2006 IEEE International Conference on Granular Computing最新文献

筛选
英文 中文
Lie group machine learning's axiom hypothesizes 李群机器学习的公理假设
2006 IEEE International Conference on Granular Computing Pub Date : 2006-05-10 DOI: 10.1109/GRC.2006.1635825
Huan Xu, Fanzhang Li
{"title":"Lie group machine learning's axiom hypothesizes","authors":"Huan Xu, Fanzhang Li","doi":"10.1109/GRC.2006.1635825","DOIUrl":"https://doi.org/10.1109/GRC.2006.1635825","url":null,"abstract":"profound inherent theory. [5] It just can meet the needs of machine learning and describe the procedure of machine learning clearly. So Lie group machine learning is formed. This paper is based on the basic conceptions of machine learning and gives the generalization hypothesis axiom; the partition independence hypothesis axiom; the duality hypothesis axiom and the learning compatibility hypothesis axiom of Lie group machine learning. Index terms—Lie group; machine learning; Lie group machine leaning; hypothesis axiom","PeriodicalId":400997,"journal":{"name":"2006 IEEE International Conference on Granular Computing","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122179668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Evolutionary voting kernel machines for cyclooxygenase-2 inhibitor activity comparisons 环氧化酶-2抑制剂活性比较的进化投票核机
2006 IEEE International Conference on Granular Computing Pub Date : 2006-05-10 DOI: 10.1109/GRC.2006.1635891
Bo Jin, Yanqing Zhang
{"title":"Evolutionary voting kernel machines for cyclooxygenase-2 inhibitor activity comparisons","authors":"Bo Jin, Yanqing Zhang","doi":"10.1109/GRC.2006.1635891","DOIUrl":"https://doi.org/10.1109/GRC.2006.1635891","url":null,"abstract":"With the growing interest of biological data prediction and chemical data prediction, more complicated kernels are designed to measure data similarities. In (1), we proposed a kind of evolutionary granular kernel trees (EGKTs) for drug activity comparisons. In EGKTs, feature granules and tree structures are predefined based on the possible substituent locations. In (2), we proposed a granular kernel tree structure evolving system (GKTSES) to evolve the structures of GKTs in the case that we lack knowledge to predefine kernel trees. In this paper, evolutionary voting kernel machines (EVKMs) are presented based on GKTSES. Experimental results show that EVKMs are more stable than GKTSES in cyclooxygenase-2 inhibitor activity comparisons. Index Terms—Drug activity comparisons, kernel, genetic algorithms, granular kernel trees, support vector machines.","PeriodicalId":400997,"journal":{"name":"2006 IEEE International Conference on Granular Computing","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114237489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Default assumption reasoning based on DFL 基于DFL的默认假设推理
2006 IEEE International Conference on Granular Computing Pub Date : 2006-05-10 DOI: 10.1109/GRC.2006.1635828
Jin Huang, Fanzhang Li
{"title":"Default assumption reasoning based on DFL","authors":"Jin Huang, Fanzhang Li","doi":"10.1109/GRC.2006.1635828","DOIUrl":"https://doi.org/10.1109/GRC.2006.1635828","url":null,"abstract":"Mankind can use uncertain and incomplete information to infer. And the conclusions are always satisfying. In our daily life most objects in the reasoning processing have Dynamic Fuzzy character. Due to this we propose default assumption reasoning based on DFL. Here, we introduce the reasoning frame, Dynamic Fuzzy knowledge representation, reasoning algorithms and so on.","PeriodicalId":400997,"journal":{"name":"2006 IEEE International Conference on Granular Computing","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116767636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Multiview intelligent data analysis based on granular computing 基于颗粒计算的多视图智能数据分析
2006 IEEE International Conference on Granular Computing Pub Date : 2006-05-10 DOI: 10.1109/GRC.2006.1635797
Yaohua Chen, Yiyu Yao
{"title":"Multiview intelligent data analysis based on granular computing","authors":"Yaohua Chen, Yiyu Yao","doi":"10.1109/GRC.2006.1635797","DOIUrl":"https://doi.org/10.1109/GRC.2006.1635797","url":null,"abstract":"Multiview intelligent data analysis explores data from different perspectives to reveal various types of structures and knowledge embedded in the data. Granular computing provides a general methodology for problem solving and information processing. Its application to data analysis results in hierarchical knowledge structures. In this paper, the funda- mental issues of granulations and granular structures for data analysis are discussed based on modal-style data operators. The results provide a basis for establishing a framework of multiview intelligent data analysis.","PeriodicalId":400997,"journal":{"name":"2006 IEEE International Conference on Granular Computing","volume":"458 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116772319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 53
Ensembles of classifiers based on rough sets theory and set-oriented database operations 基于粗糙集理论和面向集合的数据库操作的分类器集成
2006 IEEE International Conference on Granular Computing Pub Date : 2006-05-10 DOI: 10.1109/GRC.2006.1635760
Xiaohua Hu
{"title":"Ensembles of classifiers based on rough sets theory and set-oriented database operations","authors":"Xiaohua Hu","doi":"10.1109/GRC.2006.1635760","DOIUrl":"https://doi.org/10.1109/GRC.2006.1635760","url":null,"abstract":"In this paper we present a new approach to construct a good ensemble of classifiers for data mining applications based on rough set theory and database set operations. We borrow the main ideas of rough set theory and redefine them based on the database theory to take advantage of the very efficient set-oriented database operation. Our method first computes a set of reducts which include all the necessary attributes required for the decision categories. For each reduct, a reduct table is generated by removing those attributes which are not in the reduct. Next a novel rule induction algorithm is used to compute the maximal generalized rules for each reduct table and a set of reduct classifiers is formed based on the corresponding reducts. Our rule induction algorithm adopts the \"conquer-without-separating \" strategy to generate a set of global best rules from the data set. The experimental results indicates that the rough set based approach is very promising for ensemble of classifiers.","PeriodicalId":400997,"journal":{"name":"2006 IEEE International Conference on Granular Computing","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125077087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A taxonomy of types of granularity 粒度类型的分类法
2006 IEEE International Conference on Granular Computing Pub Date : 2006-05-10 DOI: 10.1109/GRC.2006.1635767
C. Keet
{"title":"A taxonomy of types of granularity","authors":"C. Keet","doi":"10.1109/GRC.2006.1635767","DOIUrl":"https://doi.org/10.1109/GRC.2006.1635767","url":null,"abstract":"Multiple different understandings and uses exist of what granularity is and how to implement it, where the former influences success of the latter with regards to storing granular data and using granularity for reasoning over the data or information. We propose a taxonomy of types of granularity and discuss for each leaf type how the entities or instances relate within its granular level. Such unambiguous distinctions can guide a conceptual modeler to better distinguish between the types of granularity and the software developer to improve on implementations of granularity.","PeriodicalId":400997,"journal":{"name":"2006 IEEE International Conference on Granular Computing","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131142776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 53
Combating imbalance in network intrusion datasets 对抗网络入侵数据集的不平衡
2006 IEEE International Conference on Granular Computing Pub Date : 2006-05-10 DOI: 10.1109/GRC.2006.1635905
David A. Cieslak, N. Chawla, A. Striegel
{"title":"Combating imbalance in network intrusion datasets","authors":"David A. Cieslak, N. Chawla, A. Striegel","doi":"10.1109/GRC.2006.1635905","DOIUrl":"https://doi.org/10.1109/GRC.2006.1635905","url":null,"abstract":"An approach to combating network intrusion is the development of systems applying machine learning and data min- ing techniques. Many IDS (Intrusion Detection Systems) suffer from a high rate of false alarms and missed intrusions. We want to be able to improve the intrusion detection rate at a reduced false positive rate. The focus of this paper is rule-learning, using RIPPER, on highly imbalanced intrusion datasets with an objective to improve the true positive rate (intrusions) without significantly increasing the false positives. We use RIPPER as the underlying rule classifier. To counter imbalance in data, we implement a combination of oversampling (both by replication and synthetic generation) and undersampling techniques. We also propose a clustering based methodology for oversampling by generating synthetic instances. We evaluate our approaches on two intrusion datasets — destination and actual packets based — constructed from actual Notre Dame traffic, giving a flavor of real-world data with its idiosyncrasies. Using ROC analysis, we show that oversampling by synthetic generation of minority (intrusion) class outperforms oversampling by replication and RIPPER's loss ratio method. Additionally, we establish that our clustering based approach is more suitable for the detecting intrusions and is able to provide additional improvement over just synthetic generation of instances.","PeriodicalId":400997,"journal":{"name":"2006 IEEE International Conference on Granular Computing","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134222737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 242
A framework of linguistic truth-valued propositional logic based on lattice implication algebra 基于格蕴涵代数的语言真值命题逻辑框架
2006 IEEE International Conference on Granular Computing Pub Date : 2006-05-10 DOI: 10.1109/GRC.2006.1635868
L. Zou, Jun Ma, Yang Xu
{"title":"A framework of linguistic truth-valued propositional logic based on lattice implication algebra","authors":"L. Zou, Jun Ma, Yang Xu","doi":"10.1109/GRC.2006.1635868","DOIUrl":"https://doi.org/10.1109/GRC.2006.1635868","url":null,"abstract":"The linguistic truth values with linguistic hedges is considered. The linguistic hedge operators in the proposition are put forward and the truth values are divided into different grades. Based on lattice implication algebra a framework of linguistic truth-valued propositional logic is presented to deal with both comparable and incomparable of linguistic truth value. The properties of the propositional formula are discussed. Then based on a filter J of L, J-true, J-false of a formula, J-similar literals and J-complementary literals are defined. In the filter, J-resolution method of the linguistic truth value propositional logic is presented.","PeriodicalId":400997,"journal":{"name":"2006 IEEE International Conference on Granular Computing","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115545096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Towards the integration of diverse spam filtering techniques 迈向多种垃圾邮件过滤技术的整合
2006 IEEE International Conference on Granular Computing Pub Date : 2006-05-10 DOI: 10.1109/GRC.2006.1635746
C. Pu, Steve Webb, Oleg M. Kolesnikov, Wenke Lee, R. Lipton
{"title":"Towards the integration of diverse spam filtering techniques","authors":"C. Pu, Steve Webb, Oleg M. Kolesnikov, Wenke Lee, R. Lipton","doi":"10.1109/GRC.2006.1635746","DOIUrl":"https://doi.org/10.1109/GRC.2006.1635746","url":null,"abstract":"Text-based spam filters (e.g., keyword and statistical learning filters) use tokens, which are found during message content analysis, to separate spam from legitimate messages. The effectiveness of these token-based filters is due to the presence of token signatures (i.e., tokens that are invariant for the many variants of spam messages). Unfortunately, it is relatively easy for spammers to hide or erase these signatures through simple techniques such as misspellings (to confuse keyword filters) and camouflage (i.e., combined spam and legitimate content used to confuse statistical filters). Our hypothesis is that spam contains additional signatures which are more difficult to hide. A concrete example of this type of signature is the presence of URLs in spam messages which are used to induce contact from their victims. We believe diverse spam filtering tools should be developed to incorporate these additional signatures. Thus, in this paper, we discuss a new type of URL-based filtering which can be integrated with existing spam filtering techniques to provide a more robust anti-spam solution. Our approach uses the syntactic constraints of URLs to find them in emails, and then, it uses semantic knowledge and tools (e.g., search engines) to refine and sharpen the spam identification process. email's routed path. In this paper, we focus our attention on spam messages that contain URLs and provide a novel approach for filtering these messages. The key observation is that most spam messages contain URLs which are \"live\" since the spammers would not be able to profit without a functioning link to their site. Thus, by checking the URLs found in a message and verifying a user's interest in the websites referenced by those URLs, we are able to add a new dimension to spam filtering. This paper has two main contributions. First, we describe three techniques for filtering email messages that contain URLs: URL category whitelists, URL regular expression whitelists, and dynamic classification of websites. Second, we describe a prototype implementation that takes advantage of these three techniques to help enhance spam filtering. Our pre- liminary results suggest that new dimensions in spam filtering (e.g., using URLs) deserve further exploration. However, due to space limitations, we have omitted our experimental results from this paper. The remainder of the paper is structured as follows. Sec- tion II gives an overview of the related work done in this research area. In Section III, we describe our approach, and Section IV discusses the details of our system's implementa- tion. We provide our conclusions in Section V.","PeriodicalId":400997,"journal":{"name":"2006 IEEE International Conference on Granular Computing","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122624466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
The framework of temporal granular logic based on information system 基于信息系统的时间粒度逻辑框架
2006 IEEE International Conference on Granular Computing Pub Date : 2006-05-10 DOI: 10.1109/GRC.2006.1635875
Xiaoqing Chen, Taorong Qiu, Qing Liu, Houkuan Huang
{"title":"The framework of temporal granular logic based on information system","authors":"Xiaoqing Chen, Taorong Qiu, Qing Liu, Houkuan Huang","doi":"10.1109/GRC.2006.1635875","DOIUrl":"https://doi.org/10.1109/GRC.2006.1635875","url":null,"abstract":"Based on information system this paper presents a general framework of first order temporal granular logic and defines the meaning set of a formula .the paper provide axiom schemes and deductive rules based on which logic methodology or set theory can be applied in deduction. v a Its meaning set","PeriodicalId":400997,"journal":{"name":"2006 IEEE International Conference on Granular Computing","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125304068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信