Data Mining with Linguistic Thresholds

Size: px
Start display at page:

Download "Data Mining with Linguistic Thresholds"

Transcription

1 Int. J. Contemp. Math. Science, Vol. 7, 22, no. 35, Data Mining with Linguitic Threhold Tzung-Pei Hong Department of Electrical Engineering National Univerity of Kaohiung Kaohiung, Taiwan, R.O.C. Ming-Jer Chiang Intitute of Information Engineering I-Shou Univerity Kaohiung, Taiwan, R.O.C. Shyue-Liang Wang Department of Computer Science New York Intitute of Technology New York, USA Abtract Data mining i the proce of extracting deirable knowledge or intereting pattern from exiting databae for pecific purpoe. In the pat, the minimum upport and minimum confidence were et at numerical value. Linguitic minimum upport and minimum confidence value are, however, more natural and undertandable for human being. Thi paper thu attempt to propoe a new mining approach for extracting intereting weighted aociation rule from tranaction, when the parameter needed in the mining proce are given in linguitic term. Item are alo evaluated by manager a linguitic term to reflect their importance, which are then tranformed a fuzzy et of weight. Fuzzy operation including fuzzy ranking are then ued to find weighted large itemet and aociation rule.

2 72 Tzung-Pei Hong, Ming-Jer Chiang and Shyue-Liang Wang Mathematic Subject Claification: 62-7 Keyword: aociation rule, data mining, weighted item, fuzzy et, fuzzy ranking Introduction Knowledge dicovery in databae (KDD) ha become a proce of coniderable interet in recent year a the amount of data in many databae h grown tremendouly large. The KDD proce generally conit of three phae: pre-proceing, data mining and pot-proceing [, 4, 5, 26]. Among them, data mining play a critical role to KDD. Recently, the fuzzy et theory ha been ued more and more frequently in intelligent ytem becaue of it implicity and imilarity to human reaoning [35, 36]. The theory ha been applied in field uch a manufacturing, engineering, diagnoi, economic, among other [7, 23, 25, 35]. Several fuzzy learning algorithm for inducing rule from given et of data h been deigned and ued to good effect with pecific domain [5, 7, 3, 6, 8-2, 29-3]. Strategie baed on deciion tree were propoed in [9, -2, 27-29, 32-33], and baed on verion pace were propoed in [3]. Fuzzy mining approache were propoed in [8, 22, 24, 34]. In the pat, the minimum upport and minimum confidence value were numerical. In thi paper, linguitic minimum upport and minimum confidence value are given, which are more natural and undertandable for human being. Alo, item may h different importance, which i evaluated by manager or expert a linguitic term. A novel mining algorithm i then propoed to find weighted linguitic aociation rule from tranaction data. It firt tranform linguitic weighted item, minimum upport and minimum confidence into fuzzy et, then filter weighted large itemet out by fuzzy operation. Weighted aociation rule with linguitic upport and confidence are then derived from the weighted large itemet. The remaining part of thi paper are organized a follow. Several approache for mining aociation rule are reviewed in Section 2. Fuzzy et and operation are introduced in Section 3. The notation ued in thi paper i defined in Section 4. The propoed weighted data-mining algorithm for linguitic minimum upport and confidence are decribed in Section 5. An example i given to illutrate the propoed mining algorithm in Section 6. Concluion and propoal of future work are given in Section 7. 2 Review of Mining Aociation Rule Agrawal and hi co-worker propoed everal mining algorithm baed on the concept of large itemet to find aociation rule in tranaction data [-4]. They divided the mining proce into two phae. In the firt phae, candidate itemet were generated and counted by canning the tranaction data. If the number of an itemet appearing in the tranaction wa larger than a pre-defined threhold value

3 Data mining with linguitic threhold 73 (called minimum upport), the itemet wa conidered a large itemet. Itemet containing only one item were proceed firt. Large itemet containing only ingle item were then combined to form candidate itemet containing two item. Thi proce wa repeated until all large itemet had been found. In the econd phae, aociation rule were induced from the large itemet found in the firt phae. All poible aociation combination for each large itemet were formed, and thoe with calculated confidence value larger than a predefined threhold (called minimum confidence) were output a aociation rule. Cai et al. then propoed weighted mining to reflect different importance to different item [6]. Each item wa attached a numerical weight given by uer. Weighted upport and weighted confidence were then defined to determine intereting aociation rule. Yue et al. then extended their concept to fuzzy item vector [34]. In thi paper, the fuzzy concept are ued to repreent item importance, minimum upport and minimum confidence. Thee parameter are expreed in linguitic term, which are more natural and undertandable for human being. 3 Review of Related Fuzzy Concept Fuzzy et theory wa firt propoed by Zadeh and Goguen in 965 [36]. A function called the memberhip function, μ A (), x i defined for mapping a member x to a memebrhip degree between to. Triangular memberhip function are commonly ued and can be denoted by A = (a, b, c), where a b c (Figure ). The abcia b repreent the variable value with the maximal grade of memberhip value, i.e. μ A (b)=; a and c are the lower and upper bound of the available area. They are ued to reflect the fuzzine of the data. u A (x) a b c X Figure : A triangular memberhip function There are a variety of fuzzy et operation. Among them, three baic and commonly ued operation are complement, union and interection. Fuzzy ranking i ued to determine the order of fuzzy et and i thu quite important to actual application. Several fuzzy ranking method h been propoed in the literature. The ranking method uing gravitie i ued in the paper.

4 74 Tzung-Pei Hong, Ming-Jer Chiang and Shyue-Liang Wang 4 Notation The notation ued in thi paper i defined a follow. n: the total number of tranaction data; m: the total number of item; k: the total number of manager; A i : the i-th item, i m; W i,j : the tranformed fuzzy weight for importance of item A i, evaluated by the j-th manager; W i : the fuzzy rage weight for importance of item A i ; W : the fuzzy weight for importance of itemet ; connt i : the number of item A i appearing in the n tranaction; α : the predefined linguitic minimum upport value; β : the predefined linguitic minimum confidence value; I j : the j-th memberhip function of importance; I : the fuzzy rage weight of all poible linguitic term of importance; wup i : the fuzzy weighted upport of item A i; wconf R : the fuzzy weighted confidence of rule R ; minup: the tranformed fuzzy et from the linguitic minimum upport value α ; wminup: the fuzzy weighted et of minimum upport; minconf: the tranformed fuzzy et from the linguitic minimum confidence value β ; wminconf: the fuzzy weighted et of minimum confidence; C r : the et of candidate itemet with r item; L : the et of large itemet with r item. r 5 Weighted Data Mining for Linguitic Minimum Support and Minimum Confidence In thi ection, the fuzzy concept are ued to repreent item importance, minimum upport and minimum confidence. The propoed mining algorithm firt ue the et of memberhip function for importance to tranform manager linguitic evaluation of item importance into fuzzy weight. The fuzzy weight of an item from different manger are then raged. The algorithm then calculate the weighted count of all item from the tranaction data and according to the rage fuzzy weight of item. The given linguitic minimum upport value i alo tranformed into a fuzzy weighted et. All weighted large -itemet can thu be found by ranking the fuzzy weighted upport of each item with fuzzy weighted minimum upport. After that, candidate 2-itemet are formed from the weighted large -itemet and the ame procedure i ued to find all weighted large 2-itemet. Thi procedure i repeated until all weighted large itemet h been found. The fuzzy weighted confidence from large itemet are then calculated to find intereting aociation rule. Detail of the propoed mining algorithm are decribed below.

5 Data mining with linguitic threhold 75 The algorithm: INPUT: A et of n tranaction data, a et of m item with their importance evaluated by k manager, three et of memberhip function repectively for importance, minimum upport and minimum confidence, a pre-defined linguitic minimum upport value α, and a pre-defined linguitic minimum confidence value β. OUTPUT: A et of weighted aociation rule. STEP : Tranform each linguitic term of importance for item A i, i m, which i evaluated by the j-th manager into a fuzzy et W i,j of weight, uing the given memberhip function of item importance. STEP 2: Calculate the fuzzy rage weight addition a: W of each item A i by fuzzy i k W i = k j= W i, j. STEP 3: Calculate the number (count i ) of each item A i appearing in the et of tranaction. STEP 4: Calculate the fuzzy weighted upport wup i of each item A i a: counti Wi wup i =, n where n i the number of tranaction. STEP 5: Tranform the given linguitic minimum upport value α into a fuzzy et minup of minimum upport, uing the given memberhip function of minimum upport. STEP 6: Calculate the fuzzy weighted et (wminup) of the given minimum upport value a: wminup = minup (the gravity of I ), where I = m I j j= with I j being the j-th memberhip function of importance. I repreent the fuzzy rage weight of all poible linguitic term of importance. STEP 7: Check whether the weighted upport (wup i ) of each item A i i larger than or equal to the fuzzy weighted minimum upport (wminup) by fuzzy ranking. Any fuzzy ranking approach can be applied here a long a it can generate a crip rank. If wup i i equal to or greater than wminup, put A i in the et of large -itemet L. STEP 8: Set r =, where r i ued to repreent the number of item kept in the current large itemet. STEP 9: Generate the candidate et C r+ from L r in a way imilar to that in the apriori algorithm [4]. That i, the algorithm firt join L r and L r auming that r- item in the two itemet are the ame and the other one i different. It then keep in C r+ the itemet, which h all their m,

6 76 Tzung-Pei Hong, Ming-Jer Chiang and Shyue-Liang Wang ub-itemet of r item exiting in L r. STEP : Do the following ubtep for each newly formed (r+)-itemet with item (, 2,, r+ ) in C r+ : (a) Calculate the fuzzy weight W W of itemet a: = W Λ W ΛK ΛW, 2 r+ where W i i the fuzzy rage weight of item i, calculated in STEP 2. If the minimum operation i ued for the interection, then: W r+ = MinW i= (b) Calculate the number ( count ) of itemet appearing in the tranaction data. (c) Calculate the weighted upport wup of itemet a: W count wup =, n where n i the number of tranaction. (d) Check whether the weighted upport wup of itemet i greater than or equal to the fuzzy weighted minimum upport wminup by fuzzy ranking. If wup i greater than or equal to wminup, put in the et of large (r+)-itemet L r+. STEP : IF L r+ i null, then do the next tep; otherwie, et r = r+ and repeat Step 9-. STEP 2: Tranform the given linguitic minimum confidence value β into a fuzzy et minconf of minimum confidence, uing the given memberhip function of minimum confidence. Step 3: Calculate the fuzzy weighted et (wminconf) of the given minimum confidence value a: wminconf = minconf (the gravity of I ), where I i the ame a that calculated in Step 6. STEP 4: Contruct the aociation rule from each weighted large q-itemet with item (, 2,, q ), q 2, uing the following ubtep: (a) Form all poible aociation rule a follow: Λ... Λ j Λ j + Λ... Λ q j, j = to q. (b) Calculate the weighted confidence value wconf R of each poible aociation rule R a: i wconf R count = count j W. (c) Check whether the weighted confidence wconf R of aociation rule R i greater than or equal to the fuzzy weighted minimum confidence wminconf by fuzzy ranking. If wconf R i greater than or equal to wminconf, keep rule R in the intereting rule et. STEP 5: For each rule R with weighted upport wup R and weighted confidence

7 Data mining with linguitic threhold 77 wconf R in the intereting rule et, find the linguitic minimum upport region S i and the linguitic minimum confidence region C j with wminup i- wup R < wminup i and wminconf j- wconf R < wminconf j by fuzzy ranking, where: wminup i = minup i (the gravity of I ), wminconf j = minconf j (the gravity of I ), minup i i the given memberhip function for S i and minconf j i the given memberhip function for C j. Output rule R with linguitic upport value S i and linguitic confidence value C j. The rule output after tep 5 can erve a meta-knowledge concerning the given tranaction. 6 An Example In thi ection, an example i given to illutrate the propoed data-mining algorithm. Thi i a imple example to how how the propoed algorithm can be ued to generate weighted aociation rule from a et of tranaction. The data et include ten tranaction, a hown in Table. Table : The data et ued in thi example TID Item ABC 2 ACE 3 ABF 4 BCD 5 BCE 6 ABDE 7 ABCE 8 ABCEF 9 ABCEF BCDEF Each tranaction i compoed of a tranaction identifier and item purchaed. There are ix item, repectively being A, B, C, D, E and F, to be purchaed. The importance of the item i evaluated by three manager a hown in Table 2. Table 2: The item importance evaluated by three manager Item Manager Manger2 Manager3 A Important Ordinary Ordinary B Very Important Important Important C Ordinary Important Important D Unimportant Unimportant Very Important E Important Important Important F Unimportant Unimportant Ordinary

8 78 Tzung-Pei Hong, Ming-Jer Chiang and Shyue-Liang Wang Aume the memberhip function for item importance are given in Figure 2. In Figure 2, item importance i divided into five fuzzy region: Very Unimportant, Unimportant, Ordinary, Important and Very Important. Each fuzzy region i repreented by a memberhip function. For implicity, triangular memberhip function are ued here. The memberhip function in Figure 2 can be repreented a follow: Very Unimportant (VU): (,,.25), Unimportant (U): (,.25,.5), Ordinary (O): (.25,.5,.75), Important (I): (5, 75, ), and Very Important (VI): (.75,, ). Unimportant Important Very Unimportant Ordinary Memberhip value Very Important Weight Figure 2: The memberhip function of item importance ued in thi example For the training data given in Table, the propoed mining algorithm proceed a follow. Step : The linguitic term for item importance given in Table 2 are tranformed into fuzzy et by the memberhip function in Figure 2. For example, item A i evaluated to be important by Manager, and can then be tranformed a a triangular fuzzy et (.5,.75, ) of weight. The tranformed reult for Table 2 are hown in Table 3. Table 3: The fuzzy weight tranformed from the item importance in Table 2. Item Manager Manger2 Manager3 A (.5,.75,) (.25,.5,.75) (.25,.5,.75) B (.75,, ) (.5,.75,) (.5,.75,) C (.25,.5,.75) (.5,.75,) (.5,.75,) D (,.25,.5) (,.25,.5) (.75,, ) E (.5,.75,) (.5,.75,) (.5,.75,) F (,.25,.5) (,.25,.5) (.25,.5,.75) Step 2: The rage weight of each item i calculated by fuzzy addition. The reult are hown in Table 4.

9 Data mining with linguitic threhold 79 Table 4: The rage fuzzy weight of all the item Very Low Low Middle High Very High Memberhip value Item Average Fuzzy Weight A (.333,.583,.833) B (.583,.833, ) C (.47,.667,.97) D (,.67,.47) E (.5,.75, ) F (.83,.333,.583) Minimum upport Step 3: The appearing number (count) of each item i counted from the tranaction in Table. Reult for all the item are hown in Table 5. Table 5: The count of all the item Item Count A 7 B 9 C 8 D 3 E 7 F 4 Step 4: The weighted upport of each item i calculated. Reult for all the item are hown in Table 6. Table 6: The weighted upport of all the item Item Weighted Support A (.233,.48,.583) B (.525,.75,.9) C (.333,.533,.733) D (,.5,.25) E (.35,.525,.7) F (.33,.33,.233) Step 5: The given linguitic minimum upport value i tranformed into a fuzzy et of minimum upport. Aume the memberhip function for minimum upport are given in Figure 3.

10 72 Tzung-Pei Hong, Ming-Jer Chiang and Shyue-Liang Wang Very Low Low Middle High Very High Memberhip value Minimum upport Figure 3: The memberhip function of minimum upport Alo aume the given linguitic minimum upport value i High. It i then tranformed into a fuzzy et of minimum upport, (.5,.75, ), according to the given memberhip function in Figure 3. Step 6: The fuzzy rage weight of all poible linguitic term of importance in Figure 3 i firt calculated a: I = [(,,.25) + (,.25,.5) + (.25,.5,.75) + (.5,.75, ) +(.75,, )]/5 = (.3,.5,.7). The gravity of I i then ( )/3, which i.5. The fuzzy weighted et of minimum upport for High i then (.5,.75, ).5, which i (.25,.375,.5). Step 7: The weighted upport of each item i compared with the fuzzy weighted minimum upport by fuzzy ranking. Aume the gravity ranking approach i adopted in thi example. Take Item A a an example. The rage height of the weighted upport for item A i ( )/3, which i.48. The rage height of the fuzzy weighted minimum upport i ( )/3, which i.375. Since.48 >.375, A i thu a large weighted -itemet. Similarly, B, C and E are large weighted -itemet. Thee -itemet are put in L. Step 8: r i et at, where r i ued to tore the number of item kept in the current itemet. Step 9: The candidate et C r+ i generated from L r. C 2 i then firt generated from L a follow: (A, B), (A, C), (A, E), (B, C), (B, E) and (C, E). Step : The following ubtep are done for each newly formed candidate itemet in C 2. (a) The fuzzy weight of all the itemet in C 2 are calculated. Here, the minimum operator i ued for interection. Take Itemet (A, B) a an example. It fuzzy weighted upport value i calculated a min((.333,.583,.833), (.583,.833, )), which i (.333,.583,.833). The reult for all the 2-itemet are hown in Table 7.

11 Data mining with linguitic threhold 72 Table 7: The fuzzy weight of the 2-itemet in C 2. Itemet Fuzzy Weight (A, B) (.333,.583,.833) (A, C) (.333,.583,.833) (A, E) (.333,.583,.833) (B, C) (.47,.667,.97) (B, E) (.5,.75, ) (C, E) (.47,.667,.97) (b) The calar cardinality (count) of each candidate 2-itemet i counted from the tranaction data. Reult for thi example are hown in Table 8. Table 8: The count of the itemet in C 2. Itemet Count (A, B) 6 (A, C) 5 (A, E) 5 (B, C) 7 (B, E) 5 (C, E) 6 (c) The weighted upport of each candidate 2-itemet i calculated. Take (A, B) a an example. The minimum fuzzy weight of (A, B) i (.333,.583,.833) and the count i 6. It weighted upport i then (.333,.583,.833)*6/, which i (.2,.35,.5). All the weighted upport of the candidate 2-itemet are hown in Table 9. Table 9: The weighted upport of the 2-item Itemet Fuzzy Weight (A, B) (.2,.35,.5) (A, C) (.67,.292,.47) (A, E) (.67,.292,.47) (B, C) (.292,.467,.642) (B, E) (.25,.375,.5) (C, E) (.25,.4,.55) (d) The weighted upport of each candidate 2-itemet i compared with the fuzzy weighted minimum upport by fuzzy ranking. A mentioned above, the gravity ranking approach i adopted in thi example. (B, C), (B, E) and (C, E) are then found to be large weighted 2-itemet. Thee 2-itemet are put in L 2. Step : Since L 2 i not null in the example, r = r + = 2. Step 9 to are repeated to find L 3. C 3 i then generated from L 2. Only the 3-itemet (B, C, E) i formed in thi example. The rage height of it fuzzy weighted upport i.34, maller than.375. It i not put in L 3, and L 3 i thu an empty et.

12 722 Tzung-Pei Hong, Ming-Jer Chiang and Shyue-Liang Wang Step 2: The given linguitic minimum confidence value i tranformed into a fuzzy et of minimum confidence. Aume the memberhip function for minimum confidence value are hown in Figure 4, which are imilar to thoe in Figure 3. Memberhip value Very Low Low Middle High Very High Minimum confidence Figure 4: The memberhip function of minimum confidence Alo aume the given linguitic minimum confidence value i High. It i then tranformed into a fuzzy et of minimum confidence, (.5,.75, ), according to the given memberhip function in Figure 4. Step 3: The fuzzy rage weight of all poible linguitic term of importance i the ame a that found in Step 5. It gravity i thu.5. The fuzzy weighted et of minimum confidence for High i then (.5,.75, ).5, which i (.25,.375,.5). Step 4: The aociation rule from each large itemet are contructed by uing the following ubtep. (a) All poible aociation rule are formed a follow: If B, then C; If C, then B; If B, then E; If E, then B; If C, then E; If E, then C. (b) The weighted confidence factor for the above poible aociation rule are calculated. Take the firt poible aociation rule a an example. The count of B and B C are repectively.9 and.7, and the fuzzy weight of B C i (.47,.667,.97). The weighted confidence factor for the aociation rule If B, then C i then:.7.9 (.47,.667,.97) = (.324,.59,.73). (c) The weighted confidence of each aociation rule i compared with the fuzzy weighted minimum confidence by fuzzy ranking. A. In thi example, the following ix rule are put in the intereting rule et:. If B i bought then C i bought; 2. If C i bought then B i bought; 3. If B i bought then E i bought; 4. If E i bought then B i bought; 5. If C i bought then E i bought;

13 Data mining with linguitic threhold If E i bought then C i bought. STEP 5: The linguitic upport and confidence value are found for each rule R. Take the third intereting aociation rule "If B, then E a an example. It weighted upport i (.25,.375,.5) and weighted confidence i (.278,.47,.556). Since the memberhip function for linguitic minimum upport region High i (.5,.75, ) and for Very High i (.75,, ). The weighted fuzzy et for thee two region are (.25,.375,.5) and (.375,.5,.5). Since (.25,.375,.5) (.25,.375,.5) < (.375,.5,.5) by fuzzy ranking, the linguitic upport value for Rule R i then High. Similarly, the linguitic confidence value for Rule R i High. All the ix intereting aociation rule are then output a:. If B i bought then C i bought, with a very high upport and a very high confidence; 2. If C i bought then B i bought, with a very high upport and a very high confidence; 3. If B i bought then E i bought, with a high upport and a high confidence; 4. If E i bought then B i bought, with a high upport and a very high confidence; 5. If C i bought then E i bought, with a very high upport and a very high confidence; 6. If E i bought then C i bought, with a very high upport and a very high confidence. The ix rule above are thu output a meta-knowledge concerning the given weighted tranaction. 7 Concluion and Future Work In thi paper, we h propoed a new weighted data-mining algorithm to find intereting aociation rule with linguitic upport and confidence. Item are evaluated by manager a linguitic term, which are then tranformed and raged a fuzzy et of weight. Fuzzy operation including fuzzy ranking are ued to find weighted large itemet and aociation rule. Compared to previou mining approache, the propoed one ha linguitic input and output, which are more natural and undertandable for human being. Acknowledgement. Thi reearch wa upported by the National Science Council of the Republic of China under contract NSC E Reference [] R. Agrawal, T. Imielinki and A. Swami, Mining aociation rule between et of item in large databae, The 993 ACM SIGMOD Conference, Wahington DC, USA, 993. [2] R. Agrawal, T. Imielinki and A. Swami, Databae mining: a performance perpective, IEEE Tranaction on Knowledge and Data Engineering, Vol. 5, No. 6, 993,

14 724 Tzung-Pei Hong, Ming-Jer Chiang and Shyue-Liang Wang [3] R. Agrawal, R. Srikant and Q. Vu, Mining aociation rule with item contraint, The Third International Conference on Knowledge Dicovery in Databae and Data Mining, Newport Beach, California, Augut 997. [4] R. Agrawal and R. Srikant, Fat algorithm for mining aociation rule, The International Conference on Very Large Databae, 994, [5] A. F. Blihun, Fuzzy learning model in expert ytem, Fuzzy Set and Sytem, Vol. 22, 987, [6] C. H. Cai, W. C. Fu, C. H. Cheng and W. W. Kwong, Mining aociation rule with weighted item, The International Databae Engineering and Application Sympoium, 998, [7] L. M. de Campo and S. Moral, Learning rule for a fuzzy inference model, Fuzzy Set and Sytem, Vol. 59, 993, [8] K. C. C. Chan and W. H. Au, Mining fuzzy aociation rule, The 6th ACM International Conference on Information and Knowledge Management, 997, [9] R. L. P. Chang and T. Pavliddi, Fuzzy deciion tree algorithm, IEEE Tranaction on Sytem, Man and Cybernetic, Vol. 7, 977, [] M. S. Chen, J. Han and P. S. Yu, Data mining: an overview from a databae perpective, IEEE Tranaction on Knowledge and Data Engineering, Vol. 8, No.6, 996, [] C. Clair, C. Liu and N. Piinou, Attribute weighting: a method of applying domain knowledge in the deciion tree proce, The Seventh International Conference on Information and Knowledge Management, 998, [2] P. Clark and T. Niblett, The CN2 induction algorithm, Machine Learning, Vol. 3, 989, [3] M. Delgado and A. Gonzalez, An inductive learning procedure to identify fuzzy ytem, Fuzzy Set and Sytem, Vol. 55, 993, [4] A. Famili, W. M. Shen, R. Weber and E. Simoudi, Data preproceing and intelligent data analyi, Intelligent Data Analyi, Vol., No., 997. [5] W. J. Frawley, G. Piatetky-Shapiro and C. J. Matheu, Knowledge dicovery in databae: an overview, The AAAI Workhop on Knowledge Dicovery in Databae, 99, -27. [6] A.Gonzalez, A learning methodology in uncertain and imprecie environment, International Journal of Intelligent Sytem, Vol., 995, [7] I. Graham and P. L. Jone, Expert Sytem Knowledge, Uncertainty and Deciion, Chapman and Computing, Boton, 988, [8] T. P. Hong and J. B. Chen, Finding relevant attribute and memberhip function, Fuzzy Set and Sytem, Vol.3, No. 3, 999, [9] T. P. Hong and J. B. Chen, Proceing individual fuzzy attribute for fuzzy rule induction, accepted and to appear in Fuzzy Set and Sytem. [2] T. P. Hong and C. Y. Lee, Induction of fuzzy rule and memberhip function from training example, Fuzzy Set and Sytem, Vol. 84, 996, pp [2] T. P. Hong and S. S. Teng, A generalized verion pace learning algorithm for noiy and uncertain data, IEEE Tranaction on Knowledge and Data Engineering, Vol. 9, No. 2, 997, [22] T. P. Hong, C. S. Kuo and S. C. Chi, Mining aociation rule from quantitative data, Intelligent Data Analyi, Vol. 3, No. 5, 999, [23] A. Kandel, Fuzzy Expert Sytem, CRC Pre, Boca Raton, 992, 8-9.

15 Data mining with linguitic threhold 725 [24] C. M. Kuok, A. W. C. Fu and M. H. Wong, Mining fuzzy aociation rule in databae, The ACM SIGMOD Record, Vol. 27, No., 998, [25] E. H. Mamdani, Application of fuzzy algorithm for control of imple dynamic plant, IEEE Proceeding, 974, [26] H. Mannila, Method and problem in data mining, The International Conference on Databae Theory, 997. [27] J. R. Quinlan, Deciion tree a probabilitic claifier, The Fourth International Machine Learning Workhop, Morgan Kaufmann, San Mateo, CA, 987, [28] J. R. Quinlan, C4.5: Program for Machine Learning, Morgan Kaufmann, San Mateo, CA, 993. [29] J. Rive, FID3: fuzzy induction deciion tree, The Firt International ympoium on Uncertainty, Modeling and Analyi, 99, [3] C. H. Wang, T. P. Hong and S. S. Teng, Inductive learning from fuzzy example, The fifth IEEE International Conference on Fuzzy Sytem, New Orlean, 996, 3-8. [3] C. H. Wang, J. F. Liu, T. P. Hong and S. S. Teng, A fuzzy inductive learning trategy for modular rule, Fuzzy Set and Sytem, Vol. 3, No., 999, 9-5. [32] R.Weber, Fuzzy-ID3: a cla of method for automatic knowledge acquiition, The Second International Conference on Fuzzy Logic and Neural Network, Iizuka, Japan, 992, [33] Y. Yuan and M. J. Shaw, Induction of fuzzy deciion tree, Fuzzy Set and Sytem, Vol. 69, 995, [34] S. Yue, E. Tang, D. Yeung and D. Shi, Mining fuzzy aociation rule with weighted item, The IEEE International Conference on Sytem, Man and Cybernetic, 2, [35] L. A. Zadeh, Fuzzy logic, IEEE Computer, 988, [36] L. A. Zadeh, Fuzzy et, Information and Control, Vol. 8, No. 3, 965, Received: April, 22

Fuzzy Weighted Data Mining from Quantitative Transactions with Linguistic Minimum Supports and Confidences

Fuzzy Weighted Data Mining from Quantitative Transactions with Linguistic Minimum Supports and Confidences International Journal of Fuzzy Systems, Vol. 8, No. 4, December 26 73 Fuzzy Weighted Data Mining from Quantitative Transactions with Linguistic Minimum Supports and Confidences Tzung-Pei Hong, Ming-Jer

More information

The fuzzy data mining generalized association rules for quantitative values

The fuzzy data mining generalized association rules for quantitative values The fuzzy data mining generalized association rules for quantitative values Tzung-Pei Hong* and Kuei-Ying Lin Graduate School of Information Engineering I-Shou University Kaohsiung, 84008, Taiwan, R.O.C.

More information

A Fast Association Rule Algorithm Based on Bitmap Computing with Multiple Minimum Supports using Maximum Constraints

A Fast Association Rule Algorithm Based on Bitmap Computing with Multiple Minimum Supports using Maximum Constraints A Fat Aociation Rule Algorithm Baed on Bitmap Computing with Multiple Minimum Support uing Maximum Contraint Jyothi Patil, and Dr. V.D.Mytri Abtract Mining aociation rule from databae i a timeconuming

More information

A Multi-objective Genetic Algorithm for Reliability Optimization Problem

A Multi-objective Genetic Algorithm for Reliability Optimization Problem International Journal of Performability Engineering, Vol. 5, No. 3, April 2009, pp. 227-234. RAMS Conultant Printed in India A Multi-objective Genetic Algorithm for Reliability Optimization Problem AMAR

More information

A Fast Association Rule Algorithm Based On Bitmap and Granular Computing

A Fast Association Rule Algorithm Based On Bitmap and Granular Computing A Fat Aociation Rule Algorithm Baed On Bitmap and Granular Computing T.Y.Lin Xiaohua Hu Eric Louie Dept. of Computer Science College of Information Science IBM Almaden Reearch Center San Joe State Univerity

More information

An Overview of Mining Fuzzy Association Rules

An Overview of Mining Fuzzy Association Rules An Overview of Mining Fuzzy Association Rules Tzung-Pei Hong and Yeong-Chyi Lee Abstract Data mining is the process of extracting desirable knowledge or interesting patterns from existing databases for

More information

UNCORRECTED PROOF ARTICLE IN PRESS. 1 Expert Systems with Applications. 2 Mining knowledge from object-oriented instances

UNCORRECTED PROOF ARTICLE IN PRESS. 1 Expert Systems with Applications. 2 Mining knowledge from object-oriented instances 1 Expert Systems with Applications Expert Systems with Applications xxx (26) xxx xxx wwwelseviercom/locate/eswa 2 Mining knowledge from object-oriented instances 3 Cheng-Ming Huang a, Tzung-Pei Hong b,

More information

Minimum congestion spanning trees in bipartite and random graphs

Minimum congestion spanning trees in bipartite and random graphs Minimum congetion panning tree in bipartite and random graph M.I. Otrovkii Department of Mathematic and Computer Science St. John Univerity 8000 Utopia Parkway Queen, NY 11439, USA e-mail: otrovm@tjohn.edu

More information

Mining High Average-Utility Itemsets

Mining High Average-Utility Itemsets Proceedings of the 2009 IEEE International Conference on Systems, Man, and Cybernetics San Antonio, TX, USA - October 2009 Mining High Itemsets Tzung-Pei Hong Dept of Computer Science and Information Engineering

More information

Laboratory Exercise 6

Laboratory Exercise 6 Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each type of circuit will be implemented in two

More information

Maintenance of Generalized Association Rules for Record Deletion Based on the Pre-Large Concept

Maintenance of Generalized Association Rules for Record Deletion Based on the Pre-Large Concept Proceedings of the 6th WSEAS Int. Conf. on Artificial Intelligence, Knowledge Engineering and ata Bases, Corfu Island, Greece, February 16-19, 2007 142 Maintenance of Generalized Association Rules for

More information

A reduced reference image quality metric based on feature fusion and neural networks

A reduced reference image quality metric based on feature fusion and neural networks Univerity of Wollongong Reearch Online Faculty of Engineering and Information Science - Paper: Part A Faculty of Engineering and Information Science 2011 A reduced reference image quality metric baed on

More information

Distributed Packet Processing Architecture with Reconfigurable Hardware Accelerators for 100Gbps Forwarding Performance on Virtualized Edge Router

Distributed Packet Processing Architecture with Reconfigurable Hardware Accelerators for 100Gbps Forwarding Performance on Virtualized Edge Router Ditributed Packet Proceing Architecture with Reconfigurable Hardware Accelerator for 100Gbp Forwarding Performance on Virtualized Edge Router Satohi Nihiyama, Hitohi Kaneko, and Ichiro Kudo Abtract To

More information

Universität Augsburg. Institut für Informatik. Approximating Optimal Visual Sensor Placement. E. Hörster, R. Lienhart.

Universität Augsburg. Institut für Informatik. Approximating Optimal Visual Sensor Placement. E. Hörster, R. Lienhart. Univerität Augburg à ÊÇÅÍÆ ËÀǼ Approximating Optimal Viual Senor Placement E. Hörter, R. Lienhart Report 2006-01 Januar 2006 Intitut für Informatik D-86135 Augburg Copyright c E. Hörter, R. Lienhart Intitut

More information

Trainable Context Model for Multiscale Segmentation

Trainable Context Model for Multiscale Segmentation Trainable Context Model for Multicale Segmentation Hui Cheng and Charle A. Bouman School of Electrical and Computer Engineering Purdue Univerity Wet Lafayette, IN 47907-1285 {hui, bouman}@ ecn.purdue.edu

More information

SLA Adaptation for Service Overlay Networks

SLA Adaptation for Service Overlay Networks SLA Adaptation for Service Overlay Network Con Tran 1, Zbigniew Dziong 1, and Michal Pióro 2 1 Department of Electrical Engineering, École de Technologie Supérieure, Univerity of Quebec, Montréal, Canada

More information

Performance of a Robust Filter-based Approach for Contour Detection in Wireless Sensor Networks

Performance of a Robust Filter-based Approach for Contour Detection in Wireless Sensor Networks Performance of a Robut Filter-baed Approach for Contour Detection in Wirele Senor Network Hadi Alati, William A. Armtrong, Jr., and Ai Naipuri Department of Electrical and Computer Engineering The Univerity

More information

Keywords Cloud Computing, Service Level Agreements (SLA), CloudSim, Monitoring & Controlling SLA Agent, JADE

Keywords Cloud Computing, Service Level Agreements (SLA), CloudSim, Monitoring & Controlling SLA Agent, JADE Volume 5, Iue 8, Augut 2015 ISSN: 2277 128X International Journal of Advanced Reearch in Computer Science and Software Engineering Reearch Paper Available online at: www.ijarce.com Verification of Agent

More information

xy-monotone path existence queries in a rectilinear environment

xy-monotone path existence queries in a rectilinear environment CCCG 2012, Charlottetown, P.E.I., Augut 8 10, 2012 xy-monotone path exitence querie in a rectilinear environment Gregory Bint Anil Mahehwari Michiel Smid Abtract Given a planar environment coniting of

More information

UC Berkeley International Conference on GIScience Short Paper Proceedings

UC Berkeley International Conference on GIScience Short Paper Proceedings UC Berkeley International Conference on GIScience Short Paper Proceeding Title A novel method for probabilitic coverage etimation of enor network baed on 3D vector repreentation in complex urban environment

More information

LinkGuide: Towards a Better Collection of Hyperlinks in a Website Homepage

LinkGuide: Towards a Better Collection of Hyperlinks in a Website Homepage Proceeding of the World Congre on Engineering 2007 Vol I LinkGuide: Toward a Better Collection of Hyperlink in a Webite Homepage A. Ammari and V. Zharkova chool of Informatic, Univerity of Bradford anammari@bradford.ac.uk,

More information

Planning of scooping position and approach path for loading operation by wheel loader

Planning of scooping position and approach path for loading operation by wheel loader 22 nd International Sympoium on Automation and Robotic in Contruction ISARC 25 - September 11-14, 25, Ferrara (Italy) 1 Planning of cooping poition and approach path for loading operation by wheel loader

More information

AUTOMATIC TEST CASE GENERATION USING UML MODELS

AUTOMATIC TEST CASE GENERATION USING UML MODELS Volume-2, Iue-6, June-2014 AUTOMATIC TEST CASE GENERATION USING UML MODELS 1 SAGARKUMAR P. JAIN, 2 KHUSHBOO S. LALWANI, 3 NIKITA K. MAHAJAN, 4 BHAGYASHREE J. GADEKAR 1,2,3,4 Department of Computer Engineering,

More information

DAROS: Distributed User-Server Assignment And Replication For Online Social Networking Applications

DAROS: Distributed User-Server Assignment And Replication For Online Social Networking Applications DAROS: Ditributed Uer-Server Aignment And Replication For Online Social Networking Application Thuan Duong-Ba School of EECS Oregon State Univerity Corvalli, OR 97330, USA Email: duongba@eec.oregontate.edu

More information

IMPROVED JPEG DECOMPRESSION OF DOCUMENT IMAGES BASED ON IMAGE SEGMENTATION. Tak-Shing Wong, Charles A. Bouman, and Ilya Pollak

IMPROVED JPEG DECOMPRESSION OF DOCUMENT IMAGES BASED ON IMAGE SEGMENTATION. Tak-Shing Wong, Charles A. Bouman, and Ilya Pollak IMPROVED DECOMPRESSION OF DOCUMENT IMAGES BASED ON IMAGE SEGMENTATION Tak-Shing Wong, Charle A. Bouman, and Ilya Pollak School of Electrical and Computer Engineering Purdue Univerity ABSTRACT We propoe

More information

Hassan Ghaziri AUB, OSB Beirut, Lebanon Key words Competitive self-organizing maps, Meta-heuristics, Vehicle routing problem,

Hassan Ghaziri AUB, OSB Beirut, Lebanon Key words Competitive self-organizing maps, Meta-heuristics, Vehicle routing problem, COMPETITIVE PROBABIISTIC SEF-ORGANIZING MAPS FOR ROUTING PROBEMS Haan Ghaziri AUB, OSB Beirut, ebanon ghaziri@aub.edu.lb Abtract In thi paper, we have applied the concept of the elf-organizing map (SOM)

More information

Karen L. Collins. Wesleyan University. Middletown, CT and. Mark Hovey MIT. Cambridge, MA Abstract

Karen L. Collins. Wesleyan University. Middletown, CT and. Mark Hovey MIT. Cambridge, MA Abstract Mot Graph are Edge-Cordial Karen L. Collin Dept. of Mathematic Weleyan Univerity Middletown, CT 6457 and Mark Hovey Dept. of Mathematic MIT Cambridge, MA 239 Abtract We extend the definition of edge-cordial

More information

A Novel Feature Line Segment Approach for Pattern Classification

A Novel Feature Line Segment Approach for Pattern Classification 12th International Conference on Information Fuion Seattle, WA, USA, July 6-9, 2009 A Novel Feature Line Segment Approach for Pattern Claification Yi Yang Intitute of Integrated Automation Xi an Jiaotong

More information

A GA-based fuzzy mining approach to achieve a trade-off between number of rules and suitability of membership functions

A GA-based fuzzy mining approach to achieve a trade-off between number of rules and suitability of membership functions Soft Comput (26 : 9 DOI.7/s5-6-46-x ORIGINAL PAPER Tzung-Pei Hong Chun-Hao Chen Yu-Lung Wu Yeong-Chyi Lee A GA-based fuzzy mining approach to achieve a trade-off between number of rules and suitability

More information

Web Page Recommendation Approach Using Weighted Sequential Patterns and Markov Model

Web Page Recommendation Approach Using Weighted Sequential Patterns and Markov Model Global Journal of Computer Science and Technology Volume 2 Iue 9 Verion.0 April 202 Type: Double Blind Peer Reviewed International Reearch Journal Publiher: Global Journal Inc. (USA) Online ISSN: 0975-472

More information

Chapter 13 Non Sampling Errors

Chapter 13 Non Sampling Errors Chapter 13 Non Sampling Error It i a general aumption in the ampling theory that the true value of each unit in the population can be obtained and tabulated without any error. In practice, thi aumption

More information

3D SMAP Algorithm. April 11, 2012

3D SMAP Algorithm. April 11, 2012 3D SMAP Algorithm April 11, 2012 Baed on the original SMAP paper [1]. Thi report extend the tructure of MSRF into 3D. The prior ditribution i modified to atify the MRF property. In addition, an iterative

More information

Laboratory Exercise 6

Laboratory Exercise 6 Laboratory Exercie 6 Adder, Subtractor, and Multiplier a a The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each b c circuit will be decribed in Verilog

More information

Combining Web Usage Mining and Fuzzy Inference for Website Personalization

Combining Web Usage Mining and Fuzzy Inference for Website Personalization Combining Web Uage Mining and Fuzzy Inference for Webite Peronalization Olfa Naraoui and Chritopher Petene Dept. of Electrical and Computer Engineering 206 Engineering Science Bldg. The Univerity of Memphi

More information

Key Terms - MinMin, MaxMin, Sufferage, Task Scheduling, Standard Deviation, Load Balancing.

Key Terms - MinMin, MaxMin, Sufferage, Task Scheduling, Standard Deviation, Load Balancing. Volume 3, Iue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Reearch in Computer Science and Software Engineering Reearch Paper Available online at: www.ijarce.com Tak Aignment in

More information

An Efficient Tree-based Fuzzy Data Mining Approach

An Efficient Tree-based Fuzzy Data Mining Approach 150 International Journal of Fuzzy Systems, Vol. 12, No. 2, June 2010 An Efficient Tree-based Fuzzy Data Mining Approach Chun-Wei Lin, Tzung-Pei Hong, and Wen-Hsiang Lu Abstract 1 In the past, many algorithms

More information

Operational Semantics Class notes for a lecture given by Mooly Sagiv Tel Aviv University 24/5/2007 By Roy Ganor and Uri Juhasz

Operational Semantics Class notes for a lecture given by Mooly Sagiv Tel Aviv University 24/5/2007 By Roy Ganor and Uri Juhasz Operational emantic Page Operational emantic Cla note for a lecture given by Mooly agiv Tel Aviv Univerity 4/5/7 By Roy Ganor and Uri Juhaz Reference emantic with Application, H. Nielon and F. Nielon,

More information

A System Dynamics Model for Transient Availability Modeling of Repairable Redundant Systems

A System Dynamics Model for Transient Availability Modeling of Repairable Redundant Systems International Journal of Performability Engineering Vol., No. 3, May 05, pp. 03-. RAMS Conultant Printed in India A Sytem Dynamic Model for Tranient Availability Modeling of Repairable Redundant Sytem

More information

ES205 Analysis and Design of Engineering Systems: Lab 1: An Introductory Tutorial: Getting Started with SIMULINK

ES205 Analysis and Design of Engineering Systems: Lab 1: An Introductory Tutorial: Getting Started with SIMULINK ES05 Analyi and Deign of Engineering Sytem: Lab : An Introductory Tutorial: Getting Started with SIMULINK What i SIMULINK? SIMULINK i a oftware package for modeling, imulating, and analyzing dynamic ytem.

More information

A note on degenerate and spectrally degenerate graphs

A note on degenerate and spectrally degenerate graphs A note on degenerate and pectrally degenerate graph Noga Alon Abtract A graph G i called pectrally d-degenerate if the larget eigenvalue of each ubgraph of it with maximum degree D i at mot dd. We prove

More information

An Approach to a Test Oracle for XML Query Testing

An Approach to a Test Oracle for XML Query Testing An Approach to a Tet Oracle for XML Query Teting Dae S. Kim-Park, Claudio de la Riva, Javier Tuya Univerity of Oviedo Computing Department Campu of Vieque, /n, 33204 (SPAIN) kim_park@li.uniovi.e, claudio@uniovi.e,

More information

On combining Learning Vector Quantization and the Bayesian classifiers for natural textured images

On combining Learning Vector Quantization and the Bayesian classifiers for natural textured images On combining Learning Vector Quantization and the Bayeian claifier for natural textured image María Guiarro Dept. Ingeniería del Software e Inteligencia Artificial Facultad Informática Univeridad Complutene

More information

Aspects of Formal and Graphical Design of a Bus System

Aspects of Formal and Graphical Design of a Bus System Apect of Formal and Graphical Deign of a Bu Sytem Tiberiu Seceleanu Univerity of Turku, Dpt. of Information Technology Turku, Finland tiberiu.eceleanu@utu.fi Tomi Weterlund Turku Centre for Computer Science

More information

3D MODELLING WITH LINEAR APPROACHES USING GEOMETRIC PRIMITIVES

3D MODELLING WITH LINEAR APPROACHES USING GEOMETRIC PRIMITIVES MAKARA, TEKNOLOGI, VOL. 9, NO., APRIL 5: 3-35 3D MODELLING WITH LINEAR APPROACHES USING GEOMETRIC PRIMITIVES Mochammad Zulianyah Informatic Engineering, Faculty of Engineering, ARS International Univerity,

More information

Kinematics Programming for Cooperating Robotic Systems

Kinematics Programming for Cooperating Robotic Systems Kinematic Programming for Cooperating Robotic Sytem Critiane P. Tonetto, Carlo R. Rocha, Henrique Sima, Altamir Dia Federal Univerity of Santa Catarina, Mechanical Engineering Department, P.O. Box 476,

More information

Stochastic Search and Graph Techniques for MCM Path Planning Christine D. Piatko, Christopher P. Diehl, Paul McNamee, Cheryl Resch and I-Jeng Wang

Stochastic Search and Graph Techniques for MCM Path Planning Christine D. Piatko, Christopher P. Diehl, Paul McNamee, Cheryl Resch and I-Jeng Wang Stochatic Search and Graph Technique for MCM Path Planning Chritine D. Piatko, Chritopher P. Diehl, Paul McNamee, Cheryl Rech and I-Jeng Wang The John Hopkin Univerity Applied Phyic Laboratory, Laurel,

More information

Maneuverable Relays to Improve Energy Efficiency in Sensor Networks

Maneuverable Relays to Improve Energy Efficiency in Sensor Networks Maneuverable Relay to Improve Energy Efficiency in Senor Network Stephan Eidenbenz, Luka Kroc, Jame P. Smith CCS-5, MS M997; Lo Alamo National Laboratory; Lo Alamo, NM 87545. Email: {eidenben, kroc, jpmith}@lanl.gov

More information

A User-Attention Based Focus Detection Framework and Its Applications

A User-Attention Based Focus Detection Framework and Its Applications A Uer-Attention Baed Focu Detection Framework and It Application Chia-Chiang Ho, Wen-Huang Cheng, Ting-Jian Pan, Ja-Ling Wu Communication and Multimedia Laboratory, Department of Computer Science and Information

More information

/06/$ IEEE 364

/06/$ IEEE 364 006 IEEE International ympoium on ignal Proceing and Information Technology oie Variance Etimation In ignal Proceing David Makovoz IPAC, California Intitute of Technology, MC-0, Paadena, CA, 95 davidm@ipac.caltech.edu;

More information

Dynamically Reconfigurable Neuron Architecture for the Implementation of Self- Organizing Learning Array

Dynamically Reconfigurable Neuron Architecture for the Implementation of Self- Organizing Learning Array Dynamically Reconfigurable Neuron Architecture for the Implementation of Self- Organizing Learning Array Januz A. Starzyk,Yongtao Guo, and Zhineng Zhu School of Electrical Engineering & Computer Science

More information

Laboratory Exercise 6

Laboratory Exercise 6 Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each circuit will be decribed in Verilog and implemented

More information

A Novel Grey-RSS Navigation System Design for Mobile Robots

A Novel Grey-RSS Navigation System Design for Mobile Robots A vel Grey-RSS Navigation Sytem Deign for Mobile Robot Albert Wen-Long Yao*,, Hin-Te Liao, and Shiou-De Chen Department of Mechanical and Automation Engineering, National Kaohiung Firt Univerity of Science

More information

else end while End References

else end while End References 621-630. [RM89] [SK76] Roenfeld, A. and Melter, R. A., Digital geometry, The Mathematical Intelligencer, vol. 11, No. 3, 1989, pp. 69-72. Sklanky, J. and Kibler, D. F., A theory of nonuniformly digitized

More information

Edits in Xylia Validity Preserving Editing of XML Documents

Edits in Xylia Validity Preserving Editing of XML Documents dit in Xylia Validity Preerving diting of XML Document Pouria Shaker, Theodore S. Norvell, and Denni K. Peter Faculty of ngineering and Applied Science, Memorial Univerity of Newfoundland, St. John, NFLD,

More information

ANALYSIS OF THE FIRST LAYER IN WEIGHTLESS NEURAL NETWORKS FOR 3_DIMENSIONAL PATTERN RECOGNITION

ANALYSIS OF THE FIRST LAYER IN WEIGHTLESS NEURAL NETWORKS FOR 3_DIMENSIONAL PATTERN RECOGNITION ANALYSIS OF THE FIRST LAYER IN WEIGHTLESS NEURAL NETWORKS FOR 3_DIMENSIONAL PATTERN RECOGNITION A. Váque-Nava * Ecuela de Ingeniería. CENTRO UNIVERSITARIO MEXICO. DIVISION DE ESTUDIOS SUPERIORES J. Figueroa

More information

[N309] Feedforward Active Noise Control Systems with Online Secondary Path Modeling. Muhammad Tahir Akhtar, Masahide Abe, and Masayuki Kawamata

[N309] Feedforward Active Noise Control Systems with Online Secondary Path Modeling. Muhammad Tahir Akhtar, Masahide Abe, and Masayuki Kawamata he 32nd International Congre and Expoition on Noie Control Engineering Jeju International Convention Center, Seogwipo, Korea, Augut 25-28, 2003 [N309] Feedforward Active Noie Control Sytem with Online

More information

Building a Compact On-line MRF Recognizer for Large Character Set using Structured Dictionary Representation and Vector Quantization Technique

Building a Compact On-line MRF Recognizer for Large Character Set using Structured Dictionary Representation and Vector Quantization Technique 202 International Conference on Frontier in Handwriting Recognition Building a Compact On-line MRF Recognizer for Large Character Set uing Structured Dictionary Repreentation and Vector Quantization Technique

More information

Increasing Throughput and Reducing Delay in Wireless Sensor Networks Using Interference Alignment

Increasing Throughput and Reducing Delay in Wireless Sensor Networks Using Interference Alignment Int. J. Communication, Network and Sytem Science, 0, 5, 90-97 http://dx.doi.org/0.436/ijcn.0.50 Publihed Online February 0 (http://www.scirp.org/journal/ijcn) Increaing Throughput and Reducing Delay in

More information

A METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS

A METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS Vietnam Journal of Science and Technology 55 (5) (017) 650-657 DOI: 10.1565/55-518/55/5/906 A METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS Nguyen Huu Quang *, Banh

More information

1 The secretary problem

1 The secretary problem Thi i new material: if you ee error, pleae email jtyu at tanford dot edu 1 The ecretary problem We will tart by analyzing the expected runtime of an algorithm, a you will be expected to do on your homework.

More information

An Improved Implementation of Elliptic Curve Digital Signature by Using Sparse Elements

An Improved Implementation of Elliptic Curve Digital Signature by Using Sparse Elements The International Arab Journal of Information Technology, Vol. 1, No., July 004 0 An Improved Implementation of Elliptic Curve Digital Signature by Uing Spare Element Eam Al-Daoud Computer Science Department,

More information

Maintenance of fast updated frequent pattern trees for record deletion

Maintenance of fast updated frequent pattern trees for record deletion Maintenance of fast updated frequent pattern trees for record deletion Tzung-Pei Hong a,b,, Chun-Wei Lin c, Yu-Lung Wu d a Department of Computer Science and Information Engineering, National University

More information

Modeling of underwater vehicle s dynamics

Modeling of underwater vehicle s dynamics Proceeding of the 11th WEA International Conference on YTEM, Agio Nikolao, Crete Iland, Greece, July 23-25, 2007 44 Modeling of underwater vehicle dynamic ANDRZEJ ZAK Department of Radiolocation and Hydrolocation

More information

np vp cost = 0 cost = c np vp cost = c I replacing term cost = c+c n cost = c * Error detection Error correction pron det pron det n gi

np vp cost = 0 cost = c np vp cost = c I replacing term cost = c+c n cost = c * Error detection Error correction pron det pron det n gi Spoken Language Paring with Robutne and ncrementality Yohihide Kato, Shigeki Matubara, Katuhiko Toyama and Yauyohi nagaki y Graduate School of Engineering, Nagoya Univerity y Faculty of Language and Culture,

More information

Course Project: Adders, Subtractors, and Multipliers a

Course Project: Adders, Subtractors, and Multipliers a In the name Allah Department of Computer Engineering 215 Spring emeter Computer Architecture Coure Intructor: Dr. Mahdi Abbai Coure Project: Adder, Subtractor, and Multiplier a a The purpoe of thi p roject

More information

Shortest Paths with Single-Point Visibility Constraint

Shortest Paths with Single-Point Visibility Constraint Shortet Path with Single-Point Viibility Contraint Ramtin Khoravi Mohammad Ghodi Department of Computer Engineering Sharif Univerity of Technology Abtract Thi paper tudie the problem of finding a hortet

More information

A Hybrid Deployable Dynamic Traffic Assignment Framework for Robust Online Route Guidance

A Hybrid Deployable Dynamic Traffic Assignment Framework for Robust Online Route Guidance A Hybrid Deployable Dynamic Traffic Aignment Framework for Robut Online Route Guidance Sriniva Peeta School of Civil Engineering, Purdue Univerity Chao Zhou Sabre, Inc. Sriniva Peeta School of Civil Engineering

More information

Keywords: Defect detection, linear phased array transducer, parameter optimization, phased array ultrasonic B-mode imaging testing.

Keywords: Defect detection, linear phased array transducer, parameter optimization, phased array ultrasonic B-mode imaging testing. Send Order for Reprint to reprint@benthamcience.ae 488 The Open Automation and Control Sytem Journal, 2014, 6, 488-492 Open Acce Parameter Optimization of Linear Phaed Array Tranducer for Defect Detection

More information

New Structural Decomposition Techniques for Constraint Satisfaction Problems

New Structural Decomposition Techniques for Constraint Satisfaction Problems New Structural Decompoition Technique for Contraint Satifaction Problem Yaling Zheng and Berthe Y. Choueiry Contraint Sytem Laboratory Univerity of Nebraka-Lincoln Email: yzheng choueiry@ce.unl.edu Abtract.

More information

A Linear Interpolation-Based Algorithm for Path Planning and Replanning on Girds *

A Linear Interpolation-Based Algorithm for Path Planning and Replanning on Girds * Advance in Linear Algebra & Matrix Theory, 2012, 2, 20-24 http://dx.doi.org/10.4236/alamt.2012.22003 Publihed Online June 2012 (http://www.scirp.org/journal/alamt) A Linear Interpolation-Baed Algorithm

More information

Laboratory Exercise 6

Laboratory Exercise 6 Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each circuit will be decribed in VHL and implemented

More information

A TOPSIS based Method for Gene Selection for Cancer Classification

A TOPSIS based Method for Gene Selection for Cancer Classification Volume 67 No17, April 2013 A TOPSIS baed Method for Gene Selection for Cancer Claification IMAbd-El Fattah,WIKhedr, KMSallam, 1 Department of Statitic, 3 Department of Deciion upport, 2 Department of information

More information

Service and Network Management Interworking in Future Wireless Systems

Service and Network Management Interworking in Future Wireless Systems Service and Network Management Interworking in Future Wirele Sytem V. Tountopoulo V. Stavroulaki P. Demeticha N. Mitrou and M. Theologou National Technical Univerity of Athen Department of Electrical Engineering

More information

AN EFFICIENT GRADUAL PRUNING TECHNIQUE FOR UTILITY MINING. Received April 2011; revised October 2011

AN EFFICIENT GRADUAL PRUNING TECHNIQUE FOR UTILITY MINING. Received April 2011; revised October 2011 International Journal of Innovative Computing, Information and Control ICIC International c 2012 ISSN 1349-4198 Volume 8, Number 7(B), July 2012 pp. 5165 5178 AN EFFICIENT GRADUAL PRUNING TECHNIQUE FOR

More information

Image authentication and tamper detection using fragile watermarking in spatial domain

Image authentication and tamper detection using fragile watermarking in spatial domain International Journal of Advanced Reearch in Computer Engineering & Technology (IJARCET) Volume 6, Iue 7, July 2017, ISSN: 2278 1323 Image authentication and tamper detection uing fragile watermarking

More information

Advanced Encryption Standard and Modes of Operation

Advanced Encryption Standard and Modes of Operation Advanced Encryption Standard and Mode of Operation G. Bertoni L. Breveglieri Foundation of Cryptography - AES pp. 1 / 50 AES Advanced Encryption Standard (AES) i a ymmetric cryptographic algorithm AES

More information

The development of the South African ehealth Strategy assessed against the recommendations of the WHO/ITU ehealth Strategy Toolkit

The development of the South African ehealth Strategy assessed against the recommendations of the WHO/ITU ehealth Strategy Toolkit The development of the South African ehealth Strategy aeed againt the recommendation of the WHO/ITU ehealth Strategy Toolkit Roemary Foter PhD a,b a ehealth Strategy and Policy Diviion, Medical Reearch

More information

A Practical Model for Minimizing Waiting Time in a Transit Network

A Practical Model for Minimizing Waiting Time in a Transit Network A Practical Model for Minimizing Waiting Time in a Tranit Network Leila Dianat, MASc, Department of Civil Engineering, Sharif Univerity of Technology, Tehran, Iran Youef Shafahi, Ph.D. Aociate Profeor,

More information

AN INTELLIGENT SCHEME FOR FACIAL EXPRESSION RECOGNITION

AN INTELLIGENT SCHEME FOR FACIAL EXPRESSION RECOGNITION AN INTELLIGENT SCHEME FOR FACIAL EXPRESSION RECOGNITION A. Raouzaiou, S. Ioannou, K. Karpouzi, N. Tapatouli, S. Kollia 1, R. Cowie 2 1 Department of Electrical and Computer Engineering National Technical

More information

How to. write a paper. The basics writing a solid paper Different communities/different standards Common errors

How to. write a paper. The basics writing a solid paper Different communities/different standards Common errors How to write a paper The baic writing a olid paper Different communitie/different tandard Common error Reource Raibert eay My grammar point Article on a v. the Bug in writing Clarity Goal Conciene Calling

More information

Compressed Sensing Image Processing Based on Stagewise Orthogonal Matching Pursuit

Compressed Sensing Image Processing Based on Stagewise Orthogonal Matching Pursuit Senor & randucer, Vol. 8, Iue 0, October 204, pp. 34-40 Senor & randucer 204 by IFSA Publihing, S. L. http://www.enorportal.com Compreed Sening Image Proceing Baed on Stagewie Orthogonal Matching Puruit

More information

The Comparison of Neighbourhood Set and Degrees of an Interval Graph G Using an Algorithm

The Comparison of Neighbourhood Set and Degrees of an Interval Graph G Using an Algorithm The Comparion of Neighbourhood Set and Degree of an Interval Graph G Uing an Algorithm Dr.A.Sudhakaraiah, K.Narayana Aitant Profeor, Department of Mathematic, S.V. Univerity, Andhra Pradeh, India Reearch

More information

Analysis of the results of analytical and simulation With the network model and dynamic priority Unchecked Buffer

Analysis of the results of analytical and simulation With the network model and dynamic priority Unchecked Buffer International Reearch Journal of Applied and Baic Science 218 Available online at www.irjab.com ISSN 2251-838X / Vol, 12 (1): 49-53 Science Explorer Publication Analyi of the reult of analytical and imulation

More information

Motion Control (wheeled robots)

Motion Control (wheeled robots) 3 Motion Control (wheeled robot) Requirement for Motion Control Kinematic / dynamic model of the robot Model of the interaction between the wheel and the ground Definition of required motion -> peed control,

More information

Locating Brain Tumors from MR Imagery Using Symmetry

Locating Brain Tumors from MR Imagery Using Symmetry ocating rain Tumor from M magery Uing Symmetry Nilanjan ay aidya Nath Saha and Matthew obert Graham rown {nray1 baidya mbrown}@cualbertaca epartment of Computing Science Univerity of lberta Canada btract

More information

On successive packing approach to multidimensional (M-D) interleaving

On successive packing approach to multidimensional (M-D) interleaving On ucceive packing approach to multidimenional (M-D) interleaving Xi Min Zhang Yun Q. hi ankar Bau Abtract We propoe an interleaving cheme for multidimenional (M-D) interleaving. To achieved by uing a

More information

Research on Star Image Noise Filtering Based on Diffusion Model of Regularization Influence Function

Research on Star Image Noise Filtering Based on Diffusion Model of Regularization Influence Function 016 Sith International Conference on Intrumentation & Meaurement Computer Communication and Control Reearch on Star Image Noie Filtering Baed on Diffuion Model of Regularization Influence Function SunJianming

More information

Routing Definition 4.1

Routing Definition 4.1 4 Routing So far, we have only looked at network without dealing with the iue of how to end information in them from one node to another The problem of ending information in a network i known a routing

More information

Frequency Table Computation on Dataflow Architecture

Frequency Table Computation on Dataflow Architecture Frequency Table Computation on Dataflow Architecture P. Škoda *, V. Sruk **, and B. Medved Rogina * * Ruđer Bošković Intitute, Zagreb, Croatia ** Faculty of Electrical Engineering and Computing, Univerity

More information

CENTER-POINT MODEL OF DEFORMABLE SURFACE

CENTER-POINT MODEL OF DEFORMABLE SURFACE CENTER-POINT MODEL OF DEFORMABLE SURFACE Piotr M. Szczypinki Iintitute of Electronic, Technical Univerity of Lodz, Poland Abtract: Key word: Center-point model of deformable urface for egmentation of 3D

More information

(12) Patent Application Publication (10) Pub. No.: US 2011/ A1

(12) Patent Application Publication (10) Pub. No.: US 2011/ A1 (19) United State US 2011 0316690A1 (12) Patent Application Publication (10) Pub. No.: US 2011/0316690 A1 Siegman (43) Pub. Date: Dec. 29, 2011 (54) SYSTEMAND METHOD FOR IDENTIFYING ELECTRICAL EQUIPMENT

More information

A New Approach for Handling the Iris Data Classification Problem

A New Approach for Handling the Iris Data Classification Problem International Journal of Applied Science and Engineering 2005. 3, : 37-49 A New Approach for Handling the Iris Data Classification Problem Shyi-Ming Chen a and Yao-De Fang b a Department of Computer Science

More information

How to Select Measurement Points in Access Point Localization

How to Select Measurement Points in Access Point Localization Proceeding of the International MultiConference of Engineer and Computer Scientit 205 Vol II, IMECS 205, March 8-20, 205, Hong Kong How to Select Meaurement Point in Acce Point Localization Xiaoling Yang,

More information

Implementation of a momentum-based distance metric for motion graphs. Student: Alessandro Di Domenico (st.no ), Supervisor: Nicolas Pronost

Implementation of a momentum-based distance metric for motion graphs. Student: Alessandro Di Domenico (st.no ), Supervisor: Nicolas Pronost Implementation of a momentum-baed ditance metric for motion graph Student: Aleandro Di Domenico (t.no 3775682), Supervior: Nicola Pronot April 3, 2014 Abtract Thi report preent the procedure and reult

More information

Integrated Single-arm Assembly and Manipulation Planning using Dynamic Regrasp Graphs

Integrated Single-arm Assembly and Manipulation Planning using Dynamic Regrasp Graphs Proceeding of The 2016 IEEE International Conference on Real-time Computing and Robotic June 6-9, 2016, Angkor Wat, Cambodia Integrated Single-arm Aembly and Manipulation Planning uing Dynamic Regrap Graph

More information

CERIAS Tech Report EFFICIENT PARALLEL ALGORITHMS FOR PLANAR st-graphs. by Mikhail J. Atallah, Danny Z. Chen, and Ovidiu Daescu

CERIAS Tech Report EFFICIENT PARALLEL ALGORITHMS FOR PLANAR st-graphs. by Mikhail J. Atallah, Danny Z. Chen, and Ovidiu Daescu CERIAS Tech Report 2003-15 EFFICIENT PARALLEL ALGORITHMS FOR PLANAR t-graphs by Mikhail J. Atallah, Danny Z. Chen, and Ovidiu Daecu Center for Education and Reearch in Information Aurance and Security,

More information

An Intro to LP and the Simplex Algorithm. Primal Simplex

An Intro to LP and the Simplex Algorithm. Primal Simplex An Intro to LP and the Simplex Algorithm Primal Simplex Linear programming i contrained minimization of a linear objective over a olution pace defined by linear contraint: min cx Ax b l x u A i an m n

More information

Delaunay Triangulation: Incremental Construction

Delaunay Triangulation: Incremental Construction Chapter 6 Delaunay Triangulation: Incremental Contruction In the lat lecture, we have learned about the Lawon ip algorithm that compute a Delaunay triangulation of a given n-point et P R 2 with O(n 2 )

More information

The Association of System Performance Professionals

The Association of System Performance Professionals The Aociation of Sytem Performance Profeional The Computer Meaurement Group, commonly called CMG, i a not for profit, worldwide organization of data proceing profeional committed to the meaurement and

More information

Web Science and additionality

Web Science and additionality Admin tuff... Lecture 1: EITN01 Web Intelligence and Information Retrieval Meage, lide, handout, lab manual and link: http://www.eit.lth.e/coure/eitn01 Contact: Ander Ardö, Ander.Ardo@eit.lth.e, room:

More information