[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
Volume 178, Issue 17September, 2008
Reflects downloads up to 03 Feb 2025Bibliometrics
Skip Table Of Content Section
article
Combining automatic acquisition of knowledge with machine learning approaches for multilingual temporal recognition and normalization

This paper presents an improvement in the temporal expression (TE) recognition phase of a knowledge based system at a multilingual level. For this purpose, the combination of different approaches applied to the recognition of temporal expressions are ...

article
Multiple-vector user profiles in support of knowledge sharing

This paper describes an algorithm to automatically construct expertise profiles for company employees, based on documents authored and read by them. A profile consists of a series of high dimensional vectors, each describing an expertise domain, and ...

article
An association-based case reduction technique for case-based reasoning

Case-based reasoning (CBR) is a type of problem solving technique which uses previous cases to solve new, unseen and different problems. Although a larger number of cases in the memory can improve the coverage of the problem space, the retrieval ...

article
Attribute reduction in decision-theoretic rough set models

Rough set theory can be applied to rule induction. There are two different types of classification rules, positive and boundary rules, leading to different decisions and consequences. They can be distinguished not only from the syntax measures such as ...

article
Optimal models for single-period supply chain problems with fuzzy demand

The aim of this paper is to develop an optimal technique for dealing with the fuzziness aspect of demand uncertainties. Triangular fuzzy numbers are used to model external demand, and decision models in both non-coordination and coordination situations ...

article
Integrated production planning and preventive maintenance in deteriorating production systems

This paper discusses the issue of integrating production planning and preventive maintenance in manufacturing production systems. In particular, it tackles the problem of integrating production and preventive maintenance in a system composed of parallel ...

article
Real-time preemptive scheduling of sporadic tasks based on supervisory control of discrete event systems

This paper presents a preemptive scheduling scheme for real-time systems with sporadic tasks based on the supervisory control theory of discrete event systems. In particular, we present a systematic method of computing a schedulable language that ...

article
Regularized least squares support vector regression for the simultaneous learning of a function and its derivatives

In this paper, we propose a regularized least squares approach based support vector machine for simultaneously approximating a function and its derivatives. The proposed algorithm is simple and fast as no quadratic programming solver needs to be ...

article
Fast and accurate global motion estimation algorithm using pixel subsampling

Global motion generally describes the motion of a camera, although it may comprise motions of large objects. Global motions are often modeled by parametric transformations of two-dimensional images. The process of estimating the motions parameters is ...

article
A Convertible Multi-Authenticated Encryption scheme for group communications

Recently, Wu et al. proposed a Convertible Multi-Authenticated Encryption (CMAE) scheme, which allows a signing group with multiple signers to generate a multi-authenticated ciphertext signature on the chosen message so that only a designated verifier ...

article
Secure public-key encryption scheme without random oracles

Since the first practical and secure public-key encryption scheme without random oracles proposed by Cramer and Shoup in 1998, Cramer-Shoup's scheme and its variants remained the only practical and secure public-key encryption scheme without random ...

article
The semiring of matrices over a finite chain

Let L"m denote the chain {0,1,2,...,m-1} with the usual ordering and M"n(L"m) the matrix semiring of all nxn matrices with elements in L"m. We firstly introduce some order-preserving semiring homomorphisms from M"n(L"m) to M(L"k). By using these ...

article
The characterizations of h-hemiregular hemirings and h-intra-hemiregular hemirings

In this paper, the concepts of fuzzy h-bi-ideals and fuzzy h-quasi-ideals of a hemiring are introduced, and related properties are investigated. The notion of h-intra-hemiregularity of a hemiring, which is a generalization of the notion of intra-...

article
On v-filters and normal v-filters of a residuated lattice with a weak vt-operator

In this paper, we study further the filter theory of residuated lattices. First, we discuss the concepts of filters and normal filters of residuated lattices and propose some equivalent conditions for them. Then we introduce and investigate the notions ...

article
Fuzzy filters and fuzzy prime filters of bounded Rl-monoids and pseudo BL-algebras

The logical foundations of processes handling uncertainty in information use some classes of algebras as algebraic semantics. The sets of provable formulas in corresponding inference systems from the point of view of uncertain information can be ...

article
Minimization of linear objective functions under the constraints expressed by a system of fuzzy relation equations

This paper considers the following optimization problem: minimization of linear objective functions under the constraints expressed by a system of fuzzy relation equations using max-product composition. We first show some properties of minimal solutions ...

Comments

Please enable JavaScript to view thecomments powered by Disqus.