By Topic

Fuzzy Systems and Knowledge Discovery, 2007. FSKD 2007. Fourth International Conference on

Date 24-27 Aug. 2007

Go

Filter Results

Displaying Results 1 - 25 of 157
  • Fourth International Conference on Fuzzy Systems and Knowledge Discovery - Cover

    Publication Year: 2007, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (61 KB)
    Freely Available from IEEE
  • Fourth International Conference on Fuzzy Systems and Knowledge Discovery - Title

    Publication Year: 2007, Page(s):i - iii
    Request permission for commercial reuse | PDF file iconPDF (60 KB)
    Freely Available from IEEE
  • Fourth International Conference on Fuzzy Systems and Knowledge Discovery - Copyright

    Publication Year: 2007, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (56 KB)
    Freely Available from IEEE
  • Fourth International Conference on Fuzzy Systems and Knowledge Discovery - Table of contents

    Publication Year: 2007, Page(s):v - xvii
    Request permission for commercial reuse | PDF file iconPDF (91 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2007, Page(s): xvii
    Request permission for commercial reuse | PDF file iconPDF (35 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2007, Page(s): xviii
    Request permission for commercial reuse | PDF file iconPDF (63 KB)
    Freely Available from IEEE
  • list-reviewer

    Publication Year: 2007, Page(s): xxii
    Request permission for commercial reuse | PDF file iconPDF (38 KB)
    Freely Available from IEEE
  • A Hybrid Image Segmentation Approach Using Watershed Transform and FCM

    Publication Year: 2007, Page(s):2 - 6
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (314 KB) | HTML iconHTML

    Medical image segmentation is an essential step for most subsequent image analysis tasks. In this paper a hybrid image segmentation algorithm is proposed, which combines the morphological method of watershed and fuzzy c-means (FCM) clustering. A dilation-erosion contrast enhancement approach is used as a preprocessing stage in order to obtain an accurate estimation of the image borders. Then an in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Pattern Recognition on Metal Surface

    Publication Year: 2007, Page(s):7 - 10
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (458 KB) | HTML iconHTML

    To measure deformations of metal material under a loading, it is usual that the material surface patterns are recognized first by using image technique. Normally, the surface patterns consist of a number of parametric graphic elements such as circle, ellipse, square and rectangle. To successfully applying automatic image processing techniques for the problem of automatic pattern detection and desc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Approach of Fast Mosaic for Serial Remote Sensing Images from UAV

    Publication Year: 2007, Page(s):11 - 15
    Cited by:  Papers (3)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (781 KB) | HTML iconHTML

    Based on the values of external orientation elements of the camera installed on the unmanned aerial vehicle (UAV), the nearest-neighbor interpolation is adopted to rectify original images geometrically. The range of the overlapping region between two consecutive images is determined by the flying status parameters of UAV. Both of the overlapping regions of the two images are processed to binary im... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Asynchronous Multisensor Spatial Registration Algorithm

    Publication Year: 2007, Page(s):16 - 20
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (163 KB) | HTML iconHTML

    Bias registration is the prerequisite of data fusion. The constant bias can be estimated efficiently by two-stage Kalman filtering. An algorithm is proposed which includes the asynchronous sensor fusion models and spatial registration with feedback mechanism. In bias-free stage, the multisensor asynchronous fusion is employed to compensate the asynchronous error; fusion results are fed back to the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Combination Methodologies of Text Classifier: Design and Implementation

    Publication Year: 2007, Page(s):21 - 25
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (267 KB) | HTML iconHTML

    Support vector machines, one of the most population techniques for classification, have been widely used in many application areas. The kernel parameters setting for SVM in a training process impacts on the classification accuracy. Feature selection is another factor that impacts classification accuracy .The objective of this work is to reduce the dimension of feature vectors, optimizing the param... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Developing the System of Web-Data Mining from Chemical Database Based on Internet

    Publication Year: 2007, Page(s):26 - 30
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (498 KB) | HTML iconHTML

    This article introduces a mining method of Web data in adoption of Web page comparison & analysis within a Web site in light of free chemistry database on Internet. On the basis of treeing and blocking Web pages, the data block of Web page is retrieved after compared and analyzed, and then the data is extracted via the comparison and judgment of more than one page of the same structure and for... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Example-Based Learning for Face Image Recognition

    Publication Year: 2007, Page(s):31 - 35
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (431 KB) | HTML iconHTML

    Appearance-based face recognition was extended into across poses scenarios in this paper. Information related with pose rotation was discarded in traditional multi-view works but was learned from sample face images in present. Face recognition was implemented by reconstructing frontal view features using transformation matrix. Experiments proved that the proposed method was a much effective approa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Identifying New IT-Based Service Concepts Based on the Technological Strength: A Text Mining and Morphology Analysis Approach

    Publication Year: 2007, Page(s):36 - 40
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (184 KB) | HTML iconHTML

    Service providers are increasingly offering customer new IT-based services to sustain competitive advantages. However, theory and practice of IT-based service is still in its early stage. Especially, new service development remains one of the least studied and understood topics due to lack of understanding in the relations between technologies and services. The purpose of this paper is to propose ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Image Analysis of Size and Shape of Mineral Particles

    Publication Year: 2007, Page(s):41 - 44
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (392 KB) | HTML iconHTML

    Mineral analysis is very important in engineering geology. It is often that a geologist analyzes minerals on an image under microscope, or by taking photos. It is difficult to recognize minerals automatically due to the complexity of mineral images. This paper presents the newly studied an image segmentation algorithm for mineral particles. The algorithm consists of image pre-processing, gray leve... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intrusion Detection Using Ensemble of SVM Classifiers

    Publication Year: 2007, Page(s):45 - 49
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (224 KB) | HTML iconHTML

    The Current researches show that different classifiers provide different results about the patterns to be classified. These different results combined together yields better performance than individual classifiers. An ideal classifier, which is popularly known as the ensemble approach, is combined to take the final decision instead rely on a single classifier for decision on our intrusion detectio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mining Evolutionary Event Patterns of Web Texts for Text Resource Aggregation

    Publication Year: 2007, Page(s):50 - 55
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (111 KB) | HTML iconHTML

    As an outcome of the overwhelming volume of Internet resources, it is necessary to research methods integrating distributed autonomous resources connected to the Internet to make them more effective and efficient. With the understanding of characteristics of internet resources, this paper will focus on solving the problem of text resource aggregation in open environment and its emergence showed du... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mining Privilege Escalation Paths for Network Vulnerability Analysis

    Publication Year: 2007, Page(s):56 - 60
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (391 KB) | HTML iconHTML

    Computer security is an important issue in our society. In order to prevent computer systems and networks from attacks, we should try to find flaws in these systems and evaluate them. Generally researchers and red teams use attack graphs to perform network vulnerability analysis, which tend to suffer scalability problems. In this paper we put forward a mining method to generate privilege escalatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Nonlinear Integration of Spatial and Temporal Forecasting by Support Vector Machines

    Publication Year: 2007, Page(s):61 - 66
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (265 KB) | HTML iconHTML

    Spatio-temporal data mining is the extraction of unknown and implicit knowledge, structures, spatio-temporal relationships, or patterns not explicitly stored in spatio-temporal databases. As one of data mining techniques, forecasting is widely used to predict the unknown future based upon the patterns hidden in the current and past data. In order to achieve spatio-temporal forecasting, some mature... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reducing False Positives Based on Time Sequence Analysis

    Publication Year: 2007, Page(s):67 - 71
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (252 KB) | HTML iconHTML

    Various IDS devices produce large number of alert, the majority of which are false positives. It is laborious for the security officers to find real intrusions. To find intrusions in real time, we should first remove false positives in the alerts. According to the experience of IDS alerts analysis, we find that there are some regularities in alert flow occurrence: power law, trend, periodicity. Ba... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Rough Set Incremental Reduction Algorithm and Its Application in Dynamic Choosing Input Variable of Short Term Load Forecasting Model

    Publication Year: 2007, Page(s):72 - 76
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3668 KB) | HTML iconHTML

    In this paper a reduction algorithm based on rough set theory is presented due to too much factors that influence accuracy in the power load forecasting. The reduction algorithm introduced to mine more correlative attributes in the pending forecasting components, ensures not only the rationality of input parameters of forecasting model but also the selection of input parameters of ANN model. An RA... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Support Vector Machine for Classification of Hyperspectral Remote Sensing Imagery

    Publication Year: 2007, Page(s):77 - 80
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (239 KB) | HTML iconHTML

    As one of the popular and advanced statistical learning algorithms, support vector machine (SVM) has been the new hot study area of pattern recognition and machine learning in recent years. SVM has such advantages as suitableness to high dimensional data, requirement of few samples and robustness to uncertainty, so it can be used to hyperspectral remote sensing image classification effectively. Ba... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • TDML: A Data Mining Language for Transaction Databases

    Publication Year: 2007, Page(s):81 - 86
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (198 KB) | HTML iconHTML

    A desired feature of data mining systems is the ability to support ad hoc and interactive data mining in order to facilitate flexible and effective knowledge discovery. Data mining query languages can be designed to support such a feature. There are data mining query languages like DMQLfor mining relational databases. In this paper, we have proposed a new data mining language for mining transactio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Text Categorization Method Based on Improved Mutual Information and Characteristic Weights Evaluation Algorithms

    Publication Year: 2007, Page(s):87 - 91
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (247 KB) | HTML iconHTML

    The improvement of text categorization by statistical methods can be performed from two main directions, namely the feature selection and the evaluation of characteristic weights. In this paper, we propose an enhanced text categorization method based on a modified mutual information algorithm and evaluation algorithm of characteristic weights which improves both aspects. The proposed method is app... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.