Browsing Advanced Reasoning Group by Title

Sort by: Order: Results:

  • Cornelis, Chris; Jensen, Richard (2011-09-07)
    Nearest neighbour (NN) approaches are inspired by the way humans make decisions, comparing a test object to previously encountered samples. In this paper, we propose an NN algorithm that uses the lower and upper approximations ...
  • Shen, Qiang; Jensen, Richard (2007)
    Attribute selection (AS) refers to the problem of selecting those input attributes or features that are most predictive of a given outcome; a problem encountered in many areas such as machine learning, pattern recognition ...
  • Marin-Blázquez, Javier; Shen, Qiang (2008)
    Many real-world problems require the development and application of algorithms that automatically generate human interpretable knowledge from historical data. Most existing algorithms for rule induction from imprecise data ...
  • Shen, Qiang; Yang, Longzhi (2011)
    Fuzzy interpolative reasoning has been extensively studied due to its ability to enhance the robustness of fuzzy systems and reduce system complexity. In particular, the scale and move transformation-based approach is able ...
  • Shen, Qiang; Yang, Longzhi (2011)
    Fuzzy interpolative reasoning has been extensively studied due to its ability to enhance the robustness of fuzzy systems and reduce system complexity. In particular, the scale and move transformation-based approach is able ...
  • Snooke, Neal; Shipman, Richard (Springer, 2001-12-11)
    Model based reasoning applied to electrical systems has matured over recent years resulting in deployment of commercial design analysis tools in the automotive industry [1, 41. These tools work at the component level on ...
  • Snooke, Neal; Shipman, Richard (Springer, 2001-12-11)
    Model based reasoning applied to electrical systems has matured over recent years resulting in deployment of commercial design analysis tools in the automotive industry [1, 41. These tools work at the component level on ...
  • Keppens, Jeroen; Shen, Qiang (2006-12)
    In the past decade, compositional modelling (CM) has established itself as the predominant knowledge-based approach to construct mathematical (simulation) models automatically. Although it is mainly applied to physical ...
  • Snooke, Neal; Price, Chris (1998-11-23)
    This paper discusses the use of hierarchies of function in reasoning about automotive electrical systems. Such hierarchies enable more powerful reasoning for applications such as diagnosis, failure mode and effects analysis, ...
  • Snooke, Neal; Price, Chris (1998-11-23)
    This paper discusses the use of hierarchies of function in reasoning about automotive electrical systems. Such hierarchies enable more powerful reasoning for applications such as diagnosis, failure mode and effects analysis, ...
  • Powers, Simon; He, Jun (2008-08-01)
    Network intrusion detection is the problem of detecting unauthorised use of, or access to, computer systems over a network. Two broad approaches exist to tackle this problem: anomaly detection and misuse detection. An ...
  • Powers, Simon; He, Jun (2008-08-01)
    Network intrusion detection is the problem of detecting unauthorised use of, or access to, computer systems over a network. Two broad approaches exist to tackle this problem: anomaly detection and misuse detection. An ...
  • Cornelis, Chris; Jensen, Richard; Shen, Qiang (2009)
    The automated generation of feature pattern-based if-then rules is essential to the success of many intelligent pattern classifiers, especially when their inference results are expected to be directly human-comprehensible. ...
  • Price, Chris; Snooke, Neal; Ellis, David (1999-01)
    Engineers have developed a number of design techniques in order to detect problems in their designs, such as yellow-boarding, FMECA, FTA and sneak circuit analysis. Concurrent engineering demands that all such design ...
  • Price, Chris; Snooke, Neal; Ellis, David (1999-01)
    Engineers have developed a number of design techniques in order to detect problems in their designs, such as yellow-boarding, FMECA, FTA and sneak circuit analysis. Concurrent engineering demands that all such design ...
  • Thomasson, Benjamin Jason Tom; Thomas, Lynda; Ratcliffe, Mark Bartley (2006)
    We report on a study of novice programmers’ object oriented class designs. These designs were analysed to discover what faults could be discovered. The two most common faults related to non-referenced classes (inability ...
  • Boongoen, Tossapon; Shen, Qiang (2009)
    Combating identity fraud is prominent and urgent since false identity has become the common denominator of all serious crime. Among many identified identity attributes, personal names are commonly falsified or aliased by ...
  • Boongoen, Tossapon; Shen, Qiang (2009)
    Combating identity fraud is prominent and urgent since false identity has become the common denominator of all serious crime. Among many identified identity attributes, personal names are commonly falsified or aliased by ...
  • Shen, Qiang (2009)
    Decision support systems play an important role in many application domains. For instance, in the detection of serious crime, including terrorist activity, an intelligent system which is capable of automated modelling and ...
  • Shen, Qiang; Jensen, Richard (2008)
    One of the many successful applications of rough set theory has been to the area of feature selection. The rough set ideology of using only the supplied data and no other information has many benefits, where most other ...

Search Cadair


Advanced Search

Browse