Default Cover Image

Proceedings of the 2003 International Conference on Machine Learning and Cybernetics

Nov. 5 2003 to Nov. 5 2003

Xi'an

Volume:

Table of Contents

A multistage support vector machineFull-text access may be available. Sign in or learn about subscription options.pp. 1305,1306,1307,1308
Content based texture image classificationFull-text access may be available. Sign in or learn about subscription options.pp. 1309,1310,1311,1312,1313
A new method of SAR image segmentation based on fuzzy ARTFull-text access may be available. Sign in or learn about subscription options.pp. 1314,1315,1316,1317
The design and application of neural network controller based on genetic algorithmsFull-text access may be available. Sign in or learn about subscription options.pp. 1318,1319,1320,1321
A method of fingerprint identification based on space invariant transforms and support vector machinesFull-text access may be available. Sign in or learn about subscription options.pp. 1322,1323,1324,1325,1326,1327
Dynamically forecasting timeouts for group membership in WANsFull-text access may be available. Sign in or learn about subscription options.pp. 1328,1329,1330,1331,1332
A load balance service based on probabilistic neural networkFull-text access may be available. Sign in or learn about subscription options.pp. 1333,1334,1335,1336
ANNIDS: intrusion detection system based on artificial neural networkFull-text access may be available. Sign in or learn about subscription options.pp. 1337,1338,1339,1340,1341,1342
Application of binary neural networks for classificationFull-text access may be available. Sign in or learn about subscription options.pp. 1343,1344,1345,1346,1347,1348
Sensitivity of Madalines to input and weight perturbationsFull-text access may be available. Sign in or learn about subscription options.pp. 1349,1350,1351,1352,1353,1354
Center selection for RBF neural network in prediction of nonlinear time seriesFull-text access may be available. Sign in or learn about subscription options.pp. 1355,1356,1357,1358,1359
A method to establish a neural network based on the whole knowledgeFull-text access may be available. Sign in or learn about subscription options.pp. 1364,1365,1366,1367,1368,1369
The robust backpropagation training of MLP's: an optimal rapid restart methodFull-text access may be available. Sign in or learn about subscription options.pp. 1370,1371,1372,1373
Sensor-based navigation system using a modified ART-2 network and fuzzy controller for an indoor mobile robotFull-text access may be available. Sign in or learn about subscription options.pp. 1374,1375,1376,1377,1378,1379
Information geometry on extendable hierarchical large scale neural network modelFull-text access may be available. Sign in or learn about subscription options.pp. 1380,1381,1382,1383,1384
Research of time series pattern finding based on artificial neural networkFull-text access may be available. Sign in or learn about subscription options.pp. 1385,1386,1387,1388
A fault diagnosis method of the main transformer in the power train using compound data fusion methodFull-text access may be available. Sign in or learn about subscription options.pp. 1389,1390,1391,1392,1393
The equivalence between a clause set and a kind of extension multi-layer perceptronFull-text access may be available. Sign in or learn about subscription options.pp. 1394,1395,1396,1397,1398,1399
Asymptotic normality of posterior in consistent Bayesian learningFull-text access may be available. Sign in or learn about subscription options.pp. 1400,1401,1402,1403
Mathematical model of thermocouple characteristic based on neural networkFull-text access may be available. Sign in or learn about subscription options.pp. 1404,1405,1406,1407
One kind of establishing method for Hopfield neural network modelFull-text access may be available. Sign in or learn about subscription options.pp. 1408,1409,1410,1411,1412
A modular neural network based on genetic algorithm for FMS reliability optimizationFull-text access may be available. Sign in or learn about subscription options.pp. 1413,1414,1415,1416,1417,1418
Generalized multilayer granulation and approximationsFull-text access may be available. Sign in or learn about subscription options.pp. 1419,1420,1421,1422,1423
A hybrid algorithm for nesting problemsFull-text access may be available. Sign in or learn about subscription options.pp. 1424,1425,1426,1427,1428,1429
Study on discretization in rough set based on genetic algorithmFull-text access may be available. Sign in or learn about subscription options.pp. 1430,1431,1432,1433,1434
A comparative study of incomplete and complete information systemsFull-text access may be available. Sign in or learn about subscription options.pp. 1435,1436,1437
Ordinal fuzzy sets and rough setsFull-text access may be available. Sign in or learn about subscription options.pp. 1438,1439,1440,1441
Some notes on the parameterization reduction of soft setsFull-text access may be available. Sign in or learn about subscription options.pp. 1442,1443,1444,1445
Induction of decision tree with fuzzy number-valued attributeFull-text access may be available. Sign in or learn about subscription options.pp. 1446,1447,1448,1449,1450
Local convergence of general genetic algorithms using dynamical methodFull-text access may be available. Sign in or learn about subscription options.pp. 1451,1452,1453,1454,1455,1456
Analysis on the fuzzy filter in fuzzy decision treesFull-text access may be available. Sign in or learn about subscription options.pp. 1457,1458,1459,1460,1461,1462
Designing neural networks ensembles based on the evolutionary programmingFull-text access may be available. Sign in or learn about subscription options.pp. 1463,1464,1465,1466
Errors of fuzzy reasoningFull-text access may be available. Sign in or learn about subscription options.pp. 1467,1468,1469,1470,1471,1472
Nonlinear blind separation algorithm using multiobjective evolutionary algorithmFull-text access may be available. Sign in or learn about subscription options.pp. 1473,1474,1475,1476
Design and implementation of examination and approval system based on CBRFull-text access may be available. Sign in or learn about subscription options.pp. 1477,1478,1479,1480,1481
Factorization of Gaussian mixtures densities for hidden Markov modelsFull-text access may be available. Sign in or learn about subscription options.pp. 1482,1483,1484,1485,1486,1487
An analysis of temporal and spatial relationsFull-text access may be available. Sign in or learn about subscription options.pp. 1488,1489,1490
The application of ant colony system to image textute classification [textute read texture]Full-text access may be available. Sign in or learn about subscription options.pp. 1491,1492,1493,1494,1495
Using mutual information for selecting continuous-valued attribute in decision tree learningFull-text access may be available. Sign in or learn about subscription options.pp. 1496,1497,1498,1499
An algorithm based on improved Bayesian inference network model for prediction protein secondary structureFull-text access may be available. Sign in or learn about subscription options.pp. 1500,1501,1502,1503,1504
An uncertain information fusion method for fault diagnosis of complex systemFull-text access may be available. Sign in or learn about subscription options.pp. 1505,1506,1507,1508,1509,1510
Some properties of fuzzy logic with similarityFull-text access may be available. Sign in or learn about subscription options.pp. 1511,1512,1513,1514,1515
Knowledge markup and XML-based distributed automated reasoningFull-text access may be available. Sign in or learn about subscription options.pp. 1516,1517,1518,1519,1520,1521,1522
A novel approach to computing rule confidence in rough sets theoryFull-text access may be available. Sign in or learn about subscription options.pp. 1523,1524,1525,1526
Methods for meta-information maintenance in rough set theoryFull-text access may be available. Sign in or learn about subscription options.pp. 1527,1528,1529,1530,1531,1532
A new reduction algorithm - difference-similitude matrixFull-text access may be available. Sign in or learn about subscription options.pp. 1533,1534,1535,1536,1537
A CBR model for knowledge sharing in supply chain based on generalized rough setFull-text access may be available. Sign in or learn about subscription options.pp. 1538,1539,1540,1541,1542
Study on integrated monitor and control of the apparatus quality based on the multi-parameter analysisFull-text access may be available. Sign in or learn about subscription options.pp. 1543,1544,1545,1546,1547,1548
A lazy algorithm for decision tree induction based on importance of attributesFull-text access may be available. Sign in or learn about subscription options.pp. 1549,1550,1551,1552
Application of an EACS algorithm to obstacle detour routing in VLSI physical designFull-text access may be available. Sign in or learn about subscription options.pp. 1553,1554,1555,1556,1557,1558
A fast approach to building rough data model through G-K fuzzy clusteringFull-text access may be available. Sign in or learn about subscription options.pp. 1559,1560,1561,1562,1563,1564
Fuzzy accumulation points and convergence of molecular netFull-text access may be available. Sign in or learn about subscription options.pp. 1565,1566,1567,1568
A fuzzy matching method of fuzzy decision treesFull-text access may be available. Sign in or learn about subscription options.pp. 1569,1570,1571,1572,1573
A rough set approach to selecting attributes for ordinal predictionFull-text access may be available. Sign in or learn about subscription options.pp. 1574,1575,1576,1577
Uncertainty reasoning based on filter of lattice implication algebraFull-text access may be available. Sign in or learn about subscription options.pp. 1578,1579,1580,1581,1582
Particle swarm optimization for traveling salesman problemFull-text access may be available. Sign in or learn about subscription options.pp. 1583,1584,1585
A genetic algorithm for the unbounded knapsack problemFull-text access may be available. Sign in or learn about subscription options.pp. 1586,1587,1588,1589,1590
Diversity-based case base maintenanceFull-text access may be available. Sign in or learn about subscription options.pp. 1591,1592,1593,1594,1595,1596
An approach to constraint inductive logic programmingFull-text access may be available. Sign in or learn about subscription options.pp. 1597,1598,1599,1600,1601
Off-line signature verification incorporating the prior modelFull-text access may be available. Sign in or learn about subscription options.pp. 1602,1603,1604,1605,1606
Hypothesis-test based simulated annealing for stochastic flow shop schedulingFull-text access may be available. Sign in or learn about subscription options.pp. 1607,1608,1609,1610,1611,1612
Principles and algorithms of semantic analysisFull-text access may be available. Sign in or learn about subscription options.pp. 1613,1614,1615,1616,1617,1618
A heuristic algorithm for reduction of knowledge in probabilistic decision table based on fuzzy entropyFull-text access may be available. Sign in or learn about subscription options.pp. 1619,1620,1621,1622,1623
Adjusting backup-length automatically in reinforcement learningFull-text access may be available. Sign in or learn about subscription options.pp. 1624,1625,1626,1627,1628,1629
ISITL: intrusion signatures in augmented interval temporal logicFull-text access may be available. Sign in or learn about subscription options.pp. 1630,1631,1632,1633,1634,1635
Using regressive graph as a novel paradigm in plan recognitionFull-text access may be available. Sign in or learn about subscription options.pp. 1636,1637,1638,1639,1640,1641
Research on the relationship between 4-intersection and classifying invariant based on the simple regionsFull-text access may be available. Sign in or learn about subscription options.pp. 1642,1643,1644,1645,1646,1647
Particle swarm optimization based hybrid intelligent algorithmFull-text access may be available. Sign in or learn about subscription options.pp. 1648,1649,1650
An overview of genetic algorithms applied to control engineering problemsFull-text access may be available. Sign in or learn about subscription options.pp. 1651,1652,1653,1654,1655,1656
A further study on simplification of decision tablesFull-text access may be available. Sign in or learn about subscription options.pp. 1657,1658,1659,1660,1661
A further discussion on the saddle point programmingFull-text access may be available. Sign in or learn about subscription options.pp. 1662,1663,1664,1665,1666
Research and application of structure learning algorithm for Bayesian networks from distributed dataFull-text access may be available. Sign in or learn about subscription options.pp. 1667,1668,1669,1670,1671
Combining representations of topology and distanceFull-text access may be available. Sign in or learn about subscription options.pp. 1672,1673,1674,1675,1676
Spatio-temporal representation for multi-dimensional occlusion relationFull-text access may be available. Sign in or learn about subscription options.pp. 1677,1678,1679,1680,1681
Neural network resolution on horn clause setFull-text access may be available. Sign in or learn about subscription options.pp. 1682,1683,1684,1685,1686
A fuzzy model of rough setsFull-text access may be available. Sign in or learn about subscription options.pp. 1687,1688,1689,1690,1691
Matrix computation for dynamic modification of rough set information systemFull-text access may be available. Sign in or learn about subscription options.pp. 1692,1693,1694,1695,1696,1697
An approach to attribute generalization in incomplete information systemsFull-text access may be available. Sign in or learn about subscription options.pp. 1698,1699,1700,1701,1702,1703
Research on evaluating method of projects for complex systemFull-text access may be available. Sign in or learn about subscription options.pp. 1708,1709,1710,1711,1712
A new rough set approach to knowledge discovery in incomplete information systemsFull-text access may be available. Sign in or learn about subscription options.pp. 1713,1714,1715,1716,1717,1718
An approach for the use of negative examples for grammar learningFull-text access may be available. Sign in or learn about subscription options.pp. 1719,1720,1721,1722
A method of constructing fuzzy neural network based on rough set theoryFull-text access may be available. Sign in or learn about subscription options.pp. 1723,1724,1725,1726,1727,1728
A new application of rough set to ECG recognitionFull-text access may be available. Sign in or learn about subscription options.pp. 1729,1730,1731,1732,1733,1734
An improved genetic algorithm with variable population-size and a PSO-GA based hybrid evolutionary algorithmFull-text access may be available. Sign in or learn about subscription options.pp. 1735,1736,1737,1738,1739,1740
A synthetic computational-intelligence-based method and its application in identifying water-flooded zones in oil fieldFull-text access may be available. Sign in or learn about subscription options.pp. 1741,1742,1743,1744,1745
Sparse model selection and parameter identificationFull-text access may be available. Sign in or learn about subscription options.pp. 1746,1747,1748,1749,1750,1751
Improving the ability of function approximation of neural network using patulous cross section methodFull-text access may be available. Sign in or learn about subscription options.pp. 1752,1753,1754,1755,1756
Data clustering algorithm based on digital search treeFull-text access may be available. Sign in or learn about subscription options.pp. 1757,1758,1759,1760,1761
Closure operators in lattice-valued propositional logicsFull-text access may be available. Sign in or learn about subscription options.pp. 1762,1763,1764,1765,1766,1767
Case-base maintenance using soft computing techniquesFull-text access may be available. Sign in or learn about subscription options.pp. 1768,1769,1770,1771,1772,1773
A genetic algorithm for solving flow shop scheduling problems with parallel machine and special procedure constraintsFull-text access may be available. Sign in or learn about subscription options.pp. 1774,1775,1776,1777,1778,1779
A new method for edge detectionFull-text access may be available. Sign in or learn about subscription options.pp. 1780,1781,1782,1783,1784
A genetic algorithm for tasks scheduling in parallel multiprocessor systemsFull-text access may be available. Sign in or learn about subscription options.pp. 1785,1786,1787,1788,1789,1790
Using BP-network to construct fuzzy decision tree with composite attributesFull-text access may be available. Sign in or learn about subscription options.pp. 1791,1792,1793,1794,1795
Combining evidence and its application in synthesis decisionFull-text access may be available. Sign in or learn about subscription options.pp. 1796,1797,1798,1799,1800,1801
On the convergence analysis and parameter selection in particle swarm optimizationFull-text access may be available. Sign in or learn about subscription options.pp. 1802,1803,1804,1805,1806,1807
An adaptive QoS route selection algorithm based on genetic approach in combination with neural networkFull-text access may be available. Sign in or learn about subscription options.pp. 1808,1809,1810,1811,1812,1813
Showing 100 out of 130