T. Lin

ORCID: 0009-0000-7432-0718
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Particle physics theoretical and experimental studies
  • Quantum Chromodynamics and Particle Interactions
  • High-Energy Particle Collisions Research
  • Rough Sets and Fuzzy Logic
  • Data Mining Algorithms and Applications
  • Data Management and Algorithms
  • Fuzzy Logic and Control Systems
  • Advanced Algebra and Logic
  • Dark Matter and Cosmic Phenomena
  • Multi-Criteria Decision Making
  • Black Holes and Theoretical Physics
  • Neutrino Physics Research
  • Semantic Web and Ontologies
  • Access Control and Trust
  • Logic, Reasoning, and Knowledge
  • Security and Verification in Computing
  • Imbalanced Data Classification Techniques
  • Network Security and Intrusion Detection
  • Mobile Agent-Based Network Management
  • Advanced Malware Detection Techniques
  • Nuclear physics research studies
  • Topic Modeling
  • Neural Networks and Applications
  • Image Retrieval and Classification Techniques
  • Scientific Research and Discoveries

Institute of High Energy Physics
2020-2025

Ningbo Putian Information Industry (China)
2025

Guangdong University of Technology
2023-2024

Beijing University of Posts and Telecommunications
2024

Henan University
2023

Inner Mongolia University
2023

Istituto Nazionale di Fisica Nucleare, Sezione di Ferrara
2023

Tsinghua University
2020

Peking University
2020

State Key Laboratory of Nuclear Physics and Technology
2020

ABSTRACTThe theory of rough sets is an extension set with two additional unary set-theoretic operators defined based on a binary relation the universe. These are related to modal in logics. By exploring relationship between and logics, this paper proposes examines number extended models. properties satisfied by relation, such as serial, reflexive, symmetric, transitive, Euclidean, various classes algebraic models can be derived. They correspond different logic systems. With respect graded...

10.1080/10798587.1996.10750660 article EN Intelligent Automation & Soft Computing 1996-01-01

In Brewer and Nash's Chinese Wall security policy model, there is a very strong implicit assumption that the 'conflict of interest' an equivalence relation. It called BN-axiom. Such axiom valid only for some special circumstances. By modifying their formulation, modified Nash model without BN-axiom defined. turns out to be rather 'conservative' in sense Walls are built within territory; it not really model. Next, new formal introduced which right on boundary China-an aggressive policy.< <ETX...

10.1109/csac.1989.81064 article EN 2003-01-07

ABSTRACT The optimization of diverse industrial edge computing tasks presents a significant challenge due to the dynamic and heterogeneous nature operational demands. While deep reinforcement learning (DRL) has shown promise, task‐specific DRL models are often required in complex networks, such as real‐time anomaly detection latency‐sensitive decision‐making, increasing computational overhead. This leads large overheads, unstable performance, increased energy consumption. Such cost become...

10.1002/itl2.70016 article EN Internet Technology Letters 2025-03-20

Abstract The prediction of degradation and remaining useful life (RUL) for mechanical equipment has received widespread attention. Due to the large number components varying operating conditions, it is difffcult extract features. This paper proposes a generalized enhanced spatiotemporal global (ESTG) competitive network predicting life. model mainly includes spatial competition (SC) module, temporal (TC) (GC) module. SC module focuses on feature mining multi-source data, which can...

10.1088/1361-6501/add48c article EN Measurement Science and Technology 2025-05-06

The notion of granular computing is examined. Obvious examples, such as fuzzy numbers, infinitesimal number and access control model, (pre-) topological spaces are A general models proposed; localized multi-level granulation can be modeled by generalized spaces, called neighborhood systems. For most Tarski type relational structures.

10.1109/grc.2005.1547232 article EN 2005-01-01

Mining association rules from databases is a time-consuming process. Finding the large item set fast crucial step in rule algorithm. In this paper we present algorithm (Bit-AssoRule) based on granular computing. Our Bit-AssocRule doesn't follow generation-and-test strategy of Apriori and adopts divide-and-conquer strategy, thus avoids table scan to rind prune itemsets, all operations finding itemsets datasets are bit its corresponding granular. The experimental result our with Apriori,...

10.1109/fuzz.2003.1209445 article EN 2004-06-03

10.1016/j.ijar.2004.11.010 article EN International Journal of Approximate Reasoning 2005-01-07

The notion of fuzzy is context dependent, so for each very often there a theory. Present papers use the neighborhood systems to unify them. A system an association that assigns datum list data (a neighborhood). Rough sets and topological spaces are special cases. "real world" set should allow small amount perturbation, it have elastic membership function. Mathematically, such function can be expressed by highly structured subset space. Structured singletons, equivalence classes,...

10.1109/fuzzy.1996.552338 article EN Proceedings of IEEE 5th International Fuzzy Systems 2002-12-24

In logic, a "real world" is modeled by Cantor set with relational structure. this paper, the structure confined to simplest kind, namely, binary relations. From different consideration, in granular computing, such has been called crisp/fuzzy granulation, or neighborhood system (FBNS). Intuitively, granulated into neighborhoods (generalized equivalence classes). Combining two views, kind of model BNS-space. view, classical theory knowledge representation universe whose finite relations;...

10.1109/nafips.2001.943713 article EN 2002-11-13

Deep graph prompt tuning (DeepGPT), which only tunes a set of continuous prompts for transformers, significantly decreases the storage usage during training. However, DeepGPT is limited by its uniform to input graphs with various structures. This because different structures dictate feature interactions between nodes, while are not dynamic tailor transformation topology. In this paper, we propose <u>T</u>opo-specific <u>G</u>raph <u>P</u>rompt <u>T</u>uning (TGPT ), provides topo-specific...

10.1145/3637528.3671804 article EN Proceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining 2024-08-24

It is well known that the Kripke model for modal logic system S5 can be interpreted as an approximation space in rough set theory. In this paper, we generalize interpretation to relational granulation. We consider two multimodal logics reasoning about granulation open world and closed environments respectively. environment, objects are granulated into same equivalence class only if they have relationship with other objects, while a environment; objects. Such relations represented by derived...

10.1109/grc.2005.1547348 article EN 2005-01-01

In 1989, Brewer and Nash presented a Chinese Wall Security Policy model (CWSP); the exited whole conference. The intuition is to place on boundary of conflict interests classes so that information flow among competing companies cannot occur. Unfortunately, later in same year we pointed out their erroneous assumption relation (CIR) an equivalence relation; aggressive (ACWSP) was based analysis CIR as binary relation. Based our relative recent observation each induces relation, show ACWSP can...

10.1109/cmpsac.2002.1045131 article EN 2003-06-25

Rough Set theory assumes the underlying structure of knowledge is a partition; each equivalence class represents piece basic knowledge. In this paper, we covering From which theories learning, approximations and reduction are developed.

10.1109/nafips.2008.4531346 article EN 2008-05-01

Rough support vector machines (RSVMs) supplement conventional (SVMs) by providing a better representation of the boundary region. Increasing interest has been paid to theoretical development RSVMs, which already lead modification existing SVM implementations as RSVMs. This paper shows how extend use precision and recall from implementation RSVM implementation. Our approach is demonstrated in practice with help Gist, popular

10.1109/grc.2007.77 article EN 2007 IEEE International Conference on Granular Computing (GRC 2007) 2007-11-01

The aim of this paper is to design an efficient and fast immune evolution algorithm for solving path planning pro- gram soccer robot. idea accurately read the inherent drawbacks existing algorithms (IA) propose new techniques resolve them. basic features IA dealt in are: hypermutation mechanism, clone expansion, memory several other fea- tures related initialization selection candidate so- lution present a population set. Dealing with above- mentioned we have proposed improved (IEA)....

10.1109/grc.2007.147 article EN 2007 IEEE International Conference on Granular Computing (GRC 2007) 2007-11-01

10.1016/s0020-0255(97)00071-6 article EN Information Sciences 1998-01-01

Fuzzy set theory on a universe of granules (crisp sets) are considered. In this setting, the grade membership can be interpreted in most elementary fashion. A 1/2 means exactly one half granule (in suitable measure) belongs to fuzzy set. Based such views, theoretical operations very naturally induced from classical operations; they called R-operations. Some traditional operations, as max and min, R-operations specific classes sets. The granular view sets provides new healthy insight into how...

10.1109/fuzzy.1998.687590 article EN 2002-11-27
Coming Soon ...