Search all articles

+ Advanced search
Search articles within:
8183 articles

Dynamic Knowledge Update Using Three-Way Decisions in Dominance-Based Rough Sets Approach While the Object Set Varies

Lei Wang, Min Li, Jun Ye, Xiang Yu, Ziqi Wang, Shaobo Deng
Pages: 914 - 928
Dominance-based rough set approach is the extension of classical Pawlak rough set theories and methodologies, in which the information with preference-ordered relation on the domain of attribute value is fully considered. In the dominance-based information system, upper and lower approximations will...

GAB-BBO: Adaptive Biogeography Based Feature Selection Approach for Intrusion Detection

Wassila Guendouzi, Abdelmadjid Boukra
Pages: 914 - 935
Feature selection is used as a preprocessing step in the resolution of many problems using machine learning. It aims to improve the classification accuracy, speed up the model generation process, reduce the model complexity and reduce the required storage space. Feature selection is an NP-hard combinatorial...

Accuracy Improvement of Autonomous Straight Take-off, Flying Forward, and Landing of a Drone with Deep Reinforcement Learning

Che-Cheng Chang, Jichiang Tsai, Peng-Chen Lu, Chuan-An Lai
Pages: 914 - 919
Nowadays, drones are expected to be used in several engineering and safety applications both indoors and outdoors, e.g., exploration, rescue, sport, entertainment, and convenience. Among those applications, it is important to make a drone capable of flying autonomously to carry out an inspection patrol....

On the Application of Evolutionary Computation Techniques in Designing Stream Cipher Systems

Wasan Shaker Awad
Pages: 921 - 928
Encryption is an important mechanism used to protect private information from unauthorized access. Thus, cipher systems play an important role in the communication and storage systems. But, designing a cipher system of good properties, such as high degree of security and efficiency, is a complex process....

Multiple Criteria Decision Analysis Using Correlation-Based Precedence Indices Within Pythagorean Fuzzy Uncertain Environments

Jih-Chang Wang, Ting-Yu Chen
Pages: 911 - 924
The theory of Pythagorean fuzzy sets possesses significant advantages in handling vagueness and complex uncertainty. Additionally, Pythagorean fuzzy information is useful to simulate the ambiguous nature of subjective judgments and measure the fuzziness and imprecision more flexibly. The aim of this...

Secure Sensor Localization in Wireless Sensor Networks based on Neural Network

Ting Zhang, Jingsha He, Yang Zhang
Pages: 914 - 923
Localization of sensor nodes in wireless sensor networks (WSNs) is very important since it associates spatial context with the data collected by sensor nodes and used in applications. Rapid development of wireless sensor technologies and wide applications of wireless sensor networks have also made security...

A Hybrid Multicriteria Decision Making Methodology Based on Type-2 Fuzzy Sets For Selection Among Energy Storage Alternatives

Betul Ozkan, İhsan Kaya, Ufuk Cebeci, Hüseyin Başlıgil
Pages: 914 - 927
Energy storage alternatives that help storing excess energy and then using it when the system needs it has become more important in recent years. Determination of the most suitable energy storage alternative can be analyzed by using multi criteria decision making (MCDM) techniques. There are many criteria...

A Human-Machine Language Dictionary

Fei Liu, Shirin Akther Khanam, Yi-Ping Phoebe Chen
Pages: 904 - 913
In this paper, we propose a framework for building a human-machine language dictionary. Given a concept/word, an application can extract the definition of the concept from the dictionary, and consequently “understand” its meaning. In the dictionary, a concept is defined through its relations with other...

Digital FIR Filter Design Using Hybrid Random Particle Swarm Optimization with Differential Evolution

Vasundhara, Durbadal Mandal, Sakti Prasad Ghoshal, Rajib Kar
Pages: 911 - 927
This paper presents a novel approach of designing linear phase FIR low pass and high pass filter using Random PSO in hybrid with DE known as Random PSODE (RPSODE). In this paper, the Random PSO is used which utilises the weighted particle to guide the search direction for both explorative and exploitative...

An Adaptive Token Passing Algorithm Applicable to MS/TP Network

Ping Ren, Zude Zhou, Quan Liu
Pages: 910 - 920
In the MS/TP network, token is passed according to the address of master station. A novel token passing algorithm was proposed based on the characteristics of MS/TP network frame distribution and the requirements of real-time performance. The algorithm adopts distributed control method, which can adjust...

Assessment of Driver Stress from Physiological Signals collected under Real-Time Semi-Urban Driving Scenarios

Rajiv Ranjan Singh, Sailesh Conjeti, Rahul Banerjee
Pages: 909 - 923
Designing a wearable driver assist system requires extraction of relevant features from physiological signals like galvanic skin response and photoplethysmogram collected from automotive drivers during real-time driving. In the discussed case, four stress-classes were identified using cascade forward...

A New Approach to Extract Text from Images based on DWT and K-means Clustering

Deepika Ghai, Divya Gera, Neelu Jain
Pages: 900 - 916
Text present in image provides important information for automatic annotation, indexing and retrieval. Therefore, its extraction is a well known research area in computer vision. However, variations of text due to differences in orientation, alignment, font, size, low image contrast and complex background...

Asphalt Pavement Roughness Prediction Based on Gray GM(1,1|sin) Model

Xiuli Zhang, Chunming Ji
Pages: 897 - 902
Roughness is a comprehensive assessment indicator of pavement performance. Prediction of pavement roughness exhibits great difficulties by using traditional methods such as mechanistic-empirical method and regression method. Considering the fact that the value of international roughness index (IRI) varies...

A Complex Estimation Function based on Community Reputation for On-line Transaction Systems

Yu Yang, Shang-bao Gong, Yu-cui Guo, Min Lei, Yan Yang
Pages: 905 - 912
A reputation management system is crucial in online transaction systems, in which a reputation function is its central component. We propose a generalized set-theoretic reputation function in this paper, which can be configured to meet various assessment requirements of a wide range of reputation scenarios...

Value-Based Reasoning in Autonomous Agents

Tomasz Zurek, Michail Mokkas
Pages: 896 - 921
The issue of decision-making of autonomous agents constitutes the current work topic for many researchers. In this paper we propose to extend the existing model of value-based teleological reasoning by a new, numerical manner of representation of the level of value promotion. The authors of the paper...

Micro-Facial Expression Recognition Based on Deep-Rooted Learning Algorithm

S. D. Lalitha, K. K. Thyagharajan
Pages: 903 - 913
Facial expressions are important cues to observe human emotions. Facial expression recognition has attracted many researchers for years, but it is still a challenging topic since expression features vary greatly with the head poses, environments, and variations in the different persons involved. In this...

Decision Support for Project Rescheduling to Reduce Software Development Delays based on Ant Colony Optimization

Wei Zhang, Yun Yang, Xiao Liu, Cheng Zhang, Xuejun Li, Rongbin Xu, Futian Wang, Muhammad Ali Babar
Pages: 894 - 910
Delays often occur during some activities in software development projects. Without handling of project delays effectively, many software development projects fail to meet their deadlines. If extra employees with same or similar skills and domain knowledge can be rescheduled for the remaining activities...

Location, Allocation and Routing of Temporary Health Centers in Rural Areas in Crisis, Solved by Improved Harmony Search Algorithm

Mahdi Alinaghian, Alireza Goli
Pages: 894 - 913
In this paper, an uncertain integrated model for simultaneously locating temporary health centers in the affected areas, allocating affected areas to these centers, and routing to transport their required good is considered. Health centers can be settled in one of the affected areas or in a place out...

An Improved Parameter Control Based on a Fuzzy System for Gravitational Search Algorithm

Yu Xianrui, Yu Xiaobing, Li Chenliang, Chen Hong
Pages: 893 - 903
Recently, a kind of heuristic optimization algorithm named gravitational search algorithm (GSA) has been rapidly developed. In GSA, there are two main parameters that control the search process, namely, the number of applied agents (Kbest) and the gravity constant (G). To balance exploration and exploitation,...

Application of Fractional Order ABC and GA for Neural Network Training and Clustering Process

G. Lavanya, S. Srinivasan
Pages: 900 - 913
Literature presents several search algorithms to find an item with specified properties from a search space defined by a mathematical formula or procedure. One of the widely accepted algorithms is optimization algorithm which can find the optimal element within a certain period of time if the search...

Hybrid tracking model for multiple object videos using second derivative based visibility model and tangential weighted spatial tracking model

Felix M. Philip, Rajeswari Mukesh
Pages: 888 - 899
In the area of video surveillance, tracking model for multiple object video is still a challenging task since the objects are usually affected with inter-object occlusion, object confusion, different posing, environment with heavy clutter, small size of objects, similar appearance among objects, and...

Single Byte Differential Fault Analysis on the LED Lightweight Cipher in the Wireless Sensor Network

Wei Li, Da-wu Gu, Xiao-ling Xia, Chen Zhao, Zhi-qiang Liu, Ya Liu, Qing-ju Wang
Pages: 896 - 904
The LED is a new lightweight cipher, which was published in CHES 2011. This cipher could be applied in the Wireless Sensor Network to provide security. On the basis of the single byte-oriented fault model, we propose a differential fault analysis on the LED cipher. The attack could recover its 64-bit...

A QFD Approach for Cloud Computing Evaluation and Selection in KMS: A Case Study

Chin-Nung Liao, Hsing-Pei Kao
Pages: 896 - 908
Cloud computing services are a new information technology trend for business applications in knowledge management systems (KMS). The link between cloud computing services and KMS is a new concept, and methods for selecting multiple choice goals of cloud computing service provider have lacked a formal...

Few-Shot Image Segmentation Based on Dual Comparison Module and Sequential k-Shot Integration

Chencong Xing, Shujing Lyu, Yue Lu
Pages: 886 - 895
Few-shot image segmentation intends to segment query images (test images) given only a few support samples with annotations. However, previous works ignore the impact of the object scales, especially in the support images. Meanwhile, current models only work on images with the similar size of the object...

A Fuzzy MCDM Approach to Evaluate Green Suppliers

Gizem Cifci, Gülcin Büyüközkan
Pages: 894 - 909
Nowadays the effect of industrial production on the environment brought out the importance of the green concept in supply chains. Particularly for supplier firms, greening is essential in a supply chain because with growing worldwide awareness of environmental protection, green production has become...

Using Multivariate Adaptive Regression Splines in the Construction of Simulated Soccer Team's Behavior Models

Pedro Henriques Abreu, Daniel Castro Silva, João Mendes-Moreira, Luís Paulo Reis, Júlio Garganta
Pages: 893 - 910
In soccer, like in other collective sports, although players try to hide their strategy, it is always possible, with a careful analysis, to detect it and to construct a model that characterizes their behavior throughout the game phases. These findings are extremely relevant for a soccer coach, in order...

Fuzzy Logic Based Cross-Layer Design for Image Transmission in Wireless Sensor Networks

Moad Mowafi, Omar Banimelhem, Yosef Taher
Pages: 882 - 893
The evolution of wireless multimedia sensor networks (WMSN) has opened the door to a wide range of applications such as telemedicine, surveillance, and intrusion detection. However, the delivery of multimedia content over wireless sensor networks requires maintaining the quality of service demands of...

Decision Support for Intelligent Energy Management in Buildings Using the Thermal Comfort Model

Vangelis Marinakis, Haris Doukas, Evangelos Spiliotis, Ilias Papastamatiou
Pages: 882 - 893
The main objective of this paper is to present a transparent Decision Support System (DSS) for the energy managers of buildings, which can assist them in setting indoor temperature set point, based on the feedback received by the occupants. Within the proposed DSS, the Thermal Comfort Validator (TCV)...

Multi-Attribute Decision-Making Method Based on Prospect Theory in Heterogeneous Information Environment and Its Application in Typhoon Disaster Assessment

Ruipu Tan, Wende Zhang, Lehua Yang, Shengqun Chen
Pages: 881 - 896
Aiming at the decision-making problem in heterogeneous information environment and considering the influence of decision makers' psychological behavior on decision-making results, this paper proposes a multi-attribute decision-making method based on prospect theory in heterogeneous information environment....

A Secure Network Coding-based Data Gathering Model and Its Protocol in Wireless Sensor Networks

Qian Xiao, Kang-feng Zheng, Shou-shan Luo, Xu Cui
Pages: 887 - 895
To provide security for data gathering based on network coding in wireless sensor networks (WSNs), a secure network coding-based data gathering model is proposed, and a data-privacy preserving and pollution preventing (DPP&PP) protocol using network coding is designed. DPP&PP makes use of a new...

Intelligent Transportation System with Diverse Semi-Autonomous Vehicles

Rahul Kala, Kevin Warwick
Pages: 886 - 899
It is becoming increasingly likely that in the future most vehicles will be semi-autonomous with communication capabilities and will possess diverse speed capabilities. The aim of this paper is to describe the creation of an integrated traffic simulation system for such settings. While behaviours such...

Gene Silencing Genetic Algorithm for 0/1 Knapsack with Object Preferences

S. Siva Sathya, S. Kuppuswami, S. Sendhil Kumar
Pages: 886 - 893
Genetic Algorithms are efficient search and optimization techniques inspired by natural evolution. To show the difficulties in solving constrained optimization problems through GA, the 0/1 knapsack problem with user specific object preferences has been taken up. A new genetic operator, namely, ‘gene...

Ontology Knowledge Mining for Ontology Alignment

Rihab Idoudi, Karim Saheb Ettabaa, Basel Solaiman, Kamel Hamrouni
Pages: 876 - 887
As the ontology alignment facilitates the knowledge exchange among the heterogeneous data sources, several methods have been introduced in literature. Nevertheless, few of them have been interested in decreasing the problem complexity and reducing the research space of correspondences between the input...

An improvement method for selecting the best alternative in Decision Making

Bin Zhou, Zheng Pei, Xinzi Ma
Pages: 882 - 895
Multiple attributes group decision making problems aim to find the best alternative for the experts from a solution set of alternatives. Because the attribute value and decision-makers evaluation with respect to the alternatives are usually vague and imprecise, fuzzy multiple attributes group decision...

Compressed Sensing Image Reconstruction Based on Convolutional Neural Network

Yuhong Liu, Shuying Liu, Cuiran Li, Danfeng Yang
Pages: 873 - 880
Compressed sensing theory is widely used in image and video signal processing because of its low coding complexity, resource saving, and strong anti-interference ability. Although the compression sensing theory solves the problems brought by the traditional signal processing methods to a certain extent,...

An Agile Mortality Prediction Model: Hybrid Logarithm Least-Squares Support Vector Regression with Cautious Random Particle Swarm Optimization

Chien-Lung Chan, Chia-Li Chen, Hsien-Wei Ting, Dinh-Van Phan
Pages: 873 - 881
Logarithm Least-Squares Support Vector Regression (LLS-SVR) has been applied in addressing forecasting problems in various fields, including bioinformatics, financial time series, electronics, plastic injection moulding, Chemistry and cost estimations. Cautious Random Particle Swarm Optimization (CRPSO)...

A Combination Algorithm of Multiple Lattice-Valued Concept Lattices

Li Yang, Yuhui Wang, Yang Xu
Pages: 881 - 892
With the rapid development of network technology, especially in the internet area, distributed computation and parallel processing of data are urgently needed. This paper studies the combination operation of the lattice-valued concept lattices to realize its distributed computation and parallel processing....

Watch-Nodes-Based Wormhole Attacks Detection in Wireless Mesh Networks

Liang-yu Luan, Ying-fang Fu, Peng Xiao, Ling-xi Peng
Pages: 878 - 886
Wormhole attacks, as a devastating type of threats in wireless mesh networks, have received much attention in recent years. This paper proposes a type of wormhole attack model and its corresponding detection scheme. In this scheme, the combination of a number of techniques, such as distributed voting,...

Similarity Measures and Multi-person TOPSIS Method Using m-polar Single-Valued Neutrosophic Sets

Juanyong Wu, Ahmed Mostafa Khalil, Nasruddin Hassan, Florentin Smarandache, A. A. Azzam, Hui Yang
Pages: 869 - 885
In this paper, we give a new notion of the m-polar single-valued neutrosophic sets (m-PSVNSs) which is a hybrid of the single-valued neutrosophic sets (SVNSs) and the m-polar fuzzy sets (m-PFSs) and study several of the structure operations including subset, equal, union, intersection, and complement....

Fuzzy Load Forecast with Optimized Parametric Adjustment Using Jaya Optimization Algorithm

Ho Pham Huy Anh
Pages: 875 - 892
This paper proposes an advanced fuzzy load forecast method optimized by modified Jaya optimization (MJO) algorithm. MATLAB® platform is used to implement the proposed hybrid Fuzzy-MJO load forecasting algorithm and to verify the outperforming features of a Jaya technique over a fuzzy load forecast model....

A Hybrid Heuristic Approach to Provider Selection and Task Allocation Problem in Telecommunications with Varying QoS Levels

Nihat Kasap, Berna Tektaş Sivrikaya, Hasan Hüseyin Turan, Dursun Delen
Pages: 866 - 881
In this research, we study a cost minimization problem for a firm that acquires capacity from providers to accomplish daily operations on telecommunication networks. We model the related optimization problem considering quality of service and capacity requirements and offer a solution approach based...

Stereo Matching Based Stereo Image Watermarking for Tamper Detection and Recovery

Ting Luo, Gangyi Jiang, Mei Yu, Feng Shao, Zongju Peng, Yo-Sung Ho
Pages: 874 - 881
Digital watermarking is an effective way for authentication of stereo images when they are transmitted over networks. Since the left and right images of a stereo image pair are not independent but similar to each other, their watermarking design should be different from that of mono-images. This paper...

Combining RMT-based filtering with time-stamped resampling for robust portfolio optimization

David Quintana, Sandra García-Rodríguez, Silvano Cincotti, Pedro Isasi
Pages: 874 - 885
Finding the optimal weights for a set of financial assets is a difficult task. The mix of real world constrains and the uncertainty derived from the fact that process is based on estimates for parameters that likely to be inaccurate, often result in poor results. This paper suggests that a combination...

Automatic registration of remote sensing images based on SIFT and fuzzy block matching for change detection

Cai Guo-Rong, Li Shao-Zi, Wu Yun-Dong, Chen Shui-Li, Su Song-Zhi
Pages: 874 - 885
This paper presents an automated image registration approach to detecting changes in multi-temporal remote sensing images. The proposed algorithm is based on the scale invariant feature transform (SIFT) and has two phases. The first phase focuses on SIFT feature extraction and on estimation of image...

An Integer Cat Swarm Optimization Approach for Energy and Throughput Efficient MPSoC Design

Shahid Ali Murtza, Ayaz Ahmad, Muhammad Yasir Qadri, Nadia N. Qadri, Majed Alhaisoni, Sajid Baloch
Pages: 864 - 874
Modern multicore architectures have an ability to allocate optimum system resources for a specific application to have improved energy and throughput balance. The system resources can be optimized automatically by using optimization algorithms. State-of-the-art using optimization algorithm in the field...

A two-stage hybrid classification technique for network intrusion detection system

Jamal Hussain, Samuel Lalmuanawma, Lalrinfela Chhakchhuak
Pages: 863 - 875
Conventional Network intrusion detection system (NIDS) mostly uses individual classification techniques, such system fails to provide the best possible attack detection rate. In this paper, we propose a new two-stage hybrid classification method using Support Vector Machine (SVM) as anomaly detection...

A Novel Two-step Feature Selection based Cost Sensitive Myocardial Infarction Prediction Model

Hodjat Hamidi, Atefeh Daraei
Pages: 861 - 872
Considering the rapid growth, complications and treatment side-effects of MI, so using data mining techniques seems necessary. On the other hand, in real-world MI cases are much less compared to healthy cases. The traditional algorithms for imbalanced problems lead to very low Sensitivity, thus, we propose...

Locator/Identifier Separation: Comparison and Analysis on the Mitigation of Worm Propagation

Ming Wan, Ying Liu, Jian-qiang Tang, Hong-ke Zhang, Si-yu Lin
Pages: 868 - 877
As a basic prerequisite for worm detection based on computational intelligence in networks with locator/identifier separation, it is well worth considering the influence on worm propagation due to the incoming locator/identifier separation. In this paper, according to the characteristics of locator/identifier...

Statistical and Machine Learning Approaches for Clinical Decision on Drug Usage in Diabetes with Reference to Competence and Safeness

S. Appavu Alias Balamurugan, K. R. Saranya, S. Sasikala, G. Chinthana
Pages: 859 - 868
Diabetes is a chronic disease that requires patient-centered treatment. The physician strategy for treatment of diabetes varies from one patient to another. Using the clinical parameters and the evidence of diabetes at various group of people are to be treated with the drugs that provide significant...