Search all articles
8183 articles
Research Article
A Dynamic Verification Model based on Information Flow Constraint
Dan Wang, Yan Lu, Lihua Fu, Wenbing Zhao
Pages: 712 - 723
After analyzing the common attacks for some software systems, a dynamic software behavior verification model related with the unchecked input data based on software analysis and dynamic slicing technology is proposed. Regarding a statement as a basic analysis unit, and the information flow as the main...
Research Article
A note on the rates of uniform approximation of fuzzy systems
Hoang Viet Long
Pages: 712 - 727
For the fuzzy systems with the kernel-shaped fuzzy sets of if part, we estimate the rates of the uniform approximation for continuous functions. Results are given associatively with the rates of convergence of the sequence (logk/k)a.
Research Article
Performance Based Clustering for Benchmarking of Container Ports: an Application of Dea and Cluster Analysis Technique
Jie Wu, Liang Liang, Malin Song
Pages: 709 - 722
The operational performance of container ports has received more and more attentions in both academic and practitioner circles, the performance evaluation and process improvement of container ports have also been the focus of several studies. In this paper, Data Envelopment Analysis (DEA), an effective...
Research Article
Granule Description of Object (Attribute)-Oriented Linguistic Concept Lattice Based on Dominance Relation
Hui Cui, Ansheng Deng, Chunmei Chang, Hongyue Diao, Li Zou
Pages: 701 - 714
Concept lattice, as an effective tool for knowledge acquisition and data analysis, has been successfully used in many fields. Aiming at the problem of groups for uncertain information in the linguistic environment, this paper mainly focuses on the granule description with linguistic concept lattice from...
Research Article
An improved comprehensive evaluation model and its application
Wenyi Zeng, Shuang Feng
Pages: 706 - 714
Since comprehensive evaluation model was introduced by Wang in 1984, the comprehensive evaluation model has many successful applications in real life. But some examples show the inefficiency of the comprehensive evaluation model. In order to process these problems, in this paper, we introduce two concepts...
Research Article
Using Recurrent Neural Networks for Part-of-Speech Tagging and Subject and Predicate Classification in a Sentence
David Muñoz-Valero, Luis Rodriguez-Benitez, Luis Jimenez-Linares, Juan Moreno-Garcia
Pages: 706 - 716
In natural language processing the use of deep learning techniques is very common. In this paper, a technique to identify the subject and predicate in a sentence is introduced. To achieve this, the proposed technique completes POS tagging identifying in a later stage the subject and the predicate in...
Research Article
Fuzzy Multi-Objective Lattice Order Decision Approach for Preference Ranking in Conflict Analysis
Qiang Guo, Wenyi Wang
Pages: 698 - 708
Based on conflict analysis and lattice order theory, this paper integrates fuzziness and non-transitivity of the preference, exclusiveness and incommensurability of the objective into conflict analysis, proposes a new fuzzy multi-objective lattice order decision method for preference ranking in conflict...
Research Article
Individual Heterogeneous Learning with Global Centrality in Prisoner Dilemma Evolutionary Game on Complex Network
Zundong Zhang, Yifang Zhang, William Danziger
Pages: 698 - 705
The influence of individual heterogeneity on the evolutionary game has been studied extensively in recent years. Whereas many theoretical studies have found that the heterogeneous learning ability effects cooperation rate, the individual learning ability in networks is still not well understood. It is...
Research Article
3D Model Generation and Reconstruction Using Conditional Generative Adversarial Network
Haisheng Li, Yanping Zheng, Xiaoqun Wu, Qiang Cai
Pages: 697 - 705
Generative adversarial network (GANs) has significant progress in 3D model generation and reconstruction recently years. GANs can generate 3D models by sampling from uniform noise distribution. But they generate randomly and are often not easy to control. To address this problem, we add the class information...
Research Article
Trigonal Toda Lattice Equation
Shigeki Matsutani
Pages: 697 - 704
In this article, we give the trigonal Toda lattice equation,
−12d3dt3qℓ(t)=eqℓ+1(t)+eqℓ+ζ3(t)++eqℓ+ζ32(t)−3eqℓ(t),
for a lattice point ℓ ∈ [ζ3] as a directed 6-regular graph where ζ3=e2π−1/3, and its elliptic solution for the curve y(y − s) = x
3, (s ≠ 0).
Research Article
Weighted Entropy Measure: A New Measure of Information with its Properties in Reliability Theory and Stochastic Orders
M. Ramadan
Pages: 703 - 718
The weighted entropy measure is a germane dynamic measure of uncertainty in reliability and survival studies. In this paper, the new results of weighted entropies with some characterizations are provided. Furthermore, we have presented some results for weighted entropy residual and weighted past residual...
Research Article
A Hesitant Fuzzy Linguistic TODIM Method Based on a Score Function
Cuiping Wei, Zhiliang Ren, Rosa M. Rodríguez
Pages: 701 - 712
Hesitant fuzzy linguistic term sets (HFLTSs) are very useful for dealing with the situations in which the decision makers hesitate among several linguistic terms to assess an alternative. Some multi-criteria decision-making (MCDM) methods have been developed to deal with HFLTSs. These methods are derived...
Research Article
Overcoming Motor-Rate Limitations in Online Synchronized Robot Dancing
CatarinaB. Santiago, JoaoL. Oliveira, LuisP. Reis, Armando Sousa, Fabien Gouyon
Pages: 700 - 713
We propose an online sensorimotor architecture for controlling a low-cost humanoid robot to perform dance movements synchronized with musical stimuli. The proposed architecture attempts to overcome the robot's motor constraints by adjusting the velocity of its actuators and inter-changing the attended...
Research Article
REFLECTING THE PERSPECTIVES OF MULTIPLE AGENTS IN DISTRIBUTED REASONING FOR CONTEXT-AWARE SERVICE
Seungwok Han, Hee Yong Youn
Pages: 700 - 711
Effective manipulation of context is very important in providing the context-aware services. In recent years, a variety of context models have been proposed to properly handle the key aspects of the context, while focusing on scenario-based acquisition, management, and representation of context. However,...
Research Article
MADL: A Multilevel Architecture of Deep Learning
Samir Brahim Belhaouari, Hafsa Raissouli
Pages: 693 - 700
Deep neural networks (DNN) are a powerful tool that is used in many real-life applications. Solving complicated real-life problems requires deeper and larger networks, and hence, a larger number of parameters to optimize. This paper proposes a multilevel architecture of deep learning (MADL) that breaks...
Research Article
A Genetic Algorithm with New Local Operators for Multiple Traveling Salesman Problems
Kin-Ming Lo, Wei-Ying Yi, Pak-Kan Wong, Kwong-Sak Leung, Yee Leung, Sui-Tung Mak
Pages: 692 - 705
Multiple Traveling Salesman Problem (MTSP) is able to model and solve various real-life applications such as multiple scheduling, multiple vehicle routing and multiple path planning problems, etc. While Traveling Salesman Problem (TSP) focuses on searching a path of minimum traveling distance to visit...
Research Article
Analysis of Brand Image Effect on Advertising Awareness Using A Neuro-Fuzzy and A Neural Network Prediction Models
Ali Fahmi, Kemal Burc Ulengin, Cengiz Kahraman
Pages: 690 - 710
Almost all the worldwide and nationwide companies utilize advertising to increase their sales volume and profit. These companies pay millions of dollars to reach consumers and announce their products or services. This forces companies to evaluate advertising effects and check whether ads meet companys...
Research Article
A Synthesizing Effect-Based Solution Method for Stochastic Rough Multi-objective Programming Problems
Lei Zhou, Guoshan Zhang, Fachao Li
Pages: 696 - 705
Multi-objective programming with uncertain information has been widely applied in modeling of industrial produce and logistic distribution problems. Usually the expectation value model and chance-constrained model as solution models are used to deal with such uncertain programming. In this paper, we...
Research Article
An Application of Value Analysis for Lean Healthcare Management in an Emergency Department
Burak Efe, Ömer Faruk Efe
Pages: 689 - 697
This paper investigated the value concept of lean management to improve the performance of an emergency department (ED). This paper aims to analyze on patient perceived value (PPV) to apply lean management principles in the ED. The DEMATEL (Decision Making Trial and Evaluation Laboratory) method has...
Research Article
Gambier lattices and other linearisable systems
Basil Grammaticos, Alfred Ramani
Pages: 688 - 696
We propose two different appraoches to extending the Gambier mapping to a two-dimensional lattice equation. A first approach relies on a hypothesis of separate evolutions in each of the two directions. We show that known equations like the Startsev-Garifullin-Yamilov equation, the Hietarinta equation,...
Research Article
A Note on “A Lexicographic Method for Matrix Games with Payoffs of Triangular Intuitionistic Fuzzy Numbers”
Tina Verma, Amit Kumar
Pages: 690 - 700
Nan et al. [J.-X. Nan, D.-F. Li and M.-J. Zhang, A lexicographic method for matrix games with payoffs of triangular intuitionistic fuzzy numbers, International Journal of Computational Intelligence Systems 3(3) (2010) 280-289] pointed out that there is no method in the literature to find the solution...
Research Article
A Novel Density Peaks Clustering Algorithm Based on Local Reachability Density
Hanqing Wang, Bin Zhou, Jianyong Zhang, Ruixue Cheng
Pages: 690 - 697
A novel clustering algorithm named local reachability density peaks clustering (LRDPC) which uses local reachability density to improve the performance of the density peaks clustering algorithm (DPC) is proposed in this paper. This algorithm enhances robustness by removing the cutoff distance dc which...
Research Article
On the Equilibrium Configuration of the BC-type Ruijsenaars-Schneider System
Jan F. Van Diejen
Pages: 689 - 696
It is shown that the ground-state equilibrium configurations of the trigonometric Btype Ruijsenaars-Schneider systems are given by the zeros of Askey-Wilson polynomals.
Research Article
Uncertainty and Preference Modelling for Multiple Criteria Vehicle Evaluation
Qiuping Yang, Xinlian Xie, Dong-Ling Xu, Jian-Bo Yang, Anil Kumar Maddulapalli
Pages: 688 - 708
A general framework for vehicle assessment is proposed based on both mass survey information and the evidential reasoning (ER) approach. Several methods for uncertainty and preference modeling are developed within the framework, including the measurement of uncertainty caused by missing information,...
Research Article
Quasi-Copulas, Copulas and Fuzzy Implicators
Radko Mesiar, Anna Kolesárová
Pages: 681 - 689
In this paper, we study relations between fuzzy implicators and some kinds of fuzzy conjunctors, in particular, quasi-copulas and copulas. We show that there is a one-to-one correspondence between the classes of all quasi-copulas and 1-Lipschitz fuzzy implicators. A similar relation holds for copulas...
Research Article
On the Lindley Record Values and Associated Inference
A. Fallah, A. Asgharzadeh, S.M.T.K. MirMostafaee
Pages: 686 - 702
In this paper, we discuss the record values arising from the Lindley distribution. We compute the means, variances and covariances of the record values. These values are used to compute the best linear unbiased estimators (BLUEs) and the best linear invariant estimators (BLIEs) of the location and scale...
Research Article
Construction of fuzzy edge image using Interval Type II fuzzy set
Tamalika Chaira, A. K. Ray
Pages: 686 - 695
In this paper, a novel method to generate fuzzy edges in medical images using the Type II fuzzy set theory is presented. Medical images are normally poorly illuminated and many edges are not visible properly, so construction of fuzzy edge image is a difficult task. Fuzzy edges are not the binary edges...
Research Article
Symmetry classification of scalar Ito equations with multiplicative noise
Giuseppe Gaeta, Francesco Spadaro
Pages: 679 - 687
We provide a symmetry classification of scalar stochastic equations with multiplicative noise. These equations can be integrated by means of the Kozlov procedure, by passing to symmetry adapted variables.
Research Article
A Particle Swarm Optimization Algorithm for Scheduling Against Restrictive Common Due Dates
Andreas C. Nearchou, Sotiris L. Omirou
Pages: 684 - 699
Focusing on the just-in-time (JIT) operations management, earliness as well as, tardiness of jobs’ production and delivery should be discouraged. In accordance to this philosophy, scheduling problems involving earliness and tardiness penalties are very critical for the operations manager. In this...
Research Article
An efficient encoding scheme for a new multiple-type museum visitor routing problem with must-see and select-see exhibition rooms
Yi-Chih Hsieh, Peng-Sheng You
Pages: 677 - 689
We present a new multiple-type museum visitor routing problem (MT-MVRP) in which a museum’s exhibition rooms are classified into must-see and select-see rooms. A novel encoding scheme is proposed to simultaneously determine the scheduling of rooms for all of the groups and an immune based evolutionary...
Research Article
An FMCDM approach to purchasing decision-making based on cloud model and prospect theory in e-commerce
Hong-yu Zhang, Rui Zhou, Jian-qiang Wang, Xiao-hong Chen
Pages: 676 - 688
This paper presents a fuzzy multi-criteria decision-making (FMCDM) approach based on cloud model and prospect theory. In addition, a reference point selection method is developed according to the evaluations of the potential customer or similar consumers regarding certain items. An example of purchasing...
Research Article
A Real-Coded Optimal Sensor Deployment Scheme for Wireless Sensor Networks Based on the Social Spider Optimization Algorithm
Fernando Fausto, Erik Cuevas, Oscar Maciel-Castillo, Bernardo Morales-Castañeda
Pages: 676 - 696
Wireless sensor networks (WSNs) involves a set of wireless sensor nodes located within a region of interest (ROI) to acquire and/or transmit specific information from their surroundings. A common problem in the operation of WSNs is sensor coverage, which is related to the distribution of sensor nodes...
Research Article
Solving Logistics Distribution Center Location with Improved Cuckoo Search Algorithm
Juan Li, Yuan-Hua Yang, Hong Lei, Gai-Ge Wang
Pages: 676 - 692
As a novel swarm intelligence optimization algorithm, cuckoo search (CS), has been successfully applied to solve various optimization problems. Despite its simplicity and efficiency, the CS is easy to suffer from the premature convergence and fall into local optimum. Although a lot of research has been...
Research Article
Polluants Time-Series Prediction Using the Gamma Classifier
Itzamá López-Yáñez, Amadeo J. Argüelles-Cruz, Oscar Camacho-Nieto, Cornelio Yáñez-Márquez
Pages: 680 - 711
In this work we predict time series of air pollution data taken in Mexico City and the Valley of Mexico, by using the Gamma Classifier which is a novel intelligent associative mathematical model, coupled with an emergent coding technique. Historical and current data about the concentration of specific...
Research Article
SEffEst: Effort estimation in software projects using fuzzy logic and neural networks
Israel González-Carrasco, Ricardo Colomo-Palacios, José Luis López-Cuadrado, Francisco José García Peñalvo
Pages: 679 - 699
Academia and practitioners confirm that software project effort prediction is crucial for an accurate software project management. However, software development effort estimation is uncertain by nature. Literature has developed methods to improve estimation correctness, using artificial intelligence...
Research Article
A Novel Interactive Fuzzy Programming Approach for Optimization of Allied Closed-Loop Supply Chains
Ahmet Çalık, Nimet Yapıcı Pehlivan, Turan Paksoy, Gerhard Wilhelm Weber
Pages: 672 - 691
In recent years, the relationship between companies and suppliers has changed with the continuous rise in environmental awareness and customer expectations. In order to fulfill customers’ needs, the actors in a Supply Chain (SC) network sometimes compete and sometimes cooperate with each other. In SC...
Research Article
A Novel Combinational ATP Based on Contradiction Separation for First-Order Logic
Jian Zhong, Yang Xu, Feng Cao
Pages: 672 - 680
At present, most of the first-order logic theorem provers use a binary-resolution method, which can effectively solve the general first-order logic problems to a certain extent. However, the cooperative processing ability of this method for multiple clauses is insufficient, and it is easy to cause rapid...
Research Article
Hierarchical Storage Model and Priority Ranking Method of Rules in Rule-based Reasoning System
Yushu Lai, Yan Xiong
Pages: 676 - 685
It is very difficult to create the fault trees based on components framework for some complex equipment. So a multi-hierarchy diagnosis method based on fault categories is proposed in this paper. The according storage model of rules is designed, and the concept of rule priority is introduced. Then, a...
Research Article
Correlation Function of Asymmetric Simple Exclusion Process with Open Boundaries
Masaru Uchiyama, Miki Wadati
Pages: 676 - 688
We investigate the correlation functions of the one-dimensional Asymmetric Simple Exclusion Process (ASEP) with open boundaries. The conditions for the boundaries are made most general. The correlation function is expressed in a multifold integral whose behavior we study in detail. We present a phase...
Research Article
On Properties and Applications of a Two-Parameter Xgamma Distribution
Subhradev Sen, N. Chandra, Sudhansu S. Maiti
Pages: 674 - 685
An existing one-parameter probability distribution can be very well generalized by adding an extra parameter in it and, in turn, the two-parameter family of distributions, thus obtained, provides added flexibility in modeling real life data. In this article, we propose and study a two-parameter generalization...
Research Article
Brand Choice Modeling Modeling Toothpaste Brand Choice: An Empirical Comparison of Artificial Neural Networks and Multinomial Probit Model
Tolga Kaya, Emel Aktas, Ilker Topçu, Burç Ulengin
Pages: 674 - 687
The purpose of this study is to compare the performances of Artificial Neural Networks (ANN) and Multinomial Probit (MNP) approaches in modeling the choice decision within fast moving consumer goods sector. To do this, based on 2597 toothpaste purchases of a panel sample of 404 households, choice models...
Research Article
Efficient Fuzzy Logic Based Probabilistic Broadcasting for Mobile Ad hoc Network
Sumit Kumar, Shabana Mehfuz
Pages: 666 - 675
In Mobile Ad hoc networks broadcasting is the one of the most important and crucial phenomenon. Broadcasting can be taken up in many ways and the simplest method of broadcasting is simple flooding which can significantly increase the overheads and can result in redundant messages which can further cause...
Research Article
Optimization of workflow scheduling in Utility Management System with hierarchical neural network
Srdjan Vukmirovic, Aleksandar Erdeljan, Imre Lendak, Darko Capko, Nemanja Nedic
Pages: 672 - 679
Grid computing could be the future computing paradigm for enterprise applications, one of its benefits being that it can be used for executing large scale applications. Utility Management Systems execute very large numbers of workflows with very high resource requirements. This paper proposes architecture...
Research Article
Integrability conditions of a weak saddle in generalized Liénard-like complex polynomial differential systems
Jaume Giné, Claudia Valls
Pages: 664 - 678
We consider the complex differential system
x˙=x+yf(x), y˙=−y+xf(y),
where f is the analytic function f(z)=∑j=1∞ajzj with aj ∈ ℂ. This system has a weak saddle at the origin and is a generalization of complex Liénard systems. In this work we study its local analytic integrability.
Research Article
An orthogonal clustering method under hesitant fuzzy environment
Yanmin Liu, Hua Zhao, Zeshui Xu
Pages: 663 - 676
In this paper, we investigate the cluster techniques of hesitant fuzzy information. Consider that the distance measure is one of the most widely used tools in clustering analysis, we first point out the weakness of the existing distance measures for hesitant fuzzy sets (HFSs), and then put forward a...
Research Article
A computer aided analysis scheme for detecting epileptic seizure from EEG data
Enamul Kabir, Siuly, Jinli Cao, Hua Wang
Pages: 663 - 671
This paper presents a computer aided analysis system for detecting epileptic seizure from electroencephalogram (EEG) signal data. As EEG recordings contain a vast amount of data, which is heterogeneous with respect to a time-period, we intend to introduce a clustering technique to discover different...
Research Article
A Neural Network for Moore–Penrose Inverse of Time-Varying Complex-Valued Matrices
Yiyuan Chai, Haojin Li, Defeng Qiao, Sitian Qin, Jiqiang Feng
Pages: 663 - 671
The Moore–Penrose inverse of a matrix plays a very important role in practical applications. In general, it is not easy to immediately solve the Moore–Penrose inverse of a matrix, especially for solving the Moore–Penrose inverse of a complex-valued matrix in time-varying situations. To solve this problem...
Research Article
Robust binary neural networks based 3D Face detection and accurate face registration
Quan Ju
Pages: 669 - 683
In this paper, we propose a facial feature localization algorithm based on a binary neural network technique - k-Nearest Neighbour Advanced Uncertain Reasoning Architecture (kNN AURA) to encode, train and match the feature patterns to accurate identify the nose tip in 3D. Based on the results of the...
Research Article
Embedded Feature Selection for Multi-label Classification of Music Emotions
Mingyu You, Jiaming Liu, Guo-Zheng Li, Yan Chen
Pages: 668 - 678
When detecting of emotions from music, many features are extracted from the original music data. However, there are redundant or irrelevant features, which will reduce the performance of classification models. Considering the feature problems, we propose an embedded feature selection method, called Multi-label...
Research Article
A Computer-Based Support System for Cooperative Tasks in Nursing Homes
Juan M. Alberola, Elena del Val, Angelo Costa, Paulo Novais, Vicente Julián
Pages: 661 - 675
Different studies have shown the benefits of a cooperative activities programme for the elderly. Members of a group with similar abilities or disabilities are often encouraged by having the opportunity to share their experiences, knowledge, or opinions. Nevertheless, when caregivers try to plan specific...