#### Filter Results:

- Full text PDF available (7)

#### Publication Year

2000

2014

- This year (0)
- Last 5 years (3)
- Last 10 years (13)

#### Publication Type

#### Co-author

#### Journals and Conferences

#### Key Phrases

Learn More

- Jing-Shing Yao, San-Chyi Chang, Jin-Shieh Su
- Computers & OR
- 2000

In this paper, we consider the inventory problem without backorder such that both order and the total demand quantities are triangular fuzzy numbers QI "(q 1 , q 0 , q 2 ), and RI "(r 1 , r 0 , r 2 ), respectively, where q 1 "q 0 !* 1 , q 2 "q 0 #* 2 , r 1 "r 0 !* 3 , r 2 "r 0 #* 4 such that 0(* 1 (q 0 , 0(* 2 , 0(* 3 (r 0 , 0(* 4 , and r 0 is a known… (More)

- Jing-Shing Yao, Jin-Shieh Su
- European Journal of Operational Research
- 2000

- Jin-Shieh Su
- 2006

Abstract In this paper, we use interval-valued fuzzy numbers to fuzzify the crisp linear programming to three cases. The first case, we use intervalvalued fuzzy numbers to fuzzify the coefficients in the objective function. We get a linear programming in the fuzzy sense. The second case, we use interval-valued fuzzy numbers to fuzzify the coefficients akj… (More)

- Jing-Shing Yao, Jin-Shieh Su, Teng-San Shih
- J. Inf. Sci. Eng.
- 2008

In this article, we use the fuzzy concept to consider the reliability of serial system and the reliability of parallel system. Since the population reliability Rj of the subsystem Pj (j = 1, 2, ..., n) is unknown, if we use the point estimate j R to estimate Rj from the statistical data in the past, we don’t know the probability of the error j R − Rj.… (More)

In this paper, we propose an encryption algorithm to encrypt plaintext to cipher text. We apply the basic computing operations, e.g., inserting dummy symbols, rotating, transposition, shifting and complement, in the proposed algorithm to encrypt plaintext to cipher text. The cipher text contains the plaintext, relative data and tables of encryption and… (More)

- Huey-Ming Lee, Ching-Hao Mao, Yao-Jen Shih, Pin-Jen Chen, Mu-Hsiu Hsu, Jin-Shieh Su
- 2006 World Automation Congress
- 2006

Thousands of web pages rapidly expand every day, and the diversifications of web templates make us difficult to extract the contents of web pages. In this study, we proposed a classifying web page templates model based on fuzzy k-means clustering method. This model can automatically collect the web pages, generate several kinds of web pages templates,… (More)

Both seasonal demand r and total demand R in the production inventory model are difficult to estimate precisely to actual r0 and R0 values, respectively. Hence, we will set the membership grade at r0 and R0 in an interval [λ, 1], 0 < λ < 1, and then, obtain the interval-valued fuzzy sets r̃ and R̃, respectively. For each production quantity period q, we can… (More)

In this paper, we examine the reliability of a parallel system. We use the level (λ, ρ) interval-valued fuzzy numbers to find the fuzzy reliability of parallel systems and obtain the estimated reliability of the systems in the fuzzy sense by employing the signed distance method.

In this paper, we propose a performance analysis of resource allocation model for grid resources under the grid computing environment. By the proposed model, we can make all grid nodes be load-balancing. The proposed model can detect the grid nodes resource status about CPU usage and memory usage, analyze the grid nodes resources load grades, and make the… (More)

- Teng-San Shih, Jin-Shieh Su, Huey-Ming Lee
- 2009 Fourth International Conference on…
- 2009

In this paper, we use level (λ,1) interval-valued fuzzy numbers to consider the fuzzy price and the fuzzy revenue in economic problem. Using signed distance to defuzzify, we can get the demand function and revenue function in fuzzy sense. What follows is that we can find the maximum revenue in fuzzy sense.