Knowledge Engineering and Management
Proceedings of the Sixth International Conference on Intelligent Systems and Knowledge Engineering, Shanghai, China, Dec 2011 (ISKE2011)
Chapter
We are in an era with information overload. It becomes more and more difficult for us to analyze the fast-changing information and make decision upon the analyses. The web information agent appears to give us ...
Chapter
World-wide-web applications have grown very rapidly and have made a significant impact on computer systems. Among them, web browsing for useful information may be most commonly seen. Due to its tremendous amou...
Chapter
Since the invention of fuzzy sets and maturing of the fuzzy logic theory, fuzzy logic systems have been widely applied to various fields, such as fuzzy controller, data mining, and so on. New potential areas u...
Chapter
Chapter
Chapter
Chapter
Chapter and Conference Paper
It is important to identify factors contributing to drivers’ risk taking behaviors in order to reduce traffic accidents and fatalities. This study conducted a survey to investigate drivers’ risk perception tow...
Chapter and Conference Paper
In this study, a four-stage SVM-based multiagent ensemble learning approach is proposed for group decision making problem. In the first stage, the initial dataset is divided into training subset and testing su...
Chapter and Conference Paper
Bit-level information is useful in image coding especially in image compression. A digital image is constructed by multilevel information of bits, called as bit-plane information. For an 8-bits gray level digi...
Book and Conference Proceedings
Proceedings of the Sixth International Conference on Intelligent Systems and Knowledge Engineering, Shanghai, China, Dec 2011 (ISKE2011)
Book
Chapter and Conference Paper
In this paper, we shall first briefly introduce Knowledge Management System (KMS) and a background on the Recognizing Textual Entailment (RTE) that is the theoretical basis for our redundant and conflict detec...
Chapter and Conference Paper
When mobile users retrieve interested location information through location based service (LBS), they should always provide their accurate location, which may leak their location privacy. In order to prevent p...
Chapter and Conference Paper
The principle aim of this paper is to explore the existence of periodic solution of a predator-prey model with functional response and impulsive perturbations. Sufficient and realistic conditions are obtained ...
Chapter and Conference Paper
To strengthen the research on Traditional Chinese Medicine theory and the knowledge representation of syndrome. Extension set is chosed to symbolize the syndromes of Gastric disease and Gastric Precancerous Le...
Chapter and Conference Paper
This paper puts forward a task-driven knowledge reuse framework for complex product design process. Domain ontology is used in the framework, which is fundamental for customization of the systems developed und...
Chapter and Conference Paper
There is a close relation between the phenomenon of LOH and malignant tumor. Bicluster algorithms have been applied to the data of loss of heterozygosity analysis and can find the submatrix which is composed b...
Chapter and Conference Paper
We present a novel unsupervised method for sentence compression which relies on a Stanford Typed Dependencies to extract information items, then generates compressed sentences via Natural Language Generation(N...
Chapter and Conference Paper
This paper presents a novel method to recognize Chinese unknown word from short texts corpus, which is based our observation of both single-character and affix models of Chinese unknown word. In our approach, ...