


default search action
ICMLC 2014: Lanzhou, China
- 2014 International Conference on Machine Learning and Cybernetics, Lanzhou, China, July 13-16, 2014. IEEE 2014, ISBN 978-1-4799-4216-9

Volume 1
- Nguyen Thanh Tung, Joshua Zhexue Huang, Thuy Thi Nguyen

, Imran Khan
:
Bias-corrected Quantile Regression Forests for high-dimensional data. 1-6 - Yan-Fei Ren, Zhi-Chun Mu:

Salient object detection based on global contrast on texture and color. 7-12 - Jyh-Horng Chou, Jinn-Tsong Tsai, Tung-Kuan Liu, Kao-Shing Hwang

, Hon-Yi Shi:
Predictive models for 5-year mortality after breast camcer surgery. 13-16 - Zhen Li:

Robustness of Multiple Classifier Systems with different fusions to evasion attack. 17-23 - Guixiang Wang, Fang Yuan:

A weak order in special type fuzzy ellipsoid number space and its application in ranking uncertain multi-channel information. 24-29 - Yuan-Yuan Cai, Zhi-Chun Mu, Yan-Fei Ren, Guo-Qing Xu:

A hybrid hierarchical framework for automatic image annotation. 30-36 - Cui-Lian You, Xiang-Yi Li, Xiao-Yan Jiao:

Some properties of fuzzy conditional expectation. 37-40 - Cui-Lian You, Xiao-Yan Jiao, Xiang-Yi Li:

A new kind of fuzzy martingale. 41-45 - Tien Thanh Nguyen

, Alan Wee-Chung Liew
, Xuan Cuong Pham, Mai Phuong Nguyen:
Optimization of ensemble classifier system based on multiple objectives genetic algorithm. 46-51 - Yinshi Qin, Shuifa Sun, Xian-Bing Ma, Song Hu, Bangjun Lei:

A background extraction and shadow removal algorithm based on clustering for ViBe. 52-57 - Ying Xu, Yikui Zhai

, Jun-Ying Gan, Jun-Ying Zeng, Yu Huang:
Finger-knuckle-print recognition based on image sets and convex optimization. 58-64 - Haw-Yun Shin, Fu-Min Hsu, Kuo-Hui Tsai, Mao-Hsu Yen:

Access popularity based wireless broadcasting mechanism. 65-70 - Jin Zhou, Peng Guo, Xue-Ru Wang:

Modeling of wind turbine power curve based on Gaussian process. 71-76 - Ming-Feng Yeh, Hung-Ching Lu, Ti-Hung Chen, Po-Jung Huang:

System identification using differential evolution with winner mutation strategy. 77-81 - Patrick P. K. Chan, Wen-Kai Song:

Static detection of Android malware by using permissions and API calls. 82-87 - Yu-Dong Guan, Bo-Liang Yu, Chunli Ti, Yan Ding:

A 2D to 3D conversion method based on support vector machine and image classification. 88-93 - Yun-Yan Xiong, Dong Han, Yi-Jun Mao:

A credible property of resistance distance on real-world networks. 94-97 - Lili Zhou, Jiajun Wang, Danfeng Hu

:
The application of dictionary based compressed sensing for photoacoustic image. 98-102 - Gvoqing Lu, Lingling Zhao, Kuihe Yang:

The design of the secure transmission and authorization management system based on RBAC. 103-108 - Xinwang Zhong:

Deobfuscation based on edit distance algorithm for spam filitering. 109-114 - Mingguang Zhang, Shiliang Wang:

Study on distribution network expansion planning improved algorithm based on QPSO for contain distributed power. 115-120 - Xiaochen Ren, Shi Liu:

Experimental study of phase sensitive detection technique in ECT system. 121-125 - Huifang Ma, Yue-Xin Sun, Mei-Hui-Zi Jia, Zhichang Zhang:

Microblog hot topic detection based on topic model using term correlation matrix. 126-130 - Si-Wu He, Chaoying Liu, Zheying Song, Zengfang Wang:

Real-time intelligent control of liquid level system based on MCGS and MATLAB. 131-136 - Xiaojun Lin, Patrick P. K. Chan:

Causative attack to Incremental Support Vector Machine. 137-142 - He Jing, Ma Qing:

The game analysis of enterprises in FSDN on construction the traceability system. 143-146 - Jingjing Cao, Sam Kwong

, Ran Wang, Ke Li
:
AN indicator-based selection multi-objective evolutionary algorithm with preference for multi-class ensemble. 147-152 - Shuo Wang, Jianjian Wang:

Relevance feedback based on active learning and GMM in image retrieval system. 153-158 - Jian-Wei Liu:

A new image fusion strategy based on target segmentaion. 159-162 - Ben Guo, Chao Xia, Jun-Feng Han:

NN-based model predictive direct speed control of PMSM drive systems. 163-168 - Qiang Ma, Jiang-Chuan Chen, Xiao-Yan Xu, Yabin Shao:

Adaptive genetic algorithm based on a new entropy measurement. 169-174 - Hehui Qian, Zhiwei Qiu:

Feature selection using C4.5 algorithm for electricity price prediction. 175-180 - Yue-Gang Lv, Chen-Yin Long, Teng-Qian Cai:

Research on coordinated operating control of micro-grid power system including wind power, photovoltaic system and battery storage. 181-187 - Run-Tao Liu, Xiao-Xue Chen, Zhen-Guo Zhao:

Skyline Query algorithm based on MB-tree. 188-192 - Zijie Chen, Zhifeng Hao:

Supervised low dimensional embedding for multi-label classification. 193-199 - Xiancheng Zhou, Zhi-Qian Huang, Wing W. Y. Ng

:
Weighted grid Principal Component Analysis hashing. 200-205 - Hao Huang, Zhaojie Ju

, Honghai Liu
:
Real-time hand gesture feature extraction using depth data. 206-213 - Xin-Bin Luo, Shan Fu, Xiu-Qin Huang, Qing-Qing Xing:

A transmission-type pinhole detection system for high-speed aluminum foil. 214-220 - Guang-Lei Wen, Gang Liu, Si-Guo Zheng, Shang-Kun Ning:

Enhanced image quality evaluation based on SIFT feature. 221-226 - Li-Bin Zheng, Wing W. Y. Ng

:
Rotated k-means hashing for image retrieval problems. 227-234 - Da-Zeng Tian, Zhong-Tang Yang:

An exponential entropy on intuitionistic fuzzy sets. 235-240 - Yolanda S. Baker, Rajeev Agrawal, James A. Foster

, Daniel Beck, Gerry V. Dozier:
Applying machine learning techniques in detecting Bacterial Vaginosis. 241-246 - Pei Wang, Chunhong An, Lei Wang:

An improved algorithm for Mining Association Rule in relational database. 247-252 - Gan Huang, Jiangqin Gui, Weiyi He, Guodong Wei, Zihan Cong, Dexiang Zhong, Jianwei Zhang:

Improved codebook model based on spatio-temporal context. 253-256 - Deniel V. Ng, Jen-Ing G. Hwang:

Android malware detection using the dendritic cell algorithm. 257-262 - Loi Lei Lai

, C. L. Chan:
Machine learning class with automatic learning materials. 263-270 - Zihong Cao, Guangjun Zeng, Wing W. Y. Ng

, Jincheng Le:
Auto-encoder using the bi-firing activation function. 271-277 - Zijie Chen, Zhifeng Hao:

Latent semantic KNN algorithm for multi-label learning. 278-284 - Hao-Hua Lai, Min Dong, Sheng Bi, Qi-Yao Luo, Jia-Xian Tan:

Outdoors real-time information analysis system for elderly based on smart phone. 285-291 - Yi Luo, Zongze Wu, Sheng Bi, Yuheng Zhang, Quanwei Zheng, Quanyong Huang:

A biped humanoid robot's gait planning method based on Artificial Immune Network. 292-297 - Haichao Chen, Quanyong Huang, Sheng Bi, Xiang Yao, Nuoya Guo:

Implementation of a cheap and portable three-dimensional scanner system. 298-302 - Jium-Ming Lin, Cheng-Hung Lin:

A novel intelligent neural guidance law design by using adjoint method. 303-308 - Heng-Li Yang, Ren-Xiang Lin:

A Chinese predictive text entry method for mobile devices. 309-314 - Tseng-Jung Lin, Kuo-Liang Chung, Yong-Huai Huang:

A fourier transform- and training-based method for recognizing arbitrary color filter array structure. 315-320 - Shinfeng D. Lin, Long-Siang Ou Yang:

An effective content-based copy detection scheme for image authentication. 321-325 - Li-Wei Lee, Shyi-Ming Chen:

A new fuzzy multiple criteria decision making method based on likelihood-based comparison relations of hesitant fuzzy linguistic term sets and a-cuts of fuzzy sets. 326-331 - Shyi-Ming Chen

, Shen-Wen Chen:
A new method for forecasting the taiex based on two-factors second-order fuzzy-trend logical relationship groups and the probabilities of trends of fuzzy logical relationships. 332-337 - Shyi-Ming Chen

, Jia-An Hong:
A new method for fuzzy multiple attributes group decision making based on interval type-2 fuzzy sets and the TOPSIS method. 338-344 - Wen-Chung Tsai, Deng-Yuan Zheng, Sao-Jie Chen

, Yu Hen Hu:
A prefetching scheme for Automatic Repeat-reQuest fault-tolerant on-chip network. 345-351 - Lin-Yu Tseng, Chun Chen:

Solving the maximum satisfiability problem by fuzzy converting it into a continuous optimization problem. 352-358 - Wei-Lieh Hsu, Yu-Cheng Wang, Chih-Lung Lin:

Abnormal crowd event detection based on outlier in time series. 359-363 - Guan-Chun Luh:

Face detection using combination of skin color pixel detection and Viola-Jones face detector. 364-370 - Hung-Yan Gu, Ming-Yen Lai, Wei-Siang Hong:

Speech synthesis using articulatory-knowledge based HMM structure. 371-376 - Ching-Ching Cheng, Teng-Hui Tseng, Chun-Ming Tsai:

Text string detection for the first grade visually impaired pupils "reading mandarin textbooks". 377-382 - Sheng-Kai Yang, Ping Sheng Huang, Chin-Pan Huang:

Novel high-capacity data hiding technique using summation and LSD parity of pixel groups. 383-389 - Huei-Wen Ferng, Jeffrey Nurhakim:

Key management for a large-scale wireless sensor network. 390-395 - Shyi-Ming Chen

, Chia-Hao Chang:
A new similarity measure between intuitionistic fuzzy sets based on transformation techniques. 396-402 - Shyi-Ming Chen

, Chu-Han Chiou:
A new method for multiattribute decision making based on interval-valued intuitionistic fuzzy sets, PSO techniques and evidential reasoning methodology. 403-409 - An-Zen Shih:

An examination of color image clustering by using fractal signatures. 410-413 - Yuh-Rau Wang, Wei-Hung Lin, Ling Yang:

An improved hand detection by employing corner detector. 414-419 - Chung-Ming Ou, Chung-Jen Ou:

Intelligent immune responses with distributed memory structure inspired by antibody dynamics. 420-427 - Han-Yan Yu, Jian-Jone Chen:

An intelligent space location identification system based on passive RFID tags. 428-433 - Yaw-Huei Chen, Ting-Chia Lin:

Dimension reduction techniques for accessing Chinese readability. 434-438 - Chiao-Wen Kao, Bor-Jiunn Hwang, Chaur-Heh Hsieh, Yun-Ting Huang, Hui-Hui Chen, Shyi-Huey Wu:

The integrated gaze and object tracking techniques to explo re the user's navigation. 439-443
Volume 2
- Hung-Shiang Chuang, Ying-Chun Chuang, Chun-Hsiang Yang:

Development of a low-cost platform for control engineering education. 444-448 - Wei-Chih Hung, Fan Shen, Yi-Leh Wu, Maw-Kae Hor, Cheng-Yuan Tang:

Activity Recognition with sensors on mobile devices. 449-454 - Jui-Fang Chang, Jung-Fang Cheng, Ming-Chang Lee:

Inference and diagnosis model based on Bayesian network and rough sets theory. 455-461 - Yi-Hsin Chang, Yu-Kai Lin:

A kinect-based system for learning Chinese cultural festivals. 462-468 - Chun-Wei Lin

, Wensheng Gan
, Tzung-Pei Hong
, Chien-Ming Chen
:
Maintaining high-utility itemsets in dynamic databases. 469-474 - Chun-Wei Lin

, Tsu-Yang Wu
, Guo Lin, Tzung-Pei Hong
:
Maintenance algorithm for updating the discovered multiple fuzzy frequent itemsets for transaction deletion. 475-480 - Wei-Ming Yeh:

High dynamic range intelligent effects. 481-486 - Po-Whei Huang, Po-Ying Huang, Phen-Lan Lin, Hui-Chieh Hsu:

Alveolar bone-loss area detection in periodontitis radiographs using hybrid of intensity and texture analyzed based on FBM model. 487-492 - Phen-Lan Lin, Po-Whei Huang, Andy S. Y. Lai, Lipin Hsu, Ping Chen:

An efficient clustering analysis method for image segmentation with noise. 493-498 - Ming-Chun Liou, Feng-Long Huang, Ming-Shing Yu, Yih-Jeng Lin:

Analysis of smoothing methods for language models on small Chinese corpora. 499-505 - Yuh-Tzong Liu, Yi-Han Chen, Nei-Phon Wang, Chun-Jung Lin, Yun-An Chen:

Reducing the outpatient waiting time based on CBR algorithm using smartphone. 506-511 - Cheng-Hsiung Hsieh, Yu-Sheng Lin, Chih-Hui Chang:

Haze removal without transmission map refinement based on dual dark channels. 512-516 - Shou-Hsiung Cheng:

An intelligent fall detection system using triaxial accelerometer integrated by active RFID. 517-522 - Cheng-Fa Tsai, Po-Yi She:

A new efficient density-based data clustering technique using cross expansion for data mining. 523-528 - Wei-Tyng Hong:

Fast HMM-driven beamforming for robust speech recognition in reverberant environments. 529-532 - Wei-Ren Chen, Po-Hsiang Tsui

, Yung-Sheng Chen:
Contour extraction for breast tumor in ultrasound image. 533-537 - Kuan-Lin Chen, Jyh-Yeong Chang:

Applying generalized weighted mean aggregation to impulsive noise removal of images. 538-543 - Victor R. L. Shen, Hung-Chi Chen:

An automatic calibration system for Chinese karaoke lyrics based on high-level fuzzy Petri nets. 544-549 - Cuong To, Alan Wee-Chung Liew

:
Genetic algorithm based detection of general linear biclusters. 550-555 - Xiu-Qin Huang, Xin-Bin Luo:

A real-time algorithm for aluminum surface defect extraction on non-uniform image from CCD camera. 556-561 - Chen-Sen Ouyang:

Feature selection with a supervised similarity-based k-medoids clustering. 562-566 - Sheng-Fu Liang, Ching-Fa Chen, Jian-Hong Zeng, Shing-Tai Pan:

Application of Genetic Algorithm and Fuzzy Vector Quantization on EEG-based automatic sleep staging by using Hidden Markov Model. 567-572 - Bing-Kun Xie, Shie-Jue Lee:

A modified scheme for all-pairs evolving fuzzy classifiers. 573-578 - Zhao-Yu Wang, Shie-Jue Lee:

A neuro-fuzzy based method for TAIEX forecasting. 579-584 - Cheng-Ru Wang, Shie-Jue Lee:

Temporal prediction using self-organizing multilayer perceptron. 585-591 - Chih-Hung Wu, Li-Wei Lu, Yao-Yu Li:

A study on pattern encoding of local binary patterns for texture-based image segmentation. 592-596 - Zhi-Hui Li, Ying Hou, Hai-bo Liu:

Alignment of face images based on SIFT feature. 597-600 - Siqian Li, Shiwen He, Jianzhe Yang, Yi Sun, Dansong Cheng, Daming Shi:

Intelligent pancreatitis diagnosis-based on relevance vector machine. 601-606 - Mengmeng He, Liying Zheng:

Method for improving the Generalized Interpolated Fourier Transform. 607-610 - Li-Ying Zheng, Jing-Xue Xu:

Multi-crop-row detection based on strip analysis. 611-614 - Po-Hung Chen, Deng-Fa Lin, Ming-Ciiang Tsai, Li-Ming Chen, An Liu:

Wind generator fault detection using end effects processing of Hilbert-Huang transform. 615-620 - Teng-Fa Tsao, Hsiang-Bin Cheng:

Value-based distribution systems reliability assessment considering different topologies. 621-626 - Fei-Hu Hsieh, Hen-Kung Wang, Po-Lun Chang, Sheng-Hsiung Lin:

Nonlinear behaviors in a voltage-mode controlled half-bridge buck converter via varying load resistance. 627-631 - Hen-Kung Wang, Po-Lun Chang, Fei-Hu Hsieh, Hsiang-Yan Hsieh:

Nonlinear phenomenon in a current-mode controlled buck-boost converter with solar cell input via varying reference current. 632-637 - Chia-Rong Su, Ching-Ter Chang, Chih-Yung Chen, Chang-Shu Tu:

QR codes & GPS functions - New applications in TAIWAN. 638-642 - Yi Zhang, Shili Jia, Haiyun Huang:

The prediction of pathogenicity of the influenza virus based on HA protein sequences. 643-647 - Jing Qiu, Jing Peng, Ying Zhai:

Network community detection based on spectral clustering. 648-652 - Qin Gao, Chen-Xia Jin:

Stability and Hopf bifurcation analysis of a delayed co-opetition-symbiosis syetem. 653-659 - Bo-Tang Han, Wen-Xue Wu, Jie Qi, Hong-Qi Hui:

Evaluation of knowledge stock gap based on Theil index. 660-663 - Yude Ji, Ji-Qing Qiu:

Asymptotical stabilization of fractional-order singular uncertain linear systems. 664-669 - Ying Qu, Xiaoyu Li, He Wang:

Improvement of attribute-oriented induction method based on attribute correlation with target attribute. 670-674 - Dong-Mei Li, Bin Liu:

Modeling and prediction of highway traffic flow based on wavelet neural network. 675-679 - Mei Li, Xiang Wang, Kun Zhang:

Comparative study of adaptive filter channel estimation technique in MIMO-OFDM system based on STBC. 680-683 - Yan-Li Lu, Shu-Shan Li, Bin Zhang:

A fuzzy assessment on customer satisfaction of mobile telecommunication enterprises based on analytic hierarchy process. 684-688 - Lian-Qing Su, Xia Zhao:

The guaranteed cost control for a delay dependent nonlinear singular system. 689-693 - Sheng-Liang Wu, Xiao-Xiao Li, Yuan-Jie Li:

Application of fuzzy comprehensive evaluation method on evaluation model of college students. 694-698 - Guo-Juan Zhang, Sai-Sai Xu:

Research and practice of digital fingerprinting encryption algorithm based on QR code. 699-702 - Li-Jun Zhang, Ji-Qing Qiu, Yue Cong, Dong-Dong Bao, Xiaoling Sun, Feng-Bo Hou:

Robust non-fragile H∞ control for non-linear uncertain switched singular time-delay system. 703-707 - Fachao Li, Meng Yang:

Research on the fuzzy effect equilibrium value measurement method. 708-713 - Ya-Fang Ho, Chien-Feng Huang, Yi-Lun Huang, Sheng-Pi Huang, Hsiang-Ting Chen, Ping-Huan Kuo

, Tzuu-Hseng S. Li:
Q-learning based object grasping control strategy for home service robot with rotatable waist. 714-720 - Ching-Chih Tsai, Yi-Ping Ciou, Feng-Chun Tai, Shun-Feng Su, Chih-Min Lin:

Backstepping station-keeping control using recurrent wavelet fuzzy CMAC for ball-driven chairs. 721-727 - Ching-Chih Tsai, Kuei-I Tsai, Shen-Chang Hsu, Shun-Feng Su:

Two-loop PID control using PSO-RGA algorithm for solar heat pumps. 728-733 - Jichiang Tsai, Chih-Wei Wang, Che-Cheng Chang, Kou-Chih Hu, Ting-Hsuan Wei:

A chameleon-like two-eyed visual surveillance system. 734-740 - Ching-Chih Tsai, Jia-Ching Kao, Chih-Fu Chang:

Interval type-2 fuzzy gear-changing control for intelligent bikes. 741-747 - Ching-Chih Tsai, Xiao-Ci Wang, Feng-Chun Tai, Chun-Chikh Chan:

Fuzzy decentralized EIF-based pose tracking for autonomous omnidirectional mobile robot. 748-754 - Chi-Huang Lu, Pen-Yu Liao, Yuan-Hai Charng, Chi-Ming Liu, Jheng-Yu Guo:

Multivariable self-tuning PID controller based on wavelet fuzzy neural networks. 755-759 - Yu-Qian Xue, Ai-Xia Chen, Yan-Fang Shi, Li-Ping Li:

Semantic Web services platform based on software agent. 760-763 - Yong-Hua Cai, Bo Wu, Bao-Zhu Chen, Tie-Song Li:

Research to determine the fuzzy measure system of multiple classifiers based on fuzzy integral fusion. 764-769 - Wen-Li Wang:

Periodic boundary value problem for impulsive time-delay control systems. 770-776 - Xia Cai, Xiu-Min Li, Yan Li

:
Research on risk measurement model based on WHI estimator. 777-781 - Li-Hui He, Guo-Fang Zhang, Ling-Ling Song:

A fuzzy integral-based intuitionistic decision system for evaluation and improvement of suppliers in supply chain management. 782-788 - Guo-Fang Zhang, Li-Hui He, Sen Li:

A fuzzy-random optimization approach using fuzzy measure and fuzzy integral for emergency risk coordination of supply chain. 789-795 - Meng Zhou, Jian-Guo Shi, Yan-Fang Shi:

Continuity of the fractional integral operator on Morrey-Herz spaces. 796-800 - Eric C. C. Tsang, Changzhong Wang, Du Yan, Jiaze Li:

Neighbourhood-assignment attribute reduction based on general binary relations. 801-806 - Qun-Feng Zhang, Tianyi Zhang:

Some topological and measure properties of rough sets. 807-810 - Zengjian Liu, Xiaolong Wang, Qingcai Chen, Yaoyun Zhang, Yang Xiang:

A Chinese question answering system based on web search. 816-820 - Xiangwen Liao

, Hu Chen, Jing-Jing Wei, Zhiyong Yu
, Guolong Chen:
A weighted lexicon-based generative model for opinion retrieval. 821-826 - Shixi Fan, Lidan Chen, Xuan Wang, Buzhou Tang:

Shallow parsing with Hidden Markov Support Vector Machines. 827-830 - Wei Dai, Yuxin Ding, Chenglong Xue, Yibin Zhang, Guohua Wu:

Abnormal user detection based on instant messages. 831-837 - Shuwei Wang, Ruifeng Xu, Bin Liu, Lin Gui

, Yu Zhou:
Financial named entity recognition based on conditional random fields and information entropy. 838-843 - Jun-Ying Gan, Lichen Li, Yikui Zhai

:
Facial beauty prediction model based on self-taught learning and convolutional restricted Boltzmann machine. 844-849 - Le Li, Jianjun Yang, Yang Xu, Zhen Qin, Honggang Zhang:

Documents clustering based on max-correntropy nonnegative matrix factorization. 850-855 - Ishtiaq Ahmed, Donghai Guan, TaeChoong Chung:

A novel semi-supervised learning for SMS classification. 856-861 - Shi-Zhong Zhan, I-Cheng Chang:

Pictorial Structures Model based human interaction recognition. 862-866 - Ching-Wei Huang, Yi-Jyun Chen, Tzu-Ting Yen, Kuan-Yi Lin, Duan-Yu Chen:

Region-based hierarchical tongue feature extraction. 867-870 - Fu-Hsiang Chan, Duan-Yu Chen, Jun-Wei Hsieh, Chi-Hung Chuang:

Wrinkle of fingers based robust person identification. 871-875 - Yun-Wei Huang, Jih-Gau Juang:

Twin rotor system control based on self-organizing CMAC. 876-882 - Hengyou Wang, Rui-Zhen Zhao, Jing-An Cui:

Fast and robust skew correction in scanned document images based on low-rank matrix decompositon. 883-887 - Song-Qiang Yang, Xuedong Tian:

A maintenance algorithm of FDS based mathematical expression index. 888-892

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














