Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- ArticleNovember 2009
Fuzzy Expert Systems Based on Membership Functions and Fuzzy Rules
AICI '09: Proceedings of the 2009 International Conference on Artificial Intelligence and Computational Intelligence - Volume 03Pages 513–517https://doi.org/10.1109/AICI.2009.382The prime focus in artificial intelligence is on creating machines that can exhibit some form of intelligence. Accurate mathematical models neither always exist nor can they be derived for all complex environments because the domain may not be ...
- ArticleNovember 2009
A Study on Pseudo Labeled Document Constructed for Document Re-ranking
AICI '09: Proceedings of the 2009 International Conference on Artificial Intelligence and Computational Intelligence - Volume 03Pages 377–380https://doi.org/10.1109/AICI.2009.311Document re-ranking is a middle module in information retrieval system. It’s expected that more relevant documents with query appear in higher rankings, from which automatic query expansion can benefit, and it aims at improving the performance of the ...
- ArticleNovember 2009
Research of Automatic Indexing Based on Semantic and Statistic Feature
AICI '09: Proceedings of the 2009 International Conference on Artificial Intelligence and Computational Intelligence - Volume 03Pages 77–80https://doi.org/10.1109/AICI.2009.116Automatic indexing is the foundation and core technology of automatic documents processing. Currently most of the documents don’t have Keywords, and manual indexing consumes too much time and laborious, it is also highly subjective. This paper discusses ...
- ArticleNovember 2009
A Novel Network Intrusion Detection Algorithm Based on Density Estimation
AICI '09: Proceedings of the 2009 International Conference on Artificial Intelligence and Computational Intelligence - Volume 03Pages 203–207https://doi.org/10.1109/AICI.2009.450Data mining techniques have been successfully applied in intrusion detection because they can detect both misuse and anomaly. One of the unsupervised ways to define anomalies is by saying that anomalies are not concentrated, which depend on the density ...
- ArticleNovember 2009
Competitive Coevolutionary Genetic Algorithms for Multiobjective Optimization Problems
AICI '09: Proceedings of the 2009 International Conference on Artificial Intelligence and Computational Intelligence - Volume 03Pages 594–597https://doi.org/10.1109/AICI.2009.405Enlightened by the knowledge of ecological environment and population competition, we proposed a Competitive Coevolutionary Genetic Algorithm (CCGA) based on ecological population competition mode for multiobjective optimization problems. In the ...
- ArticleNovember 2009
Research on Pressurizer Water Level Control of Nuclear Reactor Based on CMAC and PID Controller
AICI '09: Proceedings of the 2009 International Conference on Artificial Intelligence and Computational Intelligence - Volume 03Pages 8–11https://doi.org/10.1109/AICI.2009.209A traditional PID regulator is usually used to control water level of pressurizer in modern reactors. For such a non-linear and complex time-varying control system, PID regulator is often shown by the large amount of overshoot and long setting time ...
- ArticleNovember 2009
Optimization of Sheet Flanging Forming Based on Kriging Metamodel
AICI '09: Proceedings of the 2009 International Conference on Artificial Intelligence and Computational Intelligence - Volume 03Pages 282–286https://doi.org/10.1109/AICI.2009.197Metamodels based on responses from designed (numerical) experiments may form efficient approximations to functions in engineering analysis. They can improve the efficiency of Engineering Optimization substantially by uncoupling computationally expensive ...