Skip to main content

    Chongfu Huang

    Based on the arrangement tool of ascending and descending magnitude in modern computational mathematic, this paper suggests a simple algorithm of the interior-outer-set model to avoid any complex combination calculus, so that totally... more
    Based on the arrangement tool of ascending and descending magnitude in modern computational mathematic, this paper suggests a simple algorithm of the interior-outer-set model to avoid any complex combination calculus, so that totally resolves the problem on running the model. It provides the convenience for widely using the model in fuzzy risk assessment of natural disasters.
    When a major natural disaster occurs, the data in the disaster area is usually incomplete and information islands may appear. Considering the time required by the on-site survey statistical methods, geospatial information diffusion models... more
    When a major natural disaster occurs, the data in the disaster area is usually incomplete and information islands may appear. Considering the time required by the on-site survey statistical methods, geospatial information diffusion models can be used to infer the rescue needs of information islands. The basic principle is to spread the disaster information around the information island to the information island. Data that is related to rescue needs and can be collected before a disaster occurs is called background data. The background data in each geographic unit in the disaster area played a role as a bridge for information diffusion. The rapid assessment of earthquake disasters is an important basis for earthquake emergency response and government decision-making, and reliable rapid assessment of earthquake disasters is of great significance to improving earthquake emergency response capabilities. The rapid earthquake disaster assessment is an emergency assessment based on the pre...
    An internet of intelligences constructed with "model-view-controller" frameworkis composed of six functional modules: data declaration, data review, data query, disaster assessment, user management, and system management. There... more
    An internet of intelligences constructed with "model-view-controller" frameworkis composed of six functional modules: data declaration, data review, data query, disaster assessment, user management, and system management. There are four user role permissions: data declarer, daily administrator, disaster relief administrator, system administrator. With the internet of intelligences embedded in the geospatial information diffusion model, it becomes possible for us to infer disasters in the information isolated islands in the disaster area, instead of disaster assessment by using a statistical formula based on historical disaster data. The new approach is not only the accuracy of the assessment can be improved, but also the disasters can be easily updated. We chose ThinkPHP5 to be the development framework. The logical structure of the system database and the tables are designed according to the principles of database design and paradigms. The geospatial information diffusion...
    ABSTRACT In this article, I suggest a model to study the risk issue that can be mapped into a query on how to pass a road safely. The model is called the pavement model, which can be used in the Internet of intelligences. The model has... more
    ABSTRACT In this article, I suggest a model to study the risk issue that can be mapped into a query on how to pass a road safely. The model is called the pavement model, which can be used in the Internet of intelligences. The model has three components: object, value of success or failure, and duration of the value. An object is mapped into a section of road, the value is defined by the truth value of success or failure passing the road, and the duration represents the number of parts with the value in the session. The case of choosing milk powder shows that the model can perfectly integrate childcare experiences to be a rank that indicates which milk powder should be the first choice and which milk powder is not recommended to buy. The case of assessing typhoon risk shows that the model can dynamically assess typhoon risks with respect to different months and landing situations.
    In this paper, we propose a new algorithm for estimating the risk of natural disaster based on incomplete data. To guarantee reliability in theory, we prove in this paper that the estimator obtained by the algorithm is asymptotically... more
    In this paper, we propose a new algorithm for estimating the risk of natural disaster based on incomplete data. To guarantee reliability in theory, we prove in this paper that the estimator obtained by the algorithm is asymptotically unbiased and mean squared consistent. We also give two simulation experiments showing the advantage of the algorithm. To demonstrate its practicality, we
    In this paper, we introduce the method of information distribution to process radar signals. It is employed to estimate the probability distribution of the radar pulses from an enemy radar. Here, we know nothing about distribution shape,... more
    In this paper, we introduce the method of information distribution to process radar signals. It is employed to estimate the probability distribution of the radar pulses from an enemy radar. Here, we know nothing about distribution shape, and the size of the pulse sample is small. With the new method, a small sample can act as a more large one
    ... It addresses Shannon's information theory which is useful for problems of information transfer only; however, it cannot imply structure about in-formation that would be very important for recognizing relationships among factors.... more
    ... It addresses Shannon's information theory which is useful for problems of information transfer only; however, it cannot imply structure about in-formation that would be very important for recognizing relationships among factors. ...
    Today, most of the commercial risk radars only have the function to show risks, as same as a set of risk matrixes. In this paper, we develop the Internet of intelligences (IOI) to drive a risk radar monitoring dynamic risks for emergency... more
    Today, most of the commercial risk radars only have the function to show risks, as same as a set of risk matrixes. In this paper, we develop the Internet of intelligences (IOI) to drive a risk radar monitoring dynamic risks for emergency management in community. An IOI scans risks in a community by 4 stages: collecting information and experience about risks; evaluating risk incidents; verifying; and showing risks. Employing the information diffusion method, we optimized to deal with the effective information for calculating risk value. Also, a specific case demonstrates the reliability and practicability of risk radar.
    Based on (Mizumoto, 1996) in the category of t-operation and fuzzy value we define the compatibility function in fuzzy control and consider its properties
    There is no believable risk map because of the tremendous imprecision of the risk assessment due to the incomplete-data set. To improve the probability estimation, the fuzzy set methodology was introduced into the area of risk assessment... more
    There is no believable risk map because of the tremendous imprecision of the risk assessment due to the incomplete-data set. To improve the probability estimation, the fuzzy set methodology was introduced into the area of risk assessment with respect to natural disasters. A fuzzy risk represented by a possibility-probability distribution, which is calculated by employing the interior-outer-set model, can represent the imprecision of risk assessments with a small sample. Thus, by using the fuzzy set methodology, we can provide a soft risk map which can accommodate the imprecision of risk assessment. Soft risk map can be adopted as a useful tool for the representation and reasoning of uncertainty of risk assessments due to incompleteness in real-world applications.

    And 51 more