International Journal of Computational Intelligence Systems

+ Advanced search
1040 articles

Day-Ahead Price Forecasting in Asia's First Liberalised Electricity Market Using Artificial Neural Networks

S. Anbazhagan, N. Kumarappan
Pages: 476 - 485
This paper proposes a comparative model for the day-ahead electricity price forecasting that could be realized using multi-layer neural network (MLNN) with levenberg-marquardt (LM) algorithm, generalized regression neural network (GRNN) and cascade-forward neural network (CFNN). In this work applications...

An adaptive learning approach for no-wait flowshop scheduling problems to minimize make-span

Orhan Engin, Cengiz Gunaydin
Pages: 521 - 529
No-wait flowshop scheduling problem (NW-FSSP) with the objective to minimize the makespan is an important sequencing problem in the production plans and applications of no-wait flowshops can be found in several industries. In a NW-FSSP, jobs are not allowed to wait between two successive machines. The...

Shape Degeneration and Multi-object Search Basing on Multi-shape Priors

Song Chunhe, Zhao Hai, Jing Wei, Zhu Hongbo
Pages: 467 - 475
This paper proposed a framework of segmenting multiple targets basing on multiple shape priors. The key novel idea in the proposed framework is the shape degeneration model. By breaking the balance between the competition regions adaptively, the proposed model can degenerate the region which is with...

A Negative Selection Algorithm Based on Hierarchical Clustering of Self Set and its Application in Anomaly Detection

Wen Chen, Xiao-Jie Liu, Tao Li, Yuan-Quan Shi, Xu-Fei Zheng, Hui Zhao
Pages: 410 - 419
A negative selection algorithm based on the hierarchical clustering of self set HC-RNSA is introduced in this paper. Several strategies are applied to improve the algorithm performance. First, the self data set is replaced by the self cluster centers to compare with the detector candidates in each cluster...

A.P.G.: An Intelligent Automatic Generator of Presentations for Tour-Guide Robots

J. Javier Rainer, Ramon Galan, Basil Al-Hadithi, Agustin Jiménez
Pages: 446 - 455
This work focuses on obtaining an automatic presentation generator for a robot guide. The most important aspect of this proposal is that the design uses learning as the means to optimize the quality of the presentations. This fuzzy system is used to select the most appropriate group of paragraphs for...

Evaluating the Packing Process in Food Industry Using Fuzzy X and S Control Charts

Nihal Erginel, Sevil Senturk, Cengiz Kahraman, Ihsan Kaya
Pages: 509 - 520
The fuzzy set theory addresses the development of concepts and techniques for dealing with uncertainty or impression conditions. If the collected data from a process include vagueness due to human subjectively or measurement system, fuzzy control charts are available tools for monitoring and evaluating...

A Multi-Criteria Decision Making Approach for Machine Tool Selection Problem in a Fuzzy Environment

Arzum Ozgen, Gulfem Tuzkaya, Umut R Tuzkaya, Dogan Ozgen
Pages: 431 - 445
Tools and machines have an important effect on the manufacturing operations’ effectiveness and the selection process of appropriate tools and machines is a complex issue with the consideration of multiple criteria. Considering the complexity of the problem area and the difficulties in machine tools...

A Novel Ant Colony Algorithm for the Single-Machine Total Weighted Tardiness Problem with Sequence Dependent Setup Times

Fardin Ahmadizar, Leila Hosseini
Pages: 456 - 466
This paper deals with the NP-hard single-machine total weighted tardiness problem with sequence dependent setup times. Incorporating fuzzy sets and genetic operators, a novel ant colony optimization algorithm is developed for the problem. In the proposed algorithm, artificial ants construct solutions...

An Ant Colony Optimization Approach for the Machine-Part Cell Formation Problem

Mehdi Hosseinabadi Farahani, Leila Hosseini
Pages: 486 - 496
In this paper, the problem of grouping machines and parts into cells (machine-part cell formation problem) is considered with the objective of minimizing grouping efficacy. An ant colony optimization algorithm is developed to solve such problem. In the proposed algorithm, solutions are constructed in...

Survey on Recent Research and Implementation of Ant Colony Optimization in Various Engineering Applications

Mohan B. Chandra, R. Baskaran
Pages: 566 - 582
Ant colony optimization (ACO) takes inspiration from the foraging behaviour of real ant species. This ACO exploits a similar mechanism for solving optimization problems for the various engineering field of study. Many successful implementations using ACO are now available in many applications. This paper...

A Modified Super-Efficiency DEA Approach for Solving Multi-Groups Classification Problems

Jie Wu, Qingxian An, Liang Liang
Pages: 606 - 618
Among the various discriminant analysis (DA) methods, researchers have investigated several directions in this area: statistics, econometrics, computer data mining technologies and mathematical programming. Recently, as a nonparametric mathematical programming approach, Data envelopment analysis has...

Polluants Time-Series Prediction Using the Gamma Classifier

Itzama Lopez-Yanez, Amadeo J. Arguelles-Cruz, Oscar Camacho-Nieto, Cornelio Yanez-Marquez
Pages: 680 - 711
In this work we predict time series of air pollution data taken in Mexico City and the Valley of Mexico, by using the Gamma Classifier which is a novel intelligent associative mathematical model, coupled with an emergent coding technique. Historical and current data about the concentration of specific...

Fuzzy Mutual Information Based min-Redundancy and Max-Relevance Heterogeneous Feature Selection

Daren Yu, Shuang An, Qinghua Hu
Pages: 619 - 633
Feature selection is an important preprocessing step in pattern classification and machine learning, and mutual information is widely used to measure relevance between features and decision. However, it is difficult to directly calculate relevance between continuous or fuzzy features using mutual information....

Optimization of workflow scheduling in Utility Management System with hierarchical neural network

Srdjan Vukmirovic, Aleksandar Erdeljan, Imre Lendak, Darko Capko, Nemanja Nedic
Pages: 672 - 679
Grid computing could be the future computing paradigm for enterprise applications, one of its benefits being that it can be used for executing large scale applications. Utility Management Systems execute very large numbers of workflows with very high resource requirements. This paper proposes architecture...

Nonlinear underwater robot controller design with adaptive disturbance prediction

Xin Songa, Fang Liue, ZaoJian Zoub, Yue-Min Zhuc, JianChuan Yinb, Feng Xub
Pages: 634 - 643
A new hybrid adaptive control algorithm is proposed for the nonlinear system controller design of underwater robot. Compared with the previous works in the controller design of underwater robot, the main advantages of this work are: (1) A new disturbance prediction and compensation model is proposed;...

Content-based Image Hiding Method for Secure Network Biometric Verification

Xiangjiu Che, Jun Kong, Zhanheng Gao, Miao Qi, Jiangyan Dai
Pages: 596 - 605
For secure biometric verification, most existing methods embed biometric information directly into the cover image, but content correlation analysis between the biometric image and the cover image is often ignored. In this paper, we propose a novel biometric image hiding approach based on the content...

Feature Selection in Decision Systems Based on Conditional Knowledge Granularity

Tingquan Deng, Chengdong Yang, Qinghua Hu
Pages: 655 - 671
Feature selection is an important technique for dimension reduction in machine learning and pattern recognition communities. Feature evaluation functions play essential roles in constructing feature selection algorithms. This paper introduces a new notion of knowledge granularity, called conditional...

A Fuzzy Multi-Criteria SWOT Analysis: An Application to Nuclear Power Plant Site Selection

Mehmet Ekmekcioglu, Ahmet Can Kutlu, Cengiz Kahraman
Pages: 583 - 595
SWOT (Strengths, Weaknesses, Opportunities and Threats) analysis is a commonly used and an important technique for analyzing internal and external environments in order to provide a systematic approach and support for a decision making. SWOT is criticized mostly for considering only qualitative examination...

Design of 2-D Recursive Filters Using Self-adaptive Mutation Differential Evolution Algorithm

Lianghong Wu, Yaonan Wang, Xiaofang Yuan
Pages: 644 - 654
This paper investigates a novel approach to the design of two-dimensional recursive digital filters using differential evolution (DE) algorithm. The design task is reformulated as a constrained minimization problem and is solved by an Self-adaptive Mutation DE algorithm (SAMDE), which adopts an adaptive...

Adaptive Secret Sharing for Color Images

Jia-Hong Li, Wei-Bin Lee, Dengpan Ye, Tzong-Jye Liu, Chuan Qin
Pages: 797 - 805
A secret sharing model can secure a secret over multiple noise-like shadows and remain recoverable despite multiple shadow failures. Even if some of the shadows are compromised, the secret will not be revealed as long as the number of the compromised shadows is smaller than a pre-determined threshold....

A Reputation Evaluation Approach Based on Fuzzy Relation

Meiyu Fang, Xiaolin Zheng, Deren Chen
Pages: 759 - 767
In traditional models, fuzzy sets are used to describe trust degree and evaluate reputation for vague words. But in some practical applications, the determination of membership functions associated with vague concepts is difficult or impossible. This paper builds a reputation computing model based on...

Evaluating Timeliness and Accuracy Trade-offs of Supervised Machine Learning for Adapting Enterprise DRE Systems in Dynamic Environments

Joe Hoffert, Douglas C. Schmidt, Aniruddha Gokhale
Pages: 806 - 816
Several adaptation approaches have been devised to ensure end-to-end quality-of-service (QoS) for enterprise distributed systems in dynamic operating environments. Not all approaches are applicable, however, for the stringent accuracy, timeliness, and development complexity requirements of distributed...

A Software Behavior Trustworthiness Measurement Method based on Data Mining

Yuyu Yuan, Qiang Han
Pages: 817 - 825
This paper presents a congruence measurement method by partitions to apply software trustworthiness measures in dynamic behavior feature datasets. The datasets are generated at software running time. And the method compares the datasets with the static attribute feature datasets generated at software...

A Projection Pursuit Based Risk Assessment Method in Mobile Ad hoc Networks

Fu Cai, Liu Ming, Chen Jing, Zhang Li, Xiao-Yang Liu
Pages: 749 - 758
Establishing high performance cooperation and estimating nodes’ risk level in mobile ad hoc networks (MANETs) are currently fundamental and challenging due to the inherent characteristics of MANETs, such as the highly dynamic topology and the absence of an effective security mechanism. Trust based...

Improved Ordinary Measure and Image Entropy Theory based intelligent Copy Detection Method

Dengpan Ye, Longfei Ma, Lina Wang, Robert H. Deng
Pages: 777 - 787
Nowadays, more and more multimedia websites appear in social network. It brings some security problems, such as privacy, piracy, disclosure of sensitive contents and so on. Aiming at copyright protection, the copy detection technology of multimedia contents becomes a hot topic. In our previous work,...

Application of Fuzzy Comprehensive Evaluation Method in Trust Quantification

Shunan Ma, Jingsha He, Shuai Xunbo
Pages: 768 - 776
Trust can play an important role for the sharing of resources and information in open network environments. Trust quantification is thus an important issue in dynamic trust management. By considering the fuzziness and uncertainty of trust, in this paper, we propose a fuzzy comprehensive evaluation method...

WPMSD: A Malicious Script Detection Method Inspired by the Process of Immunoglobulin Secretion

Hui Zhao, Jie Zeng, Yuanquan Shi, Jian Qin, Wen Chen
Pages: 788 - 796
Inspired by the process of immunoglobulin secretion in biological body, we present a Web Page Malicious Script Detection Method (WPMSD). In this paper, Firstly, the basic definitions of artificial immune items are given. Secondly, according to the spreading range of malicious script, the immunoglobulin...

Mining Multi-scale Intervention Rules from Time Series and Complex Network

Jiaoling Zheng, Changjie Tang, Shaojie Qiao, Ning Yang, Yue Wang
Pages: 728 - 738
This paper proposes the concept of intervention rule which tries to reveal the interventional relationship between elements in a system in the following three aspects. (1) Casual relationship. Intervention rule shows which element is the cause and which element is the consequence. (2) Quantitative relationship:...

Imitation of Honeybee Aggregation with Collective Behavior of Swarm Robots.

Farshad Arvin, Khairulmizam Samsudin, Abdul Rahman Ramli, Masoud Bekravi
Pages: 739 - 748
This paper analyzes the collective behaviors of swarm robots that play role in the aggregation scenario. Honeybee aggregation is an inspired behavior of young honeybees which tend to aggregate around an optimal zone. This aggregation is implemented based on variation of parameters values. In the second...

A note on the rates of uniform approximation of fuzzy systems

Viet Long Hoang
Pages: 712 - 727
For the fuzzy systems with the kernel-shaped fuzzy sets of if part, we estimate the rates of the uniform approximation for continuous functions. Results are given associatively with the rates of convergence of the sequence (logk/k)a.

A Convergent Solution to Matrix Bidirectional Projection Based Feature Extraction with Application to Face Recognition

Yubin Zhan, Jianping Yin, Xinwang Liu
Pages: 863 - 873
Recently, many feature extraction methods, which are based on the matrix representation of image and matrix bidirectional projection technique, are proposed. However, these methods in solving the two projection matrices will suffer from non-optimized or non-convergent solution. To overcome this problem,...

Automatic Design of Robust Optimal Controller for Interval Plants Using Genetic Programming and Kharitonov Theorem

Peng Chen, Yong-Zai Lu
Pages: 826 - 836
This paper presents a novel approach to automatic design of a robust optimal controller for interval plants with Genetic Programming based on Kharitonov Theorem (KT), which provides a theoretical foundation in the design of robust controller for interval plants. The structure and parameters of the robust...

Integrating Strategic and Tactical Decisions to Robust Designing of Cellular Manufacturing under Uncertainty: Fixed Suppliers in Supply Chain

V.R Ghezavati, S.J. Sadjadi, M. Dehghan Nayeri
Pages: 837 - 854
Cellular manufacturing (CM) has been identified as an innovative practice for manufacturer to achieve efficiency as well as flexibility under an uncertain environment. This study addresses a new mathematical robust model for a cellular manufacturing problem integrated with tactical aspects under supply...

Automatic registration of remote sensing images based on SIFT and fuzzy block matching for change detection

Cai Guo-Rong, Li Shao-Zi, Wu Yun-Dong, Chen Shui-Li, Su Song-Zhi
Pages: 874 - 885
This paper presents an automated image registration approach to detecting changes in multi-temporal remote sensing images. The proposed algorithm is based on the scale invariant feature transform (SIFT) and has two phases. The first phase focuses on SIFT feature extraction and on estimation of image...

H-infinite State Estimation for Takagi-Sugeno Fuzzy Delayed Hopfield Neural Networks

Choon Ki Ahn
Pages: 855 - 862
This paper presents a H-infinite state estimator for Takagi-Sugeno fuzzy delayed Hopfield neural networks. Based on Lyapunov-Krasovskii stability approach, a delay-dependent criterion is proposed to ensure that the resulting estimation error system is asymptotically stable with a guaranteed H performance....

Gene Silencing Genetic Algorithm for 0/1 Knapsack with Object Preferences

S. Siva Sathya, S. Kuppuswami, S. Sendhil Kumar
Pages: 886 - 893
Genetic Algorithms are efficient search and optimization techniques inspired by natural evolution. To show the difficulties in solving constrained optimization problems through GA, the 0/1 knapsack problem with user specific object preferences has been taken up. A new genetic operator, namely, ‘gene...

A Fuzzy MCDM Approach to Evaluate Green Suppliers

Gizem Cifci, Gülcin Büyüközkan
Pages: 894 - 909
Nowadays the effect of industrial production on the environment brought out the importance of the green concept in supply chains. Particularly for supplier firms, greening is essential in a supply chain because with growing worldwide awareness of environmental protection, green production has become...

An Adaptive Token Passing Algorithm Applicable to MS/TP Network

Ping Ren, Zude Zhou, Quan Liu
Pages: 910 - 920
In the MS/TP network, token is passed according to the address of master station. A novel token passing algorithm was proposed based on the characteristics of MS/TP network frame distribution and the requirements of real-time performance. The algorithm adopts distributed control method, which can adjust...

Fused Multi-Characteristic Validity Index: An Application to Reconstructed Image Evaluation in Electrical Tomography

Shihong Yue, Teresa Wu, Xian Zhao, Zhiqing Liu
Pages: 1052 - 1061
The quality of reconstructed images is an important and direct criterion to quantitatively evaluate the effectiveness of reconstruction algorithms in electrical tomography (ET). Unfortunately, there lacks of effective and efficient approach to assessing the quality of ET images in literature and practices....

Intelligent Recognition of Lung Nodule Combining Rule-based and C-SVM Classifiers

Bin Li, Jing Zhang, Lianfang Tian, Li Tan, Shijie Xiang, Shanxing Ou
Pages: 950 - 976
Computer-aided detection(CAD) system for lung nodules plays the important role in the diagnosis of lung cancer. In this paper, an improved intelligent recognition method of lung nodule in HRCT combing rule-based and costsensitive support vector machine(C-SVM) classifiers is proposed for detecting both...

A Globally Convergent MCA Algorithm by Generalized Eigen-Decomposition

Jianbin Gao, Mao Ye, Jianping Li, Qi Xia
Pages: 991 - 1001
Minor component analysis (MCA) are used in many applications such as curve and surface fitting, robust beam forming, and blind signal separation. Based on the generalized eigen-decomposition, we present a completely different approach that leads to derive a novel MCA algorithm. First, in the sense of...

Residual as Linear Sum of Matrix Determinants in Multiway Contingency Tables

Shusaku Tsumoto, Shoji Hirano
Pages: 1080 - 1089
A Pearson residual is defined as a residual between an observed value and expected one of each cell in a contingency table, which measures the degree of statistical dependence of two attribute-value pairs corresponding to the cell. This paper shows that this residual is decomposed into a linear sum of...

A Frequent Pattern Mining Method for Finding Planted Motifs of Unknown Length in DNA Sequences

Caiyan Jia, Ruqian Lu, Lusheng Chen
Pages: 1032 - 1041
Identification and characterization of gene regulatory binding motifs is one of the fundamental tasks toward systematically understanding the molecular mechanisms of transcriptional regulation. Recently, the problem has been abstracted as the challenge planted (l,d)-motif problem. Previous studies have...

Splitting Computation of Answer Set Program and Its Application on E-service

Bo Yang, Ying Zhang, Mingyi Zhang, Maonian Wu
Pages: 977 - 990
As a primary means for representing and reasoning about knowledge, Answer Set Programming (ASP) has been applying in many areas such as planning, decision making, fault diagnosing and increasingly prevalent e-service. Based on the stable model semantics of logic programming, ASP can be used to solve...

Identifying Web Users on the Base of their Browsing Patterns

Wojciech Jaworski
Pages: 1062 - 1069
Our aim is to develop methodology for recognition of Internet portal users on the base of their browsing patterns. This is a classification task in which we have thousands values of decision attribute and objects are described by means of sequences of symbols. We develop feature selectors which make...

Spatio-temporal Similarity Measure for Network Constrained Trajectory Data

Ying Xia, Guo-Yin Wang, Xu Zhang, Gyoung-Bae Kim, Hae-Young Bae
Pages: 1070 - 1079
Trajectory similarity measure is an important issue for analyzing the behavior of moving objects. In this paper, a similarity measure method for network constrained trajectories is proposed. It considers spatial and temporal features simultaneously in calculating spatio-temporal distance. The crossing...

Fully implicational methods for interval-valued fuzzy reasoning with multi-antecedent rules

Hua-Wen Liu, Cheng Li
Pages: 929 - 945
Based on the fully implicational idea, we investigate the interval-valued fuzzy reasoning with multiantecedent rules. First, we construct a class of interval-valued fuzzy implications by means of a type of implications and a parameter on the unit interval, then use them to establish three kinds of fully...

A Novel Fuzzy Rough Granular Neural Network for Classification

Avatharam Ganivada, Sankar K. Pal
Pages: 1042 - 1051
A novel fuzzy rough granular neural network (NFRGNN) based on the multilayer perceptron using backpropagation algorithm is described for fuzzy classification of patterns. We provide a development strategy of knowledge extraction from data using fuzzy rough set theoretic techniques. Extracted knowledge...

On the Application of Evolutionary Computation Techniques in Designing Stream Cipher Systems

Wasan Shaker Awad
Pages: 921 - 928
Encryption is an important mechanism used to protect private information from unauthorized access. Thus, cipher systems play an important role in the communication and storage systems. But, designing a cipher system of good properties, such as high degree of security and efficiency, is a complex process....

Feature-Weighted Mountain Method with Its Application to Color Image Segmentation

Wen-Liang Hung, Miin-Shen Yang, Jian Yu, Chao-Ming Hwang
Pages: 1002 - 1011
In this paper, we propose a feature-weighted mountain clustering method. The proposed method can work well when there are noisy feature variables and could be useful for obtaining initial estimat of cluster centers for other clustering algorithms. Results from color image segmentation illustrate the...