Peter Deng - Academia.edu (original) (raw)
Papers by Peter Deng
Journal of Interdisciplinary Mathematics, 2001
ABSTRACT Cohen has set an inventory model of joint pricing and ordering policy for exponentially ... more ABSTRACT Cohen has set an inventory model of joint pricing and ordering policy for exponentially deteriorating inventory with deterministic demand. Many researches were made base on this model. Among them is a paper, titled Joint Pricing and Ordering Policy for Deteriorating Inventory Systems, by Chung and Huang recently published in the International Journal of Operations and Quantitative Management. They gave two open questions in their paper: one of them is to find optimal ordering policy without any extra condition. In this paper we try to answer this question. A comparison of our result with that of Chung and Huang reveals that our search interval is smaller. A numerical example is offered to illustrate our solution procedure.
International Journal of Information and Management Sciences
We consider inventory models with ramp type demand for items with Weibull deterioration. J.-W. Wu... more We consider inventory models with ramp type demand for items with Weibull deterioration. J.-W. Wu et al. [Int. J. Inf. Manage. Sci. 10, No. 3, 41–51 (1999; Zbl 0963.90009)] have studied these models and made excellent extensions. However, their paper contains an unnecessary condition to insure the existence of the minimum solution and only investigated the case that the inventory cycle time is longer than the period during which demand is in the increasing cycle. The purpose of this paper is twofold. First, we solve their model without the unnecessary condition. Second, we consider the general case to find the minimum solution. We offer numerical examples to illustrate our findings such that our proposed improvement indeed saves money.
Yugoslav Journal of Operations Research, 2014
Scripta Materialia, 2006
ABSTRACT This article recalculates the correction factor for estimating the diameter of aligned c... more ABSTRACT This article recalculates the correction factor for estimating the diameter of aligned cylindrical fibres from random metallographic sections as put forward in the paper of Lewis and Withers [Acta Metall. Mater. 43 (1995) 3685]. Their assertion may contain typographic and arithmetic errors (leading to an error of a factor of 2). The diameter must be estimated from longitudinal metallographic sections where the fibre diameters are partially embedded and therefore cannot be measured directly. In view of the high level of citations of the original paper, it is important to address this problem accurately and completely to ensure the successful application of their suggested method by others. The purpose of this short note is to correct their results.
Applied Mathematics and Computation, 2013
Julian, Hung and Lin recently published a paper in Pattern Recognition Letters 33 1219-1223 discu... more Julian, Hung and Lin recently published a paper in Pattern Recognition Letters 33 1219-1223 discussing the similarity measures of . However, after careful analysis we have found that the theorem in their paper is incomplete. In this paper, we will first point out the incomplete theorem. Second, we will provide a patch work to prove that the distance with the weighted function derived by one-norm is less than that derived by twonorm. Third, we will show that their original problem is only a corollary of Jensen's inequality (1906). Our findings will help researchers develop more reasonable similarity measures and its application to pattern recognition under fuzzy intuitionistic set environment.
Applied Mathematical Modelling, 2013
ABSTRACT This paper is a consequence for a paper of Lin et al. [S.W. Lin, Y.W. Wou, P. Julian, No... more ABSTRACT This paper is a consequence for a paper of Lin et al. [S.W. Lin, Y.W. Wou, P. Julian, Note on minimax distribution free procedure for integrated inventory model with defective goods and stochastic lead time demand, Appl. Math. Model. 35 (2011) 2087–2093]. We simplified their complicated solution procedure and then presented a revision to patch their negligence for the boundary minimums. Numerical examples are provided to demonstrate our findings.
IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings., 2003
... The first is called virus which always infect other benign programs. The second is called Tro... more ... The first is called virus which always infect other benign programs. The second is called Trojan which always masquerade its malicious executable ... [I31 Dmitry Gryaznov, Scanners of the Year 2000: Heuristics, Proceedings of the 5rh International Virus Bulletin, 1999. [ 141R. ...
Journal of Transportation Engineering, 2014
International Journal of Information and Management Sciences, 2007
... stochastic lead time. Auteur(s) / Author(s). LAN Chun-Hsiung (1) ; YU Yen-Chieh (1) ; LIN Rob... more ... stochastic lead time. Auteur(s) / Author(s). LAN Chun-Hsiung (1) ; YU Yen-Chieh (1) ; LIN Robert H.-J. (2) ; TUNG Cheng-Tan (3) ; YEN Chih-Pin (4) ; DENG Peter Shaohua (3) ; Affiliation(s) du ou des auteurs / Author(s) Affiliation(s). ...
International Journal of Information and Management Sciences, 2006
Abstract⎯In a recent paper of , he predicted that if the relative weight of two alternatives were... more Abstract⎯In a recent paper of , he predicted that if the relative weight of two alternatives were overestimated as demonstrably more important than another then the restriction of the range for the scales would reduce the error from inflating the ratio. In this paper, we will use the sum of square residues between the normalized principal right vectors to show that the Murphy's prediction is questionable. Our method provides a suggestion to explore the properties of eigenvectors.
Lecture Notes in Computer Science, 2003
The process of establishing an association between crime scene and criminal has been an important... more The process of establishing an association between crime scene and criminal has been an important task in crime investigation. For example, forensic experts usually search crime scene for physical evidences, such as fingerprints, to identify links between crime scene ...
International Journal of Information and Management Sciences
IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings., 2003
Malicious executables are computer programs, which may cause damages or inconveniences for comput... more Malicious executables are computer programs, which may cause damages or inconveniences for computer users when they are executed. Virus is one of the major kinds of malicious programs, which attach themselves to others and usually get executed before the host programs. They can be easily planted into computer systems by hackers, or simply down loaded and executed by naive users while they are browsing the web or reading E-mails. They often damage its host computer system, such as destroying data and spoiling system software when they are executed. Thus, to detect computer viruses before they get executed is a very important issue. Current detection methods are mainly based on pattern scanning algorithms. However, they are unable to detect unknown viruses. In this paper. an automatic heuristic method to detect unknown computer virus based on data mining techniques, namely Decision Tree and NaCw Buyesian network algorithms, is proposed and experiments are c e e d to evaluate the effectiveness the proposed approach.
IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings., 2003
Page 1. A Robust Method for Software Self-defense ++ Peter Shaohua Den; Wen-Gong Shieh* lau-Hwmg ... more Page 1. A Robust Method for Software Self-defense ++ Peter Shaohua Den; Wen-Gong Shieh* lau-Hwmg Wang Cheng-Tan T unc Chih-Pin Yen*+ ... That is, we can store a digital signature, H(IP), in the code I. Where H is a hash function and IP is the protected program. ...
The Engineering Economist, 2004
In 1993, Moon and Yun [8] developed a finite planning horizon economic order quantity (EOQ) model... more In 1993, Moon and Yun [8] developed a finite planning horizon economic order quantity (EOQ) model by using the Discounted Cash Flow approach. Chung and Lin [3] then improved Moon and Yun's solution by introducing a pair of closer lower and upper bounds and bisection algorithm. To avoid the unnecessary and time-consuming numerical computations, we propose a novel approach in
Journal of the Operational Research Society, 2005
Journal of Information and Optimization Sciences, 2005
ABSTRACT A precise approach is used to extend and analyze the article published by G. Padmanabhan... more ABSTRACT A precise approach is used to extend and analyze the article published by G. Padmanabhan and P. Vrat, Int. J. Syst. Sci. 21, No. 8, 1721–1726 (1990; Zbl 0715.90038). Utilizing this approach, we develop a criterion for existence and uniqueness of the optimal solution of the total cost function. If the criterion cannot be satisfied, this model degenerate to an inventory model with one cycle. In such case, the article shows that a longer stock shortage time would lower the total cost. Therefore, we evaluate the cost variation under different allotted times to provide decision-makers with strategies to balance the time and cost. We present illustrations to demonstrate the exactness of this process.
Journal of Interdisciplinary Mathematics, 2001
ABSTRACT Cohen has set an inventory model of joint pricing and ordering policy for exponentially ... more ABSTRACT Cohen has set an inventory model of joint pricing and ordering policy for exponentially deteriorating inventory with deterministic demand. Many researches were made base on this model. Among them is a paper, titled Joint Pricing and Ordering Policy for Deteriorating Inventory Systems, by Chung and Huang recently published in the International Journal of Operations and Quantitative Management. They gave two open questions in their paper: one of them is to find optimal ordering policy without any extra condition. In this paper we try to answer this question. A comparison of our result with that of Chung and Huang reveals that our search interval is smaller. A numerical example is offered to illustrate our solution procedure.
International Journal of Information and Management Sciences
We consider inventory models with ramp type demand for items with Weibull deterioration. J.-W. Wu... more We consider inventory models with ramp type demand for items with Weibull deterioration. J.-W. Wu et al. [Int. J. Inf. Manage. Sci. 10, No. 3, 41–51 (1999; Zbl 0963.90009)] have studied these models and made excellent extensions. However, their paper contains an unnecessary condition to insure the existence of the minimum solution and only investigated the case that the inventory cycle time is longer than the period during which demand is in the increasing cycle. The purpose of this paper is twofold. First, we solve their model without the unnecessary condition. Second, we consider the general case to find the minimum solution. We offer numerical examples to illustrate our findings such that our proposed improvement indeed saves money.
Yugoslav Journal of Operations Research, 2014
Scripta Materialia, 2006
ABSTRACT This article recalculates the correction factor for estimating the diameter of aligned c... more ABSTRACT This article recalculates the correction factor for estimating the diameter of aligned cylindrical fibres from random metallographic sections as put forward in the paper of Lewis and Withers [Acta Metall. Mater. 43 (1995) 3685]. Their assertion may contain typographic and arithmetic errors (leading to an error of a factor of 2). The diameter must be estimated from longitudinal metallographic sections where the fibre diameters are partially embedded and therefore cannot be measured directly. In view of the high level of citations of the original paper, it is important to address this problem accurately and completely to ensure the successful application of their suggested method by others. The purpose of this short note is to correct their results.
Applied Mathematics and Computation, 2013
Julian, Hung and Lin recently published a paper in Pattern Recognition Letters 33 1219-1223 discu... more Julian, Hung and Lin recently published a paper in Pattern Recognition Letters 33 1219-1223 discussing the similarity measures of . However, after careful analysis we have found that the theorem in their paper is incomplete. In this paper, we will first point out the incomplete theorem. Second, we will provide a patch work to prove that the distance with the weighted function derived by one-norm is less than that derived by twonorm. Third, we will show that their original problem is only a corollary of Jensen's inequality (1906). Our findings will help researchers develop more reasonable similarity measures and its application to pattern recognition under fuzzy intuitionistic set environment.
Applied Mathematical Modelling, 2013
ABSTRACT This paper is a consequence for a paper of Lin et al. [S.W. Lin, Y.W. Wou, P. Julian, No... more ABSTRACT This paper is a consequence for a paper of Lin et al. [S.W. Lin, Y.W. Wou, P. Julian, Note on minimax distribution free procedure for integrated inventory model with defective goods and stochastic lead time demand, Appl. Math. Model. 35 (2011) 2087–2093]. We simplified their complicated solution procedure and then presented a revision to patch their negligence for the boundary minimums. Numerical examples are provided to demonstrate our findings.
IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings., 2003
... The first is called virus which always infect other benign programs. The second is called Tro... more ... The first is called virus which always infect other benign programs. The second is called Trojan which always masquerade its malicious executable ... [I31 Dmitry Gryaznov, Scanners of the Year 2000: Heuristics, Proceedings of the 5rh International Virus Bulletin, 1999. [ 141R. ...
Journal of Transportation Engineering, 2014
International Journal of Information and Management Sciences, 2007
... stochastic lead time. Auteur(s) / Author(s). LAN Chun-Hsiung (1) ; YU Yen-Chieh (1) ; LIN Rob... more ... stochastic lead time. Auteur(s) / Author(s). LAN Chun-Hsiung (1) ; YU Yen-Chieh (1) ; LIN Robert H.-J. (2) ; TUNG Cheng-Tan (3) ; YEN Chih-Pin (4) ; DENG Peter Shaohua (3) ; Affiliation(s) du ou des auteurs / Author(s) Affiliation(s). ...
International Journal of Information and Management Sciences, 2006
Abstract⎯In a recent paper of , he predicted that if the relative weight of two alternatives were... more Abstract⎯In a recent paper of , he predicted that if the relative weight of two alternatives were overestimated as demonstrably more important than another then the restriction of the range for the scales would reduce the error from inflating the ratio. In this paper, we will use the sum of square residues between the normalized principal right vectors to show that the Murphy's prediction is questionable. Our method provides a suggestion to explore the properties of eigenvectors.
Lecture Notes in Computer Science, 2003
The process of establishing an association between crime scene and criminal has been an important... more The process of establishing an association between crime scene and criminal has been an important task in crime investigation. For example, forensic experts usually search crime scene for physical evidences, such as fingerprints, to identify links between crime scene ...
International Journal of Information and Management Sciences
IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings., 2003
Malicious executables are computer programs, which may cause damages or inconveniences for comput... more Malicious executables are computer programs, which may cause damages or inconveniences for computer users when they are executed. Virus is one of the major kinds of malicious programs, which attach themselves to others and usually get executed before the host programs. They can be easily planted into computer systems by hackers, or simply down loaded and executed by naive users while they are browsing the web or reading E-mails. They often damage its host computer system, such as destroying data and spoiling system software when they are executed. Thus, to detect computer viruses before they get executed is a very important issue. Current detection methods are mainly based on pattern scanning algorithms. However, they are unable to detect unknown viruses. In this paper. an automatic heuristic method to detect unknown computer virus based on data mining techniques, namely Decision Tree and NaCw Buyesian network algorithms, is proposed and experiments are c e e d to evaluate the effectiveness the proposed approach.
IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings., 2003
Page 1. A Robust Method for Software Self-defense ++ Peter Shaohua Den; Wen-Gong Shieh* lau-Hwmg ... more Page 1. A Robust Method for Software Self-defense ++ Peter Shaohua Den; Wen-Gong Shieh* lau-Hwmg Wang Cheng-Tan T unc Chih-Pin Yen*+ ... That is, we can store a digital signature, H(IP), in the code I. Where H is a hash function and IP is the protected program. ...
The Engineering Economist, 2004
In 1993, Moon and Yun [8] developed a finite planning horizon economic order quantity (EOQ) model... more In 1993, Moon and Yun [8] developed a finite planning horizon economic order quantity (EOQ) model by using the Discounted Cash Flow approach. Chung and Lin [3] then improved Moon and Yun's solution by introducing a pair of closer lower and upper bounds and bisection algorithm. To avoid the unnecessary and time-consuming numerical computations, we propose a novel approach in
Journal of the Operational Research Society, 2005
Journal of Information and Optimization Sciences, 2005
ABSTRACT A precise approach is used to extend and analyze the article published by G. Padmanabhan... more ABSTRACT A precise approach is used to extend and analyze the article published by G. Padmanabhan and P. Vrat, Int. J. Syst. Sci. 21, No. 8, 1721–1726 (1990; Zbl 0715.90038). Utilizing this approach, we develop a criterion for existence and uniqueness of the optimal solution of the total cost function. If the criterion cannot be satisfied, this model degenerate to an inventory model with one cycle. In such case, the article shows that a longer stock shortage time would lower the total cost. Therefore, we evaluate the cost variation under different allotted times to provide decision-makers with strategies to balance the time and cost. We present illustrations to demonstrate the exactness of this process.