The coding theory is an application of algebra that has become increasingly important over the decades. There are some different works that have been devoted to the problems of cryptography/cryptology. Cryptography is the study of sending and receiving secret messages. With the widespread use of information technologies and the rise of digital computer networks in many areas of the world, securing the exchange of information has become a crucial task. Currently, very active research is being done with electronic or communication applications. In the present paper an innovative technique for data encryption is proposed based on the random sequence generation using the recurrence matrices and a quadruple vector. The new algorithm provides data encryption at two levels and hence security against crypto analysis is achieved at relatively low computational overhead.
{"title":"Data Encryption Technique Using Random Number Generator","authors":"A. C. Sekhar, K. Sudha, P. Reddy","doi":"10.1109/GrC.2007.73","DOIUrl":"https://doi.org/10.1109/GrC.2007.73","url":null,"abstract":"The coding theory is an application of algebra that has become increasingly important over the decades. There are some different works that have been devoted to the problems of cryptography/cryptology. Cryptography is the study of sending and receiving secret messages. With the widespread use of information technologies and the rise of digital computer networks in many areas of the world, securing the exchange of information has become a crucial task. Currently, very active research is being done with electronic or communication applications. In the present paper an innovative technique for data encryption is proposed based on the random sequence generation using the recurrence matrices and a quadruple vector. The new algorithm provides data encryption at two levels and hence security against crypto analysis is achieved at relatively low computational overhead.","PeriodicalId":259430,"journal":{"name":"2007 IEEE International Conference on Granular Computing (GRC 2007)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127059090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A two-layer fuzzy control algorithm is proposed for traffic control of a class of traffic networks. The concerned network is supposed to have a compact central area with large traffic flow and high possibility of congestion, and a relatively large, loose outer area. The proposed anti-congestion fuzzy algorithm (ACTA) pursues two goals simultaneously, that is, to minimize the average vehicle delay and to prevent traffic congestion from happening. The simulation included in the end shows the performance of the proposed approach is better than that of green link determining (GLIDE) in case of large traffic volume.
{"title":"Anti-Congestion Fuzzy Algorithm for Traffic Control of a Class of Traffic Networks","authors":"Wei-bin Zhang, Bu-zhou Wu, Wen-jiang Liu","doi":"10.1109/GrC.2007.138","DOIUrl":"https://doi.org/10.1109/GrC.2007.138","url":null,"abstract":"A two-layer fuzzy control algorithm is proposed for traffic control of a class of traffic networks. The concerned network is supposed to have a compact central area with large traffic flow and high possibility of congestion, and a relatively large, loose outer area. The proposed anti-congestion fuzzy algorithm (ACTA) pursues two goals simultaneously, that is, to minimize the average vehicle delay and to prevent traffic congestion from happening. The simulation included in the end shows the performance of the proposed approach is better than that of green link determining (GLIDE) in case of large traffic volume.","PeriodicalId":259430,"journal":{"name":"2007 IEEE International Conference on Granular Computing (GRC 2007)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130668868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In the past decade, many papers about granular computing(GrC) have been published, but the key points about granular computing(GrC) are still unclear. In this paper, we try to find the key points of GrC in the information transformation of the pattern recognition. The information similarity is the main point in the original insight of granular computing (GrC) proposed by Zadeh(1997[1]). Many GrC researches are based on equivalence relation or more generally tolerance relation, equivalence relation or tolerance relation can be described by some distance functions and GrC can be geometrically defined in a framework of multiscale covering, at other hand, the information transformation in the pattern recognition can be abstracted as a topological transformation in a feature information space, so topological theory can be used to study GrC. The key points of GrC are (1) there are two granular computing approaches to change a high dimensional complex distribution domain to a low dimensional and simple domain, (2) these two kind approaches can be used in turn if feature vector itself can be arranged in a granular way.
{"title":"Granular Computing in the Information Transformation of Pattern Recognition","authors":"Hong Hu, Zhongzhi Shi","doi":"10.1109/GrC.2007.42","DOIUrl":"https://doi.org/10.1109/GrC.2007.42","url":null,"abstract":"In the past decade, many papers about granular computing(GrC) have been published, but the key points about granular computing(GrC) are still unclear. In this paper, we try to find the key points of GrC in the information transformation of the pattern recognition. The information similarity is the main point in the original insight of granular computing (GrC) proposed by Zadeh(1997[1]). Many GrC researches are based on equivalence relation or more generally tolerance relation, equivalence relation or tolerance relation can be described by some distance functions and GrC can be geometrically defined in a framework of multiscale covering, at other hand, the information transformation in the pattern recognition can be abstracted as a topological transformation in a feature information space, so topological theory can be used to study GrC. The key points of GrC are (1) there are two granular computing approaches to change a high dimensional complex distribution domain to a low dimensional and simple domain, (2) these two kind approaches can be used in turn if feature vector itself can be arranged in a granular way.","PeriodicalId":259430,"journal":{"name":"2007 IEEE International Conference on Granular Computing (GRC 2007)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130339165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. Yamaguchi, H. Nakajima, K. Taniguchi, Syoji Kobashi, K. Kondo, Y. Hata
In this paper, we introduce a health monitoring system by both air pressure and ultrasonic sensors. The system of these sensors can complementary detect a behavior before getting out of bed with high accuracy aided by fuzzy membership functions. In this system, the ultrasonic sensor can obtain vibration information of human by setting it the under a bed frame. The air pressure sensor can also detect a pressure change of movement of human by setting it into the mattress on the bed. By using these sensors, we construct a fuzzy system to detect a behavior before getting out of bed.
{"title":"Fuzzy Detection System of Behavior before Getting Out of Bed by Air Pressure and Ultrasonic Sensors","authors":"H. Yamaguchi, H. Nakajima, K. Taniguchi, Syoji Kobashi, K. Kondo, Y. Hata","doi":"10.1109/GrC.2007.69","DOIUrl":"https://doi.org/10.1109/GrC.2007.69","url":null,"abstract":"In this paper, we introduce a health monitoring system by both air pressure and ultrasonic sensors. The system of these sensors can complementary detect a behavior before getting out of bed with high accuracy aided by fuzzy membership functions. In this system, the ultrasonic sensor can obtain vibration information of human by setting it the under a bed frame. The air pressure sensor can also detect a pressure change of movement of human by setting it into the mattress on the bed. By using these sensors, we construct a fuzzy system to detect a behavior before getting out of bed.","PeriodicalId":259430,"journal":{"name":"2007 IEEE International Conference on Granular Computing (GRC 2007)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131395260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
On May 8, 1997 IBM's Deep Blue computer chess program had beaten chess grand master G. Kasparov in New York. On August 10, 2006 computer Chinese chess systems had also beaten grand masters marginally in Beijing. Both types of chess game systems are planned searching expert computer systems without machine learning capability. However computer GO game systems are still far behind human GO masters's capability. Therefore a machine learning game theory could be still important research in game theory. In this article a SRM machine learning game theory is introduced. The application of our game theory to Internet security, computer security, GO games, robotics, and management systems will be investigated. The general application of our game theory to business, economics, engineering, social science, and other related fields are also discussed.
{"title":"SRML Learning Game Theory with Application to Internet Security and Management Systems","authors":"James Kuodo Huang, Bang-su Chen","doi":"10.1109/GrC.2007.157","DOIUrl":"https://doi.org/10.1109/GrC.2007.157","url":null,"abstract":"On May 8, 1997 IBM's Deep Blue computer chess program had beaten chess grand master G. Kasparov in New York. On August 10, 2006 computer Chinese chess systems had also beaten grand masters marginally in Beijing. Both types of chess game systems are planned searching expert computer systems without machine learning capability. However computer GO game systems are still far behind human GO masters's capability. Therefore a machine learning game theory could be still important research in game theory. In this article a SRM machine learning game theory is introduced. The application of our game theory to Internet security, computer security, GO games, robotics, and management systems will be investigated. The general application of our game theory to business, economics, engineering, social science, and other related fields are also discussed.","PeriodicalId":259430,"journal":{"name":"2007 IEEE International Conference on Granular Computing (GRC 2007)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124044466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
One of the relations used with granularity is indistinguishability, where distinguishable entities in a finer-grained granule are indistinguishable in a coarser-grained granule. This relation is a subtype of equivalence relation, which is used in the other direction to create finer-grained granules. Together with the notion of similarity, we formally prove some intuitive properties of the indistinguishability relation for both qualitative and quantitative granularity, that with a given granulation there must be at least two granules (levels of granularity) for it to be granular, and derive a strict order between finer and coarser granules. Based on these results, granulation hierarchy is defined as extra assisting structure to augment implementations.
{"title":"Granulation with Indistinguishability, Equivalence, or Similarity","authors":"C. Keet","doi":"10.1109/GrC.2007.29","DOIUrl":"https://doi.org/10.1109/GrC.2007.29","url":null,"abstract":"One of the relations used with granularity is indistinguishability, where distinguishable entities in a finer-grained granule are indistinguishable in a coarser-grained granule. This relation is a subtype of equivalence relation, which is used in the other direction to create finer-grained granules. Together with the notion of similarity, we formally prove some intuitive properties of the indistinguishability relation for both qualitative and quantitative granularity, that with a given granulation there must be at least two granules (levels of granularity) for it to be granular, and derive a strict order between finer and coarser granules. Based on these results, granulation hierarchy is defined as extra assisting structure to augment implementations.","PeriodicalId":259430,"journal":{"name":"2007 IEEE International Conference on Granular Computing (GRC 2007)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123496787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper proposes a hierarchical clustering algorithm based on information granularity, which regards clustering on sample data as the procedure of granule merging. In the promoted algorithm, firstly each sample is named with an initial class, then for a given granular threshold those pairs of samples, whose distance among them is less than the threshold, will be merged to one class and generate a new larger granule. Repeat this procedure until certain conditions are satisfied. This paper also discusses computational complexity of the novel algorithm and compares them with the traditional hierarchical clustering algorithm. In the last, some experimental examples are given, and the experimental results show that this algorithm can efficiently improve the clustering speed without affecting the precision.
{"title":"Hierarchical Clustering Algorithm Based on Granularity","authors":"Jiuzhen Liang, Guangbin Li","doi":"10.1109/GrC.2007.53","DOIUrl":"https://doi.org/10.1109/GrC.2007.53","url":null,"abstract":"This paper proposes a hierarchical clustering algorithm based on information granularity, which regards clustering on sample data as the procedure of granule merging. In the promoted algorithm, firstly each sample is named with an initial class, then for a given granular threshold those pairs of samples, whose distance among them is less than the threshold, will be merged to one class and generate a new larger granule. Repeat this procedure until certain conditions are satisfied. This paper also discusses computational complexity of the novel algorithm and compares them with the traditional hierarchical clustering algorithm. In the last, some experimental examples are given, and the experimental results show that this algorithm can efficiently improve the clustering speed without affecting the precision.","PeriodicalId":259430,"journal":{"name":"2007 IEEE International Conference on Granular Computing (GRC 2007)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116869844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
By introducing the notion of similar topological open subsystem in De Morgan algebra, a pair of general rough approximations based on De Morgan algebra are defined. For the new generalized rough set model on De Morgan algebra (call it first type), some properties are given. Moreover, some uncertainty measures on bounded distribute lattice are introduced, and the relationship between those uncertainty measures and first type generalized rough set model on De Morgan algebra is discussed. Finally, the notion of similar closure subsystem of De Morgan algebra is introduced, and another rough set model on De Morgan algebra is constructed, call it second type generalized rough set model on De Morgan algebra.
{"title":"Generalized Rough Set Model on De Morgan Algebras","authors":"Xiao-hong Zhang, Gang Yao","doi":"10.1109/GrC.2007.21","DOIUrl":"https://doi.org/10.1109/GrC.2007.21","url":null,"abstract":"By introducing the notion of similar topological open subsystem in De Morgan algebra, a pair of general rough approximations based on De Morgan algebra are defined. For the new generalized rough set model on De Morgan algebra (call it first type), some properties are given. Moreover, some uncertainty measures on bounded distribute lattice are introduced, and the relationship between those uncertainty measures and first type generalized rough set model on De Morgan algebra is discussed. Finally, the notion of similar closure subsystem of De Morgan algebra is introduced, and another rough set model on De Morgan algebra is constructed, call it second type generalized rough set model on De Morgan algebra.","PeriodicalId":259430,"journal":{"name":"2007 IEEE International Conference on Granular Computing (GRC 2007)","volume":"261 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122071898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper discusses forms and structures of some important models of granular computing. A class of models is called relation based models, which are induced by equivalence relations, more general, by general binary relations or neighborhood systems. Another class of models of granular computing, called covering based models, are proposed and discussed in detail, which are induced by coverings of the given universe.
{"title":"Some Models of Granular Computing","authors":"D. Pei","doi":"10.1109/GrC.2007.46","DOIUrl":"https://doi.org/10.1109/GrC.2007.46","url":null,"abstract":"This paper discusses forms and structures of some important models of granular computing. A class of models is called relation based models, which are induced by equivalence relations, more general, by general binary relations or neighborhood systems. Another class of models of granular computing, called covering based models, are proposed and discussed in detail, which are induced by coverings of the given universe.","PeriodicalId":259430,"journal":{"name":"2007 IEEE International Conference on Granular Computing (GRC 2007)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117266898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Nii, Shigeru Ando, Yutaka Takahashi, A. Uchinuno, R. Sakashita
The nursing care quality improvement is very important in the medical field. Currently, nursing-care freestyle texts (nursing-care data) are collected from many hospitals in Japan by using Web applications. Some nursing-care experts evaluate the collected data to improve nursing care quality. For evaluating the nursing-care data, experts need to read all freestyle texts carefully. However, it is a hard task for an expert to evaluate the data because of huge number of nursing-care data in the database. In order to reduce workloads evaluating nursing-care data, we propose a support vector machine(SVM) based classification system.
{"title":"Nursing-Care Freestyle Text Classification Using Support Vector Machines","authors":"M. Nii, Shigeru Ando, Yutaka Takahashi, A. Uchinuno, R. Sakashita","doi":"10.1109/GrC.2007.131","DOIUrl":"https://doi.org/10.1109/GrC.2007.131","url":null,"abstract":"The nursing care quality improvement is very important in the medical field. Currently, nursing-care freestyle texts (nursing-care data) are collected from many hospitals in Japan by using Web applications. Some nursing-care experts evaluate the collected data to improve nursing care quality. For evaluating the nursing-care data, experts need to read all freestyle texts carefully. However, it is a hard task for an expert to evaluate the data because of huge number of nursing-care data in the database. In order to reduce workloads evaluating nursing-care data, we propose a support vector machine(SVM) based classification system.","PeriodicalId":259430,"journal":{"name":"2007 IEEE International Conference on Granular Computing (GRC 2007)","volume":"308 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134484247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}