{"title":"Computing the set of concepts through the composition and decomposition of formal contexts","authors":"Jianjun Qi, W. Liu, Ling Wei","doi":"10.1109/ICMLC.2012.6359557","DOIUrl":"https://doi.org/10.1109/ICMLC.2012.6359557","url":null,"abstract":"This paper studies the computation of concepts through the composition and decomposition of formal contexts. Under the cases of apposition and subposition, the paper proposes the composition theory to obtain the concepts of the original contexts from its subcontexts and proposes decomposition theory to obtain the concepts of subcontexts from the original context Finally, the composition and decomposition theories are generalized to situations of apposition and subposition involving n(≥ 3) contexts.","PeriodicalId":128006,"journal":{"name":"2012 International Conference on Machine Learning and Cybernetics","volume":"303 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114509674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparative study of financial distress prediction via op timized SVM","authors":"Chun-Mei Liu","doi":"10.1109/ICMLC.2012.6358968","DOIUrl":"https://doi.org/10.1109/ICMLC.2012.6358968","url":null,"abstract":"This paper investigates the development and modeling problem for financial distress prediction via optimized support vector machine (SVM). Based on parameters optimization and model selection idea, the swarm intelligence algorithm of Particle Swarm Optimization (PSO)-SVM is proposed for financial distress predicting process with strong coupling and nonlinear characteristics through the principle component analysis (PCA). Furthermore, Logistic regression (LR) algorithm is induced to make a comparison with Least-Square support vector machine (LS-SVM) and PSO-SVM. The simulation results show that the presented algorithms could get the satisfied accuracy effectively, and by contrast, PSO-SVM shows a better learning ability and generalization in financial distress predicting process modeling, and could establish predictive model with better accessibility.","PeriodicalId":128006,"journal":{"name":"2012 International Conference on Machine Learning and Cybernetics","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114844726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xin-Na Ma, Shu-Feng Duan, Chang-Xia Hu, Ying-Xin Hu
{"title":"Effect of time delay on nonlinear control system","authors":"Xin-Na Ma, Shu-Feng Duan, Chang-Xia Hu, Ying-Xin Hu","doi":"10.1109/ICMLC.2012.6359466","DOIUrl":"https://doi.org/10.1109/ICMLC.2012.6359466","url":null,"abstract":"Effect of time delay cannot be ignored because of time delay's objective existence in a control system and that a nonlinear control system has a rich nonlinear characteristics and complex control strategy. In this paper, a nonlinear high-speed locomotive control system is taken to analyze the effect of time delay on a nonlinear control system. Theoretical studies are focussed on the time delay problem in a nonlinear locomotive system under active control strategy. Simulations are included about the effect of time delay on a nonlinear locomotive system under active control and semi-active on-off control strategy. Further discussion is given on the effect of time delay under different control strategy.","PeriodicalId":128006,"journal":{"name":"2012 International Conference on Machine Learning and Cybernetics","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116724210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Iterative bilinear similarity measure learning for CBIR via a minimization of a local sensitivty","authors":"Shao-Hua Yin, Jincheng Li","doi":"10.1109/ICMLC.2012.6358943","DOIUrl":"https://doi.org/10.1109/ICMLC.2012.6358943","url":null,"abstract":"With the fast development of photographic device and the Internet, millions of images have been uploaded to the Internet. So, there is an increasing needs of image retrieval method for large scale databases. Content Based Image retrieval (CBIR) is very useful when user wants to find some images that are similar to a given image in both visual and content. In this paper, we first summarize the research development of this field. Secondly, OASIS [5] (Online Algorithm for Scalable Image Similarity) is introduced. However, OASIS focuses on the difference of similarity values between relevant and irrelevant image pairs while ignores the similarity value between highly similar images. So we proposed an improvement to OASIS via a minimization of local Q-neighborhood's sensitivity. It provides a better generalization and retrieves more near duplicate and highly similar images. The proposed improvement is compared with the original OASIS method and yields a better performance.","PeriodicalId":128006,"journal":{"name":"2012 International Conference on Machine Learning and Cybernetics","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115784942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The approach of using fractal dimension and linguistic descriptors in CBIR","authors":"An-Zen Shih","doi":"10.1109/ICMLC.2012.6359631","DOIUrl":"https://doi.org/10.1109/ICMLC.2012.6359631","url":null,"abstract":"In this paper we describe a system which uses linguistic expression and fractal dimensions to retrieve images in database. Brodaz texture images are used for our experiment. In addition, Taruma features are used to extract images of the database and several linguistic expressions are used for classified the images. These linguistic expressions, with the help of fractal dimension are more efficient in searching images. By visual inspection, we are satisfied with our experiment results.","PeriodicalId":128006,"journal":{"name":"2012 International Conference on Machine Learning and Cybernetics","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123496500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluation of entrepreneurial environment based on fuzzy comprehensive evaluation method","authors":"Jingyuan Han, Yan-Bo Yang, Yun-He Zhao","doi":"10.1109/ICMLC.2012.6358930","DOIUrl":"https://doi.org/10.1109/ICMLC.2012.6358930","url":null,"abstract":"Multiple criteria decision-making research has become a main area of research for entrepreneurial environment because of its complexity. The evaluation model of entrepreneurial environment was explored in this paper. This paper develops an evaluation model based on fuzzy theory and Analytic Hierarchy Process (AHP) for evaluating entrepreneurial environment, whose features was fuzzy and vague, to help the government and entrepreneur in a complicated environment. The model was used in evaluation on entrepreneurial environment for eleven regions of Hebei Province. The evaluation model provides an accurate, effective, and systematic decision support tool.","PeriodicalId":128006,"journal":{"name":"2012 International Conference on Machine Learning and Cybernetics","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124446669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of propositional satisfiability to special cases of cooperative path-planning","authors":"Pavel Surynek","doi":"10.1109/ICMLC.2012.6358975","DOIUrl":"https://doi.org/10.1109/ICMLC.2012.6358975","url":null,"abstract":"A problem of cooperative path-planning is addressed from the perspective of propositional satisfiability in this paper. Two new encodings of the problem as SAT are proposed and evaluated. Together with the existent solution optimization method which locally improves a sub-optimal solution of the problem through SAT solving, one of the new encodings constitute a state-of-the-art method for cooperative path-planning in highly occupied environments.","PeriodicalId":128006,"journal":{"name":"2012 International Conference on Machine Learning and Cybernetics","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123693710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An improved method of watershed transform on image of cashmere and wool fibre","authors":"Shuyuan Shang, Ya-Xia Liu, Fei-Fei Meng","doi":"10.1109/ICMLC.2012.6359526","DOIUrl":"https://doi.org/10.1109/ICMLC.2012.6359526","url":null,"abstract":"Through the experiment, if using the traditional watershed algorithm of cashmere image edge extraction, the results will appear serious `over-segmentation' phenomenon. This paper adopts multi-resolution analysis theory, using wavelet transformation theory establishment multi-resolution analysis framework on image segmentation. Multi-wavelet transform has some unique advantages and good performance on edge detection and texture analysis. This research uses multi-wavelet transform to improve the over-segmentation watershed transformation, to get meaningful image segmentation result. It facilitates the preparation for the extraction of characteristic such as cashmere image diameter, flake highly, and etc.","PeriodicalId":128006,"journal":{"name":"2012 International Conference on Machine Learning and Cybernetics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122850717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modeling the role of CSAR team based on AML","authors":"Shao-Dong Chen, Jin-Xing Liu","doi":"10.1109/ICMLC.2012.6359486","DOIUrl":"https://doi.org/10.1109/ICMLC.2012.6359486","url":null,"abstract":"How to plan the mission role of the CSAR (Combat Search and Rescue) assets is the key point of command control of the CSAR mission in modern and future military operations. In this paper, we analyze the necessary role type based on the requirements of the CSAR mission; and then model the role of the CSAR assets by means the agent diagram of AML (Agent Modeling Language), which includes the role structure and the mental states of the role, i.e. role belief, role goal and role plan; finally, we present the relationships among the mental states of the role based on the mission stage, i.e. the ingress, rescue operation, and egress, so that the CSAR mission can be planed effectively.","PeriodicalId":128006,"journal":{"name":"2012 International Conference on Machine Learning and Cybernetics","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125554332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Geometrically robust image hashing scheme for image authentication","authors":"Yan Wo, Bo Zhang","doi":"10.1109/ICMLC.2012.6359518","DOIUrl":"https://doi.org/10.1109/ICMLC.2012.6359518","url":null,"abstract":"In this paper, a geometrically robust image hashing scheme based on Polar Complex Exponential Transform(PCET) is proposed. The reported scheme enhances visual image with the response values of SUSAN detector, then performs PCET on the enhanced image to get the moment features which have rotation and scaling invariance. And then the moment features are processed by the rules, derived from SFFS feature selection method, to obtain the intermediate hash. Finally, the intermediate hash is quantized as the final image hash bits with the deterministic adaptive quantizer. Experimental results show that this scheme can tolerate most of the typical image processing manipulations, such as JPEG compression, geometric distortion, blur, addition of noise, and enhancement. Compared with other approaches in literatures, our method is more effective for image authentication in terms of small tampering detection.","PeriodicalId":128006,"journal":{"name":"2012 International Conference on Machine Learning and Cybernetics","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125952246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}