Currently displaying 1 – 5 of 5

Showing per page

Order by Relevance | Title | Year of publication

Synthesis of membership functions to determine a radius of influence.

Vicenç Torra — 1995

Mathware and Soft Computing

In this work we study the synthesis of membership functions when they have been calculated from a set of observations according to the definition of (Zhang, 1993). The results obtained have been used to determine the radius of influence of a tramp for Podarcis lilfordi (a kind of saurians) in the island of Cabrera (Balearic Islands). The measure of this radius was used in a later work to estimate the density of these saurians in the island.

On the learning of weights in some aggregation operators: the weigthed mean and OWA operators.

Vicenç Torra — 1999

Mathware and Soft Computing

We study the determination of weights for two types of aggregation operators: the weighted mean and the OWA operator. We assume that there is at our disposal a set of examples for which the outcome of the aggregation operator is known. In the case of the OWA operator, we compare the results obtained by our method with another one in the literature. We show that the optimal weighting vector is reached with less cost.

Twofold integral and multi-step Choquet integral

Yasuo NarukawaVicenç Torra — 2004

Kybernetika

In this work we study some properties of the twofold integral and, in particular, its relation with the 2-step Choquet integral. First, we prove that the Sugeno integral can be represented as a 2-step Choquet integral. Then, we turn into the twofold integral studying some of its properties, establishing relationships between this integral and the Choquet and Sugeno ones and proving that it can be represented in terms of 2-step Choquet integral.

On the comparison of some fuzzy clustering methods for privacy preserving data mining: Towards the development of specific information loss measures

Vicenç TorraYasunori EndoSadaaki Miyamoto — 2009

Kybernetika

Policy makers and researchers require raw data collected from agencies and companies for their analysis. Nevertheless, any transmission of data to third parties should satisfy some privacy requirements in order to avoid the disclosure of sensitive information. The areas of privacy preserving data mining and statistical disclosure control develop mechanisms for ensuring data privacy. Masking methods are one of such mechanisms. With them, third parties can do computations with a limited risk of disclosure....

Page 1

Download Results (CSV)