default search action
ICMLC 2012: Xian, Shaanxi, China
- International Conference on Machine Learning and Cybernetics, ICMLC 2012, Xian, Shaanxi, China, July 15-17, 2012, Proceedings. IEEE 2012, ISBN 978-1-4673-1484-8
Data Fusion and Ensemble Methods
- Xiao Yu, You-Dong Zuo:
Profit and loss calculation model of data synchronization based on Markov chain. 1-5 - Filippo Sciarrone:
An extension of the Q diversity metric from single-label to multi-label and multi-ranking Multiple Classifier Systems for pattern classification. 6-10 - Ling Zhu, Lidia S. Chao, Derek F. Wong, Xiaodong Zeng:
A noun-phrase chunking model based on SBCB ensemble learning algorithm. 11-16 - Zhen-Long Du, Xiaoli Li, Li-Xin Jiao, Kangkang Shen:
Region duplication blind detection based on multiple feature combination. 17-21 - Xiaoli Li, Zhen-Long Du, Li-Xin Jiao, Kangkang Shen:
Data assimilation by coupling uncertain support vector machine with ensemble Kalman filter. 22-27 - Zefeng Wang, Jean-Luc Zarader, Sylvain Argentieri:
A novel fault diagnosis system for aircraft based on adaboost and five subsystems with different pattern recognition methods. 28-34 - Jian Sun, Leijun Li, Qinghua Hu:
Fault diagnosis based on pruned ensemble. 35-40 - Zhi-hua Jiang:
Weighted majority and fuzzy in tegral automated planner combination in Probabilistic Planning. 41-46 - Li-Juan Wang, Zhifeng Hao:
An improved link analysis based clustering ensemble method. 47-51 - Ying-Ying Cheng, Patrick P. K. Chan, Zhi-Wei Qiu:
Random forest based ensemble system for short term load forecasting. 52-56 - Jin-Cheng Li:
Boos ting multiple hash tables to search. 57-62
Data Mining and Knowledge Discovery
- Wen-Jing Zhang, Dong-Lai Ma, Bin Dong:
The automatic diagnosis system of breast cancer based on the improved Apriori algorithm. 63-66 - Suxiang Zhang, Luo-Ming Meng, Guoyang Gao, Ying Qin:
The research and application of the Chinese sports information extraction. 67-71 - Guoqing Chao, Shiliang Sun:
Applying a multitask feature sparsity method for the classification of semantic relations between nominals. 72-76 - Yunous Vagh, Jitian Xiao:
Mining temperature profile data for shire-level crop yield prediction. 77-83 - Xiongzong Li, Yi Xie, Cuihua Li, Xilong Sun:
Analyzing the public events' influence via open microblogging APIs. 84-90 - Lei Wang, Xing-Juan Fan, Xing-Long Liu, Huan Zhao:
Mining data association based on a revised FP-growth algorithm. 91-95 - Chayanan Nawapornanan, Veera Boonjing:
An efficient algorithm for mining complete share-frequent itemsets using BitTable and heuristics. 96-101 - Yu Liu, Yi Cai, Guangyi Zhang, Hong-Ke Zhao, Junting Chen, Huaqing Min:
Mining latent tag group based on tag dependency relation for recommendation in collaborative tagging systems. 102-106 - Jian Chen, Yi Cai, Yu Liu, Jingkai Li, Xuemiao Xu, Huaqing Min:
Multi-prototype based semantic similarity of concepts in ontology. 107-111 - Jun-Hai Zhai, Hong-Yu Xui, Su-Fang Zhang, Na Li, Ta Li:
Instance selection based on supervised clustering. 112-117 - Bin Liu, Shu-Gui Cao, Dong-Fang Cao, Qing-Chun Li, Hai-Tao Liu, Shao-Nan Shi:
An ontology based semantic heterogeneity measurement framework for optimization in distributed data mining. 118-123
Feature Selection and Manifold Learning
- Guo-Wan Shao:
Regularized max-min distance analysis for dimension reduction using the fisher criterion. 124-129 - Tong-Jun Li:
A type of attribute reduction of formal contexts. 130-135 - Xi-Feng Tong, Pengfei Li, Yu-Xiang Han:
An algorithm for fingerprint basic minutiae feature matching. 136-139 - Nabil M. Al-Rousan, Soroush Haeri, Ljiljana Trajkovic:
Feature selection for classification of BGP anomalies using Bayesian models. 140-147 - Wei Li, Qian-Hua He, Yan-Xiong Li, Xueyuan Zhang, Xiao-Hvi Feng:
Fractal dimension feature for distinguishing between overlapped speech and single-speaker speech. 148-151 - Haifeng Li, Hong-Bao Liu, Ning-Hua Ma:
Equivalence of MSE and MaxEnt as objective function of PCA. 152-156 - Meng-Yao Zhai, Rui-Hua Yu, Su-Fang Zhang, Jun-Hai Zhai:
Feature selection based on extreme learning machine. 157-162 - Li Lin:
Feature selection for cost-sensitive learning using RBFNN. 163-167 - Zhi-Wei Qiu:
Mutivariable mutual information based feature selection for electricity price forecasting. 168-173
Fuzzy Set Theories and Methods
- Dequan Shang, Xiao-Bin Guo:
Fuzzy minimal solution of positive fully fuzzy matrix equations. 174-178 - Qing-Qing Yan, Chao-Ying Liu, Xue-Ling Song, Zhe-Ying Song, Teng-Fei Li:
Application of T-S fuzzy modeling method in the bed temperature control of circulating fluidized bed boiler. 179-183 - Ming-Fen Wu, Hao-Han Han, Yan-Fei Si:
Properties and axiomatization of fuzzy rough sets based on fuzzy covering. 184-189 - Wen-Long Song, Chun-Mei Liu, Liang-Kuan Zhu:
Study on fuzzy adaptive variable structure attitude controller design. 190-194 - Eric C. C. Tsang, Weimin Ma, Bingzhen Sun:
Variable precision rough fuzzy set model based on general relations. 195-199 - Eric C. C. Tsang, Chen-Xia Jin, Degang Chen, Fa-Chao Li:
An attribute reduction method based on core samples set. 200-205 - Eric C. C. Tsang, S. Y. Zhao:
Attribute reduction based on interval valued fuzzy granules. 206-211 - Jiming Hu, Wei-Zhi Wu:
Belief and plausibility reducts in incomplete information systems with fuzzy decision. 212-218 - Guo-Fang Zhang, Li-Hui He, Rui-Hua Yu, Jia-Cheng He:
Fuzzy measure-based fuzzy rule interpolation based on PSO-based fuzzy integral-learning techniques. 219-225 - Zeng-Tai Gong, Zhan-Hong Shi, Ya-Bin Shao:
On characterization of fuzzy rough sets based on pseudo-operations. 226-232 - Zhan-Hong Shi, Zeng-Tai Gong, Ya-Bin Shao:
A novel similarity measure of intuitionistic fuzzy sets induced by triangular norm. 233-237 - Ya-Bin Shao, Zeng-Tai Gong:
The CONV ergence theorems of the McShane-Stieltjes integral for fuzzy-number-valued functions. 238-242 - Yan-Zong Yan, Xiao-Hong Yue, Xiao-Xia Zhang:
A ranking method of the interval-valued intuitionistic fuzzy numbers and its application in the group decision making. 243-248 - Xiaoxue Song, Xia Wang, Wen-Xiu Zhang:
Axiomatic approaches of fuzzy concept operators. 249-254 - Su-Yun Zhao, Si Lin:
Interval valued fuzzy rough classifier and its application on privacy protection. 255-260 - Yan Li, Zhen Han, Qiang He:
Multi-criteria sorting method based on AHP and variable precision rough set. 261-266 - Hua Zuo, Guo-Li Zhang:
An analysis of solutions for fuzzy multi-objective linear programming problem. 267-271 - Jun-Hai Zhai, Li-Yan Wan, Meng-Yao Zhai:
Attribute reduction based on the principle of maximal dependency and minimal mutual information. 272-276 - Wan-Lv Li, Degang Chen, Yanyan Yang:
A new method of attribute reduction for covering rough sets. 277-281 - Ran Wang, Sam Kwong, Degang Chen, Qiang He:
Fuzzy rough sets based uncertainty measuring for stream based active learning. 282-288 - Yingjie Li, Peter H. F. Ng, H. B. Wang, Simon C. K. Shiu, Yan Li:
Applying fuzzy integral to performance evaluation in real time strategy game. 289-295 - Changzhong Wang, Xin-Hua Cui, Wenying Bao, Qiang He:
Attribute reduction of decision table based on similar relation. 296-301 - Zhan-Jing Wang, Jiao-Ying Wang, Fa-Chao Li:
A method of ascertaining fuzzy covering based on a family of fuzzy concepts. 302-304 - Jing-Yuan Han, Yan-Bo Yang, Yun-He Zhao:
Evaluation of entrepreneurial environment based on fuzzy comprehensive evaluation method. 305-309
Neural Networks and Support Vector Machines
- Jin-Dong Shen:
New smooth support vector machine for regression. 310-314 - Pei-Yi Hao, Chao-Yi Wu:
GPS GDOP approximation using support vector regression algorithm with parametric insensitive model. 315-320 - Haiyan Yang, Xin-Xing Jing:
Performance test of parameters for speaker recognition system based on SVM-VQ. 321-325 - Min Jiang, Yang Yu, Xiaoli Liu, Fan Zhang, Qingyang Hong:
Fuzzy neural network based dynamic path planning. 326-330 - Yujing Shi, Xuejun Wang, Shasha Song:
The application research of book intelligent weeding based on neural network. 331-335 - Jin-Peng Xiang:
Active learning for person re-identification. 336-340 - Zhi-Qian Huang, Wing W. Y. Ng:
Empirical estimation of functional relationships between Q value of the L-GEM and training data using genetic programming. 341-348 - Zhi-Min He:
Cost-sensitive steganalysis with stochastic sensitvity and cost sensitive training error. 349-354 - Xing Su, Zheng-Ran Zhan, Chun-Ping Li:
Forecasting regional talent demand based on support vector machine. 355-359 - Atthapol Ngaopitakkul, Nuchtita Suttisinthong:
Discrete wavelet transform and probabilistic neural network algorithm for classification of fault type in underground cable. 360-366 - Yang Xue, Sha Wang:
CMAC neural network and single neuron PID composite control in the application of temperature control. 367-371 - Juan Chen, Haiyang Jia, Yuxiao Huang, Dayou Liu:
Learning the structure of Dynamic Bayesian Network with domain knowledge. 372-375 - Shao-Hua Yin, Jin-Cheng Li:
Iterative bilinear similarity measure learning for CBIR via a minimization of a local sensitivty. 376-381 - Guoyou Shi, Shuang Liu:
Model selection of RBF kernel for C-SVM based on genetic algorithm and multithreading. 382-386 - Ling Wang, Dong-Mel Fu, Wei-dong Yang:
A multiple SVR modeling of hot rolling process combined with kernel clustering and grey relational grade. 387-393 - Xue-Ling Liang, Wing W. Y. Ng:
Stock investment decision support using an ensemble of L-GEM based on RBFNN diverse trained from different years. 394-399 - Hui Yu, Fei Zhang:
Collaborative filtering recommender system in adversarial environment. 400-405 - Xi-Rong Wu, Patrick P. K. Chan:
SQL injection attacks detection in adversarial environments by k-centers. 406-410 - Jingjing Cao, Sam Kwong, Ran Wang, Ke Li:
A weighted voting method using minimum square error based on Extreme Learning Machine. 411-414 - Bailing Zhang:
Reliable face recognition by random subspace Support Vector Machine ensemble. 415-420 - Li Zhao:
Active Shape Model for facial feature points location. 421-426 - Jie Ji, Qiangfu Zhao:
NN C+SVM: An empirical study for fast classification. 427-433 - Yao-Quan Yang, Shou-Hui Wang, Yun-Fang Lin:
Soft sensor for coal mill primary air flow based on LSSVR. 434-439 - Xiu-Zhang Jin, Sheng-Ping Zhao, Lin Li:
Dynamic matrix control based on neural networks error compensation. 440-443 - Xiu-Zhang Jin, Lin Li:
Elman neural network in the soft sensor modelling for the unburned carbon in fly ash from utility boilers. 444-447 - Da-Zeng Tian, Gui-Bing Peng, Minghu Ha:
Fuzzy support vector machine based on non-equilibrium data. 448-453 - Yongwei Li, Tao Yuan, Jing-Jin Han, Jing-Fei Zhu:
The application of RBF neural network in the complex industry process. 454-459 - Binbin Sun, Daniel S. Yeung:
Sparse LS-SVM two-steps model selection method. 460-465 - Chun-Mei Liu:
Comparative study of financial distress prediction via op timized SVM. 466-470 - Yan-Shuo Chu, Ya-Qiu Liu, Qu Wu:
SVM-based prediction of protein-protein interactions of Glucosinolate biosynthesis. 471-476 - Ning-Ling Wang, Ting Zhang, Yongping Yang, Degang Chen:
SVR-GA-Based adaptive power coal rate modeling and optimization for large coal-fired power units. 477-482 - Xu Zhou, Shu-Xia Lu, Lisha Hu, Meng Zhang:
Imbalanced extreme support vector machine. 483-489 - Junjie Hu:
Active learning for imbalance problem using L-GEM of RBFNN. 490-495
Procedural Learning Methods
- Chang'an Yi, Huaqing Min, Ronghua Luo, Xiao-Wen Shen, Zhi-Peng Zhong, Ming-Jie Liang:
An incremental learning algorithm for autonomous mental development of robots. 496-500 - Zih-Yin Chen, Wei-Fu Lu:
Meta-prediction of phosphorylation sites with multiplicative weighted update algorithms. 501-506 - Pavel Surynek:
Application of propositional satisfiability to special cases of cooperative path-planning. 507-512 - Yan Li, Lan-Ming Su, Qiang He:
Case-based multi-task pathfinding algorithm. 513-518
Intelligent Systems
- Bao Rong Chang, Hsiu Fen Tsai, Zih-Yao Lin, Chi-Ming Chen, Chien-Feng Huang:
Intelligent VVoIP implementation in UEC cloud computing. 519-524 - Elmira Mohyedinbonab, Omid Ghasemi, Mo M. Jamshidi, Yufang Jin:
Adaptive estimation over distributed sensor networks with a hybrid algorithm. 525-531 - Zhong-Wen Li, Cheng-Bin Wu, Yi Xie, Zheng-Wei Jing:
A secure access control protocol of RFID tags based on EPC C1G2. 532-537 - Hal-Tao Liu, Bao-En Guo:
A new pruning algorithm for game tree in Chinese Chess Computer Game. 538-542 - Victor R. L. Shen, Wei-Chieh Huang, Tzer-Long Chen:
A time- bound hierarchical access control for multicast systems. 543-548 - Jincai Huang, Qing Cheng, Guangquan Cheng, Zhong Liu, Guoli Yang:
The analysis interface of dynamic network analysis for networked military organizations. 549-554 - Chen Feng, Ling-Hua Zhang:
A modified shuttled frog leaping algorithm for solving nodes position in wireless sensor network. 555-559 - Hua-Hong Zhu, Qian-Hua He, Yan-Xiong Li:
A two -step hybrid approach for voiceprint-biometric template protection. 560-565 - Sheng-Min Cui, Lihua Zhou, Qi-Yu Fang, Ming Yang:
Solving game with interval-valued utilities. 566-570 - Wan-Guo Yu:
Designing a high-performance Chinese chess computer player for middle game position. 571-577 - Zheng-Wei Jing, Yi Xie, Pengfei Yuan, Xijian Chen:
A cooperative MAC protocol with neighbor nodes information for ad hoc networks. 578-585 - Cheng-Zhang Peng, Ze-Jun Jiang, Xiao-Bin Cai, Zhike Zhang:
Implementing chord with declarative networking language. 586-590 - Geng-Jia Ding, Fa-Gui Liu, Yong-Xiong Ruan, Yue-Dong Lin:
AN RFID-middleware-based RFID router architecture. 591-595 - Liang Huo, Liu Yang, Guo-Chun Zhang:
Formalized security model of identity-based multi-proxy signature. 596-600 - Jing-Hong Wang, Yu-Feng Dong, Hai-Feng Liu:
On intrusion detection matching algorithm from the perspective of multi- agent. 601-606 - Yuan-Sheng Huang, Shuang Liu, Lixia Tian:
The analysis of coal port abnormal phenomenon activity network under generalized precedence relations. 607-611 - Hai-Ping Li:
Synchronization of discrete-time fractional-order systems for chaotic controller design. 612-614 - Hui Li, Yun-Min Zhao, Wei Tong:
The research of production engineering equipment simulation system. 615-618
Service Sciences
- Jiqing Qiu, Yi Li, Long Zhao, Zirui Xing:
New robust exponential stability of complex neutral system with mixed time-varying delays and nonlinear perturbations. 619-623 - Hui-Zhu Tian, Chen-Xia Jin:
A new fuzzy synthetic evaluation model for teaching quality. 624-629 - Juan Wang, Rui-Hong Wang, Jian-Guo Shi, Yan-Jie Liu:
The application of PCA in the basic public service system. 630-633 - Cong-Man Wang, Mei Yang:
Demand on human resource prediction of Shijiazhuang national bio-industry. 634-638 - Weige Ji, Yanan Wang, Shuwen Du:
Campus security evaluation based on TOPSIS method. 639-642 - Meng-Hua Song:
Social network analysis in environmental management of paraxyleneproject. 643-647 - Jiqing Qiu, Zirui Xing, Li Li, Mohan Yang, Yi Li:
ROBUST H∞ filtering for a class of nonlinear uncertain singular systems with time-varying delay. 648-653 - Ke-Fei Liu, Ran Zhao:
Co-competition game analysis of mobile communication market after company restructuring. 654-659 - Wei-Min Ma, Feng Mao:
Dual-objective robust optimization on supply chain under demand uncertainty. 660-665 - Pavel Surynek:
Relocation tasks and a hierarchical subclass. 666-669 - Xuemei Wang,