References
[1]. L. Lima, B. Bedregal, H. Bustince, E. Barrenechea, and
M. Rocha, (2016). “An Interval Extension of Homogeneous
and Pseudo-Homogeneous T-Norms and T-Conorms”.
Information Sciences, Vol.355, pp.328-347.
[2]. L. Zhang, W. Xie, and W.D. Johnson, (2015).
“Performance of Interval Estimators for the Inverse
Hypergeometric Distribution”. Communications in
Statistics-Simulation and Computation, Vol.44, No.5,
pp.1300-1310.
[3]. H.Y. Zhang, Y. Leung, and L. Zhou, (2013). “Variableprecision-
dominance-based Rough Set Approach to
Interval-valued Information Systems”. Information
Sciences, Vol.244, pp.75-91.
[4]. M. Ghiyasvand, (2011). “A New Approach for Solving
the Minimum Cost Flow Problem with Interval and Fuzzy
Data”. International Journal of Uncertainty Fuzziness and
Knowledge-based Systems, Vol.19, No.1, pp.71-88.
[5]. Y.F. Yin, G.H. Gong, and L. Han, (2012). “A Framework for Interval-valued Information System”. International
Journal of Systems Science, Vol.43, No.9, pp.1603-1622.
[6]. A. Andrade, M. Costa, and L. Paolucci, (2015). “A New
Training Algorithm using Artificial Neural Networks to
Classify Gender-Specific Dynamic Gait Patterns”.
Computer Methods in Biomechanics and Biomedical
Engineering, Vol.18, No.4, pp.382-390.
[7]. Z.H. You, J.Z. Yu, and L. Zhu, (2014). “A MapReduce
Based Parallel SVM for Large-Scale Predicting Protein-
Protein Interactions”. Neurocomputing, Vol. 145, pp. 37-43.
[8]. D.F. Duncan, H.C. Kum, E.C. Weigensberg, F.A. Flair,
and C.J. Stewart, (2008). “Informing Child Welfare Policy
and Practice using Knowledge Discovery and Data
Mining Technology via a Dynamic website”. Child
Maltreatment, Vol.13, No.4, pp.383-391.
[9]. Y. Cui, and V.K.N. Lau, (2011). “Convergence-Optimal
Quantizer Design of Distributed Contraction-Based Iterative
Algorithms with Quantized Message Passing”. IEEE Transactions
on Signal Processing, Vol.58, No.10, pp.5196-5205.
[10]. A.M. Kibriya, and J. Ramon, (2013). “Nearly Exact
Mining of Frequent Trees in Large Networks”. Data Mining
and Knowledge Discovery, Vol.27, No.3, pp.478-504.
[11]. Y.F. Yin, G.H. Gong, and L. Han, (2011). “Theory and
Techniques of Data Mining in CGF Behavior Modeling”.
Science China Information Sciences, Vol.54, No.4,
pp.717- 731.
[12]. Y.F. Yin, G.H. Gong, and L. Han, (2013). “A Weighted
Dynamic Information Systems Reduction Method”.
Intelligent Automation & Soft Computing, Vol. 20, No. 1,
pp. 101-114. DOI: 10.1080/10798587.2013.828907.
[13]. Y.F. Yin, G.H. Gong, and L. Han, (2011). “Experimental
Study on Fighters Behaviors Mining”. Expert Systems with
Applications, Vol.38, No.5, pp.5737-5747.
[14]. Y.F. Yin, and H.C Guan, (2013). “Dynamic Software
Testing and Evaluation With State Space Method”. Journal
of Testing and Evaluation, Vol.41, No.3, pp.403-408.
[15]. S. Parkinson, V. Somaraki, R. Ward, (2016). “Auditing
File System Permissions Using Association Rule Mining”.
Expert Systems with Applications, Vol.55, pp.274-283.