International Journal of Computational Intelligence Systems

+ Advanced search
1063 articles

A Validation Approach for Ontology-Based Real-time DBMS

Wided Ben Abid, Mohamed Ben Ahmed Mhiri, Malek Ben Salem, Emna Bouazizi, Faiez Gargouri
Pages: 311 - 317
Real-time DBMS (DataBase Management Systems) are an appropriate storage system under real-time constraints. However real-time DBMS do not implement inference or reasoning mechanisms. Ontologies on the other hand allow these mechanisms by creating formal representations of concepts, properties and relationships...

A New Rewarding Mechanism for Branching Heuristic in SAT Solvers

Wenjing Chang, Yang Xu, Shuwei Chen
Pages: 334 - 341
Decision heuristic strategy can be viewed as one of the most central features of state-of-the-art conflict-driven clause-learning SAT solvers. Variable state independent decaying sum (VSIDS) still is the dominant branching heuristics because of its low cost. VSIDS consists of a rewarding mechanism for...

A New Algorithm of Mining High Utility Sequential Pattern in Streaming Data

Huijun Tang, Yangguang Liu, Le Wang
Pages: 342 - 350
High utility sequential pattern (HUSP) mining has emerged as a novel topic in data mining, its computational complexity increases compared to frequent sequences mining and high utility itemsets mining. A number of algorithms have been proposed to solve such problem, but they mainly focus on mining HUSP...

Multimodal Emotion Recognition Method Based on Convolutional Auto-Encoder

Jian Zhou, Xianwei Wei, Chunling Cheng, Qidong Yang, Qun Li
Pages: 351 - 358
Emotion recognition is of great significance to computational intelligence systems. In order to improve the accuracy of emotion recognition, electroencephalogram (EEG) signals and external physiological (EP) signals are adopted due to their perfect performance in reflecting the slight variations of emotions,...

Further Complete Solutions to Four Open Problems on Filter of Logical Algebras

Wei Wang, Pengxi Yang, Yang Xu
Pages: 359 - 366
This paper focuses on the investigation of filters of pseudo BCK-algebra and BL-algebra, important and popular generic commutative and non-commutative logical algebras. By characterizing Boolean filter and implicative filter in pseudo BCK-algebra, the essential equivalent relation between these two filters...

A New Edge Detection Method Based on Global Evaluation Using Supervised Classification Algorithms

Pablo A. Flores-Vidal, Guillermo Villarino, Daniel Daniel Gomez, Javier Montero
Pages: 367 - 378
Traditionally, the last step of edge detection algorithms, which is called scaling-evaluation, produces the final output classifying each pixel as edge or nonedge. This last step is usually done based on local evaluation methods. The local evaluation makes this classification based on measures obtained...

Fusion of Measures for Image Segmentation Evaluation

Macmillan Simfukwe, Bo Peng, Tianrui Li
Pages: 379 - 386
Image segmentation is an important task in image processing. However, no universally accepted quality scheme exists for evaluating the performance of various segmentation algorithms or just different parameterizations of the same algorithm. In this paper, an extension of a fusion-based framework for...

Enactment of Ensemble Learning for Review Spam Detection on Selected Features

Faisal Khurshid, Yan Zhu, Zhuang Xu, Mushtaq Ahmad, Muqeet Ahmad
Pages: 387 - 394
In the ongoing era of flourishing e-commerce, people prefer online purchasing products and services to save time. These online purchase decisions are mostly influenced by the reviews/opinions of others who already have experienced them. Malicious users use this experience sharing to promote or degrade...

A New Distance-Based Consensus Reaching Model for Multi-Attribute Group Decision-Making with Linguistic Distribution Assessments

Shengbao Yao
Pages: 395 - 409
This paper proposes a novel consensus reaching model for multi-attribute group decision making (MAGDM) with information represented by means of linguistic distribution assessments. Firstly, some drawbacks of the existing distance measures for linguistic distribution assessments are analyzed by using...

A Pythagorean Fuzzy TOPSIS Method Based on Novel Correlation Measures and Its Application to Multiple Criteria Decision Analysis of Inpatient Stroke Rehabilitation

Yu-Li Lin, Lun-Hui Ho, Shu-Ling Yeh, Ting-Yu Chen
Pages: 410 - 425
The complex nature of the realistic decision-making process requires the use of Pythagorean fuzzy (PF) sets which have been shown to be a highly promising tool capable of solving highly vague and imprecise problems. Multiple criteria decision analysis (MCDA) methods within the PF environment are very...

CPO: A Crow Particle Optimization Algorithm

Ko-Wei Huang, Ze-Xue Wu
Pages: 426 - 435
Particle swarm optimization (PSO) is the most well known of the swarm-based intelligence algorithms and is inspired by the social behavior of bird flocking. However, the PSO algorithm converges prematurely, which rapidly decreases the population diversity, especially when approaching local optima. Recently,...

Assessment of Healthcare Waste Treatment Alternatives Using an Integrated Decision Support Framework

Akshay Hinduja, Manju Pandey
Pages: 318 - 333
Healthcare waste (HCW) management has become a major environmental and public-health concern especially in developing countries, and therefore, it has been receiving increasing attention from both industrial practitioners and researcher in recent years. Selection of the optimal treatment technology for...

AEkNN: An AutoEncoder kNN-Based Classifier With Built-in Dimensionality Reduction

Francisco J. Pulgar, Francisco Charte, Antonio J. Rivera, María J. del Jesus
Pages: 436 - 452
High dimensionality tends to be a challenge for most machine learning tasks, including classification. There are different classification methodologies, of which instance-based learning is one. One of the best known members of this family is the k-nearest neighbors (kNNs) algorithm. Its strategy relies...

Combination Replicas Placements Strategy for Data sets from Cost-effective View in the Cloud*

Xiuguo Wu
Pages: 521 - 539
In the cloud storage system, data sets replicas technology can efficiently enhance data availability and thereby increase the system reliability by replicating commonly used data sets in geographically different data centers. Most current approaches largely focus on system performance improvement by...

A new access control method based on multi-authority in cloud storage service

Sheng Luo, Qiang Liu
Pages: 483 - 495
With the arrival of the era of big data, data has become a kind of important assets. In order to get a better utilization of big data, paid or unpaid data sharing will be a trend. And as one of key techniques to maintain security of data sharing, access control will play an important role in cloud storage...

Multi-adjoint based group decision-making under an intuitionistic fuzzy information system

Meishe Liang, Jusheng Mi, Tao Feng, Bin Xie
Pages: 172 - 182
The construction of belief intervals is crucial for decision-making in multi-attribute group information integration. Based on multi-adjoint and evidence theory, an approach to multi-criteria group decision-making(MCGDM) in intuitionistic fuzzy information system is proposed. First, the upper and lower...

Intelligent Biological Alarm Clock for Monitoring Autonomic Nervous Recovery During Nap

Jialan Xie, Wanhui Wen, Guangyuan Liu, Yongtao Li
Pages: 453 - 459
Nap is an effective way to reduce daily-level fatigue after several hours of work. However, no alarm clock, which intelligently manages the nap duration with good autonomic nervous recovery (ANR) from fatigue, has been reported in literature. In this work, an intelligent biological alarm clock algorithm...

A Novel Method Based on Extended Uncertain 2-tuple Linguistic Muirhead Mean Operators to MAGDM under Uncertain 2-Tuple Linguistic Environment

Yi Liu, Jun Liu, Ya Qin, Yang Xu
Pages: 498 - 512
The present work is focused on multi-attribute group decision-making (MAGDM) problems with the uncertain 2-tuple linguistic information (ULI2–tuple) based on new aggregation operators which can capture interrelationships of attributes by a parameter vector P. To begin with, we present some new uncertain...

An Improved NSGA-II Algorithm Based on Crowding Distance Elimination Strategy

Junhui Liu, Xindu Chen
Pages: 513 - 518
Aiming at the diversity of Nondominated Sorting Genetic Algorithm II (NSGA-II) in screening out nondominated solutions, a crowding distance elimination (CDE) method is proposed. Firstly, the crowding distance is calculated in the same level of nondominated solutions, and the solution of minimum crowding...

An Adaptive Control Method for Resource Provisioning with Resource Utilization Constraints in Cloud Computing

Siqian Gong, Beibei Yin, Zheng Zheng, Kai-yuan Cai
Pages: 485 - 497
Cloud computing enables users to purchase virtual resources on demand; therefore, the service requests change over time. Dynamic resource provisioning for cloud computing has become a key challenge. To reduce the associated costs, resource utilization must be improved, and ensure the Quality of Service...

Using a Deep Learning Model on Images to Obtain a 2D Laser People Detector for a Mobile Robot

Eugenio Aguirre, Miguel García-Silvente
Pages: 476 - 484
Recent improvements in deep learning techniques applied to images allow the detection of people with a high success rate. However, other types of sensors, such as laser rangefinders, are still useful due to their wide field of vision and their ability to operate in different environments and lighting...

New Product Launching with Pricing, Free Replacement, Rework, and Warranty Policies via Genetic Algorithmic Approach

Vijay Kumar, Biswajit Sarkar, Alok Nath Sharma, Mandeep Mittal
Pages: 519 - 529
New products are appearing in the marketplace at an ever-increasing step. Their launching is either market driven, or technology driven. Pricing and warranty policies play a vital role in launching of a new product, consequently growth of a company. In this paper a decision model is proposed to determine...

An Efficient Modified Particle Swarm Optimization Algorithm for Solving Mixed-Integer Nonlinear Programming Problems

Ying Sun, Yuelin Gao
Pages: 530 - 543
This paper presents an efficient modified particle swarm optimization (EMPSO) algorithm for solving mixed-integer nonlinear programming problems. In the proposed algorithm, a new evolutionary strategies for the discrete variables is introduced, which can solve the problem that the evolutionary strategy...

An IT2-Based Hybrid Decision-Making Model Using Hesitant Fuzzy Linguistic Term Sets for Selecting the Development Plan of Financial Economics

Hasan Dincer, Secil Senel Uzunkaya, Serhat Yüksel
Pages: 460 - 473
The novelty of the study is to propose a hybrid IT2 decision-making approach under the hesitant fuzzy linguistic sets for evaluating the criteria and alternatives. For this purpose, the dimensions and criteria are weighted with interval type-2 fuzzy DEMATEL and the economic development plans are ranked...

Improved TODIM Method Based on Linguistic Neutrosophic Numbers for Multicriteria Group Decision-Making

Peide Liu, Xinli You
Pages: 544 - 556
The TODIM (an acronym in Portuguese for interactive multicriteria decision-making) method can consider the decision-makers’ (DMs’) psychological behavior. However, the classical TODIM method has been unable to address fuzzy information such as the linguistic neutrosophic number (LNN), which is an effective...

Rough Number–Based Three-Way Group Decisions and Application in Influenza Emergency Management

Fan Jia, Peide Liu
Pages: 557 - 570
Group decision-making can effectively deal with complex decision problems in reality and takes important research status in the field of decision-making. In recent years, three-way decision has been a hot topic in the field of uncertain decision-making, so the models of three-way decision under group...

A Hybrid Swarm Intelligence Approach for Blog Success Prediction

Chi-I Hsu, Shelly P. J. Wu, Chaochang Chiu
Pages: 571 - 579
Successful blogs receive high ratings and generate marketing value. What factors contribute to the success of a blog and how to predict its success level are questions worth discussing. A hybrid swam intelligence approach is proposed in this study to predict blog success level. First, this study develops...

Using Multi-Conditional Minimum Thresholds in Temporal Fuzzy Utility Mining

Wei-Ming Huang, Tzung-Pei Hong, Ming-Chao Chiang, Jerry Chun-Wei Lin
Pages: 613 - 626
In the field of fuzzy utility mining, the characteristics of transaction time have been a widely studied topic in data mining. However, using a single-conditional threshold for all items does not suffice to reflect the true properties of items. This paper, therefore, proposes a multi-conditional minimum...

Time-Based Dance Scheduling for Artificial Bee Colony Algorithm and Its Variants

Selcuk Aslan
Pages: 597 - 612
Artificial Bee Colony (ABC) algorithm inspired by the intelligent source search and consumption characteristics of the real honey bees is one of the most powerful optimization techniques. Although the existing behaviours of the honey bees in standard ABC algorithm are capable of producing optimal or...

A Novel Method Based on Fuzzy Tensor Technique for Interval-Valued Intuitionistic Fuzzy Decision-Making with High-Dimension Data

Shengyue Deng, Jianzhou Liu, Jintao Tan, Lixin Zhou
Pages: 580 - 596
To solve the interval-valued intuitionistic fuzzy decision-making problems with high-dimension data, the fuzzy matrix is extended to the fuzzy tensor in this paper. Based on the constructed tensor definition, we propose the generalized interval-valued intuitionistic fuzzy weighted averaging (GIIFWA)...

Measuring Security Durability of Software through Fuzzy-Based Decision-Making Process

Rajeev Kumar, Mohammad Zarour, Mamdouh Alenezi, Alka Agrawal, Raees Ahmad Khan
Pages: 627 - 642
It is critical to develop secure software with long-term performance and capability to withstand and forestall the growing competition in the software development industry. To enhance the potential of Confidentiality, Integrity, and Availability (CIA), a mechanism is required to built in and secure the...

A Novel Algorithm for Generating Pseudo-Random Number

Gangyi Hu, Jin Peng, Weili Kou
Pages: 643 - 648
It proposes a pseudo-random number generation algorithm based on cellular neural networks. This method uses the hyper-chaos characteristics of the cellular neural networks and sets the appropriate parameters to generate the pseudo-random number. The experimental results show that, compared with other...

GMDH2: Binary Classification via GMDH-Type Neural Network Algorithms—R Package and Web-Based Tool

Osman Dag, Erdem Karabulut, Reha Alpar
Pages: 649 - 660
Group method of data handling (GMDH)-type neural network algorithms are the self-organizing algorithms for modeling complex systems. GMDH algorithms are used for different objectives; examples include regression, classification, clustering, forecasting, and so on. In this paper, we present GMDH2 package...

A Computer-Based Support System for Cooperative Tasks in Nursing Homes

Juan M. Alberola, Elena del Val, Angelo Costa, Paulo Novais, Vicente Julián
Pages: 661 - 675
Different studies have shown the benefits of a cooperative activities programme for the elderly. Members of a group with similar abilities or disabilities are often encouraged by having the opportunity to share their experiences, knowledge, or opinions. Nevertheless, when caregivers try to plan specific...

3D Model Generation and Reconstruction Using Conditional Generative Adversarial Network

Haisheng Li, Yanping Zheng, Xiaoqun Wu, Qiang Cai
Pages: 697 - 705
Generative adversarial network (GANs) has significant progress in 3D model generation and reconstruction recently years. GANs can generate 3D models by sampling from uniform noise distribution. But they generate randomly and are often not easy to control. To address this problem, we add the class information...

Evaluate the Effectiveness of Multiobjective Evolutionary Algorithms by Box Plots and Fuzzy TOPSIS

Xiaobing Yu, Chenliang Li, Hong Chen, Xianrui Yu
Pages: 733 - 743
Now, there are a lot of multiobjective evolutionary algorithms (MOEAs) available and these MOEAs argue that they are competitive. In fact, these results are generally unfair and unfaithful. In order to make fair comparison, comprehensive performance index system is established. The weights among the...

Semi-Automatic Generation of Competency Maps Based on Educational Data Mining

David Alfonso, Angeles Manjarrés, Simon Pickin
Pages: 744 - 760
We propose a semi-automatic method for the generation of educational-competency maps from repositories of multiple-choice question responses, using Bayesian structural learning and data-mining techniques. We tested our method on a large repository of responses to multiple-choice exam questions from an...

A Real-Coded Optimal Sensor Deployment Scheme for Wireless Sensor Networks Based on the Social Spider Optimization Algorithm

Fernando Fausto, Erik Cuevas, Oscar Maciel-Castillo, Bernardo Morales-Castañeda
Pages: 676 - 696
Wireless sensor networks (WSNs) involves a set of wireless sensor nodes located within a region of interest (ROI) to acquire and/or transmit specific information from their surroundings. A common problem in the operation of WSNs is sensor coverage, which is related to the distribution of sensor nodes...

Development of a Textile Coding Tag for the Traceability in Textile Supply Chain by Using Pattern Recognition and Robust Deep Learning

Kaichen Wang, Vijay Kumar, Xianyi Zeng, Ludovic Koehl, Xuyuan Tao, Yan Chen
Pages: 713 - 722
The traceability is of paramount importance and considered as a prerequisite for businesses for long-term functioning in today's global supply chain. The implementation of traceability can create visibility by the systematic recall of information related to all processes and logistics movement. The traceability...

The Use of Marketing Decision Support Systems for New Product Design: A Review

J. Francisco Figueroa-Perez, Juan C. Leyva-Lopez, Luis C. Santillan, Edgar O. Pérez Contreras, Pedro J. Sánchez
Pages: 761 - 774
Product design is an important phase of the new product development process and one of the most crucial decisions in marketing. In the latest two decades, a significant number of marketing decision support systems (MDSSs) for automating new product design activities have been reported in the literature...

T-Normed Fuzzy TM-Subalgebra of TM-Algebras

Julie Thomas, K. Indhira, V. M. Chandrasekaran
Pages: 706 - 712
The concept of T-normed fuzzy TM-subalgebras is introduced by applying the notion of t-norm to fuzzy TM-algebra and its properties are investigated. The ideas based on minimum t-norm are generalized to all widely accepted t-norms in a fuzzy TM-subalgebra.The characteristics of an idempotent T-normed...

Attention Pooling-Based Bidirectional Gated Recurrent Units Model for Sentimental Classification

Dejun Zhang, Mingbo Hong, Lu Zou, Fei Han, Fazhi He, Zhigang Tu, Yafeng Ren
Pages: 723 - 732
Recurrent neural network (RNN) is one of the most popular architectures for addressing variable sequence text, and it shows outstanding results in many natural language processing (NLP) tasks and remarkable performance in capturing long-term dependencies. Many models have achieved excellent results based...

A Fuzzy-Random Extension of the Lee–Carter Mortality Prediction Model

Jorge de Andrés-Sánchez, Laura González-Vila Puchades
Pages: 775 - 794
The Lee–Carter model is a useful dynamic stochastic model to represent the evolution of central mortality rates throughout time. This model only considers the uncertainty about the coefficient related to the mortality trend over time but not to the age-dependent coefficients. This paper proposes a fuzzy-random...

A Novel Memetic Framework for Enhancing Differential Evolution Algorithms via Combination With Alopex Local Search

Miguel Leon, Ning Xiong, Daniel Molina, Francisco Herrera
Pages: 795 - 808
Differential evolution (DE) represents a class of population-based optimization techniques that uses differences of vectors to search for optimal solutions in the search space. However, promising solutions/regions are not adequately exploited by a traditional DE algorithm. Memetic computing has been...

Information Structures in an Incomplete Interval-Valued Information System

Jiasheng Zeng, Zhaowen Li, Meng Liu, Shimin Liao
Pages: 809 - 821
An incomplete interval-valued information system (IIVIS) is an information system (IS) in which the information values are interval numbers with missing values. This article researches information structures in an IIVIS. First, information structures in an IIVIS are obtained. In addition, the dependence...

Distributed Synthetic Minority Oversampling Technique

Sakshi Hooda, Suman Mann
Pages: 929 - 936
Real world problems for prediction usually try to predict rare occurrences. Application of standard classification algorithm is biased toward against these rare events, due to this data imbalance. Typical approaches to solve this data imbalance involve oversampling these “rare events” or under sampling...

An Algorithmic Approach for Computing Unions and Intersections Between Fuzzy Multisets

Ángel Riesgo, Pedro Alonso, Irene Díaz, Susana Montes
Pages: 833 - 841
Fuzzy multisets represent a particularly challenging generalization of the concept of fuzzy sets. The membership degrees of fuzzy multisets are given by multisets in 0,1 rather than single values. Mathematically, they can be also seen as a generalization of the hesitant fuzzy sets. But in this general...

Matrix-Based Approaches for Updating Approximations in Multigranulation Rough Set While Adding and Deleting Attributes

Peiqiu Yu, Jinjin Li, Hongkun Wang, Guoping Lin
Pages: 855 - 872
With advanced technology in medicine and biology, data sets containing information could be huge and complex that sometimes are difficult to handle. Dynamic computing is an efficient approach to solve some problems. Since multigranulation rough sets were proposed, many algorithms have been designed for...