06351nam 22004453 450 991079924240332120240119080257.03-031-46979-8(CKB)29526983800041(MiAaPQ)EBC31071231(Au-PeEL)EBL31071231(EXLCZ)992952698380004120240119d2024 uy 0engur|||||||||||txtrdacontentcrdamediacrrdacarrierComputational Intelligence and Mathematics for Tackling Complex Problems 51st ed.Cham :Springer International Publishing AG,2024.©2024.1 online resource (151 pages)Studies in Computational Intelligence Series ;v.11279783031469787 Intro -- Preface -- Contents -- Additional Notes on Heterogeneous Concept-Forming Operators -- 1 Introduction -- 2 Heterogeneous Concept-Forming Operators -- 3 Extended Results -- 4 Conclusions and Future Work -- References -- On Measuring the Solvability of a Fuzzy Relation Equation -- 1 Introduction -- 2 Approximation of Unsolvable Multi-adjoint Relation Equations -- 3 Measuring the Solvability of a MARE -- 4 Different Types of Unsolvability -- 5 Conclusions and Future Work -- References -- Efficiency of Fuzzy Rough Set Decision Algorithms -- 1 Introduction -- 2 Fuzzy Rough Set Decision Algorithms -- 3 Efficiency of Decision Algorithms -- 4 Conclusions and Further Work -- References -- Use of Fuzzy Time Series to Generate Linguistic Descriptions of Noise Pollution -- 1 Introduction -- 2 Description of the Proposal -- 2.1 Generation of the Original FTS -- 2.2 Matching Linguistic Labels and Fuzzy Sets -- 3 Conclusions and Future Works -- References -- A Novel Fingerprint Identification Fuzzy System Using a Center-Distance Weighted Local Binary Pattern -- 1 Introduction -- 2 Related Works -- 3 Fuzzy Fingerprint Identification System (FFIS) Overview -- 3.1 Fingerprint Enhancement and Binarization -- 3.2 Rotation Solver of the Enhanced Images -- 3.3 Decreasing the Image Size -- 3.4 Local Binary Pattern Weighted Vector Extraction -- 3.5 Matching -- 4 Results and Discussion -- 5 Conclusion and Future Work -- References -- Global Sensitivity Analysis and Low Magnitude Pruning for Convolutional Neural Networks Reduction in Image Net Based on Transfer Learning State of the Art Models -- 1 Introduction -- 2 Experiment -- 3 Results -- 4 Conclusion -- References -- Generalized Linearity of Aggregation and Related Functions -- 1 Introduction -- 2 Continuous Piecewise Linear Fusion and Aggregation Functions -- 3 2-Simplices Based Case.4 4-Simplices Based Example -- 5 Concluding Remarks -- References -- Closure Operators on AMV-Valued Fuzzy Sets -- 1 Introduction -- 2 upper A upper M upper VAMV-Valued Fuzzy Sets -- 3 Closure Operators on Powerset Objects of left parenthesis script upper R comma script upper R Superscript asterisk Baseline right parenthesis(calR,calR*)-Fuzzy Sets -- 4 Conclusions and Future Development -- References -- An Application of a Fuzzy Multi-criteria Decision Making Process for Explainable Machine Learning in the Actuarial Context -- 1 Introduction -- 2 Approach -- 3 Study Case -- 3.1 Models -- 3.2 XAI -- 3.3 Decision Making Process -- 4 Conclusions -- References -- A Software Tool for Solving the Traveling Salesman Problem and Related Non-fuzzy and Fuzzy Optimization Problems -- 1 Introduction -- 2 The Discrete Bacterial Memetic Evolutionary Algorithm -- 3 The Software -- 4 Conclusions -- References -- Characterizing Clarify and Reduce Method by Means of Left-Sided Formal Concept Analysis -- 1 Introduction -- 2 Preliminaries -- 2.1 Left-Sided Formal Concept Analysis -- 2.2 The Clarify-and-Reduce Method -- 3 Generalizing CR-Method -- 4 Conclusion and Future Work -- References -- ITAMACDSS: A Fuzzy Clinical Diagnostic Support System for Coeliac Disease -- 1 Introduction -- 2 Description and Method -- 2.1 Implementation -- 2.2 Data Cleaning and Feature Extraction -- 2.3 Risk and Confidence Factor -- 3 Results and Discussion -- 3.1 Results -- 3.2 Discussion -- References -- Preference in Multi-adjoint Logic Programming Based on Ordered Adjoint Pairs -- 1 Introduction -- 2 Preliminaries -- 3 Studying the Impact of Different Implications in Multi-adjoint Logic Programming -- 4 Conclusions and Future Work -- References -- Lattice Valued Aggregation Operators Applicable in Digital Forensics -- 1 Introduction -- 2 Preliminary Notions.3 Lattice Valued nn-ary Aggregation Operator Associated with Binary Aggregation Operators -- 4 Conclusions and Future Work -- References -- Power Consumption-Based Identification of Used Encryption Solution in IoT Environments -- 1 Introduction -- 2 Methodology -- 3 Results -- 4 Conclusion -- References -- Maritime Cyber-Attacks Detection Based on a Convolutional Neural Network -- 1 Introduction -- 2 Cybersecurity in Maritime Transportation Systems -- 3 System Model -- 3.1 Convolutional Neural Network 2D -- 3.2 Oil Tanker Recognition -- 3.3 Anomalous Data Detection -- 4 Conclusion -- References -- Epistemic Logic and Theory of Mind for Modelling Group Dynamics of Criminal Organizations -- 1 Introduction -- 2 Logical Framework -- 3 Example: Group Dynamics of Criminal Organizations -- 4 Conclusions -- References -- Effective Contract-Net-Based Intrusion Detection Using Intelligent Agent-Based Systems -- 1 Introduction -- 2 The Proposed IDS System -- 3 Discussions -- 4 Conclusions -- References -- Analysing the Influence of the Pandemic on Crime Patterns in North Macedonia -- 1 Introduction -- 2 North Macedonia Crime Events Data Set -- 3 Crime Data Analysis -- 4 Forecasting Methodology -- 5 Crime Forecasting Results -- 6 Conclusion -- References.Studies in Computational Intelligence SeriesCornejo M. Eugenia1585774Kóczy László T1080663Medina Jesús1585775Ramírez-Poussa Eloísa1585776MiAaPQMiAaPQMiAaPQBOOK9910799242403321Computational Intelligence and Mathematics for Tackling Complex Problems 53871402UNINA