2018 International Conference on Artificial Intelligence and Big Data (ICAIBD)

26-28 May 2018

Filter Results

Displaying Results 1 - 25 of 66
  • [Front cover]

    Publication Year: 2018, Page(s):c1 - c4
    Request permission for commercial reuse | PDF file iconPDF (835 KB)
    Freely Available from IEEE
  • [Title page]

    Publication Year: 2018, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (34 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2018, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (60 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2018, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (126 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2018, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (88 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2018, Page(s): v
    Request permission for commercial reuse | PDF file iconPDF (93 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2018, Page(s): vi
    Request permission for commercial reuse | PDF file iconPDF (104 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2018, Page(s): vii
    Request permission for commercial reuse | PDF file iconPDF (90 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2018, Page(s): viii
    Request permission for commercial reuse | PDF file iconPDF (88 KB)
    Freely Available from IEEE
  • Committees

    Publication Year: 2018, Page(s):ix - x
    Request permission for commercial reuse | PDF file iconPDF (66 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2018, Page(s):287 - 290
    Request permission for commercial reuse | PDF file iconPDF (79 KB)
    Freely Available from IEEE
  • A commodity evaluation algorithm based on commodity review abstracts

    Publication Year: 2018, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (217 KB) | HTML iconHTML

    With the rapid development of e-commerce industry, more and more people are accustomed to online shopping. At the same time, the quality of the product has become an important indicator of consumer online shopping, How to recommend consumers with good quality, good reputation products become the focus of current research. This article aims to conduct multi-dimensional evaluation of the product fro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bayesian network's parameter update method based on maximum likelihood estimates

    Publication Year: 2018, Page(s):6 - 9
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (220 KB) | HTML iconHTML

    A probability parameter updating method for Bayesain network with fixed structure and initial probability parameters is discussed, when new data set is available. It should reserve the original probability parameters as much as possible and also reflect the probability distribution contained in data set furthest. Principle of parameters updating based on MLE is discussed, algorithms for complete d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application of ensemble learning algorithm in aircraft probabilistic conflict detection of free flight

    Publication Year: 2018, Page(s):10 - 14
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1456 KB) | HTML iconHTML

    Aiming at improving the aircraft conflict detection precision in a single classifier, a probabilistic conflict detection algorithm based on ensemble learning was proposed. Firstly, aircraft conflict model was established for the purpose of selecting flight datasets. Secondly, the current positions, speed vectors, look-ahead time, estimated turning time and turning angles were extracted as features... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A hierarchical set-partitioning nonlinear discriminant classifier trained by an evolutionary algorithm

    Publication Year: 2018, Page(s):15 - 20
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (294 KB) | HTML iconHTML

    This paper is the fourth in our series of papers on a novel nonlinear discriminant classifier. The model is based on elementary mathematical operators, yet is able to produce 100% accuracy on training data without compromising generalization ability. The reason behind the model's capabilities stem from its ability to partition the training data into a hierarchy of groups in such a way that a separ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A recursive descent evaluation algorithm on policy context similarity

    Publication Year: 2018, Page(s):21 - 25
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (249 KB) | HTML iconHTML

    This paper proposes a new policy text similarity calculation method after the analysis and research of the domestic and foreign traditional text similarity calculation based on vector space model. The method which is based on the policy text pretreatment and recursive descent technology presents a computation method of fitting degree among policy clauses and similarity among policy text. The gener... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A novel clustering algorithm combining niche genetic algorithm with canopy and K-means

    Publication Year: 2018, Page(s):26 - 32
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (428 KB) | HTML iconHTML

    Given a dataset, it is difficult to find the number of natural clusters and moreover the clustering result is sensitive to the selection of the initial seeds. This sensitivity can make many clustering algorithms converge to the local optima. This paper proposes a novel niching genetic algorithm (NNGA) with K-means (NClust) that is capable of automatically finding the better number of clusters and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improvement of the sample mutation strategy based on fuzzing framework peach

    Publication Year: 2018, Page(s):33 - 37
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (267 KB) | HTML iconHTML

    Fuzzing technology plays an important role in the process of vulnerability mining. Peach is a relatively mature tool in Fuzzing technology. In this paper, the sample mutation strategy in the Peach framework are studied, and the improved scheme is proposed. The scheme is shown in two aspects: first, on the basis of one-dimensional mutation strategy this paper puts forward a multi-dimensional mutati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-source homogeneous continuous context inconsistency elimination algorithm based on improved basic probability assignment

    Publication Year: 2018, Page(s):38 - 42
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (403 KB) | HTML iconHTML

    In the dynamic and open environment, context-aware systems (CASs) obtain context information from dynamic, distributed and heterogeneous sources, but this context information usually has the inconsistency which would lead to inappropriate services. In this paper, a multi-source homogeneous continuous context inconsistency elimination algorithm based on the improved basic probability assignment (BP... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The research of policy big data retrieval and analysis based on elastic search

    Publication Year: 2018, Page(s):43 - 46
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (354 KB) | HTML iconHTML

    As big data technologies develop, data retrieval and analysis has become an important research topic recently. This paper designs and implements a data retrieval and analysis platform based on elastic search. On the one hand, the system can store and search policy big data efficiently and reliably, and index data with real-time performance. On the other hand, policy big data has its own characteri... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-source heterogeneous data fusion

    Publication Year: 2018, Page(s):47 - 51
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (313 KB) | HTML iconHTML

    As the exponential growth of data in internet era, there comes the big data era. Big data fusion creates huge values that makes it a research hotspot. However, in big data era, data shows characters of large volume, velocity, veracity and especially variety which is also called heterogeneity. Multiple different sources of data lead to data heterogeneity. Multi-source heterogeneous data brings oppo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IoT data acquisition in fashion retail application: Fuzzy logic approach

    Publication Year: 2018, Page(s):52 - 56
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (519 KB) | HTML iconHTML

    The fashion industry operates in a fast moving and dynamic environment which requires fashion designers to respond to market trends continuously. This paper investigates potential for application of Internet of Things (IoT) and the related state-of-the-art research efforts in fashion retail. Non-purchasing behaviors are seldom recorded in retail. What customers are interested in may not reflect to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A financial statement fraud detection model based on hybrid data mining methods

    Publication Year: 2018, Page(s):57 - 61
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (285 KB) | HTML iconHTML

    Financial statement fraud has been a difficult problem for both the public and government regulators, so various data mining methods have been used for financial statement fraud detection to provide decision support for stakeholders. The purpose of this study is to propose an optimized financial fraud detection model combining feature selection and machine learning classification. The study indica... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Smart governance through bigdata: Digital transformation of public agencies

    Publication Year: 2018, Page(s):62 - 70
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (438 KB) | HTML iconHTML

    Bigdata is a potential instrument to transform traditional governance into smart governance. There are a long debate and discussion on the application of big data for the transformation of traditional public administration to modern and smart public administration in the academician, researchers, and policymakers. This study aims to explore the suitability and applicability of big data for smart g... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CSV-ANNOTATE: Generate annotated tables from CSV file

    Publication Year: 2018, Page(s):71 - 75
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (371 KB) | HTML iconHTML

    The Semantic Web is a part of the current World Wide Web (WWW), which can facilitate a common mechanism to publish, share, and reuse data beyond the boundaries of web applications. It is widely believed that the majority of the datasets stored on the current web are in tabular data format (CSV, spreadsheets, SQL dumps, HTML tables etc), commonly in the comma-separated values (CSV) format. In order... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.