Using Fuzzy Logic for Product Matching
Product matching is a special type of entity matching, and it is used to identify similar products and merging products based on their attributes. Product attributes are not always crisp values and may take values from a fuzzy domain. The attributes with
- PDF / 10,179,709 Bytes
- 401 Pages / 439.37 x 666.142 pts Page_size
- 61 Downloads / 226 Views
G. Sai Sundara Krishnan R. Anitha R. S. Lekshmi M. Senthil Kumar Anthony Bonato Manuel Graña Editors
Computational Intelligence, Cyber Security and Computational Models 3
Proceedings of ICC , 2013
Advances in Intelligent Systems and Computing Volume 246
Series editor Janusz Kacprzyk, Polish Academy of Sciences, Warsaw, Poland e-mail: [email protected]
For further volumes: http://www.springer.com/series/11156
About this Series The series ‘‘Advances in Intelligent Systems and Computing’’ contains publications on theory, applications, and design methods of Intelligent Systems and Intelligent Computing. Virtually all disciplines such as engineering, natural sciences, computer and information science, ICT, economics, business, e-commerce, environment, healthcare, life science are covered. The list of topics spans all the areas of modern intelligent systems and computing. The publications within ‘‘Advances in Intelligent Systems and Computing’’ are primarily textbooks and proceedings of important conferences, symposia and congresses. They cover significant recent developments in the field, both of a foundational and applicable character. An important characteristic feature of the series is the short publication time and world-wide distribution. This permits a rapid and broad dissemination of research results.
Advisory Board Chairman Nikhil R. Pal, Indian Statistical Institute, Kolkata, India e-mail: [email protected] Members Emilio S. Corchado, University of Salamanca, Salamanca, Spain e-mail: [email protected] Hani Hagras, University of Essex, Colchester, UK e-mail: [email protected] László T. Kóczy, Széchenyi István University, Gy} or, Hungary e-mail: [email protected] Vladik Kreinovich, University of Texas at El Paso, El Paso, USA e-mail: [email protected] Chin-Teng Lin, National Chiao Tung University, Hsinchu, Taiwan e-mail: [email protected] Jie Lu, University of Technology, Sydney, Australia e-mail: [email protected] Patricia Melin, Tijuana Institute of Technology, Tijuana, Mexico e-mail: [email protected] Nadia Nedjah, State University of Rio de Janeiro, Rio de Janeiro, Brazil e-mail: [email protected] Ngoc Thanh Nguyen, Wroclaw University of Technology, Wroclaw, Poland e-mail: [email protected] Jun Wang, The Chinese University of Hong Kong, Shatin, Hong Kong e-mail: [email protected]
G. Sai Sundara Krishnan R. Anitha R. S. Lekshmi M. Senthil Kumar Anthony Bonato Manuel Graña •
•
•
Editors
Computational Intelligence, Cyber Security and Computational Models Proceedings of ICC3, 2013
123
Editors G. Sai Sundara Krishnan R. Anitha R. S. Lekshmi M. Senthil Kumar Applied Mathematics and Computational Sciences PSG College of Technology Coimbatore, Tamil Nadu India
Manuel Graña School of Computing University of Basque Country Paseo Manuel De Lardizalbal 1 San Sebastian Spain
Anthony Bonato Department of Mathematics Ryerson University Toronto, ON Canada
ISSN 2194-5357 ISBN 978-81-322-1679-7 DOI 10.1007/978-81-322-1680-3
ISSN 2194-5365 (electronic) ISBN 978-81-322-1680-3 (eB
Data Loading...