Search all articles

+ Advanced search
Search articles within:
8183 articles

Tactics Exploration Framework based on Genetic Programming

Jian Yao, Weiping Wang, Zhifei Li, Yonglin Lei, Qun Li
Pages: 804 - 814
Engagement-level simulation is a quantitative way to evaluate the effectiveness of weapon systems before construction and acquisition, minimizing the risk of investment. Though contractors have built simulation systems with high fidelity models of weapon systems and battlefields, developing competent...

An Intelligent Traffic Light System Using Object Detection and Evolutionary Algorithm for Alleviating Traffic Congestion in Hong Kong

Sin-Chun Ng, Chok-Pang Kwok
Pages: 802 - 809
High traffic flow is a typical characteristic of a mobilized city with a high population. Efficient traffic management is a proper solution to reduce the stress and anxiety associated with driving or traveling. The road users can have better timing for traveling as they will not experience journey delays...

Black Hole: A New Operator for Gravitational Search Algorithm

Mohammad Doraghinejad, Hossein Nezamabadi-pour
Pages: 809 - 826
Inspiring by nature have motivated many researchers in many fields of sciences and engineering. The Gravitational search algorithm (GSA) is a recent created metaheuristic algorithm by using law of gravity and mass interactions. In this paper, a new operator inspired by some of the characteristics of...

An Immune-inspired Adaptive Automated Intrusion Response System Model

Ling-xi Peng, Dong-qing Xie, Ying Gao, Wen-bin Chen, Fu-fang Li, Wu Wen, Jue Wu
Pages: 808 - 815
An immune-inspired adaptive automated intrusion response system model, named as , is proposed. The descriptions of self, non-self, immunocyte, memory detector, mature detector and immature detector of the network transactions, and the realtime network danger evaluation equations are given. Then, the...

Bipolar Fuzzy Graphs with Categorical Properties

Hossein Rashmanlou, Sovan Samanta, Madhumangal Pal, R.A. Borzooei
Pages: 808 - 818
Theoretical concepts of graphs are highly utilized by computer science applications. Especially in research areas of computer science such as data mining, image segmentation, clustering, image capturing and networking. In this paper, we discussed some properties of the –complement of bipolar fuzzy...

A Novel ACO-Based Static Task Scheduling Approach for Multiprocessor Environments

Hamid Reza Boveiri
Pages: 800 - 811
Optimized task scheduling is one of the most important challenges in parallel and distributed systems. In such architectures during compile step, each program is decomposed into the smaller segments so-called tasks. Tasks of a program may be dependent; some tasks may need data generated by the others...

Evaluating Timeliness and Accuracy Trade-offs of Supervised Machine Learning for Adapting Enterprise DRE Systems in Dynamic Environments

Joe Hoffert, Douglas C. Schmidt, Aniruddha Gokhale
Pages: 806 - 816
Several adaptation approaches have been devised to ensure end-to-end quality-of-service (QoS) for enterprise distributed systems in dynamic operating environments. Not all approaches are applicable, however, for the stringent accuracy, timeliness, and development complexity requirements of distributed...

Developing a Mobile Service-Based Customer Relationship Management System Using Fuzzy Logic

Xiaobei Liang, Jianghua Zhang, Binyong Tang
Pages: 805 - 814
Customer relationship management (CRM) has gained lately widespread popularity in many industries. With the development of economy and society, customers are unsatisfied with the stereotyped products. As customers usually describe their demands in nature language, the demands are often conflicting with...

A Novel Memetic Framework for Enhancing Differential Evolution Algorithms via Combination With Alopex Local Search

Miguel Leon, Ning Xiong, Daniel Molina, Francisco Herrera
Pages: 795 - 808
Differential evolution (DE) represents a class of population-based optimization techniques that uses differences of vectors to search for optimal solutions in the search space. However, promising solutions/regions are not adequately exploited by a traditional DE algorithm. Memetic computing has been...

New Kind of MV-Modules

S. Saidi Goraghani, R.A. Borzooei, S.S. Ahn, Y.B. Jun
Pages: 794 - 801
In this paper, by considering the notion of MV-modules, which is the structure that naturally correspond to lu-modules over lu-rings, we investigate some properties of a new kind of MV-modules, that we introduced in Borzooei and Saidi Goraghani, Free MV-modules, J. Intell. Fuzzy Syst. 31 (2016), 151–161...

Multi-objective Optimization of Freight Route Choices in Multimodal Transportation

Kwanjira Kaewfak, Veeris Ammarapala, Van-Nam Huynh
Pages: 794 - 807
Route selection strategy has become the main aspect in the multimodal transportation system. The transport cost and time as well as the inherent risks must be considered when determining a corrective design plan. The selection of a multimodal transportation network route is a complex multi-objective...

ABC and DE Algorithms based Fuzzy Modeling of Flight Data for Speed and Fuel Computation

Aytekin Bagis, Mehmet Konar
Pages: 790 - 802
It is crucial to evaluate the information obtained from the sensors in a fast and accurate manner in air vehicles exposed to many internal and external influences during their flights. The effectiveness and flexibility of the reasoning method comes to the forefront when the pilot or flight control system...

A Modified Support Vector Machine model for Credit Scoring

Xiaoyong Liu, Hui Fu, Weiwei Lin
Pages: 797 - 804
This paper presents a novel quantitative credit scoring model based on support vector machine (SVM) with adaptive genetic algorithm, gr-GA-SVM. In this study, two real world credit datasets in the University of California Irvine Machine Learning Repository are selected for the numerical experiments....

Adaptive Secret Sharing for Color Images

Jia-Hong Li, Wei-Bin Lee, Dengpan Ye, Tzong-Jye Liu, Chuan Qin
Pages: 797 - 805
A secret sharing model can secure a secret over multiple noise-like shadows and remain recoverable despite multiple shadow failures. Even if some of the shadows are compromised, the secret will not be revealed as long as the number of the compromised shadows is smaller than a pre-determined threshold....

Multi-step Generation of Bayesian Networks Models for Software Projects Estimations

Raquel Fuentetaja, Daniel Borrajo, Carlos Linares López, Jorge Ocón
Pages: 796 - 821
Software projects estimations are a crucial component of successful software development. There have been many approaches that deal with this problem by using different kinds of techniques. Most of the successful techniques rely on one shot prediction of some variables, as cost, quality or risk, taking...

Evaluation on Functions of Urban Waterfront Redevelopment Based on Proportional 2-Tuple Linguistic

Ting Da, Yejun Xu
Pages: 796 - 808
As a planning strategy, “connectivity” has been used to promote the functions of Urban Waterfront space to revitalize the city. By analyzing the hierarchy of functions of Urban Waterfront, namely ecological function, social function and context function, an index system of assessing its functions...

Dynamic Incorporation ofWavelet Filter in Fuzzy C-Means for Efficient and Noise-Insensitive MR Image Segmentation

Shang-Ling Jui, Chao Lin, Weichen Xu, Weiyao Lin, Dongmei Wang, Kai Xiao
Pages: 796 - 807
Image intensity in magnetic resonance (MR) images in the presence of noise obeys Rician distribution. The signal-dependent Rician noise makes accurate image segmentation a challenging task. Although existing fuzzy c-means (FCM) variants with local filters improve the segmentation performance, they are...

Maximizing comfort in Assembly Lines with temporal, spatial and ergonomic attributes

Joaquin Bautista, Rocío Alfaro-Pozo, Cristina Batalla-García
Pages: 788 - 799
We aim at maximizing the comfort of operators in mixed-model assembly lines. To achieve this goal, we evaluate two assembly line balancing models: the first that minimizes the maximum ergonomic risk and the second one that minimizes the average absolute deviations of ergonomic risk. Through a case study...

Integrating Grasshopper Optimization Algorithm with Local Search for Solving Data Clustering Problems

M. A. El-Shorbagy, A. Y. Ayoub
Pages: 783 - 793
This paper proposes a hybrid approach for solving data clustering problems. This hybrid approach used one of the swarm intelligence algorithms (SIAs): grasshopper optimization algorithm (GOA) due to its robustness and effectiveness in solving optimization problems. In addition, a local search (LS) strategy...

An Approach to Database Preference Queries Based on an Outranking Relation

Patrick Bosc, Olivier Pivert, Grégory Smits
Pages: 789 - 804
In this paper, we describe an approach to database preference queries based on the notion of outranking, suited to the situation where preferences on different attributes are not commensurable. This model constitutes an alternative to the use of Pareto order whose main drawback is to leave many tuples...

An Efficient Evolutionary Metaheuristic for the Traveling Repairman (Minimum Latency) Problem

Boldizsár Tüű-Szabó, Péter Földesi, László T. Kóczy
Pages: 781 - 793
In this paper we revisit the memetic evolutionary family of metaheuristics, called Discrete Bacterial Memetic Evolutionary Algorithm (DBMEA), whose members combine Furuhashi's Bacterial Evolutionary Algorithm and various discrete local search techniques. These algorithms have proven to be efficient...

WPMSD: A Malicious Script Detection Method Inspired by the Process of Immunoglobulin Secretion

Hui Zhao, Wen Chen, Jie Zeng, Yuanquan Shi, Jian Qin
Pages: 788 - 796
Inspired by the process of immunoglobulin secretion in biological body, we present a Web Page Malicious Script Detection Method (WPMSD). In this paper, Firstly, the basic definitions of artificial immune items are given. Secondly, according to the spreading range of malicious script, the immunoglobulin...

Complex System Analysis on Voter Stochastic System and Jump Time Effective Neural Network of Stock Market

Jun Wang, Huopo Pan, Yiduan Wang, Hongli Niu
Pages: 787 - 795
The finite-range voter system, one of stochastic particle systems, is applied to model a financial price process for further description and investigation of fluctuations of Shanghai Composite Index. For different parameter values of the intensity and the range , we investigate the statistical behaviors...

Duopoly Market Analysis within One-Shot Decision Framework with Asymmetric Possibilistic Information

Peijun Guo, Ruiliang Yan, John Wang
Pages: 786 - 796
In this paper, a newly emerging duopoly market with a short life cycle is analyzed. The partially known information of market is characterized by the possibility distribution of the parameter in the demand function. Since the life cycle of the new product is short, how many products should be produced...

A hybrid gene expression programming algorithm based on orthogonal design

Jie Yang, Jun Ma
Pages: 778 - 787
The last decade has witnessed a great interest on the application of evolutionary algorithms, such as genetic algorithm (GA), particle swarm optimization (PSO) and gene expression programming (GEP), for optimization problems. This paper presents a hybrid algorithm by combining the GEP algorithm and the...

ACO-BTM: A Behavior Trust Model in Cloud Computing Environment

Guoyuan Lin, Yuyu Bie, Min Lei, Kangfeng Zheng
Pages: 785 - 795
Considering trust issues in cloud computing, we analyze the feasibility of adopting ant colony optimization algorithm to simulate trust relationships between entities in the cloud and then propose a novel behavior trust model: ACO-BTM. Trust relationships between entities in cloud computing are dynamic,...

Fuzzy Tools in Recommender Systems: A Survey

Raciel Yera, Luis Martínez
Pages: 776 - 803
Recommender systems are currently successful solutions for facilitating access for online users to the information that fits their preferences and needs in overloaded search spaces. In the last years several methodologies have been developed to improve their performance. This paper is focused on developing...

A Fuzzy-Random Extension of the Lee–Carter Mortality Prediction Model

Jorge de Andrés-Sánchez, Laura González-Vila Puchades
Pages: 775 - 794
The Lee–Carter model is a useful dynamic stochastic model to represent the evolution of central mortality rates throughout time. This model only considers the uncertainty about the coefficient related to the mortality trend over time but not to the age-dependent coefficients. This paper proposes a fuzzy-random...

Multimodel biometrics Fusion based on FAR and FRR using Triangular Norm

Di Wu, Jie Cao
Pages: 779 - 786
Multibiomitric systems are expected to be more accurate due to the presence of multiple evidences, score level fusion is the most commonly used approach in multibiometrics. In this paper, A novel approach is proposed for the fusion at score level fusion based on False Reject Rate(FRR) and False Accept...

VGG16-T: A Novel Deep Convolutional Neural Network with Boosting to Identify Pathological Type of Lung Cancer in Early Stage by CT Images

Shanchen Pang, Fan Meng, Xun Wang, Jianmin Wang, Tao Song, Xingguang Wang, Xiaochun Cheng
Pages: 771 - 780
Lung cancer is known as the highest mortality rate cancer, which needs biopsy to determine its subtype for further treatment. Recently, deep learning has provided powerful tools in lung cancer diagnose and therapeutic regimen making. However, it is still a challenge to identify the pathological type...

Model Reference Adaptive Control in Fuzzy-Based Context-Aware Middleware

Ronnie Cheung, HassanB. Kazemian, Jiannong Cao
Pages: 778 - 795
Owing to the dynamic characteristics of mobile environments, a mobile application needs to adapt to changing contexts to improve performance and resource utilization. We have developed an adaptive middleware infrastructure that simultaneously satisfies the individual needs of applications while maintaining...

BBO optimization of an EKF for interval type-2 fuzzy sliding mode control

Ali Medjghou, Mouna Ghanai, Kheireddine Chafaa
Pages: 770 - 789
In this study, an optimized extended Kalman filter (EKF), and an interval type-2 fuzzy sliding mode control (IT2FSMC) in presence of uncertainties and disturbances are presented for robotic manipulators. The main contribution is the proposal of a novel application of Biogeography-Based Optimization (BBO)...

Improved Ordinary Measure and Image Entropy Theory based intelligent Copy Detection Method

Dengpan Ye, Longfei Ma, Lina Wang, Robert H. Deng
Pages: 777 - 787
Nowadays, more and more multimedia websites appear in social network. It brings some security problems, such as privacy, piracy, disclosure of sensitive contents and so on. Aiming at copyright protection, the copy detection technology of multimedia contents becomes a hot topic. In our previous work,...

Comparing performances and effectiveness of machine learning classifiers in detecting financial accounting fraud for Turkish SMEs

Serhan Hamal, Ozlem Senvar
Pages: 769 - 782
Turkish small- and medium-sized enterprises (SMEs) are exposed to fraud risks and creditor banks are facing big challenges to deal with financial accounting fraud. This study explores effectiveness of machine learning classifiers in detecting financial accounting fraud assessing financial statements...

A Fuzzy-Rule-Based Model for Handling Contextual Preference Queries

Allel Hadjali, Amine Mokhtari, Olivier Pivert
Pages: 775 - 788
Users’ preferences have traditionally been exploited in query personalization to better serve their information needs. Most of the time, user preferences depend on context, that is, they may have different values depending on the situation of the user. In this paper, we propose a fuzzy-rule-based...

Cell formation and task scheduling considering multi-functional resource and part movement using hybrid simulated annealing

Chunfeng Liu, Jufeng Wang
Pages: 765 - 777
This paper designs a non-linear integer mathematical model for the cellular manufacturing system (CMS) with dual-resource constrained setting. The multi-functional machines and the multi-skilled workers need to be grouped and assigned to the cells. Moreover, each operation of the parts has different...

Extended 2-tuple linguistic hybrid aggregation operators and their application to multi-attribute group decision making

Fanyong Meng, Jie Tang
Pages: 771 - 784
The aim of this paper is to develop some new 2-tuple linguistic hybrid aggregation operators, which are called the extended 2-tuple linguistic hybrid arithmetical weighted (ET-LHAW) operator, the extended 2-tuple linguistic hybrid geometric mean (ET-LHGM) operator, the induced ET-LHAW (IET-LHAW) operator...

Clustering with Instance and Attribute Level Side Information

Jinlong Wang, Shunyao Wu, Gang Li
Pages: 770 - 785
Selecting a suitable proximity measure is one of the fundamental tasks in clustering. How to effectively utilize all available side information, including the instance level information in the form of pair-wise constraints, and the attribute level information in the form of attribute order preferences,...

The Use of Marketing Decision Support Systems for New Product Design: A Review

J. Francisco Figueroa-Perez, Juan C. Leyva-Lopez, Luis C. Santillan, Edgar O. Pérez Contreras, Pedro J. Sánchez
Pages: 761 - 774
Product design is an important phase of the new product development process and one of the most crucial decisions in marketing. In the latest two decades, a significant number of marketing decision support systems (MDSSs) for automating new product design activities have been reported in the literature...

Application of Fuzzy Comprehensive Evaluation Method in Trust Quantification

Shunan Ma, Jingsha He, Shuai Xunbo
Pages: 768 - 776
Trust can play an important role for the sharing of resources and information in open network environments. Trust quantification is thus an important issue in dynamic trust management. By considering the fuzziness and uncertainty of trust, in this paper, we propose a fuzzy comprehensive evaluation method...

The Challenge of Non-Technical Loss Detection Using Artificial Intelligence: A Survey

Patrick Glauner, Jorge Augusto Meira, Petko Valtchev, Radu State, Franck Bettinger
Pages: 760 - 775
Detection of non-technical losses (NTL) which include electricity theft, faulty meters or billing errors has attracted increasing attention from researchers in electrical engineering and computer science. NTLs cause significant harm to the economy, as in some countries they may range up to 40% of the...

Consensus Reaching Process in the Two-Rank Group Decision-Making with Heterogeneous Preference Information

Huali Tang, Shoufu Wan, Cong-Cong Li, Haiming Liang, Yucheng Dong
Pages: 758 - 768
This paper proposes a novel consensus reaching process (CRP) for the two-rank group decision-making (GDM) problems with heterogeneous preference information. The methods for deriving the individual and collective preference vector are provided. And the individual and collective two-rank vectors are obtained....

An Efficient Clustering Algorithm for Mixed Dataset of Postoperative Surgical Records

Hemant Petwal, Rinkle Rani
Pages: 757 - 770
In data mining, data clustering is a prevalent data analysis methodology that organizes unlabeled data points into distinct clusters based on a similarity measure. In recent years, several clustering algorithms found, dependent on a predefined number of clusters and centered around the dataset with either...

Unsupervised Clustering for Fault Diagnosis in Nuclear Power Plant Components

Piero Baraldi, Francesco Di Maio, Enrico Zio
Pages: 764 - 777
The development of empirical classification models for fault diagnosis usually requires a process of training based on a set of examples. In practice, data collected during plant operation contain signals measured in faulty conditions, but they are ‘unlabeled’, i.e., the indication of the...

On Modeling the Behavior of Comparators for Complex Fuzzy Objects in a Fuzzy Object-Relational Database Management System

JuanM. Medina, CarlosD. Barranco, JesúsR. Campaña, Sergio Jaime-Castillo
Pages: 762 - 774
This paper proposes a parameterized definition for fuzzy comparators on complex fuzzy datatypes like fuzzy collections with conjunctive semantics and fuzzy objects. This definition and its implementation on a Fuzzy Object-Relational Database Management System (FORDBMS) provides the designer with a powerful...

An effective Weighted Multi-class Least Squares Twin Support Vector Machine for Imbalanced data classification

Divya Tomar, Sonali Agarwal
Pages: 761 - 778
The performance of machine learning algorithms is affected by the imbalanced distribution of data among classes. This issue is crucial in various practical problem domains, for example, in medical diagnosis, network intrusion, fraud detection etc. Most efforts so far are mainly focused upon binary class...

Uncertain Bonferroni Mean Operators

Zeshui Xu
Pages: 761 - 769
The Bonferroni mean is a traditional mean type aggregation operator bounded by the max and min operators, which is suitable to aggregate the crisp data. In this paper, we consider situations where the input data are interval numbers. We develop some uncertain Bonferroni mean operators, and then combine...

A Reputation Evaluation Approach Based on Fuzzy Relation

Meiyu Fang, Xiaolin Zheng, Deren Chen
Pages: 759 - 767
In traditional models, fuzzy sets are used to describe trust degree and evaluate reputation for vague words. But in some practical applications, the determination of membership functions associated with vague concepts is difficult or impossible. This paper builds a reputation computing model based on...