The Compound Operations of Uncertain Cloud Concepts

Size: px
Start display at page:

Download "The Compound Operations of Uncertain Cloud Concepts"

Transcription

1 Journal of Computational Information Systems 11: 13 (2015) Available at The Compound Operations of Uncertain Cloud Concepts Longjun YIN 1,, Junjie XU 1, Guansheng ZHANG 2, Yanyan LI 3 1 School of Science, Chongqing University of Posts and Telecommunications, Chongqing , China 2 Research Center of Intelligent System and Robot, Chongqing University of Posts and Telecommunications, Chongqing , China 3 School of Computer Science & Technology, Chongqing University of Posts and Telecommunications, Chongqing , China Abstract Cloud model, an effective new cognitive model, is used to simulate the bidirectional cognitive computing between the intension and extension of concept from the forward cloud generator (FCG) and the backward cloud generator (BCG). In this paper, two kinds of cloud concepts, i.e., Young People and Middle-aged are used to generate the compound concepts in MATLAB. Firstly, the FCG is used for generating the extension set of a cloud concept. And the extension set of cloud concept can be obtained by the set operations, such as union operation, intersection operation, complementary operation and symmetric difference operation. And then the results are sent to FCG, the connotation of a new cloud concept can be obtained respectively by FCG algorithm of determined degree information and BCG algorithm of undetermined degree information. Through analyzing the output results, we can find that there are some degree atomization phenomenon in union operation, intersection operation, complementary operation and symmetric difference operation of cloud concept. And we find that removing the high membership of the cloud drops can reduce the hyper entropy, and the result about the certainty degree of complement is better. Keywords: Cloud Model; FCG; BCG; Set Operations; Cloud Concepts 1 Foreword Based on the probability theory and fuzzy set theory, Li puts forward cloud model [1] to uniformly describe randomness and fuzziness [8], which appears frequently in linguistic values. Taking the cloud model [1] as conversion model of the uncertainty between a certain qualitative This work is supported by the National Natural Science Foundation of China (No ), The Natural Science Foundation of Chongqing of China (No. cstc2013jcyja40063) and the Science & Technology Research Program of Chongqing Education Committee of China (No. KJ130534), The Youth Foundation of Chongqing University of Posts and Telecommunications (No. A ). Corresponding author. address: yinlj@cqupt.edu.cn (Longjun YIN) / Copyright 2015 Binary Information Press DOI: /jcis14670 July 1, 2015

2 4882 L. Yin et al. /Journal of Computational Information Systems 11: 13 (2015) concept described by linguistic values and its numerical representation. Cloud model [1] signifies the parameter in natural languagelinguistic values, and use three features, that are Expectation (Ex), Entropy (En) and Hyper entropy (He), to represent the natural language value. Entropy [3], this concept was initially used as a describing thermodynamic parameter, and was introduced in statistical physics [5] later. Information theory [4] was used to measure the uncertainty of the uncertain information. In the cloud model method, entropy represents a kind of metric particle size of the qualitative concept. The greater entropy comes, the greater granularity are. And information entropy can be used to granular computing for measuring the uncertainty degree of an uncertain concept. At the same time, entropy also represents the acceptable range of value to a qualitative concept in the information theory [4], i.e., ambiguity [4, 6], which is the measurement of uncertainty. The hyper entropy of cloud model is a kind of measurement of uncertainty change, i.e. the entropy of entropy. Cloud model [1] not only reflects randomness that a qualitative concept value appears, but also reflects membership degree of uncertainty, and reveals the relationship between fuzziness and randomness. At present the cloud model has been applied successfully in intelligent control [8, 9], prediction [10], fuzzy partition [11], data discretization [12], data mining technology [13, 14], system evaluation [15], uncertainty reasoning [16] and so on, and the advantage of the conversion between the qualitative concept and the quantitative concept is displayed gradually in uncertain artificial intelligent field. In this paper, the set operation of the concept extension, such as union, intersection, complementary, symmetric difference, is used to create many new extension of uncertain concept. And the BCG is used to create intension concept, in order to realize the synthesis of cloud concepts. In this paper Young people and Middle-aged are shown as two examples, to explain the compound operations, such as intersection operation, union operation, complement operation and symmetric difference operation, between any two uncertain cloud concepts based on the general normal cloud model. The rest of this paper is organized as follows. Section 2 gives the union operation of cloud concepts, and analyzes the rationality of union operation between any two uncertain cloud concepts. The intersection operation between any two uncertain cloud concepts is presented, and the rationality of intersection operation between any two uncertain cloud concepts will be analyzed in Section 3. Section 4 gives the complement operation between any two uncertain cloud concepts. In section 5 and in section 6 the difference operation and the symmetric difference operation between any two uncertain cloud concepts are proposed respectively. Section 7 is the conclusion part. 2 The Union Operation Between Two Uncertain Cloud Concepts 2.1 The principle of the algorithm Let Young people and Middle-aged people be two uncertain cloud concepts. The union operation between these two concepts means putting all the extension elements of two concepts into a new extension set, and generates a new uncertain concept called Middle and Young-aged people. Through importing the drops [1] of Young People and Middle-aged people which produced based on FCG, and the parameter of Middle and Young Caged people is exported based on BCG.

3 L. Yin et al. /Journal of Computational Information Systems 11: 13 (2015) This algorithm is shown as follows, (1) Importing Ex1, En1, He1 into FCG, the membership coordinates Y(x, y) of Young peoples are obtained. Then Importing Ex2, En2, He2 into FCG, the membership coordinates M(x, y) of Middle-aged peoples are obtained; (2) Importing Y and M into BCG. 2.2 Analysis of the results The results of reverse the normal cloud generator algorithm are shown as follows, Ex= , En = and He= (Fig. 1(a)). From Fig. 1(a), we find that the dispersion degree of these drops is very high. If we replace the condition remove the cloud drops with more than [3] membership to remove the drops membership which greater than 0.9, then He= (Fig. 1(b)); if amended as reject the drops membership which greater than 0.6, then He= (Fig. 1(c)). The union operation between any two uncertain cloud concepts means that the two extensions set merge into a new extension set in order to generate a new uncertain concept. From above algorithm we can know that the new concept is greatly influenced by those cloud drops which have high membership, and the atomization of the cloud drops is obvious. (a) The result of the union operation, n=5000 (b) The result of He= Fig. 1: The union operation of two cloud concepts (c) The result of He= The Intersection Operation Between Cloud Concepts 3.1 The principle of the algorithm The intersection set of Young People and Middle-aged people, As young people gradually become the process of young people. So the intersection set take the common elements of two sets into a new set. The idea of the algorithm is to find out those drops among maximum age in Young People and the minimum age in Middle-aged people, then send those drops into BCG. Algorithm is shown as follows, (1) Importing Ex1, En1, He1 into FCG, the membership coordinates Y(x, y) of Young People are obtained of; then importing Ex2, En2, He2 into FCG, the membership coordinates M(x, y) of

4 4884 L. Yin et al. /Journal of Computational Information Systems 11: 13 (2015) middle-aged people are obtained; (2) Do the intersection operation: take the abscissa maximum of Y(x, y) remember to x max, and remove the abscissa values greater than x max from Y(x, y), The remaining part is denoted as M similarly, take the abscissa minimum of Y(x, y), remember to x min, and remove the abscissa values less than x min from Y(x, y), The remaining part is denoted as Y ; (3) Send Y and M into BCG. 3.2 Analysis of the results The results of reverse the normal cloud generator algorithm are shown as follows, Ex = , En =4.1520, He = (Fig. 2(a)). If we replace the condition remove the cloud drops with more than membership to remove the drops membership which greater than 0.9, then He= (Fig. 2(b)); if amended as reject the drops membership which greater than 0.6, then He= (Fig. 2(c)). (a) The results of reverse the normal cloud generator, n=5000 (b) The result of He= Fig. 2: The intersection operation between cloud concepts (c) The result of He= The Complementary Operation Between Cloud Concepts 4.1 The principle of the algorithm Suppose the universal set is human longevity which between zero and one hundred, With the Young People, as an example, the Complementary set of Young People are between 0 and 100, developing the new concept by removing the value greater than maximum and less than minimum of Young People, then send this set into BCG. This algorithm is shown as follows, (1) Find out the maximum abscissa max and the minimum abscissa min from the Young People drops FCG; (2) Generating N uniformly distributed random numbers in [0,100], remove which belongs to [min,max];

5 L. Yin et al. /Journal of Computational Information Systems 11: 13 (2015) (3) Importing the surplus random numbers into BCG. 4.2 Analysis of the results (i) The results of reverse the normal cloud generator algorithm of determined degree information are shown as follows, Ex = , En = INF, He =NAN; In this algorithm, the cloud droplet information degree is determined, so the complement information degree is a Constant. Therefore the entropy of complementary set is infinite and hyper entropy of complementary set does not exist. (ii) The results of reverse the normal cloud generator algorithm of undetermined degree information are shown as follows, Ex = , En = , He = (Fig. 3). The complementary set of cloud is a great concept Remove all the young people, this concept is very extensive, so the hyper entropy has a large value. Fig. 3: The result of Ex = , En = , He =4.1285, the number of drops is n= The Difference Operation Between Cloud Concepts 5.1 The principle of the algorithm Young People minus Middle-aged means remove lager value from Young People, then importing the remaining elements into BCG. This algorithm is shown as follows, (1) Importing Ex1, En1, He1 into FCG, the membership coordinates Y(x, y) of Young Peoples are obtained; The importing Ex2, En2, He2 into FCG, the membership coordinates M(x, y) of Middle-aged s are obtained; (2) Do complement operation: take the abscissa minimum of M(x, y), remember to x min, and remove the abscissa values less than x min from Y(x, y), The remaining part is denoted as Y ; (3) Importing Y into BCG.

6 4886 L. Yin et al. /Journal of Computational Information Systems 11: 13 (2015) Analysis of the results (i) The result of reverse the normal cloud generator algorithm of determined degree are shown as follows, Ex = , En =3.3451, He = (Fig. 4(a)). (ii) The result of reverse the normal cloud generator algorithm of undetermined degree are shown follows, Ex = , En =3.5663, He = (Fig. 4(b)). Because the hyper entropy of arithmetic (i) approximately equal to the hyper entropy of Young People, so it is not necessary to deleting the high point of the membership. The difference set concept means narrowing the range of this conceptremove the older parts of Young People, equivalent to the concept of adolescent, the Hyper entropy is less different between the new concept and the original concept, and data results in line with the fact as well. (a) The result of Ex = , En =3.3451, He =0.5334, the number of drops is n=5000 (b) The result of Ex = , En =3.5663, He =0.4436, the number of drops is n=5000 Fig. 4: The difference operation between cloud concepts 6 The Symmetric Difference Operation Between Cloud Concepts 6.1 The principle of the algorithm The symmetric difference operation is opposite to the intersection operation, removing the age group which both belongs Young People and Middle-aged from Young and Middle-aged. It means finding out the drops which have maximum age in Young People and have minimum age in Middle-aged, sending those drops which except the two above into BCG. This algorithm is shown as follows, (1) Importing Ex1, En1, He1 into FCG, the membership coordinates Y(x, y) of Young People s are obtained; Then Importing Ex2, En2, He2 into FCG, the membership coordinates M(x, y) of Middle-aged s are obtained; (2) Do symmetric difference operation, take the abscissa maximum of Y(x, y), remember to x max, and remove the abscissa values less than x max from M(x, y), The remaining part is denoted

7 L. Yin et al. /Journal of Computational Information Systems 11: 13 (2015) as M. Then take the abscissa minimum of M(x, y), remember to x min, and remove the abscissa values greater than x min from Y(x, y), The remaining part is denoted as Y ; (3) Importing Y and M into BCG. 6.2 Analysis of the results (i) The results of reverse the normal cloud generator algorithm of determined degree are shown as follows, Ex = , En = , He = (Fig. 5(a)). If changing the condition reject the drops membership which greater than to reject the drops membership which greater than 0.9, then He= (Fig. 5(b)); if amended as reject the drops membership which greater than 0.6, then He= (Fig. 5(c)). (ii) The results of reverse the normal cloud generator algorithm of undetermined degree are shown as follows, Ex = , En = , He = (Fig. 6). Symmetric difference is a union operation of two sets which are no intersection. (a) The results of reverse the normal cloud generator,n=5000 (b) The result of He= (c) The result of He= Fig. 5: The results of reverse the normal cloud generator algorithm of determined degree Fig. 6: The result of Ex = , En = , He = , the number of drops is n= Conclusion In this paper, many certain concepts are developed by FCG, and these new concepts are outputted by FCG based on the set operations. The theoretical foundation of the improvement of the cloud

8 4888 L. Yin et al. /Journal of Computational Information Systems 11: 13 (2015) model is enhanced, and a new idea for knowledge representation with cloud model is presented. Many new methods for transformation between the quantitative concepts and qualitative concepts are proposed, and the rationality of uncertain concept in cloud model is revealed. These results are beneficial to the deeper and wider development of cloud model. From the above results, we can know that intersection, complement and complementary operations are conforming to human cognition model, and the effect of the rest operations be not in accord with the human cognitive habits. Discrete degree of these new concepts is different due to the different algorithm of FCG. Therefore, in the future work, the method for choosing cloud drops and the algorithm of BCG may determine the disadvantage and advantage of the new concept generated by set operations of could model. References [1] Li De-Yi, Du Yi. Artificial intelligence with uncertainty [M]. Beijing: National Defense Industry Press, [2] Liu Gui-hua, Song Cheng-xiang, Liu Hong Software Implementation of Cloud Generators [J]. Application Research of Computers, 2007, 24(1): [3] Ashley H. Carter, Classical and Statistical Thermodynamics [M]. Beijing University Press, [4] Wang S L, Li D R, Shi W Z, et al. Cloud model-based spatial data mining [J]. Geographical Information Science, 2003, 9(2): [5] Liu Jie, Chen Xiao-ping, Cai Qing-sheng, Fan Yan, Recognition Structure of Uncertainty: a Unified Framework for Representation, Reasoning and Learning [J]. Journal of Software, 2002, 13(4): [6] Zadeh L A. Fuzzy sets, Information and Control, 1965, 8: [7] Russell S, Norvig P. Artificial Intelligence: a Modem Approach. New Jersey: Prentice Hall, [8] Li De-Yi. The cloud control method and balancing patterns of triple link inverted pendulum systems. Engineering Science, 1999, 1(2): [9] Zhang Fei-Zhou, Fan Yue-Zu, Shen Cheng-Zhi, Li De-Yi. Intelligent control based on membership cloud generators. Acta Aeronautics ET Astronautica Sinica, 1999, 20(1): [10] Yu Shao-Wei, Cai Kai, Zhao Mo. Traffic information forecast algorithm based on the one-dimension cloud model. Journal of Shandong University (Engineering Science), 2007, 37(2): [11] Jiang Rong, Li De-Yi, Fan Jian-Hua. Automatic Generation of Pan-Concept-Tree on numerical data. Chinese Journal of Computers, 2000, 23(5): 1-7. [12] Li Xing-Sheng, Li De-Yi. A new method based on cloud model for discretization of continuous attributes in rough sets. Pattern Recognition and Artificial Intelligence, 2003, 16(1): [13] Du Yi, Li De-Yi. Concept partition based on cloud and its application to mining association rules. Journal of Software, 2001, 12(2): [14] Wang S L, Li D R, Shi W Z, et al. Cloud model-based spatial data mining. Geographical Information Science, 2003, 9(2): [15] Li De-Yi, Yu Quan, Jiang Guang-Jie. A unified assessment of reliability, invulnerability and anticounterm easurement for C3I Systems. Systems Engineering Theory and practice, 1997, 17(3): [16] Yu Shao-Wei. A new approach to reasoning about uncertainty based on cloud theory. Journal of Shandong University (Natural Science), 2009, 44(3):

Big Data Storage Architecture Design in Cloud Computing

Big Data Storage Architecture Design in Cloud Computing Big Data Storage Architecture Design in Cloud Computing Xuebin Chen 1, Shi Wang 1( ), Yanyan Dong 1, and Xu Wang 2 1 College of Science, North China University of Science and Technology, Tangshan, Hebei,

More information

Open Access Research on Database Massive Data Processing and Mining Method based on Hadoop Cloud Platform

Open Access Research on Database Massive Data Processing and Mining Method based on Hadoop Cloud Platform Send Orders for Reprints to reprints@benthamscience.ae The Open Automation and Control Systems Journal, 2014, 6, 1463-1467 1463 Open Access Research on Database Massive Data Processing and Mining Method

More information

A Method for Trust Management in Cloud Computing: Data Coloring by Cloud Watermarking

A Method for Trust Management in Cloud Computing: Data Coloring by Cloud Watermarking International Journal of Automation and Computing 8(3), August 2011, 280-285 DOI: 10.1007/s11633-011-0583-3 A Method for Trust Management in Cloud Computing: Data Coloring by Cloud Watermarking Yu-Chao

More information

An Analysis of Agricultural Risk and Intelligent Monitoring Technology Fantao Kong 1, a, Shiwei Xu 2,b, Shengwei Wang 3,c and Haipeng Yu 4,d

An Analysis of Agricultural Risk and Intelligent Monitoring Technology Fantao Kong 1, a, Shiwei Xu 2,b, Shengwei Wang 3,c and Haipeng Yu 4,d Advanced Materials Research Vol. 628 (2013) pp 265-269 Online available since 2012/Dec/27 at www.scientific.net (2013) Trans Tech Publications, Switzerland doi:10.4028/www.scientific.net/amr.628.265 An

More information

Database Modeling and Visualization Simulation technology Based on Java3D Hongxia Liu

Database Modeling and Visualization Simulation technology Based on Java3D Hongxia Liu International Conference on Information Sciences, Machinery, Materials and Energy (ICISMME 05) Database Modeling and Visualization Simulation technology Based on Java3D Hongxia Liu Department of Electronic

More information

PREDICTION FOR SHORT-TERM TRAFFIC FLOW BASED ON OPTIMIZED WAVELET NEURAL NETWORK MODEL

PREDICTION FOR SHORT-TERM TRAFFIC FLOW BASED ON OPTIMIZED WAVELET NEURAL NETWORK MODEL PREDICTION FOR SHORT-TERM TRAFFIC FLOW BASED ON OPTIMIZED WAVELET NEURAL NETWORK MODEL ABSTRACT Tao Li 1 and Liu Sheng 2 School of Management, Shanghai University of Engineering Science Shanghai, China

More information

A Solution for Data Inconsistency in Data Integration *

A Solution for Data Inconsistency in Data Integration * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 27, 681-695 (2011) A Solution for Data Inconsistency in Data Integration * Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai,

More information

Effects of node buffer and capacity on network traffic

Effects of node buffer and capacity on network traffic Chin. Phys. B Vol. 21, No. 9 (212) 9892 Effects of node buffer and capacity on network traffic Ling Xiang( 凌 翔 ) a), Hu Mao-Bin( 胡 茂 彬 ) b), and Ding Jian-Xun( 丁 建 勋 ) a) a) School of Transportation Engineering,

More information

Network Intrusion Detection System and Its Cognitive Ability based on Artificial Immune Model WangLinjing1, ZhangHan2

Network Intrusion Detection System and Its Cognitive Ability based on Artificial Immune Model WangLinjing1, ZhangHan2 3rd International Conference on Machinery, Materials and Information Technology Applications (ICMMITA 2015) Network Intrusion Detection System and Its Cognitive Ability based on Artificial Immune Model

More information

THE APPLICATION OF DATA MINING TECHNOLOGY IN REAL ESTATE MARKET PREDICTION

THE APPLICATION OF DATA MINING TECHNOLOGY IN REAL ESTATE MARKET PREDICTION THE APPLICATION OF DATA MINING TECHNOLOGY IN REAL ESTATE MARKET PREDICTION Xian Guang LI, Qi Ming LI Department of Construction and Real Estate, South East Univ,,Nanjing, China. Abstract: This paper introduces

More information

Credit Risk Comprehensive Evaluation Method for Online Trading

Credit Risk Comprehensive Evaluation Method for Online Trading Credit Risk Comprehensive Evaluation Method for Online Trading Company 1 *1, Corresponding Author School of Economics and Management, Beijing Forestry University, fankun@bjfu.edu.cn Abstract A new comprehensive

More information

Study on the Evaluation for the Knowledge Sharing Efficiency of the Knowledge Service Network System in Agile Supply Chain

Study on the Evaluation for the Knowledge Sharing Efficiency of the Knowledge Service Network System in Agile Supply Chain Send Orders for Reprints to reprints@benthamscience.ae 384 The Open Cybernetics & Systemics Journal, 2015, 9, 384-389 Open Access Study on the Evaluation for the Knowledge Sharing Efficiency of the Knowledge

More information

Tasks Scheduling Game Algorithm Based on Cost Optimization in Cloud Computing

Tasks Scheduling Game Algorithm Based on Cost Optimization in Cloud Computing Journal of Computational Information Systems 11: 16 (2015) 6037 6045 Available at http://www.jofcis.com Tasks Scheduling Game Algorithm Based on Cost Optimization in Cloud Computing Renfeng LIU 1, Lijun

More information

Design call center management system of e-commerce based on BP neural network and multifractal

Design call center management system of e-commerce based on BP neural network and multifractal Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(6):951-956 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Design call center management system of e-commerce

More information

Research on Semantic Web Service Composition Based on Binary Tree

Research on Semantic Web Service Composition Based on Binary Tree , pp.133-142 http://dx.doi.org/10.14257/ijgdc.2015.8.2.13 Research on Semantic Web Service Composition Based on Binary Tree Shengli Mao, Hui Zang and Bo Ni Computer School, Hubei Polytechnic University,

More information

Performance Evaluation and Prediction of IT-Outsourcing Service Supply Chain based on Improved SCOR Model

Performance Evaluation and Prediction of IT-Outsourcing Service Supply Chain based on Improved SCOR Model Performance Evaluation and Prediction of IT-Outsourcing Service Supply Chain based on Improved SCOR Model 1, 2 1 International School of Software, Wuhan University, Wuhan, China *2 School of Information

More information

International Conference on Advances in Energy, Environment and Chemical Engineering (AEECE-2015)

International Conference on Advances in Energy, Environment and Chemical Engineering (AEECE-2015) International Conference on Advances in Energy, Environment and Chemical Engineering (AEECE-2015) An Optimal Reactive Power Planning Software for Urban Network Qiang Sun 1, a, Xue Wang 1,b, Yingting Ni

More information

UPS battery remote monitoring system in cloud computing

UPS battery remote monitoring system in cloud computing , pp.11-15 http://dx.doi.org/10.14257/astl.2014.53.03 UPS battery remote monitoring system in cloud computing Shiwei Li, Haiying Wang, Qi Fan School of Automation, Harbin University of Science and Technology

More information

CONCEPTUAL MODEL OF MULTI-AGENT BUSINESS COLLABORATION BASED ON CLOUD WORKFLOW

CONCEPTUAL MODEL OF MULTI-AGENT BUSINESS COLLABORATION BASED ON CLOUD WORKFLOW CONCEPTUAL MODEL OF MULTI-AGENT BUSINESS COLLABORATION BASED ON CLOUD WORKFLOW 1 XINQIN GAO, 2 MINGSHUN YANG, 3 YONG LIU, 4 XIAOLI HOU School of Mechanical and Precision Instrument Engineering, Xi'an University

More information

The Planning Method for Disaster Recovery Program of Digital Business Based on HSM-III Model

The Planning Method for Disaster Recovery Program of Digital Business Based on HSM-III Model Journal of Information & Computational Science 7: 12 (2010) 2403 2409 Available at http://www.joics.com The Planning Method for Disaster Recovery Program of Digital Business Based on HSM-III Model Shenghui

More information

A Health Degree Evaluation Algorithm for Equipment Based on Fuzzy Sets and the Improved SVM

A Health Degree Evaluation Algorithm for Equipment Based on Fuzzy Sets and the Improved SVM Journal of Computational Information Systems 10: 17 (2014) 7629 7635 Available at http://www.jofcis.com A Health Degree Evaluation Algorithm for Equipment Based on Fuzzy Sets and the Improved SVM Tian

More information

The Design Study of High-Quality Resource Shared Classes in China: A Case Study of the Abnormal Psychology Course

The Design Study of High-Quality Resource Shared Classes in China: A Case Study of the Abnormal Psychology Course The Design Study of High-Quality Resource Shared Classes in China: A Case Study of the Abnormal Psychology Course Juan WANG College of Educational Science, JiangSu Normal University, Jiangsu, Xuzhou, China

More information

Multi-service Load Balancing in a Heterogeneous Network with Vertical Handover

Multi-service Load Balancing in a Heterogeneous Network with Vertical Handover 1 Multi-service Load Balancing in a Heterogeneous Network with Vertical Handover Jie Xu, Member, IEEE, Yuming Jiang, Member, IEEE, and Andrew Perkis, Member, IEEE Abstract In this paper we investigate

More information

A Load Balancing Algorithm based on the Variation Trend of Entropy in Homogeneous Cluster

A Load Balancing Algorithm based on the Variation Trend of Entropy in Homogeneous Cluster , pp.11-20 http://dx.doi.org/10.14257/ ijgdc.2014.7.2.02 A Load Balancing Algorithm based on the Variation Trend of Entropy in Homogeneous Cluster Kehe Wu 1, Long Chen 2, Shichao Ye 2 and Yi Li 2 1 Beijing

More information

Research on Trust Management Strategies in Cloud Computing Environment

Research on Trust Management Strategies in Cloud Computing Environment Journal of Computational Information Systems 8: 4 (2012) 1757 1763 Available at http://www.jofcis.com Research on Trust Management Strategies in Cloud Computing Environment Wenjuan LI 1,2,, Lingdi PING

More information

The Use of Hybrid Regulator in Design of Control Systems

The Use of Hybrid Regulator in Design of Control Systems World Applied Sciences Journal 23 (10): 1291-1297, 2013 ISSN 1818-4952 IDOSI Publications, 2013 DOI: 10.5829/idosi.wasj.2013.23.10.13144 The Use of Hybrid Regulator in Design of Control Systems Vladimir

More information

Optimization of PID parameters with an improved simplex PSO

Optimization of PID parameters with an improved simplex PSO Li et al. Journal of Inequalities and Applications (2015) 2015:325 DOI 10.1186/s13660-015-0785-2 R E S E A R C H Open Access Optimization of PID parameters with an improved simplex PSO Ji-min Li 1, Yeong-Cheng

More information

Big Data with Rough Set Using Map- Reduce

Big Data with Rough Set Using Map- Reduce Big Data with Rough Set Using Map- Reduce Mr.G.Lenin 1, Mr. A. Raj Ganesh 2, Mr. S. Vanarasan 3 Assistant Professor, Department of CSE, Podhigai College of Engineering & Technology, Tirupattur, Tamilnadu,

More information

Analysis of Model and Key Technology for P2P Network Route Security Evaluation with 2-tuple Linguistic Information

Analysis of Model and Key Technology for P2P Network Route Security Evaluation with 2-tuple Linguistic Information Journal of Computational Information Systems 9: 14 2013 5529 5534 Available at http://www.jofcis.com Analysis of Model and Key Technology for P2P Network Route Security Evaluation with 2-tuple Linguistic

More information

Capability Service Management System for Manufacturing Equipments in

Capability Service Management System for Manufacturing Equipments in Capability Service Management System for Manufacturing Equipments in Cloud Manufacturing 1 Junwei Yan, 2 Sijin Xin, 3 Quan Liu, 4 Wenjun Xu *1, Corresponding Author School of Information Engineering, Wuhan

More information

Load Balancing Algorithm Based on Services

Load Balancing Algorithm Based on Services Journal of Information & Computational Science 10:11 (2013) 3305 3312 July 20, 2013 Available at http://www.joics.com Load Balancing Algorithm Based on Services Yufang Zhang a, Qinlei Wei a,, Ying Zhao

More information

Journal of Chemical and Pharmaceutical Research, 2014, 6(3):34-39. Research Article. Analysis of results of CET 4 & CET 6 Based on AHP

Journal of Chemical and Pharmaceutical Research, 2014, 6(3):34-39. Research Article. Analysis of results of CET 4 & CET 6 Based on AHP Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(3):34-39 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Analysis of results of CET 4 & CET 6 Based on AHP

More information

Real estate investment project risk analysis

Real estate investment project risk analysis Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(5):1789-1794 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Real estate investment project risk analysis Li

More information

Reflection on Quality Assurance System of Higher Vocational Education under Big Data Era

Reflection on Quality Assurance System of Higher Vocational Education under Big Data Era SHS Web of Conferences 14, 01009 (2015) DOI: 10.1051/ shsconf/2015140100 9 C Owned by the authors, published by EDP Sciences, 2015 Reflection on Quality Assurance System of Higher Vocational Education

More information

Application of Data Mining in Network Instructional platform of "Modern Educational Technology" for Different Teaching

Application of Data Mining in Network Instructional platform of Modern Educational Technology for Different Teaching , pp.143-158 http://dx.doi.org/10.14257/ijdta.2014.7.3.14 Application of Data Mining in Network Instructional platform of "Modern Educational Technology" for Different Teaching Qiuxiang Shi 1, Jianying

More information

A FUZZY LOGIC APPROACH FOR SALES FORECASTING

A FUZZY LOGIC APPROACH FOR SALES FORECASTING A FUZZY LOGIC APPROACH FOR SALES FORECASTING ABSTRACT Sales forecasting proved to be very important in marketing where managers need to learn from historical data. Many methods have become available for

More information

Analysis of seismic response control for long-span cable-stayed. bridge under traveling wave input *

Analysis of seismic response control for long-span cable-stayed. bridge under traveling wave input * Analysis of seismic response control for long-span cable-stayed bridge under traveling wave input * QI ing-jun, LI iao-jun 2 ( Associate Professor, School of Civil Engineering, Shandong Jianzhu University,

More information

Blog Post Extraction Using Title Finding

Blog Post Extraction Using Title Finding Blog Post Extraction Using Title Finding Linhai Song 1, 2, Xueqi Cheng 1, Yan Guo 1, Bo Wu 1, 2, Yu Wang 1, 2 1 Institute of Computing Technology, Chinese Academy of Sciences, Beijing 2 Graduate School

More information

Data Mining in the Application of Criminal Cases Based on Decision Tree

Data Mining in the Application of Criminal Cases Based on Decision Tree 8 Journal of Computer Science and Information Technology, Vol. 1 No. 2, December 2013 Data Mining in the Application of Criminal Cases Based on Decision Tree Ruijuan Hu 1 Abstract A briefing on data mining

More information

Open Access Research on Application of Neural Network in Computer Network Security Evaluation. Shujuan Jin *

Open Access Research on Application of Neural Network in Computer Network Security Evaluation. Shujuan Jin * Send Orders for Reprints to reprints@benthamscience.ae 766 The Open Electrical & Electronic Engineering Journal, 2014, 8, 766-771 Open Access Research on Application of Neural Network in Computer Network

More information

Studies of Chinese Intellectual Property:Academic Basis and Development Idea

Studies of Chinese Intellectual Property:Academic Basis and Development Idea Journal of Intellectual Property Rights Vol 20, March 2015, pp 96-103 Studies of Chinese Intellectual Property:Academic Basis and Development Idea WANG Xu-kun 1,2, Zhao Qu 1, DING Kun 1,2 and Zhang Shanshan

More information

An Evaluation Model for Determining Insurance Policy Using AHP and Fuzzy Logic: Case Studies of Life and Annuity Insurances

An Evaluation Model for Determining Insurance Policy Using AHP and Fuzzy Logic: Case Studies of Life and Annuity Insurances Proceedings of the 8th WSEAS International Conference on Fuzzy Systems, Vancouver, British Columbia, Canada, June 19-21, 2007 126 An Evaluation Model for Determining Insurance Policy Using AHP and Fuzzy

More information

The Combination Forecasting Model of Auto Sales Based on Seasonal Index and RBF Neural Network

The Combination Forecasting Model of Auto Sales Based on Seasonal Index and RBF Neural Network , pp.67-76 http://dx.doi.org/10.14257/ijdta.2016.9.1.06 The Combination Forecasting Model of Auto Sales Based on Seasonal Index and RBF Neural Network Lihua Yang and Baolin Li* School of Economics and

More information

Research on Credibility Measurement Method of Data In Big Data

Research on Credibility Measurement Method of Data In Big Data Journal of Information Hiding and Multimedia Signal Processing c 2016 ISSN 2073-4212 Ubiquitous International Volume 7, Number 4, July 2016 Research on Credibility Measurement Method of Data In Big Data

More information

An approach of detecting structure emergence of regional complex network of entrepreneurs: simulation experiment of college student start-ups

An approach of detecting structure emergence of regional complex network of entrepreneurs: simulation experiment of college student start-ups An approach of detecting structure emergence of regional complex network of entrepreneurs: simulation experiment of college student start-ups Abstract Yan Shen 1, Bao Wu 2* 3 1 Hangzhou Normal University,

More information

Design and Implementation of Supermarket Management System Yongchang Rena, Mengyao Chenb

Design and Implementation of Supermarket Management System Yongchang Rena, Mengyao Chenb 4th International Conference on Mechatronics, Materials, Chemistry and Computer Engineering (ICMMCCE 2015) Design and Implementation of Supermarket Management System Yongchang Rena, Mengyao Chenb College

More information

Medical Image Segmentation of PACS System Image Post-processing *

Medical Image Segmentation of PACS System Image Post-processing * Medical Image Segmentation of PACS System Image Post-processing * Lv Jie, Xiong Chun-rong, and Xie Miao Department of Professional Technical Institute, Yulin Normal University, Yulin Guangxi 537000, China

More information

Development of a Web-based Information Service Platform for Protected Crop Pests

Development of a Web-based Information Service Platform for Protected Crop Pests Development of a Web-based Information Service Platform for Protected Crop Pests Chong Huang 1, Haiguang Wang 1 1 Department of Plant Pathology, China Agricultural University, Beijing, P. R. China 100193

More information

The Study on Logistics Management Patterns based on Fuzzy Comprehensive Evaluation Method

The Study on Logistics Management Patterns based on Fuzzy Comprehensive Evaluation Method The Study on Logistics Management Patterns based on Fuzzy Comprehensive Evaluation Method School of Management Shanghai University, Shanghai Baoshan 200072 School of Foreign Yiwu Industrial & Commercial

More information

A Network Simulation Experiment of WAN Based on OPNET

A Network Simulation Experiment of WAN Based on OPNET A Network Simulation Experiment of WAN Based on OPNET 1 Yao Lin, 2 Zhang Bo, 3 Liu Puyu 1, Modern Education Technology Center, Liaoning Medical University, Jinzhou, Liaoning, China,yaolin111@sina.com *2

More information

Applied research on data mining platform for weather forecast based on cloud storage

Applied research on data mining platform for weather forecast based on cloud storage Applied research on data mining platform for weather forecast based on cloud storage Haiyan Song¹, Leixiao Li 2* and Yuhong Fan 3* 1 Department of Software Engineering t, Inner Mongolia Electronic Information

More information

Big Data Analytics of Multi-Relationship Online Social Network Based on Multi-Subnet Composited Complex Network

Big Data Analytics of Multi-Relationship Online Social Network Based on Multi-Subnet Composited Complex Network , pp.273-284 http://dx.doi.org/10.14257/ijdta.2015.8.5.24 Big Data Analytics of Multi-Relationship Online Social Network Based on Multi-Subnet Composited Complex Network Gengxin Sun 1, Sheng Bin 2 and

More information

Agricultural E-Commerce Sites Evaluation Research

Agricultural E-Commerce Sites Evaluation Research International Journal of Business and Social Science Vol. 4 No. 17 [Special Issue December 2013] Agricultural E-Commerce Sites Evaluation Research Hang Liu Yuming Wang Kui Xie College of Management Shanghai

More information

Fuzzy Numbers in the Credit Rating of Enterprise Financial Condition

Fuzzy Numbers in the Credit Rating of Enterprise Financial Condition C Review of Quantitative Finance and Accounting, 17: 351 360, 2001 2001 Kluwer Academic Publishers. Manufactured in The Netherlands. Fuzzy Numbers in the Credit Rating of Enterprise Financial Condition

More information

Bank Credit Risk Management Early Warning and Decision-making based on BP Neural Networks

Bank Credit Risk Management Early Warning and Decision-making based on BP Neural Networks Bank Credit Risk Management Early Warning and Decision-making based on BP Neural Networks 1 Zhi-Yuan Yu, 2 Shu-Fang Zhao 1 Department of Economics and Management, Taiyuan Institute of Technology, Taiyuan

More information

Preface: Cognitive Informatics, Cognitive Computing, and Their Denotational Mathematical Foundations (II)

Preface: Cognitive Informatics, Cognitive Computing, and Their Denotational Mathematical Foundations (II) Fundamenta Informaticae 90 (2009) i vii DOI 10.3233/FI-2009-0001 IOS Press i Preface: Cognitive Informatics, Cognitive Computing, and Their Denotational Mathematical Foundations (II) Yingxu Wang Visiting

More information

Random forest algorithm in big data environment

Random forest algorithm in big data environment Random forest algorithm in big data environment Yingchun Liu * School of Economics and Management, Beihang University, Beijing 100191, China Received 1 September 2014, www.cmnt.lv Abstract Random forest

More information

Supply Chain Quality Management Based on Information Asymmetry

Supply Chain Quality Management Based on Information Asymmetry Supply Chain Quality Management Based on Information Asymmetry Jianhua Zhao 1, Yue Hu 2, Yi Wang 3 College of Economic and Management, China Three Gorges University, Yichang Hubei Province, China 443002

More information

Contemporary Logistics. Logistics Outsourcing Risks Evaluation Based on Rough Sets Theory

Contemporary Logistics. Logistics Outsourcing Risks Evaluation Based on Rough Sets Theory Contemporary Logistics 11 2013) 1838-739X Contents lists available at SEI Contemporary Logistics journal homepage: www.seiofbluemountain.com Logistics Outsourcing Risks Evaluation Based on Rough Sets Theory

More information

Towards Cloud Factory Simulation. Abstract

Towards Cloud Factory Simulation. Abstract Towards Cloud Factory Simulation 第 十 八 屆 決 策 分 析 研 討 會 Toly Chen Department of Industrial Engineering and Systems Management, Feng Chia University *tolychen@ms37.hinet.net Abstract An important and practical

More information

Linguistic Preference Modeling: Foundation Models and New Trends. Extended Abstract

Linguistic Preference Modeling: Foundation Models and New Trends. Extended Abstract Linguistic Preference Modeling: Foundation Models and New Trends F. Herrera, E. Herrera-Viedma Dept. of Computer Science and Artificial Intelligence University of Granada, 18071 - Granada, Spain e-mail:

More information

Construction and Implementation of Innovation Computer Network Practical Teaching System

Construction and Implementation of Innovation Computer Network Practical Teaching System I.J. Education and Management Engineering 2011, 2, 30-35 Published Online August 2011 in MECS (http://www.mecs-press.net) DOI: 10.5815/ijeme.2011.02.05 Available online at http://www.mecs-press.net/ijeme

More information

TOURISM DEMAND FORECASTING USING A NOVEL HIGH-PRECISION FUZZY TIME SERIES MODEL. Ruey-Chyn Tsaur and Ting-Chun Kuo

TOURISM DEMAND FORECASTING USING A NOVEL HIGH-PRECISION FUZZY TIME SERIES MODEL. Ruey-Chyn Tsaur and Ting-Chun Kuo International Journal of Innovative Computing, Information and Control ICIC International c 2014 ISSN 1349-4198 Volume 10, Number 2, April 2014 pp. 695 701 OURISM DEMAND FORECASING USING A NOVEL HIGH-PRECISION

More information

Method of Fault Detection in Cloud Computing Systems

Method of Fault Detection in Cloud Computing Systems , pp.205-212 http://dx.doi.org/10.14257/ijgdc.2014.7.3.21 Method of Fault Detection in Cloud Computing Systems Ying Jiang, Jie Huang, Jiaman Ding and Yingli Liu Yunnan Key Lab of Computer Technology Application,

More information

Image Mining Using Texture and Shape Feature

Image Mining Using Texture and Shape Feature Image Mining Using Texture and Shape Feature Prof.Rupali Sawant Sardar Patel Institute of technology ABSTRACT Discovering knowledge from data stored in typical alphanumeric databases, such as relational

More information

The multilayer sentiment analysis model based on Random forest Wei Liu1, Jie Zhang2

The multilayer sentiment analysis model based on Random forest Wei Liu1, Jie Zhang2 2nd International Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 2016) The multilayer sentiment analysis model based on Random forest Wei Liu1, Jie Zhang2 1 School of

More information

Prediction of Stock Performance Using Analytical Techniques

Prediction of Stock Performance Using Analytical Techniques 136 JOURNAL OF EMERGING TECHNOLOGIES IN WEB INTELLIGENCE, VOL. 5, NO. 2, MAY 2013 Prediction of Stock Performance Using Analytical Techniques Carol Hargreaves Institute of Systems Science National University

More information

Data Mining Project Report. Document Clustering. Meryem Uzun-Per

Data Mining Project Report. Document Clustering. Meryem Uzun-Per Data Mining Project Report Document Clustering Meryem Uzun-Per 504112506 Table of Content Table of Content... 2 1. Project Definition... 3 2. Literature Survey... 3 3. Methods... 4 3.1. K-means algorithm...

More information

Study on the Patterns of Library Resource Construction and Services in MOOC

Study on the Patterns of Library Resource Construction and Services in MOOC , pp. 85-90 http://dx.doi.org/10.14257/ijunesst.2014.7.6.08 Study on the Patterns of Library Resource Construction and Services in MOOC Sun Ji-zhou, Liao Sheng-feng (Library of Nanchang Hangkong University,

More information

Application of Cloud Theory in Association Rules

Application of Cloud Theory in Association Rules I.J. Information Technology and Computer Science, 0, 3, 36-4 Published Online June 0 in MECS (http://www.mecs-press.org/) Application of Cloud Theory in Association Rules Zhaohong Wang College of Computer

More information

CHINASOFT INTERNATIONAL LIMITED 中 軟 國 際 有 限 公 司

CHINASOFT INTERNATIONAL LIMITED 中 軟 國 際 有 限 公 司 Hong Kong Exchanges and Clearing Limited and The Stock Exchange of Hong Kong Limited take no responsibility for the contents of this announcement, make no representation as to its accuracy or completeness

More information

Leran Wang and Tom Kazmierski {lw04r,tjk}@ecs.soton.ac.uk

Leran Wang and Tom Kazmierski {lw04r,tjk}@ecs.soton.ac.uk BMAS 2005 VHDL-AMS based genetic optimization of a fuzzy logic controller for automotive active suspension systems Leran Wang and Tom Kazmierski {lw04r,tjk}@ecs.soton.ac.uk Outline Introduction and system

More information

AN IMPROVED CREDIT SCORING METHOD FOR CHINESE COMMERCIAL BANKS

AN IMPROVED CREDIT SCORING METHOD FOR CHINESE COMMERCIAL BANKS AN IMPROVED CREDIT SCORING METHOD FOR CHINESE COMMERCIAL BANKS Jianping Li Jinli Liu Weixuan Xu 1.University of Science & Technology of China, Hefei, 230026, P.R. China 2.Institute of Policy and Management

More information

A Service Revenue-oriented Task Scheduling Model of Cloud Computing

A Service Revenue-oriented Task Scheduling Model of Cloud Computing Journal of Information & Computational Science 10:10 (2013) 3153 3161 July 1, 2013 Available at http://www.joics.com A Service Revenue-oriented Task Scheduling Model of Cloud Computing Jianguang Deng a,b,,

More information

Received 8 January 2015; accepted 25 February 2015; published 28 February 2015

Received 8 January 2015; accepted 25 February 2015; published 28 February 2015 American Journal of Industrial and Business Management, 2015, 5, 66-72 Published Online February 2015 in SciRes. http://www.scirp.org/journal/ajibm http://dx.doi.org/10.4236/ajibm.2015.52008 Study on the

More information

A Cloud-Based Trust Model for Evaluating Quality of Web Services

A Cloud-Based Trust Model for Evaluating Quality of Web Services Wang SX, Zhang L, Wang S et al. A cloud-based trust model for evaluating quality of Web services. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY 25(6): 1130 1142 Nov. 2010. DOI 10.1007/s11390-010-1090-7 A

More information

Modeling and Prediction of Network Traffic Based on Hybrid Covariance Function Gaussian Regressive

Modeling and Prediction of Network Traffic Based on Hybrid Covariance Function Gaussian Regressive Journal of Information & Computational Science 12:9 (215) 3637 3646 June 1, 215 Available at http://www.joics.com Modeling and Prediction of Network Traffic Based on Hybrid Covariance Function Gaussian

More information

Research of Postal Data mining system based on big data

Research of Postal Data mining system based on big data 3rd International Conference on Mechatronics, Robotics and Automation (ICMRA 2015) Research of Postal Data mining system based on big data Xia Hu 1, Yanfeng Jin 1, Fan Wang 1 1 Shi Jiazhuang Post & Telecommunication

More information

DATA MINING USING INTEGRATION OF CLUSTERING AND DECISION TREE

DATA MINING USING INTEGRATION OF CLUSTERING AND DECISION TREE DATA MINING USING INTEGRATION OF CLUSTERING AND DECISION TREE 1 K.Murugan, 2 P.Varalakshmi, 3 R.Nandha Kumar, 4 S.Boobalan 1 Teaching Fellow, Department of Computer Technology, Anna University 2 Assistant

More information

Supporting Information. Phosphorus-, nitrogen- and carbon- containing polyelectrolyte complex:

Supporting Information. Phosphorus-, nitrogen- and carbon- containing polyelectrolyte complex: Electronic Supplementary Material (ESI) for RSC Advances. This journal is The Royal Society of Chemistry 2014 S1 Supporting Information Phosphorus-, nitrogen- and carbon- containing polyelectrolyte complex:

More information

A New Method for Traffic Forecasting Based on the Data Mining Technology with Artificial Intelligent Algorithms

A New Method for Traffic Forecasting Based on the Data Mining Technology with Artificial Intelligent Algorithms Research Journal of Applied Sciences, Engineering and Technology 5(12): 3417-3422, 213 ISSN: 24-7459; e-issn: 24-7467 Maxwell Scientific Organization, 213 Submitted: October 17, 212 Accepted: November

More information

Fuzzy Logic -based Pre-processing for Fuzzy Association Rule Mining

Fuzzy Logic -based Pre-processing for Fuzzy Association Rule Mining Fuzzy Logic -based Pre-processing for Fuzzy Association Rule Mining by Ashish Mangalampalli, Vikram Pudi Report No: IIIT/TR/2008/127 Centre for Data Engineering International Institute of Information Technology

More information

Ultrasonic Detection Algorithm Research on the Damage Depth of Concrete after Fire Jiangtao Yu 1,a, Yuan Liu 1,b, Zhoudao Lu 1,c, Peng Zhao 2,d

Ultrasonic Detection Algorithm Research on the Damage Depth of Concrete after Fire Jiangtao Yu 1,a, Yuan Liu 1,b, Zhoudao Lu 1,c, Peng Zhao 2,d Advanced Materials Research Vols. 368-373 (2012) pp 2229-2234 Online available since 2011/Oct/24 at www.scientific.net (2012) Trans Tech Publications, Switzerland doi:10.4028/www.scientific.net/amr.368-373.2229

More information

Knowledge Based System for Detection and Prevention of DDoS Attacks using Fuzzy logic

Knowledge Based System for Detection and Prevention of DDoS Attacks using Fuzzy logic Knowledge Based System for Detection and Prevention of DDoS Attacks using Fuzzy logic Amit Khajuria 1, Roshan Srivastava 2 1 M. Tech Scholar, Computer Science Engineering, Lovely Professional University,

More information

Fault Analysis in Software with the Data Interaction of Classes

Fault Analysis in Software with the Data Interaction of Classes , pp.189-196 http://dx.doi.org/10.14257/ijsia.2015.9.9.17 Fault Analysis in Software with the Data Interaction of Classes Yan Xiaobo 1 and Wang Yichen 2 1 Science & Technology on Reliability & Environmental

More information

Thresholding technique with adaptive window selection for uneven lighting image

Thresholding technique with adaptive window selection for uneven lighting image Pattern Recognition Letters 26 (2005) 801 808 wwwelseviercom/locate/patrec Thresholding technique with adaptive window selection for uneven lighting image Qingming Huang a, *, Wen Gao a, Wenjian Cai b

More information

EFFICIENT DATA PRE-PROCESSING FOR DATA MINING

EFFICIENT DATA PRE-PROCESSING FOR DATA MINING EFFICIENT DATA PRE-PROCESSING FOR DATA MINING USING NEURAL NETWORKS JothiKumar.R 1, Sivabalan.R.V 2 1 Research scholar, Noorul Islam University, Nagercoil, India Assistant Professor, Adhiparasakthi College

More information

FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT MINING SYSTEM

FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT MINING SYSTEM International Journal of Innovative Computing, Information and Control ICIC International c 0 ISSN 34-48 Volume 8, Number 8, August 0 pp. 4 FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT

More information

Analysis of China Motor Vehicle Insurance Business Trends

Analysis of China Motor Vehicle Insurance Business Trends Analysis of China Motor Vehicle Insurance Business Trends 1 Xiaohui WU, 2 Zheng Zhang, 3 Lei Liu, 4 Lanlan Zhang 1, First Autho University of International Business and Economic, Beijing, wuxiaohui@iachina.cn

More information

The Application Research of Ant Colony Algorithm in Search Engine Jian Lan Liu1, a, Li Zhu2,b

The Application Research of Ant Colony Algorithm in Search Engine Jian Lan Liu1, a, Li Zhu2,b 3rd International Conference on Materials Engineering, Manufacturing Technology and Control (ICMEMTC 2016) The Application Research of Ant Colony Algorithm in Search Engine Jian Lan Liu1, a, Li Zhu2,b

More information

ANNOUNCEMENT ON RESOLUTIONS OF THE 24 TH MEETING OF THE FIFTH SESSION OF THE BOARD OF DIRECTORS

ANNOUNCEMENT ON RESOLUTIONS OF THE 24 TH MEETING OF THE FIFTH SESSION OF THE BOARD OF DIRECTORS Hong Kong Exchanges and Clearing Limited and The Stock Exchange of Hong Kong Limited takes no responsibility for the contents of this announcement, makes no representation as to its accuracy or completeness

More information

Product data model for PLM system

Product data model for PLM system roduct data model for LM system Li Yumei, Wan Li, Xiong Tifan (National CAD Support Software Engineering Research Center, Huazhong University of Science and Technology, Wuhan 430074) Abstract: roduct lifecycle

More information

Automatic Mining of Internet Translation Reference Knowledge Based on Multiple Search Engines

Automatic Mining of Internet Translation Reference Knowledge Based on Multiple Search Engines , 22-24 October, 2014, San Francisco, USA Automatic Mining of Internet Translation Reference Knowledge Based on Multiple Search Engines Baosheng Yin, Wei Wang, Ruixue Lu, Yang Yang Abstract With the increasing

More information

The Analysis Method about Change Domain of Business Process Model Based on the Behavior Profile of Petri Net

The Analysis Method about Change Domain of Business Process Model Based on the Behavior Profile of Petri Net Appl. Math. Inf. Sci. 6-3S, No. 3, 943-949 (2012) 943 Applied Mathematics & Information Sciences An International Journal The Analysis Method about Change Domain of Business Process Model Based on the

More information

Inclusion degree: a perspective on measures for rough set data analysis

Inclusion degree: a perspective on measures for rough set data analysis Information Sciences 141 (2002) 227 236 www.elsevier.com/locate/ins Inclusion degree: a perspective on measures for rough set data analysis Z.B. Xu a, *, J.Y. Liang a,1, C.Y. Dang b, K.S. Chin b a Faculty

More information

Collapse by Cascading Failures in Hybrid Attacked Regional Internet

Collapse by Cascading Failures in Hybrid Attacked Regional Internet Collapse by Cascading Failures in Hybrid Attacked Regional Internet Ye Xu and Zhuo Wang College of Information Science and Engineering, Shenyang Ligong University, Shenyang China xuy.mail@gmail.com Abstract

More information

The Security Evaluation of ATM Information System Based on Bayesian Regularization

The Security Evaluation of ATM Information System Based on Bayesian Regularization JOURNAL OF SOFTWARE, VOL. 9, NO. 6, JUNE 2014 1587 The Security Evaluation of ATM Information System Based on Bayesian Regularization Lan Ma School of Air Traffic Management, Civil Aviation University

More information

CLOUD MODEL AND HIERARCHICAL CLUSTERING BASED SPATIAL DATA MINING METHOD AND APPLICATION

CLOUD MODEL AND HIERARCHICAL CLUSTERING BASED SPATIAL DATA MINING METHOD AND APPLICATION CLOUD MODEL AND HIERARCHICAL CLUSTERING BASED SPATIAL DATA MINING METHOD AND APPLICATION Kun Qin a, *, Min Xu a, Yi Du b, Shuying Yue a a School of Remote Sensing Information Engineering, Wuhan University,

More information

Big Data Classification: Problems and Challenges in Network Intrusion Prediction with Machine Learning

Big Data Classification: Problems and Challenges in Network Intrusion Prediction with Machine Learning Big Data Classification: Problems and Challenges in Network Intrusion Prediction with Machine Learning By: Shan Suthaharan Suthaharan, S. (2014). Big data classification: Problems and challenges in network

More information

An Optimization Model of Load Balancing in P2P SIP Architecture

An Optimization Model of Load Balancing in P2P SIP Architecture An Optimization Model of Load Balancing in P2P SIP Architecture 1 Kai Shuang, 2 Liying Chen *1, First Author, Corresponding Author Beijing University of Posts and Telecommunications, shuangk@bupt.edu.cn

More information