Anomaly detectors have become a necessary component of the computer and information security framework. Some of the numerous drawbacks experienced by the current Anomaly detectors...
The application of pattern recognition (PR) techniques, artificial neural networks (ANNs), and nowadays hybrid artificial intelligence (AI) techniques in manufacturing can be regar...
Tree mining consists in discovering the frequent subtrees from a forest of trees. This problem has many application areas. For instance, a huge volume of data available from the In...
This paper introduces a neural network architecture based on rough sets and rough membership functions. The neurons of such networks instantiate approximate reasoning in assessing ...
James F. Peters, Andrzej Skowron, Liting Han, Shee...
One of the major problems in the implementation of the precautionary principle in environmental cases is the estimation of the weight of evidence. In this paper we propose a forma...