Search all articles
8183 articles
Research Article
Dynamic Knowledge Update Using Three-Way Decisions in Dominance-Based Rough Sets Approach While the Object Set Varies
Lei Wang, Min Li, Jun Ye, Xiang Yu, Ziqi Wang, Shaobo Deng
Pages: 914 - 928
Dominance-based rough set approach is the extension of classical Pawlak rough set theories and methodologies, in which the information with preference-ordered relation on the domain of attribute value is fully considered. In the dominance-based information system, upper and lower approximations will...
Research Article
GAB-BBO: Adaptive Biogeography Based Feature Selection Approach for Intrusion Detection
Wassila Guendouzi, Abdelmadjid Boukra
Pages: 914 - 935
Feature selection is used as a preprocessing step in the resolution of many problems using machine learning. It aims to improve the classification accuracy, speed up the model generation process, reduce the model complexity and reduce the required storage space. Feature selection is an NP-hard combinatorial...
Research Article
Accuracy Improvement of Autonomous Straight Take-off, Flying Forward, and Landing of a Drone with Deep Reinforcement Learning
Che-Cheng Chang, Jichiang Tsai, Peng-Chen Lu, Chuan-An Lai
Pages: 914 - 919
Nowadays, drones are expected to be used in several engineering and safety applications both indoors and outdoors, e.g., exploration, rescue, sport, entertainment, and convenience. Among those applications, it is important to make a drone capable of flying autonomously to carry out an inspection patrol....
Research Article
On the Application of Evolutionary Computation Techniques in Designing Stream Cipher Systems
Wasan Shaker Awad
Pages: 921 - 928
Encryption is an important mechanism used to protect private information from unauthorized access. Thus, cipher systems play an important role in the communication and storage systems. But, designing a cipher system of good properties, such as high degree of security and efficiency, is a complex process....
Research Article
Multiple Criteria Decision Analysis Using Correlation-Based Precedence Indices Within Pythagorean Fuzzy Uncertain Environments
Jih-Chang Wang, Ting-Yu Chen
Pages: 911 - 924
The theory of Pythagorean fuzzy sets possesses significant advantages in handling vagueness and complex uncertainty. Additionally, Pythagorean fuzzy information is useful to simulate the ambiguous nature of subjective judgments and measure the fuzziness and imprecision more flexibly. The aim of this...
Research Article
Secure Sensor Localization in Wireless Sensor Networks based on Neural Network
Ting Zhang, Jingsha He, Yang Zhang
Pages: 914 - 923
Localization of sensor nodes in wireless sensor networks (WSNs) is very important since it associates spatial context with the data collected by sensor nodes and used in applications. Rapid development of wireless sensor technologies and wide applications of wireless sensor networks have also made security...
Research Article
A Hybrid Multicriteria Decision Making Methodology Based on Type-2 Fuzzy Sets For Selection Among Energy Storage Alternatives
Betul Ozkan, İhsan Kaya, Ufuk Cebeci, Hüseyin Başlıgil
Pages: 914 - 927
Energy storage alternatives that help storing excess energy and then using it when the system needs it has become more important in recent years. Determination of the most suitable energy storage alternative can be analyzed by using multi criteria decision making (MCDM) techniques. There are many criteria...
Research Article
A Human-Machine Language Dictionary
Fei Liu, Shirin Akther Khanam, Yi-Ping Phoebe Chen
Pages: 904 - 913
In this paper, we propose a framework for building a human-machine language dictionary. Given a concept/word, an application can extract the definition of the concept from the dictionary, and consequently “understand” its meaning. In the dictionary, a concept is defined through its relations with other...
Editorial
Recent advances in the Intelligence technology and Security applications Guest edited by Dengpan Ye
Dengpan Ye
Pages: 913 - 913
Research Article
Digital FIR Filter Design Using Hybrid Random Particle Swarm Optimization with Differential Evolution
Vasundhara, Durbadal Mandal, Sakti Prasad Ghoshal, Rajib Kar
Pages: 911 - 927
This paper presents a novel approach of designing linear phase FIR low pass and high pass filter using Random PSO in hybrid with DE known as Random PSODE (RPSODE). In this paper, the Random PSO is used which utilises the weighted particle to guide the search direction for both explorative and exploitative...
Research Article
An Adaptive Token Passing Algorithm Applicable to MS/TP Network
Ping Ren, Zude Zhou, Quan Liu
Pages: 910 - 920
In the MS/TP network, token is passed according to the address of master station. A novel token passing algorithm was proposed based on the characteristics of MS/TP network frame distribution and the requirements of real-time performance. The algorithm adopts distributed control method, which can adjust...
Research Article
Assessment of Driver Stress from Physiological Signals collected under Real-Time Semi-Urban Driving Scenarios
Rajiv Ranjan Singh, Sailesh Conjeti, Rahul Banerjee
Pages: 909 - 923
Designing a wearable driver assist system requires extraction of relevant features from physiological signals like galvanic skin response and photoplethysmogram collected from automotive drivers during real-time driving. In the discussed case, four stress-classes were identified using cascade forward...
Research Article
A New Approach to Extract Text from Images based on DWT and K-means Clustering
Deepika Ghai, Divya Gera, Neelu Jain
Pages: 900 - 916
Text present in image provides important information for automatic annotation, indexing and retrieval. Therefore, its extraction is a well known research area in computer vision. However, variations of text due to differences in orientation, alignment, font, size, low image contrast and complex background...
Research Article
Asphalt Pavement Roughness Prediction Based on Gray GM(1,1|sin) Model
Xiuli Zhang, Chunming Ji
Pages: 897 - 902
Roughness is a comprehensive assessment indicator of pavement performance. Prediction of pavement roughness exhibits great difficulties by using traditional methods such as mechanistic-empirical method and regression method. Considering the fact that the value of international roughness index (IRI) varies...
Research Article
A Complex Estimation Function based on Community Reputation for On-line Transaction Systems
Yu Yang, Shang-bao Gong, Yu-cui Guo, Min Lei, Yan Yang
Pages: 905 - 912
A reputation management system is crucial in online transaction systems, in which a reputation function is its central component. We propose a generalized set-theoretic reputation function in this paper, which can be configured to meet various assessment requirements of a wide range of reputation scenarios...
Research Article
Value-Based Reasoning in Autonomous Agents
Tomasz Zurek, Michail Mokkas
Pages: 896 - 921
The issue of decision-making of autonomous agents constitutes the current work topic for many researchers. In this paper we propose to extend the existing model of value-based teleological reasoning by a new, numerical manner of representation of the level of value promotion. The authors of the paper...
Research Article
Micro-Facial Expression Recognition Based on Deep-Rooted Learning Algorithm
S. D. Lalitha, K. K. Thyagharajan
Pages: 903 - 913
Facial expressions are important cues to observe human emotions. Facial expression recognition has attracted many researchers for years, but it is still a challenging topic since expression features vary greatly with the head poses, environments, and variations in the different persons involved. In this...
Research Article
Decision Support for Project Rescheduling to Reduce Software Development Delays based on Ant Colony Optimization
Wei Zhang, Yun Yang, Xiao Liu, Cheng Zhang, Xuejun Li, Rongbin Xu, Futian Wang, Muhammad Ali Babar
Pages: 894 - 910
Delays often occur during some activities in software development projects. Without handling of project delays effectively, many software development projects fail to meet their deadlines. If extra employees with same or similar skills and domain knowledge can be rescheduled for the remaining activities...
Research Article
Location, Allocation and Routing of Temporary Health Centers in Rural Areas in Crisis, Solved by Improved Harmony Search Algorithm
Mahdi Alinaghian, Alireza Goli
Pages: 894 - 913
In this paper, an uncertain integrated model for simultaneously locating temporary health centers in the affected areas, allocating affected areas to these centers, and routing to transport their required good is considered. Health centers can be settled in one of the affected areas or in a place out...
Research Article
An Improved Parameter Control Based on a Fuzzy System for Gravitational Search Algorithm
Yu Xianrui, Yu Xiaobing, Li Chenliang, Chen Hong
Pages: 893 - 903
Recently, a kind of heuristic optimization algorithm named gravitational search algorithm (GSA) has been rapidly developed. In GSA, there are two main parameters that control the search process, namely, the number of applied agents (Kbest) and the gravity constant (G). To balance exploration and exploitation,...
Research Article
Application of Fractional Order ABC and GA for Neural Network Training and Clustering Process
G. Lavanya, S. Srinivasan
Pages: 900 - 913
Literature presents several search algorithms to find an item with specified properties from a search space defined by a mathematical formula or procedure. One of the widely accepted algorithms is optimization algorithm which can find the optimal element within a certain period of time if the search...
Research Article
Hybrid tracking model for multiple object videos using second derivative based visibility model and tangential weighted spatial tracking model
Felix M. Philip, Rajeswari Mukesh
Pages: 888 - 899
In the area of video surveillance, tracking model for multiple object video is still a challenging task since the objects are usually affected with inter-object occlusion, object confusion, different posing, environment with heavy clutter, small size of objects, similar appearance among objects, and...
Research Article
Single Byte Differential Fault Analysis on the LED Lightweight Cipher in the Wireless Sensor Network
Wei Li, Da-wu Gu, Xiao-ling Xia, Chen Zhao, Zhi-qiang Liu, Ya Liu, Qing-ju Wang
Pages: 896 - 904
The LED is a new lightweight cipher, which was published in CHES 2011. This cipher could be applied in the Wireless Sensor Network to provide security. On the basis of the single byte-oriented fault model, we propose a differential fault analysis on the LED cipher. The attack could recover its 64-bit...
Case Study
A QFD Approach for Cloud Computing Evaluation and Selection in KMS: A Case Study
Chin-Nung Liao, Hsing-Pei Kao
Pages: 896 - 908
Cloud computing services are a new information technology trend for business applications in knowledge management systems (KMS). The link between cloud computing services and KMS is a new concept, and methods for selecting multiple choice goals of cloud computing service provider have lacked a formal...
Research Article
Few-Shot Image Segmentation Based on Dual Comparison Module and Sequential k-Shot Integration
Chencong Xing, Shujing Lyu, Yue Lu
Pages: 886 - 895
Few-shot image segmentation intends to segment query images (test images) given only a few support samples with annotations. However, previous works ignore the impact of the object scales, especially in the support images. Meanwhile, current models only work on images with the similar size of the object...
Research Article
A Fuzzy MCDM Approach to Evaluate Green Suppliers
Gizem Cifci, Gülcin Büyüközkan
Pages: 894 - 909
Nowadays the effect of industrial production on the environment brought out the importance of the green concept in supply chains. Particularly for supplier firms, greening is essential in a supply chain because with growing worldwide awareness of environmental protection, green production has become...
Research Article
Using Multivariate Adaptive Regression Splines in the Construction of Simulated Soccer Team's Behavior Models
Pedro Henriques Abreu, Daniel Castro Silva, João Mendes-Moreira, Luís Paulo Reis, Júlio Garganta
Pages: 893 - 910
In soccer, like in other collective sports, although players try to hide their strategy, it is always possible, with a careful analysis, to detect it and to construct a model that characterizes their behavior throughout the game phases. These findings are extremely relevant for a soccer coach, in order...
Research Article
Fuzzy Logic Based Cross-Layer Design for Image Transmission in Wireless Sensor Networks
Moad Mowafi, Omar Banimelhem, Yosef Taher
Pages: 882 - 893
The evolution of wireless multimedia sensor networks (WMSN) has opened the door to a wide range of applications such as telemedicine, surveillance, and intrusion detection. However, the delivery of multimedia content over wireless sensor networks requires maintaining the quality of service demands of...
Research Article
Decision Support for Intelligent Energy Management in Buildings Using the Thermal Comfort Model
Vangelis Marinakis, Haris Doukas, Evangelos Spiliotis, Ilias Papastamatiou
Pages: 882 - 893
The main objective of this paper is to present a transparent Decision Support System (DSS) for the energy managers of buildings, which can assist them in setting indoor temperature set point, based on the feedback received by the occupants. Within the proposed DSS, the Thermal Comfort Validator (TCV)...
Research Article
Multi-Attribute Decision-Making Method Based on Prospect Theory in Heterogeneous Information Environment and Its Application in Typhoon Disaster Assessment
Ruipu Tan, Wende Zhang, Lehua Yang, Shengqun Chen
Pages: 881 - 896
Aiming at the decision-making problem in heterogeneous information environment and considering the influence of decision makers' psychological behavior on decision-making results, this paper proposes a multi-attribute decision-making method based on prospect theory in heterogeneous information environment....
Research Article
A Secure Network Coding-based Data Gathering Model and Its Protocol in Wireless Sensor Networks
Qian Xiao, Kang-feng Zheng, Shou-shan Luo, Xu Cui
Pages: 887 - 895
To provide security for data gathering based on network coding in wireless sensor networks (WSNs), a secure network coding-based data gathering model is proposed, and a data-privacy preserving and pollution preventing (DPP&PP) protocol using network coding is designed. DPP&PP makes use of a new...
Research Article
Intelligent Transportation System with Diverse Semi-Autonomous Vehicles
Rahul Kala, Kevin Warwick
Pages: 886 - 899
It is becoming increasingly likely that in the future most vehicles will be semi-autonomous with communication capabilities and will possess diverse speed capabilities. The aim of this paper is to describe the creation of an integrated traffic simulation system for such settings. While behaviours such...
Research Article
Gene Silencing Genetic Algorithm for 0/1 Knapsack with Object Preferences
S. Siva Sathya, S. Kuppuswami, S. Sendhil Kumar
Pages: 886 - 893
Genetic Algorithms are efficient search and optimization techniques inspired by natural evolution. To show the difficulties in solving constrained optimization problems through GA, the 0/1 knapsack problem with user specific object preferences has been taken up. A new genetic operator, namely, ‘gene...
Research Article
Ontology Knowledge Mining for Ontology Alignment
Rihab Idoudi, Karim Saheb Ettabaa, Basel Solaiman, Kamel Hamrouni
Pages: 876 - 887
As the ontology alignment facilitates the knowledge exchange among the heterogeneous data sources, several methods have been introduced in literature. Nevertheless, few of them have been interested in decreasing the problem complexity and reducing the research space of correspondences between the input...
Research Article
An improvement method for selecting the best alternative in Decision Making
Bin Zhou, Zheng Pei, Xinzi Ma
Pages: 882 - 895
Multiple attributes group decision making problems aim to find the best alternative for the experts from a solution set of alternatives. Because the attribute value and decision-makers evaluation with respect to the alternatives are usually vague and imprecise, fuzzy multiple attributes group decision...
Research Article
Compressed Sensing Image Reconstruction Based on Convolutional Neural Network
Yuhong Liu, Shuying Liu, Cuiran Li, Danfeng Yang
Pages: 873 - 880
Compressed sensing theory is widely used in image and video signal processing because of its low coding complexity, resource saving, and strong anti-interference ability. Although the compression sensing theory solves the problems brought by the traditional signal processing methods to a certain extent,...
Research Article
An Agile Mortality Prediction Model: Hybrid Logarithm Least-Squares Support Vector Regression with Cautious Random Particle Swarm Optimization
Chien-Lung Chan, Chia-Li Chen, Hsien-Wei Ting, Dinh-Van Phan
Pages: 873 - 881
Logarithm Least-Squares Support Vector Regression (LLS-SVR) has been applied in addressing forecasting problems in various fields, including bioinformatics, financial time series, electronics, plastic injection moulding, Chemistry and cost estimations. Cautious Random Particle Swarm Optimization (CRPSO)...
Research Article
A Combination Algorithm of Multiple Lattice-Valued Concept Lattices
Li Yang, Yuhui Wang, Yang Xu
Pages: 881 - 892
With the rapid development of network technology, especially in the internet area, distributed computation and parallel processing of data are urgently needed. This paper studies the combination operation of the lattice-valued concept lattices to realize its distributed computation and parallel processing....
Research Article
Watch-Nodes-Based Wormhole Attacks Detection in Wireless Mesh Networks
Liang-yu Luan, Ying-fang Fu, Peng Xiao, Ling-xi Peng
Pages: 878 - 886
Wormhole attacks, as a devastating type of threats in wireless mesh networks, have received much attention in recent years. This paper proposes a type of wormhole attack model and its corresponding detection scheme. In this scheme, the combination of a number of techniques, such as distributed voting,...
Research Article
Similarity Measures and Multi-person TOPSIS Method Using m-polar Single-Valued Neutrosophic Sets
Juanyong Wu, Ahmed Mostafa Khalil, Nasruddin Hassan, Florentin Smarandache, A. A. Azzam, Hui Yang
Pages: 869 - 885
In this paper, we give a new notion of the m-polar single-valued neutrosophic sets (m-PSVNSs) which is a hybrid of the single-valued neutrosophic sets (SVNSs) and the m-polar fuzzy sets (m-PFSs) and study several of the structure operations including subset, equal, union, intersection, and complement....
Research Article
Fuzzy Load Forecast with Optimized Parametric Adjustment Using Jaya Optimization Algorithm
Ho Pham Huy Anh
Pages: 875 - 892
This paper proposes an advanced fuzzy load forecast method optimized by modified Jaya optimization (MJO) algorithm. MATLAB® platform is used to implement the proposed hybrid Fuzzy-MJO load forecasting algorithm and to verify the outperforming features of a Jaya technique over a fuzzy load forecast model....
Research Article
A Hybrid Heuristic Approach to Provider Selection and Task Allocation Problem in Telecommunications with Varying QoS Levels
Nihat Kasap, Berna Tektaş Sivrikaya, Hasan Hüseyin Turan, Dursun Delen
Pages: 866 - 881
In this research, we study a cost minimization problem for a firm that acquires capacity from providers to accomplish daily operations on telecommunication networks. We model the related optimization problem considering quality of service and capacity requirements and offer a solution approach based...
Research Article
Stereo Matching Based Stereo Image Watermarking for Tamper Detection and Recovery
Ting Luo, Gangyi Jiang, Mei Yu, Feng Shao, Zongju Peng, Yo-Sung Ho
Pages: 874 - 881
Digital watermarking is an effective way for authentication of stereo images when they are transmitted over networks. Since the left and right images of a stereo image pair are not independent but similar to each other, their watermarking design should be different from that of mono-images. This paper...
Research Article
Combining RMT-based filtering with time-stamped resampling for robust portfolio optimization
David Quintana, Sandra García-Rodríguez, Silvano Cincotti, Pedro Isasi
Pages: 874 - 885
Finding the optimal weights for a set of ï¬nancial assets is a difï¬cult task. The mix of real world constrains and the uncertainty derived from the fact that process is based on estimates for parameters that likely to be inaccurate, often result in poor results. This paper suggests that a combination...
Research Article
Automatic registration of remote sensing images based on SIFT and fuzzy block matching for change detection
Cai Guo-Rong, Li Shao-Zi, Wu Yun-Dong, Chen Shui-Li, Su Song-Zhi
Pages: 874 - 885
This paper presents an automated image registration approach to detecting changes in multi-temporal remote sensing images. The proposed algorithm is based on the scale invariant feature transform (SIFT) and has two phases. The first phase focuses on SIFT feature extraction and on estimation of image...
Research Article
An Integer Cat Swarm Optimization Approach for Energy and Throughput Efficient MPSoC Design
Shahid Ali Murtza, Ayaz Ahmad, Muhammad Yasir Qadri, Nadia N. Qadri, Majed Alhaisoni, Sajid Baloch
Pages: 864 - 874
Modern multicore architectures have an ability to allocate optimum system resources for a specific application to have improved energy and throughput balance. The system resources can be optimized automatically by using optimization algorithms. State-of-the-art using optimization algorithm in the field...
Research Article
A two-stage hybrid classification technique for network intrusion detection system
Jamal Hussain, Samuel Lalmuanawma, Lalrinfela Chhakchhuak
Pages: 863 - 875
Conventional Network intrusion detection system (NIDS) mostly uses individual classification techniques, such system fails to provide the best possible attack detection rate. In this paper, we propose a new two-stage hybrid classification method using Support Vector Machine (SVM) as anomaly detection...
Research Article
A Novel Two-step Feature Selection based Cost Sensitive Myocardial Infarction Prediction Model
Hodjat Hamidi, Atefeh Daraei
Pages: 861 - 872
Considering the rapid growth, complications and treatment side-effects of MI, so using data mining techniques seems necessary. On the other hand, in real-world MI cases are much less compared to healthy cases. The traditional algorithms for imbalanced problems lead to very low Sensitivity, thus, we propose...
Research Article
Locator/Identifier Separation: Comparison and Analysis on the Mitigation of Worm Propagation
Ming Wan, Ying Liu, Jian-qiang Tang, Hong-ke Zhang, Si-yu Lin
Pages: 868 - 877
As a basic prerequisite for worm detection based on computational intelligence in networks with locator/identifier separation, it is well worth considering the influence on worm propagation due to the incoming locator/identifier separation. In this paper, according to the characteristics of locator/identifier...
Research Article
Statistical and Machine Learning Approaches for Clinical Decision on Drug Usage in Diabetes with Reference to Competence and Safeness
S. Appavu Alias Balamurugan, K. R. Saranya, S. Sasikala, G. Chinthana
Pages: 859 - 868
Diabetes is a chronic disease that requires patient-centered treatment. The physician strategy for treatment of diabetes varies from one patient to another. Using the clinical parameters and the evidence of diabetes at various group of people are to be treated with the drugs that provide significant...