Data Mining with Linguistic Thresholds
|
|
- Richard Bruce
- 5 years ago
- Views:
Transcription
1 Int. J. Contemp. Math. Science, Vol. 7, 22, no. 35, Data Mining with Linguitic Threhold Tzung-Pei Hong Department of Electrical Engineering National Univerity of Kaohiung Kaohiung, Taiwan, R.O.C. Ming-Jer Chiang Intitute of Information Engineering I-Shou Univerity Kaohiung, Taiwan, R.O.C. Shyue-Liang Wang Department of Computer Science New York Intitute of Technology New York, USA Abtract Data mining i the proce of extracting deirable knowledge or intereting pattern from exiting databae for pecific purpoe. In the pat, the minimum upport and minimum confidence were et at numerical value. Linguitic minimum upport and minimum confidence value are, however, more natural and undertandable for human being. Thi paper thu attempt to propoe a new mining approach for extracting intereting weighted aociation rule from tranaction, when the parameter needed in the mining proce are given in linguitic term. Item are alo evaluated by manager a linguitic term to reflect their importance, which are then tranformed a fuzzy et of weight. Fuzzy operation including fuzzy ranking are then ued to find weighted large itemet and aociation rule.
2 72 Tzung-Pei Hong, Ming-Jer Chiang and Shyue-Liang Wang Mathematic Subject Claification: 62-7 Keyword: aociation rule, data mining, weighted item, fuzzy et, fuzzy ranking Introduction Knowledge dicovery in databae (KDD) ha become a proce of coniderable interet in recent year a the amount of data in many databae h grown tremendouly large. The KDD proce generally conit of three phae: pre-proceing, data mining and pot-proceing [, 4, 5, 26]. Among them, data mining play a critical role to KDD. Recently, the fuzzy et theory ha been ued more and more frequently in intelligent ytem becaue of it implicity and imilarity to human reaoning [35, 36]. The theory ha been applied in field uch a manufacturing, engineering, diagnoi, economic, among other [7, 23, 25, 35]. Several fuzzy learning algorithm for inducing rule from given et of data h been deigned and ued to good effect with pecific domain [5, 7, 3, 6, 8-2, 29-3]. Strategie baed on deciion tree were propoed in [9, -2, 27-29, 32-33], and baed on verion pace were propoed in [3]. Fuzzy mining approache were propoed in [8, 22, 24, 34]. In the pat, the minimum upport and minimum confidence value were numerical. In thi paper, linguitic minimum upport and minimum confidence value are given, which are more natural and undertandable for human being. Alo, item may h different importance, which i evaluated by manager or expert a linguitic term. A novel mining algorithm i then propoed to find weighted linguitic aociation rule from tranaction data. It firt tranform linguitic weighted item, minimum upport and minimum confidence into fuzzy et, then filter weighted large itemet out by fuzzy operation. Weighted aociation rule with linguitic upport and confidence are then derived from the weighted large itemet. The remaining part of thi paper are organized a follow. Several approache for mining aociation rule are reviewed in Section 2. Fuzzy et and operation are introduced in Section 3. The notation ued in thi paper i defined in Section 4. The propoed weighted data-mining algorithm for linguitic minimum upport and confidence are decribed in Section 5. An example i given to illutrate the propoed mining algorithm in Section 6. Concluion and propoal of future work are given in Section 7. 2 Review of Mining Aociation Rule Agrawal and hi co-worker propoed everal mining algorithm baed on the concept of large itemet to find aociation rule in tranaction data [-4]. They divided the mining proce into two phae. In the firt phae, candidate itemet were generated and counted by canning the tranaction data. If the number of an itemet appearing in the tranaction wa larger than a pre-defined threhold value
3 Data mining with linguitic threhold 73 (called minimum upport), the itemet wa conidered a large itemet. Itemet containing only one item were proceed firt. Large itemet containing only ingle item were then combined to form candidate itemet containing two item. Thi proce wa repeated until all large itemet had been found. In the econd phae, aociation rule were induced from the large itemet found in the firt phae. All poible aociation combination for each large itemet were formed, and thoe with calculated confidence value larger than a predefined threhold (called minimum confidence) were output a aociation rule. Cai et al. then propoed weighted mining to reflect different importance to different item [6]. Each item wa attached a numerical weight given by uer. Weighted upport and weighted confidence were then defined to determine intereting aociation rule. Yue et al. then extended their concept to fuzzy item vector [34]. In thi paper, the fuzzy concept are ued to repreent item importance, minimum upport and minimum confidence. Thee parameter are expreed in linguitic term, which are more natural and undertandable for human being. 3 Review of Related Fuzzy Concept Fuzzy et theory wa firt propoed by Zadeh and Goguen in 965 [36]. A function called the memberhip function, μ A (), x i defined for mapping a member x to a memebrhip degree between to. Triangular memberhip function are commonly ued and can be denoted by A = (a, b, c), where a b c (Figure ). The abcia b repreent the variable value with the maximal grade of memberhip value, i.e. μ A (b)=; a and c are the lower and upper bound of the available area. They are ued to reflect the fuzzine of the data. u A (x) a b c X Figure : A triangular memberhip function There are a variety of fuzzy et operation. Among them, three baic and commonly ued operation are complement, union and interection. Fuzzy ranking i ued to determine the order of fuzzy et and i thu quite important to actual application. Several fuzzy ranking method h been propoed in the literature. The ranking method uing gravitie i ued in the paper.
4 74 Tzung-Pei Hong, Ming-Jer Chiang and Shyue-Liang Wang 4 Notation The notation ued in thi paper i defined a follow. n: the total number of tranaction data; m: the total number of item; k: the total number of manager; A i : the i-th item, i m; W i,j : the tranformed fuzzy weight for importance of item A i, evaluated by the j-th manager; W i : the fuzzy rage weight for importance of item A i ; W : the fuzzy weight for importance of itemet ; connt i : the number of item A i appearing in the n tranaction; α : the predefined linguitic minimum upport value; β : the predefined linguitic minimum confidence value; I j : the j-th memberhip function of importance; I : the fuzzy rage weight of all poible linguitic term of importance; wup i : the fuzzy weighted upport of item A i; wconf R : the fuzzy weighted confidence of rule R ; minup: the tranformed fuzzy et from the linguitic minimum upport value α ; wminup: the fuzzy weighted et of minimum upport; minconf: the tranformed fuzzy et from the linguitic minimum confidence value β ; wminconf: the fuzzy weighted et of minimum confidence; C r : the et of candidate itemet with r item; L : the et of large itemet with r item. r 5 Weighted Data Mining for Linguitic Minimum Support and Minimum Confidence In thi ection, the fuzzy concept are ued to repreent item importance, minimum upport and minimum confidence. The propoed mining algorithm firt ue the et of memberhip function for importance to tranform manager linguitic evaluation of item importance into fuzzy weight. The fuzzy weight of an item from different manger are then raged. The algorithm then calculate the weighted count of all item from the tranaction data and according to the rage fuzzy weight of item. The given linguitic minimum upport value i alo tranformed into a fuzzy weighted et. All weighted large -itemet can thu be found by ranking the fuzzy weighted upport of each item with fuzzy weighted minimum upport. After that, candidate 2-itemet are formed from the weighted large -itemet and the ame procedure i ued to find all weighted large 2-itemet. Thi procedure i repeated until all weighted large itemet h been found. The fuzzy weighted confidence from large itemet are then calculated to find intereting aociation rule. Detail of the propoed mining algorithm are decribed below.
5 Data mining with linguitic threhold 75 The algorithm: INPUT: A et of n tranaction data, a et of m item with their importance evaluated by k manager, three et of memberhip function repectively for importance, minimum upport and minimum confidence, a pre-defined linguitic minimum upport value α, and a pre-defined linguitic minimum confidence value β. OUTPUT: A et of weighted aociation rule. STEP : Tranform each linguitic term of importance for item A i, i m, which i evaluated by the j-th manager into a fuzzy et W i,j of weight, uing the given memberhip function of item importance. STEP 2: Calculate the fuzzy rage weight addition a: W of each item A i by fuzzy i k W i = k j= W i, j. STEP 3: Calculate the number (count i ) of each item A i appearing in the et of tranaction. STEP 4: Calculate the fuzzy weighted upport wup i of each item A i a: counti Wi wup i =, n where n i the number of tranaction. STEP 5: Tranform the given linguitic minimum upport value α into a fuzzy et minup of minimum upport, uing the given memberhip function of minimum upport. STEP 6: Calculate the fuzzy weighted et (wminup) of the given minimum upport value a: wminup = minup (the gravity of I ), where I = m I j j= with I j being the j-th memberhip function of importance. I repreent the fuzzy rage weight of all poible linguitic term of importance. STEP 7: Check whether the weighted upport (wup i ) of each item A i i larger than or equal to the fuzzy weighted minimum upport (wminup) by fuzzy ranking. Any fuzzy ranking approach can be applied here a long a it can generate a crip rank. If wup i i equal to or greater than wminup, put A i in the et of large -itemet L. STEP 8: Set r =, where r i ued to repreent the number of item kept in the current large itemet. STEP 9: Generate the candidate et C r+ from L r in a way imilar to that in the apriori algorithm [4]. That i, the algorithm firt join L r and L r auming that r- item in the two itemet are the ame and the other one i different. It then keep in C r+ the itemet, which h all their m,
6 76 Tzung-Pei Hong, Ming-Jer Chiang and Shyue-Liang Wang ub-itemet of r item exiting in L r. STEP : Do the following ubtep for each newly formed (r+)-itemet with item (, 2,, r+ ) in C r+ : (a) Calculate the fuzzy weight W W of itemet a: = W Λ W ΛK ΛW, 2 r+ where W i i the fuzzy rage weight of item i, calculated in STEP 2. If the minimum operation i ued for the interection, then: W r+ = MinW i= (b) Calculate the number ( count ) of itemet appearing in the tranaction data. (c) Calculate the weighted upport wup of itemet a: W count wup =, n where n i the number of tranaction. (d) Check whether the weighted upport wup of itemet i greater than or equal to the fuzzy weighted minimum upport wminup by fuzzy ranking. If wup i greater than or equal to wminup, put in the et of large (r+)-itemet L r+. STEP : IF L r+ i null, then do the next tep; otherwie, et r = r+ and repeat Step 9-. STEP 2: Tranform the given linguitic minimum confidence value β into a fuzzy et minconf of minimum confidence, uing the given memberhip function of minimum confidence. Step 3: Calculate the fuzzy weighted et (wminconf) of the given minimum confidence value a: wminconf = minconf (the gravity of I ), where I i the ame a that calculated in Step 6. STEP 4: Contruct the aociation rule from each weighted large q-itemet with item (, 2,, q ), q 2, uing the following ubtep: (a) Form all poible aociation rule a follow: Λ... Λ j Λ j + Λ... Λ q j, j = to q. (b) Calculate the weighted confidence value wconf R of each poible aociation rule R a: i wconf R count = count j W. (c) Check whether the weighted confidence wconf R of aociation rule R i greater than or equal to the fuzzy weighted minimum confidence wminconf by fuzzy ranking. If wconf R i greater than or equal to wminconf, keep rule R in the intereting rule et. STEP 5: For each rule R with weighted upport wup R and weighted confidence
7 Data mining with linguitic threhold 77 wconf R in the intereting rule et, find the linguitic minimum upport region S i and the linguitic minimum confidence region C j with wminup i- wup R < wminup i and wminconf j- wconf R < wminconf j by fuzzy ranking, where: wminup i = minup i (the gravity of I ), wminconf j = minconf j (the gravity of I ), minup i i the given memberhip function for S i and minconf j i the given memberhip function for C j. Output rule R with linguitic upport value S i and linguitic confidence value C j. The rule output after tep 5 can erve a meta-knowledge concerning the given tranaction. 6 An Example In thi ection, an example i given to illutrate the propoed data-mining algorithm. Thi i a imple example to how how the propoed algorithm can be ued to generate weighted aociation rule from a et of tranaction. The data et include ten tranaction, a hown in Table. Table : The data et ued in thi example TID Item ABC 2 ACE 3 ABF 4 BCD 5 BCE 6 ABDE 7 ABCE 8 ABCEF 9 ABCEF BCDEF Each tranaction i compoed of a tranaction identifier and item purchaed. There are ix item, repectively being A, B, C, D, E and F, to be purchaed. The importance of the item i evaluated by three manager a hown in Table 2. Table 2: The item importance evaluated by three manager Item Manager Manger2 Manager3 A Important Ordinary Ordinary B Very Important Important Important C Ordinary Important Important D Unimportant Unimportant Very Important E Important Important Important F Unimportant Unimportant Ordinary
8 78 Tzung-Pei Hong, Ming-Jer Chiang and Shyue-Liang Wang Aume the memberhip function for item importance are given in Figure 2. In Figure 2, item importance i divided into five fuzzy region: Very Unimportant, Unimportant, Ordinary, Important and Very Important. Each fuzzy region i repreented by a memberhip function. For implicity, triangular memberhip function are ued here. The memberhip function in Figure 2 can be repreented a follow: Very Unimportant (VU): (,,.25), Unimportant (U): (,.25,.5), Ordinary (O): (.25,.5,.75), Important (I): (5, 75, ), and Very Important (VI): (.75,, ). Unimportant Important Very Unimportant Ordinary Memberhip value Very Important Weight Figure 2: The memberhip function of item importance ued in thi example For the training data given in Table, the propoed mining algorithm proceed a follow. Step : The linguitic term for item importance given in Table 2 are tranformed into fuzzy et by the memberhip function in Figure 2. For example, item A i evaluated to be important by Manager, and can then be tranformed a a triangular fuzzy et (.5,.75, ) of weight. The tranformed reult for Table 2 are hown in Table 3. Table 3: The fuzzy weight tranformed from the item importance in Table 2. Item Manager Manger2 Manager3 A (.5,.75,) (.25,.5,.75) (.25,.5,.75) B (.75,, ) (.5,.75,) (.5,.75,) C (.25,.5,.75) (.5,.75,) (.5,.75,) D (,.25,.5) (,.25,.5) (.75,, ) E (.5,.75,) (.5,.75,) (.5,.75,) F (,.25,.5) (,.25,.5) (.25,.5,.75) Step 2: The rage weight of each item i calculated by fuzzy addition. The reult are hown in Table 4.
9 Data mining with linguitic threhold 79 Table 4: The rage fuzzy weight of all the item Very Low Low Middle High Very High Memberhip value Item Average Fuzzy Weight A (.333,.583,.833) B (.583,.833, ) C (.47,.667,.97) D (,.67,.47) E (.5,.75, ) F (.83,.333,.583) Minimum upport Step 3: The appearing number (count) of each item i counted from the tranaction in Table. Reult for all the item are hown in Table 5. Table 5: The count of all the item Item Count A 7 B 9 C 8 D 3 E 7 F 4 Step 4: The weighted upport of each item i calculated. Reult for all the item are hown in Table 6. Table 6: The weighted upport of all the item Item Weighted Support A (.233,.48,.583) B (.525,.75,.9) C (.333,.533,.733) D (,.5,.25) E (.35,.525,.7) F (.33,.33,.233) Step 5: The given linguitic minimum upport value i tranformed into a fuzzy et of minimum upport. Aume the memberhip function for minimum upport are given in Figure 3.
10 72 Tzung-Pei Hong, Ming-Jer Chiang and Shyue-Liang Wang Very Low Low Middle High Very High Memberhip value Minimum upport Figure 3: The memberhip function of minimum upport Alo aume the given linguitic minimum upport value i High. It i then tranformed into a fuzzy et of minimum upport, (.5,.75, ), according to the given memberhip function in Figure 3. Step 6: The fuzzy rage weight of all poible linguitic term of importance in Figure 3 i firt calculated a: I = [(,,.25) + (,.25,.5) + (.25,.5,.75) + (.5,.75, ) +(.75,, )]/5 = (.3,.5,.7). The gravity of I i then ( )/3, which i.5. The fuzzy weighted et of minimum upport for High i then (.5,.75, ).5, which i (.25,.375,.5). Step 7: The weighted upport of each item i compared with the fuzzy weighted minimum upport by fuzzy ranking. Aume the gravity ranking approach i adopted in thi example. Take Item A a an example. The rage height of the weighted upport for item A i ( )/3, which i.48. The rage height of the fuzzy weighted minimum upport i ( )/3, which i.375. Since.48 >.375, A i thu a large weighted -itemet. Similarly, B, C and E are large weighted -itemet. Thee -itemet are put in L. Step 8: r i et at, where r i ued to tore the number of item kept in the current itemet. Step 9: The candidate et C r+ i generated from L r. C 2 i then firt generated from L a follow: (A, B), (A, C), (A, E), (B, C), (B, E) and (C, E). Step : The following ubtep are done for each newly formed candidate itemet in C 2. (a) The fuzzy weight of all the itemet in C 2 are calculated. Here, the minimum operator i ued for interection. Take Itemet (A, B) a an example. It fuzzy weighted upport value i calculated a min((.333,.583,.833), (.583,.833, )), which i (.333,.583,.833). The reult for all the 2-itemet are hown in Table 7.
11 Data mining with linguitic threhold 72 Table 7: The fuzzy weight of the 2-itemet in C 2. Itemet Fuzzy Weight (A, B) (.333,.583,.833) (A, C) (.333,.583,.833) (A, E) (.333,.583,.833) (B, C) (.47,.667,.97) (B, E) (.5,.75, ) (C, E) (.47,.667,.97) (b) The calar cardinality (count) of each candidate 2-itemet i counted from the tranaction data. Reult for thi example are hown in Table 8. Table 8: The count of the itemet in C 2. Itemet Count (A, B) 6 (A, C) 5 (A, E) 5 (B, C) 7 (B, E) 5 (C, E) 6 (c) The weighted upport of each candidate 2-itemet i calculated. Take (A, B) a an example. The minimum fuzzy weight of (A, B) i (.333,.583,.833) and the count i 6. It weighted upport i then (.333,.583,.833)*6/, which i (.2,.35,.5). All the weighted upport of the candidate 2-itemet are hown in Table 9. Table 9: The weighted upport of the 2-item Itemet Fuzzy Weight (A, B) (.2,.35,.5) (A, C) (.67,.292,.47) (A, E) (.67,.292,.47) (B, C) (.292,.467,.642) (B, E) (.25,.375,.5) (C, E) (.25,.4,.55) (d) The weighted upport of each candidate 2-itemet i compared with the fuzzy weighted minimum upport by fuzzy ranking. A mentioned above, the gravity ranking approach i adopted in thi example. (B, C), (B, E) and (C, E) are then found to be large weighted 2-itemet. Thee 2-itemet are put in L 2. Step : Since L 2 i not null in the example, r = r + = 2. Step 9 to are repeated to find L 3. C 3 i then generated from L 2. Only the 3-itemet (B, C, E) i formed in thi example. The rage height of it fuzzy weighted upport i.34, maller than.375. It i not put in L 3, and L 3 i thu an empty et.
12 722 Tzung-Pei Hong, Ming-Jer Chiang and Shyue-Liang Wang Step 2: The given linguitic minimum confidence value i tranformed into a fuzzy et of minimum confidence. Aume the memberhip function for minimum confidence value are hown in Figure 4, which are imilar to thoe in Figure 3. Memberhip value Very Low Low Middle High Very High Minimum confidence Figure 4: The memberhip function of minimum confidence Alo aume the given linguitic minimum confidence value i High. It i then tranformed into a fuzzy et of minimum confidence, (.5,.75, ), according to the given memberhip function in Figure 4. Step 3: The fuzzy rage weight of all poible linguitic term of importance i the ame a that found in Step 5. It gravity i thu.5. The fuzzy weighted et of minimum confidence for High i then (.5,.75, ).5, which i (.25,.375,.5). Step 4: The aociation rule from each large itemet are contructed by uing the following ubtep. (a) All poible aociation rule are formed a follow: If B, then C; If C, then B; If B, then E; If E, then B; If C, then E; If E, then C. (b) The weighted confidence factor for the above poible aociation rule are calculated. Take the firt poible aociation rule a an example. The count of B and B C are repectively.9 and.7, and the fuzzy weight of B C i (.47,.667,.97). The weighted confidence factor for the aociation rule If B, then C i then:.7.9 (.47,.667,.97) = (.324,.59,.73). (c) The weighted confidence of each aociation rule i compared with the fuzzy weighted minimum confidence by fuzzy ranking. A. In thi example, the following ix rule are put in the intereting rule et:. If B i bought then C i bought; 2. If C i bought then B i bought; 3. If B i bought then E i bought; 4. If E i bought then B i bought; 5. If C i bought then E i bought;
13 Data mining with linguitic threhold If E i bought then C i bought. STEP 5: The linguitic upport and confidence value are found for each rule R. Take the third intereting aociation rule "If B, then E a an example. It weighted upport i (.25,.375,.5) and weighted confidence i (.278,.47,.556). Since the memberhip function for linguitic minimum upport region High i (.5,.75, ) and for Very High i (.75,, ). The weighted fuzzy et for thee two region are (.25,.375,.5) and (.375,.5,.5). Since (.25,.375,.5) (.25,.375,.5) < (.375,.5,.5) by fuzzy ranking, the linguitic upport value for Rule R i then High. Similarly, the linguitic confidence value for Rule R i High. All the ix intereting aociation rule are then output a:. If B i bought then C i bought, with a very high upport and a very high confidence; 2. If C i bought then B i bought, with a very high upport and a very high confidence; 3. If B i bought then E i bought, with a high upport and a high confidence; 4. If E i bought then B i bought, with a high upport and a very high confidence; 5. If C i bought then E i bought, with a very high upport and a very high confidence; 6. If E i bought then C i bought, with a very high upport and a very high confidence. The ix rule above are thu output a meta-knowledge concerning the given weighted tranaction. 7 Concluion and Future Work In thi paper, we h propoed a new weighted data-mining algorithm to find intereting aociation rule with linguitic upport and confidence. Item are evaluated by manager a linguitic term, which are then tranformed and raged a fuzzy et of weight. Fuzzy operation including fuzzy ranking are ued to find weighted large itemet and aociation rule. Compared to previou mining approache, the propoed one ha linguitic input and output, which are more natural and undertandable for human being. Acknowledgement. Thi reearch wa upported by the National Science Council of the Republic of China under contract NSC E Reference [] R. Agrawal, T. Imielinki and A. Swami, Mining aociation rule between et of item in large databae, The 993 ACM SIGMOD Conference, Wahington DC, USA, 993. [2] R. Agrawal, T. Imielinki and A. Swami, Databae mining: a performance perpective, IEEE Tranaction on Knowledge and Data Engineering, Vol. 5, No. 6, 993,
14 724 Tzung-Pei Hong, Ming-Jer Chiang and Shyue-Liang Wang [3] R. Agrawal, R. Srikant and Q. Vu, Mining aociation rule with item contraint, The Third International Conference on Knowledge Dicovery in Databae and Data Mining, Newport Beach, California, Augut 997. [4] R. Agrawal and R. Srikant, Fat algorithm for mining aociation rule, The International Conference on Very Large Databae, 994, [5] A. F. Blihun, Fuzzy learning model in expert ytem, Fuzzy Set and Sytem, Vol. 22, 987, [6] C. H. Cai, W. C. Fu, C. H. Cheng and W. W. Kwong, Mining aociation rule with weighted item, The International Databae Engineering and Application Sympoium, 998, [7] L. M. de Campo and S. Moral, Learning rule for a fuzzy inference model, Fuzzy Set and Sytem, Vol. 59, 993, [8] K. C. C. Chan and W. H. Au, Mining fuzzy aociation rule, The 6th ACM International Conference on Information and Knowledge Management, 997, [9] R. L. P. Chang and T. Pavliddi, Fuzzy deciion tree algorithm, IEEE Tranaction on Sytem, Man and Cybernetic, Vol. 7, 977, [] M. S. Chen, J. Han and P. S. Yu, Data mining: an overview from a databae perpective, IEEE Tranaction on Knowledge and Data Engineering, Vol. 8, No.6, 996, [] C. Clair, C. Liu and N. Piinou, Attribute weighting: a method of applying domain knowledge in the deciion tree proce, The Seventh International Conference on Information and Knowledge Management, 998, [2] P. Clark and T. Niblett, The CN2 induction algorithm, Machine Learning, Vol. 3, 989, [3] M. Delgado and A. Gonzalez, An inductive learning procedure to identify fuzzy ytem, Fuzzy Set and Sytem, Vol. 55, 993, [4] A. Famili, W. M. Shen, R. Weber and E. Simoudi, Data preproceing and intelligent data analyi, Intelligent Data Analyi, Vol., No., 997. [5] W. J. Frawley, G. Piatetky-Shapiro and C. J. Matheu, Knowledge dicovery in databae: an overview, The AAAI Workhop on Knowledge Dicovery in Databae, 99, -27. [6] A.Gonzalez, A learning methodology in uncertain and imprecie environment, International Journal of Intelligent Sytem, Vol., 995, [7] I. Graham and P. L. Jone, Expert Sytem Knowledge, Uncertainty and Deciion, Chapman and Computing, Boton, 988, [8] T. P. Hong and J. B. Chen, Finding relevant attribute and memberhip function, Fuzzy Set and Sytem, Vol.3, No. 3, 999, [9] T. P. Hong and J. B. Chen, Proceing individual fuzzy attribute for fuzzy rule induction, accepted and to appear in Fuzzy Set and Sytem. [2] T. P. Hong and C. Y. Lee, Induction of fuzzy rule and memberhip function from training example, Fuzzy Set and Sytem, Vol. 84, 996, pp [2] T. P. Hong and S. S. Teng, A generalized verion pace learning algorithm for noiy and uncertain data, IEEE Tranaction on Knowledge and Data Engineering, Vol. 9, No. 2, 997, [22] T. P. Hong, C. S. Kuo and S. C. Chi, Mining aociation rule from quantitative data, Intelligent Data Analyi, Vol. 3, No. 5, 999, [23] A. Kandel, Fuzzy Expert Sytem, CRC Pre, Boca Raton, 992, 8-9.
15 Data mining with linguitic threhold 725 [24] C. M. Kuok, A. W. C. Fu and M. H. Wong, Mining fuzzy aociation rule in databae, The ACM SIGMOD Record, Vol. 27, No., 998, [25] E. H. Mamdani, Application of fuzzy algorithm for control of imple dynamic plant, IEEE Proceeding, 974, [26] H. Mannila, Method and problem in data mining, The International Conference on Databae Theory, 997. [27] J. R. Quinlan, Deciion tree a probabilitic claifier, The Fourth International Machine Learning Workhop, Morgan Kaufmann, San Mateo, CA, 987, [28] J. R. Quinlan, C4.5: Program for Machine Learning, Morgan Kaufmann, San Mateo, CA, 993. [29] J. Rive, FID3: fuzzy induction deciion tree, The Firt International ympoium on Uncertainty, Modeling and Analyi, 99, [3] C. H. Wang, T. P. Hong and S. S. Teng, Inductive learning from fuzzy example, The fifth IEEE International Conference on Fuzzy Sytem, New Orlean, 996, 3-8. [3] C. H. Wang, J. F. Liu, T. P. Hong and S. S. Teng, A fuzzy inductive learning trategy for modular rule, Fuzzy Set and Sytem, Vol. 3, No., 999, 9-5. [32] R.Weber, Fuzzy-ID3: a cla of method for automatic knowledge acquiition, The Second International Conference on Fuzzy Logic and Neural Network, Iizuka, Japan, 992, [33] Y. Yuan and M. J. Shaw, Induction of fuzzy deciion tree, Fuzzy Set and Sytem, Vol. 69, 995, [34] S. Yue, E. Tang, D. Yeung and D. Shi, Mining fuzzy aociation rule with weighted item, The IEEE International Conference on Sytem, Man and Cybernetic, 2, [35] L. A. Zadeh, Fuzzy logic, IEEE Computer, 988, [36] L. A. Zadeh, Fuzzy et, Information and Control, Vol. 8, No. 3, 965, Received: April, 22
Fuzzy Weighted Data Mining from Quantitative Transactions with Linguistic Minimum Supports and Confidences
International Journal of Fuzzy Systems, Vol. 8, No. 4, December 26 73 Fuzzy Weighted Data Mining from Quantitative Transactions with Linguistic Minimum Supports and Confidences Tzung-Pei Hong, Ming-Jer
More informationThe fuzzy data mining generalized association rules for quantitative values
The fuzzy data mining generalized association rules for quantitative values Tzung-Pei Hong* and Kuei-Ying Lin Graduate School of Information Engineering I-Shou University Kaohsiung, 84008, Taiwan, R.O.C.
More informationA Fast Association Rule Algorithm Based on Bitmap Computing with Multiple Minimum Supports using Maximum Constraints
A Fat Aociation Rule Algorithm Baed on Bitmap Computing with Multiple Minimum Support uing Maximum Contraint Jyothi Patil, and Dr. V.D.Mytri Abtract Mining aociation rule from databae i a timeconuming
More informationA Multi-objective Genetic Algorithm for Reliability Optimization Problem
International Journal of Performability Engineering, Vol. 5, No. 3, April 2009, pp. 227-234. RAMS Conultant Printed in India A Multi-objective Genetic Algorithm for Reliability Optimization Problem AMAR
More informationA Fast Association Rule Algorithm Based On Bitmap and Granular Computing
A Fat Aociation Rule Algorithm Baed On Bitmap and Granular Computing T.Y.Lin Xiaohua Hu Eric Louie Dept. of Computer Science College of Information Science IBM Almaden Reearch Center San Joe State Univerity
More informationAn Overview of Mining Fuzzy Association Rules
An Overview of Mining Fuzzy Association Rules Tzung-Pei Hong and Yeong-Chyi Lee Abstract Data mining is the process of extracting desirable knowledge or interesting patterns from existing databases for
More informationUNCORRECTED PROOF ARTICLE IN PRESS. 1 Expert Systems with Applications. 2 Mining knowledge from object-oriented instances
1 Expert Systems with Applications Expert Systems with Applications xxx (26) xxx xxx wwwelseviercom/locate/eswa 2 Mining knowledge from object-oriented instances 3 Cheng-Ming Huang a, Tzung-Pei Hong b,
More informationMinimum congestion spanning trees in bipartite and random graphs
Minimum congetion panning tree in bipartite and random graph M.I. Otrovkii Department of Mathematic and Computer Science St. John Univerity 8000 Utopia Parkway Queen, NY 11439, USA e-mail: otrovm@tjohn.edu
More informationMining High Average-Utility Itemsets
Proceedings of the 2009 IEEE International Conference on Systems, Man, and Cybernetics San Antonio, TX, USA - October 2009 Mining High Itemsets Tzung-Pei Hong Dept of Computer Science and Information Engineering
More informationLaboratory Exercise 6
Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each type of circuit will be implemented in two
More informationMaintenance of Generalized Association Rules for Record Deletion Based on the Pre-Large Concept
Proceedings of the 6th WSEAS Int. Conf. on Artificial Intelligence, Knowledge Engineering and ata Bases, Corfu Island, Greece, February 16-19, 2007 142 Maintenance of Generalized Association Rules for
More informationA reduced reference image quality metric based on feature fusion and neural networks
Univerity of Wollongong Reearch Online Faculty of Engineering and Information Science - Paper: Part A Faculty of Engineering and Information Science 2011 A reduced reference image quality metric baed on
More informationDistributed Packet Processing Architecture with Reconfigurable Hardware Accelerators for 100Gbps Forwarding Performance on Virtualized Edge Router
Ditributed Packet Proceing Architecture with Reconfigurable Hardware Accelerator for 100Gbp Forwarding Performance on Virtualized Edge Router Satohi Nihiyama, Hitohi Kaneko, and Ichiro Kudo Abtract To
More informationUniversität Augsburg. Institut für Informatik. Approximating Optimal Visual Sensor Placement. E. Hörster, R. Lienhart.
Univerität Augburg à ÊÇÅÍÆ ËÀǼ Approximating Optimal Viual Senor Placement E. Hörter, R. Lienhart Report 2006-01 Januar 2006 Intitut für Informatik D-86135 Augburg Copyright c E. Hörter, R. Lienhart Intitut
More informationTrainable Context Model for Multiscale Segmentation
Trainable Context Model for Multicale Segmentation Hui Cheng and Charle A. Bouman School of Electrical and Computer Engineering Purdue Univerity Wet Lafayette, IN 47907-1285 {hui, bouman}@ ecn.purdue.edu
More informationSLA Adaptation for Service Overlay Networks
SLA Adaptation for Service Overlay Network Con Tran 1, Zbigniew Dziong 1, and Michal Pióro 2 1 Department of Electrical Engineering, École de Technologie Supérieure, Univerity of Quebec, Montréal, Canada
More informationPerformance of a Robust Filter-based Approach for Contour Detection in Wireless Sensor Networks
Performance of a Robut Filter-baed Approach for Contour Detection in Wirele Senor Network Hadi Alati, William A. Armtrong, Jr., and Ai Naipuri Department of Electrical and Computer Engineering The Univerity
More informationKeywords Cloud Computing, Service Level Agreements (SLA), CloudSim, Monitoring & Controlling SLA Agent, JADE
Volume 5, Iue 8, Augut 2015 ISSN: 2277 128X International Journal of Advanced Reearch in Computer Science and Software Engineering Reearch Paper Available online at: www.ijarce.com Verification of Agent
More informationxy-monotone path existence queries in a rectilinear environment
CCCG 2012, Charlottetown, P.E.I., Augut 8 10, 2012 xy-monotone path exitence querie in a rectilinear environment Gregory Bint Anil Mahehwari Michiel Smid Abtract Given a planar environment coniting of
More informationUC Berkeley International Conference on GIScience Short Paper Proceedings
UC Berkeley International Conference on GIScience Short Paper Proceeding Title A novel method for probabilitic coverage etimation of enor network baed on 3D vector repreentation in complex urban environment
More informationLinkGuide: Towards a Better Collection of Hyperlinks in a Website Homepage
Proceeding of the World Congre on Engineering 2007 Vol I LinkGuide: Toward a Better Collection of Hyperlink in a Webite Homepage A. Ammari and V. Zharkova chool of Informatic, Univerity of Bradford anammari@bradford.ac.uk,
More informationPlanning of scooping position and approach path for loading operation by wheel loader
22 nd International Sympoium on Automation and Robotic in Contruction ISARC 25 - September 11-14, 25, Ferrara (Italy) 1 Planning of cooping poition and approach path for loading operation by wheel loader
More informationAUTOMATIC TEST CASE GENERATION USING UML MODELS
Volume-2, Iue-6, June-2014 AUTOMATIC TEST CASE GENERATION USING UML MODELS 1 SAGARKUMAR P. JAIN, 2 KHUSHBOO S. LALWANI, 3 NIKITA K. MAHAJAN, 4 BHAGYASHREE J. GADEKAR 1,2,3,4 Department of Computer Engineering,
More informationDAROS: Distributed User-Server Assignment And Replication For Online Social Networking Applications
DAROS: Ditributed Uer-Server Aignment And Replication For Online Social Networking Application Thuan Duong-Ba School of EECS Oregon State Univerity Corvalli, OR 97330, USA Email: duongba@eec.oregontate.edu
More informationIMPROVED JPEG DECOMPRESSION OF DOCUMENT IMAGES BASED ON IMAGE SEGMENTATION. Tak-Shing Wong, Charles A. Bouman, and Ilya Pollak
IMPROVED DECOMPRESSION OF DOCUMENT IMAGES BASED ON IMAGE SEGMENTATION Tak-Shing Wong, Charle A. Bouman, and Ilya Pollak School of Electrical and Computer Engineering Purdue Univerity ABSTRACT We propoe
More informationHassan Ghaziri AUB, OSB Beirut, Lebanon Key words Competitive self-organizing maps, Meta-heuristics, Vehicle routing problem,
COMPETITIVE PROBABIISTIC SEF-ORGANIZING MAPS FOR ROUTING PROBEMS Haan Ghaziri AUB, OSB Beirut, ebanon ghaziri@aub.edu.lb Abtract In thi paper, we have applied the concept of the elf-organizing map (SOM)
More informationKaren L. Collins. Wesleyan University. Middletown, CT and. Mark Hovey MIT. Cambridge, MA Abstract
Mot Graph are Edge-Cordial Karen L. Collin Dept. of Mathematic Weleyan Univerity Middletown, CT 6457 and Mark Hovey Dept. of Mathematic MIT Cambridge, MA 239 Abtract We extend the definition of edge-cordial
More informationA Novel Feature Line Segment Approach for Pattern Classification
12th International Conference on Information Fuion Seattle, WA, USA, July 6-9, 2009 A Novel Feature Line Segment Approach for Pattern Claification Yi Yang Intitute of Integrated Automation Xi an Jiaotong
More informationA GA-based fuzzy mining approach to achieve a trade-off between number of rules and suitability of membership functions
Soft Comput (26 : 9 DOI.7/s5-6-46-x ORIGINAL PAPER Tzung-Pei Hong Chun-Hao Chen Yu-Lung Wu Yeong-Chyi Lee A GA-based fuzzy mining approach to achieve a trade-off between number of rules and suitability
More informationWeb Page Recommendation Approach Using Weighted Sequential Patterns and Markov Model
Global Journal of Computer Science and Technology Volume 2 Iue 9 Verion.0 April 202 Type: Double Blind Peer Reviewed International Reearch Journal Publiher: Global Journal Inc. (USA) Online ISSN: 0975-472
More informationChapter 13 Non Sampling Errors
Chapter 13 Non Sampling Error It i a general aumption in the ampling theory that the true value of each unit in the population can be obtained and tabulated without any error. In practice, thi aumption
More information3D SMAP Algorithm. April 11, 2012
3D SMAP Algorithm April 11, 2012 Baed on the original SMAP paper [1]. Thi report extend the tructure of MSRF into 3D. The prior ditribution i modified to atify the MRF property. In addition, an iterative
More informationLaboratory Exercise 6
Laboratory Exercie 6 Adder, Subtractor, and Multiplier a a The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each b c circuit will be decribed in Verilog
More informationCombining Web Usage Mining and Fuzzy Inference for Website Personalization
Combining Web Uage Mining and Fuzzy Inference for Webite Peronalization Olfa Naraoui and Chritopher Petene Dept. of Electrical and Computer Engineering 206 Engineering Science Bldg. The Univerity of Memphi
More informationKey Terms - MinMin, MaxMin, Sufferage, Task Scheduling, Standard Deviation, Load Balancing.
Volume 3, Iue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Reearch in Computer Science and Software Engineering Reearch Paper Available online at: www.ijarce.com Tak Aignment in
More informationAn Efficient Tree-based Fuzzy Data Mining Approach
150 International Journal of Fuzzy Systems, Vol. 12, No. 2, June 2010 An Efficient Tree-based Fuzzy Data Mining Approach Chun-Wei Lin, Tzung-Pei Hong, and Wen-Hsiang Lu Abstract 1 In the past, many algorithms
More informationOperational Semantics Class notes for a lecture given by Mooly Sagiv Tel Aviv University 24/5/2007 By Roy Ganor and Uri Juhasz
Operational emantic Page Operational emantic Cla note for a lecture given by Mooly agiv Tel Aviv Univerity 4/5/7 By Roy Ganor and Uri Juhaz Reference emantic with Application, H. Nielon and F. Nielon,
More informationA System Dynamics Model for Transient Availability Modeling of Repairable Redundant Systems
International Journal of Performability Engineering Vol., No. 3, May 05, pp. 03-. RAMS Conultant Printed in India A Sytem Dynamic Model for Tranient Availability Modeling of Repairable Redundant Sytem
More informationES205 Analysis and Design of Engineering Systems: Lab 1: An Introductory Tutorial: Getting Started with SIMULINK
ES05 Analyi and Deign of Engineering Sytem: Lab : An Introductory Tutorial: Getting Started with SIMULINK What i SIMULINK? SIMULINK i a oftware package for modeling, imulating, and analyzing dynamic ytem.
More informationA note on degenerate and spectrally degenerate graphs
A note on degenerate and pectrally degenerate graph Noga Alon Abtract A graph G i called pectrally d-degenerate if the larget eigenvalue of each ubgraph of it with maximum degree D i at mot dd. We prove
More informationAn Approach to a Test Oracle for XML Query Testing
An Approach to a Tet Oracle for XML Query Teting Dae S. Kim-Park, Claudio de la Riva, Javier Tuya Univerity of Oviedo Computing Department Campu of Vieque, /n, 33204 (SPAIN) kim_park@li.uniovi.e, claudio@uniovi.e,
More informationOn combining Learning Vector Quantization and the Bayesian classifiers for natural textured images
On combining Learning Vector Quantization and the Bayeian claifier for natural textured image María Guiarro Dept. Ingeniería del Software e Inteligencia Artificial Facultad Informática Univeridad Complutene
More informationAspects of Formal and Graphical Design of a Bus System
Apect of Formal and Graphical Deign of a Bu Sytem Tiberiu Seceleanu Univerity of Turku, Dpt. of Information Technology Turku, Finland tiberiu.eceleanu@utu.fi Tomi Weterlund Turku Centre for Computer Science
More information3D MODELLING WITH LINEAR APPROACHES USING GEOMETRIC PRIMITIVES
MAKARA, TEKNOLOGI, VOL. 9, NO., APRIL 5: 3-35 3D MODELLING WITH LINEAR APPROACHES USING GEOMETRIC PRIMITIVES Mochammad Zulianyah Informatic Engineering, Faculty of Engineering, ARS International Univerity,
More informationKinematics Programming for Cooperating Robotic Systems
Kinematic Programming for Cooperating Robotic Sytem Critiane P. Tonetto, Carlo R. Rocha, Henrique Sima, Altamir Dia Federal Univerity of Santa Catarina, Mechanical Engineering Department, P.O. Box 476,
More informationStochastic Search and Graph Techniques for MCM Path Planning Christine D. Piatko, Christopher P. Diehl, Paul McNamee, Cheryl Resch and I-Jeng Wang
Stochatic Search and Graph Technique for MCM Path Planning Chritine D. Piatko, Chritopher P. Diehl, Paul McNamee, Cheryl Rech and I-Jeng Wang The John Hopkin Univerity Applied Phyic Laboratory, Laurel,
More informationManeuverable Relays to Improve Energy Efficiency in Sensor Networks
Maneuverable Relay to Improve Energy Efficiency in Senor Network Stephan Eidenbenz, Luka Kroc, Jame P. Smith CCS-5, MS M997; Lo Alamo National Laboratory; Lo Alamo, NM 87545. Email: {eidenben, kroc, jpmith}@lanl.gov
More informationA User-Attention Based Focus Detection Framework and Its Applications
A Uer-Attention Baed Focu Detection Framework and It Application Chia-Chiang Ho, Wen-Huang Cheng, Ting-Jian Pan, Ja-Ling Wu Communication and Multimedia Laboratory, Department of Computer Science and Information
More information/06/$ IEEE 364
006 IEEE International ympoium on ignal Proceing and Information Technology oie Variance Etimation In ignal Proceing David Makovoz IPAC, California Intitute of Technology, MC-0, Paadena, CA, 95 davidm@ipac.caltech.edu;
More informationDynamically Reconfigurable Neuron Architecture for the Implementation of Self- Organizing Learning Array
Dynamically Reconfigurable Neuron Architecture for the Implementation of Self- Organizing Learning Array Januz A. Starzyk,Yongtao Guo, and Zhineng Zhu School of Electrical Engineering & Computer Science
More informationLaboratory Exercise 6
Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each circuit will be decribed in Verilog and implemented
More informationA Novel Grey-RSS Navigation System Design for Mobile Robots
A vel Grey-RSS Navigation Sytem Deign for Mobile Robot Albert Wen-Long Yao*,, Hin-Te Liao, and Shiou-De Chen Department of Mechanical and Automation Engineering, National Kaohiung Firt Univerity of Science
More informationelse end while End References
621-630. [RM89] [SK76] Roenfeld, A. and Melter, R. A., Digital geometry, The Mathematical Intelligencer, vol. 11, No. 3, 1989, pp. 69-72. Sklanky, J. and Kibler, D. F., A theory of nonuniformly digitized
More informationEdits in Xylia Validity Preserving Editing of XML Documents
dit in Xylia Validity Preerving diting of XML Document Pouria Shaker, Theodore S. Norvell, and Denni K. Peter Faculty of ngineering and Applied Science, Memorial Univerity of Newfoundland, St. John, NFLD,
More informationANALYSIS OF THE FIRST LAYER IN WEIGHTLESS NEURAL NETWORKS FOR 3_DIMENSIONAL PATTERN RECOGNITION
ANALYSIS OF THE FIRST LAYER IN WEIGHTLESS NEURAL NETWORKS FOR 3_DIMENSIONAL PATTERN RECOGNITION A. Váque-Nava * Ecuela de Ingeniería. CENTRO UNIVERSITARIO MEXICO. DIVISION DE ESTUDIOS SUPERIORES J. Figueroa
More information[N309] Feedforward Active Noise Control Systems with Online Secondary Path Modeling. Muhammad Tahir Akhtar, Masahide Abe, and Masayuki Kawamata
he 32nd International Congre and Expoition on Noie Control Engineering Jeju International Convention Center, Seogwipo, Korea, Augut 25-28, 2003 [N309] Feedforward Active Noie Control Sytem with Online
More informationBuilding a Compact On-line MRF Recognizer for Large Character Set using Structured Dictionary Representation and Vector Quantization Technique
202 International Conference on Frontier in Handwriting Recognition Building a Compact On-line MRF Recognizer for Large Character Set uing Structured Dictionary Repreentation and Vector Quantization Technique
More informationIncreasing Throughput and Reducing Delay in Wireless Sensor Networks Using Interference Alignment
Int. J. Communication, Network and Sytem Science, 0, 5, 90-97 http://dx.doi.org/0.436/ijcn.0.50 Publihed Online February 0 (http://www.scirp.org/journal/ijcn) Increaing Throughput and Reducing Delay in
More informationA METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS
Vietnam Journal of Science and Technology 55 (5) (017) 650-657 DOI: 10.1565/55-518/55/5/906 A METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS Nguyen Huu Quang *, Banh
More information1 The secretary problem
Thi i new material: if you ee error, pleae email jtyu at tanford dot edu 1 The ecretary problem We will tart by analyzing the expected runtime of an algorithm, a you will be expected to do on your homework.
More informationAn Improved Implementation of Elliptic Curve Digital Signature by Using Sparse Elements
The International Arab Journal of Information Technology, Vol. 1, No., July 004 0 An Improved Implementation of Elliptic Curve Digital Signature by Uing Spare Element Eam Al-Daoud Computer Science Department,
More informationMaintenance of fast updated frequent pattern trees for record deletion
Maintenance of fast updated frequent pattern trees for record deletion Tzung-Pei Hong a,b,, Chun-Wei Lin c, Yu-Lung Wu d a Department of Computer Science and Information Engineering, National University
More informationModeling of underwater vehicle s dynamics
Proceeding of the 11th WEA International Conference on YTEM, Agio Nikolao, Crete Iland, Greece, July 23-25, 2007 44 Modeling of underwater vehicle dynamic ANDRZEJ ZAK Department of Radiolocation and Hydrolocation
More informationnp vp cost = 0 cost = c np vp cost = c I replacing term cost = c+c n cost = c * Error detection Error correction pron det pron det n gi
Spoken Language Paring with Robutne and ncrementality Yohihide Kato, Shigeki Matubara, Katuhiko Toyama and Yauyohi nagaki y Graduate School of Engineering, Nagoya Univerity y Faculty of Language and Culture,
More informationCourse Project: Adders, Subtractors, and Multipliers a
In the name Allah Department of Computer Engineering 215 Spring emeter Computer Architecture Coure Intructor: Dr. Mahdi Abbai Coure Project: Adder, Subtractor, and Multiplier a a The purpoe of thi p roject
More informationShortest Paths with Single-Point Visibility Constraint
Shortet Path with Single-Point Viibility Contraint Ramtin Khoravi Mohammad Ghodi Department of Computer Engineering Sharif Univerity of Technology Abtract Thi paper tudie the problem of finding a hortet
More informationA Hybrid Deployable Dynamic Traffic Assignment Framework for Robust Online Route Guidance
A Hybrid Deployable Dynamic Traffic Aignment Framework for Robut Online Route Guidance Sriniva Peeta School of Civil Engineering, Purdue Univerity Chao Zhou Sabre, Inc. Sriniva Peeta School of Civil Engineering
More informationKeywords: Defect detection, linear phased array transducer, parameter optimization, phased array ultrasonic B-mode imaging testing.
Send Order for Reprint to reprint@benthamcience.ae 488 The Open Automation and Control Sytem Journal, 2014, 6, 488-492 Open Acce Parameter Optimization of Linear Phaed Array Tranducer for Defect Detection
More informationNew Structural Decomposition Techniques for Constraint Satisfaction Problems
New Structural Decompoition Technique for Contraint Satifaction Problem Yaling Zheng and Berthe Y. Choueiry Contraint Sytem Laboratory Univerity of Nebraka-Lincoln Email: yzheng choueiry@ce.unl.edu Abtract.
More informationA Linear Interpolation-Based Algorithm for Path Planning and Replanning on Girds *
Advance in Linear Algebra & Matrix Theory, 2012, 2, 20-24 http://dx.doi.org/10.4236/alamt.2012.22003 Publihed Online June 2012 (http://www.scirp.org/journal/alamt) A Linear Interpolation-Baed Algorithm
More informationLaboratory Exercise 6
Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each circuit will be decribed in VHL and implemented
More informationA TOPSIS based Method for Gene Selection for Cancer Classification
Volume 67 No17, April 2013 A TOPSIS baed Method for Gene Selection for Cancer Claification IMAbd-El Fattah,WIKhedr, KMSallam, 1 Department of Statitic, 3 Department of Deciion upport, 2 Department of information
More informationService and Network Management Interworking in Future Wireless Systems
Service and Network Management Interworking in Future Wirele Sytem V. Tountopoulo V. Stavroulaki P. Demeticha N. Mitrou and M. Theologou National Technical Univerity of Athen Department of Electrical Engineering
More informationAN EFFICIENT GRADUAL PRUNING TECHNIQUE FOR UTILITY MINING. Received April 2011; revised October 2011
International Journal of Innovative Computing, Information and Control ICIC International c 2012 ISSN 1349-4198 Volume 8, Number 7(B), July 2012 pp. 5165 5178 AN EFFICIENT GRADUAL PRUNING TECHNIQUE FOR
More informationImage authentication and tamper detection using fragile watermarking in spatial domain
International Journal of Advanced Reearch in Computer Engineering & Technology (IJARCET) Volume 6, Iue 7, July 2017, ISSN: 2278 1323 Image authentication and tamper detection uing fragile watermarking
More informationAdvanced Encryption Standard and Modes of Operation
Advanced Encryption Standard and Mode of Operation G. Bertoni L. Breveglieri Foundation of Cryptography - AES pp. 1 / 50 AES Advanced Encryption Standard (AES) i a ymmetric cryptographic algorithm AES
More informationThe development of the South African ehealth Strategy assessed against the recommendations of the WHO/ITU ehealth Strategy Toolkit
The development of the South African ehealth Strategy aeed againt the recommendation of the WHO/ITU ehealth Strategy Toolkit Roemary Foter PhD a,b a ehealth Strategy and Policy Diviion, Medical Reearch
More informationA Practical Model for Minimizing Waiting Time in a Transit Network
A Practical Model for Minimizing Waiting Time in a Tranit Network Leila Dianat, MASc, Department of Civil Engineering, Sharif Univerity of Technology, Tehran, Iran Youef Shafahi, Ph.D. Aociate Profeor,
More informationAN INTELLIGENT SCHEME FOR FACIAL EXPRESSION RECOGNITION
AN INTELLIGENT SCHEME FOR FACIAL EXPRESSION RECOGNITION A. Raouzaiou, S. Ioannou, K. Karpouzi, N. Tapatouli, S. Kollia 1, R. Cowie 2 1 Department of Electrical and Computer Engineering National Technical
More informationHow to. write a paper. The basics writing a solid paper Different communities/different standards Common errors
How to write a paper The baic writing a olid paper Different communitie/different tandard Common error Reource Raibert eay My grammar point Article on a v. the Bug in writing Clarity Goal Conciene Calling
More informationCompressed Sensing Image Processing Based on Stagewise Orthogonal Matching Pursuit
Senor & randucer, Vol. 8, Iue 0, October 204, pp. 34-40 Senor & randucer 204 by IFSA Publihing, S. L. http://www.enorportal.com Compreed Sening Image Proceing Baed on Stagewie Orthogonal Matching Puruit
More informationThe Comparison of Neighbourhood Set and Degrees of an Interval Graph G Using an Algorithm
The Comparion of Neighbourhood Set and Degree of an Interval Graph G Uing an Algorithm Dr.A.Sudhakaraiah, K.Narayana Aitant Profeor, Department of Mathematic, S.V. Univerity, Andhra Pradeh, India Reearch
More informationAnalysis of the results of analytical and simulation With the network model and dynamic priority Unchecked Buffer
International Reearch Journal of Applied and Baic Science 218 Available online at www.irjab.com ISSN 2251-838X / Vol, 12 (1): 49-53 Science Explorer Publication Analyi of the reult of analytical and imulation
More informationMotion Control (wheeled robots)
3 Motion Control (wheeled robot) Requirement for Motion Control Kinematic / dynamic model of the robot Model of the interaction between the wheel and the ground Definition of required motion -> peed control,
More informationLocating Brain Tumors from MR Imagery Using Symmetry
ocating rain Tumor from M magery Uing Symmetry Nilanjan ay aidya Nath Saha and Matthew obert Graham rown {nray1 baidya mbrown}@cualbertaca epartment of Computing Science Univerity of lberta Canada btract
More informationOn successive packing approach to multidimensional (M-D) interleaving
On ucceive packing approach to multidimenional (M-D) interleaving Xi Min Zhang Yun Q. hi ankar Bau Abtract We propoe an interleaving cheme for multidimenional (M-D) interleaving. To achieved by uing a
More informationResearch on Star Image Noise Filtering Based on Diffusion Model of Regularization Influence Function
016 Sith International Conference on Intrumentation & Meaurement Computer Communication and Control Reearch on Star Image Noie Filtering Baed on Diffuion Model of Regularization Influence Function SunJianming
More informationRouting Definition 4.1
4 Routing So far, we have only looked at network without dealing with the iue of how to end information in them from one node to another The problem of ending information in a network i known a routing
More informationFrequency Table Computation on Dataflow Architecture
Frequency Table Computation on Dataflow Architecture P. Škoda *, V. Sruk **, and B. Medved Rogina * * Ruđer Bošković Intitute, Zagreb, Croatia ** Faculty of Electrical Engineering and Computing, Univerity
More informationCENTER-POINT MODEL OF DEFORMABLE SURFACE
CENTER-POINT MODEL OF DEFORMABLE SURFACE Piotr M. Szczypinki Iintitute of Electronic, Technical Univerity of Lodz, Poland Abtract: Key word: Center-point model of deformable urface for egmentation of 3D
More information(12) Patent Application Publication (10) Pub. No.: US 2011/ A1
(19) United State US 2011 0316690A1 (12) Patent Application Publication (10) Pub. No.: US 2011/0316690 A1 Siegman (43) Pub. Date: Dec. 29, 2011 (54) SYSTEMAND METHOD FOR IDENTIFYING ELECTRICAL EQUIPMENT
More informationA New Approach for Handling the Iris Data Classification Problem
International Journal of Applied Science and Engineering 2005. 3, : 37-49 A New Approach for Handling the Iris Data Classification Problem Shyi-Ming Chen a and Yao-De Fang b a Department of Computer Science
More informationHow to Select Measurement Points in Access Point Localization
Proceeding of the International MultiConference of Engineer and Computer Scientit 205 Vol II, IMECS 205, March 8-20, 205, Hong Kong How to Select Meaurement Point in Acce Point Localization Xiaoling Yang,
More informationImplementation of a momentum-based distance metric for motion graphs. Student: Alessandro Di Domenico (st.no ), Supervisor: Nicolas Pronost
Implementation of a momentum-baed ditance metric for motion graph Student: Aleandro Di Domenico (t.no 3775682), Supervior: Nicola Pronot April 3, 2014 Abtract Thi report preent the procedure and reult
More informationIntegrated Single-arm Assembly and Manipulation Planning using Dynamic Regrasp Graphs
Proceeding of The 2016 IEEE International Conference on Real-time Computing and Robotic June 6-9, 2016, Angkor Wat, Cambodia Integrated Single-arm Aembly and Manipulation Planning uing Dynamic Regrap Graph
More informationCERIAS Tech Report EFFICIENT PARALLEL ALGORITHMS FOR PLANAR st-graphs. by Mikhail J. Atallah, Danny Z. Chen, and Ovidiu Daescu
CERIAS Tech Report 2003-15 EFFICIENT PARALLEL ALGORITHMS FOR PLANAR t-graphs by Mikhail J. Atallah, Danny Z. Chen, and Ovidiu Daecu Center for Education and Reearch in Information Aurance and Security,
More informationAn Intro to LP and the Simplex Algorithm. Primal Simplex
An Intro to LP and the Simplex Algorithm Primal Simplex Linear programming i contrained minimization of a linear objective over a olution pace defined by linear contraint: min cx Ax b l x u A i an m n
More informationDelaunay Triangulation: Incremental Construction
Chapter 6 Delaunay Triangulation: Incremental Contruction In the lat lecture, we have learned about the Lawon ip algorithm that compute a Delaunay triangulation of a given n-point et P R 2 with O(n 2 )
More informationThe Association of System Performance Professionals
The Aociation of Sytem Performance Profeional The Computer Meaurement Group, commonly called CMG, i a not for profit, worldwide organization of data proceing profeional committed to the meaurement and
More informationWeb Science and additionality
Admin tuff... Lecture 1: EITN01 Web Intelligence and Information Retrieval Meage, lide, handout, lab manual and link: http://www.eit.lth.e/coure/eitn01 Contact: Ander Ardö, Ander.Ardo@eit.lth.e, room:
More information