Cutting-Edge Research Topics on Multiple Criteria Decision Making (eBook)
XXI, 873 Seiten
Springer-Verlag
978-3-642-02298-2 (ISBN)
This book constitutes the refereed proceedings of the 20th International Conference on Cutting-Edge Research Topics on Multiple Criteria Decision Making, MCDM 2009, held in Chengdu/Jiuzhaigou, China, in June 2009. The 72 revised full papers presented together with 49 short papers were carefully reviewed and selected from 350 submissions. The papers are organized in workshops on evolutionary methods for multi-objective optimization and decision making, text mining, semi-structured, web, or multimedia data, knowledge management and business intelligence, data mining based extension theory, intelligent knowledge management, meta-synthesis and complex systems, risk correlation analysis and risk measurement, optimization-based data mining method and applications, risk analysis with multiple criteria decision making, applications of decision theory and method to financial decision making, hybrid MCDM techniques for problems-solving.
Preface 5
Organization 6
Table of Contents 10
Workshop on Evolutionary Methods for Multi-Objective Optimization and Decision Making 21
An Evolutionary Algorithm for the Multi-objective Multiple Knapsack Problem 21
Introduction 21
The FWEA_KP Algorithm 22
Development of FWEA_KP 22
Computational Results 25
Conclusions 27
References 27
Adaptive Differential Evolution for Multi-objective Optimization 29
Introduction 29
Preliminaries 30
Multi-objective Optimization Problem 30
Self-adaptive Neighborhood Differential Evolution (SaNSDE) 31
New Algorithm: MOSaNSDE 32
Simulation Results 33
Experimental Settings 33
Results 34
Conclusions 35
References 36
An Evolutionary Approach for Bilevel Multi-objective Problems 37
Introduction 37
Description of Bilevel Multi-objective Optimization Problem 38
Proposed Procedure (BLEMO) 38
Results 40
Problem 1 40
Problem 2 41
Problem 3 42
Conclusions 43
References 43
Multiple Criteria Decision Making: Efficient Outcome Assessments with Evolutionary Optimization 45
Introduction 45
Definitions and Notation 46
Parametric Bounds on Outcomes 47
Concluding Remarks and Directions for Further Research 47
References 48
Workshop on Mining Text, Semi-structured, Web, or Multimedia Data 49
Automatic Detection of Subjective Sentences Based on Chinese Subjective Patterns 49
Introduction 49
Literature Review 50
Subjectivity Detection with Chinese Subjective Patterns 50
Chinese Subjective Patterns 51
Acquisition of Subjective Phrases 51
Detection of Objective and Subjective Sentences 52
Experimental Results 52
Data Collection 52
Evaluation of the Subjectivity Phrases 52
Evaluation of the Bootstrapping Process 53
Conclusion 55
References 55
Case Study on Project Risk Management Planning Based on Soft System Methodology 57
Introduction 57
Soft System Methodology 57
The Soft System Characteristics of PRMP 58
The Analyses Process Based on SSM 59
Case Analysis 60
Conclusion 64
References 64
Experiments with Bicriteria Sequence Alignment 65
Introduction 65
A Multicriteria Dynamic Programming Algorithm 66
Experiments with Random Sequences 68
Size of the Efficient Set 69
Computation Time 69
Experiments with PREFAB Dataset 69
Conclusions 70
References 71
Integrating Decision Tree and Hidden Markov Model (HMM) for Subtype Prediction of Human Influenza A Virus 72
Introduction 72
An Integrated Approach with Decision Tree and Hidden Markov Model Algorithms 73
Decision Tree 73
Hidden Markov Model (HMM) 74
The Integrated Approach 75
Data and Methods 75
Training and Testing Datasets 75
Sequence Alignment 75
Implementation of Web System 76
Future Work 77
References 78
Fuzzy Double Linear Regression of the Financial Assets Yield 79
Introduction 79
Fuzzy Bilinear Regression Model FDLR $(p, q)$ 79
Empirical Analysis 81
Summary 82
References 82
Detection of Outliers from the Lognormal Distribution in Financial Economics 83
The Construction of the Test Statistic 84
The Approximate Distribution of the Test Statistic 85
Result and Discussion 86
References 86
A Bibliography Analysis of Multi-Criteria Decision Making in Computer Science (1989-2009) 88
Introduction 88
Publication Trends of MCDM vs. MCDM in CS 89
Bibliographic Analysis of MCDM in CS 90
References 91
Workshop on Knowledge Management and Business Intelligence 92
A Six Sigma Methodology Using Data Mining: A Case Study on Six Sigma Project for Heat Efficiency Improvement of a Hot Stove System in a Korean Steel Manufacturing Company 92
Introduction 92
A Six Sigma Methodology Using Data Mining 93
A Case Study on a Six Sigma Project Using Data Mining 94
Background of Company and Steel Manufacturing Process 94
Five Phases of Six Sigma Project Using Data Mining 96
Concluding Remarks 99
References 100
Internal and External Beliefs as the Determinants of Use Continuance for an Internet Search Engine 101
Introduction 101
Literature Review 102
Conceptual Development and Research Model 103
Research Framework 103
Research Model 104
Hypotheses 104
Empirical Methodology 107
Discussions 107
Conclusion 108
References 108
Development of Knowledge Intensive Applications for Hospital 110
Introduction 110
OLAP Tool and Medical Knowledge Type 111
OLAP Tool 111
Medical Knowledge Type 111
Implementation 113
Development Environment and Case Description 113
System Structure 113
Functionalities of Desktop Packages 114
System Evaluation and Conclusion 116
System Evaluation 116
Conclusion 116
References 117
Organizational Politics, Social Network, and Knowledge Management 118
Introduction 118
Literature Review and Research Design 119
Research Model and Proposition 119
Conclusion and Significance 123
References 124
Implementation of Case-Based Reasoning System for Knowledge Management of Power Plant Construction Projects in a Korean Company 127
Introduction 127
Problem Domain 128
A Methodology of Implementing CBR System 129
Overview of the Methodology 129
Essential Outputs 130
The Case of Implementing CBR System 133
Implementation Environment 133
System Function and User Interface 133
Expected Effects 134
Concluding Remarks and Future Study Directions 135
References 135
Workshop on Data Mining Based Extension Theory 137
Mining Conductive Knowledge Based on Transformation of Same Characteristic Information Element in Practical Applications 137
Introduction 137
The Basic Concept Based on Transformation of Same Characteristics Information Element 138
Conductive Objects and Conductive Class Objects 138
Conductive Degree and Conductive Degree Interval 139
The Scope of the Characteristic Value of the Conductive Objects and Conductive Class Objects 140
Mining Conductive Knowledge of Same Characteristics Information Element 141
Mining Knowledge of Conductive Objects and Conductive Class Objects 141
Mining Conductive Degree Knowledge of Conductive Objects and Conductive Class Objects 142
Mining Knowledge of the Scope of the Characteristic Value of the Conductive Objects and Conductive Class Objects 142
Mining Extension Classification Knowledge of Conductive Objects and Conductive Class Objects 143
Conclusions 143
References 144
Research on Customer Value Based on Extension Data Mining 145
Introduction 145
Definitions of EK 146
Establish Information-Elements Set 147
The Evaluating Index System of CV 147
Customer Information-Elements Set and CV Information-Elements Set 147
Conductivity and Integrated Dependent Degree on CV 148
Acquiring CV Conductive Knowledge 149
Conductive Knowledge of Current CV Change Caused by Marketing Activity 149
Conductive Knowledge of Latent CV Change Caused by Marketing Activity 150
Conductive Knowledge of Integrated CV Change Caused by Marketing Activity 150
Conductive Knowledge That Taking Place Conductive Transformation between Current CV and Latent CV 150
Acquiring Extensible Classification Knowledge of Customers Based on Conductive Transformations 151
Conclusions 151
References 151
The Intelligent System of Cardiovascular Disease Diagnosis Based on Extension Data Mining 153
Introduction 153
Extension Transformation and Concept of Extension Knowledge 154
Extension Transformation in the Lower Dimensional Space 154
The Extension Data Mining and Extension Knowledge Theorem 155
The Application of Extension Data Mining in Intelligent Diagnosis System on Cardiovascular Disease 156
Recovering the Contradiction between Information Incomplete and the Diagnosis Accuracy 156
Adopting Extension Transformation, Enhancing Physical Examination and Auxiliary Examination to Change Unconfirmed Condition into Confirmable One 157
Integrating Many Kinds of Artificial Intelligence Methods to Cope with the Problem of Knowledge Reasoning in High Dimension Space 157
Adopting Man-Machine Interface to Give Extension Strategy, Achieving the Function of Active Type of Dialogue and Haleness 158
Flowing the Process of Expert Diagnosis to Form the New Knowledge Chain and Innovate the Extension Knowledge Base 158
Conclusion 159
References 160
From Satisfaction to Win-Win: A Novel Direction for MCDM Based on Extenics 161
Introduction 161
Challenges Faced with MCDM and a New Direction to Get Win-Win Solutions 162
New Technologies and the Process to Get Win-Win Solutions 163
Case Studies 165
Conclusions 168
References 168
The Methods to Construct Multivariate and Multidimensional Basic-Element and the Corresponding Extension Set 170
Introduction 170
Definitions of Multivariate and Multidimensional Basic-Element and the Corresponding Extension Set 171
Conclusions and Future Works 173
References 173
A New Process Modeling Method Based on Extension Theory and Its Application in Purified Terephthalic Acid Solvent System 174
Introduction 174
Matter Element Model 175
Extension Transformation 175
Neural Network Modeling and Comparison 176
Conclusion 177
References 177
Research on Liquidity Risk Evaluation of Chinese A-Shares Market Based on Extension Theory 178
Introduction 178
The Extension Definition of the Stock Market's Liquidity Risk 178
Risk Assessment Model 179
Numerical Calculation 180
Conclusions 181
References 181
Contradictory Problems and Space-Element Model 182
Introduction 182
Contradictory Problems in Plan and Design on Tour Hotel of Xitang Historic Town 182
Plan Demand Restriction 183
Present Condition Restriction 183
New Method—Extenics to Solve Contradictory Problems 183
Space-Element Models and the Reconstruction Example of Mo-Gan Mountain Road 50 in Shanghai 183
Space-Element Models 183
The Reconstruction Example of Mo-Gan Mountain Road 50 in Shanghai 184
Conclusions 185
References 185
Workshop on Intelligent Knowledge Management 186
Knowledge Intelligence: A New Field in Business Intelligence 186
Introduction 186
BI with Intelligent Knowledge 187
Conclusions 188
References 189
Mining Knowledge from Multiple Criteria Linear Programming Models 190
Introduction 190
Multiple Criteria Linear Programming (MCLP) Model 191
Algorithm of Knowledge Mining 192
Experiments 194
Conclusions 195
References 195
Research on Domain-Driven Actionable Knowledge Discovery 196
Introduction 196
Several Basic Concepts of DDDM 197
Two Main Process Models 198
DDDM Frameword 199
Case Studies 200
Matrix of Profiles on Row and Column 201
R Factorial Axes 201
Q Factorial Axes 201
The Factorial Maps 202
Conclusions 202
References 203
Data Mining Integrated with Domain Knowledge 204
Introduction 204
Acquisition and Representation of Domain Knowledge in Data Mining 205
Acquisition of Domain Knowledge 205
Representation of Domain Knowledge 205
Architecture of DMIWDK 205
Conclusion 207
References 207
A Simulation Model of Technological Adoption with an Intelligent Agent 208
Introduction 208
The Simulation Model of Technology Adoption with an Intelligent Agent 209
Initialization and Results of the Model 211
Concluding Remarks 212
References 213
Research on Ratchet Effects in Enterprises’ Knowledge Sharing Based on Game Models 214
Introduction 214
“Prisoner’s Dilemma” in Knowledge Sharing 214
“Ratchet Effects” in Knowledge Sharing 215
Conclusion 216
References 217
Application of Information Visualization Technologies in Masters’ Experience Mining 218
Preface 218
Visualization Technologies in Master Mining 219
Meta-synthesis Intelligence Mining Platform 219
Framework of MIMP 220
Workflow of MIMP 220
Main Functions of MIMP 220
Summary 221
References 221
Study on an Intelligent Knowledge Push Method for Knowledge Management System 222
Introduction 222
Matrix Designed 223
Affinity Calculation 225
The Affinity between Knowledge and Users 225
The Affinity among Users 227
Conclusion 228
References 228
Extension of the Framework of Knowledge Process Analysis: A Case Study of Design Research Process 229
Introduction 229
Elaboration of Primitives from Design Studies 229
Case Study Project 230
Discussion and Conclusion 232
References 232
The Ninth International Workshop on Meta-Synthesis and Complex Systems 233
On Heterogeneity of Complex Networks in the Real World 233
Introduction 233
Theoretical Analysis 234
Degree Distribution of Complex Networks in the Real World 234
Concentration Trend of the Degree Distribution 234
Absolute Dispersion Degree of the Degree Distribution 235
Relative Dispersion Degree of the Degree Distribution 236
Inequality Degree 237
Discussion and Conclusion 238
References 239
Some Common Properties of Affiliation Bipartite Cooperation-Competition Networks 240
Introduction 240
Network Cooperation-Competition Configuration Descriptions 241
The Node Weight Distribution 244
Relationship between Node Weight and Act Degree 245
Summary 246
References 246
Cases of HWMSE 248
Introduction 248
On-Line Conferencing Ba (OLCB) 249
What Help to Incubate the Emergence of OLCB? 249
Is OLCB a HWMSE? 251
The Illustration of Conference Mining Technologies 252
Search Engine 253
Conclusions 254
References 254
Group Argumentation Info-visualization Model in the Hall for Workshop of Meta-synthetic Engineering 256
Introduction 256
Related Work 257
The Structure of the Argumentation Information 257
The Argumentation Info-visualization Model 258
The Algorithms to Analyze Consensus 260
Summary and Future Work 262
References 262
Study on Improving the Fitness Value of Multi-objective Evolutionary Algorithms 263
Introduction 263
Methods of Computing the Fitness Value 264
Traditional Methods of Fitness Assignment 264
Improved Method of Fitness Assignment 266
Testing Analysis 267
Conclusions 269
References 270
Simulation for Collaborative Competition Based on Multi-Agent 271
Introduction 271
The Frame of Collaborative Competition Based on Multi-agent 271
Design Simulation of Collaborative Competition 272
The Property Parameters of Agent 272
The Action Rules of Agent 273
Design Simulation Rules 274
Simulation Results 274
Change the Proportion of Collaborators 275
Change the Type of Neighbors 276
Change the Payoff Value R 276
Conclusions 276
References 277
Fuzzy Optimal Decision for Network Bandwidth Allocation with Demand Uncertainty 278
Introduction 278
Preliminaries about Fuzzy Number and Fuzzy Integral 279
Bandwidth Allocation Decision with Demand Uncertainty 280
Conclusions 284
References 285
A Comparison of SVD, SVR, ADE and IRR for Latent Semantic Indexing 286
Introduction 286
SVD-Based LSI Methods 287
Singular Value Decomposition 287
Singular Value Rescaling 287
Iterative Residual Rescaling 288
Approximation Dimension Equalization 288
Experiment Design 289
Parameter Setting 289
Information Retrieval 290
Text Categorization 290
Similarity Measure 290
Results of Experiments 291
The Corpora 291
Results on Information Retrieval 291
Results on Text Categorization 292
Results on Similarity Measure 293
Concluding Remarks 293
References 294
The Bilevel Programming Model of Earthwork Allocation System 295
Introduction 295
The BLP Model of Earthwork Allocation System 296
The Model in Upper Level 296
The Model for in Lower Level 298
The Algorithm for the Model 299
Application and Conclusions 300
References 301
Knowledge Diffusion on Networks through the Game Strategy 302
Introduction 302
Theoretical Model 303
Simulation Results 304
The Influence of the Reconnected Probability 304
The Influence of the Number of the Nearest Neighbors 305
The Influence of the Network Scale 306
The Influence of the Percentage of the Initial Knowledge Contributors 307
Conclusions 308
References 308
The Analysis of Complex Structure for China Education Network 310
Introduction 310
Degree Distribution 311
Clustering Coefficient 312
Average Path Length 312
Community Structure 313
Conclusions and Future Work 314
References 314
Priority-Pointing Procedure and Its Application to an Intercultural Trust Project 316
Introduction 316
Research Background 318
Intercultural Trust Project 318
Theoretical Framework 318
Application of PPP to the Intercultural Trust Project 319
Define the Objective 319
Identify the Respondents 319
Survey Method and Questionnaire 320
Survey Interpretation and Variable Definition 320
Synthesis and Analysis 320
Measuring Imbalances 321
Feedback to Participants 321
Conclusion 322
References 322
Exploring Refinability of Multi-Criteria Decisions 324
Introduction 324
Kawakita K-J Mind Mapping and Iterative Cycles 327
Exploring Refinability 328
References 330
Methodology for Knowledge Synthesis 331
Introduction 331
Informed Systems Thinking 331
Knowledge Construction Model 332
Structure-Agency-Action Paradigm 333
Evolutionally Constructive Objectivism 334
Knowledge Construction Theory 335
Concluding Remarks 336
References 337
Study on Public Opinion Based on Social Physics 338
Introduction 338
Studying on the Mechanism of Opinion Formation Based on Social Combustion Theory 339
Social Combustion Theory 339
To Determine Formation of Opinion 339
Exploring Opinion Evolution Process Based on Social Shock Wave Theory 340
Social Shock Wave Theory 340
Modeling for Opinion Evolution 341
Recognizing the Individuals Who Specifically Refers the Opinion Leader’s Behavior Based on Social Behavior Entropy Theory 342
Social Behavior Entropy Theory 342
Recognizing Opinion Leaders 343
Conclusions 343
References 343
Context-Based Decision Making Method for Physiological Signal Analysis in a Pervasive Sensing Environment 345
Introduction 345
Context-Based Decision Making of Physiological Signal 346
Experimental Analysis 348
Conclusion and Future Work 351
References 352
A Framework of Task-Oriented Decision Support System in Disaster Emergency Response 353
Introduction 353
Revelations from Wenchuan Earthquake Relief 354
The Mechanism of Task Generation in Emergency Response 354
A Framework of Task-Oriented Decision Support System 355
Conclusion 356
References 356
Study on the Developing Mechanism of Financial Network 357
Introduction 357
Assumption of the Developing Model of Financial Network 357
Construction of the Developing Model of Financial Network 358
Evolution Rules 358
Model Construction 359
Analysis of the Developing Model of the Financial Network 361
Simulation 362
Conclusion 363
References 364
Solving Sudoku with Constraint Programming 365
Introduction 365
Variable Selection Heuristics 365
Value Selection Heuristics 366
Constraint-Based Model of Sudoku 366
Analysis of Results 367
Conclusions 368
References 368
A Study of Crude Oil Price Behavior Based on Fictitious Economy Theory 369
Introduction 369
Theory and Methods 370
The Data 372
Emperical Ananlysis 374
Conclusions 375
References 375
Study on the Method of Determining Objective Weight of Decision-Maker (OWDM) in Multiple Attribute Group Decision-Making 377
Introduction 377
The OWDM to Attributes 378
Interactive Flow of Group Decision-Making Based on the Objective Weight 378
Conclusion 379
References 379
Machining Parameter Optimal Selection for Blades of Aviation Engine Based on CBR and Database 381
Introduction 381
The System Architecture and Workflow 382
Machining Parameter Database Structure 383
Case Library and Case Representation 384
Control Parameters 385
Non-control Parameters 385
Case Mapping Algorithms 385
Local Similarity Ratio Calculation Methods 385
Integral Similarity Ratio Calculation Method 386
Nearest Neighbor Method 386
Application of Similarity Ratio Calculation Methods 386
Application of Local Similarity Ratio Calculation Method and Nearest Neighbor Method 387
Application of Integral Similarity Ration Calculation Method 387
Applications 388
Conclusion 389
References 389
A Multi-regional CGE Model for China 390
Introduction 390
Framework of Multi-regional CGE Model for China 391
Data 392
Simulations 392
Conclusions and Perspective 392
References 393
Workshop on Risk Correlation Analysis and Risk Measurement 394
The Method Research of Membership Degree Transformation in Multi-indexes Fuzzy Decision-Making 394
Introduction 394
Distinguishable Weight and Effective Value of K th Class Index Membership 396
Distinguishable Weight 397
Effective Value of Index Membership 397
Comparable Value of $K$ th Class Index Membership and Membership Transformation 398
Comparable Value 398
Membership Transformation 399
Case 399
Fuzzy Evaluation Matrix 399
Steps in the $M$(1,2,3)Method 400
Conclusions 402
References 403
Study on Information Fusion Based Check Recognition System 404
Introduction 404
Preprocessing and Layout Analysis 405
Legal Amount Recognition 406
Recognition of Courtesy Amount and E13B 408
Information Fusion for Check Recognition 409
Conclusion and Future Work 410
References 410
Crisis Early-Warning Model Based on Exponential Smoothing Forecasting and Pattern Recognition and Its Application to Beijing 2008 Olympic Games 412
Introduction 412
The Design of Crisis Early-Warning Model 412
Forecasting Process 412
Pattern Recognition Process 414
Parameter Calculation 414
Sponsor Companies Crisis Early-Warning of Beijing 2008 Olympic Games 415
Sponsor Background Introduction of Beijing 2008 Olympic Games 415
Crisis Early-Warning Calculation 416
Conclusions 418
References 418
Measuring Interdependency among Industrial Chains with Financial Data 419
Introduction 419
Case Background and Source Data 420
Multiplication Model of Time Series and Historical Simulation 420
Granger Causality Test of Simulation Data Groups 422
Interdependency among Industrial Chains 424
Horizontal Analysis 424
Vertical Analysis 424
Conclusions 425
References 425
Multi-objective Economic Early Warning and Economic Risk Measure 427
Introduction 427
The Multi-dimension Climate Index Approach 428
Multi-dimension Index Construction 428
Economic Risk Measure 429
Chinese Multi-objective Economic Early Warning 430
Indicators and Data 430
Empirical Results 431
Conclusions 432
References 432
An Analysis on Financial Crisis Prediction of Listed Companies in China’s Manufacturing Industries Based on Logistic Regression and Bayes 434
Introduction 434
Logistic Regression Model 435
The Combined Application of Bayes’ Theorem and Logistic Regression 436
Bayes’ Theorem 436
The Combined Application of Bayesian Theorem and Logistic Regression— —Empirical Analysis 436
Conclusion 438
References 439
Comparative Analysis of VaR Estimation of Double Long-Memory GARCH Models: Empirical Analysis of China’s Stock Market 440
Introduction 440
Methodology 442
ARFIMA$(p_{1},d_{1},q_{1})$-HYGARCH $(p_{2},d_{2},q_{2})$ Model 442
VaR Computation Model and Test Method 443
Data 444
Compared Empirical Results 444
In-Sample VaR Computations 445
Out-of-Sample VaR Forecast 447
Conclusions 447
References 448
Estimation of Value-at-Risk for Energy Commodities via CAViaR Model 449
Introduction 449
Conditional Autoregressive Value at Risk (CAViaR) Model 450
Backtesting VaR 451
Data Description and Preliminary Analysis 451
Empirical Results and Analysis 453
Estimates for Normal-GARCH, GED-GARCH, and CAViaR Models 453
VaR Performance 454
Conclusion 457
References 457
An Empirical Analysis of the Default Rate of Informal Lending—Evidence from Yiwu, China 458
Introduction 458
The Outline of Yiwu Informal Lending 459
Data Descriptions and Sampling 459
Default Comparisons between Informal Lending and Commercial Debt 460
Significant Difference on the Default Rate among Three Types of Relationships 461
Analysis of Factors Contributing to Default 461
The Characteristics of Debtors 461
Logistic Regression 462
Conclusions and Discussion 465
References 465
Empirical Study of Relations between Stock Returns and Exchange Rate Fluctuations in China 467
Introduction 467
Methodology 468
Empirical Results 468
Data Source 468
Data Adjustment 468
Distributional Characteristics 470
Results of Model Fitting 470
Conclusion 473
References 473
Cost Risk Tolerance Area of Material Supply in Biomass Power Generation 475
Introduction 475
Model Constructions 475
Simulation Data and Scenarios 478
Tolerance Area Analyses of Cost Risk and Conclusions 480
References 480
The Effect of Subjective Risk Attitudes and Overconfidence on Risk Taking Behaviors: A Experimental Study Based on Traders of the Chinese Stock Market 481
Intrduction 481
Theoretical Analysis about the Effect of Overconfidence on Risk Taking Behavior 482
Variable Design and Data Collection 484
Variable Design 484
Questionnaire Design and Variable Caculation 485
Data Collection 487
Main Results 487
Descriptive Statistics 487
Results Analysis 487
Conclusions 491
References 491
Application of the Maximum Entropy Method to Risk Analysis of Mergers and Acquisitions 493
Introduction 493
Maximum Entropy Method for Risk Analysis 493
Application Case 494
Basic Variables for M& A Risk Analysis
Empirical Results 495
Conclusion 496
References 496
Internal Control, CPA Recognition and Performance Consequence: Evidence from Chinese Real Estate Enterprises 497
Introduction 497
Literature Review and Research Hypotheses 498
Data Collection 499
Variable Definition and Measurement 500
The Implementation of Internal Control 500
The CPA Evaluation of Internal Control (CPAPJIA) 500
Company Performance (PERFORM) 500
Control Variables 501
Model and Data Analysis 502
The Implementation of Internal Controls and CPA Evaluation 502
The Implementation and Effectiveness of IC and Company Performance 502
CPA Evaluation of Internal Control and Company Performance 503
Summary and Conclusions 504
References 504
The Influence of IPO to the Operational Risk of Chinese Commercial Banks 506
Introduction 506
The Operational Losses and IPO of Chinese Commercial Banks 507
Research Method 508
The Results and Analysis 509
Conclusion 511
References 511
The Measurement and Analysis Risk Factors Dependence Correlation in Software Project 513
Introduction 513
Risk Factor in Software Project 514
Dependence Correlation among Risk Factors 514
Preliminary Notions Related to Pawlak Rough Sets 515
Rough Set –Based Analysis of Dependence Relation in Risk Factors 515
An Instance Study 517
Conclusions 518
References 519
Assessment of Disaster Emergency Management Ability Based on the Interval-Valued Fuzzy TOPSIS Method 521
Introduction 521
The Evaluating System of Emergency Management Ability 522
The Interval-Valued Fuzzy Method Based TOPSIS 522
Case Study 524
Conclusion 525
References 526
Dynamic Project Risk Analysis and Management Based on Influence Diagrams 527
Introduction 527
Risk Descriptions 528
The Construction of the Risk Hierarchical Influence Diagram 529
The Calculation of the Risk Hierarchical Influence Diagram 530
The Dynamic Project Risk Management Model 530
Case Analysis 531
Conclusions 533
References 533
Risk Prediction and Measurement for Software Based on Service Oriented Architecture 535
Background 535
Risk Prediction Model of Software Based on Soa 536
Risk Prediction Based on EXPERT COCOMO 536
Risk Classification of Service Oriented Software 536
EXPERT COCOMO Based Risk Prediction Model-ECORPM 536
Risk Measurement Based on ECORPM 539
Risk Measurement Process and Construction 539
Analysis and Discussion on Practical Measurement Data 540
Conclusion and Future Works 541
References 542
Risk Measurement and Control of Water Inrush into Qiyue Mountain Tunnel 543
Introduction 543
Risk Measurement 544
Main Controlling Factors of Water Inrush into Karst Tunnel 544
Fuzzy Comprehensive Evaluation Model 545
Risk Control 547
Karst Water Detecting Program 547
Prevention Measures 547
Engineering Application 547
Engineering Situation 547
The Sample of the Risk Evaluation 548
Verification 548
Grouting 549
Conclusion 549
References 550
Operational Risk Measurement of Chinese Commercial Banks Based on Extreme Value Theory 551
Introduction 551
VaR and ES Basing on POT 552
Empirical Analysis 552
Conclusion 554
References 554
A Multi-criteria Risk Optimization Model for Trustworthy Software Process Management 555
Introduction 555
Model Hypotheses and Trustworthiness Measurement Model 556
Model Hypotheses 556
Trustworthiness Measurement Model 556
Risk Management Optimization Model 557
Conclusion 558
References 559
Country Risk Volatility Spillovers of Emerging Oil Economies: An Application to Russia and Kazakhstan 560
Introduction 560
Analysis Method 561
Empirical Results 561
Conclusions 562
References 563
Modeling the Key Risk Factors to Project Success: A SEM Correlation Analysis 564
Introduction 564
Literature Review 565
Research Method 566
SEM Introduction 566
Questionnaire Investigation 566
Data Analysis and Result 567
Comparison 569
Conclusion 570
References 571
Research on R& D Project Risk Management Model
Introduction 572
Quality Function Deployment and R& D Real Option
R& D Project Risk Management Model
Risk Identification 574
Risk Analysis 574
Risk Response 575
Risk Control 575
Example 575
Conclusion 577
References 578
Software Risks Correlation Analysis Using Meta-analysis 579
Introduction 579
Meta-analysis 580
Meta-analysis Introduction 580
Search Process 580
Basic Statistical Analysis 580
Top Ten Risks 581
Statistical Analysis 582
Cluster Analysis 582
Correlation Analysis 582
Causal Diagram 583
Conclusion 584
References 584
A Two-Layer Least Squares Support Vector Machine Approach to Credit Risk Assessment 586
Introduction 586
Background 587
Kernel Principle Component Analysis 587
LS-SVM-LP 587
KPCA-LS-SVM-LP 589
Algorithm 589
Numerical Results and Analysis 590
Conclusions 592
References 592
Credit Risk Evaluation Using a C-Variable Least Squares Support Vector Classification Model 593
Introduction 593
Least Square Support Vector Classification (LSSVC) 594
$C$-Variable LSSVC ($C$-VLSSVC) 596
Experimental Results 598
Concluding Remarks 599
References 599
Ecological Risk Assessment with MCDM of Some Invasive Alien Plants in China 600
Introduction 600
Materials and Methods 601
Materials and Data Source 601
Analysis Methods 601
The Construct of MCDM Assessment System and Model 602
The Construct of MCDM Assessment System for Ecological Risk 602
Model of Risk Assessment by Alien Plants 603
Divides the Risk Grades of Alien Plants 603
Results and Analysis 604
Risk Strategies 605
Conclusion 606
References 606
Empirically-Based Crop Insurance for China: A Pilot Study in the Down-middle Yangtze River Area of China 608
Introduction 608
Methods and Materials 609
Study Area 609
Analytical Methods 609
Results 612
Discussion 613
References 614
A Response Analysis of Economic Growth to Environmental Risk: A Case Study of Qingdao 615
Introduction 615
Comprehensive Evaluation on Environmental Risk 615
Selection and Source of Environmental Risk Variables 615
Comprehensive Evaluation on Environmental Risk Using Principal Component Analysis 616
Granger Causality Test between the Economic Growth and the Environmental Risk 616
Unit Root Test 616
Analysis by Granger Causality Test 617
Impulse Response Function Analysis between the Economic Growth and Environmental Risk 617
Conclusions 618
References 619
Workshop on Optimization-Based Data Mining Method and Applications 620
A Multiple Criteria and Multiple Constraints Mathematical Programming Model for Classification 620
Introduction 620
MCLP, LDA and MEMBV Models 621
Multiple Constraints MEMBV Model 623
Solution of Multiple Constraints MEMBV Model 623
Conclusions 624
References 625
New Unsupervised Support Vector Machines 626
Introduction 626
Unsupervised Classification Algorithm 627
Numerical Results 629
Conclusions 632
References 633
Data Mining for Customer Segmentation in Personal Financial Market 634
Introduction 634
Clustering Ensemble Algorithms 635
Classification Based on Clustering 636
Experiments 638
Clustering Results 638
Classification Results 640
Conclusion 640
References 641
Nonlinear Knowledge in Kernel-Based Multiple Criteria Programming Classifier 642
Introduction 642
KMCLP Model and Prior Knowledge 643
A Brief Review of KMCLP Model 643
Prior Knowledge to Classify Data 644
Nonlinear Knowledge in KMCLP Model 645
Experiment on Wisconsin Breast Cancer Data 647
Conclusions 648
References 649
A Note on the 1-9 Scale and Index Scale In AHP 650
Introduction 650
Analysis 651
Saaty’s Scale-Selection Thoughts and the Psychophysical Law 652
The Index Scale 652
The 1-9 Scale 653
Conclusions 653
Different Applications of the Psychophysical Law Lead to Different Scales 653
The Index Scale is Preferable to the 1-9 Scale in Theory 653
The 1-9 Scale Could Still be Used in Practice in Future 654
References 654
Linear Multi-class Classification Support Vector Machine 655
Introduction 655
Two Classification in Linear Programming Formulation 656
The CS-LSVC Learning Machine 657
Experiments 659
Experiments on Artificial Data Sets 659
Experiments on Benchmark Data Sets 660
Conclusions 661
References 661
A Novel MCQP Approach for Predicting the Distance Range between Interface Residues in Antibody-Antigen Complex 663
Introduction 663
Construction of a Non-redundant Dataset 664
Collection of Complex Structure and Selection of Interface Residues 664
Extraction of Sequence Feature 664
Evaluation of Prediction Accuracy 664
Comparison and Analysis 664
Conclusions 667
References 668
Robust Unsupervised Lagrangian Support Vector Machines for Supply Chain Management 669
Introduction 669
Robust Unsupervised Classification Algorithms 670
Robust Unsupervised Classification Algorithm with Polyhedrons (PRLSDP) 670
Robust Unsupervised Classification Algorithm with Ellipsoids (ERLSDP) 671
Numerical Results 671
Application on Supply Chain Management 671
Conclusions 672
References 672
A Dynamic Constraint Programming Approach 673
Introduction 673
Dynamic Enumeration Strategies 673
Experimental Results 675
Conclusion 676
References 676
The Evaluation of the Universities’ Science and Technology Comprehensive Strength Based on Management Efficiency 677
Introduction 677
Method of Management Efficiency 678
The Evaluation Index System of University’s Comprehensive Science and Technology Strength 679
Application Example 679
Conclusions 680
References 680
Topics in Risk Analysis with Multiple Criteria Decision Making 681
MCDM and SSM in the Public Crisis Management: From the Systemic Point of View 681
Introduction 681
Public Crisis Is a Variety of Bifurcations of the Social System 681
Public Crisis Is an Ill-Structured Problem Situation 682
MCDM Is a Hard Systems Approach 683
SSM and Its Characteristics 684
The Roles of MCDM and SSM in Public Crisis Management 685
Conclusions 687
References 687
The Diagnosis of Blocking Risks in Emergency Network 689
Introduction 689
Problem of Minimum Cost and Maximum Flow and Blocking Set 689
The Definition of Blocking Set 691
Definition of Normal Network 693
Investment Problem 694
References 694
How Retailer Power Influence Its Opportunism Governance Mechanisms in Marketing Channel?– An Empirical Investigation in China 696
Introduction 696
Theory and Hypothesis 697
Data and Analysis 698
Conclusion 700
References 700
Applications in Oil-Spill Risk in Harbors and Coastal Areas Using Fuzzy Integrated Evaluation Model 701
Introduction 701
To Establish the Fuzzy Integrated Evaluation Model 701
To Establish the Indexes of Evaluation 702
To Establish the Evaluation Criterions 702
To Determine the Weight 702
To Establish the Membership Function 702
Integrated Evaluation 703
Environmental Risk Assessment Index System of Oil Spilling 703
The Possibility Index System of Oil-Spill Risk 703
The Index System for Assessing the Effect of Oil Spills in Harbors and Coastal Areas 705
Environmental Risk Assessments of Oil Spills in Tianjin Port 705
Introduction of Tianjin Port 705
Risk Assessment of Oil Spills in Tianjin Port 705
Conclusions 707
References 707
Coexistence Possibility of Biomass Industries 709
Introduction 709
Model Constructions 709
Coexistence Possibilities of Biomass Industries 710
Conclusions 711
How Power Mechanism Influence Channel Bilateral Opportunism 712
Introduction 712
Theory and Hypothesis 713
Data and Analysis 714
Conclusion 716
References 716
Workshop on Applications of Decision Theory and Method to Financial Decision Making 717
Compromise Approach-Based Genetic Algorithm for Constrained Multiobjective Portfolio Selection Model 717
Introduction 717
Constrained Multiobjective Portfolio Selection Model 718
Compromise Approach-Based Genetic Algorithm 720
Compromise Approach 720
Genetic Algorithm 721
Numerical Illustration 722
Conclusion 724
References 724
Financial Time Series Analysis in a Fuzzy View 725
Introduction 725
Fuzzy Auto-Regression Model FAR $(p)$ 726
Estimation and Evaluation of the Model FAR $(p)$ 728
Empirical Analysis 730
Summaries 731
References 732
Asset Allocation and Optimal Contract for Delegated Portfolio Management 733
Introduction 733
Basic Model 734
Optimal Contract and Asset Allocation 735
First-Best Contract 735
Second Best Contract 738
Conclusions 739
References 740
The Heterogeneous Investment Horizon and Dynamic Strategies for Asset Allocation 741
Introduction 741
Basic Model 742
The Portfolio Strategy on the Heterogeneous Investment Horizon 744
The Buy-and-Hold Strategy 744
The Simple Rebalancing Strategy 745
The Stochastic Rebalancing Strategy 745
Practical Examples 746
Conclusion 747
References 748
Tracking Models for Optioned Portfolio Selection 749
Introduction 749
The Single-Stage Tracking Model 750
The Multistage Tracking Model 752
References 755
Size, Book-to-Market Ratio and Relativity of Accounting Information Value: Empirical Research on the Chinese Listed Company 757
Introduction 757
Research Hypotheses 758
Research Design 758
Research Method 758
Variables Selection 759
Sample Selection 759
Sample Demonstration 760
Empirical Results and Analyses 761
The Influence of Marker Size on Relativity of Accounting Information Value 761
The Influence of M/B Ratio on Relativity of Accounting Information Value 761
Conclusion and Deficiency 762
References 763
New Frontiers of Hybrid MCDM Techniques for Problems-Solving 764
Fuzzy MCDM Technique for Planning the Environment Watershed 764
Introduction 764
The Best Plan Environment-Watershed Measurements 765
Building Hierarchical Structure Criteria 765
Determining the Evaluation Criteria Weights 766
An Empirical Case 768
Discussions 770
Concluding Remarks 771
References 771
Nonlinear Deterministic Frontier Model Using Genetic Programming 773
Introduction 773
Regression-Based Frontier Models 774
Symbolic Regression 775
Monte Carlo Simulation 777
Discussion 779
Conclusion 779
References 780
A Revised VIKOR Model for Multiple Criteria Decision Making - The Perspective of Regret Theory 781
Introduction 781
VIKOR 782
A Revised VIKOR Model 784
Examples 786
Discussions 787
Conclusions 788
References 788
A Novel Evaluation Model for the Vehicle Navigation Device Market Using Hybrid MCDM Techniques 789
Introduction 789
Demand Model for ND Based on Consumers’ Requirements/Needs 790
Building a Novel Evaluation Model for the Best ND 791
Survey for VTS Functions and Consumer Preference 791
Building the ISM Model 792
The Analytical Network Procedure (ANP) Model 793
The VIKOR Model 793
A Novel Evaluation Model for the Vehicle Navigation Device Market Using Hybrid MCDM Techniques 795
Empirical Study in ISM Techniques 795
Computing the Weights of Criteria - the ANP Method 796
The VIKOR Model 796
Conclusions 798
References 798
A VIKOR Technique with Applications Based on DEMATEL and ANP 800
Introduction 800
A Novel Hybrid MCDM Model 801
DEMATEL 801
The ANP 802
VIKOR Method 803
Numerical Example with Applications 805
Discussion and Comparisons 806
Conclusions 807
References 808
Identification of a Threshold Value for the DEMATEL Method: Using the Maximum Mean De-Entropy Algorithm 809
Introduction 809
DEMATEL Method 810
Maximum Mean De-Entropy Algorithm (MMDE) 812
Information Entropy 812
The Dispatch- and Receive-Nodes 813
Maximum Mean De-Entropy Algorithm 813
Numerical Cases of Deciding Intertwined Criteria in Evaluating E-Learning Program 814
Conclusions 816
References 816
High Technology Service Value Maximization through an MCDM-Based Innovative e-Business Model 817
Introduction 817
Innovation Competence and e-Business Model Assessment 818
Analytic Framework and Methods for Defining e-Commerce Strategies 820
DEMATEL Method 820
The ANP Method 821
Grey Relational Analysis 821
A SIP e-Business Model Definition by Using the Novel MCDM Framework 822
Discussions 822
Conclusions 823
References 823
Airline Maintenance Manpower Optimization from the De Novo Perspective 826
Introduction 826
Airline Maintenance 827
Fuzzy Multi-objective and De Novo Programming 827
Redesign Given Systems 827
Fuzzy Multiple Objective Programming 828
The De Novo Perspective for HRM Optimization 829
Optimize Manpower Portfolio of Airline Line Maintenance 830
Model Formulation 831
De Novo Programming 831
Fuzzy Multi-objective Programming Approach 832
Discussion 833
Conclusions 834
References 834
A Novel Hybrid MADM Based Competence Set Expansions of a SOC Design Service Firm 835
Introduction 835
Innovation and Competence Set Expansion 836
Analytic Framework and Methods for Defining Open R& D Strategies
DEMATEL Method 837
The ANP Method 838
MODM Based Competence Sets Expansions 839
Expanding SOC DS Firms’ Innovation Competences – A Case Study 840
Discussions 841
Conclusions 841
References 841
A Genetic Local Search Algorithm for the Multiple Optimisation of the Balanced Academic Curriculum Problem 844
Introduction 844
Balanced Academic Curriculum Problem 845
Multiple BACP Model 846
The Genetic Local Search Algorithm 848
Experimental Results 850
Conclusions 851
References 852
Using Consistent Fuzzy Preference Relations to Risk Factors Priority of Metropolitan Underground Project 853
Introduction 853
Consistent Fuzzy Preference Relations 854
Multiplicative Preference Relations 854
Fuzzy Preference Relations 854
Consistent Fuzzy Preference Relations 855
Determining the Priority of Criteria/ Alternatives 855
Numerical Examples 856
Conclusion 859
References 859
Using MCDM Methods to Adopt and Assess Knowledge Management 860
Introduction 860
Literature Review 861
Knowledge Management Capabilities 861
Knowledge Management Capability Components 861
OKMR (Organizational Knowledge Management Readiness) 861
Research Method 862
OKMR Instrument Development 862
The DEMATEL Method 862
After Dematel Procedure 865
Conclusion and Findings 865
References 866
Author Index 868
Erscheint lt. Verlag | 1.1.2009 |
---|---|
Sprache | englisch |
Themenwelt | Informatik ► Datenbanken ► Data Warehouse / Data Mining |
Mathematik / Informatik ► Informatik ► Netzwerke | |
Informatik ► Software Entwicklung ► User Interfaces (HCI) | |
Informatik ► Theorie / Studium ► Künstliche Intelligenz / Robotik | |
Informatik ► Weitere Themen ► Hardware | |
Mathematik / Informatik ► Mathematik | |
Technik | |
Schlagworte | Conflict Resolution • Data Mining • Decision Making • Decision support system • Game Theory • Hidden Markov Model • knowledge base • Maintenance • Multi-Objective Optimization • pattern recognition • preference modelling • proving • Resource Allocation • Risk Management • Simulation • Uncertainty |
ISBN-10 | 3-642-02298-7 / 3642022987 |
ISBN-13 | 978-3-642-02298-2 / 9783642022982 |
Haben Sie eine Frage zum Produkt? |
Größe: 23,6 MB
DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasserzeichen und ist damit für Sie personalisiert. Bei einer missbräuchlichen Weitergabe des eBooks an Dritte ist eine Rückverfolgung an die Quelle möglich.
Dateiformat: PDF (Portable Document Format)
Mit einem festen Seitenlayout eignet sich die PDF besonders für Fachbücher mit Spalten, Tabellen und Abbildungen. Eine PDF kann auf fast allen Geräten angezeigt werden, ist aber für kleine Displays (Smartphone, eReader) nur eingeschränkt geeignet.
Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.
Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.
aus dem Bereich