The Compound Operations of Uncertain Cloud Concepts
|
|
- Roland Oliver Ryan
- 8 years ago
- Views:
Transcription
1 Journal of Computational Information Systems 11: 13 (2015) Available at The Compound Operations of Uncertain Cloud Concepts Longjun YIN 1,, Junjie XU 1, Guansheng ZHANG 2, Yanyan LI 3 1 School of Science, Chongqing University of Posts and Telecommunications, Chongqing , China 2 Research Center of Intelligent System and Robot, Chongqing University of Posts and Telecommunications, Chongqing , China 3 School of Computer Science & Technology, Chongqing University of Posts and Telecommunications, Chongqing , China Abstract Cloud model, an effective new cognitive model, is used to simulate the bidirectional cognitive computing between the intension and extension of concept from the forward cloud generator (FCG) and the backward cloud generator (BCG). In this paper, two kinds of cloud concepts, i.e., Young People and Middle-aged are used to generate the compound concepts in MATLAB. Firstly, the FCG is used for generating the extension set of a cloud concept. And the extension set of cloud concept can be obtained by the set operations, such as union operation, intersection operation, complementary operation and symmetric difference operation. And then the results are sent to FCG, the connotation of a new cloud concept can be obtained respectively by FCG algorithm of determined degree information and BCG algorithm of undetermined degree information. Through analyzing the output results, we can find that there are some degree atomization phenomenon in union operation, intersection operation, complementary operation and symmetric difference operation of cloud concept. And we find that removing the high membership of the cloud drops can reduce the hyper entropy, and the result about the certainty degree of complement is better. Keywords: Cloud Model; FCG; BCG; Set Operations; Cloud Concepts 1 Foreword Based on the probability theory and fuzzy set theory, Li puts forward cloud model [1] to uniformly describe randomness and fuzziness [8], which appears frequently in linguistic values. Taking the cloud model [1] as conversion model of the uncertainty between a certain qualitative This work is supported by the National Natural Science Foundation of China (No ), The Natural Science Foundation of Chongqing of China (No. cstc2013jcyja40063) and the Science & Technology Research Program of Chongqing Education Committee of China (No. KJ130534), The Youth Foundation of Chongqing University of Posts and Telecommunications (No. A ). Corresponding author. address: yinlj@cqupt.edu.cn (Longjun YIN) / Copyright 2015 Binary Information Press DOI: /jcis14670 July 1, 2015
2 4882 L. Yin et al. /Journal of Computational Information Systems 11: 13 (2015) concept described by linguistic values and its numerical representation. Cloud model [1] signifies the parameter in natural languagelinguistic values, and use three features, that are Expectation (Ex), Entropy (En) and Hyper entropy (He), to represent the natural language value. Entropy [3], this concept was initially used as a describing thermodynamic parameter, and was introduced in statistical physics [5] later. Information theory [4] was used to measure the uncertainty of the uncertain information. In the cloud model method, entropy represents a kind of metric particle size of the qualitative concept. The greater entropy comes, the greater granularity are. And information entropy can be used to granular computing for measuring the uncertainty degree of an uncertain concept. At the same time, entropy also represents the acceptable range of value to a qualitative concept in the information theory [4], i.e., ambiguity [4, 6], which is the measurement of uncertainty. The hyper entropy of cloud model is a kind of measurement of uncertainty change, i.e. the entropy of entropy. Cloud model [1] not only reflects randomness that a qualitative concept value appears, but also reflects membership degree of uncertainty, and reveals the relationship between fuzziness and randomness. At present the cloud model has been applied successfully in intelligent control [8, 9], prediction [10], fuzzy partition [11], data discretization [12], data mining technology [13, 14], system evaluation [15], uncertainty reasoning [16] and so on, and the advantage of the conversion between the qualitative concept and the quantitative concept is displayed gradually in uncertain artificial intelligent field. In this paper, the set operation of the concept extension, such as union, intersection, complementary, symmetric difference, is used to create many new extension of uncertain concept. And the BCG is used to create intension concept, in order to realize the synthesis of cloud concepts. In this paper Young people and Middle-aged are shown as two examples, to explain the compound operations, such as intersection operation, union operation, complement operation and symmetric difference operation, between any two uncertain cloud concepts based on the general normal cloud model. The rest of this paper is organized as follows. Section 2 gives the union operation of cloud concepts, and analyzes the rationality of union operation between any two uncertain cloud concepts. The intersection operation between any two uncertain cloud concepts is presented, and the rationality of intersection operation between any two uncertain cloud concepts will be analyzed in Section 3. Section 4 gives the complement operation between any two uncertain cloud concepts. In section 5 and in section 6 the difference operation and the symmetric difference operation between any two uncertain cloud concepts are proposed respectively. Section 7 is the conclusion part. 2 The Union Operation Between Two Uncertain Cloud Concepts 2.1 The principle of the algorithm Let Young people and Middle-aged people be two uncertain cloud concepts. The union operation between these two concepts means putting all the extension elements of two concepts into a new extension set, and generates a new uncertain concept called Middle and Young-aged people. Through importing the drops [1] of Young People and Middle-aged people which produced based on FCG, and the parameter of Middle and Young Caged people is exported based on BCG.
3 L. Yin et al. /Journal of Computational Information Systems 11: 13 (2015) This algorithm is shown as follows, (1) Importing Ex1, En1, He1 into FCG, the membership coordinates Y(x, y) of Young peoples are obtained. Then Importing Ex2, En2, He2 into FCG, the membership coordinates M(x, y) of Middle-aged peoples are obtained; (2) Importing Y and M into BCG. 2.2 Analysis of the results The results of reverse the normal cloud generator algorithm are shown as follows, Ex= , En = and He= (Fig. 1(a)). From Fig. 1(a), we find that the dispersion degree of these drops is very high. If we replace the condition remove the cloud drops with more than [3] membership to remove the drops membership which greater than 0.9, then He= (Fig. 1(b)); if amended as reject the drops membership which greater than 0.6, then He= (Fig. 1(c)). The union operation between any two uncertain cloud concepts means that the two extensions set merge into a new extension set in order to generate a new uncertain concept. From above algorithm we can know that the new concept is greatly influenced by those cloud drops which have high membership, and the atomization of the cloud drops is obvious. (a) The result of the union operation, n=5000 (b) The result of He= Fig. 1: The union operation of two cloud concepts (c) The result of He= The Intersection Operation Between Cloud Concepts 3.1 The principle of the algorithm The intersection set of Young People and Middle-aged people, As young people gradually become the process of young people. So the intersection set take the common elements of two sets into a new set. The idea of the algorithm is to find out those drops among maximum age in Young People and the minimum age in Middle-aged people, then send those drops into BCG. Algorithm is shown as follows, (1) Importing Ex1, En1, He1 into FCG, the membership coordinates Y(x, y) of Young People are obtained of; then importing Ex2, En2, He2 into FCG, the membership coordinates M(x, y) of
4 4884 L. Yin et al. /Journal of Computational Information Systems 11: 13 (2015) middle-aged people are obtained; (2) Do the intersection operation: take the abscissa maximum of Y(x, y) remember to x max, and remove the abscissa values greater than x max from Y(x, y), The remaining part is denoted as M similarly, take the abscissa minimum of Y(x, y), remember to x min, and remove the abscissa values less than x min from Y(x, y), The remaining part is denoted as Y ; (3) Send Y and M into BCG. 3.2 Analysis of the results The results of reverse the normal cloud generator algorithm are shown as follows, Ex = , En =4.1520, He = (Fig. 2(a)). If we replace the condition remove the cloud drops with more than membership to remove the drops membership which greater than 0.9, then He= (Fig. 2(b)); if amended as reject the drops membership which greater than 0.6, then He= (Fig. 2(c)). (a) The results of reverse the normal cloud generator, n=5000 (b) The result of He= Fig. 2: The intersection operation between cloud concepts (c) The result of He= The Complementary Operation Between Cloud Concepts 4.1 The principle of the algorithm Suppose the universal set is human longevity which between zero and one hundred, With the Young People, as an example, the Complementary set of Young People are between 0 and 100, developing the new concept by removing the value greater than maximum and less than minimum of Young People, then send this set into BCG. This algorithm is shown as follows, (1) Find out the maximum abscissa max and the minimum abscissa min from the Young People drops FCG; (2) Generating N uniformly distributed random numbers in [0,100], remove which belongs to [min,max];
5 L. Yin et al. /Journal of Computational Information Systems 11: 13 (2015) (3) Importing the surplus random numbers into BCG. 4.2 Analysis of the results (i) The results of reverse the normal cloud generator algorithm of determined degree information are shown as follows, Ex = , En = INF, He =NAN; In this algorithm, the cloud droplet information degree is determined, so the complement information degree is a Constant. Therefore the entropy of complementary set is infinite and hyper entropy of complementary set does not exist. (ii) The results of reverse the normal cloud generator algorithm of undetermined degree information are shown as follows, Ex = , En = , He = (Fig. 3). The complementary set of cloud is a great concept Remove all the young people, this concept is very extensive, so the hyper entropy has a large value. Fig. 3: The result of Ex = , En = , He =4.1285, the number of drops is n= The Difference Operation Between Cloud Concepts 5.1 The principle of the algorithm Young People minus Middle-aged means remove lager value from Young People, then importing the remaining elements into BCG. This algorithm is shown as follows, (1) Importing Ex1, En1, He1 into FCG, the membership coordinates Y(x, y) of Young Peoples are obtained; The importing Ex2, En2, He2 into FCG, the membership coordinates M(x, y) of Middle-aged s are obtained; (2) Do complement operation: take the abscissa minimum of M(x, y), remember to x min, and remove the abscissa values less than x min from Y(x, y), The remaining part is denoted as Y ; (3) Importing Y into BCG.
6 4886 L. Yin et al. /Journal of Computational Information Systems 11: 13 (2015) Analysis of the results (i) The result of reverse the normal cloud generator algorithm of determined degree are shown as follows, Ex = , En =3.3451, He = (Fig. 4(a)). (ii) The result of reverse the normal cloud generator algorithm of undetermined degree are shown follows, Ex = , En =3.5663, He = (Fig. 4(b)). Because the hyper entropy of arithmetic (i) approximately equal to the hyper entropy of Young People, so it is not necessary to deleting the high point of the membership. The difference set concept means narrowing the range of this conceptremove the older parts of Young People, equivalent to the concept of adolescent, the Hyper entropy is less different between the new concept and the original concept, and data results in line with the fact as well. (a) The result of Ex = , En =3.3451, He =0.5334, the number of drops is n=5000 (b) The result of Ex = , En =3.5663, He =0.4436, the number of drops is n=5000 Fig. 4: The difference operation between cloud concepts 6 The Symmetric Difference Operation Between Cloud Concepts 6.1 The principle of the algorithm The symmetric difference operation is opposite to the intersection operation, removing the age group which both belongs Young People and Middle-aged from Young and Middle-aged. It means finding out the drops which have maximum age in Young People and have minimum age in Middle-aged, sending those drops which except the two above into BCG. This algorithm is shown as follows, (1) Importing Ex1, En1, He1 into FCG, the membership coordinates Y(x, y) of Young People s are obtained; Then Importing Ex2, En2, He2 into FCG, the membership coordinates M(x, y) of Middle-aged s are obtained; (2) Do symmetric difference operation, take the abscissa maximum of Y(x, y), remember to x max, and remove the abscissa values less than x max from M(x, y), The remaining part is denoted
7 L. Yin et al. /Journal of Computational Information Systems 11: 13 (2015) as M. Then take the abscissa minimum of M(x, y), remember to x min, and remove the abscissa values greater than x min from Y(x, y), The remaining part is denoted as Y ; (3) Importing Y and M into BCG. 6.2 Analysis of the results (i) The results of reverse the normal cloud generator algorithm of determined degree are shown as follows, Ex = , En = , He = (Fig. 5(a)). If changing the condition reject the drops membership which greater than to reject the drops membership which greater than 0.9, then He= (Fig. 5(b)); if amended as reject the drops membership which greater than 0.6, then He= (Fig. 5(c)). (ii) The results of reverse the normal cloud generator algorithm of undetermined degree are shown as follows, Ex = , En = , He = (Fig. 6). Symmetric difference is a union operation of two sets which are no intersection. (a) The results of reverse the normal cloud generator,n=5000 (b) The result of He= (c) The result of He= Fig. 5: The results of reverse the normal cloud generator algorithm of determined degree Fig. 6: The result of Ex = , En = , He = , the number of drops is n= Conclusion In this paper, many certain concepts are developed by FCG, and these new concepts are outputted by FCG based on the set operations. The theoretical foundation of the improvement of the cloud
8 4888 L. Yin et al. /Journal of Computational Information Systems 11: 13 (2015) model is enhanced, and a new idea for knowledge representation with cloud model is presented. Many new methods for transformation between the quantitative concepts and qualitative concepts are proposed, and the rationality of uncertain concept in cloud model is revealed. These results are beneficial to the deeper and wider development of cloud model. From the above results, we can know that intersection, complement and complementary operations are conforming to human cognition model, and the effect of the rest operations be not in accord with the human cognitive habits. Discrete degree of these new concepts is different due to the different algorithm of FCG. Therefore, in the future work, the method for choosing cloud drops and the algorithm of BCG may determine the disadvantage and advantage of the new concept generated by set operations of could model. References [1] Li De-Yi, Du Yi. Artificial intelligence with uncertainty [M]. Beijing: National Defense Industry Press, [2] Liu Gui-hua, Song Cheng-xiang, Liu Hong Software Implementation of Cloud Generators [J]. Application Research of Computers, 2007, 24(1): [3] Ashley H. Carter, Classical and Statistical Thermodynamics [M]. Beijing University Press, [4] Wang S L, Li D R, Shi W Z, et al. Cloud model-based spatial data mining [J]. Geographical Information Science, 2003, 9(2): [5] Liu Jie, Chen Xiao-ping, Cai Qing-sheng, Fan Yan, Recognition Structure of Uncertainty: a Unified Framework for Representation, Reasoning and Learning [J]. Journal of Software, 2002, 13(4): [6] Zadeh L A. Fuzzy sets, Information and Control, 1965, 8: [7] Russell S, Norvig P. Artificial Intelligence: a Modem Approach. New Jersey: Prentice Hall, [8] Li De-Yi. The cloud control method and balancing patterns of triple link inverted pendulum systems. Engineering Science, 1999, 1(2): [9] Zhang Fei-Zhou, Fan Yue-Zu, Shen Cheng-Zhi, Li De-Yi. Intelligent control based on membership cloud generators. Acta Aeronautics ET Astronautica Sinica, 1999, 20(1): [10] Yu Shao-Wei, Cai Kai, Zhao Mo. Traffic information forecast algorithm based on the one-dimension cloud model. Journal of Shandong University (Engineering Science), 2007, 37(2): [11] Jiang Rong, Li De-Yi, Fan Jian-Hua. Automatic Generation of Pan-Concept-Tree on numerical data. Chinese Journal of Computers, 2000, 23(5): 1-7. [12] Li Xing-Sheng, Li De-Yi. A new method based on cloud model for discretization of continuous attributes in rough sets. Pattern Recognition and Artificial Intelligence, 2003, 16(1): [13] Du Yi, Li De-Yi. Concept partition based on cloud and its application to mining association rules. Journal of Software, 2001, 12(2): [14] Wang S L, Li D R, Shi W Z, et al. Cloud model-based spatial data mining. Geographical Information Science, 2003, 9(2): [15] Li De-Yi, Yu Quan, Jiang Guang-Jie. A unified assessment of reliability, invulnerability and anticounterm easurement for C3I Systems. Systems Engineering Theory and practice, 1997, 17(3): [16] Yu Shao-Wei. A new approach to reasoning about uncertainty based on cloud theory. Journal of Shandong University (Natural Science), 2009, 44(3):
Big Data Storage Architecture Design in Cloud Computing
Big Data Storage Architecture Design in Cloud Computing Xuebin Chen 1, Shi Wang 1( ), Yanyan Dong 1, and Xu Wang 2 1 College of Science, North China University of Science and Technology, Tangshan, Hebei,
More informationOpen Access Research on Database Massive Data Processing and Mining Method based on Hadoop Cloud Platform
Send Orders for Reprints to reprints@benthamscience.ae The Open Automation and Control Systems Journal, 2014, 6, 1463-1467 1463 Open Access Research on Database Massive Data Processing and Mining Method
More informationA Method for Trust Management in Cloud Computing: Data Coloring by Cloud Watermarking
International Journal of Automation and Computing 8(3), August 2011, 280-285 DOI: 10.1007/s11633-011-0583-3 A Method for Trust Management in Cloud Computing: Data Coloring by Cloud Watermarking Yu-Chao
More informationAn Analysis of Agricultural Risk and Intelligent Monitoring Technology Fantao Kong 1, a, Shiwei Xu 2,b, Shengwei Wang 3,c and Haipeng Yu 4,d
Advanced Materials Research Vol. 628 (2013) pp 265-269 Online available since 2012/Dec/27 at www.scientific.net (2013) Trans Tech Publications, Switzerland doi:10.4028/www.scientific.net/amr.628.265 An
More informationDatabase Modeling and Visualization Simulation technology Based on Java3D Hongxia Liu
International Conference on Information Sciences, Machinery, Materials and Energy (ICISMME 05) Database Modeling and Visualization Simulation technology Based on Java3D Hongxia Liu Department of Electronic
More informationPREDICTION FOR SHORT-TERM TRAFFIC FLOW BASED ON OPTIMIZED WAVELET NEURAL NETWORK MODEL
PREDICTION FOR SHORT-TERM TRAFFIC FLOW BASED ON OPTIMIZED WAVELET NEURAL NETWORK MODEL ABSTRACT Tao Li 1 and Liu Sheng 2 School of Management, Shanghai University of Engineering Science Shanghai, China
More informationA Solution for Data Inconsistency in Data Integration *
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 27, 681-695 (2011) A Solution for Data Inconsistency in Data Integration * Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai,
More informationEffects of node buffer and capacity on network traffic
Chin. Phys. B Vol. 21, No. 9 (212) 9892 Effects of node buffer and capacity on network traffic Ling Xiang( 凌 翔 ) a), Hu Mao-Bin( 胡 茂 彬 ) b), and Ding Jian-Xun( 丁 建 勋 ) a) a) School of Transportation Engineering,
More informationNetwork Intrusion Detection System and Its Cognitive Ability based on Artificial Immune Model WangLinjing1, ZhangHan2
3rd International Conference on Machinery, Materials and Information Technology Applications (ICMMITA 2015) Network Intrusion Detection System and Its Cognitive Ability based on Artificial Immune Model
More informationTHE APPLICATION OF DATA MINING TECHNOLOGY IN REAL ESTATE MARKET PREDICTION
THE APPLICATION OF DATA MINING TECHNOLOGY IN REAL ESTATE MARKET PREDICTION Xian Guang LI, Qi Ming LI Department of Construction and Real Estate, South East Univ,,Nanjing, China. Abstract: This paper introduces
More informationCredit Risk Comprehensive Evaluation Method for Online Trading
Credit Risk Comprehensive Evaluation Method for Online Trading Company 1 *1, Corresponding Author School of Economics and Management, Beijing Forestry University, fankun@bjfu.edu.cn Abstract A new comprehensive
More informationStudy on the Evaluation for the Knowledge Sharing Efficiency of the Knowledge Service Network System in Agile Supply Chain
Send Orders for Reprints to reprints@benthamscience.ae 384 The Open Cybernetics & Systemics Journal, 2015, 9, 384-389 Open Access Study on the Evaluation for the Knowledge Sharing Efficiency of the Knowledge
More informationTasks Scheduling Game Algorithm Based on Cost Optimization in Cloud Computing
Journal of Computational Information Systems 11: 16 (2015) 6037 6045 Available at http://www.jofcis.com Tasks Scheduling Game Algorithm Based on Cost Optimization in Cloud Computing Renfeng LIU 1, Lijun
More informationDesign call center management system of e-commerce based on BP neural network and multifractal
Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(6):951-956 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Design call center management system of e-commerce
More informationResearch on Semantic Web Service Composition Based on Binary Tree
, pp.133-142 http://dx.doi.org/10.14257/ijgdc.2015.8.2.13 Research on Semantic Web Service Composition Based on Binary Tree Shengli Mao, Hui Zang and Bo Ni Computer School, Hubei Polytechnic University,
More informationPerformance Evaluation and Prediction of IT-Outsourcing Service Supply Chain based on Improved SCOR Model
Performance Evaluation and Prediction of IT-Outsourcing Service Supply Chain based on Improved SCOR Model 1, 2 1 International School of Software, Wuhan University, Wuhan, China *2 School of Information
More informationInternational Conference on Advances in Energy, Environment and Chemical Engineering (AEECE-2015)
International Conference on Advances in Energy, Environment and Chemical Engineering (AEECE-2015) An Optimal Reactive Power Planning Software for Urban Network Qiang Sun 1, a, Xue Wang 1,b, Yingting Ni
More informationUPS battery remote monitoring system in cloud computing
, pp.11-15 http://dx.doi.org/10.14257/astl.2014.53.03 UPS battery remote monitoring system in cloud computing Shiwei Li, Haiying Wang, Qi Fan School of Automation, Harbin University of Science and Technology
More informationCONCEPTUAL MODEL OF MULTI-AGENT BUSINESS COLLABORATION BASED ON CLOUD WORKFLOW
CONCEPTUAL MODEL OF MULTI-AGENT BUSINESS COLLABORATION BASED ON CLOUD WORKFLOW 1 XINQIN GAO, 2 MINGSHUN YANG, 3 YONG LIU, 4 XIAOLI HOU School of Mechanical and Precision Instrument Engineering, Xi'an University
More informationThe Planning Method for Disaster Recovery Program of Digital Business Based on HSM-III Model
Journal of Information & Computational Science 7: 12 (2010) 2403 2409 Available at http://www.joics.com The Planning Method for Disaster Recovery Program of Digital Business Based on HSM-III Model Shenghui
More informationA Health Degree Evaluation Algorithm for Equipment Based on Fuzzy Sets and the Improved SVM
Journal of Computational Information Systems 10: 17 (2014) 7629 7635 Available at http://www.jofcis.com A Health Degree Evaluation Algorithm for Equipment Based on Fuzzy Sets and the Improved SVM Tian
More informationThe Design Study of High-Quality Resource Shared Classes in China: A Case Study of the Abnormal Psychology Course
The Design Study of High-Quality Resource Shared Classes in China: A Case Study of the Abnormal Psychology Course Juan WANG College of Educational Science, JiangSu Normal University, Jiangsu, Xuzhou, China
More informationMulti-service Load Balancing in a Heterogeneous Network with Vertical Handover
1 Multi-service Load Balancing in a Heterogeneous Network with Vertical Handover Jie Xu, Member, IEEE, Yuming Jiang, Member, IEEE, and Andrew Perkis, Member, IEEE Abstract In this paper we investigate
More informationA Load Balancing Algorithm based on the Variation Trend of Entropy in Homogeneous Cluster
, pp.11-20 http://dx.doi.org/10.14257/ ijgdc.2014.7.2.02 A Load Balancing Algorithm based on the Variation Trend of Entropy in Homogeneous Cluster Kehe Wu 1, Long Chen 2, Shichao Ye 2 and Yi Li 2 1 Beijing
More informationResearch on Trust Management Strategies in Cloud Computing Environment
Journal of Computational Information Systems 8: 4 (2012) 1757 1763 Available at http://www.jofcis.com Research on Trust Management Strategies in Cloud Computing Environment Wenjuan LI 1,2,, Lingdi PING
More informationThe Use of Hybrid Regulator in Design of Control Systems
World Applied Sciences Journal 23 (10): 1291-1297, 2013 ISSN 1818-4952 IDOSI Publications, 2013 DOI: 10.5829/idosi.wasj.2013.23.10.13144 The Use of Hybrid Regulator in Design of Control Systems Vladimir
More informationOptimization of PID parameters with an improved simplex PSO
Li et al. Journal of Inequalities and Applications (2015) 2015:325 DOI 10.1186/s13660-015-0785-2 R E S E A R C H Open Access Optimization of PID parameters with an improved simplex PSO Ji-min Li 1, Yeong-Cheng
More informationBig Data with Rough Set Using Map- Reduce
Big Data with Rough Set Using Map- Reduce Mr.G.Lenin 1, Mr. A. Raj Ganesh 2, Mr. S. Vanarasan 3 Assistant Professor, Department of CSE, Podhigai College of Engineering & Technology, Tirupattur, Tamilnadu,
More informationAnalysis of Model and Key Technology for P2P Network Route Security Evaluation with 2-tuple Linguistic Information
Journal of Computational Information Systems 9: 14 2013 5529 5534 Available at http://www.jofcis.com Analysis of Model and Key Technology for P2P Network Route Security Evaluation with 2-tuple Linguistic
More informationCapability Service Management System for Manufacturing Equipments in
Capability Service Management System for Manufacturing Equipments in Cloud Manufacturing 1 Junwei Yan, 2 Sijin Xin, 3 Quan Liu, 4 Wenjun Xu *1, Corresponding Author School of Information Engineering, Wuhan
More informationLoad Balancing Algorithm Based on Services
Journal of Information & Computational Science 10:11 (2013) 3305 3312 July 20, 2013 Available at http://www.joics.com Load Balancing Algorithm Based on Services Yufang Zhang a, Qinlei Wei a,, Ying Zhao
More informationJournal of Chemical and Pharmaceutical Research, 2014, 6(3):34-39. Research Article. Analysis of results of CET 4 & CET 6 Based on AHP
Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(3):34-39 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Analysis of results of CET 4 & CET 6 Based on AHP
More informationReal estate investment project risk analysis
Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(5):1789-1794 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Real estate investment project risk analysis Li
More informationReflection on Quality Assurance System of Higher Vocational Education under Big Data Era
SHS Web of Conferences 14, 01009 (2015) DOI: 10.1051/ shsconf/2015140100 9 C Owned by the authors, published by EDP Sciences, 2015 Reflection on Quality Assurance System of Higher Vocational Education
More informationApplication of Data Mining in Network Instructional platform of "Modern Educational Technology" for Different Teaching
, pp.143-158 http://dx.doi.org/10.14257/ijdta.2014.7.3.14 Application of Data Mining in Network Instructional platform of "Modern Educational Technology" for Different Teaching Qiuxiang Shi 1, Jianying
More informationA FUZZY LOGIC APPROACH FOR SALES FORECASTING
A FUZZY LOGIC APPROACH FOR SALES FORECASTING ABSTRACT Sales forecasting proved to be very important in marketing where managers need to learn from historical data. Many methods have become available for
More informationAnalysis of seismic response control for long-span cable-stayed. bridge under traveling wave input *
Analysis of seismic response control for long-span cable-stayed bridge under traveling wave input * QI ing-jun, LI iao-jun 2 ( Associate Professor, School of Civil Engineering, Shandong Jianzhu University,
More informationBlog Post Extraction Using Title Finding
Blog Post Extraction Using Title Finding Linhai Song 1, 2, Xueqi Cheng 1, Yan Guo 1, Bo Wu 1, 2, Yu Wang 1, 2 1 Institute of Computing Technology, Chinese Academy of Sciences, Beijing 2 Graduate School
More informationData Mining in the Application of Criminal Cases Based on Decision Tree
8 Journal of Computer Science and Information Technology, Vol. 1 No. 2, December 2013 Data Mining in the Application of Criminal Cases Based on Decision Tree Ruijuan Hu 1 Abstract A briefing on data mining
More informationOpen Access Research on Application of Neural Network in Computer Network Security Evaluation. Shujuan Jin *
Send Orders for Reprints to reprints@benthamscience.ae 766 The Open Electrical & Electronic Engineering Journal, 2014, 8, 766-771 Open Access Research on Application of Neural Network in Computer Network
More informationStudies of Chinese Intellectual Property:Academic Basis and Development Idea
Journal of Intellectual Property Rights Vol 20, March 2015, pp 96-103 Studies of Chinese Intellectual Property:Academic Basis and Development Idea WANG Xu-kun 1,2, Zhao Qu 1, DING Kun 1,2 and Zhang Shanshan
More informationAn Evaluation Model for Determining Insurance Policy Using AHP and Fuzzy Logic: Case Studies of Life and Annuity Insurances
Proceedings of the 8th WSEAS International Conference on Fuzzy Systems, Vancouver, British Columbia, Canada, June 19-21, 2007 126 An Evaluation Model for Determining Insurance Policy Using AHP and Fuzzy
More informationThe Combination Forecasting Model of Auto Sales Based on Seasonal Index and RBF Neural Network
, pp.67-76 http://dx.doi.org/10.14257/ijdta.2016.9.1.06 The Combination Forecasting Model of Auto Sales Based on Seasonal Index and RBF Neural Network Lihua Yang and Baolin Li* School of Economics and
More informationResearch on Credibility Measurement Method of Data In Big Data
Journal of Information Hiding and Multimedia Signal Processing c 2016 ISSN 2073-4212 Ubiquitous International Volume 7, Number 4, July 2016 Research on Credibility Measurement Method of Data In Big Data
More informationAn approach of detecting structure emergence of regional complex network of entrepreneurs: simulation experiment of college student start-ups
An approach of detecting structure emergence of regional complex network of entrepreneurs: simulation experiment of college student start-ups Abstract Yan Shen 1, Bao Wu 2* 3 1 Hangzhou Normal University,
More informationDesign and Implementation of Supermarket Management System Yongchang Rena, Mengyao Chenb
4th International Conference on Mechatronics, Materials, Chemistry and Computer Engineering (ICMMCCE 2015) Design and Implementation of Supermarket Management System Yongchang Rena, Mengyao Chenb College
More informationMedical Image Segmentation of PACS System Image Post-processing *
Medical Image Segmentation of PACS System Image Post-processing * Lv Jie, Xiong Chun-rong, and Xie Miao Department of Professional Technical Institute, Yulin Normal University, Yulin Guangxi 537000, China
More informationDevelopment of a Web-based Information Service Platform for Protected Crop Pests
Development of a Web-based Information Service Platform for Protected Crop Pests Chong Huang 1, Haiguang Wang 1 1 Department of Plant Pathology, China Agricultural University, Beijing, P. R. China 100193
More informationThe Study on Logistics Management Patterns based on Fuzzy Comprehensive Evaluation Method
The Study on Logistics Management Patterns based on Fuzzy Comprehensive Evaluation Method School of Management Shanghai University, Shanghai Baoshan 200072 School of Foreign Yiwu Industrial & Commercial
More informationA Network Simulation Experiment of WAN Based on OPNET
A Network Simulation Experiment of WAN Based on OPNET 1 Yao Lin, 2 Zhang Bo, 3 Liu Puyu 1, Modern Education Technology Center, Liaoning Medical University, Jinzhou, Liaoning, China,yaolin111@sina.com *2
More informationApplied research on data mining platform for weather forecast based on cloud storage
Applied research on data mining platform for weather forecast based on cloud storage Haiyan Song¹, Leixiao Li 2* and Yuhong Fan 3* 1 Department of Software Engineering t, Inner Mongolia Electronic Information
More informationBig Data Analytics of Multi-Relationship Online Social Network Based on Multi-Subnet Composited Complex Network
, pp.273-284 http://dx.doi.org/10.14257/ijdta.2015.8.5.24 Big Data Analytics of Multi-Relationship Online Social Network Based on Multi-Subnet Composited Complex Network Gengxin Sun 1, Sheng Bin 2 and
More informationAgricultural E-Commerce Sites Evaluation Research
International Journal of Business and Social Science Vol. 4 No. 17 [Special Issue December 2013] Agricultural E-Commerce Sites Evaluation Research Hang Liu Yuming Wang Kui Xie College of Management Shanghai
More informationFuzzy Numbers in the Credit Rating of Enterprise Financial Condition
C Review of Quantitative Finance and Accounting, 17: 351 360, 2001 2001 Kluwer Academic Publishers. Manufactured in The Netherlands. Fuzzy Numbers in the Credit Rating of Enterprise Financial Condition
More informationBank Credit Risk Management Early Warning and Decision-making based on BP Neural Networks
Bank Credit Risk Management Early Warning and Decision-making based on BP Neural Networks 1 Zhi-Yuan Yu, 2 Shu-Fang Zhao 1 Department of Economics and Management, Taiyuan Institute of Technology, Taiyuan
More informationPreface: Cognitive Informatics, Cognitive Computing, and Their Denotational Mathematical Foundations (II)
Fundamenta Informaticae 90 (2009) i vii DOI 10.3233/FI-2009-0001 IOS Press i Preface: Cognitive Informatics, Cognitive Computing, and Their Denotational Mathematical Foundations (II) Yingxu Wang Visiting
More informationRandom forest algorithm in big data environment
Random forest algorithm in big data environment Yingchun Liu * School of Economics and Management, Beihang University, Beijing 100191, China Received 1 September 2014, www.cmnt.lv Abstract Random forest
More informationSupply Chain Quality Management Based on Information Asymmetry
Supply Chain Quality Management Based on Information Asymmetry Jianhua Zhao 1, Yue Hu 2, Yi Wang 3 College of Economic and Management, China Three Gorges University, Yichang Hubei Province, China 443002
More informationContemporary Logistics. Logistics Outsourcing Risks Evaluation Based on Rough Sets Theory
Contemporary Logistics 11 2013) 1838-739X Contents lists available at SEI Contemporary Logistics journal homepage: www.seiofbluemountain.com Logistics Outsourcing Risks Evaluation Based on Rough Sets Theory
More informationTowards Cloud Factory Simulation. Abstract
Towards Cloud Factory Simulation 第 十 八 屆 決 策 分 析 研 討 會 Toly Chen Department of Industrial Engineering and Systems Management, Feng Chia University *tolychen@ms37.hinet.net Abstract An important and practical
More informationLinguistic Preference Modeling: Foundation Models and New Trends. Extended Abstract
Linguistic Preference Modeling: Foundation Models and New Trends F. Herrera, E. Herrera-Viedma Dept. of Computer Science and Artificial Intelligence University of Granada, 18071 - Granada, Spain e-mail:
More informationConstruction and Implementation of Innovation Computer Network Practical Teaching System
I.J. Education and Management Engineering 2011, 2, 30-35 Published Online August 2011 in MECS (http://www.mecs-press.net) DOI: 10.5815/ijeme.2011.02.05 Available online at http://www.mecs-press.net/ijeme
More informationTOURISM DEMAND FORECASTING USING A NOVEL HIGH-PRECISION FUZZY TIME SERIES MODEL. Ruey-Chyn Tsaur and Ting-Chun Kuo
International Journal of Innovative Computing, Information and Control ICIC International c 2014 ISSN 1349-4198 Volume 10, Number 2, April 2014 pp. 695 701 OURISM DEMAND FORECASING USING A NOVEL HIGH-PRECISION
More informationMethod of Fault Detection in Cloud Computing Systems
, pp.205-212 http://dx.doi.org/10.14257/ijgdc.2014.7.3.21 Method of Fault Detection in Cloud Computing Systems Ying Jiang, Jie Huang, Jiaman Ding and Yingli Liu Yunnan Key Lab of Computer Technology Application,
More informationImage Mining Using Texture and Shape Feature
Image Mining Using Texture and Shape Feature Prof.Rupali Sawant Sardar Patel Institute of technology ABSTRACT Discovering knowledge from data stored in typical alphanumeric databases, such as relational
More informationThe multilayer sentiment analysis model based on Random forest Wei Liu1, Jie Zhang2
2nd International Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 2016) The multilayer sentiment analysis model based on Random forest Wei Liu1, Jie Zhang2 1 School of
More informationPrediction of Stock Performance Using Analytical Techniques
136 JOURNAL OF EMERGING TECHNOLOGIES IN WEB INTELLIGENCE, VOL. 5, NO. 2, MAY 2013 Prediction of Stock Performance Using Analytical Techniques Carol Hargreaves Institute of Systems Science National University
More informationData Mining Project Report. Document Clustering. Meryem Uzun-Per
Data Mining Project Report Document Clustering Meryem Uzun-Per 504112506 Table of Content Table of Content... 2 1. Project Definition... 3 2. Literature Survey... 3 3. Methods... 4 3.1. K-means algorithm...
More informationStudy on the Patterns of Library Resource Construction and Services in MOOC
, pp. 85-90 http://dx.doi.org/10.14257/ijunesst.2014.7.6.08 Study on the Patterns of Library Resource Construction and Services in MOOC Sun Ji-zhou, Liao Sheng-feng (Library of Nanchang Hangkong University,
More informationApplication of Cloud Theory in Association Rules
I.J. Information Technology and Computer Science, 0, 3, 36-4 Published Online June 0 in MECS (http://www.mecs-press.org/) Application of Cloud Theory in Association Rules Zhaohong Wang College of Computer
More informationCHINASOFT INTERNATIONAL LIMITED 中 軟 國 際 有 限 公 司
Hong Kong Exchanges and Clearing Limited and The Stock Exchange of Hong Kong Limited take no responsibility for the contents of this announcement, make no representation as to its accuracy or completeness
More informationLeran Wang and Tom Kazmierski {lw04r,tjk}@ecs.soton.ac.uk
BMAS 2005 VHDL-AMS based genetic optimization of a fuzzy logic controller for automotive active suspension systems Leran Wang and Tom Kazmierski {lw04r,tjk}@ecs.soton.ac.uk Outline Introduction and system
More informationAN IMPROVED CREDIT SCORING METHOD FOR CHINESE COMMERCIAL BANKS
AN IMPROVED CREDIT SCORING METHOD FOR CHINESE COMMERCIAL BANKS Jianping Li Jinli Liu Weixuan Xu 1.University of Science & Technology of China, Hefei, 230026, P.R. China 2.Institute of Policy and Management
More informationA Service Revenue-oriented Task Scheduling Model of Cloud Computing
Journal of Information & Computational Science 10:10 (2013) 3153 3161 July 1, 2013 Available at http://www.joics.com A Service Revenue-oriented Task Scheduling Model of Cloud Computing Jianguang Deng a,b,,
More informationReceived 8 January 2015; accepted 25 February 2015; published 28 February 2015
American Journal of Industrial and Business Management, 2015, 5, 66-72 Published Online February 2015 in SciRes. http://www.scirp.org/journal/ajibm http://dx.doi.org/10.4236/ajibm.2015.52008 Study on the
More informationA Cloud-Based Trust Model for Evaluating Quality of Web Services
Wang SX, Zhang L, Wang S et al. A cloud-based trust model for evaluating quality of Web services. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY 25(6): 1130 1142 Nov. 2010. DOI 10.1007/s11390-010-1090-7 A
More informationModeling and Prediction of Network Traffic Based on Hybrid Covariance Function Gaussian Regressive
Journal of Information & Computational Science 12:9 (215) 3637 3646 June 1, 215 Available at http://www.joics.com Modeling and Prediction of Network Traffic Based on Hybrid Covariance Function Gaussian
More informationResearch of Postal Data mining system based on big data
3rd International Conference on Mechatronics, Robotics and Automation (ICMRA 2015) Research of Postal Data mining system based on big data Xia Hu 1, Yanfeng Jin 1, Fan Wang 1 1 Shi Jiazhuang Post & Telecommunication
More informationDATA MINING USING INTEGRATION OF CLUSTERING AND DECISION TREE
DATA MINING USING INTEGRATION OF CLUSTERING AND DECISION TREE 1 K.Murugan, 2 P.Varalakshmi, 3 R.Nandha Kumar, 4 S.Boobalan 1 Teaching Fellow, Department of Computer Technology, Anna University 2 Assistant
More informationSupporting Information. Phosphorus-, nitrogen- and carbon- containing polyelectrolyte complex:
Electronic Supplementary Material (ESI) for RSC Advances. This journal is The Royal Society of Chemistry 2014 S1 Supporting Information Phosphorus-, nitrogen- and carbon- containing polyelectrolyte complex:
More informationA New Method for Traffic Forecasting Based on the Data Mining Technology with Artificial Intelligent Algorithms
Research Journal of Applied Sciences, Engineering and Technology 5(12): 3417-3422, 213 ISSN: 24-7459; e-issn: 24-7467 Maxwell Scientific Organization, 213 Submitted: October 17, 212 Accepted: November
More informationFuzzy Logic -based Pre-processing for Fuzzy Association Rule Mining
Fuzzy Logic -based Pre-processing for Fuzzy Association Rule Mining by Ashish Mangalampalli, Vikram Pudi Report No: IIIT/TR/2008/127 Centre for Data Engineering International Institute of Information Technology
More informationUltrasonic Detection Algorithm Research on the Damage Depth of Concrete after Fire Jiangtao Yu 1,a, Yuan Liu 1,b, Zhoudao Lu 1,c, Peng Zhao 2,d
Advanced Materials Research Vols. 368-373 (2012) pp 2229-2234 Online available since 2011/Oct/24 at www.scientific.net (2012) Trans Tech Publications, Switzerland doi:10.4028/www.scientific.net/amr.368-373.2229
More informationKnowledge Based System for Detection and Prevention of DDoS Attacks using Fuzzy logic
Knowledge Based System for Detection and Prevention of DDoS Attacks using Fuzzy logic Amit Khajuria 1, Roshan Srivastava 2 1 M. Tech Scholar, Computer Science Engineering, Lovely Professional University,
More informationFault Analysis in Software with the Data Interaction of Classes
, pp.189-196 http://dx.doi.org/10.14257/ijsia.2015.9.9.17 Fault Analysis in Software with the Data Interaction of Classes Yan Xiaobo 1 and Wang Yichen 2 1 Science & Technology on Reliability & Environmental
More informationThresholding technique with adaptive window selection for uneven lighting image
Pattern Recognition Letters 26 (2005) 801 808 wwwelseviercom/locate/patrec Thresholding technique with adaptive window selection for uneven lighting image Qingming Huang a, *, Wen Gao a, Wenjian Cai b
More informationEFFICIENT DATA PRE-PROCESSING FOR DATA MINING
EFFICIENT DATA PRE-PROCESSING FOR DATA MINING USING NEURAL NETWORKS JothiKumar.R 1, Sivabalan.R.V 2 1 Research scholar, Noorul Islam University, Nagercoil, India Assistant Professor, Adhiparasakthi College
More informationFUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT MINING SYSTEM
International Journal of Innovative Computing, Information and Control ICIC International c 0 ISSN 34-48 Volume 8, Number 8, August 0 pp. 4 FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT
More informationAnalysis of China Motor Vehicle Insurance Business Trends
Analysis of China Motor Vehicle Insurance Business Trends 1 Xiaohui WU, 2 Zheng Zhang, 3 Lei Liu, 4 Lanlan Zhang 1, First Autho University of International Business and Economic, Beijing, wuxiaohui@iachina.cn
More informationThe Application Research of Ant Colony Algorithm in Search Engine Jian Lan Liu1, a, Li Zhu2,b
3rd International Conference on Materials Engineering, Manufacturing Technology and Control (ICMEMTC 2016) The Application Research of Ant Colony Algorithm in Search Engine Jian Lan Liu1, a, Li Zhu2,b
More informationANNOUNCEMENT ON RESOLUTIONS OF THE 24 TH MEETING OF THE FIFTH SESSION OF THE BOARD OF DIRECTORS
Hong Kong Exchanges and Clearing Limited and The Stock Exchange of Hong Kong Limited takes no responsibility for the contents of this announcement, makes no representation as to its accuracy or completeness
More informationProduct data model for PLM system
roduct data model for LM system Li Yumei, Wan Li, Xiong Tifan (National CAD Support Software Engineering Research Center, Huazhong University of Science and Technology, Wuhan 430074) Abstract: roduct lifecycle
More informationAutomatic Mining of Internet Translation Reference Knowledge Based on Multiple Search Engines
, 22-24 October, 2014, San Francisco, USA Automatic Mining of Internet Translation Reference Knowledge Based on Multiple Search Engines Baosheng Yin, Wei Wang, Ruixue Lu, Yang Yang Abstract With the increasing
More informationThe Analysis Method about Change Domain of Business Process Model Based on the Behavior Profile of Petri Net
Appl. Math. Inf. Sci. 6-3S, No. 3, 943-949 (2012) 943 Applied Mathematics & Information Sciences An International Journal The Analysis Method about Change Domain of Business Process Model Based on the
More informationInclusion degree: a perspective on measures for rough set data analysis
Information Sciences 141 (2002) 227 236 www.elsevier.com/locate/ins Inclusion degree: a perspective on measures for rough set data analysis Z.B. Xu a, *, J.Y. Liang a,1, C.Y. Dang b, K.S. Chin b a Faculty
More informationCollapse by Cascading Failures in Hybrid Attacked Regional Internet
Collapse by Cascading Failures in Hybrid Attacked Regional Internet Ye Xu and Zhuo Wang College of Information Science and Engineering, Shenyang Ligong University, Shenyang China xuy.mail@gmail.com Abstract
More informationThe Security Evaluation of ATM Information System Based on Bayesian Regularization
JOURNAL OF SOFTWARE, VOL. 9, NO. 6, JUNE 2014 1587 The Security Evaluation of ATM Information System Based on Bayesian Regularization Lan Ma School of Air Traffic Management, Civil Aviation University
More informationCLOUD MODEL AND HIERARCHICAL CLUSTERING BASED SPATIAL DATA MINING METHOD AND APPLICATION
CLOUD MODEL AND HIERARCHICAL CLUSTERING BASED SPATIAL DATA MINING METHOD AND APPLICATION Kun Qin a, *, Min Xu a, Yi Du b, Shuying Yue a a School of Remote Sensing Information Engineering, Wuhan University,
More informationBig Data Classification: Problems and Challenges in Network Intrusion Prediction with Machine Learning
Big Data Classification: Problems and Challenges in Network Intrusion Prediction with Machine Learning By: Shan Suthaharan Suthaharan, S. (2014). Big data classification: Problems and challenges in network
More informationAn Optimization Model of Load Balancing in P2P SIP Architecture
An Optimization Model of Load Balancing in P2P SIP Architecture 1 Kai Shuang, 2 Liying Chen *1, First Author, Corresponding Author Beijing University of Posts and Telecommunications, shuangk@bupt.edu.cn
More information