Changzhong Wang, Wenying Bao, Xiuxiu Wang, Qiang He
{"title":"A mapping between fuzzy covering information systems","authors":"Changzhong Wang, Wenying Bao, Xiuxiu Wang, Qiang He","doi":"10.1109/GrC.2013.6740428","DOIUrl":"https://doi.org/10.1109/GrC.2013.6740428","url":null,"abstract":"This paper uses the concept of mapping as a basic tool to study the communication between fuzzy information systems. We firstly define the concept of a compatible mapping with respect to fuzzy sets and study their basic properties. Then, we introduce the concepts of fuzzy covering information system and its homomorphism, and examine some invariant properties of fuzzy covering information systems under homomorphism. We find out that the attribute reductions of the original system and image system are equivalent to each other in fuzzy information systems.","PeriodicalId":415445,"journal":{"name":"2013 IEEE International Conference on Granular Computing (GrC)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124065904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"(k, ε)-Anonymity: An anonymity model for thwarting similarity attack","authors":"Haiyuan Wang, Jianmin Han, Jiyi Wang, Lixia Wang","doi":"10.1109/GrC.2013.6740431","DOIUrl":"https://doi.org/10.1109/GrC.2013.6740431","url":null,"abstract":"Existing anonymity models rarely consider the semantic similarity between sensitive values, so they cannot thwart similarity attack. To solve the problem, this paper proposes a (k, ε)-anonymity model which requires that each equivalence class in anonymous dataset satisfy k-anonymity constraints. At the same time, any two sensitive values in the same equivalence class are not ε-similar. The paper also proposes a (k, ε)-KACA algorithm. Experimental results show that the anonymous data satisfy(k, ε)-anonymity has higher diversity than that satisfy k-anonymity model, so (k, ε)-anonymity model can protect privacy more effective than k-anonymity model.","PeriodicalId":415445,"journal":{"name":"2013 IEEE International Conference on Granular Computing (GrC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123177128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Forecasting model based on an improved Elman neural network and its application in the agricultural production","authors":"Liu Yi, Xu Ke, Song Junde, Zhao Yuwen, Bi Qiang","doi":"10.1109/GRC.2013.6740408","DOIUrl":"https://doi.org/10.1109/GRC.2013.6740408","url":null,"abstract":"On the base of analyzing the dynamic characteristics of Elman neural network, this paper proposes to use an improved Elman neural network to forecast in the agricultural production areas against to the BP neural network's static defects. We uses the data of rice pest-Chilo to simulate. The experiment shows that the improved Elman neural network has better predictability and stability than Elman neural network and BP neural network.","PeriodicalId":415445,"journal":{"name":"2013 IEEE International Conference on Granular Computing (GrC)","volume":"449 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123017447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modeling and control of a sugars precipitation process for Chinese medicine mixed solution","authors":"Hongjun Duan, Qingwei Li","doi":"10.1109/GrC.2013.6740385","DOIUrl":"https://doi.org/10.1109/GrC.2013.6740385","url":null,"abstract":"This paper illustrates the benefits of a multivariable control approach applied to a sugar precipitation process for Chinese medicine mixed solution. This relevant approach proposes setpoints tracking for the crystal mass/concentration couple. In this purpose, a model dedicated to the stage precipitation is designed, without consideration of crystal size distribution. The performance of the proposed control strategy, which application to sucrose and glucose precipitation constitutes a real novelty, is tested via simulation. The good performance in setpoints tracking allows to consider a significant improvement of the precipitation productivity.","PeriodicalId":415445,"journal":{"name":"2013 IEEE International Conference on Granular Computing (GrC)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133621808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The construction of general type-2 fuzzy sets","authors":"D. Hu, T. Lin, Qiang Fan","doi":"10.1109/GrC.2013.6740396","DOIUrl":"https://doi.org/10.1109/GrC.2013.6740396","url":null,"abstract":"Focus on constructing of general type-2 fuzzy set, the essence of type-n fuzzy sets are discovered. We first proved the consistency between interval estimation and nested sets representation theorem of type-1 fuzzy sets, which guarantees the rationality of our methods in this paper. Then, based on the fact that a type-1 fuzzy set can be constructed by a collection of intervals, an algorithm for constructing general type-2 fuzzy sets based on the collections of interval type-2 fuzzy sets was proposed. Furthermore, a new concept, interval type-2 fuzzy sets with uncertain bounds, was defined. And the ways for constructing general type-2 fuzzy sets by give interval type-2 fuzzy sets with uncertain bounds and constructing interval type-2 fuzzy sets with uncertain bounds by given general type-2 fuzzy sets were proposed. Finally, from the viewpoint of uncertain bounds, the essence of type-n fuzzy sets was discussed.","PeriodicalId":415445,"journal":{"name":"2013 IEEE International Conference on Granular Computing (GrC)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121624999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An error analysis on locally linear embedding","authors":"Peng Zhang, Chunbo Fan, Yuanyuan Ren, Zhou Sun","doi":"10.1109/GrC.2013.6740451","DOIUrl":"https://doi.org/10.1109/GrC.2013.6740451","url":null,"abstract":"Locally linear embedding (LLE) has been proved to an efficient tool for nonlinear dimensionality reduction. It is an unsupervised learning method with various attractive properties, such as few parameters to select and non prone to local minima. However, few works have been done on analyzing learning errors for LLE. In this paper, we conduct an error analysis on the LLE method and show that under what conditions LLE would be able to correctly discover the underlying manifold structure. Besides, we also present reconstruction errors between the local weights in the embedding and the ambient space, which is crucial to the success of LLE.","PeriodicalId":415445,"journal":{"name":"2013 IEEE International Conference on Granular Computing (GrC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124267164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ying Gao, Lingxi Peng, Fufang Li, Miao Liu, Waixi Liu
{"title":"Multi-objective opposition-based learning fully informed particle swarm optimizer with favour ranking","authors":"Ying Gao, Lingxi Peng, Fufang Li, Miao Liu, Waixi Liu","doi":"10.1109/GrC.2013.6740391","DOIUrl":"https://doi.org/10.1109/GrC.2013.6740391","url":null,"abstract":"Some particle swarm optimization(PSO) algorithms have been proposed in recent past to tackle the multi-objective optimization problems based on the concept of Pareto optimality. In this paper, we propose a new opposition-based learning fully informed particle swarm optimizer with favour ranking to solve multi-objective optimization problems. Instead of Pareto dominance, favour ranking is used to identify the best individuals in order to guide the search process in the proposed algorithm. Different from other multi-objective PSO, particles in swarm only have position without velocity and the personal best position gets updated using opposition-based learning and favour ranking. Besides, all personal best positions are considered to update particle position. Because of discarding the particle velocity and using full information and favour ranking, the algorithm is the simpler and more effective. The proposed algorithm is applied to some well-known benchmarks. Convergence metric, diversity metric are used to evaluate the performance of the algorithm. The experimental results show that the algorithm is effective on the benchmark functions.","PeriodicalId":415445,"journal":{"name":"2013 IEEE International Conference on Granular Computing (GrC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115513965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A secure query method for EPCGlobal networks","authors":"Ge Fu, Xinran Liu, Hong Zhang","doi":"10.1109/GrC.2013.6740389","DOIUrl":"https://doi.org/10.1109/GrC.2013.6740389","url":null,"abstract":"EPCGlobal network is an RFID-enabled supply chain network which provides automatic data sharing for supply chain partners. EPCGlobal network improves the visibility of supply chains, but also magnifies the security and privacy concerns. There is a common view that there should be different visibility for different roles in EPCGlobal networks. Therefore, A secure query method should be proposed to enhance the security of EPCGlobal networks. In this paper, based on the formal model of EPCGlobal network, we propose a set of innovative framework of role-based access control policies to enhance the security of EPCGlobal networks. We implement a secure query method by using approach of “user-permission assignment during query”. The soundness and completeness properties are given for our secure query method.","PeriodicalId":415445,"journal":{"name":"2013 IEEE International Conference on Granular Computing (GrC)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127066740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Measurement and analysis of Shanghai Xinmin microblog website","authors":"Jian Wang, Xiaolin Xu, Xiaoming Hu, Yinchun Yang, Xiumei Wu","doi":"10.1109/GrC.2013.6740432","DOIUrl":"https://doi.org/10.1109/GrC.2013.6740432","url":null,"abstract":"Microblog is one of the most typical applications on Web 2.0 Internet. It enables its users to publish their own microblogs and also facilitates tracking microblogs of other users. There are many microblog websites on Internet, including Twitter, G+, Sina microblog, and Shanghai Xinmin. As huge numbers of users participate microblog websites, an ever-increasing scale of information is added into these websites. This paper measures Shanghai Xinmin microblog website, and reveals behavior of its users as well as corresponding social structure among its users.","PeriodicalId":415445,"journal":{"name":"2013 IEEE International Conference on Granular Computing (GrC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126739430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Haihui Xu, Pengpeng Zhao, Jian Wu, Zhiming Cui, Chengchao Li
{"title":"Integrating multiple information of active learning for image classification","authors":"Haihui Xu, Pengpeng Zhao, Jian Wu, Zhiming Cui, Chengchao Li","doi":"10.1109/GrC.2013.6740439","DOIUrl":"https://doi.org/10.1109/GrC.2013.6740439","url":null,"abstract":"In the application of image classification, active learning algorithm can effectively alleviate the efforts of labeling by selecting the most informative instances for user annotation, as well as obtain a satisfactory classifier. Traditional active learning methods do not consider the cost of manual labeling, which is usually regarded as the same. They focus on minimizing the classification error, aiming at improving the classifier performance. However, in fact, the user annotation cost is not equal and changes dynamically. We introduce the value of the information framework to measure the instance informativeness, which including misclassification risk and the cost of user annotation. While the value of information is based on probability over the current classifier, only taking into the labeled examples account, thus it may query the outliers. In order to simultaneously lever the distribution information of a large amount of the remaining unlabeled instances, we use information density to measure the representativeness of the sample. To this end, we propose an integrating multiple information of active learning method for image classification (IMIM), which incorporates the strength of both value of information and information density measure criteria by a heuristic weighting strategy. At last, select the most informative instance by the expected error reduction method. Compared with the state of art method, experimental results on diverse datasets demonstrate the effectiveness of our proposed method.","PeriodicalId":415445,"journal":{"name":"2013 IEEE International Conference on Granular Computing (GrC)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127391313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}