Chinese abstract
English abstract
Chapter 1. Introduction
§ 1.1 Fuzzy set
§ 1.2 Fuzzy management decision
§ 1.3 Background and prospect
§ 1.4 Main research of this paper
References
Chapter 2. Both direction fuzzy set
§ 2.1 L.A.Zadeh Fuzzy set face difficulty in system management application
§ 2.2 Both direction fuzzy set
§ 2.3 Both direction fuzzy set and its characteristics
§ 2.4 Union-common decomposition of both direction fuzzy set
§ 2.5 Intersect-common decomposition of both direction fuzzy set
§ 2.6 α-embedding sets of both-direction fuzzy set and its union-fuzzy decomposition
§ 2.7 α-embedding sets of both-direction fuzzy set and its intersect-fuzzy decomposition
References
Chapter 3. Unsymmetrical both direction fuzzy set
§ 3.1 Unsymmetrical both direction fuzzy set
§ 3.2 Unsymmetrical both direction fuzzy-common union decomposition
§ 3.3 Unsymmetrical both direction fuzzy common intersect decomposition
§ 3.4 Unsymmetrical both direction fuzzy set with overlapping domain and its linear generation
§ 3.5 The n th generation B and its fuzzy common union decomposition
§ 3.6 Self-generated fuzzy union decomposition on U~+ and the relationship with L.A.Zadeh fuzzy union decomposition
§ 3.7 Fuzzy common intersect decomposition of unsymmetrical both direction fuzzy set with overlapping domain
§ 3.8 Self generated fuzzy intersect decomposition onU~+ and the relationship with L.A.Zadeh fuzzy intersect decomposition
§ 3.9 α-embedding of L.A.Zadeh fuzzy set and its common union decomposition
§ 3.10 α-embedding of L.A.Zadeh fuzzy set and its common intersect decomposition
§ 3.11 Relations of both α-embedded decompositions of L.A.Zadeh fuzzy set
§ 3.12 Fuzzy shell and fuzzy core of α-embedding
References
Chapter 4. Fuzzy management and management security
§ 4.1 Group encryption and group sharing of fuzzy decision
§ 4.2 Fuzzy management decision and management decision model
§ 4.3 A* encryption - A° sharing fuzzy management decision security and its mathematical structure
§ 4.4 Applications of A* encryption - A° sharing fuzzy management security decision
§ 4.5 Secure fuzzy management recognition
§ 4.6 Applications of management security's fuzzy recognition
§ 4.7 Elliptic curve
§ 4.8 Both-direction fuzzy management decision and its model
§ 4.9 Both-direction fuzzy management decision and its secure algorithm
§ 4.10 Signature-authentication of both-direction fuzzy decision conclusion
References
Chapter 5. Fuzzy management decision and application of venture capital
§ 5.1 Introduction
§ 5.2 Characteristics and theory of venture capital decision
§ 5.3 Fuzzy evaluation model of venture capital item
§ 5.4 Disturbance fuzzy preference model of multi-level and multi-aims venture capital item
§ 5.5 The risk measurement of venture capital management
References
Chapter 6. Conclusion and Prospect
§6.1 Conclusion
§6.2 Prospect
Acknowledgments
Papers published during studying for the doctorate