Browsing Advanced Reasoning Group by Title

Sort by: Order: Results:

  • Cornelis, Chris; Jensen, Richard (2011-09-07)
    Nearest neighbour (NN) approaches are inspired by the way humans make decisions, comparing a test object to previously encountered samples. In this paper, we propose an NN algorithm that uses the lower and upper approximations ...
  • Shen, Qiang; Jensen, Richard (2007)
    Attribute selection (AS) refers to the problem of selecting those input attributes or features that are most predictive of a given outcome; a problem encountered in many areas such as machine learning, pattern recognition ...
  • Marin-Blázquez, Javier; Shen, Qiang (2008)
    Many real-world problems require the development and application of algorithms that automatically generate human interpretable knowledge from historical data. Most existing algorithms for rule induction from imprecise data ...
  • Shen, Qiang; Longzhi, Yang (2011)
    Fuzzy interpolative reasoning has been extensively studied due to its ability to enhance the robustness of fuzzy systems and reduce system complexity. In particular, the scale and move transformation-based approach is able ...
  • Snooke, Neal; Shipman, Richard (Springer, 2001-12-11)
    Model based reasoning applied to electrical systems has matured over recent years resulting in deployment of commercial design analysis tools in the automotive industry [1, 41. These tools work at the component level on ...
  • Keppens, Jeroen; Shen, Qiang (2006-12)
    In the past decade, compositional modelling (CM) has established itself as the predominant knowledge-based approach to construct mathematical (simulation) models automatically. Although it is mainly applied to physical ...
  • Snooke, Neal; Price, Chris (1998-11-23)
    This paper discusses the use of hierarchies of function in reasoning about automotive electrical systems. Such hierarchies enable more powerful reasoning for applications such as diagnosis, failure mode and effects analysis, ...
  • Powers, Simon; He, Jun (2008-08-01)
    Network intrusion detection is the problem of detecting unauthorised use of, or access to, computer systems over a network. Two broad approaches exist to tackle this problem: anomaly detection and misuse detection. An ...
  • Cornelis, Chris; Jensen, Richard; Shen, Qiang (2009)
    The automated generation of feature pattern-based if-then rules is essential to the success of many intelligent pattern classifiers, especially when their inference results are expected to be directly human-comprehensible. ...
  • Price, Chris; Snooke, Neal; Ellis, David (1999-01)
    Engineers have developed a number of design techniques in order to detect problems in their designs, such as yellow-boarding, FMECA, FTA and sneak circuit analysis. Concurrent engineering demands that all such design ...
  • Thomasson, Benjy; Thomas, Lynda; Ratcliffe, Mark (2006)
    We report on a study of novice programmers’ object oriented class designs. These designs were analysed to discover what faults could be discovered. The two most common faults related to non-referenced classes (inability ...
  • Boongoen, Tossapon; Shen, Qiang (2009)
    Combating identity fraud is prominent and urgent since false identity has become the common denominator of all serious crime. Among many identified identity attributes, personal names are commonly falsified or aliased by ...
  • Shen, Qiang (2009)
    Decision support systems play an important role in many application domains. For instance, in the detection of serious crime, including terrorist activity, an intelligent system which is capable of automated modelling and ...
  • Shen, Qiang; Jensen, Richard (2008)
    One of the many successful applications of rough set theory has been to the area of feature selection. The rough set ideology of using only the supplied data and no other information has many benefits, where most other ...
  • Jensen, Richard; Shen, Qiang (2009)
    One of the many successful applications of rough set theory has been to the area of feature selection. The rough set principle of using only the supplied data and no other information has many benefits, where most other ...
  • Galea, Michelle; Shen, Qiang (2005)
    Iterative rule learning is a common strategy for fuzzy rule induction using stochastic population-based algorithms (SPBAs) such as Ant Colony Optimisation (ACO) and genetic algorithms. Several SPBAs are run in succession ...
  • Fu, Xin; Shen, Qiang (2007-06)
    Compositional Modelling (CM) has been applied to synthesize automatically plausible scenarios in many problem domains with promising results. However, due to the lack of capability to deal with imprecise or illdefined ...
  • Bell, Jonathan; Snooke, Neal; Price, Chris (2005-08)
    Functional modeling is in use for the interpretation of the results of model based simulation of engineered systems for design analysis, enabling the automatic generation of a textual design analysis report that expresses ...
  • Price, Chris; Snooke, Neal; Lewis, Stuart (2006-06)
    Software support for the automotive electrical design process is vital, as many of the safety analysis tasks needing to be carried out, while complex, are repetitive and time consuming. Such support is required throughout ...
  • Daly, Ronan; Shen, Qiang (2009-06)
    Bayesian networks are a useful tool in the representation of uncertain knowledge. This paper proposes a new algorithm called ACO-E, to learn the structure of a Bayesian network. It does this by conducting a search through ...

Search Cadair


Advanced Search

Browse