Chi-Bin Cheng

ORCID: 0000-0003-2983-049X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Multi-Criteria Decision Making
  • Supply Chain and Inventory Management
  • Fuzzy Systems and Optimization
  • Fuzzy Logic and Control Systems
  • Neural Networks and Applications
  • Auction Theory and Applications
  • Consumer Market Behavior and Pricing
  • Risk and Safety Analysis
  • Scheduling and Optimization Algorithms
  • Sustainable Supply Chain Management
  • Advanced Manufacturing and Logistics Optimization
  • Hate Speech and Cyberbullying Detection
  • Vehicle Routing Optimization Methods
  • Human-Automation Interaction and Safety
  • Multi-Agent Systems and Negotiation
  • Rough Sets and Fuzzy Logic
  • Optimization and Packing Problems
  • Fault Detection and Control Systems
  • Metaheuristic Optimization Algorithms Research
  • Swearing, Euphemism, Multilingualism
  • Optimization and Mathematical Programming
  • Bullying, Victimization, and Aggression
  • Risk and Portfolio Optimization
  • Air Traffic Management and Optimization
  • Control Systems and Identification

Tamkang University
2012-2022

Chaoyang University of Technology
2001-2006

Kansas State University
1999

Johns Hopkins University
1995

Cornell University
1993

10.1016/j.mcm.2006.11.035 article EN publisher-specific-oa Mathematical and Computer Modelling 2007-02-12

10.1016/j.camwa.2005.07.016 article EN publisher-specific-oa Computers & Mathematics with Applications 2006-02-01

10.1016/s0165-0114(99)00098-6 article EN Fuzzy Sets and Systems 2001-04-01

10.1016/j.camwa.2008.09.011 article EN Computers & Mathematics with Applications 2008-10-15

Researchers around the world have been implementing machine learning as a method to detect cyberbullying text. The is trained using features such variations in texts, through social media context and interactions network environment. can also identify profile users gender or use of hate speech. In this study, we analysed different types mobile applications that manage cyberbullying. This study proposes mechanism, which combines best detection fill gaps limitations existing applications....

10.1016/j.jksuci.2021.03.001 article EN cc-by-nc-nd Journal of King Saud University - Computer and Information Sciences 2021-03-12

10.1016/s0898-1221(02)00274-2 article EN publisher-specific-oa Computers & Mathematics with Applications 2002-12-01

The present study attempts to establish a framework for computing customer lifetime values company in the auto repair and maintenance industry. value defined this consists of current future customer, which involve an estimation length, purchasing behavior profit associated with each customer. proposed contains three groups techniques obtain these estimates from historical transactions. first group includes logistic regression model decision tree estimate churn probability to, further,...

10.1016/j.scient.2011.11.045 article EN Scientia Iranica 2012-01-20

This study attempts to explore the different types of Hate Speech appearing in social media by identifying profane words used hate speech. also compares generations assist user's profile. Five-hundred (500) comments posted on YouTube abusive topics were collected. Profane are classified into eight The finding shows 35% found our sample related sexual orientation. Comparison terms between 1970 and 2017 show a high percentage Though results based only 500 collected from link current study,...

10.1145/3193077.3193078 article EN 2018-03-23
Coming Soon ...