1 Decision Analysis and Cluster Analysis |
|
1 | (8) |
|
|
1 | (3) |
|
|
4 | (4) |
|
|
8 | (1) |
2 Association Rules Mining in Inventory Database |
|
9 | (16) |
|
|
9 | (2) |
|
2.2 Basic Concepts of Association Rule |
|
|
11 | (3) |
|
2.3 Mining Association Rules |
|
|
14 | (3) |
|
2.3.1 The Apriori Algorithm: Searching Frequent Itemsets |
|
|
14 | (2) |
|
2.3.2 Generating Association Rules from Frequent Itemsets |
|
|
16 | (1) |
|
2.4 Related Studies on Mining Association Rules in Inventory Database |
|
|
17 | (5) |
|
2.4.1 Mining Multidimensional Association Rules from Relational Databases |
|
|
17 | (2) |
|
2.4.2 Mining Association Rules with Time-window |
|
|
19 | (3) |
|
|
22 | (1) |
|
|
23 | (2) |
3 Fuzzy Modeling and Optimization: Theory and Methods |
|
25 | (30) |
|
|
25 | (2) |
|
3.2 Basic Terminology and Definition |
|
|
27 | (2) |
|
3.2.1 Definition of Fuzzy Sets |
|
|
27 | (1) |
|
3.2.2 Support and Cut Set |
|
|
28 | (1) |
|
3.2.3 Convexity and Concavity |
|
|
28 | (1) |
|
3.3 Operations and Properties for Generally Used Fuzzy Numbers |
|
|
29 | (4) |
|
3.3.1 Fuzzy Inequality with Tolerance |
|
|
29 | (1) |
|
|
30 | (1) |
|
3.3.3 LR Type Fuzzy Number |
|
|
31 | (1) |
|
3.3.4 Triangular Type Fuzzy Number |
|
|
31 | (1) |
|
3.3.5 Trapezoidal Fuzzy Numbers |
|
|
32 | (1) |
|
3.4 Fuzzy Modeling and Fuzzy Optimization |
|
|
33 | (2) |
|
3.5 Classification of a Fuzzy Optimization Problem |
|
|
35 | (5) |
|
3.5.1 Classification of the Fuzzy Extreme Problems |
|
|
35 | (1) |
|
3.5.2 Classification of the Fuzzy Mathematical Programming Problems |
|
|
36 | (3) |
|
3.5.3 Classification of the Fuzzy Linear Programming Problems |
|
|
39 | (1) |
|
3.6 Brief Summary of Solution Methods for FOP |
|
|
40 | (11) |
|
3.6.1 Symmetric Approaches Based on Fuzzy Decision |
|
|
41 | (2) |
|
3.6.2 Symmetric Approach Based on Non-dominated Alternatives |
|
|
43 | (1) |
|
3.6.3 Asymmetric Approaches |
|
|
43 | (3) |
|
3.6.4 Possibility and Necessity Measure-based Approaches |
|
|
46 | (1) |
|
3.6.5 Asymmetric Approaches to PMP5 and PMP6 |
|
|
47 | (2) |
|
3.6.6 Symmetric Approaches to the PMP7 |
|
|
49 | (1) |
|
3.6.7 Interactive Satisfying Solution Approach |
|
|
49 | (1) |
|
3.6.8 Generalized Approach by Angelov |
|
|
50 | (1) |
|
3.6.9 Fuzzy Genetic Algorithm |
|
|
50 | (1) |
|
3.6.10 Genetic-based Fuzzy Optimal Solution Method |
|
|
51 | (1) |
|
3.6.11 Penalty Function-based Approach |
|
|
51 | (1) |
|
|
51 | (4) |
4 Genetic Algorithm-based Fuzzy Nonlinear Programming |
|
55 | (32) |
|
4.1 GA-based Interactive Approach for QP Problems with Fuzzy Objective and Resources |
|
|
55 | (11) |
|
|
55 | (1) |
|
4.1.2 Quadratic Programming Problems with Fuzzy Objective/Resource Constraints |
|
|
56 | (3) |
|
4.1.3 Fuzzy Optimal Solution and Best Balance Degree |
|
|
59 | (1) |
|
4.1.4 A Genetic Algorithm with Mutation Along the Weighted Gradient Direction |
|
|
60 | (2) |
|
4.1.5 HumanComputer Interactive Procedure |
|
|
62 | (2) |
|
4.1.6 A Numerical Illustration and Simulation Results |
|
|
64 | (2) |
|
4.2 Nonlinear Programming Problems with Fuzzy Objective and Resources |
|
|
66 | (10) |
|
|
66 | (1) |
|
4.2.2 Formulation of NLP Problems with Fuzzy Objective/Resource Constraints |
|
|
67 | (3) |
|
4.2.3 Inexact Approach Based on GA to Solve FO/RNP-1 |
|
|
70 | (2) |
|
4.2.4 Overall Procedure for FO/RNP by Means of HumanComputer Interaction |
|
|
72 | (2) |
|
4.2.5 Numerical Results and Analysis |
|
|
74 | (2) |
|
4.3 A Non-symmetric Model for Fuzzy NLP Problems with Penalty Coefficients |
|
|
76 | (9) |
|
|
76 | (1) |
|
4.3.2 Formulation of Fuzzy Nonlinear Programming Problems with Penalty Coefficients |
|
|
76 | (3) |
|
4.3.3 Fuzzy Feasible Domain and Fuzzy Optimal Solution Set |
|
|
79 | (1) |
|
4.3.4 Satisfying Solution and Crisp Optimal Solution |
|
|
80 | (3) |
|
4.3,5 General Scheme to Implement the FNLP-PC Model |
|
|
83 | (1) |
|
4.3.6 Numerical Illustration and Analysis |
|
|
84 | (1) |
|
|
85 | (1) |
|
|
86 | (1) |
5 Neural Network and Self-organizing Maps |
|
87 | (14) |
|
|
87 | (2) |
|
5.2 The Basic Concept of Self-organizing Map |
|
|
89 | (3) |
|
5.3 The Trial Discussion on Convergence of SOM |
|
|
92 | (4) |
|
|
96 | (4) |
|
|
100 | (1) |
|
|
100 | (1) |
6 Privacy-preserving Data Mining |
|
101 | (20) |
|
|
101 | (3) |
|
6.2 Security, Privacy and Data Mining |
|
|
104 | (5) |
|
|
104 | (1) |
|
|
105 | (2) |
|
|
107 | (2) |
|
|
109 | (5) |
|
6.3.1 The Characters of PPDM |
|
|
109 | (1) |
|
6.3.2 Classification of PPDM Techniques |
|
|
110 | (4) |
|
6.4 The Collusion Behaviors in PPDM |
|
|
114 | (4) |
|
|
118 | (1) |
|
|
118 | (3) |
7 Supply Chain Design Using Decision Analysis |
|
121 | (12) |
|
|
121 | (2) |
|
|
123 | (1) |
|
|
124 | (3) |
|
|
127 | (4) |
|
|
131 | (1) |
|
|
131 | (2) |
8 Product Architecture and Product Development Process for Global Performance |
|
133 | (24) |
|
8.1 Introduction and Literature Review |
|
|
133 | (3) |
|
|
136 | (4) |
|
|
140 | (6) |
|
8.3.1 Two-function Products |
|
|
140 | (2) |
|
8.3.2 Three-function Products |
|
|
142 | (4) |
|
8.4 Comparisons and Implications |
|
|
146 | (6) |
|
8.4.1 Three-function Products with Two Interfaces |
|
|
146 | (1) |
|
8.4.2 Three-function Products with Three Interfaces |
|
|
146 | (5) |
|
|
151 | (1) |
|
8.5 A Summary of the Model |
|
|
152 | (2) |
|
|
154 | (1) |
|
|
154 | (3) |
9 Application of Cluster Analysis to Cellular Manufacturing |
|
157 | (50) |
|
|
157 | (3) |
|
|
160 | (1) |
|
9.2.1 Machine-part Cell Formation |
|
|
160 | (1) |
|
9.2.2 Similarity Coefficient Methods (SCM) |
|
|
161 | (1) |
|
9.3 Why Present a Taxonomy on Similarity Coefficients? |
|
|
161 | (4) |
|
9.3.1 Past Review Studies on SCM |
|
|
162 | (1) |
|
9.3.2 Objective of this Study |
|
|
162 | (1) |
|
9.3.3 Why SCM Are More Flexible |
|
|
163 | (2) |
|
9.4 Taxonomy for Similarity Coefficients Employed in Cellular Manufacturing |
|
|
165 | (4) |
|
9.5 Mapping SCM Studies onto the Taxonomy |
|
|
169 | (7) |
|
|
176 | (4) |
|
9.6.1 Production Information-based Similarity Coefficients |
|
|
176 | (3) |
|
9.6.2 Historical Evolution of Similarity Coefficients |
|
|
179 | (1) |
|
9.7 Comparative Study of Similarity Coefficients |
|
|
180 | (2) |
|
|
180 | (1) |
|
9.7.2 Previous Comparative Studies |
|
|
181 | (1) |
|
|
182 | (9) |
|
9.8.1 Tested Similarity Coefficients |
|
|
182 | (1) |
|
|
183 | (4) |
|
9.8.3 Clustering Procedure |
|
|
187 | (1) |
|
9.8.4 Performance Measures |
|
|
188 | (3) |
|
9.9 Comparison and Results |
|
|
191 | (6) |
|
|
197 | (1) |
|
|
198 | (9) |
10 Manufacturing Cells Design by Cluster Analysis |
|
207 | (26) |
|
|
207 | (2) |
|
10.2 Background, Difficulty and Objective of this Study |
|
|
209 | (4) |
|
|
209 | (2) |
|
10.2.2 Objective of this Study and Drawbacks of Previous Research |
|
|
211 | (2) |
|
|
213 | (8) |
|
|
213 | (2) |
|
10.3.2 Generalized Similarity Coefficient |
|
|
215 | (1) |
|
10.3.3 Definition of the New Similarity Coefficient |
|
|
216 | (3) |
|
10.3.4 Illustrative Example |
|
|
219 | (2) |
|
|
221 | (4) |
|
|
221 | (1) |
|
|
222 | (3) |
|
10.5 Comparative Study and Computational Performance |
|
|
225 | (4) |
|
|
226 | (1) |
|
|
227 | (1) |
|
|
228 | (1) |
|
10.5.4 Computational Performance |
|
|
229 | (1) |
|
|
229 | (1) |
|
|
230 | (3) |
11 Fuzzy Approach to Quality Function Deployment-based Product Planning |
|
233 | (18) |
|
|
233 | (2) |
|
11.2 QFD-based Integration Model for New Product Development |
|
|
235 | (2) |
|
11.2.1 Relationship Between QFD Planning Process and Product Development Process |
|
|
235 | (1) |
|
11.2.2 QFD-based Integrated Product Development Process Model |
|
|
235 | (2) |
|
11.3 Problem Formulation of Product Planning |
|
|
237 | (2) |
|
11.4 Actual Achieved Degree and Planned Degree |
|
|
239 | (1) |
|
11.5 Formulation of Costs and Budget Constraint |
|
|
239 | (2) |
|
11.6 Maximizing Overall Customer Satisfaction Model |
|
|
241 | (2) |
|
11.7 Minimizing the Total Costs for Preferred Customer Satisfaction |
|
|
243 | (1) |
|
11.8 Genetic Algorithm-based Interactive Approach |
|
|
244 | (3) |
|
11.8.1 Formulation of Fuzzy Objective Function by Enterprise Satisfaction Level |
|
|
244 | (1) |
|
11.8.2 Transforming FP2 into a Crisp Model |
|
|
245 | (1) |
|
11.8.3 Genetic Algorithm-based Interactive Approach |
|
|
246 | (1) |
|
11.9 Illustrated Example and Simulation Results |
|
|
247 | (2) |
|
|
249 | (2) |
12 Decision Making with Consideration of Association in Supply Chains |
|
251 | (18) |
|
|
251 | (2) |
|
|
253 | (2) |
|
12.2.1 ABC Classification |
|
|
253 | (1) |
|
|
253 | (1) |
|
|
254 | (1) |
|
12.3 Consideration and the Algorithm |
|
|
255 | (6) |
|
12.3.1 Expected Dollar Usage of Item(s) |
|
|
255 | (1) |
|
12.3.2 Further Analysis on EDU |
|
|
256 | (2) |
|
12.3.3 New Algorithm of Inventory Classification |
|
|
258 | (1) |
|
12.3.4 Enhanced Apriori Algorithm for Association Rules |
|
|
258 | (2) |
|
12.3.5 Other Considerations of Correlation |
|
|
260 | (1) |
|
12.4 Numerical Example and Discussion |
|
|
261 | (2) |
|
|
263 | (4) |
|
|
263 | (1) |
|
12.5.2 Experimental Results |
|
|
263 | (4) |
|
|
267 | (1) |
|
|
267 | (2) |
13 Applying Self-organizing Maps to Master Data Making in Automatic Exterior Inspection |
|
269 | (16) |
|
|
269 | (2) |
|
13.2 Applying SOM to Make Master Data |
|
|
271 | (5) |
|
13.3 Experiments and Results |
|
|
276 | (1) |
|
13.4 The Evaluative Criteria of the Learning Effect |
|
|
277 | (4) |
|
|
279 | (1) |
|
13.4.2 Square Measure of Close Loops |
|
|
279 | (1) |
|
13.4.3 Distance Between Adjacent Neurons |
|
|
280 | (1) |
|
13.4.4 Monotony of Close Loops |
|
|
280 | (1) |
|
13.5 The Experimental Results of Comparing the Criteria |
|
|
281 | (2) |
|
|
283 | (1) |
|
|
284 | (1) |
14 Application for Privacy-preserving Data Mining |
|
285 | (26) |
|
14.1 Privacy-preserving Association Rule Mining |
|
|
285 | (8) |
|
14.1.1 Privacy-preserving Association Rule Mining in Centralized Data |
|
|
285 | (2) |
|
14.1.2 Privacy-preserving Association Rule Mining in Horizontal Partitioned Data |
|
|
287 | (1) |
|
14.1.3 Privacy-preserving Association Rule Mining in Vertically Partitioned Data |
|
|
288 | (5) |
|
14.2 Privacy-preserving Clustering |
|
|
293 | (5) |
|
14.2.1 Privacy-preserving Clustering in Centralized Data |
|
|
293 | (1) |
|
14.2.2 Privacy-preserving Clustering in Horizontal Partitioned Data |
|
|
293 | (2) |
|
14.2.3 Privacy-preserving Clustering in Vertically Partitioned Data |
|
|
295 | (3) |
|
14.3 A Scheme to Privacy-preserving Collaborative Data Mining |
|
|
298 | (8) |
|
|
298 | (2) |
|
14.3.2 The Analysis of the Previous Protocol |
|
|
300 | (2) |
|
14.3.3 A Scheme to Privacy-preserving Collaborative Data Mining |
|
|
302 | (1) |
|
|
303 | (3) |
|
14.4 Evaluation of Privacy Preservation |
|
|
306 | (2) |
|
|
308 | (1) |
|
|
308 | (3) |
Index |
|
311 | |