International Journal of Computational Intelligence Systems
1410 articles
Research Article
A novel multi-objective particle swarm optimization with -means based global best selection strategy
Chenye Qiu, Chunlu Wang, Xingquan Zuo
Pages: 822 - 835
In this paper, a multi-objective particle swarm optimization algorithm with a new global best () selection strategy is proposed for dealing with multi-objective problems. In multi-objective particle swarm optimization, plays an important role in convergence and diversity of solutions. A -means algorithm...
Research Article
Supply chain downstream strategic cost evaluation using L-COPRAS method in cross-border E-commerce
Lipeng Feng, Jun Ma, Yong Wang, Jie Yang
Pages: 815 - 823
Cross-border E-commerce has grown exponentially in the past decade in global market. To gain global competition in product-convergent markets, China’s over 200 thousands cross-border E-commerce businesses have focused more on the service and cost control of supply chain downstream. In this study, we...
Research Article
A Forward-secure Grouping-proof Protocol for Multiple RFID Tags
Liu Ya-li, Qin Xiao-lin, Li Bo-han, Liu Liang
Pages: 824 - 833
Designing secure and robust grouping-proof protocols based on RFID characteristics becomes a hotspot in the research of security in Internet of Things (IOT). The proposed grouping-proof protocols recently have security and/or privacy omission and these schemes afford order-dependence by relaying message...
Research Article
Automatic Design of Robust Optimal Controller for Interval Plants Using Genetic Programming and Kharitonov Theorem
Peng Chen, Yong-Zai Lu
Pages: 826 - 836
This paper presents a novel approach to automatic design of a robust optimal controller for interval plants with Genetic Programming based on Kharitonov Theorem (KT), which provides a theoretical foundation in the design of robust controller for interval plants. The structure and parameters of the robust...
Editorial
Mathematics and Computational Intelligence Synergies for Emerging Challenges
Jesús Medina, Juan Moreno-García, Eloísa Ramírez-Poussa, László T. Kóczy
Pages: 818 - 820
Research Article
A Self-Adaptive Heuristic Algorithm for Combinatorial Optimization Problems
Cigdem Alabas-Uslu, Berna Dengiz
Pages: 827 - 852
This paper introduces a new self-tuning mechanism to the local search heuristic for solving of combinatorial optimization problems. Parameter tuning of heuristics makes them difficult to apply, as parameter tuning itself is an optimization problem. For this purpose, a modified local search algorithm...
Research Article
The validity degree vectors of formulae in two-valued predicate logic
Xiaoyan Qin, Yang Xu, Yi Liu
Pages: 829 - 840
By means of infinite product of uniformly distributed probability spaces of cardinal , the concept of -validity degrees and validity degree vectors of formulae in two-valued predicate logic are introduced. It is proved that the validity degree vectors of formulae can preserve the logical relation between...
Research Article
Forecasting Teleconsultation Demand with an Ensemble Attention-Based Bidirectional Long Short-Term Memory Model
Wenjia Chen, Lean Yu, Jinlin Li
Pages: 821 - 833
Accurate demand forecast can help improve teleconsultation efficiency. But teleconsultation demand forecast has not been reported in existing literature. For this purpose, the study proposes a novel model based on deep learning algorithm for daily teleconsultation demand forecast to fill in the research...
Research Article
A Stacked Autoencoder-Based miRNA Regulatory Module Detection Framework
Yi Yang, Yan Song
Pages: 822 - 832
MicroRNA regulatory module (MRM) plays an important role in the study of microRNA synergism. To detect MRMs, researchers have developed a number of related methods in the preceding decades. However, some existing methods are stochastic or specific to a certain situation. In this paper, we presented a...
Research Article
Group Decision-Making Using Complex q-Rung Orthopair Fuzzy Bonferroni Mean
Peide Liu, Zeeshan Ali, Tahir Mahmood, Nasruddin Hassan
Pages: 822 - 851
Complex q-rung orthopair fuzzy set (CQROFS), as a modified notion of complex fuzzy set (CFS), is an important tool to cope with awkward and complicated information. CQROFS contains two functions which are called truth grade and falsity grade by the form of complex numbers belonging to unit disc in a...
Research Article
Comprehensive Learning Particle Swarm Optimizer for Constrained Mixed-Variable Optimization Problems
Lei Gao, Atekelty Hailu
Pages: 832 - 842
This paper presents an improved particle swarm optimizer (PSO) for solving multimodal optimization problems with problem-specific constraints and mixed variables. The standard PSO is extended by employing a comprehensive learning strategy, different particle updating approaches, and a feasibility-based...
Research Article
A Logical Deduction Based Clause Learning Algorithm for Boolean Satisfiability Problems
Qingshan Chen, Yang Xu, Jun Liu, Xingxing He
Pages: 824 - 834
Clause learning is the key component of modern SAT solvers, while conflict analysis based on the implication graph is the mainstream technology to generate the learnt clauses. Whenever a clause in the clause database is falsified by the current variable assignments, the SAT solver will try to analyze...
Research Article
Synchronization of Time-Delay Chaotic System in Presence of Noise
Min Lei, Hai-peng Peng, Chun-yu Yang, Li-xiang Li
Pages: 834 - 840
Chaotic synchronization, as a key technique of chaotic secure communication, has received much attention in recent years. This paper proposes a nonlinear synchronization scheme for the time-delay chaotic system in the presence of noise. In this scheme, an integrator is introduced to suppress the influence...
Research Article
Artificial Neural Network Based Droop-Control Technique for Accurate Power Sharing in an Islanded Microgrid
T. Vigneysh, N. Kumarappan
Pages: 827 - 838
In an islanded microgrid, while considering the complex nature of line impedance, the generalized droop control fails to share the actual real/reactive power between the distributed generation (DG) units. To overcome this power sharing issue, in this paper a new approach based on feed forward neural...
Research Article
New LMI-based Criteria for Lagrange Stability of Cohen-Grossberg Neural Networks with General Activation Functions and Mixed Delays
Xiaohong Wang, Huan Qi
Pages: 836 - 848
In this paper, the problem on Lagrange stability of Cohen-Grossberg neural networks (CGNNs) with both mixed delays and general activation functions is considered. By virtue of Lyapunov functional and Halanay delay differential inequality, several new criteria in linear matrix inequalities (LMIs) form...
Research Article
Integrating Strategic and Tactical Decisions to Robust Designing of Cellular Manufacturing under Uncertainty: Fixed Suppliers in Supply Chain
V.R Ghezavati, S.J. Sadjadi, M. Dehghan Nayeri
Pages: 837 - 854
Cellular manufacturing (CM) has been identified as an innovative practice for manufacturer to achieve efficiency as well as flexibility under an uncertain environment. This study addresses a new mathematical robust model for a cellular manufacturing problem integrated with tactical aspects under supply...
Research Article
A New Approach for Condition Monitoring and Detection of Rail Components and Rail Track in Railway*
Mehmet Karakose, Orhan Yamanand, Kagan Murat, Erhan Akin
Pages: 830 - 845
Computer vision-based tracking and fault detection methods are increasingly growing method for use on railway systems. These methods make detection of components of the railways and fault detection and condition monitoring process can be performed using data obtained by means of computers. In this study,...
Research Article
Statistical Mechanisms for Detecting Malicious Behaviors in Resource Allocation from Non-cooperative P2P Environments
Hai-yang Hu, Zhong-jin Li, Li-guo Huang, Hua Hu
Pages: 841 - 850
A Peer-to-Peer (P2P) system relies on the cooperation of the peers and the contributions of their resources. To motivate autonomous peers share their resources, the system needs to support effective resource allocation strategies with respect to peers’ task priorities, and their personal information...
Research Article
Analysis of Intelligent Classifiers and Enhancing the Detection Accuracy for Intrusion Detection System
Mohanad Albayati, Biju Issac
Pages: 841 - 853
In this paper we discuss and analyze some of the intelligent classifiers which allows for automatic detection and classification of networks attacks for any intrusion detection system. We will proceed initially with their analysis using the WEKA software to work with the classifiers on a well-known IDS...
Research Article
An Algorithmic Approach for Computing Unions and Intersections Between Fuzzy Multisets
Ángel Riesgo, Pedro Alonso, Irene Díaz, Susana Montes
Pages: 833 - 841
Fuzzy multisets represent a particularly challenging generalization of the concept of fuzzy sets. The membership degrees of fuzzy multisets are given by multisets in 0,1 rather than single values. Mathematically, they can be also seen as a generalization of the hesitant fuzzy sets. But in this general...
Research Article
Constructing Ontology of Brain Areas and Autism to Support Domain Knowledge Exploration and Discovery
Liang Hong, Haoshuai Xu, Xiaoyue Shi
Pages: 834 - 846
Medical studies have confirmed the causal relationship between autism and brain areas. Such relationship can effectively promote the early diagnosis and timely intervention of autism. However, existing experiment-driven methods discovering such relationships are costly while machine-learning-based methods...
Research Article
Tunnel Surrounding Rock Displacement Prediction Using Support Vector Machine
Jian Sun, Bao-Zhen Yao, Cheng-Yong Yang, Jin-Bao Yao
Pages: 843 - 852
Multi-step-ahead prediction of tunnel surrounding rock displacement is an effective way to ensure the safe and economical construction of tunnels. This paper presents a multi-step-ahead prediction model, which is based on support vector machine (SVM), for tunnel surrounding rock displacement prediction....
Research Article
Internet and Fuzzy Based Control System for Rotary Kiln in Cement Manufacturing Plant
Hanane Zermane, Hayet Mouss
Pages: 835 - 850
This paper develops an Internet-based fuzzy control system for an industrial process plant to ensure the remote and fuzzy control in cement factories in Algeria. The remote process consists of control, diagnosing alarms occurs, maintaining and synchronizing different regulation loops. Fuzzy control of...
Research Article
Dynamic deep learning algorithm based on incremental compensation for fault diagnosis model
Jing Liu, Yacheng An, Runliang Dou, Haipeng Ji
Pages: 846 - 860
As one of research and practice hotspots in the field of intelligent manufacturing, the machine learning approach is applied to diagnose and predict equipment fault for running state data. Despite deep learning approach overcomes the problem that the traditional machine learning approaches for fault...
Research Article
Multi-objective Transportation Problem with Cost Reliability Under Uncertain Environment
Gurupada Maity, Sankar Kumar Roy, José Luis Verdegay
Pages: 839 - 849
This paper analyzes the study of a Multi-Objective Transportation Problem (MOTP) under uncertain environment. Assuming the uncertainty in real-life decision making problems, the concept of reliability is incorporated in the transportation cost and the effectiveness is justified through the proposed MOTP....
Research Article
Gravitational Co-evolution and Opposition-based Optimization Algorithm
Yang Lou, Junli Li, Yuhui Shi, Linpeng Jin
Pages: 849 - 861
In this paper, a Gravitational Co-evolution and Opposition-based Optimization (GCOO) algorithm is proposed for solving unconstrained optimization problems. Firstly, under the framework of gravitation based co-evolution, individuals of the population are divided into two subpopulations according to their...
Research Article
A Novel Approach to Fuzzy Cognitive Map Based on Hesitant Fuzzy Sets for Modeling Risk Impact on Electric Power System
Xiaodi Liu, Zengwen Wang, Shitao Zhang, Jiashu Liu
Pages: 842 - 854
Electric power industry has been undergoing enormous transformations. Therefore, it is necessary to improve the security of electric power system and the decision capacity in the emergency process. As a complicated system, electric power system is affected by many factors, the reasoning of which can...
Research Article
A Credibility-based Congestion Control Scheme and its Performance Evaluation
Jin-xin Zhang, Man-gui Liang, Shu-juan Wang
Pages: 851 - 859
A congestion control scheme based on credibility is proposed. In this scheme, the whole network is divided into several independent domains, and each domain contains a congestion control server (CCS) and several control modules (CM). The CCS is used to collect credit information and make punishment decisions...
Research Article
A Combination Prediction Model of Stock Composite Index Based on Artificial Intelligent Methods and Multi-Agent Simulation
Yongli Li, Chong Wu, Jiaming Liu, Peng Luo
Pages: 853 - 864
Predicting stock composite index is useful, which can raise the interest of both the investors and the corresponding researchers. This paper presented a new combination prediction model based on the technique of artificial intelligence and the principle of combination forecast. The principle of combination...
Research Article
A hybrid algorithm to minimize makespan for the permutation flow shop scheduling problem
Fardin Ahmadizar, Farnaz Barzinpour
Pages: 853 - 861
This paper deals with the permutation flow shop scheduling problem. The objective is to minimize the maximum completion time, or makespan. To solve this problem which has been proved to be strongly NP-hard, a combination between an ant colony algorithm, a heuristic algorithm and a local search procedure...
Research Article
Cloud Computing Data Center Adoption Factors Validity By Fuzzy AHP
Nasrin Badie, Ab Razak Che Hussin, Arash Habibi Lashkari
Pages: 854 - 873
Most sectors of the economy like the universities, high-tech, financial services, and government institutions have data center. However, there are some issues which encompass current data center such as physical location, energy consumption, performance, flexibility. Big organizations like Google, IBM...
Research Article
H-infinite State Estimation for Takagi-Sugeno Fuzzy Delayed Hopfield Neural Networks
Choon Ki Ahn
Pages: 855 - 862
This paper presents a H-infinite state estimator for Takagi-Sugeno fuzzy delayed Hopfield neural networks. Based on Lyapunov-Krasovskii stability approach, a delay-dependent criterion is proposed to ensure that the resulting estimation error system is asymptotically stable with a guaranteed H performance....
Research Article
Analyzing Online Shopping Behaviors via a new Data-Driven Hesitant Fuzzy Approach
M. Çağrı Budak, Sezi Cevik Onar
Pages: 847 - 858
Understanding online shopping behaviors is crucial for the survival of many firms. Modeling the customers' online shopping behaviors is a complex problem that involves uncertainty, hesitancy, and imprecision since different generations have different attitudes toward e-commerce. In this study, a...
Research Article
A Machine Vision System for Detecting Fertile Eggs in the Incubation Industry
Mahdi Hashemzadeh, Nacer Farajzadeh
Pages: 850 - 862
One of the important factors in increasing the productivity of the incubation industry is to be sure that the eggs placed in the incubators are fertile. In this research, a fertility detection machine vision system is developed and evaluated. To this end, a mechatronic machine is fabricated for acquiring...
Research Article
Analyses of S-boxes based on interval valued intuitionistic fuzzy sets and image encryption
Saleem Abdullah, Sanam Ayub, Iqtadar Hussain, Benjamin Bedregal, Muhammad Yaqub Khan
Pages: 851 - 865
Decision making implies selection of the best decision from a set of possible options. In some cases, this selection is based on past experience. Past experience is used to analyse the situations and the choice made in these situations. The aim of this work is to analyse the strength of the nonlinear...
Research Article
Safety and Availability Checking for User Authorization Queries in RBAC
Jian-feng Lu, Jian-min Han, Wei Chen, Jin-Wei Hu
Pages: 860 - 867
This paper introduces the notion of safety and availability checking for user authorization query processing, and develop a recursive algorithm use the ideas from backtracking-based search techniques to search for the optimal solution. For the availability checking, we introduce the notion of max activatable...
Research Article
An Intelligent and Automated Approach for Smart Minimarkets
Talal A. Edwan, Ashraf Tahat, Sara Hammouri, Leen Hashem, Leen Da'boul
Pages: 852 - 863
This paper presents the design and implementation of a smart and safe minimarket prototype for deployment in busy smart cities to mitigate the overhead of shopping experience. The prototype allows customers to remotely access and browse the available products at the minimarket using a special smart-phone...
Research Article
Particle Swarm Optimizer with Aging Operator for Multimodal Function Optimization
Bo Jiang, Ning Wang, Xiaodong Li
Pages: 862 - 880
This paper proposes a new scheme for preventing a Particle Swarm Optimizer from premature convergence on multimodal optimization problems. Instead of only using fitness evaluation, we use a new index called particle age to guide population towards more promising region of the search space. The particle...
Research Article
A Convergent Solution to Matrix Bidirectional Projection Based Feature Extraction with Application to Face Recognition
Yubin Zhan, Jianping Yin, Xinwang Liu
Pages: 863 - 873
Recently, many feature extraction methods, which are based on the matrix representation of image and matrix bidirectional projection technique, are proposed. However, these methods in solving the two projection matrices will suffer from non-optimized or non-convergent solution. To overcome this problem,...
Research Article
Matrix-Based Approaches for Updating Approximations in Multigranulation Rough Set While Adding and Deleting Attributes
Peiqiu Yu, Jinjin Li, Hongkun Wang, Guoping Lin
Pages: 855 - 872
With advanced technology in medicine and biology, data sets containing information could be huge and complex that sometimes are difficult to handle. Dynamic computing is an efficient approach to solve some problems. Since multigranulation rough sets were proposed, many algorithms have been designed for...
Research Article
A Robust Blind Audio Watermarking Scheme Based on Singular Value Decomposition and Neural Networks
Yu Yang, Min Lei, Huaqun Liu, Yongmei Cai, Guoyuan Lin
Pages: 865 - 873
The paper proposes a novel blind audio watermarking scheme based on singular value decomposition (SVD) and neural networks (NN), which makes use of memorization and adaptation capabilities of NN. Experimental results show that the proposed watermarking algorithm is strongly robust against several kinds...
Research Article
Statistical and Machine Learning Approaches for Clinical Decision on Drug Usage in Diabetes with Reference to Competence and Safeness
S. Appavu Alias Balamurugan, K. R. Saranya, S. Sasikala, G. Chinthana
Pages: 859 - 868
Diabetes is a chronic disease that requires patient-centered treatment. The physician strategy for treatment of diabetes varies from one patient to another. Using the clinical parameters and the evidence of diabetes at various group of people are to be treated with the drugs that provide significant...
Research Article
Locator/Identifier Separation: Comparison and Analysis on the Mitigation of Worm Propagation
Ming Wan, Ying Liu, Jian-qiang Tang, Hong-ke Zhang, Si-yu Lin
Pages: 868 - 877
As a basic prerequisite for worm detection based on computational intelligence in networks with locator/identifier separation, it is well worth considering the influence on worm propagation due to the incoming locator/identifier separation. In this paper, according to the characteristics of locator/identifier...
Research Article
A Novel Two-step Feature Selection based Cost Sensitive Myocardial Infarction Prediction Model
Hodjat Hamidi, Atefeh Daraei
Pages: 861 - 872
Considering the rapid growth, complications and treatment side-effects of MI, so using data mining techniques seems necessary. On the other hand, in real-world MI cases are much less compared to healthy cases. The traditional algorithms for imbalanced problems lead to very low Sensitivity, thus, we propose...
Research Article
A two-stage hybrid classification technique for network intrusion detection system
Jamal Hussain, Samuel Lalmuanawma, Lalrinfela Chhakchhuak
Pages: 863 - 875
Conventional Network intrusion detection system (NIDS) mostly uses individual classification techniques, such system fails to provide the best possible attack detection rate. In this paper, we propose a new two-stage hybrid classification method using Support Vector Machine (SVM) as anomaly detection...
Research Article
An Integer Cat Swarm Optimization Approach for Energy and Throughput Efficient MPSoC Design
Shahid Ali Murtza, Ayaz Ahmad, Muhammad Yasir Qadri, Nadia N. Qadri, Majed Alhaisoni, Sajid Baloch
Pages: 864 - 874
Modern multicore architectures have an ability to allocate optimum system resources for a specific application to have improved energy and throughput balance. The system resources can be optimized automatically by using optimization algorithms. State-of-the-art using optimization algorithm in the field...
Research Article
Stereo Matching Based Stereo Image Watermarking for Tamper Detection and Recovery
Ting Luo, Gangyi Jiang, Mei Yu, Feng Shao, Zongju Peng, Yo-Sung Ho
Pages: 874 - 881
Digital watermarking is an effective way for authentication of stereo images when they are transmitted over networks. Since the left and right images of a stereo image pair are not independent but similar to each other, their watermarking design should be different from that of mono-images. This paper...
Research Article
Combining RMT-based filtering with time-stamped resampling for robust portfolio optimization
David Quintana, Sandra García-Rodríguez, Silvano Cincotti, Pedro Isasi
Pages: 874 - 885
Finding the optimal weights for a set of ï¬nancial assets is a difï¬cult task. The mix of real world constrains and the uncertainty derived from the fact that process is based on estimates for parameters that likely to be inaccurate, often result in poor results. This paper suggests that a combination...
Research Article
Automatic registration of remote sensing images based on SIFT and fuzzy block matching for change detection
Cai Guo-Rong, Li Shao-Zi, Wu Yun-Dong, Chen Shui-Li, Su Song-Zhi
Pages: 874 - 885
This paper presents an automated image registration approach to detecting changes in multi-temporal remote sensing images. The proposed algorithm is based on the scale invariant feature transform (SIFT) and has two phases. The first phase focuses on SIFT feature extraction and on estimation of image...
Research Article
A Hybrid Heuristic Approach to Provider Selection and Task Allocation Problem in Telecommunications with Varying QoS Levels
Nihat Kasap, Berna Tektaş Sivrikaya, Hasan Hüseyin Turan, Dursun Delen
Pages: 866 - 881
In this research, we study a cost minimization problem for a firm that acquires capacity from providers to accomplish daily operations on telecommunication networks. We model the related optimization problem considering quality of service and capacity requirements and offer a solution approach based...
Research Article
Fuzzy Load Forecast with Optimized Parametric Adjustment Using Jaya Optimization Algorithm
Ho Pham Huy Anh
Pages: 875 - 892
This paper proposes an advanced fuzzy load forecast method optimized by modified Jaya optimization (MJO) algorithm. MATLAB® platform is used to implement the proposed hybrid Fuzzy-MJO load forecasting algorithm and to verify the outperforming features of a Jaya technique over a fuzzy load forecast model....
Research Article
Similarity Measures and Multi-person TOPSIS Method Using m-polar Single-Valued Neutrosophic Sets
Juanyong Wu, Ahmed Mostafa Khalil, Nasruddin Hassan, Florentin Smarandache, A. A. Azzam, Hui Yang
Pages: 869 - 885
In this paper, we give a new notion of the m-polar single-valued neutrosophic sets (m-PSVNSs) which is a hybrid of the single-valued neutrosophic sets (SVNSs) and the m-polar fuzzy sets (m-PFSs) and study several of the structure operations including subset, equal, union, intersection, and complement....
Research Article
Watch-Nodes-Based Wormhole Attacks Detection in Wireless Mesh Networks
Liang-yu Luan, Ying-fang Fu, Peng Xiao, Ling-xi Peng
Pages: 878 - 886
Wormhole attacks, as a devastating type of threats in wireless mesh networks, have received much attention in recent years. This paper proposes a type of wormhole attack model and its corresponding detection scheme. In this scheme, the combination of a number of techniques, such as distributed voting,...
Research Article
A Combination Algorithm of Multiple Lattice-Valued Concept Lattices
Li Yang, Yuhui Wang, Yang Xu
Pages: 881 - 892
With the rapid development of network technology, especially in the internet area, distributed computation and parallel processing of data are urgently needed. This paper studies the combination operation of the lattice-valued concept lattices to realize its distributed computation and parallel processing....
Research Article
Compressed Sensing Image Reconstruction Based on Convolutional Neural Network
Yuhong Liu, Shuying Liu, Cuiran Li, Danfeng Yang
Pages: 873 - 880
Compressed sensing theory is widely used in image and video signal processing because of its low coding complexity, resource saving, and strong anti-interference ability. Although the compression sensing theory solves the problems brought by the traditional signal processing methods to a certain extent,...
Research Article
An Agile Mortality Prediction Model: Hybrid Logarithm Least-Squares Support Vector Regression with Cautious Random Particle Swarm Optimization
Chien-Lung Chan, Chia-Li Chen, Hsien-Wei Ting, Dinh-Van Phan
Pages: 873 - 881
Logarithm Least-Squares Support Vector Regression (LLS-SVR) has been applied in addressing forecasting problems in various fields, including bioinformatics, financial time series, electronics, plastic injection moulding, Chemistry and cost estimations. Cautious Random Particle Swarm Optimization (CRPSO)...
Research Article
An improvement method for selecting the best alternative in Decision Making
Bin Zhou, Zheng Pei, Xinzi Ma
Pages: 882 - 895
Multiple attributes group decision making problems aim to find the best alternative for the experts from a solution set of alternatives. Because the attribute value and decision-makers evaluation with respect to the alternatives are usually vague and imprecise, fuzzy multiple attributes group decision...
Research Article
Ontology Knowledge Mining for Ontology Alignment
Rihab Idoudi, Karim Saheb Ettabaa, Basel Solaiman, Kamel Hamrouni
Pages: 876 - 887
As the ontology alignment facilitates the knowledge exchange among the heterogeneous data sources, several methods have been introduced in literature. Nevertheless, few of them have been interested in decreasing the problem complexity and reducing the research space of correspondences between the input...
Research Article
Intelligent Transportation System with Diverse Semi-Autonomous Vehicles
Rahul Kala, Kevin Warwick
Pages: 886 - 899
It is becoming increasingly likely that in the future most vehicles will be semi-autonomous with communication capabilities and will possess diverse speed capabilities. The aim of this paper is to describe the creation of an integrated traffic simulation system for such settings. While behaviours such...
Research Article
Gene Silencing Genetic Algorithm for 0/1 Knapsack with Object Preferences
S. Siva Sathya, S. Kuppuswami, S. Sendhil Kumar
Pages: 886 - 893
Genetic Algorithms are efficient search and optimization techniques inspired by natural evolution. To show the difficulties in solving constrained optimization problems through GA, the 0/1 knapsack problem with user specific object preferences has been taken up. A new genetic operator, namely, ‘gene...
Research Article
A Secure Network Coding-based Data Gathering Model and Its Protocol in Wireless Sensor Networks
Qian Xiao, Kang-feng Zheng, Shou-shan Luo, Xu Cui
Pages: 887 - 895
To provide security for data gathering based on network coding in wireless sensor networks (WSNs), a secure network coding-based data gathering model is proposed, and a data-privacy preserving and pollution preventing (DPP&PP) protocol using network coding is designed. DPP&PP makes use of a new...
Research Article
Multi-Attribute Decision-Making Method Based on Prospect Theory in Heterogeneous Information Environment and Its Application in Typhoon Disaster Assessment
Ruipu Tan, Wende Zhang, Lehua Yang, Shengqun Chen
Pages: 881 - 896
Aiming at the decision-making problem in heterogeneous information environment and considering the influence of decision makers' psychological behavior on decision-making results, this paper proposes a multi-attribute decision-making method based on prospect theory in heterogeneous information environment....
Research Article
Fuzzy Logic Based Cross-Layer Design for Image Transmission in Wireless Sensor Networks
Moad Mowafi, Omar Banimelhem, Yosef Taher
Pages: 882 - 893
The evolution of wireless multimedia sensor networks (WMSN) has opened the door to a wide range of applications such as telemedicine, surveillance, and intrusion detection. However, the delivery of multimedia content over wireless sensor networks requires maintaining the quality of service demands of...
Research Article
Decision Support for Intelligent Energy Management in Buildings Using the Thermal Comfort Model
Vangelis Marinakis, Haris Doukas, Evangelos Spiliotis, Ilias Papastamatiou
Pages: 882 - 893
The main objective of this paper is to present a transparent Decision Support System (DSS) for the energy managers of buildings, which can assist them in setting indoor temperature set point, based on the feedback received by the occupants. Within the proposed DSS, the Thermal Comfort Validator (TCV)...
Research Article
Using Multivariate Adaptive Regression Splines in the Construction of Simulated Soccer Team's Behavior Models
Pedro Henriques Abreu, Daniel Castro Silva, João Mendes-Moreira, Luís Paulo Reis, Júlio Garganta
Pages: 893 - 910
In soccer, like in other collective sports, although players try to hide their strategy, it is always possible, with a careful analysis, to detect it and to construct a model that characterizes their behavior throughout the game phases. These findings are extremely relevant for a soccer coach, in order...
Research Article
A Fuzzy MCDM Approach to Evaluate Green Suppliers
Gizem Cifci, Gülcin Büyüközkan
Pages: 894 - 909
Nowadays the effect of industrial production on the environment brought out the importance of the green concept in supply chains. Particularly for supplier firms, greening is essential in a supply chain because with growing worldwide awareness of environmental protection, green production has become...
Research Article
Few-Shot Image Segmentation Based on Dual Comparison Module and Sequential k-Shot Integration
Chencong Xing, Shujing Lyu, Yue Lu
Pages: 886 - 895
Few-shot image segmentation intends to segment query images (test images) given only a few support samples with annotations. However, previous works ignore the impact of the object scales, especially in the support images. Meanwhile, current models only work on images with the similar size of the object...
Research Article
Single Byte Differential Fault Analysis on the LED Lightweight Cipher in the Wireless Sensor Network
Wei Li, Da-wu Gu, Xiao-ling Xia, Chen Zhao, Zhi-qiang Liu, Ya Liu, Qing-ju Wang
Pages: 896 - 904
The LED is a new lightweight cipher, which was published in CHES 2011. This cipher could be applied in the Wireless Sensor Network to provide security. On the basis of the single byte-oriented fault model, we propose a differential fault analysis on the LED cipher. The attack could recover its 64-bit...
Case Study
A QFD Approach for Cloud Computing Evaluation and Selection in KMS: A Case Study
Chin-Nung Liao, Hsing-Pei Kao
Pages: 896 - 908
Cloud computing services are a new information technology trend for business applications in knowledge management systems (KMS). The link between cloud computing services and KMS is a new concept, and methods for selecting multiple choice goals of cloud computing service provider have lacked a formal...
Research Article
Hybrid tracking model for multiple object videos using second derivative based visibility model and tangential weighted spatial tracking model
Felix M. Philip, Rajeswari Mukesh
Pages: 888 - 899
In the area of video surveillance, tracking model for multiple object video is still a challenging task since the objects are usually affected with inter-object occlusion, object confusion, different posing, environment with heavy clutter, small size of objects, similar appearance among objects, and...
Research Article
Application of Fractional Order ABC and GA for Neural Network Training and Clustering Process
G. Lavanya, S. Srinivasan
Pages: 900 - 913
Literature presents several search algorithms to find an item with specified properties from a search space defined by a mathematical formula or procedure. One of the widely accepted algorithms is optimization algorithm which can find the optimal element within a certain period of time if the search...
Research Article
An Improved Parameter Control Based on a Fuzzy System for Gravitational Search Algorithm
Yu Xianrui, Yu Xiaobing, Li Chenliang, Chen Hong
Pages: 893 - 903
Recently, a kind of heuristic optimization algorithm named gravitational search algorithm (GSA) has been rapidly developed. In GSA, there are two main parameters that control the search process, namely, the number of applied agents (Kbest) and the gravity constant (G). To balance exploration and exploitation,...
Research Article
Decision Support for Project Rescheduling to Reduce Software Development Delays based on Ant Colony Optimization
Wei Zhang, Yun Yang, Xiao Liu, Cheng Zhang, Xuejun Li, Rongbin Xu, Futian Wang, Muhammad Ali Babar
Pages: 894 - 910
Delays often occur during some activities in software development projects. Without handling of project delays effectively, many software development projects fail to meet their deadlines. If extra employees with same or similar skills and domain knowledge can be rescheduled for the remaining activities...
Research Article
Location, Allocation and Routing of Temporary Health Centers in Rural Areas in Crisis, Solved by Improved Harmony Search Algorithm
Mahdi Alinaghian, Alireza Goli
Pages: 894 - 913
In this paper, an uncertain integrated model for simultaneously locating temporary health centers in the affected areas, allocating affected areas to these centers, and routing to transport their required good is considered. Health centers can be settled in one of the affected areas or in a place out...
Research Article
Micro-Facial Expression Recognition Based on Deep-Rooted Learning Algorithm
S. D. Lalitha, K. K. Thyagharajan
Pages: 903 - 913
Facial expressions are important cues to observe human emotions. Facial expression recognition has attracted many researchers for years, but it is still a challenging topic since expression features vary greatly with the head poses, environments, and variations in the different persons involved. In this...
Research Article
Value-Based Reasoning in Autonomous Agents
Tomasz Zurek, Michail Mokkas
Pages: 896 - 921
The issue of decision-making of autonomous agents constitutes the current work topic for many researchers. In this paper we propose to extend the existing model of value-based teleological reasoning by a new, numerical manner of representation of the level of value promotion. The authors of the paper...
Research Article
A Complex Estimation Function based on Community Reputation for On-line Transaction Systems
Yu Yang, Shang-bao Gong, Yu-cui Guo, Min Lei, Yan Yang
Pages: 905 - 912
A reputation management system is crucial in online transaction systems, in which a reputation function is its central component. We propose a generalized set-theoretic reputation function in this paper, which can be configured to meet various assessment requirements of a wide range of reputation scenarios...
Research Article
Asphalt Pavement Roughness Prediction Based on Gray GM(1,1|sin) Model
Xiuli Zhang, Chunming Ji
Pages: 897 - 902
Roughness is a comprehensive assessment indicator of pavement performance. Prediction of pavement roughness exhibits great difficulties by using traditional methods such as mechanistic-empirical method and regression method. Considering the fact that the value of international roughness index (IRI) varies...
Research Article
Assessment of Driver Stress from Physiological Signals collected under Real-Time Semi-Urban Driving Scenarios
Rajiv Ranjan Singh, Sailesh Conjeti, Rahul Banerjee
Pages: 909 - 923
Designing a wearable driver assist system requires extraction of relevant features from physiological signals like galvanic skin response and photoplethysmogram collected from automotive drivers during real-time driving. In the discussed case, four stress-classes were identified using cascade forward...
Research Article
A New Approach to Extract Text from Images based on DWT and K-means Clustering
Deepika Ghai, Divya Gera, Neelu Jain
Pages: 900 - 916
Text present in image provides important information for automatic annotation, indexing and retrieval. Therefore, its extraction is a well known research area in computer vision. However, variations of text due to differences in orientation, alignment, font, size, low image contrast and complex background...
Research Article
An Adaptive Token Passing Algorithm Applicable to MS/TP Network
Ping Ren, Zude Zhou, Quan Liu
Pages: 910 - 920
In the MS/TP network, token is passed according to the address of master station. A novel token passing algorithm was proposed based on the characteristics of MS/TP network frame distribution and the requirements of real-time performance. The algorithm adopts distributed control method, which can adjust...
Research Article
Digital FIR Filter Design Using Hybrid Random Particle Swarm Optimization with Differential Evolution
Vasundhara, Durbadal Mandal, Sakti Prasad Ghoshal, Rajib Kar
Pages: 911 - 927
This paper presents a novel approach of designing linear phase FIR low pass and high pass filter using Random PSO in hybrid with DE known as Random PSODE (RPSODE). In this paper, the Random PSO is used which utilises the weighted particle to guide the search direction for both explorative and exploitative...
Editorial
Recent advances in the Intelligence technology and Security applications Guest edited by Dengpan Ye
Dengpan Ye
Pages: 913 - 913
Research Article
A Human-Machine Language Dictionary
Fei Liu, Shirin Akther Khanam, Yi-Ping Phoebe Chen
Pages: 904 - 913
In this paper, we propose a framework for building a human-machine language dictionary. Given a concept/word, an application can extract the definition of the concept from the dictionary, and consequently “understand” its meaning. In the dictionary, a concept is defined through its relations with other...
Research Article
Secure Sensor Localization in Wireless Sensor Networks based on Neural Network
Ting Zhang, Jingsha He, Yang Zhang
Pages: 914 - 923
Localization of sensor nodes in wireless sensor networks (WSNs) is very important since it associates spatial context with the data collected by sensor nodes and used in applications. Rapid development of wireless sensor technologies and wide applications of wireless sensor networks have also made security...
Research Article
A Hybrid Multicriteria Decision Making Methodology Based on Type-2 Fuzzy Sets For Selection Among Energy Storage Alternatives
Betul Ozkan, İhsan Kaya, Ufuk Cebeci, Hüseyin Başlıgil
Pages: 914 - 927
Energy storage alternatives that help storing excess energy and then using it when the system needs it has become more important in recent years. Determination of the most suitable energy storage alternative can be analyzed by using multi criteria decision making (MCDM) techniques. There are many criteria...
Research Article
Multiple Criteria Decision Analysis Using Correlation-Based Precedence Indices Within Pythagorean Fuzzy Uncertain Environments
Jih-Chang Wang, Ting-Yu Chen
Pages: 911 - 924
The theory of Pythagorean fuzzy sets possesses significant advantages in handling vagueness and complex uncertainty. Additionally, Pythagorean fuzzy information is useful to simulate the ambiguous nature of subjective judgments and measure the fuzziness and imprecision more flexibly. The aim of this...
Research Article
On the Application of Evolutionary Computation Techniques in Designing Stream Cipher Systems
Wasan Shaker Awad
Pages: 921 - 928
Encryption is an important mechanism used to protect private information from unauthorized access. Thus, cipher systems play an important role in the communication and storage systems. But, designing a cipher system of good properties, such as high degree of security and efficiency, is a complex process....
Research Article
Dynamic Knowledge Update Using Three-Way Decisions in Dominance-Based Rough Sets Approach While the Object Set Varies
Lei Wang, Min Li, Jun Ye, Xiang Yu, Ziqi Wang, Shaobo Deng
Pages: 914 - 928
Dominance-based rough set approach is the extension of classical Pawlak rough set theories and methodologies, in which the information with preference-ordered relation on the domain of attribute value is fully considered. In the dominance-based information system, upper and lower approximations will...
Research Article
GAB-BBO: Adaptive Biogeography Based Feature Selection Approach for Intrusion Detection
Wassila Guendouzi, Abdelmadjid Boukra
Pages: 914 - 935
Feature selection is used as a preprocessing step in the resolution of many problems using machine learning. It aims to improve the classification accuracy, speed up the model generation process, reduce the model complexity and reduce the required storage space. Feature selection is an NP-hard combinatorial...
Research Article
Accuracy Improvement of Autonomous Straight Take-off, Flying Forward, and Landing of a Drone with Deep Reinforcement Learning
Che-Cheng Chang, Jichiang Tsai, Peng-Chen Lu, Chuan-An Lai
Pages: 914 - 919
Nowadays, drones are expected to be used in several engineering and safety applications both indoors and outdoors, e.g., exploration, rescue, sport, entertainment, and convenience. Among those applications, it is important to make a drone capable of flying autonomously to carry out an inspection patrol....
Research Article
Trusted Bytecode Virtual Machine Module: A Novel Method for Dynamic Remote Attestation in Cloud Computing
Songzhu Mei, Zhiying Wang, Yong Cheng, Jiangchun Ren, Jiangjiang Wu, Jie Zhou
Pages: 924 - 932
Cloud computing bring a tremendous complexity to information security. Remote attestation can be used to establish trust relationship in cloud. TBVMM is designed to extend the existing chain of trust into the software layers to support dynamic remote attestation for cloud computing. TBVMM uses Bayesian...
Research Article
Consistency-based algorithms to estimate missing elements for uncertain 2-tuple linguistic preference relations
Zhen Zhang, Chonghui Guo
Pages: 924 - 936
For actual decision making problems, decision makers sometimes may have difficulty to provide all the preference information over alternatives through pairwise comparisons. In this paper, we focus on estimating missing elements for an incomplete uncertain 2-tuple linguistic preference relation. First,...
Research Article
An Efficient Artificial Fish Swarm Model with Estimation of Distribution for Flexible Job Shop Scheduling
Hongwei Ge, Liang Sun, Xin Chen, Yanchun Liang
Pages: 917 - 931
The flexible job shop scheduling problem (FJSP) is one of the most important problems in the field of production scheduling, which is the abstract of some practical production processes. It is a complex combinatorial optimization problem due to the consideration of both machine assignment and operation...
Research Article
A Decision Support System for Course Offering in Online Higher Education Institutes
Ahmad A. Kardan, Hamid Sadeghi
Pages: 928 - 942
Prior to every academic semester, every department's administrator is required to offer the best overall set of courses to meet student requirements, instructor needs and department regulations. The key contributions of this research is firstly, determining the potential factors that influence student...
Research Article
Distributed Computation using Evolutionary Consciousness : An Approach
Susmit Bagchi
Pages: 928 - 942
The modeling of biological phenomena and its adaptations to distributed computing are promising research areas. The computational modeling of neurobiological phenomena, such as cognition and consciousness, has potential for applications into bio-inspired distributed computing. The functioning of neurological...
Research Article
Fully implicational methods for interval-valued fuzzy reasoning with multi-antecedent rules
Hua-Wen Liu, Cheng Li
Pages: 929 - 945
Based on the fully implicational idea, we investigate the interval-valued fuzzy reasoning with multiantecedent rules. First, we construct a class of interval-valued fuzzy implications by means of a type of implications and a parameter on the unit interval, then use them to establish three kinds of fully...
Research Article
A New Hybrid Metaheuristic Algorithm for Multiobjective Optimization Problems
M.A. Farag, M.A. El-Shorbagy, A.A. Mousa, I.M. El-Desoky
Pages: 920 - 940
The elitist nondominated sorting genetic algorithm (NSGA-II) is hybridized with the sine-cosine algorithm (SCA) in this paper to solve multiobjective optimization problems. The proposed hybrid algorithm is named nondominated sorting sine-cosine genetic algorithm (NS-SCGA). The main idea of this algorithm...
Research Article
Understanding the Highly Sensitive Health Communication Behavior in Social Media from the Perspective of the Risk Perception Attitude Framework and Perceived Interactivity
Lusheng Guo, Lifang Liao, Donglan Li, Chunnian Liu
Pages: 922 - 934
Integrating aspects of the risk perception attitude framework and perceived interactivity, this study investigates the impact of the social media interaction environment on users' motivation and behavioral intention to reproductive health communication. A survey was conducted, and structural equation...
Research Article
An Improved Population Migration Algorithm for Solving Multi-Objective Optimization Problems
Qian Zhao, Xueying Liu, Shujun Wei
Pages: 933 - 941
The population migration algorithm is a very effective evolutionary algorithm for solving single-objective optimization problems, but very few applications are available for solving multi-objective optimization problems (MOPs). The current study proposes an improved population migration algorithm for...