By Topic

Granular Computing (GrC), 2013 IEEE International Conference on

Date 13-15 Dec. 2013

Filter Results

Displaying Results 1 - 25 of 91
  • [Title page]

    Publication Year: 2013 , Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (131 KB)  
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2013 , Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (46 KB)  
    Freely Available from IEEE
  • Preface

    Publication Year: 2013 , Page(s): 1 - 2
    Save to Project icon | Request Permissions | PDF file iconPDF (84 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Conference committees

    Publication Year: 2013 , Page(s): 1 - 2
    Save to Project icon | Request Permissions | PDF file iconPDF (93 KB)  
    Freely Available from IEEE
  • Program committees

    Publication Year: 2013 , Page(s): 1 - 3
    Save to Project icon | Request Permissions | PDF file iconPDF (146 KB)  
    Freely Available from IEEE
  • Keynote speeches

    Publication Year: 2013 , Page(s): 1
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (70 KB)  

    Provides an abstract for each of the keynote presentations and a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An algorithm for reduct cardinality minimization

    Publication Year: 2013 , Page(s): 1 - 3
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (701 KB) |  | HTML iconHTML  

    This is devoted to the consideration of a new algorithm for reduct cardinality minimization. This algorithm transforms the initial table to a decision table of a special kind, simplify this table, and use a dynamic programming algorithm to finish the construction of an optimal reduct. Results of computer experiments with decision tables from UCI ML Repository are discussed. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Boosting for learning from multiclass data sets via a regularized loss function

    Publication Year: 2013 , Page(s): 4 - 9
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1471 KB) |  | HTML iconHTML  

    Boosting methods employ a sequence of base classifiers to improve accuracy. While successful with binary classification, the conversion from binary boosting to multi-class boosting is not straight forward. The direct extension avoids converting the problem into multiple binary problems but suffers several problems including a vague determination of the error condition for each base classifier, an ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bi-superintuitionistic logics for rough sets

    Publication Year: 2013 , Page(s): 10 - 15
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (667 KB) |  | HTML iconHTML  

    Bi-intuitionistic logic, also called Heyting-Brouwer logic, is a logic based on Heyting and Brouwerian algebras. A rough set logic based on regular double Stone algebra is regarded as the extension of bi-intuitionistic logic without intuitionistic and dual intuitionistic implication. In this paper, we discuss the aspects of bi-superintuitionistic logics which are stronger than bi-intuitionistic lo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Granular based analytical hierarchical process

    Publication Year: 2013 , Page(s): 16 - 21
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (439 KB) |  | HTML iconHTML  

    Analytical Hierarchical Process (AHP) is one of the famous methods of solving multi criteria decision making problems, in some cases the preference ratios can be represented by different types of uncertain numbers such as: interval numbers, fuzzy numbers and rough numbers. These heterogeneous types of numbers are forming a challenge in computing and choosing the best alternative. This work propose... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • P2P traffic identification based on transfer learning

    Publication Year: 2013 , Page(s): 22 - 26
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (724 KB) |  | HTML iconHTML  

    With the rapid development of Internet, a large number of peer networks (Peer-to-Peer) applications rise and are widely used. Because of this, it is more difficult for network operators to manage and monitor their networks in a proper way. To identify the peer networks applications generating the traffic traveling through networks is necessary and if we can identify them sooner, we control them be... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • MC framework: High-performance distributed framework for standalone data analysis packages over Hadoop-based cloud

    Publication Year: 2013 , Page(s): 27 - 32
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1252 KB) |  | HTML iconHTML  

    The Hadoop MapReduce is the programming model of designing the scalable distributed computing applications, that provides developers can attain automatic parallelization. However, most complex manufacturing systems are arduous and restrictive to migrate to private clouds, due to the platform incompatible and tremendous complexity of system reconstruction. For increasing the efficiency of manufactu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Container-code pattern recognition based on attribute grid computing

    Publication Year: 2013 , Page(s): 33 - 37
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (515 KB) |  | HTML iconHTML  

    A new container-code pattern recognition algorithm based on attribute grid computing is presented in this paper. The algorithm takes advantage of attribute grid computing, which is a new kind of calculator based on qualitative mapping. In this paper, character feature points are firstly modeled by qualitative criterion attribute grid computing. Then characteristics of each attribute are extracted ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The YTM-based stock portfolio mining approach by genetic algorithm

    Publication Year: 2013 , Page(s): 38 - 42
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1224 KB) |  | HTML iconHTML  

    This study proposes a yield-to-maturity (YTM)-based genetic portfolio selection model with user defined constraints, namely YTMGPSM. A set of real numbers are encoded into a chromosome to form a possible portfolio, which presents whether buy or not buy and purchased units of assets. The fitness value of a chromosome is evaluated by return on investment, value at risk and suitability of the respect... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Parallel mining frequent patterns over big transactional data in extended mapreduce

    Publication Year: 2013 , Page(s): 43 - 48
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (671 KB) |  | HTML iconHTML  

    In big data era, data size has raised from TB-level to PB-level. Traditional algorithm can not satisfy the needs of big data computing. This paper design a parallel algorithm for mining frequent pattern over big transactional data based on an extended MapReduce Frame. In which, the mass data file is firstly split into many data subfiles, the patterns in each subfile can be quickly located based on... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Defensive strategy of the goalkeeper based on the 3D vision and field division for the middle-size league of robocup

    Publication Year: 2013 , Page(s): 49 - 52
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1271 KB) |  | HTML iconHTML  

    In the Middle-size League of RoboCup, the situation on the ground is unpredictable as the football moves irregularly whether viewed from the speed or the direction or the height of the football movement. Therefore, a single defensive strategy cannot meet the demands of the goalkeeper for the goalkeeping. In view of this, this paper proposes the use of dynamic vision and 3D imaging technology, whic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The design and implementation of the kernel level mobile storage medium data protection system

    Publication Year: 2013 , Page(s): 53 - 57
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1719 KB) |  | HTML iconHTML  

    After decryption, the data in mobile storage is lack of the protection from encryption. To solve this problem, our team proposed an aprotection scheme for classified documents, which is based on kernel level file filtering system, implements a set of data protection system for mobile storage medium. First, through the transparent encryption technology, ensure that unauthorized visitors cannot acce... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using end-to-end data encryption to secure SIP device configuration

    Publication Year: 2013 , Page(s): 58 - 63
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (419 KB) |  | HTML iconHTML  

    Security between the endpoints is an important requirement for network transmission. One existing solution of End-to-End security is based on the certificate of the third-party enterprise such as the authorization from ISP. And the other methods usually established a virtual private tunnel between the two endpoints. Considering the SIP device configuration basically used tftp protocol to transmit ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An ad-hoc clustering algorithm based on ant colony algorithm

    Publication Year: 2013 , Page(s): 64 - 69
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1232 KB) |  | HTML iconHTML  

    This paper proposes a new Ad Hoc clustering algorithm based on ant colony algorithm. The protocol has introduced the node reliability to reflect the node communication environment situation and how busy the node is. At the same time, the node reliability is one of the node pheromone factors. In the process of clustering and cluster maintenance, it elects the optimal node as cluster head to managem... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Finding time series motifs based on cloud model

    Publication Year: 2013 , Page(s): 70 - 75
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1319 KB) |  | HTML iconHTML  

    The research of finding time series motifs has received much attention recently. In an earlier work, we proposed a relatively comprehensive definition of K-motifs to mine more frequent patterns from time series datasets. However, that work has not given a method to select a better K-motif when we encounter the situation that there are several candidate K-motifs. This paper addresses the problem by... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Comparison of global and local probabilistic approximations in mining data with many missing attribute values

    Publication Year: 2013 , Page(s): 76 - 81
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (886 KB) |  | HTML iconHTML  

    We present results of a novel experimental comparison of global and local probabilistic approximations. Global approximations are unions of characteristic sets while local approximations are constructed from blocks of attributevalue pairs. Two interpretations of missing attribute values are discussed: lost values and “do not care” conditions. Our main objective was to compare global ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling and control of a sugars precipitation process for Chinese medicine mixed solution

    Publication Year: 2013 , Page(s): 82 - 87
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1313 KB) |  | HTML iconHTML  

    This paper illustrates the benefits of a multivariable control approach applied to a sugar precipitation process for Chinese medicine mixed solution. This relevant approach proposes setpoints tracking for the crystal mass/concentration couple. In this purpose, a model dedicated to the stage precipitation is designed, without consideration of crystal size distribution. The performance of the propos... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-agent comprehensive evaluation on inland port production efficiency based on arrtibute theory

    Publication Year: 2013 , Page(s): 88 - 90
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (375 KB) |  | HTML iconHTML  

    Multi-agent Attribute Coordinate Comprehensive Evaluation Method(MACCEM) simulates Multi-agent psychological curve by structuring multi-agent barycentric coordinate points so as to realize the multi-agent evaluation function. Based on MACCEM index system of inland port production efficiency evaluation is established. Then 22 China inland port production efficiency are evaluated and sorted through ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The construction and research of lightweight cryptography SOPT-S boxes based on the inverse mapping in galois field

    Publication Year: 2013 , Page(s): 91 - 98
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1319 KB) |  | HTML iconHTML  

    As the weakness like poor performance in cryptology and single type in the utility of the S boxes in nonlinear layer of the existing lightweight cryptography algorithm such as PRESENT, LED and KLEIN, the safety of algorithm in sensor nodes meet a notable decrease, which brings huge difficulties to information protection of sensor nodes in city security defense and to decryption resisting of milita... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Information fusion of multi-fuzzy information systems

    Publication Year: 2013 , Page(s): 99 - 104
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (481 KB) |  | HTML iconHTML  

    This paper discusses the fusion of multi-fuzzy information systems and hypotheses choice. First, the basic definitions and properties of fuzzy rough sets, belief and plausibility functions and entropy are reviewed. Then, we study the fusion method for multi-fuzzy information systems. Finally, we define the entropy of multi-fuzzy information systems and the conditional entropy of multi-fuzzy inform... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.