2017 12th International Conference on Intelligent Systems and Knowledge Engineering (ISKE)最新文献

筛选
英文 中文
The relation between fuzzy soft set and integrative fuzzy set 模糊软集与综合模糊集的关系
Yi Jiang, Hailiang Zhao, Junxuan He
{"title":"The relation between fuzzy soft set and integrative fuzzy set","authors":"Yi Jiang, Hailiang Zhao, Junxuan He","doi":"10.1109/ISKE.2017.8258761","DOIUrl":"https://doi.org/10.1109/ISKE.2017.8258761","url":null,"abstract":"Fuzzy set can be divided into single parameter or multi-parameter's ones with which to depict their fuzzy attributes. In references, it is usual defined in a single parameter universe and yet multi-parameter's ones often appears in so-called fuzzy relation. Fuzzy soft set can be used to describe a fuzzy object by aggregating fuzzy parameters in different attributes. Fuzzy set can be employed to do the same things. It can be concluded that there must be a certain relation between the two concepts. And to give the relation, integrative fuzzy set is proposed in this paper. And which can be decomposed into a fuzzy soft set under certain condition. Fuzzy soft set also can be translated into an integrative fuzzy set by some operator. Both of them can be used for decision-making. Theoretical analysis and examples show the optimal decision-making results are equivalent.","PeriodicalId":208009,"journal":{"name":"2017 12th International Conference on Intelligent Systems and Knowledge Engineering (ISKE)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129548047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A study on the long-term mechanism of personnel testing based on the system management theory 基于系统管理理论的人事考核长效机制研究
Caijuan Zhang, Ming Jiang, Xi Luo
{"title":"A study on the long-term mechanism of personnel testing based on the system management theory","authors":"Caijuan Zhang, Ming Jiang, Xi Luo","doi":"10.1109/ISKE.2017.8258796","DOIUrl":"https://doi.org/10.1109/ISKE.2017.8258796","url":null,"abstract":"The system management theory is one of the many theories of management science and engineering discipline. It has important guiding significance for management practice and intelligent assessment activity. In china, the personnel examination is a kind of selective intelligence evaluation work of human resource. According to the theory of system management, the intelligent evaluation of personnel examination should follow the several principles: the content of the evaluation should be holistic; evaluation management should pay attention to the system; the evaluation process should have a dynamic controllable service system; the evaluation results should pay attention to social feedback.","PeriodicalId":208009,"journal":{"name":"2017 12th International Conference on Intelligent Systems and Knowledge Engineering (ISKE)","volume":"135 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127390027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Indexing biomedical documents with Bayesian networks and terminologies 用贝叶斯网络和术语索引生物医学文献
Wiem Chebil, L. Soualmia, Mohamed Nazih Omri, S. Darmoni
{"title":"Indexing biomedical documents with Bayesian networks and terminologies","authors":"Wiem Chebil, L. Soualmia, Mohamed Nazih Omri, S. Darmoni","doi":"10.1109/ISKE.2017.8258745","DOIUrl":"https://doi.org/10.1109/ISKE.2017.8258745","url":null,"abstract":"We proposed a new approach denoted SDIBN (Semantic Documents Indexing using Bayesian Networks) for indexing biomedical documents with terminologies. The main contribution of SDIBN is to use Bayesian Networks (BN) and the probability inference to perform a partial match between documents and biomedical concepts. The biomedical terminologies exploited are MeSH (Medical Subject Headings) thesaurus and SNOMED CT (Systematized Nomenclature of Medicine-Clinical Terms). Our approach exploits also UMLS (Unified Medical Language System) to filter the extracted concepts which allows to keep only relevant concepts. Our contribution also is to use DCG(Discount Cumulative Gain) measure for the first time to evaluate the indexing approaches. The experiments of SDIBN which are performed on subsets of OHSUMED and Cismef collections showed encouraging results.","PeriodicalId":208009,"journal":{"name":"2017 12th International Conference on Intelligent Systems and Knowledge Engineering (ISKE)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127459602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Long short-term memory neural network for network traffic prediction 网络流量预测的长短期记忆神经网络
Qinzheng Zhuo, Qianmu Li, Han Yan, Yong Qi
{"title":"Long short-term memory neural network for network traffic prediction","authors":"Qinzheng Zhuo, Qianmu Li, Han Yan, Yong Qi","doi":"10.1109/ISKE.2017.8258815","DOIUrl":"https://doi.org/10.1109/ISKE.2017.8258815","url":null,"abstract":"This paper proposes a model of neural network which can be used to combine Long Short Term Memory networks (LSTM) with Deep Neural Networks (DNN). Autocorrelation coefficient is added to model to improve the accuracy of prediction model. It can provide better than the other traditional precision of the model. And after considering the autocorrelation features, the neural network of LSTM and DNN has certain advantages in the accuracy of the large granularity data sets. Several experiments were held using real-world data to show effectivity of LSTM model and accuracy were improve with autocorrelation considered.","PeriodicalId":208009,"journal":{"name":"2017 12th International Conference on Intelligent Systems and Knowledge Engineering (ISKE)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125881382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 46
Conflicting rate based branching heuristic for CDCL SAT solvers 基于冲突率的分支启发式CDCL - SAT求解方法
Qingshan Chen, Yang Xu, Guanfeng Wu, Xingxing He
{"title":"Conflicting rate based branching heuristic for CDCL SAT solvers","authors":"Qingshan Chen, Yang Xu, Guanfeng Wu, Xingxing He","doi":"10.1109/ISKE.2017.8258777","DOIUrl":"https://doi.org/10.1109/ISKE.2017.8258777","url":null,"abstract":"The modern SAT solvers usually update score of corresponding variables by increasing a bump value on each conflict. Those values are usually constant, but are independent of decision levels and conflicts. Sometimes, it is more efficient for local conflict optimization but weak in global searching. In this paper, we propose a CRB method (Conflicting Rate Branching), which is a variant of VSIDS but different implementation. The CRB updates the score which integrated with the decision level and conflicts whenever a variable is used in conflict analysis. We integrated CRB with MiniSat solvers and evaluated CRB on instances from the SAT Race 2015. Experimental results show that the proposed strategy can solve more instances than EVSIDS and improve performance for both SAT and UNSAT instances.","PeriodicalId":208009,"journal":{"name":"2017 12th International Conference on Intelligent Systems and Knowledge Engineering (ISKE)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114705639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Diverse activation functions in deep learning 深度学习中的多种激活函数
Bin Wang, Tianrui Li, Yanyong Huang, Huaishao Luo, Dongming Guo, S. Horng
{"title":"Diverse activation functions in deep learning","authors":"Bin Wang, Tianrui Li, Yanyong Huang, Huaishao Luo, Dongming Guo, S. Horng","doi":"10.1109/ISKE.2017.8258768","DOIUrl":"https://doi.org/10.1109/ISKE.2017.8258768","url":null,"abstract":"We introduce the concept of diverse activation functions, and apply them into Convolutional Auto-Encoder (CAE) to develop diverse activation CAE (DaCAE), which considerably reduces the reconstruction loss. In contrast to vanilla CAE only with activation functions of the same types, DaCAE incorporates diverse activations by considering their cooperation and location. In terms of the reconstruction capability, DaCAE significantly outperforms vanilla CAE and full connected Auto-Encoder, and we conclude rules of thumb on designing diverse activations networks. Based on the high quality of the latent bottleneck features extracted from DaCAE, we demonstrate a satisfying advantage that fuzzy rules classifier performs better than softmax layer in supervised learning. These results could be seen as new research points in the attempts at using diverse activations to train deep neural networks and combining fuzzy inference systems with deep learning.","PeriodicalId":208009,"journal":{"name":"2017 12th International Conference on Intelligent Systems and Knowledge Engineering (ISKE)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114294332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Traffic flow forecasting based on hybrid deep learning framework 基于混合深度学习框架的交通流量预测
Shengdong Du, Tianrui Li, Xun Gong, Yan Yang, S. Horng
{"title":"Traffic flow forecasting based on hybrid deep learning framework","authors":"Shengdong Du, Tianrui Li, Xun Gong, Yan Yang, S. Horng","doi":"10.1109/ISKE.2017.8258813","DOIUrl":"https://doi.org/10.1109/ISKE.2017.8258813","url":null,"abstract":"Traffic flow forecasting is a key problem in the field of intelligent traffic management. In this work, we propose a hybrid deep learning framework for short-term traffic flow forecasting. It is built by the multi-layer integration deep learning architecture and jointly learns the spatial-temporal features. According to the highly nonlinear and non-stationary characteristics of traffic flow data, the framework consists of Recurrent Neural Networks (RNNs) and Convolutional Neural Networks (CNNs). The former is to capture long temporal dependencies by using Long Short-Term Memory (LSTM) units and the latter is to capture the local trend features. The proposed framework is compared with other traditional shallow and deep learning models for traffic flow forecasting on PeMS datasets. The experimental results indicate that the hybrid framework is capable of dealing with complex nonlinear urban traffic flow forecasting with satisfying accuracy and effectiveness.","PeriodicalId":208009,"journal":{"name":"2017 12th International Conference on Intelligent Systems and Knowledge Engineering (ISKE)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127087474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 67
Semi-supervised deep network representation with text information 文本信息的半监督深度网络表示
Xinchun Ming, Fangyu Hu
{"title":"Semi-supervised deep network representation with text information","authors":"Xinchun Ming, Fangyu Hu","doi":"10.1109/ISKE.2017.8258807","DOIUrl":"https://doi.org/10.1109/ISKE.2017.8258807","url":null,"abstract":"Network representation learning aims at learning low-dimensional representation for each vertex in a network, which plays an important role in network analysis. Con­ventional shallow models often achieve sub-optimal network representation results for non-linear network characteristics. Most network representation methods merely concentrate on structure but ignore text information related to each node. In the paper, we propose a novel semi-supervised deep model for network representation learning. We adopt a random surfing model to capture the global structure and incorporate text features of vertices based on the PV-DBOW model. The joint similarity between vertices achieved by combining network structure and text information is applied as the unsupervised component. While the first-order proximity in a network is used as the supervised component. By jointly optimizing them, our method can obtain reliable low-dimensional vector representations. The experiments on two real-world networks show that our method outperforms other baselines in the task of multi-class classification of vertices.","PeriodicalId":208009,"journal":{"name":"2017 12th International Conference on Intelligent Systems and Knowledge Engineering (ISKE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129122592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Classification of diabetic retinopathy using textural features in retinal color fundus image 利用视网膜彩色眼底图像的纹理特征对糖尿病视网膜病变进行分类
A. Padmanabha, Abhishek M. Appaji, M. Prasad, H. Lu, Sudhanshu Joshi
{"title":"Classification of diabetic retinopathy using textural features in retinal color fundus image","authors":"A. Padmanabha, Abhishek M. Appaji, M. Prasad, H. Lu, Sudhanshu Joshi","doi":"10.1109/ISKE.2017.8258754","DOIUrl":"https://doi.org/10.1109/ISKE.2017.8258754","url":null,"abstract":"Early, diagnosis is essential for diabetic patients to avoid partial or complete blindness. This work presents a new analysis method of texture features for classification of Diabetic Retinopathy (DR). The proposed method masks the blood vessels and optic disk segmented and directly extracts the textural features from the remaining retinal region. The proposed method is much simpler with comparison of the other methods that detect the defective regions first and then extract the required features for classification. The Haralick texture measures calculated are used for classification of DR. The proposed method is evaluated through a classification of DR using both Support Vector Machine (SVM) and Artificial Neural Network (ANN). The results of SVM have a better accuracy (87.5%) over ANN (79%). The performance of the proposed method is presented also in terms of sensitivity and specificity.","PeriodicalId":208009,"journal":{"name":"2017 12th International Conference on Intelligent Systems and Knowledge Engineering (ISKE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132491726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Modeling and validation for embedded software confidentiality and integrity 嵌入式软件保密性和完整性的建模和验证
Xinwen Hu, Zhuang Yi, Zining Cao, Tong Ye, Mi Li
{"title":"Modeling and validation for embedded software confidentiality and integrity","authors":"Xinwen Hu, Zhuang Yi, Zining Cao, Tong Ye, Mi Li","doi":"10.1109/ISKE.2017.8258789","DOIUrl":"https://doi.org/10.1109/ISKE.2017.8258789","url":null,"abstract":"With the rapid development of embedded software, embedded software has a highly security demand, such as confidentiality and integrity. UML provides the foundation for the construction and analysis of embedded software, but it cannot provide accurate semantics for the validation of embedded software security properties. Using the formal method based on Z language to model the security properties of embedded software, can provide the rigorous semantics for the security properties of embedded software, which can help to discover its early design errors and reduce the cost of testing and maintenance. Developing the model transformation tool of UML model to Z model, which can avoid repetitive modeling of the manual establishment of Z model, reduce the possibility of introducing artificial logic error in the model. Verifying the correctness of the confidentiality and integrity model by using the formal verification tool Z/EVES, which can make the embedded software satisfy the user's security requirement. This paper construct the static structure model and dynamic behavior model of embedded software confidentiality and integrity modeling based on Z at first; and then establish the model transformation rules of UML modeling elements to Z modeling elements, which is designed and implemented based on the XSLT technology; finally, the formal model is validated by using the verification tool Z/EVES through the example of a bicycle parking embedded software, and the correctness of the embedded software security model presented in this paper is explained.","PeriodicalId":208009,"journal":{"name":"2017 12th International Conference on Intelligent Systems and Knowledge Engineering (ISKE)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130459501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信