By Topic

Fuzzy Systems and Knowledge Discovery (FSKD), 2012 9th International Conference on

Date 29-31 May 2012

Filter Results

Displaying Results 1 - 25 of 668
  • Fuzzy rough communication based on multi-agent

    Publication Year: 2012 , Page(s): 229 - 233
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (240 KB) |  | HTML iconHTML  

    The concept of variation fuzzy rough sets is put forward and its relevant properties and theorems are discussed; then the mathematical model of the optimal transfer sequence in the process of fuzzy rough communication among some agents is built, and the method of solving this kind of mathematical model is proposed. Finally, the example, concerning signal transfer verifies the validity of the method. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application research of Web3D technology in three-dimensional show of oil well pitshaft information

    Publication Year: 2012 , Page(s): 2607 - 2610
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (318 KB) |  | HTML iconHTML  

    Oil well pitshaft information is important information of maintaining oil production and executing measure of tapping the potential, According to the actual situation of oil well pitshaft information show, Three-dimensional visualization technology base on web is adopted, The integrated use of 3D modeling technology and three-dimensional model Web publishing technology realized the network application of oil well pitshaft information show and using database technology realized the demonstration of three-dimensional model and querying of database information via database technology and for production managers check device information and well completion status and production measures quickly and made scientific and rational decision timely and provided a network platform which is quick and visual and tangible and it is very important for the prevention of mine accidents and long-term exploitation of oil. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimizing parameters of algorithm trading strategies using MapReduce

    Publication Year: 2012 , Page(s): 2738 - 2741
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (299 KB) |  | HTML iconHTML  

    In algorithm trading, computer algorithms are used to make the decision on the time, quantity, and direction of operations (buy, sell, or hold) automatically. To create a useful algorithm, the parameters of the algorithm should be optimized based on historical data. However, Parameter optimization is a time consuming task, due to the large search space. We propose to search the parameter combination space using the MapReduce framework, with the expectation that runtime of optimization be cut down by leveraging the parallel processing capability of MapReduce. This paper presents the details of our method and some experiment results to demonstrate its efficiency. We also show that a rule based strategy after being optimized performs better in terms of stability than the one whose parameters are arbitrarily preset, while making a comparable profit. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic density-based clustering algorithm over uncertain data streams

    Publication Year: 2012 , Page(s): 2664 - 2670
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (289 KB) |  | HTML iconHTML  

    In recent years, the uncertain data stream which is related in many real applications attracts more and more attention of researchers. As one aspect of uncertain character, existence-uncertainty can affect the clustering process and results significantly. The lately reported clustering algorithms are all based on K-Means algorithm with the inhere shortage. DCUStream algorithm which is density-based clustering algorithm over uncertain data stream is proposed in this paper. It can find arbitrary shaped clusters with less time cost in high dimension data stream. In the meantime, a dynamic density threshold is designed to accommodate the changing density of grids with time in data stream. The experiment results show that DCUStream algorithm can acquire more accurate clustering result and execute the clustering process more efficiently on progressing uncertain data stream. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Notice of Retraction
    Notice of Retraction
    Research on influence of corporate external governance mechanism on enterprise performance

    Publication Year: 2012 , Page(s): 2782 - 2786
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (395 KB) |  | HTML iconHTML  

    Notice of Retraction

    After careful and considered review of the content of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE's Publication Principles.

    We hereby retract the content of this paper. Reasonable effort should be made to remove all past references to this paper.

    The presenting author of this paper has the option to appeal this decision by contacting TPII@ieee.org.

    Notice of Retraction

    After careful and considered review of the content of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE's Publication Principles.

    We hereby retract the content of this paper. Reasonable effort should be made to remove all past references to this paper.

    The presenting author of this paper has the option to appeal this decision by contacting TPII@ieee.org.

    Corporate governance and enterprise performance has always been the importance by academic and practical circles. But research of the influence of corporate external governance mechanism on enterprise performance is less. This paper chooses the manufacturing listed companies both in Shanghai and Shenzhen Stock Exchanges during the period of 2007 and 2009 as the research samples, constructs a measure system of external governance mechanism, uses OLS testing the relationship between the external governance mechanism and the enterprise performance. The results show that creditors have significant negative correlation with enterprise performance, suppliers, employees, external auditing and supervision of government has a significant positive correlation with enterprise performance, and the customer's impact on corporate performance is not significant. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mining community in social network using call detail records

    Publication Year: 2012 , Page(s): 1641 - 1645
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (374 KB) |  | HTML iconHTML  

    With the popularity of mobile devices and wireless technologies, mobile social network systems are increasingly available. In this paper we propose a new algorithm called Community Detection algorithm for mining interesting communities or groups in a Campus Mobile Social Network (CMSN). The proposal algorithm is composed of two main components, an algorithm for community partition and an algorithm for selecting small communities to combine into a big community. Empirical studies on a campus mobile social network show that performance of the proposal algorithm is better than the state-of-the-art Newman Clustering algorithm for mining community in CMSN. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A quick attribute reduction algorithm based on knowledge granularity

    Publication Year: 2012 , Page(s): 220 - 223
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (258 KB) |  | HTML iconHTML  

    The research of knowledge granularity has been a hotspot at home and abroad. In incomplete information systems of the rough set, we give a formula, which calculates the attribute frequency directly without acquiring the discernibility matrix. Then applying it to the field of knowledge granularity, we give a quick calculation of the attribute reduction algorithm, which of the time complexity is O(|C|2|U|) in the worst case. The example result shows that the algorithm is correct and efficient. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mechanism explanation on the growth rule of scientific literature

    Publication Year: 2012 , Page(s): 1519 - 1522
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (202 KB) |  | HTML iconHTML  

    In this paper, we studies on the exponential growth model, the logistic growth model, Shetopal -Burman growth model, systematic growth model and general growth model. The factors which affect the growth of scientific literature are complex and multifaceted, they include outside factors and inside factors of development of scientific literatures. The mechanism of the scientific literature growth were analyzed deeply, the total literature of a lot of literature growth rule is defined a new one and the mechanism explanation of the literature growth rule affected by the old of literature is given out in this paper. The parameters which correspond to the scientific research fee and the quantum of researchers in the systematic growth model of scientific literature are listed in the end. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The research of the resident user classification based on the maximum entropy in the smart grid

    Publication Year: 2012 , Page(s): 1563 - 1566
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (338 KB) |  | HTML iconHTML  

    In this paper, a novel approach was proposed for recognizing resident user type in the power consumption field, based ME some interesting features had been discussed. The probabilistic feature functions are used instead of binary feature functions, it is one of the several differences between this model and the most of the previous ME based model. We also explore several novel features in our model, which includes peak load power consumption rate (PCRP), load rate (LR), user cooperation degree (UCD) and so on. Unlike those in some previous works, the maximum entropy algorithm was used firstly in the power consumption field. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficiently mining special patterns

    Publication Year: 2012 , Page(s): 646 - 649
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (220 KB) |  | HTML iconHTML  

    One of the main tasks of KDTCM (knowledge discovery in Traditional Chinese Medicine) is discovering paired or grouped drugs in Chinese Medical Formula database. Paired or grouped drugs are special combinations of two or more kinds of drugs. They not only have strong efficacy, but also can be used to construct formula classification rules. Associated and correlated pattern mining is effective in a certain extent because of the large number of correlation and association relationships among various kinds of drugs. However, both independent associated patterns and mutually positively correlated simultaneous associated patterns have the downward closure property. They might be more special and have probability greater than associated and correlated patterns to be paired or grouped drugs. Therefore, in this paper, we develop an algorithm for generating all such kinds of patterns synchronously. Experimental results show that the proposed techniques in the paper are effective and feasible. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Stability analysis for a type of T-S fuzzy control systems using integral quadratic constraints

    Publication Year: 2012 , Page(s): 376 - 380
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (249 KB) |  | HTML iconHTML  

    Recently, the well-known circle criterion and Popov criterion are introduced to investigate the stability of a type of T-S fuzzy control systems. Although both the two corresponding stability conditions have elegant graphical interpretations, the relation of them is not well studied. In this paper, we try to explain the two conditions by a new unified stability condition, which is based on the integral quadratic constrains (IQCs). In addition, the proposed method is less conservative than the circle criterion and Popov criterion based methods. A numerical example is given to demonstrate how to use this criterion in analyzing the T-S fuzzy control systems. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • World cloud cover feature extraction base on wavelet and statistics from ISCCP D2 dataset

    Publication Year: 2012 , Page(s): 1577 - 1580
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (683 KB) |  | HTML iconHTML  

    In order to extract cloud cover feature from ISCCP D2 dataset, a method of feature extraction using wavelet and statistics was used. This method concerned the characteristic of the cloud cover and the applications requirement, and combined the autocorrelation function, partial autocorrelation function with the wavelet method. We can get the conclusion from the features: (1) the features from wavelet analysis are more evident than the features from original series; (2) most of the cloud amount series in ISCCP D2 dataset are stationary series, and the autocorrelation functions (AF) and partial autocorrelation functions (PAF) shows there are diurnal cycle in these series. As a result, it is possible to establish ARIMA model to estimate the cloud amount for a small region in the world. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research and simulation on the upper bound of the price of network anarchy

    Publication Year: 2012 , Page(s): 2759 - 2763
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (528 KB) |  | HTML iconHTML  

    Uncoordinated agents in society usually assumed to take their own optimal strategies do not always achieve the social optimum. In transportation network, travelers are assumed to choose the route that minimizes their own travel costs, which will form a Nash Equilibrium called user equilibrium where no one could be better off by changing routes in the network. This type of routing strategy named self-routing is socially suboptimal. Consequently the society has to pay a price of anarchy for the lack of coordination among travelers. In this paper we revisit the definition of price of anarchy (POA) and analyze its upper bound under different latency functions. We review some simulation results of several major cities and investigate the difference between optimum and actual system performance in the real transportation network. A numerical simulation of Sioux network is conducted based on the classical computational procedures. The results indicate that the shape of POA as a function of input flow is not diatonic but rather fluctuating. Then we propose some more insights of POA. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and implementation of channelized data acquisition card for Iub interface in 3G network

    Publication Year: 2012 , Page(s): 2161 - 2165
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (404 KB) |  | HTML iconHTML  

    In order to achieve real-time monitoring, evaluation and analysis of the Iub interface in 3G network with better use of the existing 3G network resource, it studied and designed a scheme of channelized data acquisition card for Iub interface. Compared to the existing data acquisition cards for Iub interface, the proposed scheme designed a modular channelized data acquisition card, which not only gave a method on STM-1/E1's multiplexing and de-multiplexing based on the space-division and time-division switching, but also proposed the algorithm of getting IMA group binding information automatically. Practical testing and application results have demonstrated that the designed data acquisition card is of high flexibility and compatibility. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Notice of Retraction
    Convergence and divergence analysis on China's regional financial development

    Publication Year: 2012 , Page(s): 1494 - 1499
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (414 KB) |  | HTML iconHTML  

    Notice of Retraction

    After careful and considered review of the content of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE's Publication Principles.

    We hereby retract the content of this paper. Reasonable effort should be made to remove all past references to this paper.

    The presenting author of this paper has the option to appeal this decision by contacting TPII@ieee.org.

    Notice of Retraction

    After careful and considered review of the content of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE's Publication Principles.

    We hereby retract the content of this paper. Reasonable effort should be made to remove all past references to this paper.

    The presenting author of this paper has the option to appeal this decision by contacting TPII@ieee.org.

    The paper employs Gini coefficient decomposition approach to uncover the change tendency of regional financial development disparity in China and the change characteristics of sources of the disparity, and uses MEDD to deeply analyze the shape of distribution of regional financial disparity and the transition characteristics of internal structure. The results reveal that the regional financial development disparity shows a reduction-expansion-reduction trend, and the disparities between different regions dominate the change tendency. The dominant factors successively manifested in the movement of high level club towards low level one, polarization, and the movement of low level club towards high level one. The convergence tendency of regional financial development in recent years demonstrates that the coordinated regional development strategy adopted by China has achieved significant effects. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A simple multifractal model for rainfall IDF analysis in China

    Publication Year: 2012 , Page(s): 1461 - 1465
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (550 KB) |  | HTML iconHTML  

    The rainfall Intensity-Duration-Frequency (IDF) curves is one of the most commonly tools used in water resources engineering. A simple multifractal rainfall model with multifractal behavior approved by Andreas Langousis is used to estimate the IDF curves in this paper. The model is composed of exterior and interior process with constant duration D and “bare” intensity ID'. Using high resolution data of rainfall record, Langousis gives the conclusion that the results of the IDF curves tends insensitive to the length of data record. So, in this paper, the 6 years rainfall data at 5-min resolution at Nanxiong station, Guangdong province, China, are applied with the model to estimate the IDF curves. Compared to the traditional parametric models, it reduces the amount of parameters required to be calculated, and 6 years of high resolution rainfall data is capable to estimate the IDF curves. 22 years maxima annual daily rainfall data are fitted by the Pearson-3(P3) distribution to obtain the daily rainfall intensities for different return period T. The results are similar to 24h rainfall intensities of the multifractal model with T ≤ 100 years. The study is of significant practical importance in China for the regions lacking of long sufficient rainfall data. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Chinese document image retrieval based on recognition candidates

    Publication Year: 2012 , Page(s): 2892 - 2897
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (440 KB) |  | HTML iconHTML  

    For the sake of the low recognition rate for degraded Chinese document, the retrieval performance is not good if directly based on OCR result. In this paper, an indexing method with n-gram and recognition candidates is proposed to improve the performance of retrieval. For ease of test, this paper also presents a method to automatically generate ground-truth of imaged document, synthesized degraded document image and ground-truth of recognition candidates. Several synthesized document image collections on large-scale are built and used, and the experimental results show that the retrieval performance are improved for both collections with high or low OCR error rates. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An intelligent control architecture for search robot based on orthogonal perception information

    Publication Year: 2012 , Page(s): 2348 - 2352
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (624 KB) |  | HTML iconHTML  

    In order to address the problem of control architecture on Urban Search and Rescue (USAR) robotic system, a comprehensive victim's autonomous search and rescue robotic system based on biomimetic sensing technology is developed, and an intelligent robot control architecture based on orthogonal perception information is proposed. The intelligent control architecture contains sensory system, data processing, deliberative layer, priority decision module and so on. Experiments indicate that the search and rescue robotic system utilizing proposed intelligent control architecture search and discover victims promptly and efficiently. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The analysis of harmonic frequency test for interlocking system

    Publication Year: 2012 , Page(s): 2999 - 3003
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (4695 KB) |  | HTML iconHTML  

    Electrical Railroads provide electric power, which can operate vehicles, via feeder wires. And the supplied current returns to the transformer substation through lines and ground net. The used load current depending on the railway vehicles operation returns to the substation through a track which is a return circuit. The load current contains harmonics because of the power conversion equipment used in rolling stocks and such harmonic currents should not affect train control system. In this paper we present the test result in order to verify that the harmonics produced by the operation of rail vehicles in the newly built electric railway sections can affect interlocking systems. The test in question was performed in a linking section that trackside equipment under railway operating conditions and interlocking are linked in order to identify whether or not the interlocking fitted in a signal machine room can be affected by harmonics due to railway operation. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Transfer learning based on graph ranking

    Publication Year: 2012 , Page(s): 1353 - 1357
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (370 KB) |  | HTML iconHTML  

    A fundamental assumption in machine learning is that the data distributions of the training and the test sets should be identical. When the assumption does not hold, the traditional machine learning algorithms might perform worse. In this paper, we tackle this transfer learning problem by implementing a general graph ranking framework for a sentiment classification task. We construct a fusion graph model by using the in-domain and the out-of-domain data. The in-domain data can help us to get pseudo labels of the out-of-domain data. The out-of-domain data can help us to update the labels and can get the convincing prediction labels. Experimental results show the significant improvements in accuracy and demonstrate the effectiveness of this algorithm. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mining scalable pattern based on temporal logic over data streams

    Publication Year: 2012 , Page(s): 1150 - 1154
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (319 KB) |  | HTML iconHTML  

    In many data stream applications, data segments which are sequential and complicatedly changeable always imply great domain specific value. Especially in the field of medical survey, mining such sequential data segments will help making diagnosis. We discovered that, based on extensive analysis, although containing rich semantics, these data segments are actually composed of some certain basic units, and these units can form different kinds of complex patterns with duplication or lack in certain positions considering a temporal logic. Therefore, we present a scalable pattern mining method. With this method, the Scalable Pattern Tree (SPTree) structure is designed to support the expression of scalable semantics and efficient mining. At last, the experimental results on real datasets prove that our method is feasible and efficient. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The research on optimization method for dynamic reduct

    Publication Year: 2012 , Page(s): 270 - 273
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (286 KB) |  | HTML iconHTML  

    The paper analyses the deficiencies of traditional generalized dynamic reduct algorithm and proposes a fast algorithm based on the validity of reduct. The algorithm only needs to calculate part of the subtable to get the generalized dynamic reduct. It decreases the number of subtables that need to calculate the reduct by using the stability threshold, and filters the reduct of subtables that are not to be the generalized dynamic reduct by utilizing the optimal stability coefficient. The result shows that the fast method is more effective than the traditional algorithm. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A case study: Intelligent false alarm reduction using fuzzy if-then rules in network intrusion detection

    Publication Year: 2012 , Page(s): 505 - 509
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (210 KB) |  | HTML iconHTML  

    Nowadays, network intrusion detection systems (NIDSs) have become an essential part for the network security infrastructure. However, the large number of false alarms is a big problem for these detection systems which greatly reduces their effectiveness and efficiency. To mitigate this problem, we have developed an intelligent false alarm filter to help filter out false alarms by adaptively and periodically selecting the most appropriate machine learning algorithms (e.g., support vector machine, decision tree, k-nearest neighbor) that conduct the best single-algorithm performance. Therefore, our intelligent false alarm filter can keep reducing the number of false alarms at a high and stable level. In this paper, we aim to conduct a case study in exploring the performance of our developed false alarm filter by implementing a fuzzy classifier based on if-then rules. By comparing with other algorithms that have been implemented in our false alarm filter, the experimental results show that the if-then rules based fuzzy algorithm performs a bit better than the baseline algorithm and can be improved by selecting an appropriate fuzzy partition. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Decoupling design of rolling aircraft using adaptive neuro-fuzzy inference systems based on T-S model

    Publication Year: 2012 , Page(s): 339 - 343
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (254 KB) |  | HTML iconHTML  

    Considering the coupling problem which is adverse to the control performance of rolling aircraft system, a dynamic decoupling method is proposed combining the feedforward compensation decoupling method and the adaptive neuro-fuzzy inference system. First, the decoupling compensation principle is deduced under the feedforward decoupling framework. And then, the adaptive neuro-fuzzy inference system based on Takagi-Sugeno model is adopted to approximate the decoupling compensation principle. At last, the trained adaptive neuro-fuzzy inference system is used as the dynamic decoupling compensator in series form. A design example of actuator link in rolling aircraft is employed to verify the validity of this method. The simulation results indicate that this method can obtain good decoupling performance in both dynamic and steady responses when it is incapable to get the accurate system model. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intuitionistic fuzzy rough sets model based on (Θ, Φ)-operators

    Publication Year: 2012 , Page(s): 234 - 238
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (273 KB) |  | HTML iconHTML  

    The extension of rough set model is an important research direction in rough set theory. The aim of this paper is to present a new extension. At the first, we introduce a pair of dual intuitionistic fuzzy operators (Θ, Φ). And some important properties are examined about these these operators. Moreover, θ-lower and φ-upper approximation operators are defined, by using the operators, and a novel intuitionistic fuzzy rough set model is constructed based on an intuitionistic fuzzy equivalence relation. Furthermore, some valuable properties are obtained in the model. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.