Skip to main content

previous disabled Page of 6
and
  1. No Access

    Article

    A new approach for estimating null value in relational database

    In general, a database system will not operate properly if it exist some null values of attributes in the system. In this paper, we propose a new approach to estimate null values in relational database, which ...

    Ching-Hsue Cheng, Jia-Wen Wang in Soft Computing (2006)

  2. No Access

    Article

    Flexible fuzzy OWA querying method for hemodialysis database

    The hemodialysis quality contains the subjective opinions of the physicians. However, the range of good/bad quality of one physician’s perspective usually differs from the others, so we use the fuzzy theory to...

    Jia-Wen Wang, **g-Rong Chang, Ching-Hsue Cheng in Soft Computing (2006)

  3. Article

    Open Access

    Incremental Versus Non-incremental: Data and Algorithms Based on Ordering Relations

    Based on multi-dominance discernibility matrices, a non-incremental algorithm RIDDM and an incremental algorithm INRIDDM are proposed by means of Dominance-based Rough Set Approach. For the incremental algorit...

    **uyi Jia, Lin Shang, Jiajun Chen, **nyu Dai in International Journal of Computational Int… (2011)

  4. Article

    Open Access

    Adaptive Secret Sharing for Color Images

    A secret sharing model can secure a secret over multiple noise-like shadows and remain recoverable despite multiple shadow failures. Even if some of the shadows are compromised, the secret will not be revealed...

    Jia-Hong Li, Wei-Bin Lee, Dengpan Ye in International Journal of Computational Int… (2011)

  5. Article

    Open Access

    A Frequent Pattern Mining Method for Finding Planted Motifs of Unknown Length in DNA Sequences

    Identification and characterization of gene regulatory binding motifs is one of the fundamental tasks toward systematically understanding the molecular mechanisms of transcriptional regulation. Recently, the p...

    Caiyan Jia, Ruqian Lu, Lusheng Chen in International Journal of Computational Int… (2011)

  6. Article

    Open Access

    An Efficient Binary Differential Evolution with Parameter Adaptation

    Differential Evolution (DE) has been applied to many scientific and engineering problems for its simplicity and efficiency. However, the standard DE cannot be used in a binary search space directly. This paper...

    Dongli Jia, **ntao Duan in International Journal of Computational Int… (2013)

  7. Article

    Open Access

    Determination of 3-Ary α-Resolution in Lattice-valued Propositional Logic LP(X)

    One of key issues for α-n(t) ary resolution automated reasoning based on lattice-valued logic with truth-value in a lattice implication algebra is to investigate the α-n(t) ary resolution of some generalized lite...

    Yi Liu, Hairui Jia, Yang Xu in International Journal of Computational Intelligence Systems (2013)

  8. Article

    Open Access

    Alphanumeric Character Recognition Based on BP Neural Network Classification and Combined Features

    This paper puts forward a new method of alphanumeric character recognition based on BP neural network classification and combined features. This method firstly establishes three BP networks respectively for th...

    Yong Luo, Shuwei Chen, **aojuan He, Xue Jia in International Journal of Computational Int… (2013)

  9. No Access

    Article

    On the order-theoretic properties of lower concept formula systems

    Domain Theory and Rough Set Theory are relatively independent but have much close relationship worthy of further investigation. In this paper, we propose the notion of (orientated) lower concept formula (for s...

    Lankun Guo, Qingguo Li, **aodong Jia in Soft Computing (2014)

  10. No Access

    Article

    Integrating local and global topological structures for semi-supervised dimensionality reduction

    Dimensionality reduction plays an important role in many machine learning tasks. This paper studies semi-supervised dimensionality reduction using pairwise constraints. In this setting, domain knowledge is giv...

    Jia Wei, Qun-fang Zeng, Xuan Wang, Jia-bing Wang, Gui-hua Wen in Soft Computing (2014)

  11. Article

    Open Access

    Locally Weighted Learning: How and When Does it Work in Bayesian Networks?

    Bayesian network (BN), a simple graphical notation for conditional independence assertions, is promised to represent the probabilistic relationships between diseases and symptoms. Learning the structure of a B...

    Jia Wu, Bi Wu, Shirui Pan, Haishuai Wang in International Journal of Computational Int… (2015)

  12. Article

    Topic modeling in multimedia: algorithms and applications

    Lei **e, Jia Zeng, Zhi-Qiang Liu in Soft Computing (2015)

  13. No Access

    Article

    Communication-efficient algorithms for parallel latent Dirichlet allocation

    Latent Dirichlet allocation (LDA) is a popular topic modeling method which has found many multimedia applications, such as motion analysis and image categorization. Communication cost is one of the main bottle...

    Jian-Feng Yan, Jia Zeng, Yang Gao, Zhi-Qiang Liu in Soft Computing (2015)

  14. Article

    Open Access

    α-Minimal Resolution Principle For A Lattice-Valued Logic

    Based on the academic ideas of resolution-based automated reasoning and the previously established research work on binary α-resolution based automated reasoning schemes in the framework of lattice-valued logi...

    Hairui Jia, Yang Xu, Yi Liu, Jun Liu in International Journal of Computational Int… (2015)

  15. No Access

    Article

    Reliable Web service composition based on QoS dynamic prediction

    Web service dynamic composition is a key technology for creating value-added services by composing available services and applications. With the rapid development of web service, cloud computing, big data and ...

    Zhi Zhong Liu, Zong Pu Jia, **ao Xue, Ji Yu An in Soft Computing (2015)

  16. No Access

    Article

    Multi-criteria decision-making methods based on the Hausdorff distance of hesitant fuzzy linguistic numbers

    A hesitant fuzzy linguistic set is an extension of both a linguistic term set and a hesitant fuzzy set. It combines a quantitative evaluation with a qualitative evaluation, which can describe the real preferen...

    Jian-qiang Wang, Jia-ting Wu, **g Wang, Hong-yu Zhang, **ao-hong Chen in Soft Computing (2016)

  17. No Access

    Article

    Immune clonal selection algorithm for capacitated arc routing problem

    In existing metaheuristics for solving the capacitated arc routing problem, traversal local search operators are often used to explore neighbors of the current solutions. This mechanism is beneficial for findi...

    Ronghua Shang, Hongna Ma, Jia Wang, Licheng Jiao, Rustam Stolkin in Soft Computing (2016)

  18. No Access

    Article

    Cloud-based electronic health record system supporting fuzzy keyword search

    As cloud computing becomes prevalent, electronic health record (EHR) system has appeared in the form of patient centric, in which more and more sensitive information from patients is being uploaded into the cl...

    Zheli Liu, Jian Weng, ** Li, Jun Yang, Chuan Fu, Chunfu Jia in Soft Computing (2016)

  19. No Access

    Article

    Difference representation learning using stacked restricted Boltzmann machines for change detection in SAR images

    In this paper, we establish a deep neural network using stacked Restricted Boltzmann Machines (RBMs) to analyze the difference images and detect changes between multitemporal synthetic aperture radar (SAR) ima...

    Jia Liu, Maoguo Gong, Jiaojiao Zhao, Hao Li, Licheng Jiao in Soft Computing (2016)

  20. No Access

    Article

    Spatial-spectral-combined sparse representation-based classification for hyperspectral imagery

    Recently, sparse representation-based classification (SRC), which assigns a test sample to the class with minimum representation error via a sparse linear combination of all the training samples, has successfu...

    Sen Jia, Yao **e, Guihua Tang, Jiasong Zhu in Soft Computing (2016)

previous disabled Page of 6