08204nam 22004453 450 991049710130332120210901203647.03-030-74970-3(CKB)4100000012009045(MiAaPQ)EBC6712960(Au-PeEL)EBL6712960(OCoLC)1265460583(EXLCZ)99410000001200904520210901d2021 uy 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierComputational Intelligence and Mathematics for Tackling Complex Problems 3Cham :Springer International Publishing AG,2021.©2022.1 online resource (223 pages)Studies in Computational Intelligence Ser. ;v.9593-030-74969-X Intro -- Preface -- Contents -- Q-Fuzzy Subtopology -- 1 Preliminaries -- 1.1 Commutative Quantales -- 1.2 Q-Valued Sets -- 1.3 Q-Fuzzy Topologies -- 1.4 Q-Preorders and Alexandroff Q-Topologies -- 2 How to Generate an Alexandroff Strong Q-Topology Constructively -- 3 Q-Fuzzy Subtopology -- 4 Conclusion -- References -- Lattice-Valued Algebraic Structures Via Residuated Maps -- 1 Introduction -- 2 Preliminaries -- 3 Compatible Lattice-Valued Functions and -Algebras -- 4 Conclusion -- References -- Invariant Aggregation and Pre-aggregation Functions -- 1 Introduction -- 2 Transformations of Fusion Functions -- 3 Transformations of Fuzzy Integrals -- References -- Finite Model Property and Varieties of BL-Algebras -- 1 Introduction -- 2 BL-Algebras and Ordinal Sums -- 3 FMP for Varieties of BL-Algebras -- 4 Conclusions -- References -- Collection Integral on Infinite Spaces -- 1 Introduction -- 2 Preliminaries -- 3 Main Theorem and Examples -- 4 Countable Collections -- 5 Concluding Remarks -- References -- Duhamel Hereditary Integrals in Viscoelasticity -- 1 Introduction -- 2 Action Versus Reaction in Linear Viscoelastic Model -- 3 Constitutive Equations. Stress on Strain and Strain on Stress Dependence -- 4 Duhamel Hereditary Integral in Uniaxial Viscoelasticity. Maxwell Model -- 5 Conclusion -- References -- Weighted Penalty-Based Aggregation -- 1 Introduction -- 2 Penalty-Based Aggregation Functions -- 3 Weighted Penalty Functions -- 4 Concluding Remarks -- References -- Aggregation Operators in Fuzzy Relational Mathematical Morphology: Erosion and Dilation -- 1 Introduction -- 2 Preliminaries -- 2.1 Lattices, Quantales, Girard Quantales -- 2.2 L-Fuzzy Relations -- 3 Operators of Structured L-Fuzzy Relational Erosion and Dilation -- 4 Interrelations Between Fuzzy Relational Erosion and Dilation.5 Aggregation of Fuzzy Relational Erosion and Fuzzy Relational Dilation Operators -- 5.1 (wedge,vee)-Aggregation -- 5.2 (vee,wedge)-Aggregation -- 5.3 Aggregation on the Base of a Product-Coproduct (,) Pair -- 6 Conclusion -- References -- Characterization of the Infimum of Classes Induced by an Attribute Reduction in FCA -- 1 Introduction -- 2 Preliminaries -- 3 Characterizing the Infimum of Classes -- 4 Conclusions and Future Work -- References -- Extensions of Fuzzy Measures Based on Double Generalization of the Lovász Extension Formula -- 1 Introduction -- 2 Preliminaries -- 3 Generalizations of the Lovász Extension Formula -- 4 Conclusion -- References -- On the Intuitionistic Fuzzy Representations of Rough Real Functions -- 1 Introduction -- 2 Pawlak Approximation Spaces on Intervals -- 3 Rough Real Functions and Their Representations -- 4 Intuitionistic Fuzzy Set Representations of Rough Real Functions -- 4.1 Basic Notions and Notations -- 4.2 Intuitionistic Fuzzy Sets Derived from Rough Real Functions -- 4.3 Basic Relations and Operations with Derived Intuitionistic Fuzzy Sets -- 5 Conclusion -- References -- Automatic Generation of Linguistic Descriptions of Electricity Consumption in the Buildings of a Large Institution -- 1 Introduction -- 2 Related Work -- 3 LPN Design to Describe Building Electrical Consumption -- 4 Conclusions and Future Work -- References -- On the Selection the Rule Membership Functions and Fuzzy Rule Interpolation -- 1 Introduction -- 2 Image Filtering Methods and Antecedent Generation -- 3 Rule Base Selection -- 4 Conclusion and Further Outlook -- References -- Linguistic Descriptions of Data Via Fuzzy Formal Concept Analysis -- 1 Introduction -- 2 Fuzzy Concept Lattices -- 3 Transforming Datasets Into Residuated Contexts -- 4 Linguistic Descriptions By Using Irreducibles Concepts -- 5 Conclusions and Future Work.References -- Rough Sets and Topology in AST: A Study Via Higher-Order Fuzzy Logic -- 1 Introduction -- 2 Preliminaries -- 2.1 Alternative Set Theory -- 2.2 Rough Set Theory -- 2.3 Fuzzy Sets in Fuzzy Type Theory -- 3 Rough Sets and Topology in AST Via Fuzzy Type Theory -- 3.1 Figures -- 3.2 Rough Fuzzy Sets -- 3.3 Fuzzy Topology Based on the Fuzzy Equality -- 4 Conclusion -- References -- olgga: An On-Line Generation-Less Genetic Algorithm -- 1 Introduction -- 2 On-Line Generation-Less Genetic Algorithm -- 2.1 Algorithm Overview -- 2.2 Selection Process -- 3 Dynamic Optimization with olgga -- 4 Performance Measurement -- 5 Conclusion -- References -- Some Dynamical Properties of Higher-Order Fuzzy Cognitive Maps -- 1 Introduction -- 2 Higher-Order Fuzzy Cognitive Maps -- 3 Some Dynamical Properties of Higher-Order Fuzzy Cognitive Maps -- 4 Conclusions and Future Work -- References -- A Fuzzy Declarative Approach to Classify Unlabeled Short Texts Based on Automatically Constructed WordNet Ontologies -- 1 Introduction -- 2 Related Work -- 3 A Declarative Approach to Text Classification -- 3.1 Pre-Processing Stage -- 3.2 Automatic Construction of WordNet-Based Ontologies -- 3.3 Classification Method -- 4 Experiments -- 5 Conclusions and Future Work -- References -- Automatic Recognition of Handwritten Urdu Characters -- 1 Introduction -- 1.1 The Problem Statement -- 2 Overview of the Literature -- 2.1 The Urdu Language -- 2.2 Modeling the Problem by Support Vector Machine -- 3 The Proposed Approach in Case of the Urdu Script -- 3.1 Data Preprocessing -- 3.2 Classification -- 4 Testing and Analysis -- 5 Conclusion and Future Work -- References -- Algorithms for Triggering General Regression Neural Network -- 1 Introduction -- 2 General Regression Neural Network -- 3 Learning Methods -- 4 Results and Discussion -- 5 Conclusions -- References.Local Binary Pattern-Based Fingerprint Matching -- 1 Introduction -- 2 System Overview -- 3 Results -- 4 Conclusions -- References -- Database Incident Response and Forensic Preparation Through the Performance Features -- 1 Introduction -- 2 Methodology -- 2.1 Database Performance Feature Selection -- 2.2 Correlation Analysis -- 2.3 Prediction Future Behaviour -- 2.4 Stability Analysis and Change Point Detection -- 3 Case-Study -- 4 Conclusion -- References -- Formal Concept Analysis for Detecting Criminal Patterns -- 1 Introduction -- 2 Preliminaries -- 3 Analysis of Bilbao Crime Dataset -- 4 Conclusions and Future Work -- References -- Detection of Fraudulent Credit Card Transactions by Computational Intelligence Models as a Tool in Digital Forensics -- 1 Introduction -- 2 Data Set -- 3 Computational Intelligence Models -- 4 Comparative Analysis -- 4.1 Verification Method -- 4.2 Parameter Settings for CI Models -- 4.3 Results and Discussion -- 5 Conclusions -- References -- Data Mining Techniques for the Analysis of Student's Admission Data -- 1 Introduction -- 2 Data Mining Process and Data Mining Techniques -- 3 Research Methodology -- 4 Data Analysis and Results -- 5 Conclusions and Future Work -- References.Studies in Computational Intelligence Ser.Electronic books.Harmati István Á938243Kóczy László T938244Medina Jesús938245Ramírez-Poussa Eloísa938246MiAaPQBOOK9910497101303321Computational Intelligence and Mathematics for Tackling Complex Problems 32113537UNINA05416nam 2200697Ia 450 991101940190332120200520144314.09786611319984978128131998212813199889780470987193047098719797804709871860470987189(CKB)1000000000403398(EBL)351040(SSID)ssj0000132325(PQKBManifestationID)11937088(PQKBTitleCode)TC0000132325(PQKBWorkID)10040243(PQKB)10563034(MiAaPQ)EBC351040(OCoLC)214281488(Perlego)2756320(EXLCZ)99100000000040339820071002d2008 uy 0engur|n|---|||||txtccrCrime mapping case studies practice and research /editors, Spencer Chainey and Lisa TompsonChichester, England ;Hoboken, NJ John Wiley & Sonsc20081 online resource (190 p.)Description based upon print version of record.9780470516089 0470516089 Includes bibliographical references and index.Crime Mapping Case Studies; Contents; List of contributors; Preface; Part I Developing crime mapping; 1 Developing geographical information systems and crime mapping tools in New Zealand; 1.1 The starting point; 1.2 Developing a web-based GIS solution for New Zealand Police; 1.3 Building on the map-based analytical policing system (MAPS); 2 An analytical technique for addressing geographical referencing difficulties and monitoring crimes in Rio de Janeiro, Brazil; 2.1 Introduction - developments in crime analysis in Rio de Janeiro; 2.2 Analysis by space-time monitoring cells2.3 Identifying crime patterns using paper maps2.4 Identifying crime patterns in Rio de Janeiro using GIS and digital cartographic base maps; 2.5 Crime analyses on bus routes in Rio de Janeiro; 2.6 Conclusions; 2.7 References; 3 Methods for implementing crime mapping within a large law enforcement agency: experiences from Victoria, Australia; 3.1 Introduction; 3.2 A phased plan for development and delivery; 3.3 Progress to date; 3.4 Crime mapping projects - some examples; 3.5 Conclusions; 3.6 Reference; 4 Automating briefings for police officers; 4.1 Introduction4.2 Automating crime mapping outputs in Lincoln Police Department4.3 Developing the automation of tasks in Lincoln; 4.4 Automating crime mapping in your agency; Part II Geographical investigative analysis; 5 Geographic profiling analysis: principles, methods and applications; 5.1 Introduction; 5.2 The theoretical principles behind geographic profiling; 5.3 Geographic profiling methodology; 5.4 Applying geographic profiling to 'volume' crime: the Irvine Chair burglaries; 5.5 Measuring the effects of geographic profiling in Irvine; 5.6 References6 Geographic profiling in an operational setting: the challenges and practical considerations, with reference to a series of sexual assaults in Bath, England6.1 Introduction; 6.2 Applying geographic profiling to a series of indecent assaults in Bath, England; 6.3 Offender geography; 6.4 Operational versus academic geographic profiling; 6.5 Conclusions; 6.6 References; 7 The Hammer Gang: an exercise in the spatial analysis of an armed robbery series using the probability grid method; 7.1 Introduction; 7.2 Background; 7.3 Mapping the data and getting the picture7.4 Predicting the next offence location7.5 Results; 7.6 Issues in application of the probability grid method; 7.7 Conclusions; 7.8 Acknowledgements; 7.9 References; 8 'Rolling the Dice': the arrest of Roosevelt Erving in Lincoln, Nebraska; 8.1 Introduction; 8.2 Erving's series of bank robberies; 8.3 Analysing Erving's series; 8.4 Project 'Rolling the Dice'; 8.5 The crucial role of geographical analysis; Part III Neighbourhood analysis; 9 The strategic allocation of resources to effectively implement Neighbourhood Policing and the Community Safety Plan; 9.1 Introduction9.2 Alternative resource allocation modelCrime Mapping Case Studies: From Research to Practice provides a series of key examples from practice and research that demonstrate applications of crime mapping and its effect in many areas of policing and crime reduction. This book brings together case studies that show how crime mapping can be used for analysis, intelligence development, monitoring performance, and crime detection and is written by practitioners for practitioners. Leading researchers in the field describe how crime mapping is developing and exposing analytical methodologies and critiquing current practices. InclCrime analysisData processingGeographic information systemsDigital mappingCrime analysisData processing.Geographic information systems.Digital mapping.363.250285Chainey Spencer1839203Tompson Lisa1841085MiAaPQMiAaPQMiAaPQBOOK9911019401903321Crime mapping case studies4420701UNINA