Machine Learning and Cybernetics 2005 (original) (raw)



default search action
- combined dblp search
- author search
- venue search
- publication search
Authors:
- no matches

Venues:
- no matches

Publications:
- no matches


4th ICMLC 2005: Guangzhou, China

jump to- Agents and Distributed AI
- Intelligent Control (II)
- Data Mining and Knowledge Discovery (II)
- Fuzzy Information Processing (I)
- Learning and Reasoning (I)
- Learning and Reasoning (III)
- Machine Learning Applications (II)
- Neural Networks and Statistical Learning Methods (I)
- Neural Networks and Statistical Learning Methods (III)
- Pattern Recognition (I)
- Vision and Image Processing (I)

SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as

Daniel S. Yeung, Zhi-Qiang Liu, Xizhao Wang, Hong Yan:
Advances in Machine Learning and Cybernetics, 4th International Conference, ICMLC 2005, Guangzhou, China, August 18-21, 2005, Revised Selected Papers. Lecture Notes in Computer Science 3930, Springer 2006, ISBN 3-540-33584-6
Agents and Distributed AI

Li Xu, Wen-Xiang Gu, Xin-mei Zhang:
Backward-Chaining Flexible Planning. 1-10

Xiang Chen, Shanli Hu:
A Vickrey-Type Multi-attribute Auction Model. 21-29

Sahin Albayrak, Dragan Milosevic:
Strategy Coordination Approach for Safe Learning About Novel Filtering Strategies in Multi Agent Framework. 30-42

Jiayu Chi, Ling Sun, Xueguang Chen, Jinlong Zhang:
Modeling and Design of Agent Grid Based Open Decision Support System. 43-52

Mukun Cao, Yuqiang Feng, Yan Li, Chunyan Wang:
Negotiating Agent: Concept, Architecture and Communication Model. 53-63
Intelligent Control (I)

Wei Xiong, You He, Jingwei Zhang:
Particle Filter Method for a Centralized Multisensor System. 64-69

Junfeng Tian, Yuling Liu, Xiao-hui Yang, Ruizhong Du:
Design and Analysis of a Novel Load-Balancing Model Based on Mobile Agent. 70-80

Pingyuan Cui, Junwei Sun, Fengqiu Liu
:
Fuzzy Output Tracking Control and Its Application to Guidance Control for Lunar Gravity-Turn. 81-90

Yong Jiang, Hongguang Wang, Lijin Fang, Mingyang Zhao:
Motion Planning for Climbing Robot Based on Hybrid Navigation. 91-100

Shou-tao Li, Yuan-chun Li:
Hierarchical Fuzzy Behavior-Based Control Method for Autonomous Mobile Robot Navigation. 101-111
Intelligent Control (II)

Hongru Wang, Changhong Wang
, Huijun Gao:
An LMI Approach to Robust Fault Detection Filter Design for Uncertain State-Delayed Systems. 112-121

Jia Wang, Xiaobei Wu, Zhiliang Xu:
Input-to-State Stability Analysis of a Class of Interconnected Nonlinear Systems. 122-132

Jiang Chang, Yan Peng:
Construction and Simulation of the Movable Propeller Turbine Neural Network Model. 133-141

Zhao-Ming Lei, Zuo-jun Liu, He-Xu Sun, Hong-jun Chang:
Research on the Control and Application of Chaos in an Electrical System. 142-148
Data Mining and Knowledge Discovery (I)

Jian-qiang Li, Cheng-lin Niu, Ji-zhen Liu, Luan-ying Zhang:
Research and Application of Data Mining in Power Plant Process Control and Optimization. 149-158

Min Gan, Mingyi Zhang, Shenwen Wang:
Extended Negative Association Rules and the Corresponding Mining Algorithm. 159-168

Ling Chen, Li Tu, Yixin Chen:
An Ant Clustering Method for a Dynamic Database. 169-178

Jia-Dong Ren, Xiao-Lei Zhou:
An Efficient Algorithm for Incremental Mining of Sequential Patterns. 179-188

Weidi Dai, Pilian He, Yuexian Hou, Xiao-Dong Kang:
A Clustering Algorithm Based on Density Kernel Extension. 189-198

Tien Dung Do, Siu Cheung Hui, Alvis Cheuk M. Fong:
Associative Classification with Prediction Confidence. 199-208
Data Mining and Knowledge Discovery (II)

Qingshuang Jiang, Syed Sibte Raza Abidi
:
From Clusters to Rules: A Hybrid Framework for Generalized Symbolic Rule Induction. 219-228

Haojun Sun, Mei Sun:
Trail-and-Error Approach for Determining the Number of Clusters. 229-238

Lin Shi, Pheng-Ann Heng, Tien-Tsin Wong:
Unifying Genetic Algorithm and Clustering Method for Recognizing Activated fMRI Time Series. 239-248

Zhen-Long Du, Xiaoli Li:
Repeating Pattern Discovery from Audio Stream. 249-257
Data Mining and Knowledge Discovery (III)

Wei-ming Wang, Jie Hu, Fei Zhou, Dayong Li, Xiangjun Fu, Ying-hong Peng:
The Study of a Knowledge-Based Constraints Network System (KCNS) for Concurrent Engineering. 268-277

Hong-Zhen Zheng, Dian-Hui Chu, De-chen Zhan:
Rule Induction for Complete Information Systems in Knowledge Acquisition and Classification. 278-284

Yu-Liang Chi
:
Constructing Ontologies for Sharing Knowledge in Digital Archives. 295-304

Jitian Xiao, Jun Wang:
A Similarity-Aware Multiagent-Based Web Content Management Scheme. 305-314

Xi-Dao Luan, Yu-Xiang Xie, Ling-Da Wu, Chi-Long Mao, Songyang Lao:
Information Assistant: An Initiative Topic Search Engine. 315-321

Maozu Guo, Jian-Fu Li:
Improving Retrieval Performance with the Combination of Thesauri and Automatic Relevance Feedback. 322-328
Fuzzy Information Processing (I)

Yan Huang, Congxin Wu:
Choquet Integrals with Respect to Fuzzy Measure on Fuzzy _sigma_-Algebra. 329-337

Liang He, Guang-Ren Duan:
Robust Hinfinitfy Control with Pole Placement Constraints for T-S Fuzzy Systems. 338-346

Fachao Li, Shuxin Luo, Lianqing Su:
A Kind of Fuzzy Genetic Algorithm Based on Rule and Its Performance Research. 347-357

Congxin Wu, Liang Zhao:
The Absolute Additivity and Fuzzy Additivity of Sugeno Integral. 358-366

Yingcang Ma
, Huacan He:
The Axiomatization for 0-Level Universal Logic. 367-376

Yanju Chen, Yan-Kui Liu, Junfen Chen:
Fuzzy Portfolio Selection Problems Based on Credibility Theory. 377-386
Fuzzy Information Processing (II)

Zhicheng Ji, Rongjia Zhu, Yanxia Shen:
Fuzzy Multiple Reference Models Adaptive Control Scheme Study. 387-396

Yuan-Sheng Huang, Jun-hua Zhou, Jian-xun Qi:
Selection of Optimal Technological Innovation Projects Combining Value Engineering with Fuzzy Synthetic Evaluation. 397-406

Xiaoping Qiu, Yang Xu, Ming Jian, Haiming Li:
The Hierarchical Fuzzy Evaluation System and Its Application. 407-416

Xingfang Zhang, Guangwu Meng:
A Solution to a System of Linear Equations with Fuzzy Numbers. 417-427

Raffi R. Kamalian, Ying Zhang, Hideyuki Takagi
, Alice M. Agogino:
Evolutionary Synthesis of Micromachines Using Supervisory Multiobjective Interactive Evolutionary Computation. 428-437

Guoli Zhang, Gengyin Li, Hong Xie, Jianwei Ma:
Application of Weighted Ideal Point Method to Environmental/Economic Load Dispatch. 438-447
Learning and Reasoning (I)

Lei Bao, Xiaolin Qin, Jun Zhang, Qi-Yuan Li:
Reasoning the Spatiotemporal Relations Between Time Evolving Indeterminate Regions. 448-458

Xi-Zhao Wang, Jun Shen:
Using Special Structured Fuzzy Measure to Represent Interaction Among IF-THEN Rules. 459-466

Ren Ren, Jin Xu, Shihua Zhu, Danan Ren, Yongqiang Luo:
Novel Nonlinear Signals Separation of Optimized Entropy Based on Adaptive Natural Gradient Learning. 467-476

Tak-Lam Wong, Wai Lam:
Training Conditional Random Fields with Unlabeled Data and Limited Number of Labeled Examples. 477-486

Yong-Jun Wang, Jiang-She Zhang, Yu-Fen Zhang:
An Effective and Efficient Two Stage Algorithm for Global Optimization. 487-496
Learning and Reasoning (II)

Jianwei Wang, Jianming Zhang, Xiaopeng Wei:
Evolutionary Multi-objective Optimization Algorithm with Preference for Mechanical Design. 497-506

Fan Li, Qihe Liu, Fan Min, Guowei Yang:
A New Adaptive Crossover Operator for the Preservation of Useful Schemata. 507-516

Dongmei Huang, Minghu Ha, Ya-min Li, Eric C. C. Tsang:
Refinement of Fuzzy Production Rules by Using a Fuzzy-Neural Approach. 517-527

Ming Lu, Dapeng Wu, Jian-Ping Zhang:
A Particle Swarm Optimization-Based Approach to Tackling Simulation Optimization of Stochastic, Large-Scale and Complex Systems. 528-537

Li-Juan Wang, Qiang Hua, Xiaolong Wang, Qingcai Chen:
Combination of Multiple Nearest Neighbor Classifiers Based on Feature Subset Clustering Method. 538-547
Learning and Reasoning (III)

Jigang Wang, Predrag Neskovic, Leon N. Cooper:
A Statistical Confidence-Based Adaptive Nearest Neighbor Algorithm for Pattern Classification. 548-557

Yi Wang, Zhi-Qiang Liu, Li-Zhu Zhou:
Automatic 3D Motion Synthesis with Time-Striding Hidden Markov Model. 558-567

Eric C. C. Tsang, Suyun Zhao, Daniel S. Yeung, John W. T. Lee:
Learning from an Incomplete Information System with Continuous-Valued Attributes by a Rough Set Technique. 568-577

John W. T. Lee, Xizhao Wang, Jinfeng Wang:
Reduction of Attributes in Ordinal Decision Systems. 578-587

Degang Chen, Eric C. C. Tsang:
On the Local Reduction of Information System. 588-594
Machine Learning Applications (I)

Tuan D. Pham:
Spectral Analysis of Protein Sequences. 595-604

Lan-Jun Lao:
Volatility Patterns of Industrial Stock Price Indices in the Chinese Stock Market. 605-613

Yan Liu, Changsheng Xie, Huaiyang Li, Zhen Zhao:
Data Migration in RAID Based on Stripe Unit Heat. 614-623

Quansheng Lei, Jian Chen:
Distribution Channel Coordination Through Penalty Schemes. 624-632

Jiabing Wang, Hong Peng, Jing-Song Hu:
Automatic Keyphrases Extraction from Document Using Neural Network. 633-641

Fenghua Lang, Jian Li, Yixian Yang:
A Novel Fuzzy Anomaly Detection Method Based on Clonal Selection Clustering Algorithm. 642-651
Machine Learning Applications (II)

Yi-xuan Liu, Xiao-chun Yun, Bailing Wang, Haibin Sun:
An Anti-worm with Balanced Tree Based Spreading Strategy. 652-661

Muhammad Fermi Pasha, Rahmat Budiarto
, Mohammad Syukur
, Masashi Yamada:
EFIS: Evolvable-Neural-Based Fuzzy Inference System and Its Application for Adaptive Network Anomaly Detection. 662-671

Hui He, Mingzeng Hu, Weizhe Zhang, Hongli Zhang:
Fast Detection of Worm Infection for Large-Scale Networks. 672-681

Aki P. F. Chan, Daniel S. Yeung, Eric C. C. Tsang, Wing W. Y. Ng
:
Empirical Study on Fusion Methods Using Ensemble of RBFNN for Network Intrusion Detection. 682-690

Shuyuan Jin, Daniel S. Yeung, Xizhao Wang, Eric C. C. Tsang:
A Covariance Matrix Based Approach to Internet Anomaly Detection. 691-700

Alex K. S. Wong, John W. T. Lee, Daniel S. Yeung:
Use of Linguistic Features in Context-Sensitive Text Classification. 701-710
Machine Learning Applications (III)

Jian-min Xu, Shuang Zhao, Zhen-peng Liu, Bian-fang Chai:
Using Term Relationships in a Structured Document Retrieval Model Based on Influence Diagrams. 711-720

Hong Chang, Dit-Yan Yeung:
Kernel-Based Metric Adaptation with Pairwise Constraints. 721-730

Yanwen Wu, Zhenghong Wu, Yan Li, Jinling Li:
Generating Personalized Answers by Constructing a Question Situation. 731-739

Ruifeng Xu, Qin Lu:
A Multi-stage Chinese Collocation Extraction System. 740-749

Shuanghui Meng, Mihai M. Lazarescu, Jim Ivins, Andrew Turpin:
Monitoring Glaucomatous Progression: Classification of Visual Field Measurements Using Stable Reference Data. 750-759
Neural Networks and Statistical Learning Methods (I)

Qianjin Guo, Haibin Yu, Aidong Xu:
A New Intelligent Diagnostic Method for Machine Maintenance. 760-769

Zhicheng Zhang, Frédéric Vanderhaegen, Patrick Millot:
Prediction of Human Behaviour Using Artificial Neural Networks. 770-779

Xuesong Wang, Yuhu Cheng, Wei Sun:
Iterative Learning Controller for Trajectory Tracking Tasks Based on Experience Database. 780-789

Peng Guo, Taihua Chang:
MGPC Based on Hopfield Network and Its Application in a Thermal Power Unit Load System. 790-796
Neural Networks and Statistical Learning Methods (II)

Rong Long Wang, Kozo Okazaki:
Solving the Minimum Crossing Number Problem Using an Improved Artificial Neural Network. 797-803

Yu-Hong Liu, Xuan-Min Du, Shen-Hua Yang:
The Design of a Fuzzy-Neural Network for Ship Collision Avoidance. 804-812

Hao Huang, Kuisheng Chen, Liangcai Zeng:
A Genetic Algorithm-Based Neural Network Approach for Fault Diagnosis in Hydraulic Servo-Valves. 813-821

Yingfeng Wang, Xiaoqin Zeng, Daniel S. Yeung:
Sensitivity Analysis of Madalines to Weight Perturbation. 822-831
Neural Networks and Statistical Learning Methods (III)

Liangyu Ma
, Yongguang Ma, Jin Ma
:
Fault Diagnosis for the Feedwater Heater System of a 300MW Coal-Fired Power Generating Unit Based on RBF Neural Network. 832-841

Wei-Min Qi, Qiao-Ling Ji, Wei-You Cai:
The Application of Modified Hierarchy Genetic Algorithm Based on Adaptive Niches. 842-850

Wing W. Y. Ng
, Aki P. F. Chan, Daniel S. Yeung, Eric C. C. Tsang:
Construction of High Precision RBFNN with Low False Alarm for Detecting Flooding Based Denial of Service Attacks Using Stochastic Sensitivity Measure. 851-860

Bram Vanschoenwinkel, Feng Liu, Bernard Manderick:
Context-Sensitive Kernel Functions: A Distance Function Viewpoint. 861-870

Qiang He, Xizhao Wang, Junfen Chen, Leifan Yan:
A Parallel Genetic Algorithm for Solving the Inverse Problem of Support Vector Machines. 871-879
Neural Networks and Statistical Learning Methods (IV)

Dong-Xiao Niu, Qiang Wang, Jinchao Li:
Short Term Load Forecasting Model Based on Support Vector Machine. 880-888

Chun Che Fung
, Jiabin Li, Douglas G. Myers:
Evaluation of an Efficient Parallel Object Oriented Platform (EPOOP) for Control Intensive Intelligent Applications. 889-897

Q. P. Zhang, Loi Lei Lai, W. C. Sun:
Location of Tropical Cyclone Center with Intelligent Image Processing Technique. 898-907

T. O. Ting
, K. P. Wong, C. Y. Chung:
A Hybrid Genetic Algorithm/Particle Swarm Approach for Evaluation of Power Flow in Electric Network. 908-917
Pattern Recognition (I)

Degang Chen, Qiang He, Chunru Dong, Xizhao Wang:
A Method to Construct the Mapping to the Feature Space for the Dot Product Kernels. 918-929

Rong Wang, Li-qun Gao, Shu Yang, Yuhua Chai:
An Edge Detection Method by Combining Fuzzy Logic and Neural Network. 930-937

Yafeng Deng, Guangda Su, Jun Zhou, Bo Fu:
Fast Face Detection Integrating Motion Energy into a Cascade-Structured Classifier. 938-947

Zhengxing Sun
, Wei Jiang, Jianyong Sun:
Adaptive Online Multi-stroke Sketch Recognition Based on Hidden Markov Model. 948-957

Liangyu Ma, Jin Ma
, Yongguang Ma, Bingshu Wang:
To Diagnose a Slight and Incipient Fault in a Power Plant Thermal System Based on Symptom Zoom Technology and Fuzzy Pattern Recognition Method. 958-964

Guoyu Zuo, Yao Chen, Xiaogang Ruan, Wenju Liu:
Mandarin Voice Conversion Using Tone Codebook Mapping. 965-973
Pattern Recognition (II)

Hao Feng, Wenming Cao, Shoujue Wang:
Continuous Speech Recognition Based on ICA and Geometrical Learning. 974-983

Jian Yuan, Guo-Hui Li:
Underwater Target Recognition with Sonar Fingerprint. 984-993

Lei Xie, Zhi-Qiang Liu:
Multi-stream Articulator Model with Adaptive Reliability Measure for Audio Visual Speech Recognition. 994-1004

Minghu Ha, Xuedong Tian:
Optical Font Recognition of Chinese Characters Based on Texture Features. 1005-1013

Huimin Feng, Xuefei Li, Tiegang Fan
, Yanju Chen:
Some Characteristics of Fuzzy Integrals as a Multiple Classifiers Fusion Method. 1014-1024
Vision and Image Processing (I)

Zhi-Heng Zhou, Sheng-Li Xie:
Error Concealment Based on Adaptive MRF-MAP Framework. 1025-1032

Tianhang Chen, Shaohui Liu, Hongxun Yao, Wen Gao:
Spatial Video Watermarking Based on Stability of DC Coefficients. 1033-1042

Zhijun Liu, Xubang Shen, Hongshi Sang:
A Learning-Based Spatial Processing Method for the Detection of Point Targets. 1043-1050

Huixuan Tang, Hui Wei:
CTFDP: An Affine Invariant Method for Matching Contours. 1051-1059

Changjiang Zhang, Xiaodong Wang, Haoran Zhang:
A De-noising Algorithm of Infrared Image Contrast Enhancement. 1060-1069
Vision and Image Processing (II)

Lihui Jiang, Yanying Guo:
Speckle Suppressing Based on Fuzzy Generalized Morphological Filter. 1070-1076

Yao-Quan Yang, Jie Bai, Rui-Li Tian, Na Liu:
Research of Vehicle License Plate Location Algorithm Based on Color Features and Plate Processions. 1077-1085

Weixing Wang:
Fast Measuring Particle Size by Using the Information of Particle Boundary and Shape. 1086-1095

Z. W. Liao, S. X. Hu, W. F. Chen, Yuan Yan Tang, T. Z. Huang:
A Statistical Image Fusion Scheme for Multi Focus Applications. 1096-1105

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
load links from unpaywall.org
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
load content from archive.org
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
load data from openalex.org
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
dblp was originally created in 1993 at:
since 2018, dblp has been operated and maintained by:






