Search all articles

+ Advanced search
Search articles within:
121591 articles

Spatio-temporal Similarity Measure for Network Constrained Trajectory Data

Ying Xia, Guo-Yin Wang, Xu Zhang, Gyoung-Bae Kim, Hae-Young Bae
Pages: 1070 - 1079
Trajectory similarity measure is an important issue for analyzing the behavior of moving objects. In this paper, a similarity measure method for network constrained trajectories is proposed. It considers spatial and temporal features simultaneously in calculating spatio-temporal distance. The crossing...

Fully implicational methods for interval-valued fuzzy reasoning with multi-antecedent rules

Hua-Wen Liu, Cheng Li
Pages: 929 - 945
Based on the fully implicational idea, we investigate the interval-valued fuzzy reasoning with multiantecedent rules. First, we construct a class of interval-valued fuzzy implications by means of a type of implications and a parameter on the unit interval, then use them to establish three kinds of fully...

Identifying Web Users on the Base of their Browsing Patterns

Wojciech Jaworski
Pages: 1062 - 1069
Our aim is to develop methodology for recognition of Internet portal users on the base of their browsing patterns. This is a classification task in which we have thousands values of decision attribute and objects are described by means of sequences of symbols. We develop feature selectors which make...

Splitting Computation of Answer Set Program and Its Application on E-service

Bo Yang, Ying Zhang, Mingyi Zhang, Maonian Wu
Pages: 977 - 990
As a primary means for representing and reasoning about knowledge, Answer Set Programming (ASP) has been applying in many areas such as planning, decision making, fault diagnosing and increasingly prevalent e-service. Based on the stable model semantics of logic programming, ASP can be used to solve...

A Frequent Pattern Mining Method for Finding Planted Motifs of Unknown Length in DNA Sequences

Caiyan Jia, Ruqian Lu, Lusheng Chen
Pages: 1032 - 1041
Identification and characterization of gene regulatory binding motifs is one of the fundamental tasks toward systematically understanding the molecular mechanisms of transcriptional regulation. Recently, the problem has been abstracted as the challenge planted (l,d)-motif problem. Previous studies have...

Residual as Linear Sum of Matrix Determinants in Multiway Contingency Tables

Shusaku Tsumoto, Shoji Hirano
Pages: 1080 - 1089
A Pearson residual is defined as a residual between an observed value and expected one of each cell in a contingency table, which measures the degree of statistical dependence of two attribute-value pairs corresponding to the cell. This paper shows that this residual is decomposed into a linear sum of...

A Globally Convergent MCA Algorithm by Generalized Eigen-Decomposition

Jianbin Gao, Mao Ye, Jianping Li, Qi Xia
Pages: 991 - 1001
Minor component analysis (MCA) are used in many applications such as curve and surface fitting, robust beam forming, and blind signal separation. Based on the generalized eigen-decomposition, we present a completely different approach that leads to derive a novel MCA algorithm. First, in the sense of...

Intelligent Recognition of Lung Nodule Combining Rule-based and C-SVM Classifiers

Bin Li, Jing Zhang, Lianfang Tian, Li Tan, Shijie Xiang, Shanxing Ou
Pages: 950 - 976
Computer-aided detection(CAD) system for lung nodules plays the important role in the diagnosis of lung cancer. In this paper, an improved intelligent recognition method of lung nodule in HRCT combing rule-based and costsensitive support vector machine(C-SVM) classifiers is proposed for detecting both...

Fused Multi-Characteristic Validity Index: An Application to Reconstructed Image Evaluation in Electrical Tomography

Shihong Yue, Teresa Wu, Zhiqing Liu, Xian Zhao
Pages: 1052 - 1061
The quality of reconstructed images is an important and direct criterion to quantitatively evaluate the effectiveness of reconstruction algorithms in electrical tomography (ET). Unfortunately, there lacks of effective and efficient approach to assessing the quality of ET images in literature and practices....

Risk Management in Process Industry - Practical Approach in Poland

Andrzej Kozak
Pages: 102 - 105
As one of the risk analysis methods HAZOP has been successively and commonly applied for many years since it enables the future user of a process installation to check the project in terms of security in a way that minimises the costs of changes. This paper refers to the weak points of risk management...

Research on Model for Evaluating Risks of Venture Capital Projects

Yunfei Li, Zongfang Zhou
Pages: 142 - 148
An index system for evaluating the risks of venture capital projects is established on the basis of analyzing the factors affecting the risks of venture capital projects. A model for evaluating the risk degree of single venture capital project is presented by applying the uncertain type analysis of hierarchy...

The Research of a Hail Risk Evaluation under Imperfect Information

Wang Wei, Zhou Chao, Du Xin
Pages: 133 - 141
Based on the situation of the global warming, hail disasters will maybe cause the higher risk of loss in the future. The author established a risk evaluation model of hail disasters in terms of the combination of probabilistic and physical methods. Moreover, a nonlinear finite element analysis software...

Dynamics of Urban Fire Correlations with Detrended Fluctuation Analysis

Jinghong Wang
Pages: 126 - 132
To explore and understand the intrinsic dynamic mechanisms of urban fire system is an important prerequisite for the fire risk analysis and management. By analyzing the time series of urban fire system, it is helpful to achieve this goal. In this paper, the detrended fluctuation analysis (DFA) is applied...

A Study on Food Safety Risk Analysis under the Condition of Traditional Agriculture

Jingyuan Yin, Haiyan Gao, Wei Pei
Pages: 118 - 125
With the development of economy, the problem of food safety has caused extensive concern. Agricultural production node is on the front of the food safety management chain. The combination of which and modern economic social development is an important character to reflect the food safety situation in...

Environmental Risk Discrimination and Assessment for Municipal Solid Waste Secure Landfill Site

Cao Yonghong
Pages: 149 - 155
With the development of urbanization, the amount of municipal solid waste is increasing. Landfill is the main method for disposing the urban garbage at present in China. But the secure landfill site is not safe completely because it has a lot of risks threatening surrounding environment. After types...

Internet of Intelligences in Risk Analysis for Online Services

Chongfu Huang
Pages: 110 - 117
There are always some people who experienced or studied the risks of daily life. Based on that, in this paper, we proposed a new concept Internet of intelligences (IOI), which consists of intelligent agents, the Internet and a mathematics model. An IOI collects and processes the information provided...

The Errors Estimate of the Multistage Combined Investment Risk Assessment

Yu Jike, Zhou Zongfang
Pages: 106 - 109
Investment risk is economic development faced serious risk. The multistage combination investment risk assessment (MCIRA) can reduce the assessment error, but how to survey the error which produces by the MCIRA models, has the important significance. From theoretical side, the errors upper-bound of the...

Efficient Applications of Risk Analysis in the Chemical Industry and Emergency Response

Roberto Bubbico
Pages: 92 - 101
Despite it is now used in many technical and industrial areas, Risk Analysis is sometimes still considered by many plant managers as a methodology too complex and too timeconsuming to be of practical use. Conversely, it will be shown that Risk Analysis can often provide very useful information on the...

Gene Silencing Genetic Algorithm for 0/1 Knapsack with Object Preferences

S. Siva Sathya, S. Kuppuswami, S. Sendhil Kumar
Pages: 886 - 893
Genetic Algorithms are efficient search and optimization techniques inspired by natural evolution. To show the difficulties in solving constrained optimization problems through GA, the 0/1 knapsack problem with user specific object preferences has been taken up. A new genetic operator, namely, ‘gene...

Automatic registration of remote sensing images based on SIFT and fuzzy block matching for change detection

Cai Guo-Rong, Li Shao-Zi, Wu Yun-Dong, Chen Shui-Li, Su Song-Zhi
Pages: 874 - 885
This paper presents an automated image registration approach to detecting changes in multi-temporal remote sensing images. The proposed algorithm is based on the scale invariant feature transform (SIFT) and has two phases. The first phase focuses on SIFT feature extraction and on estimation of image...

H-infinite State Estimation for Takagi-Sugeno Fuzzy Delayed Hopfield Neural Networks

Choon Ki Ahn
Pages: 855 - 862
This paper presents a H-infinite state estimator for Takagi-Sugeno fuzzy delayed Hopfield neural networks. Based on Lyapunov-Krasovskii stability approach, a delay-dependent criterion is proposed to ensure that the resulting estimation error system is asymptotically stable with a guaranteed H performance....

Integrating Strategic and Tactical Decisions to Robust Designing of Cellular Manufacturing under Uncertainty: Fixed Suppliers in Supply Chain

V.R Ghezavati, S.J. Sadjadi, M. Dehghan Nayeri
Pages: 837 - 854
Cellular manufacturing (CM) has been identified as an innovative practice for manufacturer to achieve efficiency as well as flexibility under an uncertain environment. This study addresses a new mathematical robust model for a cellular manufacturing problem integrated with tactical aspects under supply...

Automatic Design of Robust Optimal Controller for Interval Plants Using Genetic Programming and Kharitonov Theorem

Peng Chen, Yong-Zai Lu
Pages: 826 - 836
This paper presents a novel approach to automatic design of a robust optimal controller for interval plants with Genetic Programming based on Kharitonov Theorem (KT), which provides a theoretical foundation in the design of robust controller for interval plants. The structure and parameters of the robust...

A Convergent Solution to Matrix Bidirectional Projection Based Feature Extraction with Application to Face Recognition

Yubin Zhan, Jianping Yin, Xinwang Liu
Pages: 863 - 873
Recently, many feature extraction methods, which are based on the matrix representation of image and matrix bidirectional projection technique, are proposed. However, these methods in solving the two projection matrices will suffer from non-optimized or non-convergent solution. To overcome this problem,...

A note on the rates of uniform approximation of fuzzy systems

Viet Long Hoang
Pages: 712 - 727
For the fuzzy systems with the kernel-shaped fuzzy sets of if part, we estimate the rates of the uniform approximation for continuous functions. Results are given associatively with the rates of convergence of the sequence (logk/k)a.

Imitation of Honeybee Aggregation with Collective Behavior of Swarm Robots.

Farshad Arvin, Khairulmizam Samsudin, Abdul Rahman Ramli, Masoud Bekravi
Pages: 739 - 748
This paper analyzes the collective behaviors of swarm robots that play role in the aggregation scenario. Honeybee aggregation is an inspired behavior of young honeybees which tend to aggregate around an optimal zone. This aggregation is implemented based on variation of parameters values. In the second...

Mining Multi-scale Intervention Rules from Time Series and Complex Network

Jiaoling Zheng, Changjie Tang, Shaojie Qiao, Ning Yang, Yue Wang
Pages: 728 - 738
This paper proposes the concept of intervention rule which tries to reveal the interventional relationship between elements in a system in the following three aspects. (1) Casual relationship. Intervention rule shows which element is the cause and which element is the consequence. (2) Quantitative relationship:...

WPMSD: A Malicious Script Detection Method Inspired by the Process of Immunoglobulin Secretion

Hui Zhao, Wen Chen, Jie Zeng, Yuanquan Shi, Jian Qin
Pages: 788 - 796
Inspired by the process of immunoglobulin secretion in biological body, we present a Web Page Malicious Script Detection Method (WPMSD). In this paper, Firstly, the basic definitions of artificial immune items are given. Secondly, according to the spreading range of malicious script, the immunoglobulin...

Application of Fuzzy Comprehensive Evaluation Method in Trust Quantification

Shunan Ma, Jingsha He, Shuai Xunbo
Pages: 768 - 776
Trust can play an important role for the sharing of resources and information in open network environments. Trust quantification is thus an important issue in dynamic trust management. By considering the fuzziness and uncertainty of trust, in this paper, we propose a fuzzy comprehensive evaluation method...

Improved Ordinary Measure and Image Entropy Theory based intelligent Copy Detection Method

Dengpan Ye, Longfei Ma, Lina Wang, Robert H. Deng
Pages: 777 - 787
Nowadays, more and more multimedia websites appear in social network. It brings some security problems, such as privacy, piracy, disclosure of sensitive contents and so on. Aiming at copyright protection, the copy detection technology of multimedia contents becomes a hot topic. In our previous work,...

A Projection Pursuit Based Risk Assessment Method in Mobile Ad hoc Networks

Fu Cai, Liu Ming, Chen Jing, Zhang Li, Xiao-Yang Liu
Pages: 749 - 758
Establishing high performance cooperation and estimating nodes’ risk level in mobile ad hoc networks (MANETs) are currently fundamental and challenging due to the inherent characteristics of MANETs, such as the highly dynamic topology and the absence of an effective security mechanism. Trust based...

A Software Behavior Trustworthiness Measurement Method based on Data Mining

Yuyu Yuan, Qiang Han
Pages: 817 - 825
This paper presents a congruence measurement method by partitions to apply software trustworthiness measures in dynamic behavior feature datasets. The datasets are generated at software running time. And the method compares the datasets with the static attribute feature datasets generated at software...

Evaluating Timeliness and Accuracy Trade-offs of Supervised Machine Learning for Adapting Enterprise DRE Systems in Dynamic Environments

Joe Hoffert, Douglas C. Schmidt, Aniruddha Gokhale
Pages: 806 - 816
Several adaptation approaches have been devised to ensure end-to-end quality-of-service (QoS) for enterprise distributed systems in dynamic operating environments. Not all approaches are applicable, however, for the stringent accuracy, timeliness, and development complexity requirements of distributed...

A Reputation Evaluation Approach Based on Fuzzy Relation

Meiyu Fang, Xiaolin Zheng, Deren Chen
Pages: 759 - 767
In traditional models, fuzzy sets are used to describe trust degree and evaluate reputation for vague words. But in some practical applications, the determination of membership functions associated with vague concepts is difficult or impossible. This paper builds a reputation computing model based on...

Adaptive Secret Sharing for Color Images

Jia-Hong Li, Wei-Bin Lee, Dengpan Ye, Tzong-Jye Liu, Chuan Qin
Pages: 797 - 805
A secret sharing model can secure a secret over multiple noise-like shadows and remain recoverable despite multiple shadow failures. Even if some of the shadows are compromised, the secret will not be revealed as long as the number of the compromised shadows is smaller than a pre-determined threshold....

Design of 2-D Recursive Filters Using Self-adaptive Mutation Differential Evolution Algorithm

Lianghong Wu, Yaonan Wang, Xiaofang Yuan
Pages: 644 - 654
This paper investigates a novel approach to the design of two-dimensional recursive digital filters using differential evolution (DE) algorithm. The design task is reformulated as a constrained minimization problem and is solved by an Self-adaptive Mutation DE algorithm (SAMDE), which adopts an adaptive...

A Fuzzy Multi-Criteria SWOT Analysis: An Application to Nuclear Power Plant Site Selection

Mehmet Ekmekcioglu, Ahmet Can Kutlu, Cengiz Kahraman
Pages: 583 - 595
SWOT (Strengths, Weaknesses, Opportunities and Threats) analysis is a commonly used and an important technique for analyzing internal and external environments in order to provide a systematic approach and support for a decision making. SWOT is criticized mostly for considering only qualitative examination...

Content-based Image Hiding Method for Secure Network Biometric Verification

Xiangjiu Che, Jun Kong, Jiangyan Dai, Zhanheng Gao, Miao Qi
Pages: 596 - 605
For secure biometric verification, most existing methods embed biometric information directly into the cover image, but content correlation analysis between the biometric image and the cover image is often ignored. In this paper, we propose a novel biometric image hiding approach based on the content...

Feature Selection in Decision Systems Based on Conditional Knowledge Granularity

Tingquan Deng, Chengdong Yang, Qinghua Hu
Pages: 655 - 671
Feature selection is an important technique for dimension reduction in machine learning and pattern recognition communities. Feature evaluation functions play essential roles in constructing feature selection algorithms. This paper introduces a new notion of knowledge granularity, called conditional...

Nonlinear underwater robot controller design with adaptive disturbance prediction

Xin Songa, Fang Liue, ZaoJian Zoub, Yue-Min Zhuc, JianChuan Yinb, Feng Xub
Pages: 634 - 643
A new hybrid adaptive control algorithm is proposed for the nonlinear system controller design of underwater robot. Compared with the previous works in the controller design of underwater robot, the main advantages of this work are: (1) A new disturbance prediction and compensation model is proposed;...

Optimization of workflow scheduling in Utility Management System with hierarchical neural network

Srdjan Vukmirovic, Aleksandar Erdeljan, Imre Lendak, Darko Capko, Nemanja Nedic
Pages: 672 - 679
Grid computing could be the future computing paradigm for enterprise applications, one of its benefits being that it can be used for executing large scale applications. Utility Management Systems execute very large numbers of workflows with very high resource requirements. This paper proposes architecture...

Fuzzy Mutual Information Based min-Redundancy and Max-Relevance Heterogeneous Feature Selection

Daren Yu, Shuang An, Qinghua Hu
Pages: 619 - 633
Feature selection is an important preprocessing step in pattern classification and machine learning, and mutual information is widely used to measure relevance between features and decision. However, it is difficult to directly calculate relevance between continuous or fuzzy features using mutual information....

Polluants Time-Series Prediction Using the Gamma Classifier

Itzama Lopez-Yanez, Amadeo J. Arguelles-Cruz, Oscar Camacho-Nieto, Cornelio Yanez-Marquez
Pages: 680 - 711
In this work we predict time series of air pollution data taken in Mexico City and the Valley of Mexico, by using the Gamma Classifier which is a novel intelligent associative mathematical model, coupled with an emergent coding technique. Historical and current data about the concentration of specific...

A Modified Super-Efficiency DEA Approach for Solving Multi-Groups Classification Problems

Jie Wu, Qingxian An, Liang Liang
Pages: 606 - 618
Among the various discriminant analysis (DA) methods, researchers have investigated several directions in this area: statistics, econometrics, computer data mining technologies and mathematical programming. Recently, as a nonparametric mathematical programming approach, Data envelopment analysis has...

Survey on Recent Research and Implementation of Ant Colony Optimization in Various Engineering Applications

Mohan B. Chandra, R. Baskaran
Pages: 566 - 582
Ant colony optimization (ACO) takes inspiration from the foraging behaviour of real ant species. This ACO exploits a similar mechanism for solving optimization problems for the various engineering field of study. Many successful implementations using ACO are now available in many applications. This paper...

The Combustible Materials Remote Sensing Ration Calculation and Fire Risk Dynamic

Zhuo Yi, Liu Guixiang, Fengming Yu
Pages: 65 - 74
The amount of combustible material is the primary factor which influences the occurrence and developing of fire. From analyzing the field survey data during the six months of the whole seasons of withered grass in Xilinguole, we obtained the different types grassland dynamic changing rates, which include...

Towards the Development of Regional Risk Profiles and Adaptation Measures for Sea Level Rise

Bilal M. Ayyub, Michael Kearney
Pages: 75 - 89
Risks from future sea level rise entail significant uncertainties concerning overall potential impacts, the specific threats faced by particular areas and what benefit or costs are associated with strategies for addressing such risks. The proposed risk quantification and management framework is consistent...

Biogas - A European Perspective on Safety and Regulation

Chongfu Huang
Pages: 1 - 20
The production of biogas is positioned as energy which can not only generate a source of energy known as "green" but also which can recycle waste. In the context of sustainable development, the place of biogas is therefore essential. The risks corresponding to the production processes and uses of are...