Authors: Chen, Zhen-Song, Zhu, Zhengze, Herrera-Viedma, Enrique, Wang, Xian-Jia, Chiclana, Francisco, Skibniewski, Mirosław J.
Subject Terms: Behavioral sciences, Optimization, Task analysis, Probability distribution, Bayes methods, Probabilistic logic, Probability density function
File Description: application/pdf
Relation: Chen, Z-S., Zhu, Z., Herrera-Viedma, E., Wang, X-J., Chiclana, F., Skibniewski, M.J. (2023) Multi-objective optimization-based collective opinion generation with fairness concern. IEEE Transactions on Systems, Man and Cybernetics: Systems; https://hdl.handle.net/2086/22976; https://dx.doi.org/10.1109/TSMC.2023.3273715
Subject Terms: intended bounded rationality, beliefs, logic, maximum entropy
File Description: application/pdf
Relation: Sáenz Royo, C., Chiclana, F. and Herrera-Viedma, E. (2022) Functional representation of the intentional bounded rationality of decision-makers: A laboratory to study the decisions a priori. Mathematics, 10 (5), 739; https://hdl.handle.net/2086/21745; https://doi.org/10.3390/math10050739
Authors: Hatami-Marbini, A., Toloo, M., Amini, M.R., Azar, A.
Subject Terms: Data envelopment analysis, Performance-based budgeting, Fuzzy logic
File Description: application/vnd.openxmlformats-officedocument.wordprocessingml.document
Relation: Hatami-Marbini, A., Toloo, M., Amini, M.R., Azar, A. (2022) Extending a Fuzzy Network Data Envelopment Analysis Model to Measure Maturity Levels of a Performance Based-Budgeting System: A Case Study. Expert Systems with Applications, 116884.; https://hdl.handle.net/2086/21762; https://doi.org/10.1016/j.eswa.2022.116884
Authors: Sung, Kyungeun
Subject Terms: Fuzzy logic, Linguistic analysis, Quality, Sustainable consumption, Sustainable production, Upcycling, Value
File Description: application/pdf
Relation: Sung, K. (2021). Understanding and measuring value and quality of upcycling with fuzzy linguistic approach. In: Sung, K. et al. (Eds.) State-of-the-Art Upcycling Research and Practice: Proceedings of the International Upcycling Symposium 2020. Cham: Springer.; https://dora.dmu.ac.uk/handle/2086/20905; https://doi.org/10.1007/978-3-030-72640-9_24
Authors: Cau, Antonio, Kuhn, Stefan, Hoey, James
Subject Terms: Interval Temporal Logic, Temporal reflection, Program reversion, Reversible computing
File Description: application/pdf
Relation: Cau A., Kuhn S., Hoey J. (2021) Reversibility of Executable Interval Temporal Logic Specifications. In: Yamashita S., Yokoyama T. (eds) Reversible Computation. RC 2021. Lecture Notes in Computer Science, vol 12805. Springer, Cham. https://doi.org/10.1007/978-3-030-79837-6_13; https://dora.dmu.ac.uk/handle/2086/21080; https://doi.org/10.1007/978-3-030-79837-6_13
Authors: Deane, Spencer, Khuman, A. S.
Subject Terms: Fuzzy logic, Esports analysis, Esports performance, Mamdani inference system, Counter strike global offensive
Relation: Deane S., Khuman A.S. (2021) The Application of Fuzzy Logic in Determining Outcomes of eSports Events. In: Carter J., Chiclana, F., Khuman A.S., Chen T. (eds) Fuzzy Logic: Recent Applications and Developments. Springer, Cham, pp. 235-252; https://dora.dmu.ac.uk/handle/2086/20843; https://doi.org/10.1007/978-3-030-66474-9_14
Subject Terms: logic, uncertainty, rationality, reasoning, probability, new paradigm
Relation: Elqayam, S., Douven, I., Evans, J.St.B.T. and Cruz, N. (Eds.) (2020) Logic and uncertainty in the human mind: A tribute to David Over. London: Routledge.; https://dora.dmu.ac.uk/handle/2086/19992; https://doi.org/10.4324/9781315111902
Authors: Morden, Jarrad, Khuman, A. S., Fasanmade, Alex, Lakoju, Mike
Subject Terms: Cyber Criminals, Cybersecurity, Fuzzy logic, Social Engineering, Phishing
File Description: application/vnd.openxmlformats-officedocument.wordprocessingml.document
Relation: Morden, J., Khuman, A.S., Fasanmade, A., Lakoju, M. (2020) Predicting Social Engineering Security Threats Using Fuzzy Logic. 13th International Conference on the Developments on eSystems Engineering (DeSE2020), Online, December 2010.; https://dora.dmu.ac.uk/handle/2086/20195
Availability: https://dora.dmu.ac.uk/handle/2086/20195
Subject Terms: fuzzy logic, Social Engineering, Phising Attack
File Description: application/pdf
Relation: Lambat, Y., Ayres, N., Maglaras, L., Ferrag, M.A. (2021) A Mamdani Type Fuzzy Inference System to Calculate Employee Susceptibility to Phishing Attacks. Applied Sciences, 11, 9083.; https://dora.dmu.ac.uk/handle/2086/21288; https://doi.org/10.3390/app11199083
Authors: Galli, Tamas, Chiclana, Francisco, Siewe, Francois
Subject Terms: software product quality model, quality assessment, execution tracing, logging, execution tracing quality, logging quality, fuzzy logic, artificial intelligence
File Description: application/pdf
Relation: Galli, T.; Chiclana, F.; Siewe, F. (2021) Genetic Algorithm-Based Fuzzy Inference System for Describing Execution Tracing Quality. Mathematics, 9, 2822; https://dora.dmu.ac.uk/handle/2086/21425; https://doi.org/10.3390/math9212822
Authors: Fasanmade, Adebamigbe, He, Ying, Al-Bayatti, Ali Hilal, Morden, J.N., Aliyu, Suleiman, Alfakeeh, A.S., Alsayed, A.O.
Subject Terms: fuzzy logic systems, driver distraction, severity level, ADAS, Image processing, Dynamic Bayesian
File Description: application/pdf
Relation: Fasanmade, A., He, Y., Al-Bayatti, A.H., Morden, J.N., Aliyu, S., Alfakeeh, A.S., Alsayed, A.O. (2020) A Fuzzy-Logic Approach to Dynamic Bayesian Severity Level Classification of Driver Distraction Using Image Recognition. IEEE Access, 8, pp. 95197 - 95207; https://dora.dmu.ac.uk/handle/2086/19601; https://doi.org/10.1109/access.2020.2994811
Authors: Ahmed, Abdulghani Ali, Al-Khater, Wadha Abdullah, Al-Maadeed, Somaya, Sadiq, Ali Safaa, Khan, Muhammad Khurram
Subject Terms: Security, Cybercrime detection techniques, Neural network, Fuzzy logic, Machine learning, Data mining
Relation: Al-Khater, W.A., Al-Maadeed, S., Ahmed, A.A., Sadiq, A.S. and Khan, M.K. (2020) Comprehensive Review of Cybercrime Detection Techniques. IEEE Access, 8, pp. 137293-137311; https://dora.dmu.ac.uk/handle/2086/20353; https://doi.org/10.1109/ACCESS.2020.3011259
Authors: Woldesenbet, K.
Subject Terms: Business strategy, dominant logics, institutional logics, Ethiopia, transitional economy
File Description: application/pdf
Relation: Woldesenbet, K. (2018) The use of logics in a transitional economy. the paper accepted for presentation at 4th Biennial Conference of the Africa Academy of Management, 3rd- 6th January 2018, Addis Ababa, Ethiopia; http://hdl.handle.net/2086/14759
Availability: http://hdl.handle.net/2086/14759
Subject Terms: conditionals, inference, semantics, logic, indeterminacy
File Description: application/pdf
Relation: Douven, I., Elqayam, S., Singmann, H., & van Wijnbergen-Huitink, J. (2018). Conditionals and inferential connections: Toward a new semantic. Thinking & Reasoning, 101, pp.50–81.; https://www.dora.dmu.ac.uk/handle/2086/17813; https://doi.org/10.1080/13546783.2019.1619623
Authors: Woldesenbet, K.
Subject Terms: Institutional logics, legitimacy, senior managers, transition economies
Relation: Woldesenbet, K. (2017) Managing ‘legitimacy level and navigating institutional logics in transitional economies. Paper to be presented at 22nd Eurasia Business and Economics Society; http://hdl.handle.net/2086/14242
Availability: http://hdl.handle.net/2086/14242
Authors: Coupland, Simon, Runkler, Thomas, John, Robert, 1955-, Chen, Chao
Subject Terms: Fuzzy Logic
File Description: application/pdf
Relation: Runkler, T.A., Coupland, S., John R. and Chen C. (2018) Interval Type–2 Defuzzification Using Uncertainty Weights. In: Mostaghim S., Nürnberger A., Borgelt C. (eds) Frontiers in Computational Intelligence. Studies in Computational Intelligence, 739. Springer, Cham; http://hdl.handle.net/2086/14806; https://dx.doi.org/10.1007/978-3-319-67789-7_4
Authors: Sezer, Sakir, Yao, F., Yerima, Suleiman, Kang, B.
Subject Terms: authentication, neuro-fuzzy, mobile security, implicit authentication, artificial intelligence, fuzzy logic, adaptive neuro-fuzzy inference system
File Description: application/pdf
Relation: Yao, F., Yerima, S. Y., Kang, B. and Sezer, S. (2017) Continuous Implicit Authentication for Mobile Devices based on Adaptive Neuro-Fuzzy Inference System. In: International Conference on Cyber Security and Protection of Digital Services (Cyber Security 2017): Proceedings, pp. 1-7, London, Uk, June 2017.; https://pure.qub.ac.uk/portal/files/129533677/bare_conf.pdf; http://hdl.handle.net/2086/16937; https://doi.org/10.1109/cybersecpods.2017.8074846
Authors: Woldesenbet, K., Theodorakopoulos, N.
Subject Terms: Business strategy, dominant logics, Ethiopia, institutional logics, transitional economy
File Description: application/pdf
Relation: Woldesenbet, K., and Theodorakopoulos, N. (2015) Strategizing In the Context of Transitional Economy: The Interplay between Firm Level and Institutional Logics. Paper presented at EURAM 2015 Annual Conference, 17-20 June, Warsaw, Poland; http://hdl.handle.net/2086/14003
Availability: http://hdl.handle.net/2086/14003
Authors: Kayacan, E, Sarabakha, A, Coupland, Simon, John, Robert, 1955-, Ahmadieh, M., Khanesar, M. A.
Subject Terms: Fuzzy logic
File Description: application/pdf
Relation: Erdal Kayacan, Andriy Sarabakha, Simon Coupland, Robert John, Mojtaba Ahmadieh Khanesar (2018) Type-2 Fuzzy Elliptic Membership Functions for Modeling Uncertainty., Engineering Applications of Artificial Intelligence, Vol. 70, pp. 170-183.; http://hdl.handle.net/2086/15632; https://doi.org/10.1016/j.engappai.2018.02.004
Authors: Woldesenbet, K.
Subject Terms: Institutional logics, legitimacy, legitimacy work, senior managers, social-orientation
File Description: application/pdf
Relation: Woldesenbet, K. (2018) Managing institutional complexity in a transitional economy: The Legitimacy work of senior managers. International Journal of Emerging Markets, 13 (5), pp. 1417-1434; http://hdl.handle.net/2086/16146; https://doi.org/10.1108/IJoEM-10-2017-0429