


default search action
GrC 2009: Lushan Mountain, Nanchang, China
- The 2009 IEEE International Conference on Granular Computing, GrC 2009, Lushan Mountain, Nanchang, China, 17-19 August 2009. IEEE Computer Society 2009, ISBN 978-1-4244-4830-2

Keynotes
- Xuewen Chen:

Computational models in systems biology. 1 - Tsau Young Lin:

Formal theory of granular computing, and two major applications. 2 - Sadaaki Miyamoto:

Generalized bags and their relations: An alternative model for fuzzy set theory and applications. 3 - Stephen Kwok-Wing Tsui

:
High-throughput DNA sequencing and bioinformatics: Bottlenecks and opportunities. 4 - Xindong Wu:

Ubiquitous personalized information processing with wildcards. 5 - Laurence Tianruo Yang:

Ubiquitous/pervasive intelligence: Visions and challenges. 6
Research Papers
- Hidenao Abe

, Shusaku Tsumoto:
Detection of trends of technical phrases in text mining. 7-12 - Leila Fallah Araghi, Hamed Shah-Hosseini:

Robust stability of Fuzzy Elman Neural Network. 13-18 - Shi-Zhong Bai, Li-Wei Jiang:

On SP-closedness in L-topological spaces. 19-22 - Shuang Bai, Si-Xue Bai:

The Maximal Frequent Pattern mining of DNA sequence. 23-26 - Feilong Cao, Yubo Yuan:

Convergence rates for a class of neural networks with logarithmic function. 27-32 - Chien-Chung Chan, Gwo-Hshiung Tzeng

:
Representation of second-order Dominance-based approximation space by neighborhood systems. 33-38 - Xiao Chang, Qinghua Zheng:

Sparse Bayesian learning for ranking. 39-44 - Hongmei Chen, Tianrui Li

, Weibin Liu, Weili Zou:
Research on the approach of dynamically maintenance of approximations in rough set theory while attribute values coarsening and refining. 45-48 - Hongmei Chen, Tianrui Li

, Chengxiang Hu, Xiaolan Ji:
An incremental updating principle for computing approximations in information systems while the object set varies with time. 49-52 - Jeang-Kuo Chen, Wen-Ting Chien:

Appending mining data of spatial object for query. 53-56 - Jingnian Chen, Shujun Fu, Taorong Qiu:

Gain-ratio-Based Selective classifiers for incomplete data. 57-60 - Jinguang Chen, Tingting He, Zhuoming Gui, Fang Li:

Probabilistic unsupervised Chinese sentence compression. 61-66 - Kunrong Chen, Fen Lin, Qing Tan, Zhongzhi Shi:

Adaptive action selection using utility-based reinforcement learning. 67-72 - Tianding Chen:

License plate text localization using DWT and neural network. 73-77 - Tianding Chen:

Non-photorealistic rendering of ink painting style diffusion. 78-82 - Wei Chen, Kajia Cao, Renan Jia, Kuiliang Chen:

An efficient algorithm for identification of real belief measures. 83-87 - Yiming Chen, Zhoujun Li

, Xiaohua Hu, Hongxiang Diao, Junwan Liu:
Predicting gene function with positive and unlabeled examples. 89-94 - Zehua Chen, Jun Xie, Xinying Xu, Keming Xie:

Granular Matrix and redefined RST system. 95-100 - Yong Cheng, Ruilian Zhao:

Multiview spectral clustering via ensemble. 101-106 - Tzung-Nan Chuang, Chia-Tzu Lin, Jung-Yuan Kung, Ming-Da Lin:

Fuzzy genetic algorithm for the route of container ships. 107-112 - Wei Cui, Zhangyan Xu:

A method for fuzzy risk analysis based on the new similarity of trapezoidal fuzzy numbers. 113-116 - Jianhua Dai:

Rough 3-valued Lukasiewicz algebras and BCI-algebras. 117-120 - Dayong Deng:

Parallel reduct and its properties. 121-125 - Qingshan Deng, Guoping Mei:

Combining self-organizing map and K-means clustering for detecting fraudulent financial statements. 126-131 - Wanyu Deng, Qinghua Zheng, Lin Chen:

A fast and accurate collaborative filter. 132-135 - Lan Di

, Yi Lin, Li Liu:
An algorithm for image edge detection using improved PCNN. 136-139 - Zhiguo Ding, Huiying Xu, Xinzhong Zhu, Jianmin Zhao:

Study on agile logistics distribution optimization model based on multi-agent. 140-143 - Duan Shan-Rong, Li Xin:

The anomaly intrusion detection based on immune negative selection algorithm. 144-147 - Yasunori Endo, Yukihiro Hamasuna, Yuchi Kanzawa, Sadaaki Miyamoto:

On fuzzy c-means clustering for uncertain data using quadratic regularization of penalty vectors. 148-153 - Jiali Feng:

Attribute Grid Computer based on Qualitative Mapping and its application in pattern Recognition. 154-161 - Lihua Feng, Gaoyuan Luo:

Study on landfall hurricane using the fuzzy risk analysis along the east coast of the United States. 162-165 - Can Gao, Duoqian Miao, Jie Zhou:

Maximum condition entropy based attribute reduction in variable precision rough set model. 166-170 - Liang Gao, Shaoyue Yu, Yu-Pan Luo, Lin Shang:

MLOD: Multi-granularity local outlier detection. 171-175 - Chun Guan, Guihan Li, Jun Hu:

A trust evaluation method based on rough sets theory in MAS. 176-179 - Bo Guo, Wei Chen, Zhenyuan Wang:

Pseudo gradient search for solving nonlinear multiregression based on the Choquet integral. 180-183 - Lifan Guo, Yigang Zhou

:
Ontology based digital library search model research. 184-187 - Zhengwei Guo, Jinan Zhang:

An approach for METAR report decode based on finite automata. 188-191 - R. B. Fajriya Hakim, Subanar, Edi Winarko

:
Clustering based-on indiscernibility and indiscernibility level. 192-196 - Yukihiro Hamasuna, Yasunori Endo, Sadaaki Miyamoto:

Comparison of tolerant fuzzy c-means clustering with L2- and L1-regularization. 197-202 - Jianchao Han:

Approximation spaces in granular computing. 203-208 - Liang He, Faqing Wu:

A Time-context-Based Collaborative Filtering Algorithm. 209-213 - Tzung-Pei Hong, Po-Cheng Wang, Yeong-Chyi Lee:

Automatic attribute clustering based on genetic algorithms. 214-218 - Zhaowen Hou, Zhousuo Zhang:

Hybrid intelligent fault diagnosis based on granular computing. 219-224 - Jean-David Hsu:

When quadratic sorts use granules. 225-228 - Hong Hu, Zhongzhi Shi:

Machine learning as Granular Computing. 229-234 - Juan-li Hu, Jia-bing Deng, Ming-xiang Sui:

Color space conversion model from CMYK to LAB based on prism. 235-238 - Juan-li Hu, Jia-bing Deng, Chang Hu:

An improved classification algorithm on teaching evaluation. 239-244 - Jun Hu, Qiang Wu:

Web structure model based on granular computing. 245-250 - Hu Ping:

Wavelet neural network based on BP algorithm and its application in flood forecasting. 251-253 - Chenn-Jung Huang

, Hung-Yen Shen, Jia-Jian Liao, Kai-Wen Hu, Dian-Xiu Yang, Chun-Hua Chen, Yi-Ta Chuang:
A fuzzy logic-based routing for Delay-Tolerant heterogeneous Networks. 254-259 - Tao Huang, Hongyang Cui:

The implement of searching engine for educational resources using text clustering. 260-263 - Wei Huang, Elia El-Darzi:

Using Granular Computing theories for service-oriented systems analysis and design. 264-267 - Jiafeng Ji, Zheng Pei:

Obtaining complex linguistic rules from decision information system based genetic algorithms. 268-273 - Baoqing Jiang, Chong Han, Lingsheng Li:

Mining opened frequent itemsets to generate maximal Boolean association rules. 274-277 - Weijin Jiang, Yuhui Xu, Dongpo Cao, Fei Luo:

A novel nonlinear time series forecasting of time-delay neural network. 278-283 - Weijin Jiang, Yuhui Xu, Dejia Shi, Ke Xia:

A novel dynamic clustering algorithm and its application in fuzzy modeling. 284-289 - Jiang Xingjun, Yao Linan:

A novel optimization mothed of parameters based on combined NN and GA. 290-293 - Karen H. Jin, Dan Wu, Libing Wu

:
On designing approximate inference algorithms for multiply sectioned Bayesian networks. 294-299 - Song Jin, Hongfei Lin, Sui Su:

Query expansion based on folksonomy tag co-occurrence analysis. 300-305 - C. Maria Keet:

From granulation hierarchy to granular perspective. 306-311 - Yasuo Kudo, Tetsuya Murai, Sadaaki Miyamoto:

On an extraction method of structural characteristics in object-oriented rough set models. 312-317 - Gang Lei, Xiaohua Li, Jiliu Zhou, Xiao-gang Gong:

Geometric feature based facial expression recognition using multiclass support vector machines. 318-321 - Bo Li, Wei Li, Yuanyuan Chen, Dong-Dong Jiang, Ying-Zhi Cui:

HTML integrity authentication based on fragile digital watermarking. 322-325 - Guangrong Li, Xiaodan Zhang, Illhoi Yoo, Xiaohua Zhou:

A text mining method for discovering hidden links. 326-328 - Guangyuan Li, Xiao Qin, Qinbin Hu, Changan Yuan:

An efficient algorithm for mining frequent sequences in dynamic environment. 329-333 - Hai-Guang Li, Gong-Qing Wu, Xuegang Hu, Xindong Wu, Yuan-Jun Bi, Pei-Pei Li:

A relation extraction method of Chinese named entities based on location and semantic features. 334-339 - Hong Li:

Granule, granular set and granular system. 340-345 - Jian-li Li, Hong Zhen, Kai Xu:

Multi-attribute based analysis of stability of strategic alliance among liner shipping companies. 346-349 - Long Li, Jie Yang, Wei Wu, Tianshuang Wu:

An intuitionistic fuzzy associative memory network and its learning rule. 350-353 - Shengwei Li, Lingsheng Li, Chong Han:

Mining closed frequent itemset based on FP-Tree. 354-357 - Tianzan Li, Xiaohua Wang:

Non-synchronous signal monitoring based on simulated annealing neural network. 358-361 - Wanyi Li, Xiaorong Chen, Shounian Fan:

A histogram and difference based approach for R wave real time detection. 362-367 - Wenyan Li, Jiyi Wang, Gaomin Lin:

Generating and reducing test case based on covering rough sets. 368-372 - Xinjian Li, Qihua Liu:

A new approach for supply chain material requirement planning. 373-376 - Yanlin Li, Lihua Wei:

Rough set methods based on discernibility relationship in IIS. 377-380 - Yuan-Yuan Li, Yun Jun:

A comprehensive evaluation method based on extenics and rough set. 381-383 - Yan Liang, Yaoting Zhu:

A conditional random fields model for overlapping ambiguity resolution in Chinese word segmentation. 384-389 - Hancheng Liao:

Research on software development estimation. 390-393 - Zuhua Liao, Miaohan Hu, Juan Zhou:

Rough inclines. 394-397 - Kawuu W. Lin, Yu-Chin Luo:

A fast parallel algorithm for discovering frequent patterns. 398-403 - Renbing Lin, Jiyi Wang:

On the topological properties of intuitionistic fuzzy rough sets. 404-408 - Tsau Young Lin:

Concept analysis in web informatics- 5th GrC model - Using ordered granules. 409-414 - Dun Liu, Tianrui Li

, Gangrong Liu, Pei Hu:
An approach for inducing interesting incremental knowledge based on the change of attribute values. 415-418 - Guilong Liu, Jie Liu:

On structure of generalized intuitionistic fuzzy rough sets. 419-423 - Junwan Liu, Zhoujun Li

, Xiaohua Hu, Yiming Chen:
Multi-objective ant colony optimization biclustering of microarray data. 424-429 - Xingming Long, Jing Zhou:

Research of image preprocessing and corner detection in 3D measurement based on Ridgelet transform. 430-433 - Ji Ma:

Project scheduling based on genetic algorithm. 434-439 - Chengying Mao

:
A specification-based testing framework for Web service-based software. 440-443 - Sadaaki Miyamoto, Mitsuaki Yamazaki, Wataru Hashimoto:

Fuzzy semi-supervised clustering with target clusters using different additional terms. 444-449 - Xuewen Mu, Yaling Zhang:

A modified gradient-based backpropagation training method for neural networks. 450-453 - Wenjia Niu, Gang Li

, Xinghua Yang, Xu Han, Zhongzhi Shi:
Facilitating dynamic web service composition with fine-granularity context management. 454-459 - Aijia Ouyang, Yongquan Zhou, Qifang Luo:

Hybrid particle swarm optimization algorithm for solving systems of nonlinear equations. 460-465 - Fei Peng

, Guangjun Xie, Tianhao Wu:
Optimizing quantum teleportation circuit using genetic algorithm. 466-470 - Xiangwei Qi, Yusup Abaydulla:

The study of Web-Based online mathematical expression recognizing technologies. 471-476 - Dehong Qiu, Ye Wang, Qifeng Zhang:

A framework for selecting salient features and samples simultaneously to enhance classifier performance. 477-481 - Ya-Jun Qu, Bao-Gang Hu

:
RBF networks for nonlinear models subject to linear constraints. 482-487 - Ming-Wen Shao, Fang-Gang Wu:

Maximal Dominance Link technique for knowledge aquisition in ordered information system. 488-492 - Xiajiong Shen, Qian Wang, Peipei Wang, Bo Zhou:

A novel technique proposed for testing of object oriented software systems. 493-495 - Xiajiong Shen, Qian Wang, Peipei Wang, Bo Zhou:

Automatic generation of test case based on GATS algorithm. 496-500 - Zhongzhi Shi, Zuqiang Meng, Yuan Lu:

Tolerance Granular Computing based on incomplete information system. 501-506 - Raj Singh, Tom Johnsten, Vijay V. Raghavan, Ying Xie:

An efficient algorithm for discovering positive and negative patterns. 507-512 - Ling Song, Shengen Li, Wei Cui, Dongmei Zhang, Xiaofei Niu:

An approach to XML Path retrieval. 513-516 - Jieli Sun, Zhiqing Zhu, Ying Wang:

Research on Personalized recommendation adaptive dynamic case expression. 517-522 - Dekun Tan, Wenhai Luo, Qing Liu:

Multi-objective particle swarm optimization algorithm for engineering constrained optimization problems. 523-528 - Sua Tan, Anmin Zhu, Simon X. Yang

:
A GA-based fuzzy logic approach to mobile robot navigation in unknown dynamic environments with moving obstacles. 529-534 - Jun Tong, Jian-min Han, Teng-fang Guo:

Time consistency adjustment algorithm of time Petri Net. 535-538 - Tetsuya Toyota, Hajime Nobuhara:

Hierarchical structure analysis and visualization of Japanese law networks based on morphological analysis and granular computing. 539-543 - Shusaku Tsumoto, Shoji Hirano, Hidenao Abe

:
Multivariate statistical independence and contingency tables. 544-548 - Jing Wan, Si-Xue Bai:

An improvement of PageRank algorithm based on the time-activity-curve. 549-552 - Pingping Wang, Shangping Dai, Li Gao:

Clustering routing algorithm for distributed wireless sensor networks. 553-556 - Shuliang Wang

, Hehua Chi, Xiao Feng, Jinfei Yin:
Human facial expression mining based on cloud model. 557-560 - Shuliang Wang

, Xiao Feng, Hehua Chi, Xiuling Wang:
Localization and extraction on the eyes, nose and mouth of human face. 561-564 - Wei Wang, Qinghua Zheng, Jun Liu, Yingying Chen, Pengfei Tang:

Exploiting various information for knowledge element relation recognition. 565-571 - Ying Wang:

Design of an anti-counterfeiting system based on SMS. 572-575 - Zhuo Wang, Ran Hu, Jianfeng Xu:

Mobile E-commerce security architecture. 576-579 - Xiangfeng Wei, Jianming Miao, Quan Zhang:

Research on extracting conceptual frameworks of sentence groups. 580-585 - Chin-Ang Wu, Wen-Yang Lin, Chang-Long Jiang, Chuan-Chun Wu:

Favorable support threshold recommendation for multidimensional association mining using user preference ontology. 586-591 - Ming-Fen Wu, Ting-Liang Wang:

Characterization and algorithm of decision system's core based discernibility matrix. 592-595 - Wei-Zhi Wu:

Fuzzy rough sets determined by fuzzy implication operators. 596-601 - Jiali Xia, Zengbo Han, Hui Chen, Chengying Mao:

An adaptive overload management strategy for periodic real-time tasks. 602-607 - Jianwei Xiang, Xia Ke:

A novel extracting medical diagnosis rules based on rough sets. 608-611 - Song Xiao, Jiu-ju Cai, Ruo-hui Wang, Fei Liu:

Totally asymmetric simple exclusion processes apply in traffic system. 612-615 - Keming Xie, Xiaoli Hao, Jun Xie:

Image segmentation algorithm based on granular lattice matrix space. 616-619 - Bizhou Xiong, Benting Wan

:
Relative queue-based distributed system performance real-time dynamic monitor. 620-625 - Bo Xu, Hongfei Lin, Baoyan Liu:

Study on question answering system for biomedical domain. 626-629 - Jian Xu, Jianhua Chen, Bin Li:

Random forest for relational classification with application to terrorist profiling. 630-633 - Jianfeng Xu, Chonghua Cao, Zhuo Wang, Hantian Wei:

Web agent intelligent services based on granular computing. 634-637 - Jiucheng Xu, Jinling Shi, Wanli Cheng:

Ordered rules extraction for incomplete ordered decision system in granular computing. 638-643 - Xiaolin Xu, Guanglin Xu, Jiali Feng:

A kind of synthetic evaluation method based on the attribute computing network. 644-647 - Xinying Xu, Tianrui Cao, Chengdong Yan, Gang Xie, Zhifeng Wu:

HRCT image segmentation algorithm based on tolerance granular space model. 648-653 - Yan Xu, Bin Wang:

Knowledge measurement based on Rough Set. 654-657 - HaiFeng Xue:

Prerequisites to authentication protocols proved by binding theory. 658-661 - Jianfeng Yan, Ming Liu:

Diagnosis result fusion algorithm in fault diagnosis system using improved D-S theory. 662-667 - Lin Yan, Qing Liu:

Granular resolution and granular reasoning. 668-671 - Jihui Yang

:
Fuzzy relation linear programming. 672-675 - Jun Yang, Zhangyan Xu:

Different core attributes's comparison and analysis. 676-681 - Qing Yang, Wei Chen, Bin Wen:

Fuzzy ontology generation model using fuzzy clustering for learning evaluation. 682-685 - Qingyun Yang, Chunjie Wang, Changsheng Zhang:

An efficient discrete particle swarm algorithm for Task Assignment Problems. 686-690 - Xibei Yang, Xinzhe Li, Tsau Young Lin:

First GrC model - Neighborhood Systems the most general rough set models. 691-695 - Xibei Yang, Jing-Yu Yang, Xiaohua Hu:

A new rough set model for knowledge acquisition in incomplete information system. 696-701 - Yi Yang, Qian-Sheng Fang:

The improved genetic algorithm for solving knapsack problem based on Handel-C. 702-705 - Lei-Yue Yao, Jian-Ying Xiong:

The research and implementation of a correlative degree mining algorithm based on IIS logs. 706-709 - Show-Jane Yen, Yue-Shi Lee

, Chiu-Kuang Wang:
MRFI-The maintenance of representative frequent itemsets. 710-715 - Ai-Hua Yin, Xiao-Ping Zhao:

A two-step approach for solving the flexible job shop scheduling problem. 716-720 - Xiang Yin, Ivo Düntsch

, Günther Gediga:
Choosing the root node of a quadtree. 721-726 - Juan Yu, Jianmin Han, Jianmin Chen, Zanzhu Xia:

TopDown-KACA: An efficient local-recoding algorithm for k-anonymity. 727-732 - Kun-Ming Yu, Chun-Yuan Lin, Hui-Yuan Wang, Chuan Yi Tang, Jiayi Zhou:

Parallel branch-and-bound approach with MPI technology in inferring chemical compounds with path frequency. 733-738 - Xue-Hai Yuan, Hongxing Li:

Generalized fuzzy equivalent relations. 739-742 - Yifeng Zeng, Jian Luo, Shuyuan Lin:

Classification using Markov blanket for feature selection. 743-747 - Yue Zeng, Baolin Sun, Xianying He, Zhulin Liu:

Research on QoS Routing Algorithm in ad hoc networks. 748-751 - Feng Zhan, Keming Xie, Jingge Zhao, Gang Xie

:
Fault diagnosis based on granular matrix-SDG and its application. 752-756 - Chi Zhang:

Software components composition compatibility checking based on behavior description. 757-760 - Chi Zhang:

Research on Web Services composition based on behavior protocol. 761-764 - Rui Zhang, Bin Chen, Jianqiao Li:

Research on the continuum/discontinuum multiscale analytical system of the interaction between rigid wheel and lunar soil. 765-768 - Weiwei Zhang, Wei Chen, Zhenyuan Wang:

On the uniqueness of the expression for the Choquet integral with linear core in classification. 769-774 - Xia Zhang, Suzhen Wang, Mingzhu Xu, Yixin Yin:

Chinese text sentiment classification based on granule network. 775-778 - Zhao Zhang, Ning Ye, Ning Deng, Hui Du:

Orthogonal subspace based nonlinear correlation learning for supervised dimensionality reduction. 779-784 - Zhibing Zhang:

Boosting density-based clustering algorithm by mean approximation on grids. 785-790 - Xiaoping Zhao:

Asymptotical stability criteria for Cohen-Grossberg neural networks with time-varying delay. 791-794 - Xinxin Zhao, Xiaofeng Wang:

Maritime information engine. 795-798 - Yinliang Zhao:

A step toward code granulation space. 799-804 - Ruijuan Zheng, Mingchuan Zhang, Qingtao Wu, Guanfeng Li, Wangyang Wei:

A Service Self-Optimization Algorithm based on Autonomic Computing. 805-808 - Peng Zhou, Qingshan Deng:

Hybridizing fast taboo search with ant colony optimization algorithm for solving large scale permutation flow shop scheduling problem. 809-813 - De-Sheng Zhu, Ming-Qin Zhou:

Get what you want from Internet using fuzzy k-means clustering algorithm. 814-817 - Shijuan Zhu, Qingbao Zhu:

A novel grouping PSO algorithm for solving multi-modal high-dimensional functions. 818-823 - Weili Zou, Tianrui Li

, Hongmei Chen, Xiaolan Ji:
Approaches for incrementally updating approximations based on set-valued information systems while attribute values' coarsening and refining. 824-829

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














