Abstract is missing.
- On Genetic-Fuzzy Data Mining TechniquesTzung-Pei Hong. 3 [doi]
- Linguistic Summaries of Static and Dynamic Data: Computing with Words and GranularityJanusz Kacprzyk. 4-5 [doi]
- Granular Computing and Web Processing: Representing Documents in PolyhedronT. Y. Lin. 6 [doi]
- Towards Mobile Internet: Location Privacy Threats and Granular Computation ChallengesLing Liu. 7 [doi]
- Granulation with Indistinguishability, Equivalence, or SimilarityC. Maria Keet. 11-16 [doi]
- Some Models of Granular ComputingDaowu Pei. 17-21 [doi]
- A Logical Method of Formalization for Granular ComputingYan Lin, Liu Qing. 22-27 [doi]
- A Scientific Decoding of YinYang 1-2-4-8-64 for Equilibrium-Based Granular ComputingWen-Ran Zhang, Justin Zhan. 28-31 [doi]
- Application of Granular Computing in Extension Criminal Reconnaissance SystemYunhua Chen, Yongquan Yu, Bi Zeng, Minghui Wang. 32-35 [doi]
- Granular Computing in the Information Transformation of Pattern RecognitionHong Hu, Zhongzhi Shi. 36-39 [doi]
- Multitasking is the Primary Choice for Granular ComputingTrong Wu. 40-43 [doi]
- The Granulations Based on Meaning of Rough Logical Formulas and its Lock ResolutionQing Liu, Huasheng Zhu, Lan Liu. 44-49 [doi]
- A Study of Information GranulesXiaosheng Wang. 50 [doi]
- Modeling Dynamic Processes Using Granular Runge-Kutta MethodsTomas Co. 55-60 [doi]
- A Granular Space Model for Ontology LearningTaorong Qiu, Xiaoqing Chen, Qing Liu, Houkuan Huang. 61-65 [doi]
- Perspectives of Granular Computing in Software EngineeringJianchao Han, Jing Dong. 66-71 [doi]
- Structured Writing with Granular Computing StrategiesYiyu Yao. 72-77 [doi]
- Granular Computing Based Sorting Method in Multi-Objective OptimizationGaowei Yan, Gang Xie, Keming Xie, Tsau Young Lin. 78 [doi]
- Attribute Computing Network Induced by Linear Transformation and Granular Transformation of Qualitative CriterionJiali Feng. 83-88 [doi]
- The Structure of Granular Network Based on Granular Computing and its Application in Data ReductionShaobo Deng, Min Li, Sujie Guan, Lian Chen. 89-92 [doi]
- Analyzing Software System Quality Risk Using Bayesian Belief NetworkYong Hu, Juhua Chen, Jiaxing Huang, Mei Liu, Kang Xie. 93-96 [doi]
- Optimum Design of a Window Function Based on the Small-World NetworksLingbo Kong, Zhe Chen, Fuliang Yin. 97 [doi]
- Reasoning Algorithm of Multi-Value Fuzzy Causality Diagram Based on Unitizing CoefficientXinyuan Liang. 101-104 [doi]
- Multi-level Formal Concepts in Fuzzy Formal ContextsMing-Wen Shao, Chang-Xuan Wan. 105-109 [doi]
- On Consistency of Fuzzy Clustering AnalysisCheng-yi Zhang, Bencheng Wei, Guohui Chen. 110-113 [doi]
- Fuzzy Detection System of Behavior before Getting Out of Bed by Air Pressure and Ultrasonic SensorsHayato Yamaguchi, Hiroshi Nakajima, Kazuhiko Taniguchi, Syoji Kobashi, Katsuya Kondo, Yutaka Hata. 114-119 [doi]
- An Efficient Elimination of Input Data in the OWA AggregationByeong-Seok Ahn. 120-123 [doi]
- Anti-Congestion Fuzzy Algorithm for Traffic Control of a Class of Traffic NetworksWei-Bin Zhang, Bu-zhou Wu, Wen-jiang Liu. 124-128 [doi]
- Statistical Genetic Interval-Valued Fuzzy Systems with Prediction in Clinical TrialsYu Qiu, Yanqing Zhang, Yichuan Zhao. 129-132 [doi]
- A Novel Approach to Generating fuzzy Rules Based on Dynamic Fuzzy Rough SetsYi Cheng, Duoqian Miao, Qinrong Feng. 133 [doi]
- Email Granulation Based On Augmented Interval Type-2 Fuzzy Set MethodologiesHooman Tahayori, Andrea Visconti, Giovanni Degli Antoni. 139-144 [doi]
- Type-2 Fuzzy Logic: Theory and ApplicationsOscar Castillo, Patricia Melin, Janusz Kacprzyk, Witold Pedrycz. 145-150 [doi]
- A New Method for Edge Detection in Image Processing Using Interval Type-2 Fuzzy LogicOlivia Mendoza, Patricia Melin, Guillermo Licea. 151-156 [doi]
- Hybrid Learning Algorithm for Interval Type-2 Fuzzy Neural NetworksJuan R. Castro, Oscar Castillo, Patricia Melin, Antonio Rodríguez Díaz. 157-162 [doi]
- MGRS in Incomplete Information SystemsYuhua Qian, Jiye Liang, Chuangyin Dang. 163-168 [doi]
- Algorithms for Different Approximations in Incomplete Information Systems with Maximal Compatible Classes as Primitive GranulesChen Wu, Xiaohua Hu, Zhoujun Li, Xiaohua Zhou, Palakorn Achananuparp. 169-174 [doi]
- An Incremental Algorithm for Mining Default Definite Decision Rules from Incomplete Decision TablesChen Wu, Xiaohua Hu, Xiajiong Shen, Xiaodan Zhang, Yi Pan. 175-179 [doi]
- Rough Sets and Zadeh s Extension PrinciplesGuilong Liu, Xiaoli Song, Xiaoxia Zhao. 180-185 [doi]
- Implication Operators Based on Rough Set Model over Boolean AlgebrasXiaohong Zhang, Yingcang Ma, Zhanao Xue, Gang Yao. 186-191 [doi]
- Production and Retrieval of Rough Classes in Multi RelationsMehmet R. Tolun, Hayri Sever, A. Kadir Gorur. 192-198 [doi]
- Approximation Partition Spaces of Covering SpaceQinghua Zhang, Guoyin Wang, Jun Hu, Hai-Tao Teng. 199-204 [doi]
- Generalized Rough Set Model on De Morgan AlgebrasXiaohong Zhang, Gang Yao. 205-208 [doi]
- Properties of Rough Sets in Normed Linear Space and its ProofHui Sun, Ying Wang, LinLin He, Qing Liu. 209-212 [doi]
- Rough Set Approximations Based on Random SetsWei-Zhi Wu. 213-216 [doi]
- Study on the Axis Problem of Rough 3-Valued AlgebrasJianhua Dai. 217-220 [doi]
- RoughTree A Classifier with Naive-Bayes and Rough Sets Hybrid in Decision Tree RepresentationYangsheng Ji, Lin Shang. 221-226 [doi]
- Research on Statistical Relational Learning and Rough Set in SRLFei Chen. 227 [doi]
- Predicting Penetration Across the Blood-Brain Barrier - A Rough Set ApproachJianwen Fang, Jerzy W. Grzymala-Busse. 231-236 [doi]
- Extensions in Mobile Ad Hoc Routing Using Variable Precision Rough SetsMary Anita Rajam V, V. Uma Maheswari, Arul Siromoney. 237-240 [doi]
- A New Method for Constructing Decision Tree Based on Rough Set TheoryLongjun Huang, Minghe Huang, Bin Guo, Zhiming Zhuang. 241-244 [doi]
- The Study of Normal Form of Relational Database Based on Rough Sets TheoryAn Qiusheng, Gaoping Wang, Wenxiu Zhang. 245-248 [doi]
- Knowledge Reduction and its Rough Entropy Representation of Decision Tables in Rough SetJiucheng Xu, Lin Sun. 249 [doi]
- Learning for Semantic Classification of Conceptual TermsJanardhana Punuru, Jianhua Chen. 253-258 [doi]
- Autonomic Learning Model and Algorithm Based on DFLJing Wang, Fan-Zhang Li. 259-264 [doi]
- On Detecting an Emerging ClassCheong Hee Park, Hongsuk Shim. 265-270 [doi]
- Co_NBM: A Semi-Supervised Categorization Algorithm Based TEF_WA TechniqueHuanling Tang, Mingyu Lu, Na Liu. 271-274 [doi]
- On Conceptualization Mismatches Between OntologiesMuhammad Abdul Qadir, Muhammad Fahad, Muhammad Wajahaat Noshairwan. 275-278 [doi]
- Incompleteness Errors in OntologyMuhammad Abdul Qadir, Muhammad Fahad, Syed Adnan Hussain Shah. 279-282 [doi]
- Semantic Inconsistency Errors in OntologyMuhammad Fahad, Muhammad Abdul Qadir, Muhammad Wajahaat Noshairwan. 283-286 [doi]
- Observational Calculi, Classes of Association Rules and F-propertyJan Rauch. 287-293 [doi]
- Addressing Missing Attributes during Data Mining Using Frequent Itemsets and Rough Set Based PredictionsJiye Li, Nick Cercone, Robin Cohen. 294-300 [doi]
- A Comparison of Three Approximation Strategies for Incomplete Data SetsJerzy W. Grzymala-Busse, Witold J. Grzymala-Busse, Zdzislaw S. Hippe, Wojciech Rzasa. 301-306 [doi]
- Interpretations of Discovered Knowledge in Multidimensional DatabasesYuefeng Li. 307-312 [doi]
- A New Improved K-Means Algorithm with Penalized TermZejin Jason Ding, Jian Yu, Yanqing Zhang. 313-317 [doi]
- Speed-up Technique for Association Rule Mining Based on an Artificial Life AlgorithmMasaaki Kanakubo, Masafumi Hagiwara. 318-323 [doi]
- Finding Soft Relations in Granular Information HierarchiesTrevor P. Martin, Yun Shen, Ben Azvine. 324-329 [doi]
- A Method of Finding Representative Sets of RulesJiye Li, Nick Cercone, Jianchao Han. 330-335 [doi]
- Prediction of the Input Impedance of Two Coupled Dipole Antennas in the Echelon FormSaeed Reza Ostadzadeh, Mohammad Soleimani, Majid Tayarani. 336-340 [doi]
- Concept Mining Using Association Rule and Combinatorial TopologyAlbert Sutojo. 341-346 [doi]
- Overview of Workflow Mining TechnologyChunqin Gu, HuiYou Chang, Yang Yi. 347-350 [doi]
- Tree Mining Application to Matching of Heterogeneous Knowledge RepresentationsFedja Hadzic, Tharam S. Dillon, Elizabeth Chang. 351-357 [doi]
- Ontology-Assisted Query Formulation in Multidimensional Association Rule MiningChin-Ang Wu, Wen-Yang Lin, Chuan-Chun Wu. 358-361 [doi]
- A Study of Data Reduction Using Multiset Decision TablesUday Seelam, Chien-Chung Chan. 362-367 [doi]
- Generating Attack Scenarios with Causal RelationshipYu Chin Cheng, Chien-Hung Chen, Chung-Chih Chiang, Jun-Wei Wang, Chi-Sung Laih. 368-373 [doi]
- A Verification Scheme for Data Aggregation in Data MiningKilho Shin, Justin Zhan. 374-379 [doi]
- Privacy Preserving Collaborative Filtering Using Data ObfuscationRupa Parameswaran, Douglas M. Blough. 380-386 [doi]
- Concept Mining using Association Rules and Combinatorial TopologyAlbert Sutojo. 387 [doi]
- Clustering Time Series with Granular Dynamic Time Warping MethodFusheng Yu, Keqiang Dong, Fei Chen, Yongke Jiang, Wenyi Zeng. 393-398 [doi]
- A Necessary Preprocessing in Horizontal Collaborative Fuzzy ClusteringFusheng Yu, Juan Tang, Ruiqiong Cai. 399-403 [doi]
- Agglomerative Hierarchical Clustering for Data with ToleranceYasunori Endo, Yukihiro Hamasuna, Sadaaki Miyamoto. 404-409 [doi]
- Automatic Classification of Graphs by Symbolic HistogramsGuido Del Vescovo, Antonello Rizzi. 410-416 [doi]
- A Weighted Consensus Function Based on Information-Theoretic Principles to Combine Soft ClusteringsYan Gao, Shiwen Gu, Jianhua Li, Zhining Liao. 417-422 [doi]
- Positional Analysis in Fuzzy Social NetworksTuan-Fang Fan, Churn-Jung Liau, Tsau Young Lin. 423-428 [doi]
- Hierarchical Clustering Algorithm Based on GranularityJiuzhen Liang, Guangbin Li. 429-432 [doi]
- A Parallelized and Pipelined Datapath to Implement ISODATA Algorithm for Rosette Scan Images on a Reconfigurable HardwareEhsan Rahimi, Shahriar Baradaran Shokuhi, Ali Sadr. 433-436 [doi]
- The Worse Clustering Performance AnalysisJian Yu, Pengwei Hao. 437-441 [doi]
- Sparse Possibilistic Clustering with L1 RegularizationRyo Inokuchi, Sadaaki Miyamoto. 442 [doi]
- Perceptual Reasoning: A New Computing with Words EngineJerry M. Mendel, Dongrui Wu. 446-451 [doi]
- Comparison of Machine Learning and Pattern Discovery Algorithms for the Prediction of Human Single Nucleotide PolymorphismsRui Yan, Paul C. Boutros, Igor Jurisica, Linda Z. Penn. 452-457 [doi]
- Evaluation of Learning Costs of Rule Evaluation Models Based on Objective Indices to Predict Human Hypothesis Construction PhasesHidenao Abe, Shusaku Tsumoto, Miho Ohsaki, Hideto Yokoi, Takahira Yamaguchi. 458-464 [doi]
- Meaning of Pearson Residuals - Linear Algebra ViewShusaku Tsumoto, Shoji Hirano. 465-470 [doi]
- Multicast Routing Scheme Based on Chaotic Optimization Adaptive Genetic AlgorithmChangbing Li, Yong Wang, Maokang Du, Changjiang Yue. 471-476 [doi]
- Immune Evolution Algorithm Based Dynamic Path Planning Approach for the Soccer RobotXinying Xu, Gaowei Yan, Keming Xie, T. Y. Lin. 477-480 [doi]
- A Speech Recognition Method of Isolated Words Based on Modified LPC CepstrumXueying Zhang, Yueling Guo, Xuemei Hou. 481-484 [doi]
- Discovering Hierarchical Patterns of Students Learning Behavior in Intelligent Tutoring SystemsSumalee Sonamthiang, Nick Cercone, Kanlaya Naruedomkul. 485-489 [doi]
- Object Recognition Architecture Using Distributed and Parallel Computing with CollaboratorJunhee Lee, Sue J. Lee, Yeonchool Park, Sukhan Lee. 490-497 [doi]
- A Maximum Entropy Markov Model for Prediction of Prosodic Phrase Boundaries in Chinese TTSZiping Zhao, Tingjian Zhao, Yaoting Zhu. 498-501 [doi]
- A Novel Algorithm for Counting All Common SubsequencesHui Wang, Zhiwei Lin. 502 [doi]
- A Speech Endpoint Detection Algorithm Based on Entropy and RBF Neural NetworkXueying Zhang, Gaoyun Li, Feng Qiao. 506-509 [doi]
- Face Recognition Using a Hybrid General Backpropagation Neural NetworkM. Samer Charifa, Ahmad Suliman, Marwan Bikdash. 510-515 [doi]
- Use of Neural Networks in Forecasting Financial MarketHosein Marzi, Mark Turnbull. 516-521 [doi]
- A New Scheme of EEG Signals Processing in Brain-Computer Interface SystemsMaryam Esmaeili, Mohamad H. Jabalameli, Zeinab Moghadam. 522-527 [doi]
- The Research for Hopf Bifurcation in a Single Inertial Neuron Model with External ForcingQun Liu, Xiaofeng Liao, Degang Yang, Songtao Guo. 528-533 [doi]
- Improved Algorithm of BP Neural Network and its Application to Prediction of K/S Value in Dyeing with Reactive DyesHuiYu Jiang, Min Dong, XiangPeng Li, Feng Yang. 534-537 [doi]
- A Novel Delay-Dependent Global Stability Criterion of Delayed Hopfield Neural NetworksDegang Yang, Qun Liu, Yong Wang. 538-541 [doi]
- Knowledge Based Neural Network for Text ClassificationRam Dayal Goyal. 542-547 [doi]
- Neuro-Fuzzy Model-Based CUSUM Method Application in Fault Detection on an Autonomous VehicleJun Xie, Gaowei Yan, Keming Xie, T. Y. Lin. 548-551 [doi]
- The Application of Run-Length Features in Remote Sensing Classification Combined with Neural Network and Rough SetZhiguo Cao, Yang Xiao, Lamei Zou. 552-557 [doi]
- An Application of CP Neural Network Based on Rough Set in Image Edge DetectionMin Dong, HuiYu Jiang, XiangPeng Li, Qing Liu. 558 [doi]
- Application of Rough Set Theory to Intrusion Detection SystemXuren Wang, Famei He, Lizhen Liu. 562-565 [doi]
- Fuzzy Vector Quantization for Network Intrusion DetectionDat Tran, Wanli Ma, Dharmendra Sharma, Thien Nguyen. 566-570 [doi]
- Possibility Theory-Based Approach to Spam Email DetectionDat Tran, Wanli Ma, Dharmendra Sharma, Thien Nguyen. 571-575 [doi]
- Data Encryption Technique Using Random Number GeneratorAkkapeddi Chandra Sekhar, K. R. Sudha, P. V. G. D. Prasad Reddy. 576-579 [doi]
- Research on Adaptive Congestion Control Based on One Way DelayMin Li, Shaobo Deng, ChunHua Zhou. 580-583 [doi]
- SRML Learning Game Theory with Application to Internet Security and Management SystemsJames Kuodo Huang, Bang-su Chen. 584-587 [doi]
- Design and Implementation of Intranet Security Audit System Based on Load BalancingBaixing Chen, Xiufen Fu, Xiayu Zhang, Lei Su, Dan Wu. 588-591 [doi]
- Grid-Based Service Creation for Next-Generation NetworksZhen Liu. 592-597 [doi]
- Secure Similarity SearchHyun-A Park, Bum Han Kim, Dong-Hoon Lee, Yon Dohn Chung, Justin Zhan. 598 [doi]
- MHC Regulation Based Immune Formula Discovering Algorithm (IFDA)Min Hu, Weiming Sun. 605-610 [doi]
- Mining Diagnostic Taxonomy and Diagnostic Rules for Multi-Stage Medical Diagnosis from Hospital Clinical DataShusaku Tsumoto. 611-616 [doi]
- Fine Granule Evaluation Model from Coarse Granule in Medical Ultrasonic SystemYutaka Hata, Katsuya Kondo, Syoji Kobashi. 617-621 [doi]
- A Study of Bioelectrical Impedance Analysis Methods for Practical Visceral Fat EstimationMitsuhiro Yoneda, Hiroshi Tasaki, Naoki Tsuchiya, Hiroshi Nakajima, Takehiro Hamaguchi, Shojiro Oku, Toshikazu Shiga. 622-627 [doi]
- On Systems Software Engineering with Application to BioinformaticsJames Kuodo Huang. 628-631 [doi]
- Fuzzy-ASM Based Automated Skull Stripping Method from Infantile Brain MR ImagesSyoji Kobashi, Yuko Fujimoto, Masayo Ogawa, Kumiko Ando, Reiichi Ishikura, Katsuya Kondo, Shozo Hirota, Yutaka Hata. 632-635 [doi]
- Fuzzy Logic Approach to Identification of Cellular Quantity by Ultrasonic SystemSatoshi Yamaguchi, Kouki Nagamune, Keisuke Oe, Syoji Kobashi, Katsuya Kondo, Yutaka Hata. 636-639 [doi]
- New Computational Model from Ant ColonyWei Gao. 640-643 [doi]
- Gene Function Classification Using Fuzzy K-Nearest Neighbor ApproachDan Li, Jitender S. Deogun, Kefei Wang. 644-647 [doi]
- Semantic Smoothing the Multinomial Naive Bayes for Biomedical Literature ClassificationJian Wen, Zhoujun Li. 648 [doi]
- Precision and Recall in Rough Support Vector MachinesPawan Lingras, Cory J. Butz. 654-658 [doi]
- Mining Stock Market Tendency by RS-Based Support Vector MachinesYing Sai, Zheng Yuan, Kanglin Gao. 659-664 [doi]
- Nursing-Care Freestyle Text Classification Using Support Vector MachinesManabu Nii, Shigeru Ando, Yutaka Takahashi, Atsuko Uchinuno, Reiko Sakashita. 665 [doi]
- Intelligent Search Engine Based on Formal Concept AnalysisXiajiong Shen, Yan Xu, Junyang Yu, Ke Zhang. 669-674 [doi]
- An Extension-Based Dynamic Load Balancing Model of Heterogeneous Server ClusterXiayu Zhang, Yongquan Yu, Baixing Chen, Feng Ye, Tan Xingxing. 675-679 [doi]
- Granular Index for XML DatabaseLi Lu, Tsau Young Lin. 680-685 [doi]
- Online Handwriting Recognition by the Symbolic Histograms ApproachGuido Del Vescovo, Antonello Rizzi. 686-690 [doi]
- Research of Web Pages CategorizationZhongda Lin, Kun Deng, Yanfen Hong. 691-694 [doi]
- Enhancing Discovery of Web Services through Optimized AlgorithmsJanette Hicks, Madhusudhan Govindaraju, Weiyi Meng. 695-698 [doi]
- Identifying Opinion Holders in Opinion Text from Online NewspapersYoungho Kim, Yuchul Jung, Sung-Hyon Myaeng. 699 [doi]
- Syntactic Information RetrievalChang Liu, Hui Wang, Sally I. McClean, Jun Liu, Shengli Wu. 703-707 [doi]
- Naïve Bayes Text ClassifierHaiyi Zhang, Di Li. 708-711 [doi]
- Visual Search of Web Multimedia Information Supported by the XHMG SystemIvan Radev. 712 [doi]
- Fuzzy Quotients in Reactive Common Sense ReasoningMichael Cebulla. 718-723 [doi]
- A Symmetrical Linear Transform Learning Algorithm on Quantum GroupShuping He, Fan-Zhang Li. 724-727 [doi]
- Application of Quantum Genetic Algorithm on Finding Minimal ReductYue-Jin Lv, Nan-Xing Liu. 728 [doi]
- A Ten-year Review of Granular ComputingJingtao Yao. 734-739 [doi]
- A Study of the Query Target of the Chinese Query SentenceFengbin Zheng, Xiajiong Shen, Qiang Ge. 740-744 [doi]
- Visualization of Affect-Relations of Message Races for Debugging MPI ProgramsMi-Young Park, Seok Young Kim, Hyuk Ro Park. 745-750 [doi]
- Unit Sizing of a Stand-Alone Hybrid Power System Using Model-Free OptimizationMehdi Hakimi, Seyyed Masoud Moghaddas Tafreshi, M. R. Rajati. 751-756 [doi]
- Application of Swarm Intelligence Algorithm to Improve on Multiple RegressionSu-Fen Chen, Hui Sun. 757-760 [doi]
- Nonlinear Target Identification and Tracking Using UKFDilip Gopichand Khairnar, S. N. Merchant, Uday B. Desai. 761-764 [doi]
- Comparing Centralized and Distributed Approaches for Operational Impact Analysis in Enterprise SystemsMark B. Moss. 765-769 [doi]
- Measuring Topological Anonymity in Social NetworksLisa Singh, Justin Zhan. 770-774 [doi]
- Privacy in the Information and Communications TechnologiesAntoni Martínez-Ballesté, Agusti Solanas. 775-780 [doi]
- Enhancing Privacy of Released DatabaseTingting Chen, Sheng Zhong. 781-786 [doi]
- Improved Customers Privacy Preference PolicyRan Wei, Justin Zhan. 787-792 [doi]