{"title":"Core and Attribute Reduction Algorithms Based on Compatible Discernibility Matrix","authors":"Chuanjian Yang, Hao Ge, Guangshun Yao, Lisheng Ma","doi":"10.1109/CINC.2009.212","DOIUrl":"https://doi.org/10.1109/CINC.2009.212","url":null,"abstract":"In order to solve the shortcoming of computing core and attribute reduction from inconsistent decision table, in the paper, firstly, the definitions of compatible simplified decision table and compatible simplified discernibility matrix are given, and then the methods of computing core and attribute reduction are put forward. It is proved that the core and reduction acquired from the property are the core and reduction based on positive region. Secondly, the algorithms of computing core and attribute reduction based compatible discernibility matrix are proposed. Finally,the example is used to explain the correctness of the method.","PeriodicalId":173506,"journal":{"name":"2009 International Conference on Computational Intelligence and Natural Computing","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127784824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Credibilistic Risk Optimization Models and Algorithms","authors":"Dong Wen, Jin Peng","doi":"10.1109/CINC.2009.81","DOIUrl":"https://doi.org/10.1109/CINC.2009.81","url":null,"abstract":"Risk optimization is a very important issue in decision making. In this paper, some credibilistic risk optimization models and algorithms are presented. Firstly, we recall some definitions and results of value-at-risk in credibilistic risk analysis. Secondly, we propose some risk optimization models by means of fuzzy programming, or more precisely, credibilistic programming. Thirdly, hybrid intelligent algorithms are designed to solve the proposed risk optimization models. Finally, some numerical examples are illustrated.","PeriodicalId":173506,"journal":{"name":"2009 International Conference on Computational Intelligence and Natural Computing","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125907428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Toward Recognizing Two Emotion States from ECG Signals","authors":"Chen Defu, L. Guangyuan, Cai Jing","doi":"10.1109/CINC.2009.240","DOIUrl":"https://doi.org/10.1109/CINC.2009.240","url":null,"abstract":"Emotion recognition based on physiological signals which can reflect people’s real emotion correctly is more robust and objective than any other ways, so it has a bright prospect of research and applications. This paper may firstly carry out the work of feature extraction for electrocardiogram (ECG) obtained from 391 subjects containing two emotion states (joy, sad) by the method of discrete wavelet transform (DWT). Then feature selection could be performed using the method on the combination of Particle Swarm Optimization (PSO) and KNN classifier. Eventually, the optimal feature subset could be found and the total recognition rate reached 84.45%. Experiment and simulation results showed that it is feasible and efficiency that using PSO and KNN to recognize emotion states by physiological signals.","PeriodicalId":173506,"journal":{"name":"2009 International Conference on Computational Intelligence and Natural Computing","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126999294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Vision Based Obstacle Recognition Approach of a Power Line Inspection Robot","authors":"Qi Zuo, Zhi-xin Xie, Zijian Guo","doi":"10.1109/CINC.2009.251","DOIUrl":"https://doi.org/10.1109/CINC.2009.251","url":null,"abstract":"This paper introduces the research and application situations of the power transmission line inspection robot. It describes the architecture of two–arm rotary mechanism robot and the configuration of control system. The emphasis of this paper is placed on the algorithm of object recognition for those structure-restrained obstacles such as suspending clamps, counterweights, insulators and so on. The experiments of laboratory tests and field applications show that the proposed image recognition approach can achieve accurate results with less memory and computation cost.","PeriodicalId":173506,"journal":{"name":"2009 International Conference on Computational Intelligence and Natural Computing","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124313060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"RBF Algorithm and its Application in Multi-Reach Water Quality Simulation","authors":"Chang-jun Zhu, Xiujuan Zhao","doi":"10.1109/CINC.2009.139","DOIUrl":"https://doi.org/10.1109/CINC.2009.139","url":null,"abstract":"Based on the theory and method of neural network, and analysis of multi-reach water quality model, a model of RBF water quality model was presented, the model was trained and examined with the data of water quality of Fuyang river in Handan city. The results indicate that the model is more accurate than traditional model and is feasible for water quality simulation.","PeriodicalId":173506,"journal":{"name":"2009 International Conference on Computational Intelligence and Natural Computing","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121876537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Security Log Based Trust Negotiation Model","authors":"Cao Yuan, Yaqin Li, Jun Yan, Zhengsong Liao","doi":"10.1109/CINC.2009.83","DOIUrl":"https://doi.org/10.1109/CINC.2009.83","url":null,"abstract":"Trust Negotiation (TN) is an approach to establish trust relationship between strangers by disclosing iteratively credentials and access control policies. In open and distributed environment TN brings convenience in resource share, while it still has some shortcomings, such as easy to fail in negotiation, difficult to track users’ deed and so on.... Security log provides a method to analyze the past and present status of TN for system administrator. According the current state of TN, a security log based trust negotiation model is proposed in the paper by combining security log with TN, which helps efficiently find out why the negotiation fails and track users’ deed by recording all kinds of negotiation states.","PeriodicalId":173506,"journal":{"name":"2009 International Conference on Computational Intelligence and Natural Computing","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131789408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study on Single and Mixed Fleet Strategy for Multi-depot Vehicle Routing Problem with Backhauls","authors":"Ren Chun-yu, Song Zhendong, Wang Xiaobo","doi":"10.1109/CINC.2009.61","DOIUrl":"https://doi.org/10.1109/CINC.2009.61","url":null,"abstract":"The vehicle routing problem of logistics distribution is indispensability contents in logistics distribution optimization. In order to satisfy with the individual and various demand of customer, establish single and mixed fleet multi-depot vehicle routing problem with backhauls model. According to the characteristics of model, hybrid genetic algorithm is used to get the optimization solution. First of all, use hybrid coding so as to simplify the problem; construct the pertinence of initial solution to enhance the feasibility of solutions. Improved ordinal crossover operators can avoid destroying good gene parts so as that the algorithm can be convergent to the optimization as whole. The study adopts 2- exchange mutation operator to strengthen the partial searching ability of chromosome. This algorithm can offer the thought to settle the practical problem in scale. At the same time, it proves that mixed fleet strategy can shorten distribution distance, reduce distribution vehicle so as to reduce distribution cost and improve economic benefit.","PeriodicalId":173506,"journal":{"name":"2009 International Conference on Computational Intelligence and Natural Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130456391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Algorithm of Service Selection Based on QoS Preference in Network Computing Environment","authors":"Quan Liang, Yuanzhuo Wang","doi":"10.1109/CINC.2009.209","DOIUrl":"https://doi.org/10.1109/CINC.2009.209","url":null,"abstract":"In order to select service based on users’ QoS preference, the paper studied and presented several ways to describe QoS preference information. Then, these ways were applied to the algorithm of service selection, the QoS preference function and user’s satisfaction degree which as an evaluation criteria of user were defined. Subsequently,the paper put forward an algorithm of service selection based on QoS preference. Several tests showed that the algorithm could reliably select the optimal service with a good stability.","PeriodicalId":173506,"journal":{"name":"2009 International Conference on Computational Intelligence and Natural Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129555048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Study on Construction of E-government Platform Based on SOA and Efficiency Comparison of Serving Model","authors":"Chunni Liu, Hua Xiao","doi":"10.1109/CINC.2009.68","DOIUrl":"https://doi.org/10.1109/CINC.2009.68","url":null,"abstract":"Low entry cost and high expected returns in the E-Government boom in the recent decades in China. As E-government becomes a very active research area, a lot of solutions aiming to provide citizens, business partners and administrative staff with information more accessible, effective and accountable are being deployed. Yet, how to build a more effective serving platform of E-government and how to better serve citizens and enterprises still remains an open question. In this case, this paper analyzes the construction of E-government platform based on SOA and serving models of E-government, and makes an efficiency comparison of serving model.","PeriodicalId":173506,"journal":{"name":"2009 International Conference on Computational Intelligence and Natural Computing","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131641733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fuzzy Control of Air-Suction Seeding Device Based on SPCE061A","authors":"Gao Lin, Wang Nai-kang, Li Wen-bin, Zhang Jun-mei","doi":"10.1109/CINC.2009.119","DOIUrl":"https://doi.org/10.1109/CINC.2009.119","url":null,"abstract":"In order to make sure the seeding quality of air-suction seeding device, it is very important to control the vacuum degree of sowing drum. In this paper, the structure and principles of air-suction seeding device was introduced briefly and a fuzzy control system to control vacuum degree based on SPCE061A was presented. According to the features of SPCE061A and control demands of seeding device in the seedling production line, a new control technique combining speech control with fuzzy control was proposed to control seeding device. A layout about two-dimensional fuzzy controller was described. The dynamical simulation was carried out by using the MATLAB fuzzy toolbox. The result of simulation demonstrated that it was feasible to adopt the method of fuzzy control to control the vacuum degree of sowing drum in air-suction seeding device.","PeriodicalId":173506,"journal":{"name":"2009 International Conference on Computational Intelligence and Natural Computing","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131218030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}