Search all articles

+ Advanced search
Search articles within:
8183 articles

A Dynamic Verification Model based on Information Flow Constraint

Dan Wang, Yan Lu, Lihua Fu, Wenbing Zhao
Pages: 712 - 723
After analyzing the common attacks for some software systems, a dynamic software behavior verification model related with the unchecked input data based on software analysis and dynamic slicing technology is proposed. Regarding a statement as a basic analysis unit, and the information flow as the main...

A note on the rates of uniform approximation of fuzzy systems

Hoang Viet Long
Pages: 712 - 727
For the fuzzy systems with the kernel-shaped fuzzy sets of if part, we estimate the rates of the uniform approximation for continuous functions. Results are given associatively with the rates of convergence of the sequence (logk/k)a.

Performance Based Clustering for Benchmarking of Container Ports: an Application of Dea and Cluster Analysis Technique

Jie Wu, Liang Liang, Malin Song
Pages: 709 - 722
The operational performance of container ports has received more and more attentions in both academic and practitioner circles, the performance evaluation and process improvement of container ports have also been the focus of several studies. In this paper, Data Envelopment Analysis (DEA), an effective...

Granule Description of Object (Attribute)-Oriented Linguistic Concept Lattice Based on Dominance Relation

Hui Cui, Ansheng Deng, Chunmei Chang, Hongyue Diao, Li Zou
Pages: 701 - 714
Concept lattice, as an effective tool for knowledge acquisition and data analysis, has been successfully used in many fields. Aiming at the problem of groups for uncertain information in the linguistic environment, this paper mainly focuses on the granule description with linguistic concept lattice from...

An improved comprehensive evaluation model and its application

Wenyi Zeng, Shuang Feng
Pages: 706 - 714
Since comprehensive evaluation model was introduced by Wang in 1984, the comprehensive evaluation model has many successful applications in real life. But some examples show the inefficiency of the comprehensive evaluation model. In order to process these problems, in this paper, we introduce two concepts...

Using Recurrent Neural Networks for Part-of-Speech Tagging and Subject and Predicate Classification in a Sentence

David Muñoz-Valero, Luis Rodriguez-Benitez, Luis Jimenez-Linares, Juan Moreno-Garcia
Pages: 706 - 716
In natural language processing the use of deep learning techniques is very common. In this paper, a technique to identify the subject and predicate in a sentence is introduced. To achieve this, the proposed technique completes POS tagging identifying in a later stage the subject and the predicate in...

Fuzzy Multi-Objective Lattice Order Decision Approach for Preference Ranking in Conflict Analysis

Qiang Guo, Wenyi Wang
Pages: 698 - 708
Based on conflict analysis and lattice order theory, this paper integrates fuzziness and non-transitivity of the preference, exclusiveness and incommensurability of the objective into conflict analysis, proposes a new fuzzy multi-objective lattice order decision method for preference ranking in conflict...

Individual Heterogeneous Learning with Global Centrality in Prisoner Dilemma Evolutionary Game on Complex Network

Zundong Zhang, Yifang Zhang, William Danziger
Pages: 698 - 705
The influence of individual heterogeneity on the evolutionary game has been studied extensively in recent years. Whereas many theoretical studies have found that the heterogeneous learning ability effects cooperation rate, the individual learning ability in networks is still not well understood. It is...

3D Model Generation and Reconstruction Using Conditional Generative Adversarial Network

Haisheng Li, Yanping Zheng, Xiaoqun Wu, Qiang Cai
Pages: 697 - 705
Generative adversarial network (GANs) has significant progress in 3D model generation and reconstruction recently years. GANs can generate 3D models by sampling from uniform noise distribution. But they generate randomly and are often not easy to control. To address this problem, we add the class information...

Trigonal Toda Lattice Equation

Shigeki Matsutani
Pages: 697 - 704
In this article, we give the trigonal Toda lattice equation, −12d3dt3qℓ(t)=eqℓ+1(t)+eqℓ+ζ3(t)++eqℓ+ζ32(t)−3eqℓ(t), for a lattice point ℓ ∈ 𝕑[ζ3] as a directed 6-regular graph where ζ3=e2π−1/3, and its elliptic solution for the curve y(y − s) = x 3, (s ≠ 0).

Weighted Entropy Measure: A New Measure of Information with its Properties in Reliability Theory and Stochastic Orders

M. Ramadan
Pages: 703 - 718
The weighted entropy measure is a germane dynamic measure of uncertainty in reliability and survival studies. In this paper, the new results of weighted entropies with some characterizations are provided. Furthermore, we have presented some results for weighted entropy residual and weighted past residual...

A Hesitant Fuzzy Linguistic TODIM Method Based on a Score Function

Cuiping Wei, Zhiliang Ren, Rosa M. Rodríguez
Pages: 701 - 712
Hesitant fuzzy linguistic term sets (HFLTSs) are very useful for dealing with the situations in which the decision makers hesitate among several linguistic terms to assess an alternative. Some multi-criteria decision-making (MCDM) methods have been developed to deal with HFLTSs. These methods are derived...

Overcoming Motor-Rate Limitations in Online Synchronized Robot Dancing

CatarinaB. Santiago, JoaoL. Oliveira, LuisP. Reis, Armando Sousa, Fabien Gouyon
Pages: 700 - 713
We propose an online sensorimotor architecture for controlling a low-cost humanoid robot to perform dance movements synchronized with musical stimuli. The proposed architecture attempts to overcome the robot's motor constraints by adjusting the velocity of its actuators and inter-changing the attended...

REFLECTING THE PERSPECTIVES OF MULTIPLE AGENTS IN DISTRIBUTED REASONING FOR CONTEXT-AWARE SERVICE

Seungwok Han, Hee Yong Youn
Pages: 700 - 711
Effective manipulation of context is very important in providing the context-aware services. In recent years, a variety of context models have been proposed to properly handle the key aspects of the context, while focusing on scenario-based acquisition, management, and representation of context. However,...

MADL: A Multilevel Architecture of Deep Learning

Samir Brahim Belhaouari, Hafsa Raissouli
Pages: 693 - 700
Deep neural networks (DNN) are a powerful tool that is used in many real-life applications. Solving complicated real-life problems requires deeper and larger networks, and hence, a larger number of parameters to optimize. This paper proposes a multilevel architecture of deep learning (MADL) that breaks...

A Genetic Algorithm with New Local Operators for Multiple Traveling Salesman Problems

Kin-Ming Lo, Wei-Ying Yi, Pak-Kan Wong, Kwong-Sak Leung, Yee Leung, Sui-Tung Mak
Pages: 692 - 705
Multiple Traveling Salesman Problem (MTSP) is able to model and solve various real-life applications such as multiple scheduling, multiple vehicle routing and multiple path planning problems, etc. While Traveling Salesman Problem (TSP) focuses on searching a path of minimum traveling distance to visit...

Analysis of Brand Image Effect on Advertising Awareness Using A Neuro-Fuzzy and A Neural Network Prediction Models

Ali Fahmi, Kemal Burc Ulengin, Cengiz Kahraman
Pages: 690 - 710
Almost all the worldwide and nationwide companies utilize advertising to increase their sales volume and profit. These companies pay millions of dollars to reach consumers and announce their products or services. This forces companies to evaluate advertising effects and check whether ads meet companys...

A Synthesizing Effect-Based Solution Method for Stochastic Rough Multi-objective Programming Problems

Lei Zhou, Guoshan Zhang, Fachao Li
Pages: 696 - 705
Multi-objective programming with uncertain information has been widely applied in modeling of industrial produce and logistic distribution problems. Usually the expectation value model and chance-constrained model as solution models are used to deal with such uncertain programming. In this paper, we...

An Application of Value Analysis for Lean Healthcare Management in an Emergency Department

Burak Efe, Ömer Faruk Efe
Pages: 689 - 697
This paper investigated the value concept of lean management to improve the performance of an emergency department (ED). This paper aims to analyze on patient perceived value (PPV) to apply lean management principles in the ED. The DEMATEL (Decision Making Trial and Evaluation Laboratory) method has...

Gambier lattices and other linearisable systems

Basil Grammaticos, Alfred Ramani
Pages: 688 - 696
We propose two different appraoches to extending the Gambier mapping to a two-dimensional lattice equation. A first approach relies on a hypothesis of separate evolutions in each of the two directions. We show that known equations like the Startsev-Garifullin-Yamilov equation, the Hietarinta equation,...

A Note on “A Lexicographic Method for Matrix Games with Payoffs of Triangular Intuitionistic Fuzzy Numbers”

Tina Verma, Amit Kumar
Pages: 690 - 700
Nan et al. [J.-X. Nan, D.-F. Li and M.-J. Zhang, A lexicographic method for matrix games with payoffs of triangular intuitionistic fuzzy numbers, International Journal of Computational Intelligence Systems 3(3) (2010) 280-289] pointed out that there is no method in the literature to find the solution...

A Novel Density Peaks Clustering Algorithm Based on Local Reachability Density

Hanqing Wang, Bin Zhou, Jianyong Zhang, Ruixue Cheng
Pages: 690 - 697
A novel clustering algorithm named local reachability density peaks clustering (LRDPC) which uses local reachability density to improve the performance of the density peaks clustering algorithm (DPC) is proposed in this paper. This algorithm enhances robustness by removing the cutoff distance dc which...

On the Equilibrium Configuration of the BC-type Ruijsenaars-Schneider System

Jan F. Van Diejen
Pages: 689 - 696
It is shown that the ground-state equilibrium configurations of the trigonometric Btype Ruijsenaars-Schneider systems are given by the zeros of Askey-Wilson polynomals.

Uncertainty and Preference Modelling for Multiple Criteria Vehicle Evaluation

Qiuping Yang, Xinlian Xie, Dong-Ling Xu, Jian-Bo Yang, Anil Kumar Maddulapalli
Pages: 688 - 708
A general framework for vehicle assessment is proposed based on both mass survey information and the evidential reasoning (ER) approach. Several methods for uncertainty and preference modeling are developed within the framework, including the measurement of uncertainty caused by missing information,...

Quasi-Copulas, Copulas and Fuzzy Implicators

Radko Mesiar, Anna Kolesárová
Pages: 681 - 689
In this paper, we study relations between fuzzy implicators and some kinds of fuzzy conjunctors, in particular, quasi-copulas and copulas. We show that there is a one-to-one correspondence between the classes of all quasi-copulas and 1-Lipschitz fuzzy implicators. A similar relation holds for copulas...

On the Lindley Record Values and Associated Inference

A. Fallah, A. Asgharzadeh, S.M.T.K. MirMostafaee
Pages: 686 - 702
In this paper, we discuss the record values arising from the Lindley distribution. We compute the means, variances and covariances of the record values. These values are used to compute the best linear unbiased estimators (BLUEs) and the best linear invariant estimators (BLIEs) of the location and scale...

Construction of fuzzy edge image using Interval Type II fuzzy set

Tamalika Chaira, A. K. Ray
Pages: 686 - 695
In this paper, a novel method to generate fuzzy edges in medical images using the Type II fuzzy set theory is presented. Medical images are normally poorly illuminated and many edges are not visible properly, so construction of fuzzy edge image is a difficult task. Fuzzy edges are not the binary edges...

Symmetry classification of scalar Ito equations with multiplicative noise

Giuseppe Gaeta, Francesco Spadaro
Pages: 679 - 687
We provide a symmetry classification of scalar stochastic equations with multiplicative noise. These equations can be integrated by means of the Kozlov procedure, by passing to symmetry adapted variables.

A Particle Swarm Optimization Algorithm for Scheduling Against Restrictive Common Due Dates

Andreas C. Nearchou, Sotiris L. Omirou
Pages: 684 - 699
Focusing on the just-in-time (JIT) operations management, earliness as well as, tardiness of jobs’ production and delivery should be discouraged. In accordance to this philosophy, scheduling problems involving earliness and tardiness penalties are very critical for the operations manager. In this...

An efficient encoding scheme for a new multiple-type museum visitor routing problem with must-see and select-see exhibition rooms

Yi-Chih Hsieh, Peng-Sheng You
Pages: 677 - 689
We present a new multiple-type museum visitor routing problem (MT-MVRP) in which a museum’s exhibition rooms are classified into must-see and select-see rooms. A novel encoding scheme is proposed to simultaneously determine the scheduling of rooms for all of the groups and an immune based evolutionary...

An FMCDM approach to purchasing decision-making based on cloud model and prospect theory in e-commerce

Hong-yu Zhang, Rui Zhou, Jian-qiang Wang, Xiao-hong Chen
Pages: 676 - 688
This paper presents a fuzzy multi-criteria decision-making (FMCDM) approach based on cloud model and prospect theory. In addition, a reference point selection method is developed according to the evaluations of the potential customer or similar consumers regarding certain items. An example of purchasing...

A Real-Coded Optimal Sensor Deployment Scheme for Wireless Sensor Networks Based on the Social Spider Optimization Algorithm

Fernando Fausto, Erik Cuevas, Oscar Maciel-Castillo, Bernardo Morales-Castañeda
Pages: 676 - 696
Wireless sensor networks (WSNs) involves a set of wireless sensor nodes located within a region of interest (ROI) to acquire and/or transmit specific information from their surroundings. A common problem in the operation of WSNs is sensor coverage, which is related to the distribution of sensor nodes...

Solving Logistics Distribution Center Location with Improved Cuckoo Search Algorithm

Juan Li, Yuan-Hua Yang, Hong Lei, Gai-Ge Wang
Pages: 676 - 692
As a novel swarm intelligence optimization algorithm, cuckoo search (CS), has been successfully applied to solve various optimization problems. Despite its simplicity and efficiency, the CS is easy to suffer from the premature convergence and fall into local optimum. Although a lot of research has been...

Polluants Time-Series Prediction Using the Gamma Classifier

Itzamá López-Yáñez, Amadeo J. Argüelles-Cruz, Oscar Camacho-Nieto, Cornelio Yáñez-Márquez
Pages: 680 - 711
In this work we predict time series of air pollution data taken in Mexico City and the Valley of Mexico, by using the Gamma Classifier which is a novel intelligent associative mathematical model, coupled with an emergent coding technique. Historical and current data about the concentration of specific...

SEffEst: Effort estimation in software projects using fuzzy logic and neural networks

Israel González-Carrasco, Ricardo Colomo-Palacios, José Luis López-Cuadrado, Francisco José García Peñalvo
Pages: 679 - 699
Academia and practitioners confirm that software project effort prediction is crucial for an accurate software project management. However, software development effort estimation is uncertain by nature. Literature has developed methods to improve estimation correctness, using artificial intelligence...

A Novel Interactive Fuzzy Programming Approach for Optimization of Allied Closed-Loop Supply Chains

Ahmet Çalık, Nimet Yapıcı Pehlivan, Turan Paksoy, Gerhard Wilhelm Weber
Pages: 672 - 691
In recent years, the relationship between companies and suppliers has changed with the continuous rise in environmental awareness and customer expectations. In order to fulfill customers’ needs, the actors in a Supply Chain (SC) network sometimes compete and sometimes cooperate with each other. In SC...

A Novel Combinational ATP Based on Contradiction Separation for First-Order Logic

Jian Zhong, Yang Xu, Feng Cao
Pages: 672 - 680
At present, most of the first-order logic theorem provers use a binary-resolution method, which can effectively solve the general first-order logic problems to a certain extent. However, the cooperative processing ability of this method for multiple clauses is insufficient, and it is easy to cause rapid...

Hierarchical Storage Model and Priority Ranking Method of Rules in Rule-based Reasoning System

Yushu Lai, Yan Xiong
Pages: 676 - 685
It is very difficult to create the fault trees based on components framework for some complex equipment. So a multi-hierarchy diagnosis method based on fault categories is proposed in this paper. The according storage model of rules is designed, and the concept of rule priority is introduced. Then, a...

Correlation Function of Asymmetric Simple Exclusion Process with Open Boundaries

Masaru Uchiyama, Miki Wadati
Pages: 676 - 688
We investigate the correlation functions of the one-dimensional Asymmetric Simple Exclusion Process (ASEP) with open boundaries. The conditions for the boundaries are made most general. The correlation function is expressed in a multifold integral whose behavior we study in detail. We present a phase...

On Properties and Applications of a Two-Parameter Xgamma Distribution

Subhradev Sen, N. Chandra, Sudhansu S. Maiti
Pages: 674 - 685
An existing one-parameter probability distribution can be very well generalized by adding an extra parameter in it and, in turn, the two-parameter family of distributions, thus obtained, provides added flexibility in modeling real life data. In this article, we propose and study a two-parameter generalization...

Brand Choice Modeling Modeling Toothpaste Brand Choice: An Empirical Comparison of Artificial Neural Networks and Multinomial Probit Model

Tolga Kaya, Emel Aktas, Ilker Topçu, Burç Ulengin
Pages: 674 - 687
The purpose of this study is to compare the performances of Artificial Neural Networks (ANN) and Multinomial Probit (MNP) approaches in modeling the choice decision within fast moving consumer goods sector. To do this, based on 2597 toothpaste purchases of a panel sample of 404 households, choice models...

Efficient Fuzzy Logic Based Probabilistic Broadcasting for Mobile Ad hoc Network

Sumit Kumar, Shabana Mehfuz
Pages: 666 - 675
In Mobile Ad hoc networks broadcasting is the one of the most important and crucial phenomenon. Broadcasting can be taken up in many ways and the simplest method of broadcasting is simple flooding which can significantly increase the overheads and can result in redundant messages which can further cause...

Optimization of workflow scheduling in Utility Management System with hierarchical neural network

Srdjan Vukmirovic, Aleksandar Erdeljan, Imre Lendak, Darko Capko, Nemanja Nedic
Pages: 672 - 679
Grid computing could be the future computing paradigm for enterprise applications, one of its benefits being that it can be used for executing large scale applications. Utility Management Systems execute very large numbers of workflows with very high resource requirements. This paper proposes architecture...

Integrability conditions of a weak saddle in generalized Liénard-like complex polynomial differential systems

Jaume Giné, Claudia Valls
Pages: 664 - 678
We consider the complex differential system x˙=x+yf(x),   y˙=−y+xf(y), where f is the analytic function f(z)=∑j=1∞ajzj with aj ∈ ℂ. This system has a weak saddle at the origin and is a generalization of complex Liénard systems. In this work we study its local analytic integrability.

An orthogonal clustering method under hesitant fuzzy environment

Yanmin Liu, Hua Zhao, Zeshui Xu
Pages: 663 - 676
In this paper, we investigate the cluster techniques of hesitant fuzzy information. Consider that the distance measure is one of the most widely used tools in clustering analysis, we first point out the weakness of the existing distance measures for hesitant fuzzy sets (HFSs), and then put forward a...

A computer aided analysis scheme for detecting epileptic seizure from EEG data

Enamul Kabir, Siuly, Jinli Cao, Hua Wang
Pages: 663 - 671
This paper presents a computer aided analysis system for detecting epileptic seizure from electroencephalogram (EEG) signal data. As EEG recordings contain a vast amount of data, which is heterogeneous with respect to a time-period, we intend to introduce a clustering technique to discover different...

A Neural Network for Moore–Penrose Inverse of Time-Varying Complex-Valued Matrices

Yiyuan Chai, Haojin Li, Defeng Qiao, Sitian Qin, Jiqiang Feng
Pages: 663 - 671
The Moore–Penrose inverse of a matrix plays a very important role in practical applications. In general, it is not easy to immediately solve the Moore–Penrose inverse of a matrix, especially for solving the Moore–Penrose inverse of a complex-valued matrix in time-varying situations. To solve this problem...

Robust binary neural networks based 3D Face detection and accurate face registration

Quan Ju
Pages: 669 - 683
In this paper, we propose a facial feature localization algorithm based on a binary neural network technique - k-Nearest Neighbour Advanced Uncertain Reasoning Architecture (kNN AURA) to encode, train and match the feature patterns to accurate identify the nose tip in 3D. Based on the results of the...

Embedded Feature Selection for Multi-label Classification of Music Emotions

Mingyu You, Jiaming Liu, Guo-Zheng Li, Yan Chen
Pages: 668 - 678
When detecting of emotions from music, many features are extracted from the original music data. However, there are redundant or irrelevant features, which will reduce the performance of classification models. Considering the feature problems, we propose an embedded feature selection method, called Multi-label...

A Computer-Based Support System for Cooperative Tasks in Nursing Homes

Juan M. Alberola, Elena del Val, Angelo Costa, Paulo Novais, Vicente Julián
Pages: 661 - 675
Different studies have shown the benefits of a cooperative activities programme for the elderly. Members of a group with similar abilities or disabilities are often encouraged by having the opportunity to share their experiences, knowledge, or opinions. Nevertheless, when caregivers try to plan specific...