Peter Deng - Academia.edu (original) (raw)

Papers by Peter Deng

Research paper thumbnail of Cohen’s inventory model revisited

Journal of Interdisciplinary Mathematics, 2001

ABSTRACT Cohen has set an inventory model of joint pricing and ordering policy for exponentially ... more ABSTRACT Cohen has set an inventory model of joint pricing and ordering policy for exponentially deteriorating inventory with deterministic demand. Many researches were made base on this model. Among them is a paper, titled Joint Pricing and Ordering Policy for Deteriorating Inventory Systems, by Chung and Huang recently published in the International Journal of Operations and Quantitative Management. They gave two open questions in their paper: one of them is to find optimal ordering policy without any extra condition. In this paper we try to answer this question. A comparison of our result with that of Chung and Huang reveals that our search interval is smaller. A numerical example is offered to illustrate our solution procedure.

Research paper thumbnail of Improved inventory models with ramp type demand and Weibull deterioration

International Journal of Information and Management Sciences

We consider inventory models with ramp type demand for items with Weibull deterioration. J.-W. Wu... more We consider inventory models with ramp type demand for items with Weibull deterioration. J.-W. Wu et al. [Int. J. Inf. Manage. Sci. 10, No. 3, 41–51 (1999; Zbl 0963.90009)] have studied these models and made excellent extensions. However, their paper contains an unnecessary condition to insure the existence of the minimum solution and only investigated the case that the inventory cycle time is longer than the period during which demand is in the increasing cycle. The purpose of this paper is twofold. First, we solve their model without the unnecessary condition. Second, we consider the general case to find the minimum solution. We offer numerical examples to illustrate our findings such that our proposed improvement indeed saves money.

Research paper thumbnail of Note on inventory models with a permissible delay in payments

Yugoslav Journal of Operations Research, 2014

Research paper thumbnail of Note on correction factor for estimating the diameter of embedded cylindrical fibres from metallographic sections

Scripta Materialia, 2006

ABSTRACT This article recalculates the correction factor for estimating the diameter of aligned c... more ABSTRACT This article recalculates the correction factor for estimating the diameter of aligned cylindrical fibres from random metallographic sections as put forward in the paper of Lewis and Withers [Acta Metall. Mater. 43 (1995) 3685]. Their assertion may contain typographic and arithmetic errors (leading to an error of a factor of 2). The diameter must be estimated from longitudinal metallographic sections where the fibre diameters are partially embedded and therefore cannot be measured directly. In view of the high level of citations of the original paper, it is important to address this problem accurately and completely to ensure the successful application of their suggested method by others. The purpose of this short note is to correct their results.

Research paper thumbnail of Analysis on comparison of distances derived by one-norm and two-norm with weight functions

Applied Mathematics and Computation, 2013

Julian, Hung and Lin recently published a paper in Pattern Recognition Letters 33 1219-1223 discu... more Julian, Hung and Lin recently published a paper in Pattern Recognition Letters 33 1219-1223 discussing the similarity measures of . However, after careful analysis we have found that the theorem in their paper is incomplete. In this paper, we will first point out the incomplete theorem. Second, we will provide a patch work to prove that the distance with the weighted function derived by one-norm is less than that derived by twonorm. Third, we will show that their original problem is only a corollary of Jensen's inequality (1906). Our findings will help researchers develop more reasonable similarity measures and its application to pattern recognition under fuzzy intuitionistic set environment.

Research paper thumbnail of Improved solution for inventory model with defective goods

Applied Mathematical Modelling, 2013

ABSTRACT This paper is a consequence for a paper of Lin et al. [S.W. Lin, Y.W. Wou, P. Julian, No... more ABSTRACT This paper is a consequence for a paper of Lin et al. [S.W. Lin, Y.W. Wou, P. Julian, Note on minimax distribution free procedure for integrated inventory model with defective goods and stochastic lead time demand, Appl. Math. Model. 35 (2011) 2087–2093]. We simplified their complicated solution procedure and then presented a revision to patch their negligence for the boundary minimums. Numerical examples are provided to demonstrate our findings.

Research paper thumbnail of MCE-based face recognition

Research paper thumbnail of Intelligent automatic malicious code signatures extraction

IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings., 2003

... The first is called virus which always infect other benign programs. The second is called Tro... more ... The first is called virus which always infect other benign programs. The second is called Trojan which always masquerade its malicious executable ... [I31 Dmitry Gryaznov, “Scanners of the Year 2000: Heuristics”, Proceedings of the 5rh International Virus Bulletin, 1999. [ 141R. ...

Research paper thumbnail of Improved Analytic Model of the Optimum Dimensions Designated for Transit Bus Service Zones

Journal of Transportation Engineering, 2014

Research paper thumbnail of Wavelet-based Off-line Signature Verification

Research paper thumbnail of A Note on the Improved Algebraic Method for the EPQ Model with Stochastic Lead Time

International Journal of Information and Management Sciences, 2007

... stochastic lead time. Auteur(s) / Author(s). LAN Chun-Hsiung (1) ; YU Yen-Chieh (1) ; LIN Rob... more ... stochastic lead time. Auteur(s) / Author(s). LAN Chun-Hsiung (1) ; YU Yen-Chieh (1) ; LIN Robert H.-J. (2) ; TUNG Cheng-Tan (3) ; YEN Chih-Pin (4) ; DENG Peter Shaohua (3) ; Affiliation(s) du ou des auteurs / Author(s) Affiliation(s). ...

Research paper thumbnail of A technical note for the deteriorating inventory model with exponential time-varying demand and partial backlogging

International Journal of Information and Management Sciences, 2006

Research paper thumbnail of Estimation of Priority Vectors

Abstract⎯In a recent paper of , he predicted that if the relative weight of two alternatives were... more Abstract⎯In a recent paper of , he predicted that if the relative weight of two alternatives were overestimated as demonstrably more important than another then the restriction of the range for the scales would reduce the error from inflating the ratio. In this paper, we will use the sum of square residues between the normalized principal right vectors to show that the Murphy's prediction is questionable. Our method provides a suggestion to explore the properties of eigenvectors.

Research paper thumbnail of Criminal Record Matching Based on the Vector Space Model

Lecture Notes in Computer Science, 2003

The process of establishing an association between crime scene and criminal has been an important... more The process of establishing an association between crime scene and criminal has been an important task in crime investigation. For example, forensic experts usually search crime scene for physical evidences, such as fingerprints, to identify links between crime scene ...

Research paper thumbnail of The criterion for the optimal solution of inventory model with stock-dependent consumption rate

International Journal of Information and Management Sciences

Research paper thumbnail of Virus detection using data mining techinques

IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings., 2003

Malicious executables are computer programs, which may cause damages or inconveniences for comput... more Malicious executables are computer programs, which may cause damages or inconveniences for computer users when they are executed. Virus is one of the major kinds of malicious programs, which attach themselves to others and usually get executed before the host programs. They can be easily planted into computer systems by hackers, or simply down loaded and executed by naive users while they are browsing the web or reading E-mails. They often damage its host computer system, such as destroying data and spoiling system software when they are executed. Thus, to detect computer viruses before they get executed is a very important issue. Current detection methods are mainly based on pattern scanning algorithms. However, they are unable to detect unknown viruses. In this paper. an automatic heuristic method to detect unknown computer virus based on data mining techniques, namely Decision Tree and NaCw Buyesian network algorithms, is proposed and experiments are c e e d to evaluate the effectiveness the proposed approach.

Research paper thumbnail of A robust method for software self-defense

IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings., 2003

Page 1. A Robust Method for Software Self-defense ++ Peter Shaohua Den; Wen-Gong Shieh* lau-Hwmg ... more Page 1. A Robust Method for Software Self-defense ++ Peter Shaohua Den; Wen-Gong Shieh* lau-Hwmg Wang Cheng-Tan T unc Chih-Pin Yen*+ ... That is, we can store a digital signature, H(IP), in the code I. Where H is a hash function and IP is the protected program. ...

Research paper thumbnail of Technical Note: Approximation Solution for the Inventory Model with Random Planning Horizon

The Engineering Economist, 2004

In 1993, Moon and Yun [8] developed a finite planning horizon economic order quantity (EOQ) model... more In 1993, Moon and Yun [8] developed a finite planning horizon economic order quantity (EOQ) model by using the Discounted Cash Flow approach. Chung and Lin [3] then improved Moon and Yun's solution by introducing a pair of closer lower and upper bounds and bisection algorithm. To avoid the unnecessary and time-consuming numerical computations, we propose a novel approach in

Research paper thumbnail of Fitting Lanchester's square law to the Ardennes Campaign

Journal of the Operational Research Society, 2005

Research paper thumbnail of Analytic inventory model with a mixture of back orders and lost sales

Journal of Information and Optimization Sciences, 2005

ABSTRACT A precise approach is used to extend and analyze the article published by G. Padmanabhan... more ABSTRACT A precise approach is used to extend and analyze the article published by G. Padmanabhan and P. Vrat, Int. J. Syst. Sci. 21, No. 8, 1721–1726 (1990; Zbl 0715.90038). Utilizing this approach, we develop a criterion for existence and uniqueness of the optimal solution of the total cost function. If the criterion cannot be satisfied, this model degenerate to an inventory model with one cycle. In such case, the article shows that a longer stock shortage time would lower the total cost. Therefore, we evaluate the cost variation under different allotted times to provide decision-makers with strategies to balance the time and cost. We present illustrations to demonstrate the exactness of this process.

Research paper thumbnail of Cohen’s inventory model revisited

Journal of Interdisciplinary Mathematics, 2001

ABSTRACT Cohen has set an inventory model of joint pricing and ordering policy for exponentially ... more ABSTRACT Cohen has set an inventory model of joint pricing and ordering policy for exponentially deteriorating inventory with deterministic demand. Many researches were made base on this model. Among them is a paper, titled Joint Pricing and Ordering Policy for Deteriorating Inventory Systems, by Chung and Huang recently published in the International Journal of Operations and Quantitative Management. They gave two open questions in their paper: one of them is to find optimal ordering policy without any extra condition. In this paper we try to answer this question. A comparison of our result with that of Chung and Huang reveals that our search interval is smaller. A numerical example is offered to illustrate our solution procedure.

Research paper thumbnail of Improved inventory models with ramp type demand and Weibull deterioration

International Journal of Information and Management Sciences

We consider inventory models with ramp type demand for items with Weibull deterioration. J.-W. Wu... more We consider inventory models with ramp type demand for items with Weibull deterioration. J.-W. Wu et al. [Int. J. Inf. Manage. Sci. 10, No. 3, 41–51 (1999; Zbl 0963.90009)] have studied these models and made excellent extensions. However, their paper contains an unnecessary condition to insure the existence of the minimum solution and only investigated the case that the inventory cycle time is longer than the period during which demand is in the increasing cycle. The purpose of this paper is twofold. First, we solve their model without the unnecessary condition. Second, we consider the general case to find the minimum solution. We offer numerical examples to illustrate our findings such that our proposed improvement indeed saves money.

Research paper thumbnail of Note on inventory models with a permissible delay in payments

Yugoslav Journal of Operations Research, 2014

Research paper thumbnail of Note on correction factor for estimating the diameter of embedded cylindrical fibres from metallographic sections

Scripta Materialia, 2006

ABSTRACT This article recalculates the correction factor for estimating the diameter of aligned c... more ABSTRACT This article recalculates the correction factor for estimating the diameter of aligned cylindrical fibres from random metallographic sections as put forward in the paper of Lewis and Withers [Acta Metall. Mater. 43 (1995) 3685]. Their assertion may contain typographic and arithmetic errors (leading to an error of a factor of 2). The diameter must be estimated from longitudinal metallographic sections where the fibre diameters are partially embedded and therefore cannot be measured directly. In view of the high level of citations of the original paper, it is important to address this problem accurately and completely to ensure the successful application of their suggested method by others. The purpose of this short note is to correct their results.

Research paper thumbnail of Analysis on comparison of distances derived by one-norm and two-norm with weight functions

Applied Mathematics and Computation, 2013

Julian, Hung and Lin recently published a paper in Pattern Recognition Letters 33 1219-1223 discu... more Julian, Hung and Lin recently published a paper in Pattern Recognition Letters 33 1219-1223 discussing the similarity measures of . However, after careful analysis we have found that the theorem in their paper is incomplete. In this paper, we will first point out the incomplete theorem. Second, we will provide a patch work to prove that the distance with the weighted function derived by one-norm is less than that derived by twonorm. Third, we will show that their original problem is only a corollary of Jensen's inequality (1906). Our findings will help researchers develop more reasonable similarity measures and its application to pattern recognition under fuzzy intuitionistic set environment.

Research paper thumbnail of Improved solution for inventory model with defective goods

Applied Mathematical Modelling, 2013

ABSTRACT This paper is a consequence for a paper of Lin et al. [S.W. Lin, Y.W. Wou, P. Julian, No... more ABSTRACT This paper is a consequence for a paper of Lin et al. [S.W. Lin, Y.W. Wou, P. Julian, Note on minimax distribution free procedure for integrated inventory model with defective goods and stochastic lead time demand, Appl. Math. Model. 35 (2011) 2087–2093]. We simplified their complicated solution procedure and then presented a revision to patch their negligence for the boundary minimums. Numerical examples are provided to demonstrate our findings.

Research paper thumbnail of MCE-based face recognition

Research paper thumbnail of Intelligent automatic malicious code signatures extraction

IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings., 2003

... The first is called virus which always infect other benign programs. The second is called Tro... more ... The first is called virus which always infect other benign programs. The second is called Trojan which always masquerade its malicious executable ... [I31 Dmitry Gryaznov, “Scanners of the Year 2000: Heuristics”, Proceedings of the 5rh International Virus Bulletin, 1999. [ 141R. ...

Research paper thumbnail of Improved Analytic Model of the Optimum Dimensions Designated for Transit Bus Service Zones

Journal of Transportation Engineering, 2014

Research paper thumbnail of Wavelet-based Off-line Signature Verification

Research paper thumbnail of A Note on the Improved Algebraic Method for the EPQ Model with Stochastic Lead Time

International Journal of Information and Management Sciences, 2007

... stochastic lead time. Auteur(s) / Author(s). LAN Chun-Hsiung (1) ; YU Yen-Chieh (1) ; LIN Rob... more ... stochastic lead time. Auteur(s) / Author(s). LAN Chun-Hsiung (1) ; YU Yen-Chieh (1) ; LIN Robert H.-J. (2) ; TUNG Cheng-Tan (3) ; YEN Chih-Pin (4) ; DENG Peter Shaohua (3) ; Affiliation(s) du ou des auteurs / Author(s) Affiliation(s). ...

Research paper thumbnail of A technical note for the deteriorating inventory model with exponential time-varying demand and partial backlogging

International Journal of Information and Management Sciences, 2006

Research paper thumbnail of Estimation of Priority Vectors

Abstract⎯In a recent paper of , he predicted that if the relative weight of two alternatives were... more Abstract⎯In a recent paper of , he predicted that if the relative weight of two alternatives were overestimated as demonstrably more important than another then the restriction of the range for the scales would reduce the error from inflating the ratio. In this paper, we will use the sum of square residues between the normalized principal right vectors to show that the Murphy's prediction is questionable. Our method provides a suggestion to explore the properties of eigenvectors.

Research paper thumbnail of Criminal Record Matching Based on the Vector Space Model

Lecture Notes in Computer Science, 2003

The process of establishing an association between crime scene and criminal has been an important... more The process of establishing an association between crime scene and criminal has been an important task in crime investigation. For example, forensic experts usually search crime scene for physical evidences, such as fingerprints, to identify links between crime scene ...

Research paper thumbnail of The criterion for the optimal solution of inventory model with stock-dependent consumption rate

International Journal of Information and Management Sciences

Research paper thumbnail of Virus detection using data mining techinques

IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings., 2003

Malicious executables are computer programs, which may cause damages or inconveniences for comput... more Malicious executables are computer programs, which may cause damages or inconveniences for computer users when they are executed. Virus is one of the major kinds of malicious programs, which attach themselves to others and usually get executed before the host programs. They can be easily planted into computer systems by hackers, or simply down loaded and executed by naive users while they are browsing the web or reading E-mails. They often damage its host computer system, such as destroying data and spoiling system software when they are executed. Thus, to detect computer viruses before they get executed is a very important issue. Current detection methods are mainly based on pattern scanning algorithms. However, they are unable to detect unknown viruses. In this paper. an automatic heuristic method to detect unknown computer virus based on data mining techniques, namely Decision Tree and NaCw Buyesian network algorithms, is proposed and experiments are c e e d to evaluate the effectiveness the proposed approach.

Research paper thumbnail of A robust method for software self-defense

IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings., 2003

Page 1. A Robust Method for Software Self-defense ++ Peter Shaohua Den; Wen-Gong Shieh* lau-Hwmg ... more Page 1. A Robust Method for Software Self-defense ++ Peter Shaohua Den; Wen-Gong Shieh* lau-Hwmg Wang Cheng-Tan T unc Chih-Pin Yen*+ ... That is, we can store a digital signature, H(IP), in the code I. Where H is a hash function and IP is the protected program. ...

Research paper thumbnail of Technical Note: Approximation Solution for the Inventory Model with Random Planning Horizon

The Engineering Economist, 2004

In 1993, Moon and Yun [8] developed a finite planning horizon economic order quantity (EOQ) model... more In 1993, Moon and Yun [8] developed a finite planning horizon economic order quantity (EOQ) model by using the Discounted Cash Flow approach. Chung and Lin [3] then improved Moon and Yun's solution by introducing a pair of closer lower and upper bounds and bisection algorithm. To avoid the unnecessary and time-consuming numerical computations, we propose a novel approach in

Research paper thumbnail of Fitting Lanchester's square law to the Ardennes Campaign

Journal of the Operational Research Society, 2005

Research paper thumbnail of Analytic inventory model with a mixture of back orders and lost sales

Journal of Information and Optimization Sciences, 2005

ABSTRACT A precise approach is used to extend and analyze the article published by G. Padmanabhan... more ABSTRACT A precise approach is used to extend and analyze the article published by G. Padmanabhan and P. Vrat, Int. J. Syst. Sci. 21, No. 8, 1721–1726 (1990; Zbl 0715.90038). Utilizing this approach, we develop a criterion for existence and uniqueness of the optimal solution of the total cost function. If the criterion cannot be satisfied, this model degenerate to an inventory model with one cycle. In such case, the article shows that a longer stock shortage time would lower the total cost. Therefore, we evaluate the cost variation under different allotted times to provide decision-makers with strategies to balance the time and cost. We present illustrations to demonstrate the exactness of this process.