Search all articles
8183 articles
Research Article
Tactics Exploration Framework based on Genetic Programming
Jian Yao, Weiping Wang, Zhifei Li, Yonglin Lei, Qun Li
Pages: 804 - 814
Engagement-level simulation is a quantitative way to evaluate the effectiveness of weapon systems before construction and acquisition, minimizing the risk of investment. Though contractors have built simulation systems with high fidelity models of weapon systems and battlefields, developing competent...
Editorial
Industry Applications of Computational Intelligence
Runliang Dou, Chen-Fu Chien, Imed Kacem, Chia-Yu Hsu
Pages: 803 - 804
Research Article
An Intelligent Traffic Light System Using Object Detection and Evolutionary Algorithm for Alleviating Traffic Congestion in Hong Kong
Sin-Chun Ng, Chok-Pang Kwok
Pages: 802 - 809
High traffic flow is a typical characteristic of a mobilized city with a high population. Efficient traffic management is a proper solution to reduce the stress and anxiety associated with driving or traveling. The road users can have better timing for traveling as they will not experience journey delays...
Research Article
Black Hole: A New Operator for Gravitational Search Algorithm
Mohammad Doraghinejad, Hossein Nezamabadi-pour
Pages: 809 - 826
Inspiring by nature have motivated many researchers in many fields of sciences and engineering. The Gravitational search algorithm (GSA) is a recent created metaheuristic algorithm by using law of gravity and mass interactions. In this paper, a new operator inspired by some of the characteristics of...
Research Article
An Immune-inspired Adaptive Automated Intrusion Response System Model
Ling-xi Peng, Dong-qing Xie, Ying Gao, Wen-bin Chen, Fu-fang Li, Wu Wen, Jue Wu
Pages: 808 - 815
An immune-inspired adaptive automated intrusion response system model, named as , is proposed. The descriptions of self, non-self, immunocyte, memory detector, mature detector and immature detector of the network transactions, and the realtime network danger evaluation equations are given. Then, the...
Research Article
Bipolar Fuzzy Graphs with Categorical Properties
Hossein Rashmanlou, Sovan Samanta, Madhumangal Pal, R.A. Borzooei
Pages: 808 - 818
Theoretical concepts of graphs are highly utilized by computer science applications. Especially in research areas of computer science such as data mining, image segmentation, clustering, image capturing and networking. In this paper, we discussed some properties of the –complement of bipolar fuzzy...
Research Article
A Novel ACO-Based Static Task Scheduling Approach for Multiprocessor Environments
Hamid Reza Boveiri
Pages: 800 - 811
Optimized task scheduling is one of the most important challenges in parallel and distributed systems. In such architectures during compile step, each program is decomposed into the smaller segments so-called tasks. Tasks of a program may be dependent; some tasks may need data generated by the others...
Research Article
Evaluating Timeliness and Accuracy Trade-offs of Supervised Machine Learning for Adapting Enterprise DRE Systems in Dynamic Environments
Joe Hoffert, Douglas C. Schmidt, Aniruddha Gokhale
Pages: 806 - 816
Several adaptation approaches have been devised to ensure end-to-end quality-of-service (QoS) for enterprise distributed systems in dynamic operating environments. Not all approaches are applicable, however, for the stringent accuracy, timeliness, and development complexity requirements of distributed...
Editorial
Foreword: Computational Intelligence for Network Control and Security
Yixian Yang, Fuji Ren
Pages: 805 - 807
Research Article
Developing a Mobile Service-Based Customer Relationship Management System Using Fuzzy Logic
Xiaobei Liang, Jianghua Zhang, Binyong Tang
Pages: 805 - 814
Customer relationship management (CRM) has gained lately widespread popularity in many industries. With the development of economy and society, customers are unsatisfied with the stereotyped products. As customers usually describe their demands in nature language, the demands are often conflicting with...
Research Article
A Novel Memetic Framework for Enhancing Differential Evolution Algorithms via Combination With Alopex Local Search
Miguel Leon, Ning Xiong, Daniel Molina, Francisco Herrera
Pages: 795 - 808
Differential evolution (DE) represents a class of population-based optimization techniques that uses differences of vectors to search for optimal solutions in the search space. However, promising solutions/regions are not adequately exploited by a traditional DE algorithm. Memetic computing has been...
Research Article
New Kind of MV-Modules
S. Saidi Goraghani, R.A. Borzooei, S.S. Ahn, Y.B. Jun
Pages: 794 - 801
In this paper, by considering the notion of MV-modules, which is the structure that naturally correspond to lu-modules over lu-rings, we investigate some properties of a new kind of MV-modules, that we introduced in Borzooei and Saidi Goraghani, Free MV-modules, J. Intell. Fuzzy Syst. 31 (2016), 151–161...
Research Article
Multi-objective Optimization of Freight Route Choices in Multimodal Transportation
Kwanjira Kaewfak, Veeris Ammarapala, Van-Nam Huynh
Pages: 794 - 807
Route selection strategy has become the main aspect in the multimodal transportation system. The transport cost and time as well as the inherent risks must be considered when determining a corrective design plan. The selection of a multimodal transportation network route is a complex multi-objective...
Research Article
ABC and DE Algorithms based Fuzzy Modeling of Flight Data for Speed and Fuel Computation
Aytekin Bagis, Mehmet Konar
Pages: 790 - 802
It is crucial to evaluate the information obtained from the sensors in a fast and accurate manner in air vehicles exposed to many internal and external influences during their flights. The effectiveness and flexibility of the reasoning method comes to the forefront when the pilot or flight control system...
Research Article
A Modified Support Vector Machine model for Credit Scoring
Xiaoyong Liu, Hui Fu, Weiwei Lin
Pages: 797 - 804
This paper presents a novel quantitative credit scoring model based on support vector machine (SVM) with adaptive genetic algorithm, gr-GA-SVM. In this study, two real world credit datasets in the University of California Irvine Machine Learning Repository are selected for the numerical experiments....
Research Article
Adaptive Secret Sharing for Color Images
Jia-Hong Li, Wei-Bin Lee, Dengpan Ye, Tzong-Jye Liu, Chuan Qin
Pages: 797 - 805
A secret sharing model can secure a secret over multiple noise-like shadows and remain recoverable despite multiple shadow failures. Even if some of the shadows are compromised, the secret will not be revealed as long as the number of the compromised shadows is smaller than a pre-determined threshold....
Research Article
Multi-step Generation of Bayesian Networks Models for Software Projects Estimations
Raquel Fuentetaja, Daniel Borrajo, Carlos Linares López, Jorge Ocón
Pages: 796 - 821
Software projects estimations are a crucial component of successful software development. There have been many approaches that deal with this problem by using different kinds of techniques. Most of the successful techniques rely on one shot prediction of some variables, as cost, quality or risk, taking...
Research Article
Evaluation on Functions of Urban Waterfront Redevelopment Based on Proportional 2-Tuple Linguistic
Ting Da, Yejun Xu
Pages: 796 - 808
As a planning strategy, “connectivity” has been used to promote the functions of Urban Waterfront space to revitalize the city. By analyzing the hierarchy of functions of Urban Waterfront, namely ecological function, social function and context function, an index system of assessing its functions...
Research Article
Dynamic Incorporation ofWavelet Filter in Fuzzy C-Means for Efficient and Noise-Insensitive MR Image Segmentation
Shang-Ling Jui, Chao Lin, Weichen Xu, Weiyao Lin, Dongmei Wang, Kai Xiao
Pages: 796 - 807
Image intensity in magnetic resonance (MR) images in the presence of noise obeys Rician distribution. The signal-dependent Rician noise makes accurate image segmentation a challenging task. Although existing fuzzy c-means (FCM) variants with local filters improve the segmentation performance, they are...
Research Article
Maximizing comfort in Assembly Lines with temporal, spatial and ergonomic attributes
Joaquin Bautista, Rocío Alfaro-Pozo, Cristina Batalla-García
Pages: 788 - 799
We aim at maximizing the comfort of operators in mixed-model assembly lines. To achieve this goal, we evaluate two assembly line balancing models: the first that minimizes the maximum ergonomic risk and the second one that minimizes the average absolute deviations of ergonomic risk. Through a case study...
Research Article
Integrating Grasshopper Optimization Algorithm with Local Search for Solving Data Clustering Problems
M. A. El-Shorbagy, A. Y. Ayoub
Pages: 783 - 793
This paper proposes a hybrid approach for solving data clustering problems. This hybrid approach used one of the swarm intelligence algorithms (SIAs): grasshopper optimization algorithm (GOA) due to its robustness and effectiveness in solving optimization problems. In addition, a local search (LS) strategy...
Research Article
An Approach to Database Preference Queries Based on an Outranking Relation
Patrick Bosc, Olivier Pivert, Grégory Smits
Pages: 789 - 804
In this paper, we describe an approach to database preference queries based on the notion of outranking, suited to the situation where preferences on different attributes are not commensurable. This model constitutes an alternative to the use of Pareto order whose main drawback is to leave many tuples...
Research Article
An Efficient Evolutionary Metaheuristic for the Traveling Repairman (Minimum Latency) Problem
Boldizsár Tüű-Szabó, Péter Földesi, László T. Kóczy
Pages: 781 - 793
In this paper we revisit the memetic evolutionary family of metaheuristics, called Discrete Bacterial Memetic Evolutionary Algorithm (DBMEA), whose members combine Furuhashi's Bacterial Evolutionary Algorithm and various discrete local search techniques. These algorithms have proven to be efficient...
Research Article
WPMSD: A Malicious Script Detection Method Inspired by the Process of Immunoglobulin Secretion
Hui Zhao, Wen Chen, Jie Zeng, Yuanquan Shi, Jian Qin
Pages: 788 - 796
Inspired by the process of immunoglobulin secretion in biological body, we present a Web Page Malicious Script Detection Method (WPMSD). In this paper, Firstly, the basic definitions of artificial immune items are given. Secondly, according to the spreading range of malicious script, the immunoglobulin...
Research Article
Complex System Analysis on Voter Stochastic System and Jump Time Effective Neural Network of Stock Market
Jun Wang, Huopo Pan, Yiduan Wang, Hongli Niu
Pages: 787 - 795
The finite-range voter system, one of stochastic particle systems, is applied to model a financial price process for further description and investigation of fluctuations of Shanghai Composite Index. For different parameter values of the intensity and the range , we investigate the statistical behaviors...
Research Article
Duopoly Market Analysis within One-Shot Decision Framework with Asymmetric Possibilistic Information
Peijun Guo, Ruiliang Yan, John Wang
Pages: 786 - 796
In this paper, a newly emerging duopoly market with a short life cycle is analyzed. The partially known information of market is characterized by the possibility distribution of the parameter in the demand function. Since the life cycle of the new product is short, how many products should be produced...
Research Article
A hybrid gene expression programming algorithm based on orthogonal design
Jie Yang, Jun Ma
Pages: 778 - 787
The last decade has witnessed a great interest on the application of evolutionary algorithms, such as genetic algorithm (GA), particle swarm optimization (PSO) and gene expression programming (GEP), for optimization problems. This paper presents a hybrid algorithm by combining the GEP algorithm and the...
Research Article
ACO-BTM: A Behavior Trust Model in Cloud Computing Environment
Guoyuan Lin, Yuyu Bie, Min Lei, Kangfeng Zheng
Pages: 785 - 795
Considering trust issues in cloud computing, we analyze the feasibility of adopting ant colony optimization algorithm to simulate trust relationships between entities in the cloud and then propose a novel behavior trust model: ACO-BTM. Trust relationships between entities in cloud computing are dynamic,...
Review Article
Fuzzy Tools in Recommender Systems: A Survey
Raciel Yera, Luis Martínez
Pages: 776 - 803
Recommender systems are currently successful solutions for facilitating access for online users to the information that fits their preferences and needs in overloaded search spaces. In the last years several methodologies have been developed to improve their performance. This paper is focused on developing...
Research Article
A Fuzzy-Random Extension of the Lee–Carter Mortality Prediction Model
Jorge de Andrés-Sánchez, Laura González-Vila Puchades
Pages: 775 - 794
The Lee–Carter model is a useful dynamic stochastic model to represent the evolution of central mortality rates throughout time. This model only considers the uncertainty about the coefficient related to the mortality trend over time but not to the age-dependent coefficients. This paper proposes a fuzzy-random...
Research Article
Multimodel biometrics Fusion based on FAR and FRR using Triangular Norm
Di Wu, Jie Cao
Pages: 779 - 786
Multibiomitric systems are expected to be more accurate due to the presence of multiple evidences, score level fusion is the most commonly used approach in multibiometrics. In this paper, A novel approach is proposed for the fusion at score level fusion based on False Reject Rate(FRR) and False Accept...
Research Article
VGG16-T: A Novel Deep Convolutional Neural Network with Boosting to Identify Pathological Type of Lung Cancer in Early Stage by CT Images
Shanchen Pang, Fan Meng, Xun Wang, Jianmin Wang, Tao Song, Xingguang Wang, Xiaochun Cheng
Pages: 771 - 780
Lung cancer is known as the highest mortality rate cancer, which needs biopsy to determine its subtype for further treatment. Recently, deep learning has provided powerful tools in lung cancer diagnose and therapeutic regimen making. However, it is still a challenge to identify the pathological type...
Research Article
Model Reference Adaptive Control in Fuzzy-Based Context-Aware Middleware
Ronnie Cheung, HassanB. Kazemian, Jiannong Cao
Pages: 778 - 795
Owing to the dynamic characteristics of mobile environments, a mobile application needs to adapt to changing contexts to improve performance and resource utilization. We have developed an adaptive middleware infrastructure that simultaneously satisfies the individual needs of applications while maintaining...
Research Article
BBO optimization of an EKF for interval type-2 fuzzy sliding mode control
Ali Medjghou, Mouna Ghanai, Kheireddine Chafaa
Pages: 770 - 789
In this study, an optimized extended Kalman filter (EKF), and an interval type-2 fuzzy sliding mode control (IT2FSMC) in presence of uncertainties and disturbances are presented for robotic manipulators. The main contribution is the proposal of a novel application of Biogeography-Based Optimization (BBO)...
Research Article
Improved Ordinary Measure and Image Entropy Theory based intelligent Copy Detection Method
Dengpan Ye, Longfei Ma, Lina Wang, Robert H. Deng
Pages: 777 - 787
Nowadays, more and more multimedia websites appear in social network. It brings some security problems, such as privacy, piracy, disclosure of sensitive contents and so on. Aiming at copyright protection, the copy detection technology of multimedia contents becomes a hot topic. In our previous work,...
Research Article
Comparing performances and effectiveness of machine learning classifiers in detecting financial accounting fraud for Turkish SMEs
Serhan Hamal, Ozlem Senvar
Pages: 769 - 782
Turkish small- and medium-sized enterprises (SMEs) are exposed to fraud risks and creditor banks are facing big challenges to deal with financial accounting fraud. This study explores effectiveness of machine learning classifiers in detecting financial accounting fraud assessing financial statements...
Research Article
A Fuzzy-Rule-Based Model for Handling Contextual Preference Queries
Allel Hadjali, Amine Mokhtari, Olivier Pivert
Pages: 775 - 788
Users’ preferences have traditionally been exploited in query personalization to better serve their information needs. Most of the time, user preferences depend on context, that is, they may have different values depending on the situation of the user. In this paper, we propose a fuzzy-rule-based...
Research Article
Cell formation and task scheduling considering multi-functional resource and part movement using hybrid simulated annealing
Chunfeng Liu, Jufeng Wang
Pages: 765 - 777
This paper designs a non-linear integer mathematical model for the cellular manufacturing system (CMS) with dual-resource constrained setting. The multi-functional machines and the multi-skilled workers need to be grouped and assigned to the cells. Moreover, each operation of the parts has different...
Research Article
Extended 2-tuple linguistic hybrid aggregation operators and their application to multi-attribute group decision making
Fanyong Meng, Jie Tang
Pages: 771 - 784
The aim of this paper is to develop some new 2-tuple linguistic hybrid aggregation operators, which are called the extended 2-tuple linguistic hybrid arithmetical weighted (ET-LHAW) operator, the extended 2-tuple linguistic hybrid geometric mean (ET-LHGM) operator, the induced ET-LHAW (IET-LHAW) operator...
Research Article
Clustering with Instance and Attribute Level Side Information
Jinlong Wang, Shunyao Wu, Gang Li
Pages: 770 - 785
Selecting a suitable proximity measure is one of the fundamental tasks in clustering. How to effectively utilize all available side information, including the instance level information in the form of pair-wise constraints, and the attribute level information in the form of attribute order preferences,...
Review Article
The Use of Marketing Decision Support Systems for New Product Design: A Review
J. Francisco Figueroa-Perez, Juan C. Leyva-Lopez, Luis C. Santillan, Edgar O. Pérez Contreras, Pedro J. Sánchez
Pages: 761 - 774
Product design is an important phase of the new product development process and one of the most crucial decisions in marketing. In the latest two decades, a significant number of marketing decision support systems (MDSSs) for automating new product design activities have been reported in the literature...
Research Article
Application of Fuzzy Comprehensive Evaluation Method in Trust Quantification
Shunan Ma, Jingsha He, Shuai Xunbo
Pages: 768 - 776
Trust can play an important role for the sharing of resources and information in open network environments. Trust quantification is thus an important issue in dynamic trust management. By considering the fuzziness and uncertainty of trust, in this paper, we propose a fuzzy comprehensive evaluation method...
Review Article
The Challenge of Non-Technical Loss Detection Using Artificial Intelligence: A Survey
Patrick Glauner, Jorge Augusto Meira, Petko Valtchev, Radu State, Franck Bettinger
Pages: 760 - 775
Detection of non-technical losses (NTL) which include electricity theft, faulty meters or billing errors has attracted increasing attention from researchers in electrical engineering and computer science. NTLs cause significant harm to the economy, as in some countries they may range up to 40% of the...
Research Article
Consensus Reaching Process in the Two-Rank Group Decision-Making with Heterogeneous Preference Information
Huali Tang, Shoufu Wan, Cong-Cong Li, Haiming Liang, Yucheng Dong
Pages: 758 - 768
This paper proposes a novel consensus reaching process (CRP) for the two-rank group decision-making (GDM) problems with heterogeneous preference information. The methods for deriving the individual and collective preference vector are provided. And the individual and collective two-rank vectors are obtained....
Research Article
An Efficient Clustering Algorithm for Mixed Dataset of Postoperative Surgical Records
Hemant Petwal, Rinkle Rani
Pages: 757 - 770
In data mining, data clustering is a prevalent data analysis methodology that organizes unlabeled data points into distinct clusters based on a similarity measure. In recent years, several clustering algorithms found, dependent on a predefined number of clusters and centered around the dataset with either...
Research Article
Unsupervised Clustering for Fault Diagnosis in Nuclear Power Plant Components
Piero Baraldi, Francesco Di Maio, Enrico Zio
Pages: 764 - 777
The development of empirical classification models for fault diagnosis usually requires a process of training based on a set of examples. In practice, data collected during plant operation contain signals measured in faulty conditions, but they are ‘unlabeled’, i.e., the indication of the...
Research Article
On Modeling the Behavior of Comparators for Complex Fuzzy Objects in a Fuzzy Object-Relational Database Management System
JuanM. Medina, CarlosD. Barranco, JesúsR. Campaña, Sergio Jaime-Castillo
Pages: 762 - 774
This paper proposes a parameterized definition for fuzzy comparators on complex fuzzy datatypes like fuzzy collections with conjunctive semantics and fuzzy objects. This definition and its implementation on a Fuzzy Object-Relational Database Management System (FORDBMS) provides the designer with a powerful...
Research Article
An effective Weighted Multi-class Least Squares Twin Support Vector Machine for Imbalanced data classification
Divya Tomar, Sonali Agarwal
Pages: 761 - 778
The performance of machine learning algorithms is affected by the imbalanced distribution of data among classes. This issue is crucial in various practical problem domains, for example, in medical diagnosis, network intrusion, fraud detection etc. Most efforts so far are mainly focused upon binary class...
Research Article
Uncertain Bonferroni Mean Operators
Zeshui Xu
Pages: 761 - 769
The Bonferroni mean is a traditional mean type aggregation operator bounded by the max and min operators, which is suitable to aggregate the crisp data. In this paper, we consider situations where the input data are interval numbers. We develop some uncertain Bonferroni mean operators, and then combine...
Research Article
A Reputation Evaluation Approach Based on Fuzzy Relation
Meiyu Fang, Xiaolin Zheng, Deren Chen
Pages: 759 - 767
In traditional models, fuzzy sets are used to describe trust degree and evaluate reputation for vague words. But in some practical applications, the determination of membership functions associated with vague concepts is difficult or impossible. This paper builds a reputation computing model based on...