Search
Search Results
-
Impact of Purity Measures on Knowledge Extraction in Decision Trees
Symbolic knowledge representation is crucial for successful knowledge extraction and consequently for successful data mining. Therefore decision... -
Definability of Association Rules in Predicate Calculus
Observational calculi are special logical calculi in which statements concerning observed data can be formulated. Their special case is predicate... -
Multimedia Communication System for the Blind
A Multimedia communication system for blind users is developed. The system is named MIMIZU and its terminal is composed of a refreshable tactile... -
Gait Training System for Computer-aided Rehabilitation
This Gait Training system is designed to simulate the effects of gait training in a swimming pool. The weight of the subject is supported by a... -
Electronic Locomotion Aids for the Blind: Towards More Assistive Systems
This chapter first presents a review of existing locomotion assistance devices for the blind. These devices are merely proximeters, that measure the... -
Audio Fingerprinting: Concepts And Applications
An audio fingerprint is a unique and compact digest derived from perceptually relevant aspects of a recording. Fingerprinting technologies allow the... -
An Efficient Information Retrieval Method for Brownfield Assessment with Sparse Data*
Environmental site investigations are carried out prior to the reclamation of industrially contaminated sites. In this study, an information... -
Efficient ReasoningWith FuzzyWords
Dealing with coarse granular information is very attractive for several reasons: 1. The number of details in an application might be so large that... -
Vibrations of X-Braced Portal Frames
Because of devastation of structures due to earthquake and wind force, increasing attention has been paid to dynamic responses of braced structures... -
Using Visual Features for Building and Localizing within Topological Maps of Indoor Environments
This paper addresses the problem of localization and map construction by a mobile robot in an indoor environment using only visual sensor... -
Simulated Annealing Approach for the Multi-objective Facility Layout Problem
In general, facility layout problems are occurred if there are changes in requirements of space, people and equipments. When the changes of... -
Penalty-Reward Analysis with Uninorms: A Study of Customer (Dis)Satisfaction
In customer (dis)satisfaction research, analytic methods are needed to capture the complex relationship between overall (dis)satisfaction with a... -
Association Rule Based Specialization in ER Models
Association rules (ARs) emerged in the domain of market basket analysis and provide a convenient and effective way to identify and represent certain... -
Mining Association Rules with Rough Sets
We say that there is an association between two sets of items when the sets are likely to occur together in transactions. In information retrieval,... -
Accelerating the New Product Introduction with Intelligent Data Mining
New product development (NPD) is a vital activity for companies. It is also a very risky process since every development stage involves a high degree... -
A User Centred Approach to Management Decision Making
The management decision making process is becoming increasingly complicated as more detailed and extensive data is available in this information age.... -
Techniques to Improve Multi-Agent Systems for Searching and Mining the Web
Nowadays, an abundant amount of information is created and delivered over electronic media. The information gathering in the Internet is a complex... -
Gene Regulating Network Discovery
Gene regulation has been an important research topic for the past 30 years and data processing models based on different assumptions have been... -
Semantic Relations and Information Discovery
The treatment of semantic relations between terms is essential in information retrieval (IR). Each term in a thesaurus might have classes of... -
Soft Computing Models for Network Intrusion Detection Systems
Security of computers and the networks that connect them is increasingly becoming of great significance. Computer security is defined as the...