
Rough Sets and Knowledge Technology
First International Conference, RSKT 2006, Chongquing, China, July 24-26, 2006, Proceedings
By: James F. Peters (Editor), Yiju Yao (Editor)
Paperback | 6 July 2006
At a Glance
840 Pages
22.86 x 15.24 x 3.18
Paperback
$169.00
or 4 interest-free payments of $42.25 with
orShips in 7 to 10 business days
| Some contributions by Zdzislaw Pawlak | p. 1 |
| Conflicts and negotations | p. 12 |
| Hierarchical machine learning - a learning methodology inspired by human intelligence | p. 28 |
| Rough-fuzzy granulation, rough entropy and image segmentation | p. 31 |
| Towards network autonomy | p. 32 |
| A roadmap from rough set theory to granular computing | p. 33 |
| Partition dependencies in hierarchies of probabilistic decision tables | p. 42 |
| Knowledge theory and artificial intelligence | p. 50 |
| Applications of knowledge technologies to sound and vision engineering | p. 57 |
| A rough set approach to data with missing attribute values | p. 58 |
| Cognitive neuroscience and Web intelligence | p. 68 |
| Cognitive informatics and contemporary mathematics for knowledge manipulation | p. 69 |
| Rough mereological reasoning in rough set theory : recent results and problems | p. 79 |
| Theoretical study of granular computing | p. 93 |
| Knowledge discovery by relation approximation : a rough set approach | p. 103 |
| Reduction-based approaches towards constructing galois (concept) lattices | p. 107 |
| A new discernibility matrix and function | p. 114 |
| The relationships between variable precision value and knowledge reduction based on variable precision rough sets model | p. 122 |
| On axiomatic characterization of approximation operators based on atomic boolean algebras | p. 129 |
| Rough set attribute reduction in decision systems | p. 135 |
| A new extension model of rough sets under incomplete information | p. 141 |
| Applying rough sets to data tables containing possibilistic information | p. 147 |
| Redundant data processing based on rough-fuzzy | p. 156 |
| Further study of the fuzzy reasoning based on propositional modal logic | p. 162 |
| The M-relative reduct problem | p. 170 |
| Rough contexts and rough-valued contexts | p. 176 |
| Combination entropy and combination granulation in incomplete information system | p. 184 |
| An extension of Pawlak's flow graphs | p. 191 |
| Rough sets and Brouwer-Zadeh lattices | p. 200 |
| Covering-based generalized rough fuzzy sets | p. 208 |
| Axiomatic systems of generalized rough sets | p. 216 |
| Rough-sets-based combustion status diagnosis | p. 222 |
| Research on system uncertainty measures based on rough set theory | p. 227 |
| Conflict analysis and information systems : a rough set approach | p. 233 |
| A novel discretizer for knowledge discovery approaches based on rough sets | p. 241 |
| Function S-rough sets and recognition of financial risk laws | p. 247 |
| Knowledge reduction in incomplete information systems based on dempster-shafer theory of evidence | p. 254 |
| Decision rules extraction strategy based on bit coded discernibility matrix | p. 262 |
| Attribute set dependence in apriori-like reduct computation | p. 268 |
| Some methodological remarks about categorical equivalences in the abstract approach to roughness - part I | p. 277 |
| Some methodological remarks about categorical equivalences in the abstract approach to roughness - part II | p. 284 |
| Lower bounds on minimal weight of partial reducts and partial decision rules | p. 290 |
| On reduct construction algorithms | p. 297 |
| Association reducts : boolean representation | p. 305 |
| Notes on rough sets and formal concepts | p. 313 |
| High dimension complex functions optimization using adaptive particle swarm optimizer | p. 321 |
| Adaptive velocity threshold particle swarm optimization | p. 327 |
| Relationship between inclusion measure and entropy of fuzzy sets | p. 333 |
| A general model for transforming vague sets into fuzzy sets | p. 341 |
| An iterative method for quasi-variational-like inclusions with fuzzy mappings | p. 349 |
| Application of granular computing in knowledge reduction | p. 357 |
| Advances in the quotient space theory and its applications | p. 363 |
| The measures relationships study of three soft rules based on granular computing | p. 371 |
| A generalized neural network architecture based on distributed signal processing | p. 377 |
| Worm harm prediction based on segment procedure neural networks | p. 383 |
| Accidental wow defect evaluation using sinusoidal analysis enhanced by artificial neural networks | p. 389 |
| A constructive algorithm for training heterogeneous neural network ensemble | p. 396 |
| Gene regulatory network construction using dynamic Bayesian network (DBN) with structure expectation maximization (SEM) | p. 402 |
| Mining biologically significant co-regulation patterns from microarray data | p. 408 |
| Fast algorithm for mining global frequent itemsets based on distributed database | p. 415 |
| A VPRSM based approach for inducing decision trees | p. 421 |
| Differential evolution fuzzy clustering algorithm based on kernel methods | p. 430 |
| Classification rule mining based on particle swarm optimization | p. 436 |
| A bottom-up distance-based index tree for metric space | p. 442 |
| Subsequence similarity search under time shifting | p. 450 |
| Developing a rule evaluation support method based on objective indices | p. 456 |
| Data dimension reduction using rough sets for support vector classifier | p. 462 |
| A comparison of three graph partitioning based methods for consensus clustering | p. 468 |
| Feature selection, rule extraction, and score model : making ATC competitive with SVM | p. 476 |
| Relevant attribute discovery in high dimensional data : application to breast cancer gene expressions | p. 482 |
| Credit risk evaluation with least square support vector machine | p. 490 |
| The research of sampling for mining frequent itemsets | p. 496 |
| ECPIA : an Email-centric personal intelligent assistant | p. 502 |
| A novel fuzzy C-means clustering algorithm | p. 510 |
| Document clustering based on modified artificial immune network | p. 516 |
| A novel approach to attribute reduction in concept lattices | p. 522 |
| Granule sets based bilevel decision model | p. 530 |
| An enhanced support vector machine model for intrusion detection | p. 538 |
| A modified K-means clustering with a density-sensitive distance metric | p. 544 |
| Swarm intelligent tuning of one-class [nu]-SVM parameters | p. 552 |
| A generalized competitive learning algorithm on Gaussian mixture with automatic model selection | p. 560 |
| The generalization performance of learning machine with NA dependent sequence | p. 568 |
| Using RS and SVM to detect new malicious executable codes | p. 574 |
| Applying PSO in finding useful features | p. 580 |
| Generalized T-norm and fractional "AND" operation model | p. 586 |
| Improved propositional extension rule | p. 592 |
| Web services-based digital library as a CSCL space using case-based reasoning | p. 598 |
| Using description logic to determine seniority among RB-RBAC authorization rules | p. 604 |
| The rough logic and roughness of logical theories | p. 610 |
| Research on multi-agent service bundle middleware for smart space | p. 618 |
| A customized architecture for integrating agent oriented methodologies | p. 626 |
| A new method for focused Crawler cross tunnel | p. 632 |
| Migration of the semantic Web technologies into E-learning knowledge management | p. 638 |
| Opponent learning for multi-agent system simulation | p. 643 |
| A video shot boundary detection algorithm based on feature tracking | p. 651 |
| Curvelet transform for image authentication | p. 659 |
| An image segmentation algorithm for densely packed rock fragments of uneven illumination | p. 665 |
| A new chaos-based encryption method for color image | p. 671 |
| Support vector machines based image interpolation correction scheme | p. 679 |
| Pavement distress image automatic classification based on DENSITY-based neural network | p. 685 |
| Towards fuzzy ontology handling vagueness of natural languages | p. 693 |
| Evoked potentials estimation in brain-computer interface using support vector machine | p. 701 |
| Intra-pulse modulation recognition of advanced radar emitter signals using intelligent recognition method | p. 707 |
| Multi-objective blind image fusion | p. 713 |
| The design of biopathway's modelling and simulation system based on petri net | p. 721 |
| Timed hierarchical object-oriented petri net-part I : basic concepts and reachability analysis | p. 727 |
| Approximate semantic query based on multi-agent systems | p. 735 |
| Swarm intelligent analysis of independent component and its application in fault detection and diagnosis | p. 742 |
| Using VPRS to mine the significance of risk factors in IT project management | p. 750 |
| Mining of MicroRNA expression data - a rough set approach | p. 758 |
| Classifying Email using variable precision rough set approach | p. 766 |
| Facial expression recognition based on rough set theory and SVM | p. 772 |
| Gene selection using rough set theory | p. 778 |
| Attribute reduction based expected outputs generation for statistical software testing | p. 786 |
| FADS : a fuzzy anomaly detection system | p. 792 |
| Gene selection using Gaussian kernel support vector machine based recursive feature elimination with adaptive kernel width strategy | p. 799 |
| Table of Contents provided by Blackwell. All Rights Reserved. |
ISBN: 9783540362975
ISBN-10: 3540362975
Series: Lecture Notes in Computer Science
Published: 6th July 2006
Format: Paperback
Language: English
Number of Pages: 840
Audience: Professional and Scholarly
Publisher: Springer Nature B.V.
Country of Publication: DE
Dimensions (cm): 22.86 x 15.24 x 3.18
Weight (kg): 1.15
Shipping
| Standard Shipping | Express Shipping | |
|---|---|---|
| Metro postcodes: | $9.99 | $14.95 |
| Regional postcodes: | $9.99 | $14.95 |
| Rural postcodes: | $9.99 | $14.95 |
Orders over $79.00 qualify for free shipping.
How to return your order
At Booktopia, we offer hassle-free returns in accordance with our returns policy. If you wish to return an item, please get in touch with Booktopia Customer Care.
Additional postage charges may be applicable.
Defective items
If there is a problem with any of the items received for your order then the Booktopia Customer Care team is ready to assist you.
For more info please visit our Help Centre.
You Can Find This Book In

Don't Burn Anyone at the Stake Today
(and other lessons from history about living through an information crisis)
Hardcover
RRP $39.99
$34.99
OFF
This product is categorised by
- Non-FictionMathematicsMathematical FoundationSet Theory
- Non-FictionComputing & I.T.Computer ScienceArtificial IntelligenceNeural Networks & Fuzzy Systems
- Non-FictionComputing & I.T.Computer ScienceArtificial IntelligenceComputer Vision
- Non-FictionMathematicsMathematical FoundationMathematical Logic
- Non-FictionComputing & I.T.Databases























