2017 13th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD)最新文献

筛选
英文 中文
Space syntax and time distance based analysis on the influences of the subways to the pubic traffic accessibility in Nanchang city 基于空间句法和时间距离的南昌市地铁对公共交通可达性影响分析
Handan Zhang, B. Hu
{"title":"Space syntax and time distance based analysis on the influences of the subways to the pubic traffic accessibility in Nanchang city","authors":"Handan Zhang, B. Hu","doi":"10.1109/FSKD.2017.8393169","DOIUrl":"https://doi.org/10.1109/FSKD.2017.8393169","url":null,"abstract":"Based on the database of public transportation network in Nanchang, this paper evaluates the accessibility of urban public transportation by using space syntax and time distance methods. Through the calculation of the space syntax index, accessibility index and the time cost of each node, the results show that the accessibility of road intensive area and urban centers is higher than other regions, the convenience of subway line is better than bus lines, and the influence of a road along the subway is more significant than that of other regions. The control value of the whole public transit network remains stable, the time cost of urban traffic has been significantly improved with the completion of the metro line 2, the average saving travel time is about 4min, and the transit time between public transportation sites is also reduced with the constructions of subway lines. The evaluations of the pubic traffic accessibility in Nanchang city have the consistent conclusions according to space syntax and time distance methods.","PeriodicalId":236093,"journal":{"name":"2017 13th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126330786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Designing fuzzy apparatus to model dyslexic individual symptoms for clinical use 设计用于临床的模糊模型来模拟阅读困难的个体症状
Tereza Parilová, E. Hladká, P. Říha
{"title":"Designing fuzzy apparatus to model dyslexic individual symptoms for clinical use","authors":"Tereza Parilová, E. Hladká, P. Říha","doi":"10.1109/FSKD.2017.8393410","DOIUrl":"https://doi.org/10.1109/FSKD.2017.8393410","url":null,"abstract":"Along with the discovery of new facts and the development of new technologies and methodologies, more and more definitions and specifications emerge. The quantity of these emergences, however, can lead to paradoxical contradictions, which obscure borders. Often, we see this phenomenon of vagueness within natural language or non-exact topics. Fuzzy principles are therefore applied in wide range of (not only) scientific areas. In applied technical science, a user model based on interface and human computer cooperation meets such fuzzy borders. So, why not use it in assistive technology models? Fuzzy deals from its nature with linguistic variables and such variables are being transformed from numbers to expressions on predefined scales. Dyslexia is a neurobiological cognitive based disorder and ideal for (neuro) fuzzy computational modeling for many reasons. This paper describes the idea and process of using the fuzzy approach for obtaining information about individual problems of dyslexic users and differentiating between the type(s) of dyslexic user model he or she may belong to. Such information may serve for further clinical and psychological studies of dyslexia and linguistic based problems.","PeriodicalId":236093,"journal":{"name":"2017 13th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132136605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Face recognition with improved deep belief networks 改进深度信念网络的人脸识别
Rong Fan, Wenxin Hu
{"title":"Face recognition with improved deep belief networks","authors":"Rong Fan, Wenxin Hu","doi":"10.1109/FSKD.2017.8393043","DOIUrl":"https://doi.org/10.1109/FSKD.2017.8393043","url":null,"abstract":"Deep learning techniques have become the state-of-the-art approach for classification in artificial intelligence, and applied in many widespread subjects. Deep Belief Networks (DBNs) are one of the most successful models. DBNs consist of many layers of hidden factors along with a greedy layer-wise unsupervised learning algorithm. In our paper, we brought forward an approach to face recognition based on dropout DBNs, which made good performances on small training sets.","PeriodicalId":236093,"journal":{"name":"2017 13th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115230804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Exploiting semantic knowledge base for patent retrieval 利用语义知识库进行专利检索
Feng Wang, Lanfen Lin
{"title":"Exploiting semantic knowledge base for patent retrieval","authors":"Feng Wang, Lanfen Lin","doi":"10.1109/FSKD.2017.8393111","DOIUrl":"https://doi.org/10.1109/FSKD.2017.8393111","url":null,"abstract":"Patent retrieval is considered as recall-oriented retrieval that aims to find all relevant patent documents for a patent query. However, current methods encounter the term mismatch problem, because of the frequent use of nonstandard technical terms in patent documents. In order to deal with this problem, we propose a new patent query expansion approach by exploiting semantic knowledge base, which can enrich the query with semantically related concepts. Concretely, to understand the query semantics, we present the WordNet and Wikipedia-based expansion algorithms enhancing the initial query. We further provide the combination strategy to execute query and obtain retrieval results. Experiments are performed based on Java environment using the CLEF-IP collection. Results show that the performance of our approach is significantly better than other state-of-the-art approaches.","PeriodicalId":236093,"journal":{"name":"2017 13th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD)","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117138088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A self-organizing community detection algorithm for complex networks 复杂网络自组织社区检测算法
Dongming Chen, Zhaoliang Song, Cenyi Luo, Xinyu Huang
{"title":"A self-organizing community detection algorithm for complex networks","authors":"Dongming Chen, Zhaoliang Song, Cenyi Luo, Xinyu Huang","doi":"10.1109/FSKD.2017.8393291","DOIUrl":"https://doi.org/10.1109/FSKD.2017.8393291","url":null,"abstract":"Complex network is a kind of system structure, which widely exists in human society and nature. It can be used to capture and describe the evolution law, evolution mechanism, and dynamic behaviors. We study the model of entity growth in complex networks, achieve the single node growth model, block growth model and degree of communication difficulty based growth model, then carry out the theoretical analysis and experimental simulation, it is concluded that the entity growth model holds the characteristics of high robustness, high clustering coefficient and low average path. According to the growth model, this paper analyzes the basic idea and implementation process of the self-organizing community discovery algorithm based on information entropy, experimental results show that it is structurally reasonable and has important significance in practical application.","PeriodicalId":236093,"journal":{"name":"2017 13th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115196928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analyst intuition based Hidden Markov Model on high speed, temporal cyber security big data 基于分析师直觉的隐马尔可夫模型在高速、瞬时网络安全大数据中的应用
Teoh Teik Toe, Y. Nguwi, Y. Elovici, Ngai-Man Cheung, W. Ng
{"title":"Analyst intuition based Hidden Markov Model on high speed, temporal cyber security big data","authors":"Teoh Teik Toe, Y. Nguwi, Y. Elovici, Ngai-Man Cheung, W. Ng","doi":"10.1109/FSKD.2017.8393092","DOIUrl":"https://doi.org/10.1109/FSKD.2017.8393092","url":null,"abstract":"Hidden Markov Models (HMM) are probabilistic models that can be used for forecasting time series data. It has seen success in various domains like finance [1-5], bioinformatics [6-8], healthcare [9-11], agriculture [12-14], artificial intelligence[15-17]. However, the use of HMM in cyber security found to date is numbered. We believe the properties of HMM being predictive, probabilistic, and its ability to model different naturally occurring states form a good basis to model cyber security data. It is hence the motivation of this work to provide the initial results of our attempts to predict security attacks using HMM. A large network datasets representing cyber security attacks have been used in this work to establish an expert system. The characteristics of attacker's IP addresses can be extracted from our integrated datasets to generate statistical data. The cyber security expert provides the weight of each attribute and forms a scoring system by annotating the log history. We applied HMM to distinguish between a cyber security attack, unsure and no attack by first breaking the data into 3 cluster using Fuzzy K mean (FKM), then manually label a small data (Analyst Intuition) and finally use HMM state-based approach. By doing so, our results are very encouraging as compare to finding anomaly in a cyber security log, which generally results in creating huge amount of false detection.","PeriodicalId":236093,"journal":{"name":"2017 13th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127007125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
EEG signal analysis of patients with obstructive sleep apnea syndrome (OSAS) using power spectrum and fuzzy entropy 基于功率谱和模糊熵的阻塞性睡眠呼吸暂停综合征(OSAS)脑电信号分析
Szu-Yu Lin, Yu-Te Wu, W. Mao, Po-Shan Wang
{"title":"EEG signal analysis of patients with obstructive sleep apnea syndrome (OSAS) using power spectrum and fuzzy entropy","authors":"Szu-Yu Lin, Yu-Te Wu, W. Mao, Po-Shan Wang","doi":"10.1109/FSKD.2017.8393366","DOIUrl":"https://doi.org/10.1109/FSKD.2017.8393366","url":null,"abstract":"Sleep is important for the restoration and renewal of the human body. Obstructive sleep apnea syndrome (OSAS), which is caused by repetitive episodes of partial or complete upper airway obstruction during sleep, is the most common type of sleep apnea. The sleep electroencephalogram (EEG) analysis has been an important tool to investigate brain activity. In this study, we used the spectral analysis and fuzzy entropy to analyze the EEG signals collected from the OSAS patients and normal control. Results obtained from the EEG power spectrum and fuzzy entropy with and without principal component analysis (PCA) process were used as the features and fed into four different classifiers, namely, linear Support Vector Machines (SVM), Liner Discriminant Analysis (LDA), subspace k-nearest neighbor (k-NN) and subspace discriminant analysis, to differentiate these two groups. Our results demonstrated that the feature resulted from power spectrum with PCA process and subspace discriminate method using 5-fold cross-validation produces the superior classification rate which is 89 ± 3.74%.","PeriodicalId":236093,"journal":{"name":"2017 13th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123395874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Infrared image change detection of substation equipment in power system using random forest 基于随机森林的电力系统变电设备红外图像变化检测
Hua Yang, Jipu Gao, Changbao Xu, Zheng Long, Weigang Feng, S. Xiong, Shuaiwei Liu, Shan Tan
{"title":"Infrared image change detection of substation equipment in power system using random forest","authors":"Hua Yang, Jipu Gao, Changbao Xu, Zheng Long, Weigang Feng, S. Xiong, Shuaiwei Liu, Shan Tan","doi":"10.1109/FSKD.2017.8393030","DOIUrl":"https://doi.org/10.1109/FSKD.2017.8393030","url":null,"abstract":"Early detection of equipment faults plays a crucial role in power system, and automatic change detection of working status of an equipment is an efficient tool for this purpose. In this study, we proposed a novel method to automatically detect temperature change in local region of a substation equipment in power system using bi-temporal infrared images. We considered the change detection as two-class classification problem, and a supervised machine learning algorithm — Random Forest (RF) — was used for forecasting change trend. Various features were extracted from two temporal images for change detection. The features we extracted include gray-level, weighted intensity mean, RGB, LBP, gray-level histogram, and texture originating from the grayscale images and color images of the bi-temporal infrared images of the substation equipment. Cross validation was used to evaluate the robustness of these extracted features. Due to the existence of environmental noise, there are isolated detection points in the change detection results. In order to remove these isolated noise points and improve detection accuracy, we performed a morphological filtering on the detection results. Evaluation indexes such as Dice Similarity Index (DSI), kappa coefficient were used to evaluate the detection performance. Four classical change detection methods i.e. Image Differencing, Image Ratioing, Change vector analysis (CVA) and Principal Component Analysis (PCA) were tested for comparison purpose. Experimental results demonstrated that the proposed algorithm outperformed significantly these classical methods.","PeriodicalId":236093,"journal":{"name":"2017 13th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121230077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Binary variational genetic programming for the problem of synthesis of control system 控制系统综合问题的二元变分遗传规划
A. Diveev, G. Balandina, S. Konstantinov
{"title":"Binary variational genetic programming for the problem of synthesis of control system","authors":"A. Diveev, G. Balandina, S. Konstantinov","doi":"10.1109/FSKD.2017.8393051","DOIUrl":"https://doi.org/10.1109/FSKD.2017.8393051","url":null,"abstract":"The paper describes a novel numerical symbolic regression method. It's called complete binary variational genetic programming. We use it for synthesis of optimal control. This method performs better than genetic programming at crossover, reduces the search area and speeds up search algorithm by using small variations. The efficiency of the new method is proven on the given example of control system synthesis for mobile robot.","PeriodicalId":236093,"journal":{"name":"2017 13th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128125119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Convolutional neural networks for class attendance 卷积神经网络的课堂出勤率
Zhao Pei, Hai-Dong Shang, Yi Su, Miao Ma, Yali Peng
{"title":"Convolutional neural networks for class attendance","authors":"Zhao Pei, Hai-Dong Shang, Yi Su, Miao Ma, Yali Peng","doi":"10.1109/FSKD.2017.8393379","DOIUrl":"https://doi.org/10.1109/FSKD.2017.8393379","url":null,"abstract":"Conventionally, students attendance records are taken manually by teachers through roll calling in the class. It is time-consuming and prone to errors. Moreover, records of attendance are difficult to handle and preserve for the long-term. In this paper, we propose a more conveniently method of attendance statistics, which achieved through the Convolutional Neural Network (CNN). The traditional method of face recognition, such as Eigenface, is sensitive to lighting, noise, gestures, expressions and etc. Hence, we utilize CNN to implement face recognition, in order to reduce the effect of environmental change on experimental results. In addition, CNN is a method which needs lots of data for training. To resolve the problem, we design a new method to collect face data which can get lots of face data quickly and conveniently.","PeriodicalId":236093,"journal":{"name":"2017 13th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125493298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信