International Journal of Computational Intelligence Systems
Volume 4, Issue 5, September 2011
Research Article
1. A Projection Pursuit Based Risk Assessment Method in Mobile Ad hoc Networks
Fu Cai, Liu Ming, Chen Jing, Zhang Li, Xiao-Yang Liu
Pages: 749 - 758
Establishing high performance cooperation and estimating nodes’ risk level in mobile ad hoc networks (MANETs) are currently fundamental and challenging due to the inherent characteristics of MANETs, such as the highly dynamic topology and the absence of an effective security mechanism. Trust based...
Research Article
2. A Reputation Evaluation Approach Based on Fuzzy Relation
Meiyu Fang, Xiaolin Zheng, Deren Chen
Pages: 759 - 767
In traditional models, fuzzy sets are used to describe trust degree and evaluate reputation for vague words. But in some practical applications, the determination of membership functions associated with vague concepts is difficult or impossible. This paper builds a reputation computing model based on...
Research Article
3. Application of Fuzzy Comprehensive Evaluation Method in Trust Quantification
Shunan Ma, Jingsha He, Shuai Xunbo
Pages: 768 - 776
Trust can play an important role for the sharing of resources and information in open network environments. Trust quantification is thus an important issue in dynamic trust management. By considering the fuzziness and uncertainty of trust, in this paper, we propose a fuzzy comprehensive evaluation method...
Research Article
4. Improved Ordinary Measure and Image Entropy Theory based intelligent Copy Detection Method
Dengpan Ye, Longfei Ma, Lina Wang, Robert H. Deng
Pages: 777 - 787
Nowadays, more and more multimedia websites appear in social network. It brings some security problems, such as privacy, piracy, disclosure of sensitive contents and so on. Aiming at copyright protection, the copy detection technology of multimedia contents becomes a hot topic. In our previous work,...
Research Article
5. WPMSD: A Malicious Script Detection Method Inspired by the Process of Immunoglobulin Secretion
Hui Zhao, Wen Chen, Jie Zeng, Yuanquan Shi, Jian Qin
Pages: 788 - 796
Inspired by the process of immunoglobulin secretion in biological body, we present a Web Page Malicious Script Detection Method (WPMSD). In this paper, Firstly, the basic definitions of artificial immune items are given. Secondly, according to the spreading range of malicious script, the immunoglobulin...
Research Article
6. Adaptive Secret Sharing for Color Images
Jia-Hong Li, Wei-Bin Lee, Dengpan Ye, Tzong-Jye Liu, Chuan Qin
Pages: 797 - 805
A secret sharing model can secure a secret over multiple noise-like shadows and remain recoverable despite multiple shadow failures. Even if some of the shadows are compromised, the secret will not be revealed as long as the number of the compromised shadows is smaller than a pre-determined threshold....
Research Article
7. Evaluating Timeliness and Accuracy Trade-offs of Supervised Machine Learning for Adapting Enterprise DRE Systems in Dynamic Environments
Joe Hoffert, Douglas C. Schmidt, Aniruddha Gokhale
Pages: 806 - 816
Several adaptation approaches have been devised to ensure end-to-end quality-of-service (QoS) for enterprise distributed systems in dynamic operating environments. Not all approaches are applicable, however, for the stringent accuracy, timeliness, and development complexity requirements of distributed...
Research Article
8. A Software Behavior Trustworthiness Measurement Method based on Data Mining
Yuyu Yuan, Qiang Han
Pages: 817 - 825
This paper presents a congruence measurement method by partitions to apply software trustworthiness measures in dynamic behavior feature datasets. The datasets are generated at software running time. And the method compares the datasets with the static attribute feature datasets generated at software...
Research Article
9. Automatic Design of Robust Optimal Controller for Interval Plants Using Genetic Programming and Kharitonov Theorem
Peng Chen, Yong-Zai Lu
Pages: 826 - 836
This paper presents a novel approach to automatic design of a robust optimal controller for interval plants with Genetic Programming based on Kharitonov Theorem (KT), which provides a theoretical foundation in the design of robust controller for interval plants. The structure and parameters of the robust...
Research Article
10. Integrating Strategic and Tactical Decisions to Robust Designing of Cellular Manufacturing under Uncertainty: Fixed Suppliers in Supply Chain
V.R Ghezavati, S.J. Sadjadi, M. Dehghan Nayeri
Pages: 837 - 854
Cellular manufacturing (CM) has been identified as an innovative practice for manufacturer to achieve efficiency as well as flexibility under an uncertain environment. This study addresses a new mathematical robust model for a cellular manufacturing problem integrated with tactical aspects under supply...
Research Article
11. H-infinite State Estimation for Takagi-Sugeno Fuzzy Delayed Hopfield Neural Networks
Choon Ki Ahn
Pages: 855 - 862
This paper presents a H-infinite state estimator for Takagi-Sugeno fuzzy delayed Hopfield neural networks. Based on Lyapunov-Krasovskii stability approach, a delay-dependent criterion is proposed to ensure that the resulting estimation error system is asymptotically stable with a guaranteed H performance....
Research Article
12. A Convergent Solution to Matrix Bidirectional Projection Based Feature Extraction with Application to Face Recognition
Yubin Zhan, Jianping Yin, Xinwang Liu
Pages: 863 - 873
Recently, many feature extraction methods, which are based on the matrix representation of image and matrix bidirectional projection technique, are proposed. However, these methods in solving the two projection matrices will suffer from non-optimized or non-convergent solution. To overcome this problem,...
Research Article
13. Automatic registration of remote sensing images based on SIFT and fuzzy block matching for change detection
Cai Guo-Rong, Li Shao-Zi, Wu Yun-Dong, Chen Shui-Li, Su Song-Zhi
Pages: 874 - 885
This paper presents an automated image registration approach to detecting changes in multi-temporal remote sensing images. The proposed algorithm is based on the scale invariant feature transform (SIFT) and has two phases. The first phase focuses on SIFT feature extraction and on estimation of image...
Research Article
14. Gene Silencing Genetic Algorithm for 0/1 Knapsack with Object Preferences
S. Siva Sathya, S. Kuppuswami, S. Sendhil Kumar
Pages: 886 - 893
Genetic Algorithms are efficient search and optimization techniques inspired by natural evolution. To show the difficulties in solving constrained optimization problems through GA, the 0/1 knapsack problem with user specific object preferences has been taken up. A new genetic operator, namely, ‘gene...
Research Article
15. A Fuzzy MCDM Approach to Evaluate Green Suppliers
Gizem Cifci, Gülcin Büyüközkan
Pages: 894 - 909
Nowadays the effect of industrial production on the environment brought out the importance of the green concept in supply chains. Particularly for supplier firms, greening is essential in a supply chain because with growing worldwide awareness of environmental protection, green production has become...
Research Article
16. An Adaptive Token Passing Algorithm Applicable to MS/TP Network
Ping Ren, Zude Zhou, Quan Liu
Pages: 910 - 920
In the MS/TP network, token is passed according to the address of master station. A novel token passing algorithm was proposed based on the characteristics of MS/TP network frame distribution and the requirements of real-time performance. The algorithm adopts distributed control method, which can adjust...
Research Article
17. On the Application of Evolutionary Computation Techniques in Designing Stream Cipher Systems
Wasan Shaker Awad
Pages: 921 - 928
Encryption is an important mechanism used to protect private information from unauthorized access. Thus, cipher systems play an important role in the communication and storage systems. But, designing a cipher system of good properties, such as high degree of security and efficiency, is a complex process....
Research Article
18. Fully implicational methods for interval-valued fuzzy reasoning with multi-antecedent rules
Hua-Wen Liu, Cheng Li
Pages: 929 - 945
Based on the fully implicational idea, we investigate the interval-valued fuzzy reasoning with multiantecedent rules. First, we construct a class of interval-valued fuzzy implications by means of a type of implications and a parameter on the unit interval, then use them to establish three kinds of fully...
Research Article
19. A Linguistic Multi-Criteria Decision Making Model Applied to the Integration of Education Questionnaires
Ramón A. Carrasco, Pedro Villar, Miguel J. Hornos, Enrique Herrera-Viedma
Pages: 946 - 959
We present a model made up of linguistic multi-criteria decision making processes to integrate the answers to heterogeneous questionnaires, based on a five-point Likert scale, into a unique form rooted in the widespread course experience questionnaire. The main advantage of having the resulting integrated...
Research Article
20. Intelligent Recognition of Lung Nodule Combining Rule-based and C-SVM Classifiers
Bin Li, Jing Zhang, Lianfang Tian, Li Tan, Shijie Xiang, Shanxing Ou
Pages: 960 - 976
Computer-aided detection(CAD) system for lung nodules plays the important role in the diagnosis of lung cancer. In this paper, an improved intelligent recognition method of lung nodule in HRCT combing rule-based and costsensitive support vector machine(C-SVM) classifiers is proposed for detecting both...
Research Article
21. Splitting Computation of Answer Set Program and Its Application on E-service
Bo Yang, Ying Zhang, Mingyi Zhang, Maonian Wu
Pages: 977 - 990
As a primary means for representing and reasoning about knowledge, Answer Set Programming (ASP) has been applying in many areas such as planning, decision making, fault diagnosing and increasingly prevalent e-service. Based on the stable model semantics of logic programming, ASP can be used to solve...
Research Article
22. A Globally Convergent MCA Algorithm by Generalized Eigen-Decomposition
Jianbin Gao, Mao Ye, Jianping Li, Qi Xia
Pages: 991 - 1001
Minor component analysis (MCA) are used in many applications such as curve and surface fitting, robust beam forming, and blind signal separation. Based on the generalized eigen-decomposition, we present a completely different approach that leads to derive a novel MCA algorithm. First, in the sense of...
Research Article
23. Feature-Weighted Mountain Method with Its Application to Color Image Segmentation
Wen-Liang Hung, Miin-Shen Yang, Jian Yu, Chao-Ming Hwang
Pages: 1002 - 1011
In this paper, we propose a feature-weighted mountain clustering method. The proposed method can work well when there are noisy feature variables and could be useful for obtaining initial estimat of cluster centers for other clustering algorithms. Results from color image segmentation illustrate the...
Research Article
24. WebScore: An Effective Page Scoring Approach for Uncertain Web Social Networks
Shaojie Qiao, Tianrui Li, Michael Chau, Jing Peng, Yan Zhu, Hong Li
Pages: 1012 - 1021
To effectively score pages with uncertainty in web social networks, we first proposed a new concept called transition probability matrix and formally defined the uncertainty in web social networks. Second, we proposed a hybrid page scoring algorithm, called WebScore, based on the PageRank algorithm and...
Research Article
25. Rule-Based Classification of MMPI Data of Patients with Mental Disorders: Experiments with Basic and Extended Profiles
Jerzy Gomula, Krzysztof Pancerz, Jaroslaw Szkola
Pages: 1022 - 1031
In the research presented in the paper, we test the classification potential for different configurations of the MMPI data used for nosological diagnosis of patients with mental disorders. Originally, each patient is described by an MMPI profile consisting of a set of values of thirteen attributes (the...
Research Article
26. A Frequent Pattern Mining Method for Finding Planted Motifs of Unknown Length in DNA Sequences
Caiyan Jia, Ruqian Lu, Lusheng Chen
Pages: 1032 - 1041
Identification and characterization of gene regulatory binding motifs is one of the fundamental tasks toward systematically understanding the molecular mechanisms of transcriptional regulation. Recently, the problem has been abstracted as the challenge planted (l,d)-motif problem. Previous studies have...
Research Article
27. A Novel Fuzzy Rough Granular Neural Network for Classification
Avatharam Ganivada, Sankar K. Pal
Pages: 1042 - 1051
A novel fuzzy rough granular neural network (NFRGNN) based on the multilayer perceptron using backpropagation algorithm is described for fuzzy classification of patterns. We provide a development strategy of knowledge extraction from data using fuzzy rough set theoretic techniques. Extracted knowledge...
Research Article
28. Fused Multi-Characteristic Validity Index: An Application to Reconstructed Image Evaluation in Electrical Tomography
Shihong Yue, Teresa Wu, Zhiqing Liu, Xian Zhao
Pages: 1052 - 1061
The quality of reconstructed images is an important and direct criterion to quantitatively evaluate the effectiveness of reconstruction algorithms in electrical tomography (ET). Unfortunately, there lacks of effective and efficient approach to assessing the quality of ET images in literature and practices....
Research Article
29. Identifying Web Users on the Base of their Browsing Patterns
Wojciech Jaworski
Pages: 1062 - 1069
Our aim is to develop methodology for recognition of Internet portal users on the base of their browsing patterns. This is a classification task in which we have thousands values of decision attribute and objects are described by means of sequences of symbols. We develop feature selectors which make...
Research Article
30. Spatio-temporal Similarity Measure for Network Constrained Trajectory Data
Ying Xia, Guo-Yin Wang, Xu Zhang, Gyoung-Bae Kim, Hae-Young Bae
Pages: 1070 - 1079
Trajectory similarity measure is an important issue for analyzing the behavior of moving objects. In this paper, a similarity measure method for network constrained trajectories is proposed. It considers spatial and temporal features simultaneously in calculating spatio-temporal distance. The crossing...
Research Article
31. Residual as Linear Sum of Matrix Determinants in Multiway Contingency Tables
Shusaku Tsumoto, Shoji Hirano
Pages: 1080 - 1089
A Pearson residual is defined as a residual between an observed value and expected one of each cell in a contingency table, which measures the degree of statistical dependence of two attribute-value pairs corresponding to the cell. This paper shows that this residual is decomposed into a linear sum of...
Research Article
32. Gait Recognition Based on Outermost Contour
Lili Liu, Yilong Yin, Wei Qin, Ying Li
Pages: 1090 - 1099
Gait recognition aims to identify people by the way they walk. In this paper, a simple but e ective gait recognition method based on Outermost Contour is proposed. For each gait image sequence, an adaptive silhouette extraction algorithm is firstly used to segment the frames of the sequence and a series...