- Full text PDF available (29)
Data Set Used
While such techniques 1 form the foundation for many contemporary software engineering practices, requirements analysis has to involve more than understanding and modeling the functions, data, and interfaces for a new system. In addition, the requirements engineer needs to explore alternatives and evaluate their feasibility and desirability with respect to… (More)
Figure A1 depicts an overview of the coevolution process controlled by the proposed HCGA algorithm. The Level II (high-level) population consists of individuals representing the feasible values of the application parameters. The Level I (low-level) populations represent two sets of system parameters (i.e., two species). One of the low-level populations… (More)
—Models of fuzzy Petri net (FPN) are defined based on generating rules of knowledge base and the Petri nets semantics description of logical rules are presented. Two kinds of reasoning patterns are considered. First, the beliefs of initial propositions are known and their beliefs of noninitial propositions need to be computed. Second, the beliefs of initial… (More)
This paper proposes a model to calculate the average speed of transmission of intervehicle communication (IVC) messages in a general traffic stream on highways in the early stage of deploying distributed traffic information systems (DTIS). The model helps explain the relationship between average IVC message speed and traffic parameters such as equipped… (More)
A society of intelligent agents can work together to monitor financial transactions and yield important information regarding potential financial calamities.
Competitive Intelligence is one of the key factors for enterprise risk management and decision support. However, the functions of Competitive Intelligence are often greatly restricted by the lack of sufficient information sources about the competitors. With the emergence of Web 2.0, the large numbers of customer-generated product reviews often contain… (More)