDOMAIN EMBEDDING METHODS , 2015 .

[29]  R. Aumann,et al.  Game theoretic analysis of a bankruptcy problem from the Talmud , 1985 .

[30]  L. Savyuk,et al.  PODCASTS: A BRIDGE FROM E-LEARNING TO M-LEARNING , 2015 .

[31]  B. Matthews Comparison of the predicted and observed secondary structure of T4 phage lysozyme. , 1975, Biochimica et biophysica acta.

[32]  William Thomson,et al.  Axiomatic and game-theoretic analysis of bankruptcy and taxation problems: An update , 2015, Math. Soc. Sci..

[33]  Агафонов Евгений Дмитриевич,et al.  О проблеме выделения информативных признаков в задаче классификации текстовых документов , 2013 .

[34]  Jessica J. Fridrich,et al.  Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.

[35]  J. K. Ward Integrated computer-aided engineering , 1987 .

[36]  A. Nagoor Gani,et al.  A New Operation on Triangular Fuzzy Number for Solving Fuzzy Linear Programming Problem , 2012 .

[37]  Nilanjan Dey,et al.  A Novel Approach of Color Image Hiding using RGB Color planes and DWT , 2012, ArXiv.

[38]  S. D. Kat︠s︡nelʹson Типология языка и речевое мышление , 2004 .