首页 > 最新文献

Artificial intelligence and applications (Commerce, Calif.)最新文献

英文 中文
Module Extraction for Efficient Object Queries over Ontologies with Large ABoxes. 面向大箱体本体的高效对象查询模块提取。
Pub Date : 2015-02-28 DOI: 10.15764/AIA.2015.01002
Jia Xu, Patrick Shironoshita, U. Visser, N. John, M. Kabuka
The extraction of logically-independent fragments out of an ontology ABox can be useful for solving the tractability problem of querying ontologies with large ABoxes. In this paper, we propose a formal definition of an ABox module, such that it guarantees complete preservation of facts about a given set of individuals, and thus can be reasoned independently w.r.t. the ontology TBox. With ABox modules of this type, isolated or distributed (parallel) ABox reasoning becomes feasible, and more efficient data retrieval from ontology ABoxes can be attained. To compute such an ABox module, we present a theoretical approach and also an approximation for SHIQ ontologies. Evaluation of the module approximation on different types of ontologies shows that, on average, extracted ABox modules are significantly smaller than the entire ABox, and the time for ontology reasoning based on ABox modules can be improved significantly.
从本体ABox中提取逻辑独立的片段可以用于解决具有大型ABox的本体查询的可跟踪性问题。在本文中,我们提出了一个ABox模块的形式化定义,这样它保证了关于一组给定个体的事实的完整保存,从而可以在本体TBox之外独立地进行推理。有了这种类型的ABox模块,孤立或分布式(并行)ABox推理变得可行,并且可以从本体ABox中获得更高效的数据检索。为了计算这样一个ABox模块,我们提出了一个理论方法和SHIQ本体的近似。对不同类型本体上的模块近似评价表明,平均而言,提取的ABox模块明显小于整个ABox,基于ABox模块的本体推理时间可以显著提高。
{"title":"Module Extraction for Efficient Object Queries over Ontologies with Large ABoxes.","authors":"Jia Xu, Patrick Shironoshita, U. Visser, N. John, M. Kabuka","doi":"10.15764/AIA.2015.01002","DOIUrl":"https://doi.org/10.15764/AIA.2015.01002","url":null,"abstract":"The extraction of logically-independent fragments out of an ontology ABox can be useful for solving the tractability problem of querying ontologies with large ABoxes. In this paper, we propose a formal definition of an ABox module, such that it guarantees complete preservation of facts about a given set of individuals, and thus can be reasoned independently w.r.t. the ontology TBox. With ABox modules of this type, isolated or distributed (parallel) ABox reasoning becomes feasible, and more efficient data retrieval from ontology ABoxes can be attained. To compute such an ABox module, we present a theoretical approach and also an approximation for SHIQ ontologies. Evaluation of the module approximation on different types of ontologies shows that, on average, extracted ABox modules are significantly smaller than the entire ABox, and the time for ontology reasoning based on ABox modules can be improved significantly.","PeriodicalId":91205,"journal":{"name":"Artificial intelligence and applications (Commerce, Calif.)","volume":"59 1","pages":"8-31"},"PeriodicalIF":0.0,"publicationDate":"2015-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74229714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Merging rule-based belief databases 合并基于规则的信念数据库
Pub Date : 2007-02-12 DOI: 10.7892/BORIS.26458
R. Wehbe
The problem of revising a belief database is treated in many classical works. We will consider here the problem of merging two belief databases (BDBs for short) Ψ1 and Ψ2, operation that will be denoted by Ψ1 Ψ2, and whose result will be a new BDB. Since belief not necessarily reflects the actual state of the world (as opposed to knowledge), both BDBs could be incompatible. The goal is to construct a new BDB trying to retain as much as possible of the original beliefs of Ψ1 and Ψ2.
许多经典著作都讨论了信念数据库的修正问题。我们将在这里考虑合并两个信念数据库(简称BDB) Ψ1和Ψ2的问题,操作将用Ψ1 Ψ2表示,其结果将生成一个新的BDB。由于信念不一定反映世界的实际状态(与知识相反),因此两种bdb可能是不相容的。我们的目标是构建一个新的BDB,尽量保留Ψ1和Ψ2的原始信念。
{"title":"Merging rule-based belief databases","authors":"R. Wehbe","doi":"10.7892/BORIS.26458","DOIUrl":"https://doi.org/10.7892/BORIS.26458","url":null,"abstract":"The problem of revising a belief database is treated in many classical works. We will consider here the problem of merging two belief databases (BDBs for short) Ψ1 and Ψ2, operation that will be denoted by Ψ1 Ψ2, and whose result will be a new BDB. Since belief not necessarily reflects the actual state of the world (as opposed to knowledge), both BDBs could be incompatible. The goal is to construct a new BDB trying to retain as much as possible of the original beliefs of Ψ1 and Ψ2.","PeriodicalId":91205,"journal":{"name":"Artificial intelligence and applications (Commerce, Calif.)","volume":"40 1","pages":"630-635"},"PeriodicalIF":0.0,"publicationDate":"2007-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78619025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Relay Node Placement in Energy-Constrained Networks using SOMA Evolutionary Algorithm 基于SOMA进化算法的能量约束网络中继节点配置
Pub Date : 2006-02-13 DOI: 10.5555/1166890.1166897
M. Cervenka, I. Zelinka
This paper concerns with the problem of gathering data from a wireless multi-hop network of energy-constrained sensor nodes to a common base station. To extend lifetime of this network, a certain number of communication nodes are placed among the sensor nodes to relay the acquired data. The main contribution of this work lies in employment of an evolutionary algorithm to determine the best positions of relay nodes in network of randomly placed sensor nodes.
本文研究了从能量受限的传感器节点无线多跳网络向公共基站收集数据的问题。为了延长网络的寿命,在传感器节点之间设置一定数量的通信节点,以中继采集到的数据。本工作的主要贡献在于采用一种进化算法来确定随机放置的传感器节点网络中中继节点的最佳位置。
{"title":"Relay Node Placement in Energy-Constrained Networks using SOMA Evolutionary Algorithm","authors":"M. Cervenka, I. Zelinka","doi":"10.5555/1166890.1166897","DOIUrl":"https://doi.org/10.5555/1166890.1166897","url":null,"abstract":"This paper concerns with the problem of gathering data from a wireless multi-hop network of energy-constrained sensor nodes to a common base station. To extend lifetime of this network, a certain number of communication nodes are placed among the sensor nodes to relay the acquired data. The main contribution of this work lies in employment of an evolutionary algorithm to determine the best positions of relay nodes in network of randomly placed sensor nodes.","PeriodicalId":91205,"journal":{"name":"Artificial intelligence and applications (Commerce, Calif.)","volume":"39 14","pages":"40-44"},"PeriodicalIF":0.0,"publicationDate":"2006-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72420188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Independent Component Analysis and Rough Fuzzy based Approach to Web Usage Mining 基于独立成分分析和粗糙模糊的Web使用挖掘方法
Pub Date : 2006-02-13 DOI: 10.5555/1166890.1166962
S. Chimphlee, N. Salim, M. Ngadiman, W. Chimphlee, Surat Srinoy
Web Usage Mining is that area of Web Mining which deals with the extraction of interesting knowledge from logging information produced by Web servers. A challenge in web classification is how to deal with the high dimensionality of the feature space. In this paper we present Independent Component Analysis (ICA) for feature selection and using Rough Fuzzy for clustering web user sessions. It aims at discovery of trends and regularities in web users' access patterns. ICA is a very general-purpose statistical technique in which observed random data are linearly transformed into components that are maximally independent from each other, and simultaneously have "interesting" distributions. Our experiments indicate can improve the predictive performance when the original feature set for representing web log is large and can handling the different groups of uncertainties/impreciseness accuracy.
Web用法挖掘是Web挖掘的一个领域,它处理从Web服务器产生的日志信息中提取有趣的知识。如何处理特征空间的高维性是web分类的一个挑战。在本文中,我们提出了独立成分分析(ICA)的特征选择和使用粗糙模糊聚类的web用户会话。它旨在发现网络用户访问模式的趋势和规律。ICA是一种非常通用的统计技术,其中观察到的随机数据被线性转换成最大程度上相互独立的组件,同时具有“有趣的”分布。实验表明,在原始特征集较大的情况下,该方法可以提高web日志的预测性能,并且可以准确地处理不同组的不确定性/不精确性。
{"title":"Independent Component Analysis and Rough Fuzzy based Approach to Web Usage Mining","authors":"S. Chimphlee, N. Salim, M. Ngadiman, W. Chimphlee, Surat Srinoy","doi":"10.5555/1166890.1166962","DOIUrl":"https://doi.org/10.5555/1166890.1166962","url":null,"abstract":"Web Usage Mining is that area of Web Mining which deals with the extraction of interesting knowledge from logging information produced by Web servers. A challenge in web classification is how to deal with the high dimensionality of the feature space. In this paper we present Independent Component Analysis (ICA) for feature selection and using Rough Fuzzy for clustering web user sessions. It aims at discovery of trends and regularities in web users' access patterns. ICA is a very general-purpose statistical technique in which observed random data are linearly transformed into components that are maximally independent from each other, and simultaneously have \"interesting\" distributions. Our experiments indicate can improve the predictive performance when the original feature set for representing web log is large and can handling the different groups of uncertainties/impreciseness accuracy.","PeriodicalId":91205,"journal":{"name":"Artificial intelligence and applications (Commerce, Calif.)","volume":"78 1","pages":"422-427"},"PeriodicalIF":0.0,"publicationDate":"2006-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81288988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A Method for Classifying Emotion of Text based on Emotional Dictionaries for Emotional Reading 基于情感词典的情感阅读文本情感分类方法
Pub Date : 2006-02-13 DOI: 10.5555/1166890.1166906
F. Sugimoto, M. Yoneyama
Representing emotional expressions in text-to-speech synthesis is an interesting subject. The ultimate purpose of our research is to develop an automatic reading system which reads text aloud such as novels with emotion. Our strategy for constructing the system is that we classify the emotion of a text in perspective based on the distribution of emotional words, and classify the emotion of a sentence based on the emotion of nouns, adjectives or verbs composed in the sentence instead of understanding the meaning of the text, and synthesize speech using partially optimum prosodic parameters.
在文本-语音合成中表达情感是一个有趣的课题。我们研究的最终目的是开发一种自动阅读系统,它可以带着情感大声朗读小说等文本。我们构建系统的策略是,根据情感词的分布对文本进行情感分类,根据句子中组成的名词、形容词或动词的情感对句子进行情感分类,而不是理解文本的含义,并使用部分最优韵律参数合成语音。
{"title":"A Method for Classifying Emotion of Text based on Emotional Dictionaries for Emotional Reading","authors":"F. Sugimoto, M. Yoneyama","doi":"10.5555/1166890.1166906","DOIUrl":"https://doi.org/10.5555/1166890.1166906","url":null,"abstract":"Representing emotional expressions in text-to-speech synthesis is an interesting subject. The ultimate purpose of our research is to develop an automatic reading system which reads text aloud such as novels with emotion. Our strategy for constructing the system is that we classify the emotion of a text in perspective based on the distribution of emotional words, and classify the emotion of a sentence based on the emotion of nouns, adjectives or verbs composed in the sentence instead of understanding the meaning of the text, and synthesize speech using partially optimum prosodic parameters.","PeriodicalId":91205,"journal":{"name":"Artificial intelligence and applications (Commerce, Calif.)","volume":"149 1","pages":"91-96"},"PeriodicalIF":0.0,"publicationDate":"2006-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78294546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
To Identify Suspicious Activity in Anomaly Detection based on Soft Computing 基于软计算的异常检测中可疑活动识别
Pub Date : 2006-02-13 DOI: 10.5555/1166890.1166951
W. Chimphlee, M. Sap, A. Abdullah, S. Chimphlee, Surat Srinoy
The Traditional intrusion detection systems (IDS) look for unusual or suspicious activity, such as patterns of network traffic that are likely indicators of unauthorized activity. However, normal operation often produces traffic that matches likely "attack signature", resulting in false alarms. In this paper we propose an intrusion detection method that proposes rough set based feature selection heuristics and using fuzzy c-means for clustering data. Rough set has to decrease the amount of data and get rid of redundancy. Fuzzy Clustering methods allow objects to belong to several clusters simultaneously, with different degrees of membership. Our approach allows us to recognize not only known attacks but also to increase accuracy detection rate for suspicious activity and signature detection. Empirical studies using the network security data set from the DARPA 1998 offline intrusion detection project (KDD 1999 Cup) show the feasibility of misuse and anomaly detection results.
传统的入侵检测系统(IDS)寻找不寻常或可疑的活动,例如网络流量的模式,这些模式可能是未授权活动的指示器。但正常运行时,往往会产生与可能的“攻击特征”相匹配的流量,导致误报。本文提出了一种基于粗糙集的特征选择启发式方法和模糊c-means聚类数据的入侵检测方法。粗糙集必须减少数据量,消除冗余。模糊聚类方法允许对象同时属于多个具有不同隶属度的聚类。我们的方法不仅可以识别已知的攻击,还可以提高可疑活动和签名检测的准确率。利用DARPA 1998离线入侵检测项目(KDD 1999 Cup)的网络安全数据集进行的实证研究表明,误用和异常检测结果是可行的。
{"title":"To Identify Suspicious Activity in Anomaly Detection based on Soft Computing","authors":"W. Chimphlee, M. Sap, A. Abdullah, S. Chimphlee, Surat Srinoy","doi":"10.5555/1166890.1166951","DOIUrl":"https://doi.org/10.5555/1166890.1166951","url":null,"abstract":"The Traditional intrusion detection systems (IDS) look for unusual or suspicious activity, such as patterns of network traffic that are likely indicators of unauthorized activity. However, normal operation often produces traffic that matches likely \"attack signature\", resulting in false alarms. In this paper we propose an intrusion detection method that proposes rough set based feature selection heuristics and using fuzzy c-means for clustering data. Rough set has to decrease the amount of data and get rid of redundancy. Fuzzy Clustering methods allow objects to belong to several clusters simultaneously, with different degrees of membership. Our approach allows us to recognize not only known attacks but also to increase accuracy detection rate for suspicious activity and signature detection. Empirical studies using the network security data set from the DARPA 1998 offline intrusion detection project (KDD 1999 Cup) show the feasibility of misuse and anomaly detection results.","PeriodicalId":91205,"journal":{"name":"Artificial intelligence and applications (Commerce, Calif.)","volume":"33 1","pages":"359-364"},"PeriodicalIF":0.0,"publicationDate":"2006-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76696147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Stable Legal Knowledge with Regard to Contradictory Arguments 关于矛盾论点的稳定法律知识
Pub Date : 2006-02-13 DOI: 10.5555/1166890.1166945
Shingo Hagiwara, S. Tojo
A large size of legal knowledge base which consists of entangled inference rules, facts, and arbitrary interpretations may latently include inconsistency within them. In this paper, we propose a method to find the source of such inconsistency by supplying hypothesized facts into a set of rules. With this, we put those rules in the order of reliability and show a stable part of the legal knowledge. First, we define an argument as a chaining of rules to support a certain proposition. Thereafter, we compose a minimal inconsistency set (MIS) combining two disagreeing arguments. Among such a MIS, we can distinguish stable rules that is indifferent to the source of inconsistent from unstable rules, which can be candidates of future amendment. A knowledge-base which consists of stable rules can be also distinguished from that which may contain unstable rules.
庞大的法律知识库由纠缠在一起的推理规则、事实和任意解释组成,其中可能潜藏着不一致。在本文中,我们提出了一种方法,通过提供假设的事实到一组规则来找到这种不一致的来源。由此,我们将这些规则按可靠性排序,显示出法律知识中稳定的一部分。首先,我们将论证定义为支持某个命题的一系列规则。然后,我们将两个不一致的论点组合成一个最小不一致集(MIS)。在这样的信息管理系统中,我们可以区分对不一致来源无关的稳定规则和不稳定规则,不稳定规则可以成为未来修改的候选规则。由稳定规则组成的知识库也可以与可能包含不稳定规则的知识库区分开来。
{"title":"Stable Legal Knowledge with Regard to Contradictory Arguments","authors":"Shingo Hagiwara, S. Tojo","doi":"10.5555/1166890.1166945","DOIUrl":"https://doi.org/10.5555/1166890.1166945","url":null,"abstract":"A large size of legal knowledge base which consists of entangled inference rules, facts, and arbitrary interpretations may latently include inconsistency within them. In this paper, we propose a method to find the source of such inconsistency by supplying hypothesized facts into a set of rules. With this, we put those rules in the order of reliability and show a stable part of the legal knowledge. First, we define an argument as a chaining of rules to support a certain proposition. Thereafter, we compose a minimal inconsistency set (MIS) combining two disagreeing arguments. Among such a MIS, we can distinguish stable rules that is indifferent to the source of inconsistent from unstable rules, which can be candidates of future amendment. A knowledge-base which consists of stable rules can be also distinguished from that which may contain unstable rules.","PeriodicalId":91205,"journal":{"name":"Artificial intelligence and applications (Commerce, Calif.)","volume":"265 1","pages":"323-328"},"PeriodicalIF":0.0,"publicationDate":"2006-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75917879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Fuzzy and Tile Coding Function Approximation in Agent Coevolution 智能体协同进化中的模糊编码函数逼近
Pub Date : 2006-02-13 DOI: 10.5555/1166890.1166950
L. Tokarchuk, J. Bigham, L. Cuthbert
Reinforcement learning (RL) is a machine learning technique for sequential decision making. This approach is well proven in many small-scale domains. The true potential of this technique cannot be fully realised until it can adequately deal with the large domain sizes that typically describe real world problems. RL with function approximation is one method of dealing with the domain size problem. This paper investigates two different function approximation approaches to RL: Fuzzy Sarsa and gradient descent Sarsa(λ) with tile coding. It presents detailed experiments in two different simulation environments on the effectiveness of the two approaches. Initial experiments indicated that the tile coding approach had greater modelling capabilities in both testbed domains. However, experimentation in a coevolutionary scenario has indicated that Fuzzy Sarsa has greater flexibility.
强化学习(RL)是一种用于顺序决策的机器学习技术。这种方法在许多小规模领域得到了很好的证明。这种技术的真正潜力不能完全实现,直到它能够充分处理通常描述现实世界问题的大域尺寸。函数逼近强化学习是处理域大小问题的一种方法。本文研究了两种不同的RL函数逼近方法:模糊Sarsa和梯度下降Sarsa(λ)。在两种不同的仿真环境中对两种方法的有效性进行了详细的实验。最初的实验表明,tile编码方法在两个测试平台域中都具有更大的建模能力。然而,在共同进化情景下的实验表明,Fuzzy Sarsa具有更大的灵活性。
{"title":"Fuzzy and Tile Coding Function Approximation in Agent Coevolution","authors":"L. Tokarchuk, J. Bigham, L. Cuthbert","doi":"10.5555/1166890.1166950","DOIUrl":"https://doi.org/10.5555/1166890.1166950","url":null,"abstract":"Reinforcement learning (RL) is a machine learning technique for sequential decision making. This approach is well proven in many small-scale domains. The true potential of this technique cannot be fully realised until it can adequately deal with the large domain sizes that typically describe real world problems. RL with function approximation is one method of dealing with the domain size problem. This paper investigates two different function approximation approaches to RL: Fuzzy Sarsa and gradient descent Sarsa(λ) with tile coding. It presents detailed experiments in two different simulation environments on the effectiveness of the two approaches. Initial experiments indicated that the tile coding approach had greater modelling capabilities in both testbed domains. However, experimentation in a coevolutionary scenario has indicated that Fuzzy Sarsa has greater flexibility.","PeriodicalId":91205,"journal":{"name":"Artificial intelligence and applications (Commerce, Calif.)","volume":"66 1","pages":"353-358"},"PeriodicalIF":0.0,"publicationDate":"2006-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90406127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
On Topologies Defined by Binary Relations in Rough Sets 粗糙集中由二元关系定义的拓扑
Pub Date : 2006-02-13 DOI: 10.5555/1166890.1166959
M. Kondo
In the theory of rough sets of data-mining, a subset of a database represents a certain knowledge. Thus to determine the subset in the database is equivalent to obtain the knowledges which the database possesses. A topological space is constructed by the database. An open subset in the topological space defined by the database corresponds to a certain knowledge in the database. Here we consider topological properties of approximation spaces in generalized rough sets. We show that (a) If R is reflexive and transitive, then R = R (T(R)). Conversely, if R = R(T (R)), then R is reflexive and transitive.(b)If O is a topology with a property (IP), then O = T(R(O)), where (IP) means that Aλ ∈ O(λ ∈ Λ) implies ∩λ Aλ ∈ O. Conversely, for any topology O, if O=T(R(O)), then it satisfies (IP).
在数据挖掘的粗糙集理论中,一个数据库的子集代表一个特定的知识。因此,确定数据库中的子集相当于获得数据库所拥有的知识。由数据库构造拓扑空间。数据库定义的拓扑空间中的开放子集对应于数据库中的某个知识。本文研究广义粗糙集中近似空间的拓扑性质。我们证明了(a)如果R是自反传递的,则R = R (T(R))。反之,若R = R(T (R)),则R是自反可传递的。(b)若O是具有属性(IP)的拓扑,则O=T(R(O)),其中(IP)表示λ∈O(λ∈Λ)暗示∩λ λ∈O。
{"title":"On Topologies Defined by Binary Relations in Rough Sets","authors":"M. Kondo","doi":"10.5555/1166890.1166959","DOIUrl":"https://doi.org/10.5555/1166890.1166959","url":null,"abstract":"In the theory of rough sets of data-mining, a subset of a database represents a certain knowledge. Thus to determine the subset in the database is equivalent to obtain the knowledges which the database possesses. A topological space is constructed by the database. An open subset in the topological space defined by the database corresponds to a certain knowledge in the database. Here we consider topological properties of approximation spaces in generalized rough sets. We show that (a) If R is reflexive and transitive, then R = R (T(R)). Conversely, if R = R(T (R)), then R is reflexive and transitive.(b)If O is a topology with a property (IP), then O = T(R(O)), where (IP) means that Aλ ∈ O(λ ∈ Λ) implies ∩λ Aλ ∈ O. Conversely, for any topology O, if O=T(R(O)), then it satisfies (IP).","PeriodicalId":91205,"journal":{"name":"Artificial intelligence and applications (Commerce, Calif.)","volume":"119 1","pages":"66-77"},"PeriodicalIF":0.0,"publicationDate":"2006-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74288758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Extended Evaluation Framework for Neural Network Publications in Sales Forecasting 神经网络出版物销售预测的扩展评价框架
Pub Date : 2006-02-13 DOI: 10.5555/1166890.1166921
S. Crone, D. Preßmar
While artificial neural networks (NN) promise superior performance in forecasting theory, they are not an established method in business practice. The vast degrees of freedom in modeling NNs have lead to countless publications on heuristic approaches to simplify modeling, training, network selection and evaluation. However, not all studies have conducted experiments with the same scientific rigor, limiting their relevance to further NN research and practice. Consequently, we propose a systematic evaluation to identify successful heuristics and derive sound guidelines to NN modeling from publications. As each forecasting domain of predictive classification or regression imposes different heuristics on specific datasets, a literature review is conducted, identifying 47 publications within the homogeneous business domain of sales forecasting and demand planning out of 4790 publications within the domain of NN forecasting. The identified publications are evaluated through a framework regarding their validity in experiment design and reliability through documentation, in order to identify and promote preeminent publications, derive recommendations for future experiments and identify gaps in current research and practice.
虽然人工神经网络(NN)在预测理论方面具有优越的性能,但在商业实践中并不是一种成熟的方法。神经网络建模的巨大自由度导致无数关于启发式方法的出版物,以简化建模,训练,网络选择和评估。然而,并不是所有的研究都以同样的科学严谨性进行了实验,这限制了它们与进一步的神经网络研究和实践的相关性。因此,我们提出了一个系统的评估,以识别成功的启发式,并从出版物中获得神经网络建模的良好指导方针。由于预测分类或回归的每个预测领域对特定数据集施加不同的启发式,因此进行了文献综述,从神经网络预测领域的4790份出版物中识别出47份属于销售预测和需求规划的同质业务领域的出版物。通过实验设计的有效性和文件的可靠性的框架来评估已确定的出版物,以确定和促进卓越的出版物,为未来的实验提出建议,并确定当前研究和实践中的差距。
{"title":"An Extended Evaluation Framework for Neural Network Publications in Sales Forecasting","authors":"S. Crone, D. Preßmar","doi":"10.5555/1166890.1166921","DOIUrl":"https://doi.org/10.5555/1166890.1166921","url":null,"abstract":"While artificial neural networks (NN) promise superior performance in forecasting theory, they are not an established method in business practice. The vast degrees of freedom in modeling NNs have lead to countless publications on heuristic approaches to simplify modeling, training, network selection and evaluation. However, not all studies have conducted experiments with the same scientific rigor, limiting their relevance to further NN research and practice. Consequently, we propose a systematic evaluation to identify successful heuristics and derive sound guidelines to NN modeling from publications. As each forecasting domain of predictive classification or regression imposes different heuristics on specific datasets, a literature review is conducted, identifying 47 publications within the homogeneous business domain of sales forecasting and demand planning out of 4790 publications within the domain of NN forecasting. The identified publications are evaluated through a framework regarding their validity in experiment design and reliability through documentation, in order to identify and promote preeminent publications, derive recommendations for future experiments and identify gaps in current research and practice.","PeriodicalId":91205,"journal":{"name":"Artificial intelligence and applications (Commerce, Calif.)","volume":"51 1","pages":"179-186"},"PeriodicalIF":0.0,"publicationDate":"2006-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80963120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
期刊
Artificial intelligence and applications (Commerce, Calif.)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1