By Topic

2010 International Conference on Computational Intelligence and Security

11-14 Dec. 2010

Filter Results

Displaying Results 1 - 25 of 161
  • [Front cover]

    Publication Year: 2010, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (824 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2010, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (14 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2010, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (62 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2010, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (113 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2010, Page(s):v - xv
    Request permission for commercial reuse | PDF file iconPDF (196 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2010, Page(s): xvi
    Request permission for commercial reuse | PDF file iconPDF (69 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference Organization

    Publication Year: 2010, Page(s): xvii
    Request permission for commercial reuse | PDF file iconPDF (61 KB)
    Freely Available from IEEE
  • Program Committee and Additional Reviewers

    Publication Year: 2010, Page(s):xviii - xix
    Request permission for commercial reuse | PDF file iconPDF (93 KB)
    Freely Available from IEEE
  • Chinese Sentiment Orientation Analysis

    Publication Year: 2010, Page(s):1 - 5
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (312 KB) | HTML iconHTML

    In this paper, we present one new method to analyze and classify the sentiment orientation of merchandise comments into three categories: neutral, positive and negative. Nowadays, many methods can be used to achieve this goal, however, we find that those methods may work well in dividing the polarity sentences into positive and negative but may not have a good result on neutral sentences, so a div... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Scenario-Based Architecture for Reliability Design of Artificial Intelligent Software

    Publication Year: 2010, Page(s):6 - 9
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (487 KB) | HTML iconHTML

    Artificial Intelligent is well invested both in industry and academic fields. However, the software reliability design for the applications is a big challenge. In this paper, we present a scenario-based architecture for reliability design of artificial intelligent Software. Scenarios are divided into environmental scenarios and structured scenarios. Both of the two kinds of scenarios are considere... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Analysis of Yeast Cell Morphology Using a Robot Scientist

    Publication Year: 2010, Page(s):10 - 14
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (662 KB) | HTML iconHTML

    We have developed image analysis methods to analyse the morphology of the budding yeast (Saccharomyces cerevisiae) cell. Experiments were performed on four deletant strains: ΔYLR371w, ΔYDR349c, ΔYLR192c, and ΔYDR414c. Our results show that our image analysis software provides an efficient way to automatically obtain quantitative morphology features of yeast cells. Our r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IMP-Filters of R0-Algebras

    Publication Year: 2010, Page(s):15 - 17
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (265 KB) | HTML iconHTML

    The notion of implication MP-filters (briefly, IMP-filters) in R0-algebras is introduced. The characteristic properties and extension property of IMP-filters are obtained. The relations among IMP-filters, PIMP-filters and NMP-filters of Fo-algebras are established. Finally, the implicative R0-algebra is completely described by its IMP-filters. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intelligent Digital Photo Management System Using Ontology and SWRL

    Publication Year: 2010, Page(s):18 - 22
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (982 KB) | HTML iconHTML

    The number of digital photos in the personal computer is exploding. Existing photo annotation and management systems suffer from some problems (some among them are quite serious), which discussed at the beginning of the full paper. Aiming at these problems, this paper proposed a solution based on ontology. First of all, the Family Album ontology is built to organize the domain knowledge and provid... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • New Results on H∞ Filter Design for Continue-Time Systems with Time-Varying Delay

    Publication Year: 2010, Page(s):23 - 27
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (327 KB) | HTML iconHTML

    This paper proposes a class of H filter design for continue-time systems with time-varying delay. By using the Lyapunov functional function approach, some delay-dependent stability conditions can be obtained for the asymptotical stability of the H filter systems, which are expressed as a set of Linear Matrix Inequalities (LMIs). Finally, a numerical example is... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Synchronization Algorithm for Multi-hop in Wireless Sensor Networks

    Publication Year: 2010, Page(s):28 - 32
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (687 KB) | HTML iconHTML

    Time synchronization possesses wide range of applications. There are already a variety of time synchronization methods. In wireless sensor networks, its equipment, limitations of resources and the environment, require time synchronization with high efficiency, while saving resources. This article describes the time synchronization algorithm using the time stamp of the effectiveness of the inspecti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tool Wear Detection Based on Wavelet Packet and BP Neural Network

    Publication Year: 2010, Page(s):33 - 36
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (457 KB) | HTML iconHTML

    Based on wavelet packet decomposition and the BP neural network of pattern recognition theory, this article puts forward the theory that can identify the different tool wear conditions during the cutting process, and thus we can use this theory to forecast the tool breakage accurately. The main thinking of this article is that decomposing tool acoustic emission signal by using wavelet packet to ge... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Neural Network Method for Solving Linear Fractional Programming

    Publication Year: 2010, Page(s):37 - 41
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (280 KB) | HTML iconHTML

    This paper presents a neural network method for solving a class of linear fractional optimization problems with linear equality constraints. The proposed neural network model have the following two properties. First, it is demonstrated that the set of optima to the problems coincides with the set of equilibria of the neural network models which means the proposed model is complete. Second, it is a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Semantic Modeling: Computational Models of the Concepts

    Publication Year: 2010, Page(s):42 - 46
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (570 KB) | HTML iconHTML

    As known, computing allows maintenance of the constructions corresponding to the needs in comprehended models which enable the computational experiment. Computing takes the enabling of such a model which corresponds to a 'theory'. The parameters of the model are systematically changing and correspond to 'entries' for the inputs. The parameterized family of its 'behaviors' is used as the 'outputs' ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Fast HITON_PC Algorithm

    Publication Year: 2010, Page(s):47 - 50
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (403 KB) | HTML iconHTML

    The HITON_PC algorithm which is a state-of-the-art local causal discovery algorithm can deal with a dataset with a very small sample-to-variable ratio efficiently. But it cannot perform inefficiently on a dataset with a very large sample. To address this problem, a fast HITON_PC algorithm is presented which uses a new yet simple search strategy from high order to low order to improve the efficienc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Algorithm of Dynamic Associate Rule Based on Sliding Windows

    Publication Year: 2010, Page(s):51 - 54
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (441 KB) | HTML iconHTML

    It is well-known that the traditional association rules with time can't be found out in many algorithms. First, according to concept of dynamic association rules, this paper analyzes the disadvantages of traditional association rules. Then, the concepts of dynamic association rules based on sliding windows and the definition of time vector representation of dynamic association rules are put forwar... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Online Segmentation Algorithm for Time Series Based on BIRCH Clustering Features

    Publication Year: 2010, Page(s):55 - 59
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (453 KB) | HTML iconHTML

    Online time series data representation is one of important problems of time series data mining. The adjacent points of time series are inherently depended and hence have similar clustering features. Based on BIRCH clustering features, we present a new kind of OSBC algorithm for time series segmentation in this paper. Using cluster features, OSBC algorithm can find easily the changing patterns of t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Clustering Algorithm Based on Normalized Signal for Sparse Component Analysis

    Publication Year: 2010, Page(s):60 - 63
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (370 KB) | HTML iconHTML

    To the underdetermined sparse component analysis (SCA) model with noise, a new robust clustering algorithm based on normalized signal for mixture matrix estimation is addressed in this paper. This approach consists of two parts: signal clustering and matrix recovery. In the first step, according to the feature of normal signals clustering intensively on the unit observed signal hyper-sphere, we pr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic Fluzzy Clustering Algorithm for Web Documents Mining

    Publication Year: 2010, Page(s):64 - 67
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (446 KB) | HTML iconHTML

    This paper first studies the methods of web documents mining and text clustering, and summaries the fuzzy clustering algorithms and similarity measure functions, then proposes a modified similarity function which can solve the problems of feature selection and feature extraction in high-dimensional space. Finally, this paper puts forward to a dynamic fluzzy clustering algorithm(DCFCM) by combining... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel GEP-Based Multiple-Layers Association Rule Mining Algorithm

    Publication Year: 2010, Page(s):68 - 72
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (401 KB) | HTML iconHTML

    To mine popular accessed Web pages items and find out their association rule from the Web server Log database for junior users providing recommendation service. A novel GEP-based algorithm for mining multiple-layers association rules was presented. Firstly, takes generalizing technology as a way to value fitness function in GEP (Gene Expression Programming). Then, relying on the significant self-s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Credit Card Customer Segmentation and Target Marketing Based on Data Mining

    Publication Year: 2010, Page(s):73 - 76
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (382 KB) | HTML iconHTML

    Based on the real data of a Chinese commercial bank's credit card, in this paper, we classify the credit card customers into four classifications by K-means. Then we built forecasting models separately based on four data mining methods such as C5.0, neural network, chi-squared automatic interaction detector, and classification and regression tree according to the background information of the cred... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.