Credibilistic programming : an introduction to models and applications
It provides fuzzy programming approach to solve real-life decision problems in fuzzy environment. Within the framework of credibility theory, it provides a self-contained, comprehensive and up-to-date presentation of fuzzy programming models, algorithms and applications in portfolio analysis.
Uloženo v:
| Hlavní autor: | |
|---|---|
| Médium: | E-kniha Kniha Publikace |
| Jazyk: | angličtina |
| Vydáno: |
Berlin, Heidelberg
Springer
2013
Springer Berlin / Heidelberg Springer Berlin Heidelberg |
| Vydání: | 1 |
| Edice: | Uncertainty and Operations Research |
| Témata: | |
| ISBN: | 364236375X, 9783642363757, 9783642427176, 3642427170, 3642363768, 9783642363764 |
| ISSN: | 2195-996X, 2195-9978 |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Abstract | It provides fuzzy programming approach to solve real-life decision problems in fuzzy environment. Within the framework of credibility theory, it provides a self-contained, comprehensive and up-to-date presentation of fuzzy programming models, algorithms and applications in portfolio analysis. |
|---|---|
| AbstractList | Preface -- Credibility Theory -- Credibilistic Programming -- Mathematical Programming -- Expected Value Model -- Chance-Constrained Programming -- Entropy Maximization Model -- Cross-Entropy Minimization Model -- Regret Minimization Model It provides fuzzy programming approach to solve real-life decision problems in fuzzy environment. Within the framework of credibility theory, it provides a self-contained, comprehensive and up-to-date presentation of fuzzy programming models, algorithms and applications in portfolio analysis. |
| Author | Li, Xiang |
| Author_xml | – sequence: 1 fullname: Li, Xiang |
| BackLink | https://cir.nii.ac.jp/crid/1130282269349595392$$DView record in CiNii http://www.econis.eu/PPNSET?PPN=165225997X$$DView this record in ZBW - Deutsche Zentralbibliothek für Wirtschaftswissenschaften |
| BookMark | eNpFkUtv3CAUhWmTVp1M8wOy86JS1YUb4PLsrh3lJUXqpqpmh8CQKYkHJsZJlH9fPI4SFheuzsdBnHuEDlNOAaETgr8TjOWplqqFVjDaggApWvYOHUFt9516jxaUaN7qih28CXx9-CqI9Ue0UIxTrjmmn9BxKbe4LiWV0HiBzldD8NHFPpYxds1uyJvBbrcxbZofjU1NTOOQ_UM3xpyaMTfb7ENfquIbu9v1sbOTUj6jDze2L-H4ZV-iv-dnf1aX7fXvi6vVz-vWMilBtB3lYJX1kjuGsbMYKLPEg3DMe-VBc_DWKXejqejqUQHnRAjtuJVOg4Yl-jYb23IXnsq_3I_FPPbB5XxXTM3hNR1W2WZmQ5dTLGY3xK0dng0RnNY8tFxX5HRGShXTJgxmNiLYTPlPhgZMtTR7TzOZfp1v1KjuH0IZzf7tLtSgbG_Ofq0IxYLUfy7Rl5lMMZouTpUQwFRRKjQwXScCmsJ_udmIng |
| ContentType | eBook Book Publication |
| Copyright | Springer-Verlag Berlin Heidelberg 2013 |
| Copyright_xml | – notice: Springer-Verlag Berlin Heidelberg 2013 |
| DBID | RYH OQ6 |
| DEWEY | 519.7 |
| DOI | 10.1007/978-3-642-36376-4 |
| DatabaseName | CiNii Complete ECONIS |
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science Business Engineering Mathematics Applied Sciences Economics |
| EISBN | 3642363768 9783642363764 |
| EISSN | 2195-9978 |
| Edition | 1 2013 2013. |
| ExternalDocumentID | 9783642363764 165225997X 312183 EBC1206125 BB1876994X |
| GroupedDBID | -JU -K2 089 0D3 0DA 20A 38. A4J AABBV AARVG AAUFL ABARN ABFTD ABINL ABMLC ABMNI ABQPQ ABXPP ACBPT ACLGV ADNEN ADVEM AEKFX AERYV AETDV AEZAY AFJMS AFVVK AHWGJ AJFER ALMA_UNASSIGNED_HOLDINGS AUKZS AZZ BBABE CZZ I4C IEZ JJU MA. RYH SBO TPJZQ Z7R Z7W Z7X Z7Y Z81 Z83 Z87 OQ6 Z7U Z7Z |
| ID | FETCH-LOGICAL-a47736-c253a8ad75b400ba0324a1d36b4dd8d3953dab8bf926c3da83551669b5a7b9393 |
| ISBN | 364236375X 9783642363757 9783642427176 3642427170 3642363768 9783642363764 |
| ISSN | 2195-996X |
| IngestDate | Fri Nov 08 02:59:36 EST 2024 Sun Jul 20 07:24:27 EDT 2025 Fri May 23 03:11:38 EDT 2025 Wed Dec 10 13:45:31 EST 2025 Thu Jun 26 23:16:43 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | false |
| LCCallNum_Ident | T57.6-.97 |
| Language | English |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-a47736-c253a8ad75b400ba0324a1d36b4dd8d3953dab8bf926c3da83551669b5a7b9393 |
| Notes | Includes bibliographical references and index |
| OCLC | 845259502 |
| PQID | EBC1206125 |
| PageCount | 147 |
| ParticipantIDs | askewsholts_vlebooks_9783642363764 econis_primary_165225997X springer_books_10_1007_978_3_642_36376_4 proquest_ebookcentral_EBC1206125 nii_cinii_1130282269349595392 |
| PublicationCentury | 2000 |
| PublicationDate | c2013 2013 2013-03-29 |
| PublicationDateYYYYMMDD | 2013-01-01 2013-03-29 |
| PublicationDate_xml | – year: 2013 text: 2013 |
| PublicationDecade | 2010 |
| PublicationPlace | Berlin, Heidelberg |
| PublicationPlace_xml | – name: Berlin – name: Berlin, Heidelberg |
| PublicationSeriesTitle | Uncertainty and Operations Research |
| PublicationSeriesTitleAlternate | Uncertainty and Operations Research |
| PublicationYear | 2013 |
| Publisher | Springer Springer Berlin / Heidelberg Springer Berlin Heidelberg |
| Publisher_xml | – name: Springer – name: Springer Berlin / Heidelberg – name: Springer Berlin Heidelberg |
| SSID | ssj0000878690 ssib012963958 |
| Score | 1.9534656 |
| Snippet | Preface -- Credibility Theory -- Credibilistic Programming -- Mathematical Programming -- Expected Value Model -- Chance-Constrained Programming -- Entropy... It provides fuzzy programming approach to solve real-life decision problems in fuzzy environment. Within the framework of credibility theory, it provides a... |
| SourceID | askewsholts econis springer proquest nii |
| SourceType | Aggregation Database Index Database Publisher |
| SubjectTerms | Artificial Intelligence Business and Management Economics Economics/Management Science Fuzzy-Set-Theorie Glaubwürdigkeit Industrial management Mathematics Mathematics, general Mathematische Optimierung Operations research Operations Research/Decision Theory Portfolio-Management Programming languages (Electronic computers) Theorie |
| TableOfContents | Intro -- Credibilistic Programming -- Preface -- Acknowledgment -- Contents -- List of Frequently Used Symbols -- Chapter 1: Credibility Theory -- 1.1 Credibility Measure -- 1.2 Credibility Space -- 1.3 Fuzzy Variable -- 1.4 Credibility Function -- 1.5 Independence -- 1.6 Identical Distribution -- References -- Chapter 2: Credibilistic Programming -- 2.1 Mathematical Programming -- 2.1.1 Single-Objective Programming -- 2.1.2 Multi-Objective Programming -- 2.2 Credibilistic Programming -- 2.3 Genetic Algorithm -- 2.3.1 Representation Structure -- 2.3.2 Initialization -- 2.3.3 Evaluation Function -- 2.3.4 Selection Process -- 2.3.5 Crossover Operation -- 2.3.6 Mutation Operation -- 2.3.7 General Procedure -- References -- Chapter 3: Expected Value Model -- 3.1 Expected Value -- 3.2 Expected Value Model -- 3.3 Fuzzy Simulation -- 3.4 Applications -- References -- Chapter 4: Chance-Constrained Programming Model -- 4.1 Optimistic Value -- 4.2 Pessimistic Value -- 4.3 Chance-Constrained Programming Model -- 4.4 Fuzzy Simulation -- 4.4.1 Optimistic Value Simulation -- 4.4.2 Pessimistic Value Simulation -- 4.5 Applications -- References -- Chapter 5: Entropy Optimization Model -- 5.1 Entropy -- 5.2 Maximum Entropy Principle -- 5.3 Entropy Optimization Model -- 5.4 Fuzzy Simulation -- 5.5 Applications -- References -- Chapter 6: Cross-Entropy Minimization Model -- 6.1 Cross-Entropy -- 6.2 Minimum Cross-Entropy Principle -- 6.3 Cross-Entropy Minimization Model -- 6.4 Fuzzy Simulation -- 6.5 Applications -- References -- Chapter 7: Regret Minimization Model -- 7.1 Distance -- 7.2 Regret Minimization Model -- 7.3 Fuzzy Simulation -- 7.4 Applications -- References -- Index |
| Title | Credibilistic programming : an introduction to models and applications |
| URI | https://cir.nii.ac.jp/crid/1130282269349595392 https://ebookcentral.proquest.com/lib/[SITE_ID]/detail.action?docID=1206125 http://link.springer.com/10.1007/978-3-642-36376-4 http://www.econis.eu/PPNSET?PPN=165225997X https://www.vlebooks.com/vleweb/product/openreader?id=none&isbn=9783642363764&uid=none |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3Ni9QwFH84o4h7UVfFqitBPHgptJM0abw5yy6CsgiuS_ESkqaVQe0u07rsn-9Lmsy260E8eMlk2pKE90tfX94nwOvSWFYInaWsaHXKamtTI9o2Za1krKl50_piMGcfxclJWVXyUyhp2PtyAqLryqsrefFfocZrCLYLnf0HuHeD4gXsI-jYIuzY3pCId39DooEtfoicr6tLvRwdr356VYCLaHYujcOY39VBjjKnr4Iz5mie2rF3Pjre0F_h_vk21Q24Og0z3UDUDc7OjBRPHJRTMeaF_oODTp0m8MnUPcpDIM48MfV6nSMrlZJVC1gIjiff2---fPj6eafiykrh6l25iJo4Z8h5dL2GaGgOuX5nc-7Bnu6_I6_H78DQu0iwGvkcdhbdZjM7EdwwYnvZ4PQBLF28yEO41XT7cDcGEuzD_VgwgwT--QiOZxCRCUTkLdEdmQJEhnMyAoR3LJkC9BjOjo9OD9-noZBFqpkQlKf1qqC61FYUBnmm0RmKsTq3lBtmbWmpLKjVpjStXPEauygWFznn0hRaGEklfQLL7rxrngKprXBSfoMvVMNynUkjRWtbHB5_bJYn8GpCNHX5wxvdezWhOmcJJCMt1cWY00TlHAXxQkpRJXCA5FX1xrW5s2ujDMklxZM0LlOuEiCR8MqPHbyI1dH6MF95iTmBNxEQNc4ek2PjKhRVuA7lF6LYs7_M9hzuXW_sF7Actr-aA7hTXw6bfvsy7LjfTYtUWg |
| linkProvider | ProQuest Ebooks |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.title=Credibilistic+programming+%3A+an+introduction+to+models+and+applications&rft.au=Li%2C+Xiang&rft.date=2013-01-01&rft.pub=Springer&rft.isbn=9783642363757&rft_id=info:doi/10.1007%2F978-3-642-36376-4&rft.externalDocID=BB1876994X |
| thumbnail_m | http://cvtisr.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Fvle.dmmserver.com%2Fmedia%2F640%2F97836423%2F9783642363764.jpg |
| thumbnail_s | http://cvtisr.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Fmedia.springernature.com%2Fw306%2Fspringer-static%2Fcover-hires%2Fbook%2F978-3-642-36376-4 |

