Credibilistic programming : an introduction to models and applications

It provides fuzzy programming approach to solve real-life decision problems in fuzzy environment. Within the framework of credibility theory, it provides a self-contained, comprehensive and up-to-date presentation of fuzzy programming models, algorithms and applications in portfolio analysis.

Uloženo v:
Podrobná bibliografie
Hlavní autor: Li, Xiang
Médium: E-kniha Kniha Publikace
Jazyk:angličtina
Vydáno: Berlin, Heidelberg Springer 2013
Springer Berlin / Heidelberg
Springer Berlin Heidelberg
Vydání:1
Edice:Uncertainty and Operations Research
Témata:
ISBN:364236375X, 9783642363757, 9783642427176, 3642427170, 3642363768, 9783642363764
ISSN:2195-996X, 2195-9978
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Abstract It provides fuzzy programming approach to solve real-life decision problems in fuzzy environment. Within the framework of credibility theory, it provides a self-contained, comprehensive and up-to-date presentation of fuzzy programming models, algorithms and applications in portfolio analysis.
AbstractList Preface -- Credibility Theory -- Credibilistic Programming -- Mathematical Programming -- Expected Value Model -- Chance-Constrained Programming -- Entropy Maximization Model -- Cross-Entropy Minimization Model -- Regret Minimization Model
It provides fuzzy programming approach to solve real-life decision problems in fuzzy environment. Within the framework of credibility theory, it provides a self-contained, comprehensive and up-to-date presentation of fuzzy programming models, algorithms and applications in portfolio analysis.
Author Li, Xiang
Author_xml – sequence: 1
  fullname: Li, Xiang
BackLink https://cir.nii.ac.jp/crid/1130282269349595392$$DView record in CiNii
http://www.econis.eu/PPNSET?PPN=165225997X$$DView this record in ZBW - Deutsche Zentralbibliothek für Wirtschaftswissenschaften
BookMark eNpFkUtv3CAUhWmTVp1M8wOy86JS1YUb4PLsrh3lJUXqpqpmh8CQKYkHJsZJlH9fPI4SFheuzsdBnHuEDlNOAaETgr8TjOWplqqFVjDaggApWvYOHUFt9516jxaUaN7qih28CXx9-CqI9Ue0UIxTrjmmn9BxKbe4LiWV0HiBzldD8NHFPpYxds1uyJvBbrcxbZofjU1NTOOQ_UM3xpyaMTfb7ENfquIbu9v1sbOTUj6jDze2L-H4ZV-iv-dnf1aX7fXvi6vVz-vWMilBtB3lYJX1kjuGsbMYKLPEg3DMe-VBc_DWKXejqejqUQHnRAjtuJVOg4Yl-jYb23IXnsq_3I_FPPbB5XxXTM3hNR1W2WZmQ5dTLGY3xK0dng0RnNY8tFxX5HRGShXTJgxmNiLYTPlPhgZMtTR7TzOZfp1v1KjuH0IZzf7tLtSgbG_Ofq0IxYLUfy7Rl5lMMZouTpUQwFRRKjQwXScCmsJ_udmIng
ContentType eBook
Book
Publication
Copyright Springer-Verlag Berlin Heidelberg 2013
Copyright_xml – notice: Springer-Verlag Berlin Heidelberg 2013
DBID RYH
OQ6
DEWEY 519.7
DOI 10.1007/978-3-642-36376-4
DatabaseName CiNii Complete
ECONIS
DatabaseTitleList

DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
Business
Engineering
Mathematics
Applied Sciences
Economics
EISBN 3642363768
9783642363764
EISSN 2195-9978
Edition 1
2013
2013.
ExternalDocumentID 9783642363764
165225997X
312183
EBC1206125
BB1876994X
GroupedDBID -JU
-K2
089
0D3
0DA
20A
38.
A4J
AABBV
AARVG
AAUFL
ABARN
ABFTD
ABINL
ABMLC
ABMNI
ABQPQ
ABXPP
ACBPT
ACLGV
ADNEN
ADVEM
AEKFX
AERYV
AETDV
AEZAY
AFJMS
AFVVK
AHWGJ
AJFER
ALMA_UNASSIGNED_HOLDINGS
AUKZS
AZZ
BBABE
CZZ
I4C
IEZ
JJU
MA.
RYH
SBO
TPJZQ
Z7R
Z7W
Z7X
Z7Y
Z81
Z83
Z87
OQ6
Z7U
Z7Z
ID FETCH-LOGICAL-a47736-c253a8ad75b400ba0324a1d36b4dd8d3953dab8bf926c3da83551669b5a7b9393
ISBN 364236375X
9783642363757
9783642427176
3642427170
3642363768
9783642363764
ISSN 2195-996X
IngestDate Fri Nov 08 02:59:36 EST 2024
Sun Jul 20 07:24:27 EDT 2025
Fri May 23 03:11:38 EDT 2025
Wed Dec 10 13:45:31 EST 2025
Thu Jun 26 23:16:43 EDT 2025
IsPeerReviewed false
IsScholarly false
LCCallNum_Ident T57.6-.97
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-a47736-c253a8ad75b400ba0324a1d36b4dd8d3953dab8bf926c3da83551669b5a7b9393
Notes Includes bibliographical references and index
OCLC 845259502
PQID EBC1206125
PageCount 147
ParticipantIDs askewsholts_vlebooks_9783642363764
econis_primary_165225997X
springer_books_10_1007_978_3_642_36376_4
proquest_ebookcentral_EBC1206125
nii_cinii_1130282269349595392
PublicationCentury 2000
PublicationDate c2013
2013
2013-03-29
PublicationDateYYYYMMDD 2013-01-01
2013-03-29
PublicationDate_xml – year: 2013
  text: 2013
PublicationDecade 2010
PublicationPlace Berlin, Heidelberg
PublicationPlace_xml – name: Berlin
– name: Berlin, Heidelberg
PublicationSeriesTitle Uncertainty and Operations Research
PublicationSeriesTitleAlternate Uncertainty and Operations Research
PublicationYear 2013
Publisher Springer
Springer Berlin / Heidelberg
Springer Berlin Heidelberg
Publisher_xml – name: Springer
– name: Springer Berlin / Heidelberg
– name: Springer Berlin Heidelberg
SSID ssj0000878690
ssib012963958
Score 1.9534656
Snippet Preface -- Credibility Theory -- Credibilistic Programming -- Mathematical Programming -- Expected Value Model -- Chance-Constrained Programming -- Entropy...
It provides fuzzy programming approach to solve real-life decision problems in fuzzy environment. Within the framework of credibility theory, it provides a...
SourceID askewsholts
econis
springer
proquest
nii
SourceType Aggregation Database
Index Database
Publisher
SubjectTerms Artificial Intelligence
Business and Management
Economics
Economics/Management Science
Fuzzy-Set-Theorie
Glaubwürdigkeit
Industrial management
Mathematics
Mathematics, general
Mathematische Optimierung
Operations research
Operations Research/Decision Theory
Portfolio-Management
Programming languages (Electronic computers)
Theorie
TableOfContents Intro -- Credibilistic Programming -- Preface -- Acknowledgment -- Contents -- List of Frequently Used Symbols -- Chapter 1: Credibility Theory -- 1.1 Credibility Measure -- 1.2 Credibility Space -- 1.3 Fuzzy Variable -- 1.4 Credibility Function -- 1.5 Independence -- 1.6 Identical Distribution -- References -- Chapter 2: Credibilistic Programming -- 2.1 Mathematical Programming -- 2.1.1 Single-Objective Programming -- 2.1.2 Multi-Objective Programming -- 2.2 Credibilistic Programming -- 2.3 Genetic Algorithm -- 2.3.1 Representation Structure -- 2.3.2 Initialization -- 2.3.3 Evaluation Function -- 2.3.4 Selection Process -- 2.3.5 Crossover Operation -- 2.3.6 Mutation Operation -- 2.3.7 General Procedure -- References -- Chapter 3: Expected Value Model -- 3.1 Expected Value -- 3.2 Expected Value Model -- 3.3 Fuzzy Simulation -- 3.4 Applications -- References -- Chapter 4: Chance-Constrained Programming Model -- 4.1 Optimistic Value -- 4.2 Pessimistic Value -- 4.3 Chance-Constrained Programming Model -- 4.4 Fuzzy Simulation -- 4.4.1 Optimistic Value Simulation -- 4.4.2 Pessimistic Value Simulation -- 4.5 Applications -- References -- Chapter 5: Entropy Optimization Model -- 5.1 Entropy -- 5.2 Maximum Entropy Principle -- 5.3 Entropy Optimization Model -- 5.4 Fuzzy Simulation -- 5.5 Applications -- References -- Chapter 6: Cross-Entropy Minimization Model -- 6.1 Cross-Entropy -- 6.2 Minimum Cross-Entropy Principle -- 6.3 Cross-Entropy Minimization Model -- 6.4 Fuzzy Simulation -- 6.5 Applications -- References -- Chapter 7: Regret Minimization Model -- 7.1 Distance -- 7.2 Regret Minimization Model -- 7.3 Fuzzy Simulation -- 7.4 Applications -- References -- Index
Title Credibilistic programming : an introduction to models and applications
URI https://cir.nii.ac.jp/crid/1130282269349595392
https://ebookcentral.proquest.com/lib/[SITE_ID]/detail.action?docID=1206125
http://link.springer.com/10.1007/978-3-642-36376-4
http://www.econis.eu/PPNSET?PPN=165225997X
https://www.vlebooks.com/vleweb/product/openreader?id=none&isbn=9783642363764&uid=none
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3Ni9QwFH84o4h7UVfFqitBPHgptJM0abw5yy6CsgiuS_ESkqaVQe0u07rsn-9Lmsy260E8eMlk2pKE90tfX94nwOvSWFYInaWsaHXKamtTI9o2Za1krKl50_piMGcfxclJWVXyUyhp2PtyAqLryqsrefFfocZrCLYLnf0HuHeD4gXsI-jYIuzY3pCId39DooEtfoicr6tLvRwdr356VYCLaHYujcOY39VBjjKnr4Iz5mie2rF3Pjre0F_h_vk21Q24Og0z3UDUDc7OjBRPHJRTMeaF_oODTp0m8MnUPcpDIM48MfV6nSMrlZJVC1gIjiff2---fPj6eafiykrh6l25iJo4Z8h5dL2GaGgOuX5nc-7Bnu6_I6_H78DQu0iwGvkcdhbdZjM7EdwwYnvZ4PQBLF28yEO41XT7cDcGEuzD_VgwgwT--QiOZxCRCUTkLdEdmQJEhnMyAoR3LJkC9BjOjo9OD9-noZBFqpkQlKf1qqC61FYUBnmm0RmKsTq3lBtmbWmpLKjVpjStXPEauygWFznn0hRaGEklfQLL7rxrngKprXBSfoMvVMNynUkjRWtbHB5_bJYn8GpCNHX5wxvdezWhOmcJJCMt1cWY00TlHAXxQkpRJXCA5FX1xrW5s2ujDMklxZM0LlOuEiCR8MqPHbyI1dH6MF95iTmBNxEQNc4ek2PjKhRVuA7lF6LYs7_M9hzuXW_sF7Actr-aA7hTXw6bfvsy7LjfTYtUWg
linkProvider ProQuest Ebooks
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.title=Credibilistic+programming+%3A+an+introduction+to+models+and+applications&rft.au=Li%2C+Xiang&rft.date=2013-01-01&rft.pub=Springer&rft.isbn=9783642363757&rft_id=info:doi/10.1007%2F978-3-642-36376-4&rft.externalDocID=BB1876994X
thumbnail_m http://cvtisr.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Fvle.dmmserver.com%2Fmedia%2F640%2F97836423%2F9783642363764.jpg
thumbnail_s http://cvtisr.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Fmedia.springernature.com%2Fw306%2Fspringer-static%2Fcover-hires%2Fbook%2F978-3-642-36376-4