By Topic

2011 IEEE International Conference on Granular Computing

8-10 Nov. 2011

Filter Results

Displaying Results 1 - 25 of 166
  • [Front cover]

    Publication Year: 2011, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (21 KB)
    Freely Available from IEEE
  • [Title page]

    Publication Year: 2011, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (126 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2011, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (34 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2011, Page(s):i - xx
    Request permission for commercial reuse | PDF file iconPDF (123 KB)
    Freely Available from IEEE
  • On top-n reverse top-k queries: Variants, algorithms, and applications

    Publication Year: 2011, Page(s): 2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (532 KB) | HTML iconHTML

    Summary form only given. Given a set of products and a set of customers with different preferences on these products, a reverse top-k query computes for each product the number of customers who consider this product as their top-k favorites, named favorite number. Accordingly, the top-n reverse top-k query selects the top-n products based on their favorite numbers. This problem is encountered in m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data mining and its applications in bioinformatics: Techniques and methods

    Publication Year: 2011, Page(s): 3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (73 KB) | HTML iconHTML

    In this talk, I will discuss some of the latest data mining techniques and methods and their applications in bioinformatics study, focusing on data integration, text mining and graph-based data mining in bioinformatics research. In data integration, I will present a semantic-based approach for multi source bioinformatics data integration. In our approach, a metamodel is utilized to represent the m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Granular Mathematics foundation and current state

    Publication Year: 2011, Page(s):4 - 12
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (386 KB) | HTML iconHTML

    The keynote contains two parts, one is the formal theory, the other is the current state. Though we have used the full title, this paper contains only the formal theory. Neighborhood system generalizes topological neighborhood system by simply dropping the axioms of topology. In this paper, we use it to define Zadeh's Granular Mathematics (GrM). The main results are: 1) GrM, though defined locally... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Social intelligence design for intercultural communication

    Publication Year: 2011, Page(s):13 - 16
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (277 KB) | HTML iconHTML

    Research on social intelligence design aims at understanding and augmentation of social intelligence resulting from individual intelligence to coordinate one's behaviors with others' in a society and collective intelligence to solve problem and learn from experiences. It is assumed that social intelligence enables socially intelligent interactions at different levels of granularity: connectedness ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Kansei/Affective value creation and its application to decision making

    Publication Year: 2011, Page(s):17 - 29
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (225 KB) | HTML iconHTML

    The primary purpose of this paper is to show the role of Kansei/Affective engineering and to discuss its application to the decision making. The concept of Kansei/Affective value creation is an essential tool for the decision making, for example, in the field of the marketing, It is shown that the Kansei/Affective information provides an important role for the decision making. Some illustrative ex... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Constructing features for document classification by using temporal patterns of term usages

    Publication Year: 2011, Page(s):30 - 36
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (336 KB) | HTML iconHTML

    In document classification method by using appeared words as features, it is important to determine keywords for the features to characterize each document. However, conventional methods select the keywords based on their frequency or/and particular importance index such as tf-idf, and cut-off the other appeared words by using a threshold value. This omits remaining information such as rare combin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Discrete modelling of p53-Mdm2 feedback loop

    Publication Year: 2011, Page(s):37 - 41
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (299 KB) | HTML iconHTML

    Cancer is the leading cause of death worldwide. The p53 gene play important role in the suppression of tumours. p53 is the central protein in the DNA damage response and is a part of a complex gene regulatory network. This network integrates a variety of stress signals to produce the up-regulation of active p53 and elicit apoptosis, growth arrest and DNA damage repair. In this paper, we construct ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Paraconsistecy in future contradictions

    Publication Year: 2011, Page(s):42 - 47
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (225 KB) | HTML iconHTML

    This paper discusses paraconsistency in future contradictions. We sketch a paraconsistent interpretation of future contingents. We suggest interpreting future contingents, not as Aristotle did, as gappy, but as glutty in some sense. We justify the proposed interpretation by using Priest's dialectical tense logic DTL. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Non-negative matrix factorization considering given vectors in a basis

    Publication Year: 2011, Page(s):48 - 53
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (369 KB) | HTML iconHTML

    Recently, a novel matrix factorization, named non-negative matrix factorization (NMF), attracts much attention in the field of signal processing. A matrix with non-negative elements can be decomposed into a product of two matrices with non-negative elements by the NMF. One resulting matrix can be regarded as a basis matrix; and the other can be regarded as a coefficient matrix giving linear combin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An efficient algorithm for constructing a Sequence Binary Decision Diagram representing a set of reversed sequences

    Publication Year: 2011, Page(s):54 - 59
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (415 KB) | HTML iconHTML

    A trie is a data structure representing a set of sequences by sharing the same prefixes between sequences. Thanks to this sharing, prefix searches on a trie is performed efficiently. Constructing a trie representing a set of reversed sequences is useful for suffix searches on the original sequences. This is because a prefix search on reversed sequences corresponds to a suffix search on the origina... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Construction of lexicographic vocabulary with nouns, adjectives, and verbs for querying the Semantic Web

    Publication Year: 2011, Page(s):60 - 65
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (341 KB) | HTML iconHTML

    In this paper, we propose an extended mechanism to introduce verbs into a lexicographic vocabulary to query the Semantic Web. We have already proposed two mechanisms: one for building a lexicographic vocabulary consisting of nouns and adjectives, and the other for evaluating queries using such a vocabulary on the Semantic Web. In this paper, the mechanisms are extended to define basic verbs, to de... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Linguistic analysis of English books on environmentology

    Publication Year: 2011, Page(s):66 - 70
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (220 KB) | HTML iconHTML

    Recently, to confront environmental problems, a system of “environmentology” is trying to be constructed. In order to study environmentology, reading materials in English is considered to be indispensable. In this paper, we investigated several English books on environmentology, comparing with journalism in terms of metrical linguistics. In short, frequency characteristics of charact... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Identifying multi-view patterns with hierarchy and granularity based multimodal (HGM) cogntive model

    Publication Year: 2011, Page(s):71 - 76
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (311 KB) | HTML iconHTML

    Humans perceive entities such as objects, patterns, events, etc. as concepts, which are the basic units in human intelligence and communications. In addition, perceptions of these entities could be abstracted and generalised at multiple levels of granularity. In particular, such granulation allows the formation and usage of concepts in human intelligence. Such natural granularity in human intellig... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Class-based Rough Approximation with dominance principle

    Publication Year: 2011, Page(s):77 - 82
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (342 KB) | HTML iconHTML

    Dominance-based Rough Set Approach (DRSA), as the extension of Pawlak's Rough Set theory, is effective and fundamentally important in Multiple Criteria Decision Analysis (MCDA). In previous DRSA models, the definitions of the upper and lower approximations preserve the class unions rather than the singleton class. In this paper, we propose a new Class-based Rough Approximation with respect to diff... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A note on knowledge representation using BB-mappings

    Publication Year: 2011, Page(s):83 - 88
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (224 KB) | HTML iconHTML

    In this paper, we discuss some knowledge representation scenarios where it is necessary to define the types of correspondence between the objects contained in bags. In this regard, we define BB mappings and study some of their characteristics. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Implementation of mobile video/voice over IP and access control on cloud computing

    Publication Year: 2011, Page(s):89 - 94
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (378 KB) | HTML iconHTML

    The objective of this study is to realize a real-time video/voice over IP (VVoIP) applications that has implemented by a Hadoop cloud computing and it is denoted CLC-IHU. It really outperforms the previous P2P connected VVoIP (called SCTP-IHU) due to the easy-to-use and high-performance video phone call. User does not need to know what is a real IP used to ring a video phone call to the receiver. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient reinforcement learning with trials-spanning learning scale for sequential decision-making

    Publication Year: 2011, Page(s):95 - 99
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (233 KB) | HTML iconHTML

    In this paper, the learning scale is redefined as the integrated scale of learning resources and learning outcomes, based on which two theoretical approaches of extending the scale of learning outcomes are proposed. As an application of the theory, the method of reinforcement learning with trials-spanning learning scale is proposed to combining the spatial and temporal extension of learning scale.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An extended rough set model based on a new characteristic relation

    Publication Year: 2011, Page(s):100 - 105
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (247 KB) | HTML iconHTML

    Tolerance relation, similarity relation and characteristic relation are discussed. Three types unknown attribute value of “missing value”, “lost value” and “any value” are discussed. Semantically, “missing value”, denoted by “*”, is the same as the unknown value in the tolerance relation, “lost value”, denoted by &... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An itinerary for data fusion in distributed sensor network

    Publication Year: 2011, Page(s):106 - 110
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (212 KB) | HTML iconHTML

    Using mobile agent for data fusion in distributed sensor network brings new problems, the serial itinerary of mobile agent travel makes long task duration, mobile agent transfer introduces new overhead, if a mission need collect data from all nodes many times mobile agent must be dispatched many times, which brings much data transfer overhead. To overcome these shortcomings, A closest first (CF) a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Effectiveness of haptic interaction in online negotiation between Chinese and Japanese

    Publication Year: 2011, Page(s):111 - 114
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (240 KB) | HTML iconHTML

    In this study, we adopt haptic interaction as a means of mood transmission in an online negotiation between Japanese and Chinese people. The comparison experiments results show that the haptic feedback can help to convey the emotion and the sense of presence. We also found when using haptic device, the force feedback can influence subject's feelings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A novel method for medical adverse events classification

    Publication Year: 2011, Page(s):115 - 120
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (257 KB) | HTML iconHTML

    Ontology is the fundamental element of the semantic web that is a kind of knowledge presentation and can present the variety of property for concept. According to the regulation of Department of Health, Executive Yuan, R.O.C, the hospital has implemented the new Hospital Accreditation from 2005. Furthermore, the Hospital Accreditation evolves the variety of items of accreditation. Medical adverse ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.