Evaluating Topological Vulnerability Based on Fuzzy Fractal Dimension
暂无分享,去创建一个
Wen Jiang | Tao Wen | Moxian Song | Wen Jiang | Tao Wen | Moxian Song
[1] Da-Wen Huang,et al. Dynamic-Sensitive centrality of nodes in temporal networks , 2017, Scientific Reports.
[2] Réka Albert,et al. Structural vulnerability of the North American power grid. , 2004, Physical review. E, Statistical, nonlinear, and soft matter physics.
[3] O. Shanker,et al. DEFINING DIMENSION OF A COMPLEX NETWORK , 2007 .
[4] Tharam S. Dillon,et al. A Stepwise-Based Fuzzy Regression Procedure for Developing Customer Preference Models in New Product Development , 2015, IEEE Transactions on Fuzzy Systems.
[5] Oscar Castillo,et al. A new approach for dynamic fuzzy logic parameter tuning in Ant Colony Optimization and its application in fuzzy control of a mobile robot , 2015, Appl. Soft Comput..
[6] Lotfi A. Zadeh,et al. Fuzzy Sets , 1996, Inf. Control..
[7] Gong-Ru Lin,et al. Tricolor R/G/B Laser Diode Based Eye-Safe White Lighting Communication Beyond 8 Gbit/s , 2017, Scientific Reports.
[8] Jian-Wei Wang,et al. Cascade-based attack vulnerability on the US power grid. , 2009 .
[9] Dirk Helbing,et al. A network framework of cultural history , 2014, Science.
[10] Yong Deng,et al. Dependence assessment in human reliability analysis based on evidence credibility decay model and IOWA operator , 2018 .
[11] Hernán A. Makse,et al. Influence maximization in complex networks through optimal percolation , 2015, Nature.
[12] Mariano Sigman,et al. A small world of weak ties provides optimal global integration of self-similar modules in functional brain networks , 2011, Proceedings of the National Academy of Sciences.
[13] Tzung-Pei Hong,et al. Fuzzy utility mining with upper-bound measure , 2015, Appl. Soft Comput..
[14] Yong Deng,et al. A novel method for forecasting time series based on fuzzy logic and visibility graph , 2017, Advances in Data Analysis and Classification.
[15] H. Eugene Stanley,et al. Exacerbated vulnerability of coupled socio-economic risk in complex networks , 2016 .
[16] V. Latora,et al. Multiscale vulnerability of complex networks. , 2007, Chaos.
[17] Bingyi Kang,et al. Stable strategies analysis based on the utility of Z-number in the evolutionary games , 2018, Appl. Math. Comput..
[18] Tzung-Pei Hong,et al. An effective parallel approach for genetic-fuzzy data mining , 2014, Expert Syst. Appl..
[19] Jian-Wei Wang,et al. Robustness of complex networks with the local protection strategy against cascading failures , 2013 .
[20] Wenju Du,et al. Outer Synchronization between Two Coupled Complex Networks and Its Application in Public Traffic Supernetwork , 2016 .
[21] Wenju Du,et al. Synchronization between Different Networks with Time-Varying Delay and Its Application in Bilayer Coupled Public Traffic Network , 2016 .
[22] Igor Mishkovski,et al. Vulnerability of complex networks , 2011 .
[23] Albert-László Barabási,et al. Statistical mechanics of complex networks , 2001, ArXiv.
[24] Witold Pedrycz,et al. From fuzzy data analysis and fuzzy regression to granular fuzzy data analysis , 2015, Fuzzy Sets Syst..
[25] Yong Deng,et al. Dependent Evidence Combination Based on Shearman Coefficient and Pearson Coefficient , 2018, IEEE Access.
[26] Massimo Marchiori,et al. Model for cascading failures in complex networks. , 2004, Physical review. E, Statistical, nonlinear, and soft matter physics.
[27] Klaus Hahn,et al. A new method to measure complexity in binary or weighted networks and applications to functional connectivity in the human brain , 2016, BMC Bioinformatics.
[28] Yong Deng,et al. Evaluation method based on fuzzy relations between Dempster–Shafer belief structure , 2018, Int. J. Intell. Syst..
[29] Albert-László Barabási,et al. Universal resilience patterns in complex networks , 2016, Nature.
[30] Mehmet Emin Aydin,et al. A multi-agent based approach for change management in manufacturing enterprises , 2015, J. Intell. Manuf..
[31] Xinyang Deng,et al. D-AHP method with different credibility of information , 2017, Soft Computing.
[32] Mark E. J. Newman,et al. The Structure and Function of Complex Networks , 2003, SIAM Rev..
[33] Tzung-Pei Hong,et al. Mining fuzzy temporal association rules by item lifespans , 2016, Appl. Soft Comput..
[34] Camelia-Mihaela Pintea,et al. Emergency management using geographic information systems: application to the first Romanian traveling salesman problem instance , 2016, Knowledge and Information Systems.
[35] A. Shapiro,et al. Glutathione Ethyl Ester Supplementation during Pancreatic Islet Isolation Improves Viability and Transplant Outcomes in a Murine Marginal Islet Mass Model , 2013, PloS one.
[36] Witold Pedrycz,et al. Design of Fuzzy Cognitive Maps for Modeling Time Series , 2016, IEEE Transactions on Fuzzy Systems.
[37] María José del Jesús,et al. Fuzzy rules for describing subgroups from Influenza A virus using a multi-objective evolutionary algorithm , 2013, Appl. Soft Comput..
[38] Yong Deng,et al. Measuring transferring similarity via local information , 2018 .
[39] Nina H. Fefferman,et al. Simple and efficient self-healing strategy for damaged complex networks , 2015, Physical review. E, Statistical, nonlinear, and soft matter physics.
[40] S. Havlin,et al. How to calculate the fractal dimension of a complex network: the box covering algorithm , 2007, cond-mat/0701216.
[41] Xinyang Deng,et al. Evidence Combination From an Evolutionary Game Theory Perspective , 2015, IEEE Transactions on Cybernetics.
[42] Tim S. Evans,et al. What is the dimension of citation space? , 2014, ArXiv.
[43] Kit Yan Chan,et al. Varying Spread Fuzzy Regression for Affective Quality Estimation , 2017, IEEE Transactions on Fuzzy Systems.
[44] Huseyin Seker,et al. Quantitative prediction of peptide binding affinity by using hybrid fuzzy support vector regression , 2016, Appl. Soft Comput..
[45] José S. Andrade,et al. IMDB Network Revisited: Unveiling Fractal and Modular Properties from a Typical Small-World Network , 2013, PloS one.
[46] Oscar Castillo,et al. Automated mathematical modelling, simulation and behavior identification of robotic dynamic systems using a new fuzzy-fractal-genetic approach , 1999, Robotics Auton. Syst..
[47] Oscar Castillo,et al. An intelligent hybrid approach for industrial quality control combining neural networks, fuzzy logic and fractal theory , 2004, Inf. Sci..
[48] Zhen Wang,et al. Impact of Social Punishment on Cooperative Behavior in Complex Networks , 2013, Scientific Reports.
[49] Witold Pedrycz,et al. From Fuzzy Models to Granular Fuzzy Models , 2011, WILF.
[50] V. Anh,et al. Protein folding kinetic order prediction from amino acid sequence based on horizontal visibility network , 2016 .
[51] Shlomo Havlin,et al. Origins of fractality in the growth of complex networks , 2005, cond-mat/0507216.
[52] Oscar Castillo,et al. New approach using ant colony optimization with ant set partition for fuzzy control design applied to the ball and beam system , 2015, Inf. Sci..
[53] Yves Van de Peer,et al. Diffany: an ontology-driven framework to infer, visualise and analyse differential molecular networks , 2016, BMC Bioinformatics.
[54] Xinyang Deng,et al. An Evidential Axiomatic Design Approach for Decision Making Using the Evaluation of Belief Structure Satisfaction to Uncertain Target Values , 2018, Int. J. Intell. Syst..
[55] Yong Deng,et al. Evidential Supplier Selection Based on DEMATEL and Game Theory , 2018, Int. J. Fuzzy Syst..
[56] Oscar Castillo,et al. Hybrid intelligent systems for time series prediction using neural networks, fuzzy logic, and fractal theory , 2002, IEEE Trans. Neural Networks.
[57] Hak-Keung Lam,et al. Classification of epilepsy seizure phase using interval type-2 fuzzy support vector machines , 2016, Neurocomputing.
[58] Witold Pedrycz,et al. Design of interval type-2 fuzzy models through optimal granularity allocation , 2011, Appl. Soft Comput..
[59] Oscar Castillo,et al. Optimization of type-2 fuzzy systems based on bio-inspired methods: A concise review , 2012, Inf. Sci..
[60] Wen Jiang,et al. Intuitionistic Fuzzy Power Aggregation Operator Based on Entropy and Its Application in Decision Making , 2018, Int. J. Intell. Syst..
[61] Shuai Xu,et al. A modified Physarum-inspired model for the user equilibrium traffic assignment problem , 2016, ArXiv.
[62] Wen Jiang,et al. Intuitionistic fuzzy evidential power aggregation operator and its application in multiple criteria decision-making , 2018, Int. J. Syst. Sci..
[63] Wen Jiang,et al. An Uncertainty Measure for Interval-valued Evidences , 2017, Int. J. Comput. Commun. Control.
[64] Ake J Holmgren,et al. Using Graph Models to Analyze the Vulnerability of Electric Power Networks , 2006, Risk analysis : an official publication of the Society for Risk Analysis.
[65] Yong Deng,et al. Topological Vulnerability Evaluation Model Based on Fractal Dimension of Complex Networks , 2016, PloS one.
[66] Andrzej Bargiela,et al. Fuzzy fractal dimensions and fuzzy modeling , 2003, Inf. Sci..
[67] G. Garlet,et al. Analysis of Immune Response Markers in Jorge Lobo's Disease Lesions Suggests the Occurrence of Mixed T Helper Responses with the Dominance of Regulatory T Cell Activity , 2015, PloS one.
[68] Chien-Chang Chou,et al. A generalized similarity measure for fuzzy numbers , 2016, J. Intell. Fuzzy Syst..
[69] Beom Jun Kim,et al. Attack vulnerability of complex networks. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.
[70] F. Hausdorff. Dimension und äußeres Maß , 1918 .
[71] Petter Holme,et al. The Effect of Disease-Induced Mortality on Structural Network Properties , 2013, PloS one.
[72] Yong Deng,et al. Failure mode and effects analysis based on D numbers and TOPSIS , 2016, Qual. Reliab. Eng. Int..