Skip to main content

previous disabled Page of 11
and
  1. No Access

    Chapter

    Fuzzy Web Information Classification Agents

    We are in an era with information overload. It becomes more and more difficult for us to analyze the fast-changing information and make decision upon the analyses. The web information agent appears to give us ...

    Yanfei Wang, Yan-Qing Zhang in Fuzzy Logic and the Internet (2004)

  2. No Access

    Chapter

    A Time-Completeness Tradeoff on Fuzzy Web-Browsing Mining

    World-wide-web applications have grown very rapidly and have made a significant impact on computer systems. Among them, web browsing for useful information may be most commonly seen. Due to its tremendous amou...

    Tzung-Pei Hong, Kuei-Ying Lin, Shyue-Liang Wang in Fuzzy Logic and the Internet (2004)

  3. No Access

    Chapter

    A Fuzzy Logic Approach for Content-Based Audio Classification and Boolean Retrieval

    Since the invention of fuzzy sets and maturing of the fuzzy logic theory, fuzzy logic systems have been widely applied to various fields, such as fuzzy controller, data mining, and so on. New potential areas u...

    Mingchun Liu, Chunru Wan, Lipo Wang in Fuzzy Logic and the Internet (2004)

  4. No Access

    Chapter

    Rough Ontology Map** in E-Business Integration

    Yi Zhao, Wolfgang Halang, **a Wang in E-Service Intelligence (2007)

  5. No Access

    Chapter

    Representation and Discovery of Intelligent E-Services

    **a Wang, Bernd J. Krämer, Yi Zhao, Wolfgang A. Halang in E-Service Intelligence (2007)

  6. No Access

    Chapter

    Web Information Representation, Extraction, and Reasoning based on Existing Programming Technology

    Fei Liu, Jidong Wang, Tharam S. Dillon in E-Service Intelligence (2007)

  7. No Access

    Chapter

    Design and Implementation of Multi-Agents for Learner-oriented Course Scheduling on the Internet

    Dong Chun Lee, Keun Wang Lee in E-Service Intelligence (2007)

  8. Chapter and Conference Paper

    A Survey Study of Chinese Drivers’ Inconsistent Risk Perception

    It is important to identify factors contributing to drivers’ risk taking behaviors in order to reduce traffic accidents and fatalities. This study conducted a survey to investigate drivers’ risk perception tow...

    Pei Wang, Pei-Luen Patrick Rau in Engineering Psychology and Cognitive Ergon… (2009)

  9. No Access

    Chapter and Conference Paper

    Testing of Diversity Strategy and Ensemble Strategy in SVM-Based Multiagent Ensemble Learning

    In this study, a four-stage SVM-based multiagent ensemble learning approach is proposed for group decision making problem. In the first stage, the initial dataset is divided into training subset and testing su...

    Lean Yu, Shouyang Wang, Kin Keung Lai in Applications of Soft Computing (2009)

  10. No Access

    Chapter and Conference Paper

    Novel Face Recognition Approach Using Bit-Level Information and Dummy Blank Images in Feedforward Neural Network

    Bit-level information is useful in image coding especially in image compression. A digital image is constructed by multilevel information of bits, called as bit-plane information. For an 8-bits gray level digi...

    David Boon Liang Bong, Kung Chuang Ting, Yin Chai Wang in Applications of Soft Computing (2009)

  11. No Access

    Book and Conference Proceedings

    Knowledge Engineering and Management

    Proceedings of the Sixth International Conference on Intelligent Systems and Knowledge Engineering, Shanghai, China, Dec 2011 (ISKE2011)

    Yinglin Wang, Tianrui Li in Advances in Intelligent and Soft Computing (2011)

  12. No Access

    Book

  13. No Access

    Chapter and Conference Paper

    Redundant and Conflict Detection in Knowledge Management System

    In this paper, we shall first briefly introduce Knowledge Management System (KMS) and a background on the Recognizing Textual Entailment (RTE) that is the theoretical basis for our redundant and conflict detec...

    Kaixiang Wang, Yinglin Wang in Knowledge Engineering and Management (2011)

  14. No Access

    Chapter and Conference Paper

    Guess-Answer: Protecting Location Privacy in Location Based Services

    When mobile users retrieve interested location information through location based service (LBS), they should always provide their accurate location, which may leak their location privacy. In order to prevent p...

    Yingjie Wu, Sisi Zhong, **aodong Wang in Knowledge Engineering and Management (2011)

  15. No Access

    Chapter and Conference Paper

    Existence and Simulations of Periodic Solution of a Predator-Prey System with Holling-Type Response and Impulsive Effects

    The principle aim of this paper is to explore the existence of periodic solution of a predator-prey model with functional response and impulsive perturbations. Sufficient and realistic conditions are obtained ...

    Wenxiang Zhang, Zhanji Gui, Kaihua Wang in Knowledge Engineering and Management (2011)

  16. No Access

    Chapter and Conference Paper

    Traditional Chinese Medicine Syndrome Knowledge Representation Model of Gastric Precancerous Lesion and Risk Assessment Based on Extenics

    To strengthen the research on Traditional Chinese Medicine theory and the knowledge representation of syndrome. Extension set is chosed to symbolize the syndromes of Gastric disease and Gastric Precancerous Le...

    Weili Chen, Aizi Fang, Wenhui Wang in Knowledge Engineering and Management (2011)

  17. No Access

    Chapter and Conference Paper

    An Ontology-Based Task-Driven Knowledge Reuse Framework for Product Design Process

    This paper puts forward a task-driven knowledge reuse framework for complex product design process. Domain ontology is used in the framework, which is fundamental for customization of the systems developed und...

    Jun Guo, **juan Liu, Yinglin Wang in Knowledge Engineering and Management (2011)

  18. No Access

    Chapter and Conference Paper

    An Approach to Analyzing LOH Data of Lung Cancer Based on Biclustering and GA

    There is a close relation between the phenomenon of LOH and malignant tumor. Bicluster algorithms have been applied to the data of loss of heterozygosity analysis and can find the submatrix which is composed b...

    Jun Wang, Hongbin Yang, Yue Wu, Zongtian Liu in Knowledge Engineering and Management (2011)

  19. No Access

    Chapter and Conference Paper

    Sentence Compression with Natural Language Generation

    We present a novel unsupervised method for sentence compression which relies on a Stanford Typed Dependencies to extract information items, then generates compressed sentences via Natural Language Generation(N...

    Peng Li, Yinglin Wang in Knowledge Engineering and Management (2011)

  20. No Access

    Chapter and Conference Paper

    Automatic Recognition of Chinese Unknown Word for Single-Character and Affix Models

    This paper presents a novel method to recognize Chinese unknown word from short texts corpus, which is based our observation of both single-character and affix models of Chinese unknown word. In our approach, ...

    **n Jiang, Ling Wang, Yanjiao Cao, Zhao Lu in Knowledge Engineering and Management (2011)

previous disabled Page of 11